P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 02-07-08, 09:24 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - July 5th, '08

Since 2002




















In CONGRESS, July 4, 1776

The unanimous Declaration of the thirteen united States of America,

When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.

We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. --That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, -- That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security. --Such has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former Systems of Government. The history of the present King of Great Britain [George III] is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid world.

He has refused his Assent to Laws, the most wholesome and necessary for the public good.

He has forbidden his Governors to pass Laws of immediate and pressing importance, unless suspended in their operation till his Assent should be obtained; and when so suspended, he has utterly neglected to attend to them.

He has refused to pass other Laws for the accommodation of large districts of people, unless those people would relinquish the right of Representation in the Legislature, a right inestimable to them and formidable to tyrants only.

He has called together legislative bodies at places unusual, uncomfortable, and distant from the depository of their public Records, for the sole purpose of fatiguing them into compliance with his measures.

He has dissolved Representative Houses repeatedly, for opposing with manly firmness his invasions on the rights of the people.

He has refused for a long time, after such dissolutions, to cause others to be elected; whereby the Legislative powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the mean time exposed to all the dangers of invasion from without, and convulsions within.

He has endeavoured to prevent the population of these States; for that purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their migrations hither, and raising the conditions of new Appropriations of Lands.

He has obstructed the Administration of Justice, by refusing his Assent to Laws for establishing Judiciary powers.

He has made Judges dependent on his Will alone, for the tenure of their offices, and the amount and payment of their salaries.

He has erected a multitude of New Offices, and sent hither swarms of Officers to harass our people, and eat out their substance.

He has kept among us, in times of peace, Standing Armies without the consent of our legislatures.

He has affected to render the Military independent of and superior to the Civil power.

He has combined with others to subject us to a jurisdiction foreign to our constitution and unacknowledged by our laws; giving his Assent to their Acts of pretended Legislation:

For Quartering large bodies of armed troops among us:

For protecting them, by a mock Trial, from punishment for any Murders which they should commit on the Inhabitants of these States:

For cutting off our Trade with all parts of the world:

For imposing Taxes on us without our Consent:

For depriving us, in many cases, of the benefits of Trial by Jury:

For transporting us beyond Seas to be tried for pretended offences:

For abolishing the free System of English Laws in a neighbouring Province, establishing therein an Arbitrary government, and enlarging its Boundaries so as to render it at once an example and fit instrument for introducing the same absolute rule into these Colonies:

For taking away our Charters, abolishing our most valuable Laws, and altering fundamentally the Forms of our Governments:

For suspending our own Legislatures, and declaring themselves invested with power to legislate for us in all cases whatsoever.

He has abdicated Government here, by declaring us out of his Protection and waging War against us.

He has plundered our seas, ravaged our Coasts, burnt our towns, and destroyed the lives of our people.

He is at this time transporting large Armies of foreign Mercenaries to compleat the works of death, desolation and tyranny, already begun with circumstances of Cruelty and perfidy scarcely paralleled in the most barbarous ages, and totally unworthy the Head of a civilized nation.

He has constrained our fellow Citizens taken Captive on the high Seas to bear Arms against their Country, to become the executioners of their friends and Brethren, or to fall themselves by their Hands.

He has excited domestic insurrections amongst us, and has endeavoured to bring on the inhabitants of our frontiers, the merciless Indian Savages, whose known rule of warfare, is an undistinguished destruction of all ages, sexes and conditions.

In every stage of these Oppressions We have Petitioned for Redress in the most humble terms: Our repeated Petitions have been answered only by repeated injury. A Prince whose character is thus marked by every act which may define a Tyrant, is unfit to be the ruler of a free people.

Nor have We been wanting in attentions to our British brethren. We have warned them from time to time of attempts by their legislature to extend an unwarrantable jurisdiction over us. We have reminded them of the circumstances of our emigration and settlement here. We have appealed to their native justice and magnanimity, and we have conjured them by the ties of our common kindred to disavow these usurpations, which, would inevitably interrupt our connections and correspondence. They too have been deaf to the voice of justice and of consanguinity. We must, therefore, acquiesce in the necessity, which denounces our Separation, and hold them, as we hold the rest of mankind, Enemies in War, in Peace Friends.

We, therefore, the Representatives of the united States of America, in General Congress, Assembled, appealing to the Supreme Judge of the world for the rectitude of our intentions, do, in the Name, and by the Authority of the good People of these Colonies, solemnly publish and declare, That these United Colonies are, and of Right ought to be Free and Independent States; that they are Absolved from all Allegiance to the British Crown, and that all political connection between them and the State of Great Britain, is and ought to be totally dissolved; and that as Free and Independent States, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which Independent States may of right do. And for the support of this Declaration, with a firm reliance on the protection of divine Providence, we mutually pledge to each other our Lives, our Fortunes and our sacred Honor.


Signed,


New Hampshire: Josiah Bartlett, William Whipple, Matthew Thornton

Massachusetts: John Hancock, Samual Adams, John Adams, Robert Treat Paine, Elbridge Gerry

Rhode Island: Stephen Hopkins, William Ellery

Connecticut: Roger Sherman, Samuel Huntington, William Williams, Oliver Wolcott

New York: William Floyd, Philip Livingston, Francis Lewis, Lewis Morris

New Jersey: Richard Stockton, John Witherspoon, Francis Hopkinson, John Hart, Abraham Clark

Pennsylvania: Robert Morris, Benjamin Rush, Benjamin Franklin, John Morton, George Clymer, James Smith, George Taylor, James Wilson, George Ross

Delaware: Caesar Rodney, George Read, Thomas McKean

Maryland: Samuel Chase, William Paca, Thomas Stone, Charles Carroll of Carrollton

Virginia: George Wythe, Richard Henry Lee, Thomas Jefferson, Benjamin Harrison, Thomas Nelson, Jr., Francis Lightfoot Lee, Carter Braxton

North Carolina: William Hooper, Joseph Hewes, John Penn

South Carolina: Edward Rutledge, Thomas Heyward, Jr., Thomas Lynch, Jr., Arthur Middleton

Georgia: Button Gwinnett, Lyman Hall, George Walton
































July 5th, 2008




Judge Orders Google to Turn Over YouTube Records
Miguel Helft

A federal judge in New York has ordered Google to turn over to Viacom a database linking users of YouTube, the Web’s largest video site by far, with every clip they have watched there.

The order raised concerns among users and privacy advocates that the online video viewing habits of tens of millions of people could be exposed. But Google and Viacom said they were hoping to come up with a way to protect the anonymity of YouTube viewers.

Viacom said that the information would be safeguarded by a protective order restricting access to the data to outside advisers, who will use it solely to press Viacom’s $1 billion copyright suit against Google.

Still, the judge’s order, which was made public late Wednesday, renewed concerns among privacy advocates that Internet companies like Google are collecting unprecedented amounts of private information that could be misused or could unexpectedly fall into the hands of third parties.

For every video on YouTube, the judge required Google to turn over to Viacom the login name of every user who watched it, and the address of their computer, known as an I.P., or Internet protocol, address. Both companies have argued that such data cannot be used to unmask the identities of individual users with certainty. But in many cases, technology experts and others have been able to link I.P. addresses to individuals using records of their online activities.

Google and Viacom said they had had discussions about ways to ensure the data is further protected to assure anonymity.

“We are disappointed the court granted Viacom’s overreaching demand for viewing history,” Catherine Lacavera, Google’s senior litigation counsel, said in a statement. “We are asking Viacom to respect users’ privacy and allow us to anonymize the logs before producing them under the court’s order.”

Michael Fricklas, Viacom’s general counsel said: “We are investigating techniques, including anonymization, to enhance the security of information that will be produced.”

Mr. Fricklas added that Viacom would not have direct access to the information Google produces, and that its use would be strictly limited. Viacom would not, for example, be able to chase down users who illegally posted clips from “The Colbert Report” on YouTube.

“The information that is produced by Google is going to be limited to outside advisers who can use it solely for the purpose of enforcing our rights against YouTube and Google,” Mr. Fricklas said. “I can unequivocally state that we will not use any of this information to enforce rights against end users.”

In a letter sent Thursday, Google’s lawyers asked their counterparts at Viacom to agree to allow Google to remove information from the data that could potentially be used to identify individuals.

“We request that plaintiffs agree that YouTube may redact usernames and I.P. addresses from the viewing data in the interests of protecting user privacy,” wrote David H. Kramer, a partner at Wilson Sonsini Goodrich & Rosati. Viacom did not immediately respond to a request for comment on the letter.

Privacy advocates said they welcomed Viacom’s commitment to using the information only for the purposes of the litigation, but they remained concerned about protecting user rights.

“Users should have the right to challenge and contest the production of this deeply private information,” said Kurt Opsahl, senior staff lawyer at the Electronic Frontier Foundation. “Such right is protected by law.”

Mr. Opsahl said that even records that did not include a user’s login name and I.P. address might be able to be associated with specific individuals. He said he believed the judge’s order violated the federal Video Privacy Protection Act.

Congress passed the law to protect the video rental records of individuals, after a newspaper disclosed the rental records of Robert H. Bork, then a Supreme Court nominee.

United States District Court Judge Louis L. Stanton, who is presiding over Viacom’s lawsuit against Google and YouTube, said that Google could “cite no authority barring them from disclosing such information in civil discovery proceedings, and their privacy concerns are speculative.” He said the information could help Viacom make its case.

“A markedly higher proportion of infringing-video watching may bear on plaintiff’s vicarious liability claim, and defendants’ substantial noninfringing use defense,” he wrote.
http://www.nytimes.com/2008/07/04/te...outube.html?hp





Political Freelancers Use Web to Join the Attack
Jim Rutenberg

The video blasted across the Internet, drawing political blood from Senator John McCain within a matter of days.

Produced here in a cluttered former motel behind the Sony Pictures lot, it juxtaposed harsh statements about Islam made by the Rev. Rod Parsley with statements from Mr. McCain praising Mr. Parsley, a conservative evangelical leader. The montage won notice on network newscasts this spring and ultimately helped lead Mr. McCain, the likely Republican presidential nominee, to reject Mr. Parsley’s earlier endorsement.

In previous elections, an attack like that would have come from party operatives, campaign researchers or the professional political hit men who orbit around them.

But in the 2008 race, the first in which campaigns are feeling the full force of the changes wrought by the Web, the most attention-grabbing attacks are increasingly coming from people outside the political world. In some cases they are amateurs operating with nothing but passion, a computer and a YouTube account, in other cases sophisticated media types with more elaborate resources but no campaign experience.

So it was with the Parsley video, which was the work of a 64-year-old film director, Robert Greenwald, and his small band of 20-something assistants. Once best known for films like “Xanadu” (with Olivia Newton-John) and the television movie “The Burning Bed” (with Farrah Fawcett), Mr. Greenwald shows how technology has dispersed the power to shape campaign narratives, potentially upending the way American presidential campaigns are fought.

Mr. Greenwald’s McCain videos, most of which portray the senator as contradicting himself in different settings, have been viewed more than five million times — more than Mr. McCain’s own campaign videos have been downloaded on YouTube.

“If you had told me we would have hit one million, I would have told you you were crazy,” said Mr. Greenwald, who said he had no ties to the Democratic Party or Senator Barack Obama’s campaign.

Four years ago, the Internet was a Wild West that caused the occasional headache for the campaigns but for the most part remained segregated from them. This year, the development of cheap new editing programs and fast video distribution through sites like YouTube has broken down the barriers, empowering a new generation of largely unregulated political warriors who can affect the campaign dialogue faster and with more impact than the traditional opposition research shops.

Already there are signs that these less formal and more individual efforts are filling a vacuum created by a decline in activity among the independent advocacy groups — so-called 527s and similar operations — that have played a large role in negative politics in the last several election cycles. Especially on the conservative side, independent groups have reported trouble raising money, and some of the biggest players from 2004 have signaled that they will sit it out this time around.

The shift has by no means gone unnoticed by the campaigns. And while strategists in both parties suspect that traditional political operatives affiliated with the campaigns or parties frequently pose as independent grassroots participants by hiding behind anonymous Web identities, few have been caught this year.

The change has added to the frenetic pace of the campaign this year. “It’s politics at the speed of Internet,” said Dan Carol, a strategist for Mr. Obama who was one of the young bulls on Bill Clinton’s vaunted rapid response team in 1992. “There’s just a lot of people who at a very low cost can do this stuff and don’t need a memo from HQ.”

That would seem to apply to people like Robert Anderson, a professor at Elon University in North Carolina whose modest YouTube site features videos flattering to Mr. Obama and unflattering to Mr. McCain, or Paul Villarreal, who from his apartment in Wilkes-Barre, Pa., has produced a harsh series of spots that attack Mr. Obama and make some claims that have been widely debunked.

Counting the audience for such videos can be tricky, as sites like YouTube list only the number of times they have been viewed, not the number of people who view them. That said, according to YouTube, Mr. Villarreal’s video was viewed about 50,000 times. And it cost him just $100 to produce, for software, he said. He said he had no connection to the Republican Party or the McCain campaign, though he said he had reached out to them and not heard back.

The better-circulated political videos have generally come from people with some production experience. One of the most widely seen anti-Obama videos was created by Jason Mitchell, who produces evangelical Christian programming in Durham, N.C.

A conservative-leaning version of YouTube called Eyeblast.tv has recorded millions of hits on the video. But as is often the case with such videos, how many of the viewers come to sneer rather than applaud is hard to tell.

“Four years ago I would just be a ‘political activist,’ ” Mr. Mitchell said. “Now, they call me a ‘communications political strategist,’ and that’s only because of the Internet.”

Mr. Mitchell, 29, said his cash expenses to make and distribute the segment were about $50, a fraction of the roughly $100,000 that it would cost to broadcast a 30-second spot on a television news program with an audience of a few million, like “Meet the Press.” “That’s dirt cheap for an ad,” Mr. Mitchell said.

Mr. Mitchell said he was motivated by what he said were deep-rooted misgivings about Mr. Obama on social issues, his level of experience and background. But it is unlikely any television station would have accepted the video if he had tried to run it.

The segment’s announcer notes that Mr. Obama’s father was Muslim, asserts that the candidate attended a Muslim grammar school in Indonesia for two years, and asks, “When we are at war with Islamic terrorism, can Americans elect a man with not one, not two, but three Islamic names?” One onscreen image shows Mr. Obama’s face morphed with that of Osama bin Laden.

Mr. Mitchell says he sticks close to the factual record, but the video has been widely criticized as over the line. Mr. Obama is a Christian. The school he attended in Indonesia was secular.

Three weeks ago, the Obama campaign started a Web site called “Fight the Smears” to, among other things, debunk portrayals of Mr. Obama as Muslim. It allows its users to e-mail the information easily to friends.

“What we’re really trying to do is knock down important things that are wrong, which also diminishes the power of the next set of rumors,” said Mr. Carol, the Obama aide.

With Web-based attacks proliferating, campaigns are leaving behind the assumption that to respond to highly negative or false accusations is to needlessly publicize them. “It poses a more complicated version of the age-old dilemma that campaigns always find themselves in,” said Phil Singer, who was the press secretary for Senator Hillary Rodham Clinton’s campaign. “Do you address something head on and risk making it a mainstream phenomenon? Or ignore it and risk allowing it to take on a life of its own?”

The presidential campaign of former Gov. Mitt Romney of Massachusetts developed an effective if labor intensive technique. It flooded YouTube with positive videos of Mr. Romney. “The new model of response is to dominate the market share of information about your candidate,” said Kevin Madden, Mr. Romney’s former press secretary.

Several Republican communications strategists, speaking on condition of anonymity, said that was precisely what Mr. McCain might have to do. He is coming under harsh attack on YouTube in videos that, some Republicans say, take his words out of context. A simple search of his name automatically produces several negative videos. Mr. Greenwald, whose shop is responsible for many of them, said he was determined to keep it that way.

With a budget of $900,000 from donations, Mr. Greenwald has built a mini-factory of anti-McCain propaganda at his firm, Brave New Films. He takes no payment for his efforts, which are regulated by laws governing nonprofit groups and include other subjects, like critiques of Fox News.

In a darkened room here, three young assistants edit digital images on equipment that barely takes up a full desk, trolling the Web for political news and culling through Mr. McCain’s past and present statements. A system of hard drives catalogs cable news.

Mr. Greenwald was not always so politically active. He gave money to politicians or groups sporadically, but was not among Hollywood’s elite donor class.

Mr. Greenwald said he had a political awakening after Sept. 11 and dedicated himself to making liberal films, an endeavor he said he could afford having been “lucky enough to have been majorly overpaid in commercial film and television relative to any rational measure.”

His highest impact has been with his video about Mr. Parsley. The montage was created with help from David Corn, Washington Bureau chief for Mother Jones, who unearthed video of Mr. Parsley inveighing against Islam and saying, “America was founded in part with the intention of seeing this false religion destroyed.”

Mr. Greenwald’s team combined it with video of Mr. McCain calling Mr. Parsley, “one of the truly great leaders in America, a moral compass, a spiritual guide.” The montage spread quickly across liberal Web sites, and made its way onto ABC News. Mr. McCain released a statement rejecting Mr. Parsley’s endorsement shortly thereafter.

“For years I sat in conversations with people who said the only way we can be effective is we have to raise $1 billion and buy CBS,” Mr. Greenwald said. “Well, Google raised a couple of billion and bought YouTube, and it’s here for us, and it’s a huge, huge difference.”
http://www.nytimes.com/2008/06/29/us...pposition.html





Swedes Protest Sweeping E-Mail Eavesdropping Law
Malin Rising

A public outcry against Sweden's eavesdropping law reached new heights today with protesters sending more than 1 million e-mails to lawmakers, parliamentary officials said.

The law, narrowly passed by legislators two weeks ago, will let officials eavesdrop on all cross-border e-mail and telephone traffic, in what technology companies have called the most far-reaching communications monitoring plan in Europe. Sweden's government plans to implement it in January.

Opponents say the law will encroach on privacy and jeopardize civil liberties. Supporters claim it is needed to fight international crime and terrorism.

Parliamentary spokeswoman Christina Green said protesters had sent 1.1 million e-mails to lawmakers by this afternoon, after the Expressen tabloid on Sunday launched an online campaign against the law.

The legislation gives Sweden's National Defense Radio Establishment the right to scan all phone calls, e-mails and faxes crossing Sweden's borders, without a court order.

Currently, e-mail and phone surveillance in the Nordic country, known for openness and transparency, requires a court order if police suspect a crime. However, the intelligence agency is allowed to spy on airborne signals, such as radio and satellite traffic, without special permission.
http://www.siliconvalley.com/news/ci_9745076





Bavarian Police Can Legally Place Trojans On PCs
An anonymous reader writes

"The Bavarian Parliament passed a law that allows Bavarian police to place 'Remote Forensic Software' (Google translation) on a suspect's computer as well as on the computers of a suspect's contacts. They may break into houses in secret to install the RFS if a remote installation is not possible; and while they are there a (physical) search is permitted too. The RFS may be used to read, delete, and alter data."

The translation says that RFSs may be used in cases of an "urgent threat to the existence or the security of the Federation or a country or physical, life or liberty of a person... Even where there is a reasonable assumptions on concrete preparatory acts for such serious offenses."
http://news.slashdot.org/article.pl?.../07/04/1343214





Brussels to Sign Away Your Private Details to US
David Leppard

American authorities will be able to obtain greater access to private information such as credit card transactions, internet browsing habits and travel histories of people in Britain under a deal being finalised by European Union officials.

An internal report leaked to The New York Times yesterday said the EU was on the verge of agreeing to give US law enforcement and security agencies information about all EU citizens.

Talks on the new data-sharing deal have been going on since last year. Negotiators are trying to agree on minimum standards to protect privacy rights. This would include limiting access to information to “authorised individuals with an identified purpose” for their search. The Americans want to secure final agreement before President Bush leaves office in January.

This weekend, privacy campaigners said the move would allow the Americans to carry out “fishing” expeditions against anyone they deemed to be of interest and would further undermine individual privacy.

Shami Chakrabarti, director of Liberty, said: “We can barely trust our own authorities with sensitive personal information. What redress will we have on the other side of the Atlantic if our details are lost or abused?”

The Foreign Office would make no comment yesterday and an EU spokesman declined to discuss the matter. Stewart Baker, assistant secretary for policy at the US department of homeland security, said that the deal would make it easier for the US to obtain private information on individuals from banks, credit card firms and other companies in Britain and the EU.

He said many firms faced sanctions from the EU if they were deemed to have passed information to the US in breach of data protection laws. The deal would in effect give them greater protection from punishment in the future. It would apply to airline passengers and anyone whom the US government had legitimate authority to obtain information about, he added.

The internal report said negotiators had largely agreed on an “international binding agreement”. The pact would make it clear that it was lawful for European governments and companies such as internet and credit card firms to transfer private information to the United States and vice versa.

Officials have still to resolve whether European citizens should be able to sue the US government over its handling of personal data. The deal is designed to resolve conflicts over information-sharing between the EU and the US that followed the 9/11 attacks in America.

The US government demanded access to customer data held by airlines flying out of Europe and by a consortium, known as Swift, that monitors global banking transfers. American officials wanted the data so that they could search for suspicious activity.

Barry Steinhardt, a lawyer at the American Civil Liberties Union, said: “Clearly it’s a broad exchange of data. It’s another example of the US drawing in the rest of the world to sacrifice its principles.

“The US is essentially asking the rest of the world to conform to our very limited notion of what’s private.

“It’s not a full-scale transfer of data between Europe and the United States. But it provides for wide access to data which are supposed to be protected under EU law.”

Additional reporting: Sarah Baxter
http://www.timesonline.co.uk/tol/new...cle4232264.ece





Google in Deal with Brazil to Fight Child Porn

Internet search company Google signed an agreement with Brazilian public prosecutors on Wednesday to help combat child pornography on its social networking site Orkut, an accord that the company believes is the first of its kind internationally.

Under the agreement, Google will use filters to remove and prevent illegal content on Orkut, which has about half its users in Brazil. The company will also facilitate evidence gathering under judicial order in suspected crimes against children and teen-agers on Orkut without the need for international legal accords.

Google will also preserve for six months access logs of users being investigated for illegal conduct.

Google said it was the first such agreement that the company had signed and the firm believes it is the first internationally. Alexandre Hohagen, president of Google in Brazil, told a congressional committee, "It's an historic day not only for Brazil but for the Internet in the entire world."

Initially, Google had refused to work with prosecutors, saying it was subject only to U.S. laws, said Prosecutor Sergio Suiama. The company denied this, saying it had always been willing to cooperate with Brazilian authorities.

Brazilian prosecutors say 90 percent of illegal Internet content being investigated in Brazil involves Orkut. The site has 60 million users, half of them in Brazil.

Of 624 investigations by federal prosecutors in Sao Paulo state through the end of last year into human rights crimes on the Internet, 420 involved child pornography on Orkut.

"Orkut was lawless," said Suiama.

The accord was signed during a session of a congressional inquiry into pedophilia and follows legal battles since 2006.

Under the deal, public prosecution withdrew a lawsuit against Google, a company spokesman said.

The committee, which under Brazilian law has some police and judicial powers, ordered the investigation of 18,000 Orkut photo albums accused of harboring child pornography.

Google has more than a 60 percent share of the Web search market, according to industry figures.

(Reporting by Fernando Exman, writing by Raymond Colitt)
http://www.reuters.com/article/techn...37672120080702





Court: La. Internet Predator Law Constitutional
AP

The Louisiana Supreme Court says police may pose as children and young teens on the Internet to hunt for sexual predators.

It reinstated charges against 52-year-old Ray Hatton Jr. of Lafayette and sent the case back to district court. State District Judge Wilford Carter threw out charges against in October, saying the law deprived him of his right to due process.

Hatton is accused of setting up a date for oral sex with someone he believed was a 14-year-old girl, but was actually an adult police officer.

The law allows a defense of consent if a juvenile is at least 16 years old. Carter ruled that letting police pose as younger juveniles denies people that defense.
http://www.shreveporttimes.com/apps/...EWS01/80702011





Bush Stimulates The Porn Industry With His Economic Package

When President Bush announced his economic stimulus in January, he bragged that his package was the “right size” and would “boost” the economy:

“I am pleased that this agreement meets the criterion that I set forth last week to provide an effective, robust, and temporary set of incentives that will boost our economy and encourage job creation. This package has the right set of policies and is the right size. The incentives in this package will lead to higher consumer spending and increased business investment this year.”

It sure has led to “higher consumer spending,” but not where Bush had probably hoped. The adult pornography industry reports that has seen a huge uptick in business thanks to Bush’s package. According to a press release from the Adult Internet Market Research Company:

Quote:
An independent market-research firm, AIMRCo (Adult Internet Market Research Company), has discovered that many websites focused on adult or erotic material have experienced an upswing in sales in the recent weeks since checks have appeared in millions of Americans’ mailboxes across the country.

According to Kirk Mishkin, Head Research Consultant for AIMRCo, “Many of the sites we surveyed have reported 20-30% growth in membership rates since mid-May when the checks were first sent out, and typically the summer is a slow period for this market.”
Jillian Fox of LSGmodels.com (nsfw) said that in a survey to its members, “thirty two percent of respondents referenced the recent stimulus package as part of their decision to either become a new member, or renew an existing membership.”

The Bush administration has attempted to wage an aggressive fight in the War on Porn. In fact, cracking down on “manufacturers and purveyors” of pornography was “one of the top priorities” of Alberto Gonzales while he was Attorney General, often coming before terrorism prosecutions.

Ironically, the porn industry is now thanking Bush for his policies. “Getting more people to buy porn was probably the last thing Bush had on his mind when he came up with his ’stimulus package,’ but we’ll take it,” said Fox.

Update
NPR reported this week that the Shady Lady Ranch in Nevada "is offering gas cards to lure people in, and the Moonlite Bunny Ranch has a deal called 'double your stimulus' for folks who bring in their federal tax rebate checks."
http://thinkprogress.org/2008/07/02/bush-porn/





Taiwan Establishes IPR Court
Thibault Worth

Taiwan's first IPR Court was inaugurated on July 1, marking the latest in a series of moves by the Taiwanese government to improve intellectual-property rights.

The court, which is modeled after similar courts in the United States, Japan and Germany, will have nine judges, each of whom has undergone four months of training on IPR and copyright-infringement issues.

Nine officials from the Taiwanese government's Intellectual Property Office have been assigned to the newly-established court to help judges keep track of the often complex patchwork of patents and trademarks involved in IPR litigation.

John Eastwood, a lawyer with Taipei legal firm Wenfei Attorneys-at-Law, says the court should help demystify this area of the law for the Taiwanese.

"Once the local confidence in handling IP cases is increased among judges, prosecutors and court staff, we are going to see a big improvement," he says.

However, Intellectual Property Office deputy director-general Margaret Chen says rights holders too often pursue criminal litigation against small-time infringers. She says music should develop licensing schemes that work in the local market instead of using the courts to compensate for their financial losses.

"If a rights holder can easily obtain disproportionate compensation via criminal procedures, why would he bother to set up workable commercial licensing scheme?" she asks.

But several influential groups, including IFPI and the American Chamber of Commerce in Taipei, commend Taiwan's efforts to improve IPR protections over the last few years. Sources say the Office of the United States Trade Representative could remove Taiwan from its "Special 301 Watch List" of IPR trouble spots by the end of the summer.
http://www.billboard.biz/bbbiz/conte...77d5cbfe3e2e0b





You're On Candid Camera

The Bush administration now wants to watch you from the sky.
Michael Isikoff and Mark Hosenball

A Bush administration program to expand domestic use of Pentagon spy satellites has aroused new concerns in Congress about possible civil-liberties abuses.

On Tuesday, the House Appropriations Committee approved an amendment denying money for the new domestic intelligence operation—cryptically named the "National Applications Office"—until the Homeland Security secretary certifies that any programs undertaken by the center will "comply with all existing laws, including all applicable privacy and civil liberties standards."

Rep. Jane Harman, a California Democrat who chairs the House Homeland Security Subcommittee on intelligence, told Newsweek that majorities in both the House and Senate intend to block all funding for the domestic intelligence center at least until August, when the Government Accountability Office, an investigative agency that works for Congress, completes a report examining civil-liberties and privacy issues related to the domestic use of picture-taking spy satellites.

Harman, who was the top Democrat on the House Intelligence Committee when Republicans controlled Congress earlier in Bush's tenure, said she still felt burned by the president's secret expansion of domestic electronic spying after 9/11. At the time, she and other intel committee leaders were assured that the increased intelligence activity was legal, only to learn later that the basis for the new surveillance was a set of opinions by administration lawyers that are now widely considered to be legally questionable.

Because of the administration's poor handling of the electronic spying program (mainly conducted by the super-secret National Security Agency, which operates a worldwide web of electronic eavesdropping systems), Harman says she and other members of Congress will be more cautious about accepting civil-liberties assurances from administration officials. "We have to make sure this is not a back door for spying on Americans," Harman told Newsweek.

Harman said that she had discussed the administration's plans for expanding domestic use of picture-taking spy satellites—which are supposedly capable of taking very high-resolution photographs of buildings, vehicles and people—with Homeland Security Secretary Michael Chertoff. According to Harman, he promised strict procedures to protect the rights of Americans, including obtaining court authorization for law enforcement-related surveillance operations where appropriate. Despite Chertoff's assurances, however, Harman said that Congress probably would not fully approve the program until the administration is more explicit about how it would operate.

A congressional aide familiar with the views of Senate Democrats said they share Harman's concerns. However, this aide, who asked for anonymity when discussing sensitive material, said that the administration is close to providing Capitol Hill with detailed new protocols for protecting civil rights and privacy when conducting such surveillance. A Homeland Security official said that the administration had hoped to begin full operations of the National Applications Office, which would be located at a secret facility somewhere in the Washington, D.C., area, in October. But Harman said that full congressional funding for the new center almost certainly would be held up until after the presidential election in November.

Earlier this week, the Federal Emergency Management Agency, which is supposed to manage federal disaster relief efforts, and the National Geospatial-Intelligence Agency, which directs the operations of picture-taking spy satellites and analyzes their output, issued a statement describing how they were currently working together to help out with flood-relief efforts in the Midwest.

According to the statement, NGA is "providing analysis, unclassified commercial imagery of flooded areas and geospatial intelligence products to FEMA and emergency responders in the affected areas to aid in rescue and recovery efforts." Intelligence experts note that commercial picture-taking satellites, such as one operated by a company called DigitalGlobe, already make available for public use satellite imagery with a resolution as fine as 18 inches—meaning, said one expert, that the satellite picture can zoom in on a single car.

Classified imaging satellites, operated at NGA's direction and built by a secretive Pentagon agency called the National Reconnaissance Office, can produce pictures of even greater clarity, though precise details are state secrets. An intelligence official confirmed that information from secret Pentagon satellites is currently being made available to agencies involved in flood-relief efforts. But to protect intelligence secrets, classified spy-satellite pictures are not being provided directly to flood-relief agencies, the official said. Instead, intelligence analysts are using pictures from secret satellites to make unclassified paper maps and to produce unclassified electronic data that can be used both by emergency services and ordinary homeowners. Some of the intelligence community's flood-relief data can be viewed on an NGA website.

The intelligence official said that domestic agencies, ranging from the FBI to the Agriculture Department, have for years been able to request spy-satellite data. Such information has been used in the past not only to help organize disaster responses (to events such as Hurricane Katrina), but also to help plan security for major public events, ranging from papal visits and presidential inaugurations to sporting championships such as the World Series and Super Bowl. The official said that before intelligence agencies can spy on individual households, they must first consult government lawyers to ensure such activities are legal.

Intelligence and law enforcement experts say that under present laws, criminal investigators or intelligence operatives would probably not need a warrant to conduct surveillance on buildings or suspects from street level—or from above, using a helicopter or airplane. Nor would they need express authority to use commercially available satellite pictures. On the other hand, in a 2001 opinion authored by conservative Justice Antonin Scalia, the U.S. Supreme Court ruled that investigators had inappropriately invaded the privacy of a marijuana grower when they used information collected by an external heat-sensing device to obtain a search warrant for the man's home.

An intelligence official could not specify whether the new domestic intelligence office would be required to obtain a warrant before conducting particularly close satellite surveillance. A spokesman for NGA said the agency would have no comment on the program. But Russ Knocke, a Homeland Security spokesman, told Newsweek that fears about the program are unfounded. "We've repeatedly met with Congress to answer questions about the NAO," he said. "As we have said, the purpose of the NAO is not to expand existing legal authorities. Rather, it will allow the government to better and more efficiently prioritize the use of scarce resources in support of major disasters, homeland security efforts and perhaps—in the future—law enforcement. We have also been clear that we would brief Congress before moving to support law enforcement. Efforts to further stall the NAO are misguided and keep us from making the best use of overhead imagery for a number of public safety and security missions."
http://www.newsweek.com/id/143257





FBI's Next-Gen ID Databank to Store Face Scans—A Good Idea?

Lockheed Martin is building a massive digital warehouse of criminal information, set to bring facial recognition and eye scans to local law enforcement within 10 years. The FBI may use biometric technology to bolster mug shots, fingerprints and DNA to catch crooks—but privacy advocates say there's reason for law-abiding citizens to worry.
Erik Sofge

Ten years ago, if a police department wanted to run a check on a suspect's fingerprints, someone had to mail an ink-splotched card to the FBI. The agency would then check it by hand against millions of other index cards, and it could take as long as two months for a match to return. Today, the FBI's Integrated Automated Fingerprint Identification System processes around 150,000 sets of prints per day and can respond to a request in as little as 15 minutes.

But a decade from now, fingerprints could be as quaint as the index cards on which they were once stored. The FBI's Next Generation Identification (NGI) system, which could cost as much as $1 billion over its 10-year life cycle, will create an unprecedented database of biometric markers, such as facial images and iris scans. For criminal investigators, NGI could be as useful as DNA some day—a distinctive scar or a lopsided jaw line could mean the difference between a cold case and closed one. And for privacy watchdogs, it's a duel threat—seen as a step toward a police state, and a gold mine of personal data waiting to be plundered by cybercriminals.

For now, NGI is barely more than a concept. Lockheed Martin was awarded a multiyear contract in February to develop the system, and the company is currently conducting a trade study to determine what sort of biometric technologies should be incorporated into it. Lockheed isn't building the various scanners that police will be using to collect data, but rather is determining which ones will be compatible. “The trade study we're doing is for the matching algorithm—the guts of NGI,” says Barbara Humpton, the company's project manager for NGI. “Lockheed does not build [data] capture devices or matching algorithms, per se. And capture devices are actually outside of the bounds of NGI. Those would be managed by individual agencies. NGI is about setting up a database and standards—the format for how things come into the system.”

NGI will involve some hardware, such as a massive amount of data storage for the various high-resolution images of faces or irises that could become part of the system. Like the FBI's current fingerprint system, NGI will be software-based, providing data to whichever agency or police department has the compatible biometric collection gear. Until Lockheed's trade study is finished, there's no telling which particular devices will be folded into the project. And neither Lockheed nor the FBI will discuss the anticipated amount of storage, or other hard numbers, such as how fast the system could return results.

The FBI has confirmed that, along with adding palm prints to its existing “ten-print” records, the bureau will have to expand its photo repository. “That could be the basis for our facial recognition,” says Thomas Bush, assistant director of the FBI's Criminal Justice Information Services Division. “And it's not a true biometric [marker], but scars and tattoos, we want to be able to search those nationwide.” Some of that information could come from prisons, where scar and tattoo databases have become increasingly common. But for accurate facial recognition, mug shots aren't the best source of data. Agencies would likely have to start taking photos of suspects from more angles, and at relatively high resolutions.

According to the FBI's Bush, some departments have already begun collecting iris scans, in anticipation of a searchable national or even local database. And Lockheed is hoping to leverage existing biometric technology (such as eye scanners that use patterns in the iris to provide identification and control access to some corporate facilities), as well as research being conducted by other organizations. “The Bureau doesn't really have any research dollars,” Bush says. “We hope to change that, and get some, but most of our efforts would be toward leveraging research from other agencies, the Department of Defense and the academic world. So we'll take advantage of what little dollars we have, and try to force multiply.”

Digital rights advocates such as the Electronic Privacy Information Center and the ACLU have said that the NGI technology is not far enough along to begin implementation, and that sharing vast amounts of biometric data could lead to inaccuracies. Lockheed and the FBI, however, do not claim that the system will harvest personal information from existing commercial biometric databases, or capture information without the subject's knowledge.

“We aren't going to start collecting irises from everyone and their brother,” Bush says. “We adhere to very strict privacy guidelines. We're taking more biometrics from the same people we were always authorized to take fingerprints from.” Any new images or scans will have to be collected by individual law enforcement agencies and then integrated into the NGI system. As for security concerns, the FBI says its fingerprint database has never been hacked. So while the addition of new kinds of data flowing between agencies—both in the United States and abroad, since the Bureau hopes to exchange data with other nations—could create new opportunities for hackers, there's little precedent for such breaches.

NGI could start producing results in 2010, which is when the FBI wants to have its improved print-scanning capabilities up and running. Other features will be added throughout the project's life span, and by 2018, the Bureau will presumably start working on the next generation of its steadily expanding identification database. In the meantime, biometric technology is exploding in the commercial sector, with students paying for lunch with a finger swipe and Japanese cellphones scanning their owners' eyes to initiate secure transactions. “People are beginning to accept that biometrics might be their best protection,” Humpton says. Of course, that depends which side of the law you're on.
http://www.popularmechanics.com/tech...w/4270770.html





Magazine Photos Fool Age-Verification Cameras

With the full-scale rollout of Japan’s cigarette vending machine age-verification system just around the corner, a Sankei Sports news reporter has confirmed the existence of a minor flaw: magazine photos can be used to fool the age-verification cameras on some machines.

When the reporter went to check out the new age-verifying machines after they were introduced in the Osaka area in June, he soon discovered that the machines equipped with face-recognition cameras would let him buy cigarettes when he held up a 15-centimeter (6-in) wide magazine photo of a man who looked to be in his 50s.

The reporter also went to Kobe, where different face recognition hardware is being used. There, he bought cigarettes using an 8-centimeter (3-in) wide magazine photo of a female celebrity in her 30s. He also reportedly tried to use a 3-centimeter (1-in) wide photo, but the machines rejected it.

As part of the age-verification system, most of Japan’s 570,000 cigarette vending machines are being outfitted with RFID readers that check the purchaser’s Taspo age-verification card. Smokers without a Taspo card can now either buy their cigarettes in person over the counter or use one of 4,000 special machines equipped with face-recognition systems (these machines do not require Taspo cards). More face-recognition machines are on the way, according to vending machine manufacturer Fujitaka, who developed the face-recognition hardware.

The face-recognition machines rely on cameras that scan the purchaser’s face for wrinkles, sagging skin and other signs of age. Facial characteristics are compared with a database of more than 100,000 people, and if the purchaser is thought to be well over 20 years old (the legal age), the sale is approved. If the purchaser looks too young, they are asked to prove their age by inserting a driver’s license. According to Fujitaka, the machines are 90% accurate.

Fujitaka admits that people may, on occasion, be able to fool the age-verification cameras with photographs — but only for the time being. The company is now working on a more advanced system that will make sure each face belongs to a real human, but they are unable to say when these new machines will be put into place.
http://www.pinktentacle.com/2008/06/...ation-cameras/





Deep Packet Inspection and Your Privacy Online
Ben Jones

The Internet is a world penitentially embroiled in a Cold War. Now, as then, an arms race between factions is constantly ongoing, each working to counter the efforts of the other. Into this race, comes deep packet inspection, a serious threat to online privacy.

When I say Cold War, it’s not just an a reference thrown up to thrown up to invoke emotion. Like the real Cold War, it is mainly fought by proxy, one side using a third party to score hits. However, unlike the Cold War, it is not a contest between two fairly equal forces. One side has money and power, and the will to use it. The other has sheer weight of numbers, but what seems like general apathy.

One of the new weapons in this conflict, is called ‘Deep Packet Inspection‘ (DPI). An innocuous sounding name for a technology that basically means ‘Internet monitoring’. Deep packet inspection is a technology that some companies are salivating over, including advertisers and entertainment lobby groups like the MPAA. With it, their dreams can come true, some of them anyway.

There are various uses for deep packet inspection, such as its use by intelligence agencies (It’s a wiretap for the Internet) to intercept email and other web traffic, like in Sweden. However, there are two more sinister usages being rolled out that are not so good for the everyday Internet user.

With the ability to see the contents of data packets, it’s no surprise that it’s a prime candidate for traffic shaping and throttling. With ISP’s increasingly overselling their capacity, they are starting to spend money not on infrastructure, but on DPI equipment, to throttle BitTorrent traffic for example. Until recently, the processing power required to inspect data packets has made this prohibitive, as it required massive computers, and significantly slowed down network traffic. Now, though, companies like Procera Networks are selling systems capable of DPI on 40Gbps of traffic, per system. Think Sandvine, without the telltale RST packets.

The MPAA loves the idea of DPI as well. It, like other groups, figure, that if people can see the contents of packets, that it can tell if those packets contain copyrighted data. Of course, they’re oblivious to the idea that their material can be used in a non-infringing way, and staunchly against fair use (and don’t forget, Fair Use Day is only a week or two away). If this becomes a popular view, though, we may see multi-part rar files in torrents growing in popularity again.

The other, arguably more sinister usage of DPI, is the growing interest by advertising companies to use deep packet inspection to observe what Internet users are doing. Watching your browsing activity, you can gain all kinds of insights into the user behind the keyboard. Similar to spyware, but on your line not your system, it’s not a good thing, and impossible to remove. Worse, it may be able to tell who is behind the keyboard at the time, by identifying trends in connection behavior. In the case of a p2p lawsuit, these DPI-based advertising companies may end up being called to testify who their systems believe to be behind the keyboard at the time of the allegations.

With British Telecom in the UK having experimented with DPI based advertising – without telling the subscribers about it – and with Charter in the US looking into trialling it (or as has just been announced - discouraged from it) it is a pressing concern. Fortunately, some people are not exhibiting the apathy mentioned above, and are doing something about it. Alex Hanff (you might remember his tangle with the MPAA) has been studiously working against the likes of Phorm, and indeed, we linked to his dissertation on it last time. He is holding a protest outside British Telecom’s AGM next month, to protest this rape of user’s privacy for commercial gain.

While the protest might be mainly against advertising based systems, it’s a worry for all net users, and needs to be dealt with by something other than apathy. At least one torrent site admin has told me he will be there and I may be there, but the more that attend, the better. So, users of the world, it’s time to start acting for what you believe in, and stop just moaning about it.
http://torrentfreak.com/deep-packet-inspection-080629/





Broadband Internet? No Thanks

A new study suggests that attitude rather than availability may be the key reason why more Americans don't have high-speed Internet access.

Thirty-five percent of those surveyed say they're still on dial-up because broadband prices are too high.

The findings from the Pew Internet and American Life Project challenge the argument that broadband providers need to more aggressively roll out supply to meet demand.

Only 14 percent of dial-up users say they're stuck with the older, slower connection technology because they can't get broadband in their neighborhoods, Pew reported Wednesday.

Thirty-five percent say they're still on dial-up because broadband prices are too high, while another 19 percent say nothing would persuade them to upgrade. The remainder have other reasons or do not know.

"That suggests that solving the supply problem where there are availability gaps is only going to go so far," said John Horrigan, the study's author. "It's going to have to be a process of getting people more engaged with information technology and demonstrating to people it's worth it for them to make the investment of time and money."

Nonetheless, the Pew study does support concerns that rural Americans have more trouble getting faster Internet connections, which bring greater opportunities to work from home or log into classes at distant universities.

Twenty-four percent of rural dial-up users say they would get broadband if it becomes available, compared with 11 percent for suburbanites and 3 percent for city dwellers.

Vint Cerf, one of the Internet's key inventors and an advocate for the idea that the government should be more active in expanding broadband, suspects that many more dial-up users would be interested in going high-speed if they had a better idea of what they're missing. He pointed out that broadband access is available from only one provider in many areas, keeping prices high and speeds low.

"Some residential users may not see a need for higher speeds because they don't know about or don't have ability to use high speeds," Cerf said. "My enthusiasm for video conferencing improved dramatically when all family members had MacBook Pros with built-in video cameras, for example."

Overall, Pew found that 55 percent of American adults now have broadband access at home, up from 47 percent a year earlier and 42 percent in March 2007. By contrast, only 10 percent of Americans now have dial-up access.

Despite the increase in overall broadband adoption, though, growth has been flat among blacks and poorer Americans.

Of the Americans with no Internet access at all, about a third say they have no interest in logging on, even at dial-up speeds. Nearly 20 percent of nonusers had access in the past but dropped it. Older and lower-income Americans are most likely to be offline.
Pew's telephone study of 2,251 U.S. adults, including 1,553 Internet users, was conducted April 8 to May 11 and has a margin of sampling error of plus or minus 2 percentage points. The error margins for subgroups are higher -- plus or minus 7 percentage points for the dial-up sample.
http://www.cnn.com/2008/TECH/ptech/0....ap/index.html





Where the Wild Things Are: Computer Science

Professor’s breakthrough maps the cool quest
David Poratta

Like a Doppler weather map with red blotches tracking the paths of major storms, a new tracking software service co-developed by Columbia University computer science professor Tony Jebara instantly shows people where the hottest clubs or hangouts are, in real time.

Jebara’s creation, Citysense, uses advanced machine learning techniques to number crunch vast amounts of data emanating from thousands of cell-phones, GPS-equipped cabs and other data devices to paint live pictures of where people are gathering. Fed to websites such as Google or Yelp, the data reveals what’s happening at any location. Translation: if you have a Blackberry, you have instant 411 on where the cool folks are. Or, are not. (An IPhone version is coming). The technology can also show if your favorite commute route is backed up and possibly offer alternative ones. Other applications abound.

“We are providing consumers with free applications on their mobile phones for visualizing several cities: ‘where is everyone?,’ ‘where should I go eat?,’ ‘which jazz bar would I like?,’ ‘where would I like to go shopping?’ and so on,” Jebara says.

Gaining access to the hottest locales with Citysense involves a trade off for users: information on their own whereabouts is also fed into the system. While all information gathered is anonymous, the data could be a goldmine for marketers and consumer researchers looking to enhance sales pitches, learn where people actually shop, or don’t, and tweak emerging retail trends as they evolve.

Citysense is now available in San Francisco, with Chicago next on the rollout, followed by five more cities.

The brainchild of Jebara and MITs’ Alex Pentland, Citysense is an extension of the firm’s (Sense Network) Macrosense system, a far more complex data-gathering and processing application. Incorporated in 2006, Sense Network recently raised some $3 million in private funding.

"Sense Networks is indexing the real world using location data for predictive analytics,” Jebara says. “We view location (from GPS phones, cars, etc.) as the new hope for understanding people's offline behavior: where are people going, what personality type or 'tribe' they belong to and what to recommend to them... in the real world.

“Machine learning tools developed at Columbia make this possible. There is no single equation describing human activity, but by computing statistics from millions of locations and flow between them, it becomes possible to find clusters, trends, explanations and predictive patterns.”
http://www.columbia.edu/cu/news/08/06/citysense.html





Group Suggests an Exchange to Trade Internet Capacity
Eric Pfanner

There are exchanges where you can buy and sell stocks, futures, pork bellies, wine and even pollution allowances.

Why not an exchange for the trading of digital bits and bytes?

“That is my dream,” said Hamadoun Touré, secretary general of the International Telecommunication Union, a United Nations agency based in Geneva that sets international communications standards.

The exchange would let telephone networks, mobile operators, satellite providers and other telecommunications companies trade capacity on their systems.

Network operators predicting bottlenecks could buy extra capacity, ensuring the smooth functioning of phone services, cellphone networks, the Internet and other communication links. Those with excess capacity could sell bandwidth, helping to limit that unprofitable downtime.

Applying a marketplace solution to the allocation of bandwidth, Mr. Touré said, could improve efficiency and reduce prices. That might help with one of his main goals, to bridge the digital divide in places like Africa, he added.

Mr. Touré, who mentioned the idea recently by telephone, is not the first person to think of such an exchange. Enron, the energy and trading company, briefly ran an electronic bandwidth exchange before the company was brought down by financial scandal in 2001.

Perhaps the notoriety of Enron explains why Mr. Touré and his aides quickly cautioned that the idea was nothing more than a dream for now and might never be created. Instead, Mr. Touré said, he was focusing on a more modest plan, one that could be a step toward an exchange: the creation of a real-time database detailing the flow of traffic on the world’s major communications networks.

Mr. Touré said the database could play an essential role in helping networks manage capacity and plan new investments at a time when telecommunications traffic is surging, and when some experts are warning that the growth of voice, data and particularly video traffic threatens to create traffic jams.

Nemertes Research, based in a suburb of Chicago, has predicted that over the next three to five years, Internet users in North America could experience “brownouts” unless telecommunications operators significantly step up their infrastructure investments.

“There are a lot of megabytes sitting in a lot of places that are underutilized,” Mr. Touré said. “It would be good to have a better knowledge of this.”

Mr. Touré said he had discussed this idea recently with telecommunications companies at an annual meeting organized by Intelsat, which operates communications satellites for use by media and telecommunications companies and governments.

At these gatherings, network operators already trade capacity: for instance, a European operator might agree to help with an anticipated spike in traffic to China or India. But for now, this happens without the structure of an exchange.

It was not clear whether network operators would want to participate in such a system. “It’s a little bit preliminary to talk about something like this at this point,” said Nicholas Mitsis, a spokesman for Intelsat.

Analysts said some telecommunications carriers might be reluctant to take part for fear of revealing sensitive information to competitors. Some might prefer to continue operating the way they do now, trading capacity as needed, usually with one counterparty, rather than making details about their networks available to all.

“The more granular they try to make this, the more difficult it would be to do it,” said John Delaney, an analyst at IDC, a research firm.

Mr. Touré said operators’ identities would be withheld to help prevent such problems.

If telecommunications providers can be persuaded, Mr. Delaney said, the database could play a useful role, helping network operators avoid the boom-bust investment cycles that have bedeviled them in the past. One of these contributed to the demise of Enron’s trading system, which suffered from a collapse in demand for trading after a multiyear investment spree by telecommunications companies left billions of dollars worth of fiber-optic networks unused.

“There is a mutual interest in getting capex to follow rather than lead demand,” Mr. Delaney said, referring to capital expenditures by operators.

The International Telecommunication Union, with the help of two software companies, Microsoft and IDV Solutions, has already created a more limited database called Global View, which tracks the spread of information and communications technologies in Africa, showing how different regions stack up in terms of mobile network coverage, broadband access and other communications benchmarks.

The telecommunications union wants to expand Global View to other continents, including Asia, Mr. Touré said. With better access to information, he said, companies will be more likely to invest in regions like Africa, where growth in mobile phone penetration has been rapid but where access to other communications technologies remains patchy.

“We’re making sure the industry is aware of the opportunities,” Mr. Touré said.

Global View could serve as a model for more ambitious plans, like the live database, he said.

“The world will benefit in knowing what traffic is going where and when,” he said. “The capacity problems are like the global food problem. It’s not because of a lack of food; it’s a lack of distribution of food.”
http://www.nytimes.com/2008/06/30/te...gy/30byte.html





Detecting SSH Tunnels
coderrr

Italian researchers have published a paper on the Detection of Encrypted Tunnels across Network Boundaries. I came across it in a google search because I’ve been thinking of writing a program which does something similar. It doesn’t seem like anyone else has picked up on this research yet so I thought I should mention it.

They claim their technique can differentiate between “normal” ssh or scp sessions and ssh sessions which are being used to tunnel traffic (through ssh’s port forwarding mechanism). This is accomplished through a naive Bayes classifier, which they first trained with “normal” ssh sessions. The two variables used to classify a session are the size of the packets and the difference in arrival time of two consecutive packets. With just these, they can classify with 99% accuracy whether an ssh session is a tunnel. They were also able to classify the actual protocol (P2P, POP, SMTP, HTTP) of the tunneled connection with close to 90% accuracy.

Although their research is quite interesting there are a few things which limit its practicality. They can only detect tunnels going through ssh servers which they control. This is because their detection mechanism can only handle a single authentication type whereas an ssh server can (and usually does) allow multiple (e.g. public-key or password). This requires admins of the server to limit the allowed authentication options to a single consistent choice. They also require the ssh server _and_ client to disable compression. Their technique will also falsely classify a second login attempt (after a failed login) as a tunnel and drop the connection. In their words: “However, this should not be a major problem: simply, if the user is entitled to connect, they will try again.”

So it seems the use of a tool like this would be limited to an extremely controlled environment where users are limited to a white-list set of network protocols (so that they can’t use a different tunneling mechanism, stunnel for example) and only allowed to ssh to servers under the control of the censoring party. In which case you would wonder why the admin wouldn’t just set the ssh servers’ AllowTcpForwarding option to false.

It sounds like this is just preliminary work so maybe their future research will solve all these problems. If perfected this technology could be used by ISPs to block or throttle even encrypted P2P traffic.

I’d also like to note that it would probably be easy to create a tunneling mechanism which thwarts their detection attempts. Knowing that they use packet size and inter packet intervals you could easily manipulate these to match whatever protocol type you wanted.

While looking around one of the researchers web pages (Franceso Gringoli) I found a pretty cool Linux/OSX utility called sshgate. It allows you to transparently tunnel all your connections over ssh. This is great for programs which do not give you the option to use a socks server and which do not play nice with socksification. I haven’t tested it out so I’m not sure if it actually works.
http://coderrr.wordpress.com/2008/06...g-ssh-tunnels/





Comcast Throttles BitTorrent Traffic, Seeding Impossible
Ernesto

Over the past weeks more and more Comcast users started to notice that their BitTorrent transfers were cut off. Most users report a significant decrease in download speeds, and even worse, they are unable to seed their downloads. A nightmare for people who want to keep up a positive ratio at private trackers and for the speed of BitTorrent transfers in general.

ISPs have been throttling BitTorrent traffic for almost two years now. Most ISPs simply limit the available bandwidth for BitTorrent traffic, but Comcast takes it one step further, and prevents their customers from seeding. And Comcast is not alone in this, Canadian ISPs Cogeco and Rogers use similar methods on a smaller scale.

Unfortunately, these more aggressive throttling methods can’t be circumvented by simply enabling encryption in your BitTorrent client. It is reported that Comcast is using an application from Sandvine to throttle BitTorrent traffic. Sandvine breaks every (seed) connection with new peers after a few seconds if it’s not a Comcast user. This makes it virtually impossible to seed a file, especially in small swarms without any Comcast users. Some users report that they can still connect to a few peers, but most of the Comcast customers see a significant drop in their upload speed.

The throttling works like this: A few seconds after you connect to someone in the swarm the Sandvine application sends a peer reset message (RST flag) and the upload immediately stops. Most vulnerable are users in a relatively small swarm where you only have a couple of peers you can upload the file to. Only seeding seems to be prevented, most users are able to upload to others while the download is still going, but once the download is finished, the upload speed drops to 0. Some users also report a significant drop in their download speeds, but this seems to be less widespread. Worse on private trackers, likely that this is because of the smaller swarm size

Although BitTorrent protocol encryption seems to work against most forms of traffic shaping, it doesn’t help in this specific case. Setting up a secure connection through VPN or over SSH seems to be the only solution. More info about how to setup BitTorrent over SSH can be found here.

Last year we had a discussion whether traffic shaping is good or bad, and ISPs made it pretty clear that they do not like P2P applications like BitTorrent. One of the ISPs that joined our discussions said: “The fact is, P2P is (from my point of view) a plague - a cancer, that will consume all the bandwidth that I can provide. It’s an insatiable appetite.”, and another one stated: “P2P applications can cripple a network, they’re like leaches. Just because you pay 49.99 for a 1.5-3.0mbps connection doesn’t mean your entitled to use whatever protocols you wish on your ISP’s network without them provisioning it to make the network experience good for all users involved.”

Customers on the other hand like to fully use their connection, and don’t agree that traffic shaping is the correct solution. One reader commented: “If you pay for an internet connection, that’s what you should get from your ISP — an internet connection. Not a connection that will let you browse the web and check email, but little else. If an ISP has issues with the amount of data a customer is transferring, then the ISP needs to address that issue with that customer, and not restrict every user in one class of traffic.”

I guess this battle will go on for a while and I would advise Comcast users to try setting up a VPN connection to get around the traffic shaping, other users who find out that they are throttles might try BitTorrent encryption first, that seems to work quite well in most cases.

More details about the Sandvine application can be found here.
http://torrentfreak.com/comcast-thro...ng-impossible/





Virgin Media: ‘Absolutely No Possibility’ of Disconnecting File-Sharers
enigmax

Virgin Media, plagued by a recent flurry of bad publicity thanks to its policy of working with the music industry to warn file-sharers, has announced today that there is “absolutely no possibility” that it will disconnect its users from the Internet or hand over their details to the music industry.

As the war of words over file-sharing in the UK heats up, the music industry represented by the BPI has been seeking ways to stop an estimated 6 million British citizens from sharing music. It has been pressurizing ISPs to take responsibility for the actions of their subscribers, and demanding that they disconnect those who share unauthorized music, something the ISPs don’t want to do.

To its credit, one ISP, Carphone Warehouse, has refused to comply. Others are working with the music industry and at the forefront of that group is Virgin Media.

Virgin has been receiving quite a lot of bad publicity recently after it was revealed that it agreed to work with the music industry to send out so-called ‘educational warnings‘ to its customers the BPI accuse of file-sharing. Virgin has sent out hundreds of these at the behest of the music industry and they have been dropping through mail boxes up and down the country. The letters come in an envelope and printed on the outside are the words: “Important: If you don’t read this, your broadband could be disconnected” so recipients could be forgiven for coming to the conclusion that, frankly, if they don’t read it, their broadband could be disconnected.

However, Virgin Media told has told Jim over at Newsbeat that the printing on the envelope was “a mistake” and there is “absolutely no possibility” of legal action or disconnection for any recipient of these letters. Nice to know.

Furthermore, Asam Ahmad from Virgin notes that they cannot be 100% sure that the person they send the letters to has actually committed any offense at all. “It is important to let our customers know that their accounts have been used in a certain way but we are happy to accept it may not be the account holder that’s involved.”

He goes on to highlight the problematic issue of incorrectly accusing someone due to a lack of solid evidence: “It could be someone else in the family or someone living in a shared house. It could even be someone stealing wi-fi. We are not making any form of accusation.”

Virgin Media has also stated that it will not hand over the personal details of anyone accused by the BPI “under any circumstances”. This is a good start by Virgin and all credit to them for taking this stance but the reality is that Virgin hands over its subscriber’s details in the blink of an eye when faced with a court order to do so. We know for a fact that they hand over the details of petty file-sharers to the likes of lawyers Davenport Lyons for the alleged sharing of one cheap game costing little more than a single album. However, the BPI has said in the past that it doesn’t want to start taking legal action against individuals.
http://torrentfreak.com/virgin-media...harers-080703/





Control on Internet Users Pushed with the New Telecom Package

An appeal from three European NGOs - La Quadrature du Net, netzpolitik.org and EDRi-member Open Rights Group - reveal some disturbing MEPs amendments to the draft directives to reform the EU framework on electronic communications (telecom package).

The review of the telecom package was merely focusing on telecom-related issues (except for discussions on the ePrivacy directive, which is the subject of another EDRi-gram article in the current issue), but some of the 800 amendments on the 5 directives that form the current package might go further than just establishing the rules for a functioning electronic communications market and could endanger the principle of the neutrality of the Internet.

Some amendments will transform the ISPs from technical intermediaries that have no obligation to prior surveillance of contents into law enforcers. Therefore they might be asked to block their users from lawful activities in the interests of their security or to work with content producers and rights-holders' organizations, including sending intimidating messages, with no judicial approval. The amendment meant to support Intellectual Property Rights owners could open the door to censorship and might mean in practice the loss on privacy on the Internet.

"The politicians who engage in these summer manoeuvres dishonour Europe and their mandate. They rely on the fact that nobody watches them few days before Parliamentary holiday, to divert the Telecom package from its primary objectives of consumer protection. They pave the way for the monitoring and filtering of the Internet by private companies, exceptional courts and Orwellian technical measures. It is inconceivable for freedom but also for European economic development. We call on all MEPs to oppose what they have already rejected." said Christophe Espern, co-founder of La Quadrature du Net (Squaring the Net).

The appeal of the three organisations comes just before the 7 July vote in the ITRE and IMCO Committees of the European Parliament on the suggested amendments to the telecom package. The plenary discussion and vote for the whole package will take place in September, but the vote in the two committees could have a significant impact on the final result.
http://www.edri.org/edrigram/number6...ckage-internet





Write to Your MEP: Say No to “3 Strikes” Through the Backdoor
Posted by Gavin

Could Europe be drafting a new law to disconnect suspected filesharers from the internet? MEPs have already signalled their condemnation of this approach. But last-minute amendments to telecommunications legislation could bring the so-called “3 strikes” approach in by the backdoor. If you want your MEP to stick to their guns on 3 strikes, write to them today to voice your concerns.

Back in February, we reported that the UK Government was considering a law to ban illicit filesharers from the ‘net. A promised consultation on proposed legislation is yet to materialise (although we’re still hoping it will appear before the Summer recess). Meanwhile, pressure on ISPs and rightsholders to come to a voluntary arrangement has had some effect, with both Virgin and BT recently starting to “educate” those customers they believe are infringing copyright in their use of p2p networks.

As we pointed out at the time, neither the voluntary nor the statutory approach will put a penny in artists’ pockets unless accompanied by viable legal alternatives that deliver consumers what they want. A recent survey commissioned by British Music Rights indicates that 80% of those currently downloading music would pay for so-called “legal p2p” - properly licensed and competitive filesharing alternatives. Rumours that industry is close to developing such an offer are yet to be confirmed. But without it, any enforcement move is likely only to drive illicit filesharing further underground.

Over in France, President Nicolas Sarkozy (who also took over the European presidency yesterday) has put his weight behind legislation proposed by the Olivennes report. The bill, which has been delayed until the Autumn, will mandate termination of internet connections. It goes without saying that it is the subject of much controversy across the Channel.

La Quadrature du Net - a French pressure group - have been actively campaigning on the issue. They’re also tracking the progress of the Telecoms Package, a review of European telecoms law currently in the European Parliament. Ordinarily this bill would deal with network infrastructure, universal service and other purely telecoms matters.

But as La Quadrature du Net announced yesterday:

“One week before a key vote in the reform of European law on electronic communications (”Telecom Package”), La Quadrature du Net (Squaring the Net) denounces a series of amendments aimed at closing the open architecture of the Internet for more control and surveillance of users..

…this set of amendments creates the unprecedented mechanism known as graduated response in European law; judicial authority and law courts are vacated in favour of private actors and “technical measures” of surveillance and filtering. According to rules set forth by administrative authorities and rights holders, intermediaries will be forced to cooperate in monitoring and filtering their subscribers, or they will be exposed to administrative sanctions”

If you want to voice your concerns about 3 strikes legislation brought in through the backdoor in Brussels, you have until 7 July, the date of the vote in IMCO and ITRE committees, to contact your MEP and inform them that the “Telecoms Package” amendments could bring in disproportionate and ineffective law.

You can find details of your MEPs here. Suggestions for topics to raise in your letters are here and analysis and commented amendments with other resources about the Telecoms Package are also available.
http://www.openrightsgroup.org/2008/...-the-backdoor/





Wireless Company to Allow Other Carriers' Devices
Peter Svensson

MetroPCS Communications Inc. has become the largest U.S. wireless carrier to say it will let customers bring cell phones from other carriers, which it will then reprogram for use on its own network.

This week's announcement by the Dallas-based regional carrier is one of a series of moves in the industry that amount to a gradual opening of the U.S. wireless market, giving consumers more choice over what phones to use on what networks.

Carriers generally sell phones that are locked to their own service. This protects their business model, which is based on subsidizing the cost of the phone by hundreds of dollars, then making that money back on monthly service fees.

MetroPCS's move threatens these traditional rules. It allows customers with certain models of phones from Sprint Nextel Corp., Verizon Wireless, Alltel Corp. and a few other carriers to bring their phones to MetroPCS stores, where they will be reprogrammed.

Phones from AT&T Inc., T-Mobile USA or other providers that use a technology known as Global System for Mobile, or GSM, won't work on MetroPCS's network. It is already possible to bring an unlocked GSM phone from, say, T-Mobile, and have it activated on AT&T's network, but AT&T won't unlock the phone for you.

A smaller carrier, Pocket Communications, reprograms phones for customers. Its network covers the San Antonio area.

MetroPCS's network covers 14 large cities, including Miami, Atlanta, Dallas, Detroit, Los Angeles, San Francisco and Las Vegas. It had 4.4 million subscribers at the end of March.

Its network uses the Code Division Multiple Access, or CDMA, technology. CDMA carriers maintain databases of the serial numbers carried by phones that they have sold, and except for Pocket and now MetroPCS, won't activate phones with other numbers. They generally say that they won't let any phones on to their networks without putting that model through rigorous testing. This applies even to phones that are functionally identical to their own, like the many slight variations of the Motorola Razr sold by different carriers.

Consumer groups have been fighting the locking of phones and exclusive agreements between manufacturers and carriers that, for instance, restrict Apple Inc.'s iPhone to AT&T Inc.'s network.

Apart from locking the phones, carriers protect their business model by signing customers to two-year contracts, and charging an early termination fee if they break it. MetroPCS's move does not change that fact, but major carriers have been reducing their early termination fees this year, prorating them depending on how long a contract has been in force.
http://news.yahoo.com/s/ap/20080627/...VI.IwAFBCs0NUE





Massachusetts is the Most Tech Savvy State, Again

Here in Silicon Valley, we pride ourselves in our tech-savviness, but it turns out Massachusetts is once again the top tech-savvy state in the nation beating out California, Texas, and New York. The Milken Institute's 2008 State Technology and Science Index looked at five major areas before compiling the list below, which included the state's ability to attract funding, skilled tech workers, and new businesses. Here is the list of the top ten most tech savvy states:

1) Massachusetts
2) Maryland
3) Colorado
4) California
5) Washington
6) Virginia
7) Connecticut
8) Utah
9) New Hampshire
10) Rhode Island

Massachusetts remains the "gold standard" for other states thanks to its institutions, cutting-edge firms, and ability to retain a skilled work force. Living up to its reputation, the state just passed a $1 billion life sciences bill to invest in high-tech infrastructure over the next 10 years, which puts it in the best position to achieve high economic growth from its technology assets, according to the Milken Institute study.

California, on the other hand, slipped from second place to fourth place, while Maryland jumped from fourth place to second place. Some of the reasons California is slipping, according to the report, is the state's faltering efforts to capture federal funding and failure to build a skilled work force.

On the bright side, a different report from AeA says New York, Washington, Silicon Valley, Boston, and Dallas currently have the highest number of high-tech jobs. New York leads the pack with a total of 316,500 high-tech jobs, and Silicon Valley with 225,300. There may be more high-tech jobs in New York, but high-tech workers there get paid an average of $91,451, while Silicon Valley tech workers average the highest pay at $144,800.
http://tech.yahoo.com/blogs/hughes/32599





Nuclear Explosions Could be Key to Spotting Fake Paintings
CBC News

A Russian curator says she's developed a foolproof method of determining whether a piece of art was made before or after 1945 as a way of sniffing out fake paintings.

Elena Basner told The Art Newspaper that she has developed a method in collaboration with Russian scientists based on the idea that man-made nuclear explosions from the 1940s to 1960s released isotopes into the environment.

These isotopes, Caesium-137 and Strontium-90, permeated the earth's oil and plant life and ended up in works of art made in the post-war era because natural oils, usually flax/linseed, were used as binding agents for paints.

"I wanted to find something ironclad … that couldn't be disputed, and this led me to approach scientists for ideas," said Basner.
More than 500 nuclear explosions since 1945

Basner, who now works as a consultant, says she developed the testing technique while working as curator of 20th-century art at the Russian Museum from 1978 to 2003.

"The number of avant-garde fakes out there today is unbelievable, probably more than the number of genuine works," says Basner.

She says she needed to authenticate Russian works dating from 1900 to 1930 and that's what led her and the scientists to examine the nuclear isotope idea.

The first nuclear explosion took place in July 1945 in the U.S. and from then until 1963 more than 500 were carried out by various countries.

Flax fields absorbed the isotopes from nuclear fallout, resulting in traces of the isotopes in natural oils used in paints.

At the very least works known to have been produced prior to 1945 can be authenticated because they won't have any traces of the two isotopes.
http://www.cbc.ca/arts/artdesign/sto...ings-fake.html





Firefox Users Most Secure on Internet, Study Reveals
Stefanie Hoffman

Mozilla Firefox fans might rest a little easier these days after a study released Tuesday revealed that its users are most secure on the Internet.

The study "Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg," was a collaborative effort conducted by researchers at The Swiss Federal Institute of Technology, Google and IBM (NYSE:IBM) Internet Security Services. The research offers a comprehensive analysis of Web browsers, particularly in the area of security. The study's aim was to analyze Web browser preference and behavior for people using the Internet.

Altogether, the study found that less than 60 percent (59.1) of people use up-to-date, fully patched Web browsers. Failure update browsers exponentially increases the chance for remote attacks executed by hackers, the study found.

In recent years, the Web has become the vehicle for malicious attacks, which have enabled cyber criminals to execute code that shuts down a system or takes complete control of a user's PC. Unlike years past, hackers now are creating new malware specifically to gain access to user's personal and financial information, with the aim of committing identity theft or selling it on the black market.

The study concluded that of the hundreds of millions of users accessing Web browsers worldwide, more than 600 million were at risk of attack for not running the latest, most secure Web browser version as of June 2008.

Firefox users were far and away the most likely to use the latest version, with an overwhelming 83.3 percent running an updated browser on any given day. However, despite Firefox's single click integrate auto-update functionality, 16.7 percent of Firefox users still continue access the Web with an outdated version of the browser, researchers said.

The study also revealed that the majority of Safari users (65.3) percent were likely to use the latest version of the browser between December 2007 and June 2008, after Safari version 3 became available.

Meanwhile, Microsoft (NSDQ:MSFT)'s Internet Explorer users ranked last in terms of safe browsing. Between January 2007 and June 2008, less than half of IE users -- 47.6 percent -- were running the most secure browser version during the same time period.

Opera ranked slightly higher than IE, with about 56 percent of users who said that they have applied the latest version of the browser to their computer. Of the four browsers surveyed, Opera ranked last in popularity, with a just 11 million users that comprise .8 percent of the marketshare.

Altogether, Safari has captured only 48 million users, equaling about 3.4 percent of the market -- a user base far surpassed by Firefox's 227 million and IE's 1.1 billion, encompassing 16.1 percent and 78.3 percent of the market respectively.

Researchers initiated the study to highlight the growing global problem of Web exploitation and the increasing number of users who log onto various Web browsers.

Among other things, the researchers aimed to address the growing number of threats launched by attackers in recent years that exploit Web vulnerabilities with stealthy and silent attacks for financial gain.

"Profit motivated cyber"criminals have rapidly adopted Web browser exploitation as a key vector for malware installation," researchers state. "As popularity of this attack vector has blossomed, there have been frequent reports of hundreds of thousands of Web sites succumbing to mass-defacement, where the defacement often consists of an embedded iFrame. These iFrames typically include content from servers hosting malicious JavaScript code designed to exploit vulnerabilities accessible through the user's Web browser and subsequently to initiate a drive-by malware download."

The researchers also stated that attacks have become so sophisticated that they are able to spread malicious code to numerous users by infecting "legitimate" high trafficked and popular Web sites, underscoring the need for users to apply the latest browser patches and updates when surfing the Internet.

Researchers also advised that in light of a more dangerous security landscape and the barrage of Trojans, botnets and other malware, users need to use the most recent version of the installed software and immediately apply the latest patches as they become available.

"With today's hostile Intent and drive-by download attack vectors, failure to apply patches promptly or missing them entirely is a recipe for disaster; exposing the host to infection and possibly subsequent data disclosure or loss," they said.
http://www.crn.com/security/208802248





Hacker Launches Botnet Attack via P2P Software
David Kravets

A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."

The defendant, Jason Michael Milmont, launched the assault last year from his Cheyenne, Wyoming residence, and anonymously controlled as many as 15,000 computers at a time, said Wesley L. Hsu, chief of the Cyber and Intellectual Property Crimes Section for federal prosecutors in Los Angeles. As part of the deal, in which a judge could hand him up to five years imprisonment, Milmont has agreed to pay $73,000 in restitution, the government said.

"It's the first time that we know of that peer-to-peer software was used as the infection point," Hsu said in an interview with Threat Level.

The malware infection became commonly known as the Nugache Worm, which embedded itself in the Windows OS.

According to the plea agreement, the worm was installed in various ways. The first incarnation of infections came from a website Milmont created that offered free installation of Limewire, the popular peer-to-peer file sharing program. He embedded that software downloads with his malware.

"Any time you download something from the internet, it's possible somebody has appended software to it that isn't supposed to be there," Hsu said.

Hsu said Milmont is expected soon to enter his plea to one count of unlawfully accessing computers in a Wyoming federal court. Milmont's attorney, Robert R. Rose, did not immediately respond for comment.

Another incarnation of the infection included using AOL instant messenger as the delivery point of his malware. The malware would spread itself via chats, with a message asking a buddy to view a photo on a website such as MySpace.com or Photobucket.com. The user would be taken to a spoofed website, and would become infected with the Nugache Worm, the plea deal said.

"All of the data stored on the compromised machines would be available to defendant, including, but not limited to, credit card information," according to the plea agreement.

The agreement also said that he took control of financial accounts of his victims.

"After obtaining this information from a victim's computer, defendant used his/her financial institution's online user name and password to access the account online," the agreement said. "Defendant then changed the victim's e-mail address to a similar e-mail that he controlled and the mailing address to an address in Cheyenne, Wyoming, typically an address that was listed for sale."

He would also change the telephone number on a victim's account to a number he controlled using Skype. "He paid for this service by using the credit card numbers harvested from his botnet," the plea agreement said.
http://blog.wired.com/27bstroke6/200...-launches.html





Textbook Piracy Grows Online, Prompting a Counterattack From Publishers
Jeffrey R. Young

College students are increasingly downloading illegal copies of textbooks online, employing the same file-trading technologies used to download music and movies. Feeling threatened, book publishers are stepping up efforts to stop the online piracy.

One Web site, called Textbook Torrents, promises more than 5,000 textbooks for download in PDF format, complete with the original textbook layout and full-color illustrations. Users must simply set up a free account and download a free software program that uses a popular peer-to-peer system called BitTorrent. Other textbook-download sites are even easier to use, offering digital books at the click of a mouse.

"There are very few scanned textbooks in circulation, and that's what we're here to change," says a welcome message on the Textbook Torrents site. "Chances are you have some textbooks sitting around, so pick up a scanner and start scanning it!"

In response to such sites, the Association of American Publishers hired an outside law firm this summer to scour the Web for illegally offered textbooks. Already the firm has identified thousands of instances of book piracy and has sent legal notices to Web sites hosting the files demanding that they be removed. The group is looking for all types of books, though trade books and textbooks, which generally have high price tags, are the most frequent books offered on peer-to-peer sites.

"In any given two-week period we found from 60,000 files all the way up to 250,000 files," said Edward McCoyd, director of digital policy for the publishing association. Mr. McCoyd, who leads the Online Piracy Working Group, said the group has been performing periodic scans for piracy since 2001, and that it has seen a gradual increase in the number of titles available.

"It is troubling that there is a culture of infringement out there," said Mr. McCoyd. But as more publishers offer books online and readers become more familiar with digital formats, he added, more people are likely to illegally download them.

No Action Against Students

So far the publishing group has not sought to take legal action against individual student downloaders, as the Recording Industry Association of America has done in its campaign to stamp out the illegal trading of music at colleges. The book-publishing group has not sought to shut down entire Web sites that offer downloads either, said Mr. McCoyd. Instead, officials are doing research on the extent of the problem and asking Web-site owners to remove individual files. "We've just tried to keep sweeping away these infringements as they continue to come online," he said.

Albert N. Greco. a professor of marketing at Fordham University's Graduate School of Business who studies academic publishing, said that publishers expressed even greater concerns in private about piracy than they did in their public comments. "We knew that this would happen, and it has happened very rapidly," he said. "It's not going to go away—it's only going to get worse."

Individual academic publishers have also taken steps to stop book pirates. Allan A. Ryan, director of intellectual property for Harvard Business Publishing, said that the press had assigned one employee to spend much of his time looking for unauthorized book copies online. He sends out about 100 takedown requests per week. "We have been fairly vigorous in monitoring these sites and in requesting that they take down our copyrighted content," he said.

One place their titles keep popping up is Scribd, a document-sharing Web site that opened this year. The site's policies do not allow users to post copyrighted content without permission, but some people break the rules. Jason M. Bentley, community-development director and copyright agent for Scribd, said the company quickly complies with requests from copyright holders to take down pirated books. Scribd often gets takedown requests from MIT Press, Oxford University Press, and Harvard University Press, he said. He noted that the company gets at least one takedown request each day.

The leaders of the Textbook Torrents Web site could not be reached for comment. But on the site's forums, where users list which books they would like to see uploaded, people list various reasons for seeking pirated books. "I really need this book for my report," said one anonymous user. "I looked for the Volume 2 in the bookstores around us, but it's out of stock."

Some users request the teacher's manuals for textbooks, and in some cases, the site lists those for trade as well.

Identifying Piracy

Peter Stearns, provost and professor of history at George Mason University, edited the sixth edition of The Encyclopedia of World History, which is listed on the site. He said he had never heard of Textbook Torrents, but he was aware that such sites existed.

"I don't feel deep anger," he said. "It probably has economic impact on me, but I can't say I feel desperate about this." He said the publisher, Houghton Mifflin, would probably be more concerned than he is because it has a greater financial stake in the book.

Which it is. "We think piracy is a significant problem and a growing problem for the textbook industry," said William A. Sampson, manager of infringement and antipiracy for Cengage Learning, which recently acquired Houghton Mifflin's college division. The company also hires an outside firm to hunt for instances of book piracy, and investigators find between 250 and 800 each month.

Mr. Greco, the scholar studying academic publishing, praised the publishers for taking action against online book pirates and for working to make digital copies of their books available for sale so that students who want such versions have a legal alternative. But he said that going after pirated copies one at a time will not stop the practice. "You close down three people, and four more open up—it's like roaches," he said.

He said that if the problem worsens, publishers may have to take other steps to prevent piracy, such as releasing a new version of most textbooks every semester. The versions could include slight modifications that could be changed easily—such as altering the numbers in math problems.

"They may compelled to," he said, "in order to stay one step ahead of the pirates."
http://chronicle.com/free/2008/07/3623n.htm





Coming Soon: Pirate TV Show
Ernesto

Jesse Alexander, the executive producer of the popular TV-shows ‘Heroes’ and ‘Lost’ and Matt Mason, author of ‘The Pirate’s Dilemma’, are working on a new TV-show about piracy. The show will be based on Matt’s book, and will show how important pirates are for today’s society.

Matt recently told us that he has been working on turning the book into a TV show with Jesse Alexander, the Executive Producer of the popular TV-shows Heroes and Lost. “It all happened a few months back when I was in LA talking to Disney, Matt told TorrentFreak, adding “We are trying to get this made into a 13-part TV show.”

The upcoming show aims to educate people about the history of piracy, and how it shapes our future. Pirates are innovators, they signal market problems and lead the way to new business models. Nevertheless, they are often tagged as thieves. In many cases, piracy is helping old businesses to innovate, and it helps to create new legitimate market spaces.

Here’s a teaser.

You can find Matt’s articles on TorrentFreak here. Also, his book “The Pirate’s Dilemma” is now available as a free download, if you don’t want to pirate a copy.
http://torrentfreak.com/coming-soon-...v-show-080629/





Google and Creator of ‘Family Guy’ Strike a Deal
Brooks Barnes

Google is experimenting with a new method of distributing original material on the Web, and some Hollywood film financiers are betting millions that the company will succeed.

In September, Seth MacFarlane, creator of “Family Guy” on television, will unveil a carefully guarded new project called “Seth MacFarlane’s Cavalcade of Cartoon Comedy.” Unlike “Family Guy,” which is broadcast on Fox, this animation series will appear exclusively on the Internet.

The innovative part involves the distribution plan. Google will syndicate the program using its AdSense advertising system to thousands of Web sites that are predetermined to be gathering spots for Mr. MacFarlane’s target audience, typically young men. Instead of placing a static ad on a Web page, Google will place a “Cavalcade” video clip.

Advertising will be incorporated into the clips in varying ways. In some cases, there will be “preroll” ads, which ask viewers to sit through a TV-style commercial before getting to the video. Some advertisers may opt for a banner to be placed at the bottom of the video clip or a simple “brought to you by” note at the beginning.

Mr. MacFarlane, who will receive a percentage of the ad revenue, has created a stable of new characters to star in the series, which will be served up in 50 two-minute episodes.

In an interview, he described the installments as “animated versions of the one-frame cartoons you might see in The New Yorker, only edgier.”

For a more substantial fee, Mr. MacFarlane has been working with advertisers to animate original commercials that will run with “Cavalcade.” Google and Mr. MacFarlane would not reveal any of the advertisers, but the two said that several deals are among the largest ever landed by AdSense, which went into business in 2003.

Google, which calls the distribution service the Google Content Network, until now has only dabbled in distributing original content. In May, it announced a deal with The Washington Post to distribute real estate listings from the newspaper’s Web site in a similar manner.

But the partnership with Mr. MacFarlane represents a bold step into the distribution business, one that, if successful, will surely send shock waves through the entertainment business. “Cavalcade” is not only from a high-profile Hollywood talent, but also carries a multimillion-dollar production price tag, by far the largest amount spent on original Internet content to date.

“We feel that we have recreated the mass media,” said Kim Malone Scott, director of sales and operations for AdSense.

Until now, budgets for original Webisodes have peaked in the low six figures because creators have not been able to figure out a business model that allows for higher spending. Either advertisers have not wanted to pay, or it has been too difficult to attract a large enough audience to support the cost of television or movie-quality work.

But Media Rights Capital, a boutique production company that has the ability to invest about $400 million a year in movies, television and Internet episodes, thinks it has figured out a sustainable business model with the Google Content Network. Every time someone clicks on one of the syndicated videos, the associated advertiser pays a fee, with shares going to Mr. MacFarlane, Media Rights, Google and the Web site that generated the click.

“We believe the revenue could be formidable,” said Karl Austen, a lawyer who worked on the deal. “What is exciting is that this is a way to monetize the Internet immediately. Instead of creating a Web site and hoping Seth’s fans find it, we are going to push the content to where people are already at.”

Media Rights sells the advertising inventory. Asif Satchu, the company’s co-chief executive, would not reveal how much advertisers were being asked to pay, except to say that it is “significantly higher” than if they were placing the same ad via AdSense.
Hollywood’s powerful Endeavor talent agency helped shepherd Mr. MacFarlane through the negotiations, which started during a recent gap in the animator’s contract with 20th Century Fox. Mr. MacFarlane said he wanted to take a stab at an original Internet program because he was feeling constrained by the “taste police,” a k a the Federal Communications Commission.

Sitting in his office wearing jeans and a white T-shirt, Mr. MacFarlane described feeling stifled as a comedian by an F.C.C. crackdown in recent years on what it views as unsuitable language and situations on television. Mr. MacFarlane said he believed that the public’s appetite for raunchy humor and coarse language was only expanding and that television networks like Fox were having a harder time capturing viewers in part because they had to tread carefully or risk fines.

“I just felt I could be a lot more honest on the Internet,” he said.

Mr. MacFarlane started the project on the assumption that he would do 20-minute television episodes and break them into segments to dole out online.

“But that seemed a little odd and a little pointless,” he said. “Why wouldn’t you just release the whole thing at once?”

Google executives also provided him with stacks of data showing how people interact with Web video, including how long the average user will watch before clicking on something new. That prompted Mr. MacFarlane to scrap his original project and rebuild the idea from the ground up.

Each installment is different, but a typical one is titled “Mad Cow Disease.” The clip, which is 38 seconds long, opens with a news anchor reporting on an outbreak of mad cow disease in a dry fashion, detailing the debilitating effects of eating tainted beef. The clip cuts to a shocked male and female cow seated in a tidy kitchen with giant steaks on their plates.

For Mr. MacFarlane, 34, the venture is more than just adding to his already sizable fortune. (His new multiyear contract with Fox, signed this spring, is valued at nine figures.) One goal is to use the venture as a testing ground for new material and a way to ignite attention. At the very least, “Cavalcade” will become a DVD, but the hope is that part of the series will click with audiences and perhaps lead to television or even animated movie projects.

Indeed, in a watch-what-you-want, when-you-want world, the standard processes of rolling out new television programs are breaking down. Even a decade ago, putting a new show on a network schedule would assure that it would be exposed to most of the country; people would either respond or they wouldn’t. Today, with television ratings in particular dwindling, creators like Mr. MacFarlane have to find new ways to introduce new material.

Nobody knows how content can catch fire in unexpected ways more than Mr. MacFarlane. In 2002, “Family Guy” was canceled for poor ratings after running for three seasons. But the irreverent series continued to make new fans through DVD sales. In 2005, Fox reversed itself, citing strong DVD sales, and “Family Guy” has gone on to be one of the biggest comedy hits on television.
http://www.nytimes.com/2008/06/30/bu.../30google.html





A Movie on Your TV at Home, Before You Can Rent It
Tim Arango

The very future of how we consume media rests on the movie star shoulders of Will Smith. That is Hollywood hyperbole — but it contains a speck of truth.

In an industry first, Sony Pictures’ hoped-for blockbuster “Hancock,” starring Mr. Smith as a bungling superhero, hits theaters on Wednesday and will be available — after its theater run but before release on DVD — over the Internet, directly to viewers’ television sets. That is, if they own a Sony Bravia TV with a Web connection.

The announcement is significant in what it means for the future of movie watching, and for the future of Sony itself.

On Thursday in Tokyo, Howard Stringer, the chief executive of Sony, mentioned the “Hancock” experiment as he ticked off the company’s growth strategy for a roomful of analysts. In doing so, Mr. Stringer provided the movie-watching public with a rudimentary glimpse of the future: movies streamed over the Internet directly to televisions, bypassing the longtime purveyors of content to the living room, cable and satellite companies.

His presentation also provided a vivid example of how the vision of Sony’s founder, Akio Morita, of content and hardware co-mingling in profitable ways is possible, despite many past failures.

“In some ways, it vanishes the memory of the failures of the Sony Walkman,” Mr. Stringer said in a telephone interview on Thursday.

Since he ascended to his job in 2005, Mr. Stringer has focused on bringing together Sony’s disparate business units. “This is something that would have been unheard of five to six years ago,” he said of cooperation by Sony’s movie studio and its electronics division on “Hancock.”

Sony lost a first battle to Apple and its iPod in the drive to create a digital music device for the masses, despite the predigital age dominance of the Walkman and Sony’s ownership of one of the largest music companies in the world.

With its Internet-connected televisions and content from its Hollywood studio, Sony is aiming to avenge its loss to Apple in music by being a dominant player in home entertainment of the future. (Apple, incidentally, also has designs on home entertainment with its Apple TV device.)“One of the most interesting things about this is putting the television front and center in the living room,” Mr. Stringer said, as opposed to having a computer or a hand-held device as the center for watching streamed video.

Robert S. Wiesenthal, who is executive vice president and chief financial officer for the Sony Corporation of America and oversees corporate development for Sony, put it this way: “The Internet is not only a great place to reach Web sites, but it’s also a great way to deliver conventional content. And at the end of the day, it’s about getting entertainment back into the living room.”

Now, consumers can download movies to their computers — an often cumbersome process but one that should improve as broadband speeds increase — and to Sony PlayStations; the “Hancock” deal with televisions is a starting point to a future in which these all work together seamlessly in a home entertainment network.

“Ultimately, when all these devices are connected, you’ll be able to quite easily manage how you watch movies,” Mr. Stringer said.

Sony executives are adamant that the “Hancock” experiment is just that — an experiment that is as much about showcasing the potential of Sony’s Internet-enabled Bravia television sets as it is about the future possibilities of movie watching. It is not, they said, a push to change Hollywood’s carefully calibrated windows for the various outlets in which a film is released: theater, DVD and pay television.

In November, after “Hancock” has had its run in theaters, it will be available for a fee with the click of a remote control for consumers who own Internet-equipped Sony Bravia televisions. The Bravia Internet link adds $299 to the cost of the television.
In a research note last week, a Pali research analyst, Richard Greenfield, wrote, “While the content offered is only from Sony today, we expect other studios to follow if consumer interest becomes apparent.”

The experiment with “Hancock” suggests an obvious threat to the cable industry’s offerings, such as video on demand. But cable companies, far from blind to the possibility of other media companies’ leapfrogging them and serving consumers directly, are working on their own devices that will allow Internet video to be streamed to televisions.

In May, for instance, Glenn A. Britt, the chief executive of Time Warner Cable, said at an industry conference that his company was close to offering equipment that would allow consumers to receive Web content on their televisions through cable boxes.

The cable industry still has plenty of growth from its on-demand and cable services, said D’Arcy F. Rudnay, senior vice president for Comcast.

“Comcast and much of the cable industry began providing movies and TV programming on demand years ago, because consumers want to watch movies and TV programming when and where they want it,” she said.

And Michael Lynton, the chairman of Sony Pictures, assured the studio’s distribution and retail partners — cable companies like Comcast and Wal-Mart, which wants to protect its dominance over home entertainment in the DVD format — that they need not fear the experiment.

“More than anything else, what this demonstrates is how the electronics company and the movie studio are working together in the ways they were meant to,” Mr. Lynton said.

Sony recently came out the winner of Hollywood’s war over the format for high-definition DVD, as its Blu-ray became the standard. Studios have long relied on DVD sales as an important profit engine, and the sale of Blu-ray discs is still an early, unproven business. So the challenge every studio faces is how to be innovative without killing off existing businesses, and for Hollywood that means DVD sales.

“I think you have to chalk everything studios are doing right now with digital delivery to be experimentation,” said Stephen Prough, a founder of Salem Partners, a Los Angeles-based investment bank with a focus on entertainment. “No one knows what the business model will be.

“You do have to start with the premise that studios make the most money in the DVD window. And if they get enhanced pricing with Blu-ray, they will make even more money.”

Mr. Stringer said that Sony is careful to evaluate whether the digital delivery of content will have an impact on DVD sales.

“We don’t do anything without understanding the consequences for that,” Mr. Stringer said. “We don’t want to do anything to hinder Blu-ray.”

But controlling the march of technology has often proved elusive for media executives. (See: music industry, 1999 to present.)

“Mostly,” Mr. Stringer said, “this is us saying we want to be ahead of the curve rather than behind the curve.”
http://www.nytimes.com/2008/06/30/te...gy/30sony.html





The Internet is the New Sweatshop
N’Gai Croal

When an executive wants to sound humane during a public address to the staff, he or she will trot out the well-worn phrase, "Our most valuable assets leave the building at the end of the day." Clichés are generally true, but this one may not be, thanks to the growth of user-generated content on the Internet. Whether they're creating content for sites like YouTube and Wikipedia, viewer-submitted news services like CNN's iReport or videogames like Spore and LittleBigPlanet, today's most valuable employees will most likely never set foot inside the building—or collect a paycheck. They may be teenagers posting videos of themselves dancing like Soulja Boy, programmers messing around with Twitter's tools to create cool new applications or aspiring game developers who want to create the next big thing. But what they all have in common is a somewhat surprising willingness to work for little more than peer recognition and a long shot at 15 seconds of fame.

Yet is it really a sweatshop if none of the workers is complaining? They're certainly not complaining about Spore—unless it's about how long it's taken videogame creator Will Wright and his team to complete the universe-simulation game, which finally ships in September. Two weeks ago, Wright's employers at Electronic Arts released Spore's Creature Creator as a prelaunch promotion; seven days later, more than 1 million creatures had been created by users and uploaded to the "Sporepedia" for others to enjoy. "We wanted to give the players high diversity, as well as a huge universe to explore," Wright says. "The only way we could possibly achieve this was to, in essence, 'outsource' the majority of our content production to the players." Similarly, Sony's struggling Playstation 3 console is expected to get a boost later this year with the release of LittleBigPlanet, which lets users create their own games using a powerful but playful set of tools. "YouTube doesn't help you to make a video—it just provides a means of distribution," says LittleBigPlanet technical director Alex Evans. "Our particular take on user-generated content focuses on making the act of creation fun."

Whether these 21st-century worker bees can be said to be having fun (is it really entertaining to update a Wikipedia entry?), there's no question that their moonlighting has value even if they're not being compensated. A YouTube spokesperson informed us that 10 hours of video are uploaded to the service every minute, which she says is the equivalent of 57,000 full-length movies every week. The comedy site FunnyOrDie may have broken into the national consciousness with Will Ferrell's hilarious video "The Landlord," but it's the cumulative efforts of all the John Q. Comics that will determine the start-up's future prospects. We asked FunnyOrDie CEO Dick Glover to calculate what his site's estimated 10,000 hours of video would cost if professionally produced; at the "inexpensive" industry rate of $400,000 per half hour, it comes out to $8 billion.

Glover quickly points out that this number is somewhat meaningless because of the vast difference in production values between an Internet short and a low-end Hollywood shoot. Still, it shows the kind of scale he and his colleagues have been able to achieve in a little more than a year. Now, there are some enterprises built around user-generated content that do provide compensation to those whose work is published, like the $100 and yearlong subscriptions offered by the magazines JPG (photography) and Everywhere (travel). But as long as so many of you are willing to work for free, the proprietors of these virtual sweatshops will happily accept
http://www.newsweek.com/id/143740





Don’t Forget the Middle People
Brooks Barnes

From his break in 1992 playing Bank Nerd No. 2 in the sitcom “Married With Children,” to his supporting role on the HBO hit “Six Feet Under,” to a part in last year’s “Spider-Man 3,” Tim Maculan has navigated Hollywood more successfully than most actors.

Lately, though, Mr. Maculan, 45, says the actor’s place in the entertainment industry’s economic food chain has changed. And for middle-income working actors like him, it’s not for the better. “It’s not about networks being cheap or evil,” Mr. Maculan said. “It’s just that the industry is dramatically different than it was even five years ago.”

Mr. Maculan, a sarcastic character actor with a wicked grin, rattles off a list of industry shifts that have made it harder for middle-income actors to earn a living. Reality shows have crowded out scripted programs, comedies in particular. The studios are making fewer movies, and the ones they are making are less actor-driven. Networks like NBC have virtually stopped filming pilot episodes, meaning they are hiring fewer actors. Voice-over work, once a staple for less-known actors, is outsourced to other countries or given to A-list stars.

The Screen Actors Guild, now embroiled in negotiations with film and television producers over a new contract, has made the plight of the middle-income actor the centerpiece of its campaign for more lucrative terms. The guild is seeking increases for everything from reimbursement rates for car mileage to continuing payments called residuals. Guild leaders say the economic situation is so severe that they have no choice but to take a militant stance at the negotiating table.

The guild’s contract, which covers about 122,000 actor members, expires at midnight Monday. Because the two sides remain far apart on most issues, Hollywood has been on edge about a strike, taking care, for instance, to wrap production on films so costly location shoots are not drawn out.

But no strike can take place until about Aug. 1 at the earliest. Guild leaders have yet to call for a strike authorization vote, which must be put before the entire membership and approved by 75 percent of voters. Carrie White, a spokeswoman for the Screen Actors Guild, said on Friday that the process would take up to three weeks.

The guild has strongly indicated that it will not consider calling for a strike vote until July 8, when a second actors’ union, the American Federation of Television and Radio Artists, releases the results of a ratification vote on its new contract. That union reached an accord with studios and networks in May and shares about 44,000 members with the Screen Actors Guild.

“Any talk about a strike or a management lockout at this point is simply a distraction,” Alan Rosenberg, the president of the guild, said in a statement Sunday. He added that guild negotiators have been “coming to the bargaining table every day in good faith.”

The two unions have been sparring in recent weeks, with each side lining up marquee stars to push its own agenda.

Aftra, the smaller of the two, wants members to ratify its deal and move on; SAG thinks the rival union negotiated a bad deal, particularly on issues of digital media, and wants to keep fighting for a better one. It worries that its leverage at the bargaining table will evaporate if Aftra members approve their contract by a solid margin.

Like most Hollywood labor organizations, SAG bears little resemblance to unions as most Americans know them.

Most unions represent workers with wallets of similar size, but SAG is a hodgepodge of wildly varying careers. On one extreme, SAG represents stars like Will Smith, who will take home well over $20 million from his coming film “Hancock” once all the receipts are counted. The bulk of its members, about two-thirds, according to some estimates, make less than $1,000 a year from acting, either because they can find no work or because they have moved on to other careers but kept up their dues.

SAG said the average annual income for its membership was $52,000 a year. The guild said it could provide no other economic statistics about its membership, however.

The Alliance of Motion Picture and Television Producers, the organization that negotiates on behalf of studios, said its analysis of SAG membership showed that fewer than 4,000 of its members could be considered middle-income actors, that is, people making $25,000 to $100,000 from acting in a given year. Only 5 percent of SAG’s membership earns more than $75,000 a year, according to the alliance.

The alliance rejects the notion that a richer contract is necessary to offset changes in the industry that make life harder for actors. Cast costs rose at more than twice the rate of overall production costs between the 2000-1 television season and the 2007-8 season, according to alliance statistics. Total cast costs for television rose 78.4 percent during that period, compared with a 33.6 percent increase in overall production costs.

“Making a living as an actor is ultimately a function of how often someone works, and that can’t be guaranteed by the minimum terms that are set by the SAG contract,” said Jesse Hiestand, an alliance spokesman. “Our offer to SAG contains a number of increases that will benefit actors that do work, especially guest stars.”

He added, “SAG’s negotiators should be working with us to keep scripted TV and the film business healthy so that it generates more work for their members.”

Sharon Sachs, an actress who has worked on hit shows like “Weeds” and “My Name Is Earl,” is all for keeping the business robust, but she believes there has been a shift in what studios consider healthy. Industry consolidation over the last decade has resulted in a more corporate Hollywood, one that Ms. Sachs and other actors complain puts a higher emphasis on immediate profit margins than on the industry’s long-term health.

“Before, the achievements you made artistically and financially were taken into consideration” when studios offered roles, Ms. Sachs said. “Now, it’s much more ‘take it or leave it.’ The business doesn’t flow on relationships like it used to.”
http://www.nytimes.com/2008/06/30/bu...rike.html?8dpc





Size didn’t matter

Judge Halts Release of Verne Troyer Sex Tape
AP

Verne Troyer successfully shut down the distribution of a sex tape featuring the "Austin Powers" actor and a former girlfriend _ for now.

The celebrity Web site TMZ posted a 25-second snipped of the video Wednesday, but pulled the clips down Friday evening after a federal judge granted a temporary restraining order requested by Troyer's attorneys.

The ruling also prevents any attempt by a porn distributor from taking orders for the full 50-minute video, and keeps TMZ from broadcasting any more clips. Troyer's lawsuit also seeks $20 million in damages and the return of all copies of the tape.

U.S. District Judge Philip Gutierrez wrote that Troyer's motion "demonstrated that he will suffer irreparable harm to his reputation" if the tape is distributed.

Troyer's attorney, Tracy Rane, said she, Troyer and others are "very pleased" by Gutierrez's ruling.

"Mr. Troyer is extremely distraught by the recent exploitation of his private life," Troyer's publicist, Melissa Bergera, wrote in a statement released to the AP.

TMZ did not return calls seeking comment on the case Friday. Although the video excerpt showing Troyer kissing his then-girlfriend was removed, another post describing the actor's lawsuit remained active.

Troyer, most famous for his role as "Mini Me" in two of the "Austin Powers" movies, claims the sex tape he made with a former girlfriend, which he never intended to become public, was stolen from his home some months ago.

TMZ reported that the video could fetch $100,000 from a porn distributor. SugarDVD wrote in a statement on its Web site that hoped to reach a deal with Troyer to distribute the full, 50-minute version. That statement was also removed by late Friday afternoon.

Kevin Blatt, a producer who promoted a sex tape featuring Paris Hilton, is also named as a defendant. Reached on his cell phone Friday, Blatt said he had not been served with the lawsuit yet, but called it "baseless."

Blatt said he never had the tape and only helped try to broker a deal.

The judge also indicated he may issue a more binding preliminary injunction in the case unless TMZ and other parties demonstrate why it should be released. His temporary order expires July 7.

Troyer is only the latest celebrity whose sex tape surfaced without consent, a phenomenon that began with the release of the infamous Pamela Anderson-Tommy Lee honeymoon video. Since then, several others have surfaced, including Hilton, Colin Farrell, and rapper Ray-J with Kim Kardashian _ the daughter of a prominent attorney who parlayed at least some of her newfound notoriety into reality-star status.

In Anderson and Lee's case, the couple actually agreed to have the tape distributed, which resulted in a federal judge tossing out their lawsuit after the video was widely distributed on the Internet, in adult video stores, and even in hotel rooms.

Legal experts differed on Troyer's chances of long-term success keeping the video under wraps.

"I think distributing the tape is going to be very problematic," said Jack Lerner, a professor at the University of Southern California's Gould School of Law.

"Any time you record something that has even a very small bit of original expression in it, that's going to be copyrighted," he said, noting that a videotape would apply.

David Gringas, a Phoenix attorney who specializes in Internet, intellectual property and First Amendment issues, wrote in an e-mail that the fact that Troyer hadn't yet applied for copyright protection could harm his case.

Troyer's suit states he intends to register the tape's copyright.

Gringas wrote that courts generally try to protect celebrities from "any conduct that's really offensive," but are also aware that the release of some tapes actually benefits the celebrity.

"However, when a private tape is truly stolen from the owner, most times courts will do all they can to protect the rights of the celebrity to control their name or image," Gringas wrote.

Both Lerner and Gringas said they doubted injunctions against TMZ would remain, since the site may argue it was simply reporting the news.

If past cases are any indication, Troyer's legal battle could be extremely swift or protracted: Anderson and Lee spent two years battling distributors over their sex tape; Kardashian's lawsuit was settled less than three months later for undisclosed terms.
http://www.washingtonpost.com/wp-dyn...062702613.html





EMI Sues Hi5, VideoEgg Over User-Uploaded Videos
Jennifer Guevin

Some people might be embarrassed if their friends found an old copy of Mr. Big's "To be with you" or Paula Abdul's "Cold hearted (snake)" stashed away in their CD collection. But not EMI. They own those songs, and they want the world to know it.

The music giant is suing social-networking site Hi5, video advertising start-up VideoEgg, and 10 unnamed defendants for allegedly infringing on the copyrights of those and hundreds of other pop throwbacks.

The lawsuit alleges that Hi5 users have uploaded and disseminated hundreds of music videos the company owns rights to. VideoEgg is on the hook because it's a former partner of Hi5, and those allegedly infringing videos were uploaded to its servers. (On May 31, VideoEgg stopped hosting videos uploaded by the public and refocused efforts on its ad network, prompting rumors that the company was on its way out.) The lawsuit doesn't say much of anything about who the 10 John Does are.

The companies had attempted to work out some kind of deal for more than a year, a source told TechCrunch, but those efforts eventually failed.
http://news.cnet.com/8301-10784_3-9979922-7.html





TV Viewers' Average Age Hits 50

Study: Median age outside the 18-49 demo
Michael Schneider

The broadcast networks have grown older than ever -- if they were a person, they wouldn't even be a part of TV's target demo anymore.

According to a study released by Magna Global's Steve Sternberg, the five broadcast nets' average live median age (in other words, not including delayed DVR viewing) was 50 last season. That's the oldest ever since Sternberg started analyzing median age more than a decade ago -- and the first time the nets' median age was outside of the vaunted 18-49 demo.

Fueling the graying of the networks: the rapid aging of ABC, NBC and Fox. The three nets continue to grow older, while CBS -- the oldest-skewing network -- has remained fairly steady.

"The median ages of the broadcast networks keep rising, as traditional television is no longer necessarily the first screen for the younger set," Sternberg wrote.

For the just-completed 2007-08 TV season, CBS was oldest in live viewing with a median age of 54. ABC clocked in at 50, followed by NBC (49), Fox (44), CW (34) and Univision (34).

When live-plus-7 DVR viewing is factored in, the nets (except CW and Univision) drop by a year -- which still reps the oldest median age ever for the nets.

Sternberg notes that Fox and CW maintain median ages that are closer to the actual age of the population. The median age for U.S. households is 38.

Among ad-supported cable nets, the news nets (along with older-skewing Hallmark Channel, Golf Channel and GSN's daytime sked) sport the most gray, with Fox News Channel's daytime and primetime skeds the absolute oldest, clocking in with a median age above 65. Youngest nets are the daytime skeds for Noggin and Nickelodeon, with a median age under 10.

At ABC, youngest series was "Supernanny" (with a median age of 41), while oldest was "Women's Murder Club" (57). At CBS, youngest was "How I Met Your Mother," "Kid Nation" and the Tuesday edition of "Big Brother," tied at 45; oldest was "60 Minutes" (60). NBC's youngest show was "Scrubs" (34), and oldest was "Monk" (58).

At Fox, the youngest shows were "American Dad" and "Family Guy" (29), while the oldest was "Canterbury's Law" (55). At CW, "One Tree Hill" was youngest (26), while "Life Is Wild" was oldest (45).

Among latenight gabbers, "Tonight Show With Jay Leno" is oldest, with a median age of 54, followed by "Late Show With David Letterman" at 53. Interestingly, "Nightline" -- which should conceivably be older than those talkers, is younger, at 52. ABC's "Jimmy Kimmel Live," meanwhile, passed the 18-49 threshold for the first time, clocking in with a median of 50. "Late Night With Conan O'Brien" is getting closer at 46.
http://www.variety.com/VR1117988273.html





This Film Will Be Back, Strike or No Strike
Michael Cieply

The scorched earth and post-apocalyptic wreckage on a hillside just south of here carry a message for those who think the film industry has been closed down by the stalled negotiations between actors and producers: Hollywood will not give up next year’s pictures without a fight.

For all the talk of a de facto strike — a shutdown caused by studio reluctance to schedule production beyond the expiration at midnight on Monday of a contract with the Screen Actors Guild — a number of high-profile projects are simply pushing ahead.

None have done so more boldly than “Terminator Salvation.” This huge production has tantalized Albuquerque with glimpses of weird military hardware, a blast site marked by the shards of a 7-Eleven sign, and a lot full of battered helicopters, even while establishing this desert city as a manufacturing center for big-budget films.

As of Tuesday, actors’ guild leaders were reviewing a contract proposal that the Alliance of Motion Picture and Television Producers, which represents production companies, says is its “final” offer. (The producers and guild leaders were scheduled to go over the proposal’s details at a meeting on Wednesday.)

The guild has taken no strike vote. It was widely expected to delay that step until it learned the outcome of a vote by the American Federation of Television and Radio Artists, another actors’ union with overlapping membership, on a tentative agreement with terms that guild leaders have called inadequate. The vote results are expected to be released next week.

Set for release by Warner Brothers next Memorial Day weekend, the fourth installment in the “Terminator” series, this one directed by McG, began shooting in May. Principal photography is not set to wrap until well into August.

The movie’s cast, including the lead, Christian Bale, would be pulled off the set if actors chose to strike. (Arnold Schwarzenegger is not starring.) That would leave its independent producers — including the Halcyon Company and Intermedia Films — with half a movie and a tangled mess of equipment, sound stages, locations and crew members on hold.

Yet “Terminator Salvation,” like the “Da Vinci Code” sequel “Angels & Demons” from Sony Pictures and “Transformers 2” from Paramount Pictures and DreamWorks, has moved forward, largely because the film industry’s needs have overwhelmed any conviction that actors will actually walk out.

“Around April or May, they just started making plans,” Lisa Strout, director of the New Mexico Film Office, said this week during an interview at her Santa Fe headquarters. She was referring to a shift by studios, which earlier had promised to shut down rather than get into a game of chicken with the actors. “We’re expecting a very strong summer and fall,” Ms. Strout added.

Producers of “Terminator Salvation” referred calls to Warner representatives, who did not respond to queries.

A 100-day strike by the Writers Guild of America East and the Writers Guild of America West left studios scrambling earlier this year to patch holes in their movie schedules for 2009 and beyond. Warner came up short at least one potential blockbuster when troubles with the script and other matters delayed “Justice League of America,” a superhero film that was racing toward production when the writers struck last November.

That the “Terminator” sequel should be pushed into the breach — whether the actors’ guild had a contract this summer or not — owed much to a five-year campaign by Gov. Bill Richardson to build New Mexico’s film industry with unusually aggressive incentives.

His program offers a 25 percent rebate on virtually all film production expenditures in the state, without a cap. Thus the makers of “Terminator Salvation,” with a budget reported at more than $200 million, are expected to recoup tens of millions of dollars from a state government eager to showcase the production, New Mexico’s largest so far.

Recently, Lionsgate and the director Frank Miller shot “Will Eisner’s The Spirit” in Albuquerque. “No Country for Old Men,” which won last year’s best picture Oscar, was filmed near Las Vegas, N.M., and elsewhere in the state. Those and other projects have brought about $1.8 billion in entertainment-related spending to New Mexico in the last five years, according to Eric Witt, director of the governor’s entertainment development effort.

Though relatively small, with a population of about two million, New Mexico has managed to keep its budget on an even keel, thanks in part to oil-, gas- and coal-related income, which has grown as energy prices have risen.

Not incidentally, the state is expected to pick up part of the insurance costs of “Terminator Salvation.” Joe Finnegan, a vice president for entertainment insurance with Fireman’s Fund, and Steve Mangel, president of International Film Guarantors, a sister unit, declined to discuss their companies’ involvement with “Terminator Salvation.”

But in a phone interview last week, both said that industry practice was to charge higher premiums in the face of a potential strike that could leave expensive equipment sitting idle, or expose a star like Mr. Bale to possible hazards during an enforced hiatus. “That’s called underwriting,” Mr. Finnegan said.

“Terminator Salvation” has also been helped along by good will from Albuquerque Studios, a new production complex whose owners wooed the film away from Hungarian rivals shortly before a planned start in Budapest. Financed partly by union-backed entities in Chicago and Washington, D.C., the studio complex has promised to bend over backward to help should the film shut down — even if that means refusing to book small productions with SAG waivers while waiting for the labor troubles to end.

“Their walking away without a picture does me no good,” said Nick Smerigan, chief operating officer of Albuquerque Studios.

As SAG leaders were considering their response to the latest studio offer on Monday, it was business as usual on the “Terminator” sets at the complex. Carpenters hammered away on one. A truck hauling a mock-military vehicle purporting to be full of jet fuel pulled up outside another.

Even fliers from the nearby Kirtland Air Force Base have been in on the still uninterrupted movie fun.

“This show utilizes the military constantly,” said Jason Hariton, Albuquerque Studios’ vice president for operations. “I think those guys love the pyrotechnics.”
http://www.nytimes.com/2008/07/02/movies/02term.html





NBC Offers Wide Online Access for Beijing Olympics
David Bauder

NBC is making more than 2,200 hours of live competition from Beijing available online, giving Olympic junkies more action than they could ever devour in a day.

After barely tipping its toe in the digital world during past Olympics, the network will dive into the deep end: live blogging, 3,000 hours of highlights on demand, daily recaps and analysis and even fantasy league gaming. That's in addition to the 1,400 hours of coverage planned on six television networks, more than the combined total of every previous Summer Olympics.

NBC's digital plans, however, have angered media outlets that worry the company is being heavy-handed in enforcing its rights to exclusive Olympic access.

The network launched NBCOlympics.com in 2000, but then it offered only still pictures and schedule information to drive viewers to its television coverage. A limited package of highlights from Athens was available in 2004, but those visiting the NBC site were required to enter a credit card number, even though they weren't charged, and that drove away traffic.

NBC quietly experimented by beaming live over the Internet the hockey gold-medal game from the 2006 Turin Winter Olympics. The change in scope to what it is offering this year is staggering.

"We're excited about what we are putting into the fingertips of the Olympics fan," said Gary Zenkel, president of NBC Olympics. "We think it will generate a tremendous amount of engagement. We think it will generate more television viewership."

That's the danger for a TV network that offers so much online content: that people will turn off the TV in favor of the computer. Zenkel said there was worry in the past as NBC increased the level of events available on television that saturation would drive down viewership, but it turned out not to be the case.

The Associated Press has an agreement with NBC to distribute video links to the network's content online.

The computer coverage will also play a clear secondary role to TV. No events that are scheduled to be televised will be available online until after they are seen on TV, said Perkins Miller, senior vice president for digital media at NBC Sports.

The Web site will offer a full TV viewers' guide, track medal standings and give real-time results. It will have bios of more than 10,000 athletes, NBC said.

"It's not that we aren't nervous," Zenkel said. "It's not that we haven't taken an enormous amount on. But we're up to it and we're going to perform as we always have in the past."

There's been some brewing tension about the rights of other media organizations to cover the event; NBC paid $3.5 billion to the International Olympics Committee to televise the five Olympics through Beijing. Other TV networks have a limited window in which to show Olympics highlights, but no video of Olympic events is permitted to be shown on any Web site besides NBCOlympics.com.

NBC has allowed video of Olympic trials events to be shown on other Web sites, but each site is required to link to NBCOlympics.com. All of that video must come down Aug. 7, the day before the Beijing Games start.

That's going to limit the ability of Swimming World magazine, which has a heavy online component, to offer material to its users, said Brent Rutemiller, the magazine's publisher. He's also upset that limits have been placed on where other organizations can interview athletes, and that they were extended to coaches and officials.

Zenkel said NBC was being fair to other organizations.

"NBC is the organization that paid a very significant rights fee for the exclusive rights to the Olympics and for that, the exclusivity will be protected," he said. "But it's not to the detriment of the Olympics fan. In fact, it's to their benefit."
http://www.washingtonpost.com/wp-dyn...062801324.html





Fear and Loathing on a Documentary Screen
David Carr

HUNTER S. THOMPSON, who has been lionized in two feature films, served as the model for a running character in “Doonesbury” and is the subject of enough doctoral dissertations to build a bonfire, now has a documentary devoted to him, “Gonzo: The Life and Work of Dr. Hunter S. Thompson,” by Alex Gibney. Thompson, who always seemed to keep one drug-crazed eye on posterity behind his ever-present shades, would surely be pleased but not surprised.

But how to freshly document the life of a man who was his own Boswell, whose books and articles slavishly documented his own every tic, whoop and hallucination? A journalist who announced his arrival in American letters by riding with the Hells Angels and in the end choreographed a memorial from the grave that made the Burning Man bacchanal seem chaste?

Few writers have commodified narcissism so completely — his participatory style of journalism became its own genre and gives the film its title — but still we are invited to sit in the dark of the theater and have a flashback about his flashbacks. When the film opens on July 4, why will people, as Thompson would say, buy the ticket, take the ride?

The documentary by Mr. Gibney, who also made “Enron: The Smartest Guys in the Room” and “Taxi to the Dark Side,” does not attempt to work around Thompson’s endless self-consciousness but uses it as leverage instead. Produced by Graydon Carter, the editor of Vanity Fair, and narrated by the actor Johnny Depp, “Gonzo” mirrors the subjectivity and immersion of the journalism Thompson and his trusty arsenal of psychoactive agents perpetrated in Rolling Stone and elsewhere. Mr. Gibney eschews narrative conventions and switches point of view on a dime, creating a prism of interviews and episodes that gradually assembles into a compelling portrait.

In his long-running fever dream about America and its abundant pathologies, the bald man, with the tumbler of whiskey and head full of Schedule 1 narcotics, captured not only a mood — your government is not your friend — but many realities of civic life, most notably that if candidates were willing to do what it takes to get elected, they would probably arrive in office corrupted beyond hope.

Thompson, whose defects of character could occupy a separate ZIP code, was not just an original, he was also a patriot and a romantic. Working from the far reaches of the culture and often lucidity, Thompson, who died in 2005 at 67, changed the way that much of America thought about itself, in part because his version of journalism threw a grenade at the bland convention of formal balance and straight reporting.

“I would argue that Hunter and Tom Wolfe are the two most original voices to come out of journalism in the last century, and it’s no coincidence that they both worked for Jann Wenner at Rolling Stone,” Mr. Carter said. “No one else was willing to push it that way, to take those risks.” Mr. Gibney’s documentary plays appropriate tribute by restricting its gaze to the nascent Thompson of the ’60s and early ’70s. By the time most of America knew who Thompson was, he was pretty much washed up, having gradually been overtaken by his own legend, with steady assists from the bottle, the drugs and his coven of enablers.

August men line up to pay their respects in the documentary — Patrick J. Buchanan, George McGovern, Jimmy Buffett, Gary Hart and Timothy Crouse, the author of the campaign memoir “The Boys on the Bus” — as do the women he loved. Both his first wife, Sandy, and second wife, Anita, testify to his courage and courtliness, in between pointing out that he could be mean as a snake and far less predictable. He broke through by covering a biker gang from the inside — he “rode with the Angels,” as Mr. Wolfe puts it in the film — and took a serious beat-down on the way out. Journalism, as practiced by Thompson, was not something for sissies.

It’s clear in the documentary that what became a sort of pillar of the so-called New Journalism — nonfiction writing that borrowed from the techniques of fiction writing — began at the Kentucky Derby, when Mr. Thompson ignored the race he was there to cover. “We had come to see the real beasts perform,” those in the stands, Mr. Depp says, reading an article over Ralph Steadman’s illustrations.

In 1971 Thompson went looking for the American dream while on assignment, and rather presciently he did what many tourists do today: He went to Las Vegas. “Gonzo” borrows a lot of footage from “Fear and Loathing in Las Vegas,” the 1998 film that stars Mr. Depp as Raoul Duke, the nom de persona of Thompson in the book of the same name.

Mr. Depp developed a lasting affiliation with his subject, and narrates much of Mr. Gibney’s documentary — in one instance while holding a six-shooter at the ready — with a bit of the rumble that made Thompson’s speaking voice distinctive as well. (The film also uses some scenes from “Where the Buffalo Roam,” the biopic starring Bill Murray.)

Stylistically the documentary combs the extensive archive of tapes, both audio and video, some made by Thompson familiars who spent time with him in his bunker at Woody Creek, Colo. The rest of the film uses standard talking heads and narration drawn mostly from Mr. Thompson’s two most celebrated books, “Fear and Loathing in Las Vegas” and “Fear and Loathing on the Campaign Trail.”

“I wanted to have some fun in the film, because nobody really appreciated me trying to put laughs in ‘Taxi,’ ” Mr. Gibney said over breakfast this month at the Peninsula Hotel in Midtown Manhattan. “It was too dark.”

Mr. Gibney said he thought of “Gonzo” as a bit of comic relief from “Taxi,” this year’s Oscar-winning documentary, which tells the story of an Afghan taxi driver who was beaten to death by American soldiers while in extrajudicial detention at Bagram Air Base. But Mr. Gibney and Thompson are both known for driving big dump trucks of truth toward power.

“As a journalist Hunter never seemed to get trapped or hoodwinked into the phony balance,” said Mr. Gibney, who agreed to the documentary after being approached by Mr. Carter even though Mr. Gibney never met Thompson. As read by Mr. Depp in the film, Thompson suggests that objectivity was for suckers, a way to allow evil to triumph: “It was the built-in blind spots of the objective rule and dogma that allowed Nixon to slither into the White House in the first place.”

Sometimes that subjectivity could slip into something less benign. In 1972, when he took it upon himself to attempt to drive the presidential candidate Edmund S. Muskie slowly insane, he suggested that Muskie was hooked on Ibogaine, an obscure Brazilian drug. Thompson had made it up and seemed surprised when others took the bait. Frank Mankiewicz, the political director of the McGovern presidential campaign, is seen in the film saying that that Mr. Thompson’s “Fear and Loathing” book about the 1972 race, a collection of his articles for Rolling Stone, was “the least accurate and most truthful” account of the campaign.

That campaign proved to be the high-water mark of his career. Although Mr. Gibney is quick to say that Thompson wrote as he did in spite of the drugs and alcohol, the substances — hallucinogens for the vision, amphetamines to get it on the page, booze to take the edge off both — didn’t just beckon the muse, they were stamped into everything that eventually popped out. Always far past deadline of course. “Hunter could manufacture a crisis out of almost anything,” said Mr. Wenner, his friend and longtime editor at Rolling Stone. “He did amazing, amazing work, but it got to the point where it was hard for Hunter to travel, because of all the stuff he would need to take with him.”

There are extensive segments with Mr. Steadman, the long-suffering British illustrator and accomplice who could chronicle the internal and external demons Mr. Thompson spied everywhere. The poles of love and hate that characterize many great collaborations are clearly visible in the film.

As the documentary demonstrates, the bottom for the pair came when Mr. Thompson was assigned to cover the Rumble in the Jungle, the fight between Muhammad Ali and George Foreman in Zaire in 1974. Mr. Steadman explains in the film that in an act of enormous cocaine-assisted hubris (or perhaps fear that Mr. Ali, one of his heroes, was about to take a huge beating), Thompson gave away his tickets to the fight and went for a swim in the hotel pool. In doing so, he missed one of the greatest upsets in boxing history and, more important for a journalist, did not get the story.

By the accounts of many Thompson never recovered from that episode, gradually morphing into the character of Uncle Duke that Garry Trudeau introduced in “Doonesbury,” a cartoon figure who fired automatic weapons from his sun deck at apparitions and enemies that only he could see. He became the sum of his trademarks — the sunglasses, cigarette holder and inchoate rage — and ended up imprisoned by them.

“He was the master persona maker,” said Douglas Brinkley, the historian and friend of Thompson’s who serves as executor of the estate. “If Ernest Hemingway was going to go big-game hunting in Africa, Hunter wanted to use a submachine gun to hunt wild boar in Big Sur, Calif. He was dangerous, like handling nitroglycerin, and he liked to keep it that way.”

In the end everyone wanted to be around Thompson except Thompson. And on a bright winter day in Woody Creek, with his son in the house — Juan Thompson sardonically terms it a “warm family moment” in the film — he called his own bluff and blew his brains out.

He was infirm at the time, spending time in a wheelchair. Given his fundamental allergy to institutions like hospitals, his decision to set the terms of his exit is unsurprising.

“Hunter was very much one to share the pain when things went wrong, but he would share the glory as well,” said Anita Thompson, who married him in 2003. “He was a generous person, but he ended up surrounded by leeches and hanger-on-ers. It is the curse of fame.”

It is a curse that he embraced and held dear. The theatricality of his end, followed by a huge memorial in which his ashes were shot out of a cannon while people partied below, suggested that he understood his life as a kind of performance that required one final, deadly act. Throughout the film he speaks with such specificity about his legacy and its discontents that he seems to know he is speaking from the grave.

“I’m really in the way as a person,” he said. “The myth has taken over. I find myself an appendage. I’m no longer necessary. I’m in the way. It would be much better if I died. Then people could take the myth and make films.”
http://www.nytimes.com/2008/06/29/movies/29carr.html






Disney Pixar's "WALL-E" Wows Box Office
Dean Goodman

Animation giant Pixar scored its ninth consecutive No. 1 on Sunday with its robot love story "WALL-E," while Angelina Jolie achieved a personal best with her violent assassination thriller "Wanted."

"WALL-E," bolstered by near-unanimous critical praise, sold an estimated $62.5 million of tickets in its first three days, said Pixar's Walt Disney Co parent.

It tied with 2001's "Monsters, Inc." to become Pixar's third-best opener. Pixar has gone to No. 1 with all nine of its movies, an unprecedented run that begin in 1995 with "Toy Story."

The company record of $70.5 million was set in 2004 by "The Incredibles." Industry pundits had forecast an opening for "WALL-E" in the $50 million to $60 million range.

"Anything north of 60 (million dollars), we were going to be ecstatic," said Mark Zoradi, president of Walt Disney Studios Motion Picture Group.

Meanwhile Jolie, whose career has been overshadowed in recent years by breathless tabloid coverage of her personal life, kicked off at No. 2 with "Wanted." The Universal Pictures release earned about $51.1 million, easily beating forecasts of an opening in the mid- to high-$30 million range.

Her previous record for a live-action movie was 2005's "Mr. & Mrs. Smith," which opened to $50 million. The General Electric Co-owned studio said "Wanted" ranks as the third-highest opening for an R-rated action film, behind "The Matrix Reloaded ($91.7 million) and "300" ($70.9 million).

Sales Soar

"WALL-E" and "Wanted," clearly aimed at disparate audiences, helped pushed overall sales to their highest level of the year, said tracking firm Media By Numbers. The top 12 films grossed $179 million, up 29 percent from last weekend, and up 20 percent from the year-ago period, when Pixar's "Ratatouille" opened at No. 1 with $47 million on its way to $206 million.

Last weekend's champion, the Warner Bros spy comedy "Get Smart," slipped to No. 3 with $20 million, taking its 10-day haul to $77.3 million. The film, which stars Steve Carell as the inept hero Maxwell Smart, should finish up with about $130 million, said the Time Warner Inc-owned studio.

Rounding out the top five, Pixar rival DreamWorks Animation SKG Inc's "Kung Fu Panda" slipped one to No. 4 with $11.7 million, taking its total to $179.3 million. The film opened four weeks ago to $60.2 million.

Marvel Entertainment Inc's "The Incredible Hulk" fell three to No. 5 with $9.2 million. The superhero adaptation has earned $115.5 million after three weeks, roughly on par with its unloved 2003 predecessor "The Hulk."

"WALL-E," a space adventure mixing an unusual love story with somber messages about the future of Earth and humankind, was directed by Andrew Stanton, who won an Academy Award for Pixar's 2003 hit "Finding Nemo."

The title character, or Waste Allocation Load Lifter Earth-Class, is the last of a cadre of robots tasked with cleaning up piles of trash discarded by humans who abandoned the planet centuries before.

The human race set off on a luxury space cruise during a planned five-year clean-up that lasts much longer and results in unfortunate changes in the human physique and psyche.

The arrival of a sleek girl robot named Eve, sent to Earth by the orbiting humans to look for plant life, sends Wall-E on an adventure that changes his own and humanity's destinies.

Critics heaped praise on the film. According to Rotten Tomatoes, a Web site that collects reviews, an astonishing 96 percent of critics liked the film.

Michael Phillips of the Chicago Tribune said on TV's "Ebert & Roeper" that it was perhaps "the best American studio picture of the year," but the Hollywood Reporter said "it might be too clever to connect with mainstream audiences."

Disney's Zoradi said "WALL-E" was not a conventional cartoon, but the studio was "confident from the get-go" that it would work. He declined to reveal the film's budget, in line with Disney's policy.

"WALL-E" also opened at No. 1 in six small foreign markets, led by Brazil with $1.6 million, Zoradi said. It will reach Russia and Mexico next weekend, followed by the U.K. in mid-July, timed with the school holidays in each market.

"Wanted," a $74 million comic book adaptation directed by Kazakhstan-born filmmaker Timur Bekmambetov, stars Scottish actor James McAvoy ("The Last King of Scotland") as an office drone recruited to an elite order of assassins by Jolie and Morgan Freeman. Critics were also enthused.

(Reporting by Dean Goodman and Gina Keating; Editing by Vicki Allen)
http://www.reuters.com/article/newsO...37957120080630





The Top Movies at the North American Box Office

Following are the top 10 films at the North American box office for the first three days of the weekend beginning on June 27, led by the new release "WALL-E," according to studio estimates compiled on Sunday by Reuters.

1 (*) WALL-E ......................... $ 62.5 million

2 (*) Wanted ......................... $ 51.1 million

3 (1) Get Smart ...................... $ 20.0 million

4 (3) Kung Fu Panda .................. $ 11.7 million

5 (2) The Incredible Hulk ............ $ 9.2 million

6 (4) The Love Guru .................. $ 5.4 million

7 (6) Indiana Jones and the

Kingdom of the Crystal Skull ... $ 5.0 million

8 (5) The Happening .................. $ 3.9 million

9 (8) Sex and the City ............... $ 3.8 million

10 (7) You Don't Mess with the Zohan .. $ 3.2 million

NOTE: Last weekend's ranking in parentheses. * = new release.


TOTALS TO DATE

Indiana Jones ..................... $299.9 million

Kung Fu Panda ..................... $179.3 million

Sex and the City .................. $140.1 million

The Incredible Hulk ............... $115.5 million

You Don't Mess with the Zohan ..... $ 91.2 million

Get Smart ......................... $ 77.3 million

WALL-E ............................ $ 62.5 million

The Happening ..................... $ 59.1 million

Wanted ............................ $ 51.1 million

The Love Guru ..................... $ 25.3 million

"WALL-E" was produced by Pixar Animation Studios, and released by Walt Disney Pictures, both units of Walt Disney Co.

"Wanted" and "The Incredible Hulk" were released by General Electric Co's Universal Pictures. "Hulk" was produced by Marvel Entertainment Inc's Marvel Studios.

"Get Smart" and "Sex and the City" were released by Warner Bros Pictures, a unit of Time Warner Inc. The studio produced "Get Smart" with Australia's Village Roadshow Ltd.

Viacom Inc's Paramount Pictures released "Kung Fu Panda," which was produced by DreamWorks Animation SKG Inc; "The Love Guru"; and "Indiana Jones and the Kingdom of the Crystal Skull," which was produced by George Lucas' Lucasfilm.

"The Happening" was released by 20th Century Fox, a unit of News Corp.

"You Don't Mess with the Zohan" was released by Columbia Pictures, a unit of Sony Corp.

(Reporting by Dean Goodman, editing by Vicki Allen)
http://www.reuters.com/article/newsO...95881520080630





Intel’s Dominance Is Challenged by a Low-Power Upstart
John Markoff

From mainframes to minicomputers and then PCs, each new computing generation has displaced its predecessor by reaching a broader audience and costing far less. And each time, the dominant company in one generation loses control in the next.

That’s why the PC industry’s commanding chip maker, Intel, might do well to be alarmed by the computer chips being designed by Qualcomm, a maker of chips for cellphones. An engineer at Qualcomm’s gleaming corporate campus here demonstrated a palm-sized circuit board capable of displaying high-definition video. What was striking about the demonstration was not the quality of the video images, which is now commonplace. Rather it was that the microprocessor chip, called Snapdragon, drives the display with less than half the power of a similar chip recently introduced by Intel. Qualcomm designers say it will also cost less.

As the PC shrinks in size, it is on a collision course with the multifunction cellphone. Many expect the resulting impact to transform both devices and all the companies that make them. The new smartphones, always-on portable Internet devices that are part cellphone, part computer, change the rules of the game in computing because computing speed — at which Intel excelled — is no longer the most important factor. For a cellphone relying on a small battery, how efficiently a chip uses power becomes more important.

The new mobile world represents a special challenge for Intel, which until four years ago ignored the issue of increasing power consumption in its flagship X86 chips, which have been the PC industry standard for almost three decades.

Other chip makers have not ignored power consumption. Just this month at Computex, a huge computer and consumer electronics trade show held each year in Taiwan, the Silicon Valley graphics chip maker Nvidia demonstrated a small mobile computer that worked five times as long on a battery as a similar portable machine powered by Intel’s most recent low-power chip.

Qualcomm and Nvidia share a chip design licensed from a relatively tiny British chip firm, ARM Holdings. ARM has had a big impact on the communications world. Its processors sell for substantially less than Intel’s more powerful X86 chips and are far more numerous: they are standard for the cellphone industry. Cellphones outsell PCs by about five to one.

“This battle is being fought in ARM’s backyard, not Intel’s,” said Michael Rayfield, general manager of Nvidia’s mobile group.

In addition to Qualcomm and Nvidia, there are more than 200 licensees of the ARM processor design, including major chip makers like Marvell and Texas Instruments. Together, they supply the more than 1.1 billion cellphones, many of which use multiple ARM chips. The chips are also used in a growing array of special purpose consumer electronics like G.P.S. navigators and set-top TV boxes.

Dominating the large and growing cellphone market is only half the battle. Both the X86 and ARM camps are eagerly eyeing a new market known within the consumer electronics industry as M.I.D.’s, or mobile Internet devices. They are betting that this year represents the beginning of a boom in a new class of computing device — things like shrunken laptops called netbooks, personal G.P.S. navigators and handheld game systems, as well as an expanding array of idiosyncratic gadgets that connect wirelessly to the Internet for every conceivable purpose. For example, at Computex, one company displayed a handheld device intended solely for people looking to car-pool.

Outside the United States, the less expensive M.I.D. computers are expected to expand penetration of computers into new markets. In the United States and Europe, however, there is a debate about whether the new machine will remain a niche category.

Anand Chandrasekhar, a vice president and manager of Intel’s mobile platforms group, said he expects portable computers to be much like bicycles. Not only will people use different ones for different applications — like road bikes and mountain bikes — but they will also outgrow them.

“As a child, I had a bike for my size, and as I grew, my bike changed,” he said.

Intel, the world’s largest chip maker, is now well aware of the threat from ARM. It is focusing vast resources on the low-power microprocessor market and says it is catching up quickly in power efficiency with its ARM competitors. This month, the first netbooks using a new Intel chip, the Atom, began to be shipped. Intel says more than 30 products will use the Atom.

Even though Intel’s chip uses more power than those of its ARM competitors, its Atom represents a tenfold reduction in the power consumption of the X86 chip family that was used in several generations of desktop PCs. Intel’s engineers achieved the power savings in part by entirely rethinking the chip’s circuit design, as well as the way individual transistors work.

One addition to the new Atom chip is the so-called drowsy transistor, a circuit that can throttle the amount of power it consumes between each tick of the processor’s clock. When the chip is not computing, entire areas of the processor can go into a sleep state, using just enough power to remember the ones and zeros for the current process.

Intel executives said the company’s advantage in the looming war with its ARM competitors is the quality of the Web experience provided by its chips. “By definition, these devices have to run the Internet as it has been developed,” said Mr. Chandrasekhar of Intel. “That happens today on X86,” he said, adding that seamless access to the Internet “won’t happen on ARM.”

Intel’s executives say that the ARM makers are also hampered by the lack of a single standard, forcing computer software developers to make changes for each product they design.

ARM manufacturers respond that Intel is overstating the importance of X86 compatibility and that their chips will provide a Web experience that rivals Intel’s but allows significantly longer battery life. Indeed, Intel’s case that only X86 chips will offer a satisfying mobile Web experience was potentially undermined earlier this month when one of its closest allies, Apple, appeared to indicate that it had chosen to design its own version of the ARM microprocessor for future handheld consumer products.

Apple’s chief executive, Steven P. Jobs, said during an interview that the consumer electronics company had acquired a small Silicon Valley chip design company, PA Semi, to help design its next generation iPods and iPhones. Apple’s current iPhone is based on the ARM chip, and industry consensus is that the iPhone currently offers the best Web surfing experience in a handheld device.

Analysts and industry executives are divided on how much of a threat ARM will be to Intel. Allies like Dell are unlikely to desert the chip maker. “We’re impressed with their road map,” Michael Dell, chief executive of Dell, wrote in an e-mail message. He said it “gets interesting for smaller devices with Moorestown,” referring to the next generation of Intel’s low-power chips, planned for 2010. Dell, like Hewlett-Packard and other major PC makers, is bringing out its own mobile Internet device.

Other analysts see Moorestown as an indication of the challenge Intel faces, for the company will not be directly competitive with the ARM processors on power efficiency until then — and the ARM-allied companies insist they are not standing still.

“You’re still going to have a higher-power solution with Intel’s Atom that doesn’t have the same small footprint of the ARM chip,” said Jim McGregor, a research director at In-Stat, a semiconductor market research firm. “It won’t be a great solution for mobile devices, and ARM will.”
http://www.nytimes.com/2008/06/30/te...gy/30chip.html





Nvidia's Stock Bloodbath - Company Admits Faulty Chips, Shares Plunge 22%
Humphrey Cheung

Nvidia is admitting that some of its notebook chips are failing at “higher than normal rates” in a new filing with the Securities and Exchange Commission. The chip failures will cause Nvidia to take a $150 to $200 million charge this quarter to cover what it calls “warranty, repair and return and replacement” for laptops with unspecified Nvidia graphics chips and chipsets. In after hours NASDAQ trading, Nvidia (stock symbol NVDA) plunged 21.94% or $3.95 to $14.08 a share. The stock had been down as much as 25% after the close of regular trading on Wednesday July 2nd 2008.

While it’s a bit too early for Nvidia to do any conclusive finger pointing, Nvidia does say that “significant quantities” of chips are experiencing thermal issues caused by possibly weak die and packaging – in essence the parts are overheating and failing. Nvidia isn’t publically saying what laptop brands and models are affected by the faulty chips, but it has issued an emergency driver that increase cooling by powering up fans immediately after the system starts (boy that’s going to be noisy).

Presumably, the bulk of the $150 to $200 million will go towards reimbursing laptop companies for any customer repairs and replacements and this is supported by Nvidia’s words. “We intend to fully support our customers in their repair and replacement of these impacted MCP and GPU products that fail,” Nvidia stated in the filing.

Nvidia is also predicting that its sales for the quarter ending July 27 will be approximately $875 million to $950 million which is a bit lower than analysts’ expectations of nearly $1 billion. Who knows if the stock will continuing tanking in the morning, but it’s definitely going to be an interesting trading day.
http://www.tgdaily.com/content/view/38237/135/





Tech Majors to Join Hands Against Patent Suits: Report

Information technology giants are teaming up in defense against potential patent-infringement lawsuits, the Wall Street Journal said on Sunday, citing people familiar with the matter.

The companies plan to buy up key intellectual property before it falls into the hands of parties that could use it against them, the paper said.

The paper's sources said the companies, which include Verizon Communications Inc, Google Inc, Cisco Systems Inc, Hewlett-Packard Co and Ericsson, are believed to have a joined a group calling itself the Allied Security Trust.

The companies will pay roughly $250,000 to join the group and will each put about $5 million into escrow with the organization to go toward future patent purchases, the paper said.

Verizon, Cisco and Google did not immediately return phone calls seeking comment. HP and Ericsson could not be reached for comment.

(Reporting by Ajay Kamalakaran in Bangalore; Editing by Jennifer Tan)
http://www.reuters.com/article/marke...11177720080630





Why do Apple Laptop Upgrades Cost 200% More than Dell's?
Rory Reid

Everybody knows Apple laptops are pricey. You know it, Crave knows it, Steve Jobs knows it. We also have a fair idea that its PC-selling counterpart, Dell, is relatively cheap. But have you ever stopped to examine just how much more you pay for Apple upgrades than you do for Dell? We have.

Having trawled the online configurator tools of both laptop makers, we've detailed just how much Apple takes the biscuit with its pricing. Base configurations look pretty similar on the surface, but when you start upgrading with faster internal components, Apple charges through the nose.

We can understand why Apple can justify charging more for its superbly designed chassis, or its excellent operating systems -- they're bespoke, and you pay more for premium designs. Fine. But we can't fathom why Apple charges so much more than Dell for simple components.

If you're thinking of buying a Mac or a Dell, or have just bought one, you should definitely check out the next page to see exactly how these two computing behemoths compare.

We've got our slide rule and paper out to compare the components that make the most difference to computing performance that we could make direct comparisons with. Let's see how they stack up (all prices were checked on 26 June 2008).

3.5-inch hard drives
Want to upgrade the hard drive in your MacBook at the time of purchase? You'll have to turn your wallet upside down. Going from a 120GB 5,400rpm drive to a 250GB 5,400rpm drive will set you back £90.01 from the Apple configurator. Doing the same upgrade with a Dell XPS M1330 costs just £30.01 on the Dell site. Here, Apple is a whopping 200 per cent more expensive than Dell.

RAM
Upgrading memory isn't cheap if you're an Apple customer. Buying a MacBook and switching from 2GB of 667MHz DDR2 to 4GB -- across two 2,048MB DIMMS -- using the Apple Web site will cost an extra £120. Doing that same swap with the Dell XPS M1330 costs just £40.01. Again, Apple is charging around 200 per cent more than Dell.

Solid-state drives
Apple's pricing for solid-state drives is on the high side, too. With Dell, going from a 250GB 5,400rpm mechanical drive to a 64GB solid-state drive in an XPS M1330 (only possible on some models) costs an extra £389.99. You can't go from a 250GB mechanical drive to a 64GB SSD with a MacBook Air, so this isn't a direct comparison, but you can go from an 80GB drive to a 64GB SSD for an extra £639.

Even if you factor in the difference between an 80GB drive and a 250GB drive -- £16 according to products listed on ebuyer -- you're still looking at a 71 per cent difference in price.

CPU
Apple isn't massively expensive for everything, though -- processors seem pretty fairly priced. Jumping from a 2.1GHz (T8100) to a 2.4GHz (T8300) CPU in a Dell will cost you £29.99. We reckon the Apple equivalent costs £30.01, although it's hard to work out. Stay with us here.

The only way to work it out is via this rather complex method. By upgrading the spec of the entry-level MacBook so it matches that of the mid-range model as close as possible (increasing hard drive and RAM, so it costs £789), you're left with two differences -- the CPU and the DVD drive, and a £40 price gap to the £829 mid-range Mac.

Comparing similar components to the DVD reader (found in the entry-level MacBook) and the DVD writer (found in the mid-range model) reveals a difference of approximately £10. Taking this into account, any price difference between the two machines should be all down to the CPU, which basically puts Apple on level-pegging with Dell at £30.

Conclusion
Apple is generally more expensive than Dell for components that are, in most cases, identical to those used in Dell machines. So why so pricey, Apple? Less buying power? Greed? Good business sense? Whatever the reason, we think it's an interesting state of affairs.
http://crave.cnet.co.uk/laptops/0,39...97849-1,00.htm





iCall App Enables GSM to WiFi / VoIP Switching On The iPhone
Alias420

iCall is a newly announced app coming out on Apple’s App Store. It promises seamless call switching between VoIP via WiFi and regular calls. There will be no hacking involved, they are fully approved Apple developer. iCall has a two tier system with a free version and a ‘pro’ version with added features. iCall is their own service provider so don’t expect to use this application with any of your current VoIP plans like Vonage. It will be interesting to see how this will compare with other services competeing for the iPhone VoIP market. Like the previously released RingFree.

Here is their very short FAQ:

1. We are part of the Apple iPhone developer program. This is not an application for you naughty jail breakers ;-)
2. We are not using any undocumented API calls. We are following every rule that developers must follow.
3. No, you can not have a copy. We are not physically capable of distributing the application to any phones except our development phones. If Steve-ness himself wanted a copy we could not provide it to him. Sorry.
4. Apple has explicitly stated that VoIP is allowed, just not over Edge networks. Steve himself answered this question in the Q&A session after the last keynote speech.
5. We are huge Apple fans and plan to release a version of iCall for OS X, but we don’t have enough developers. (see question 6).
6. Yes we are hiring. Please visit our jobs page. We’ll even pay for you to move to Greenwich, CT.

http://www.iphone-hacks.com/2008/06/...on-the-iphone/





Facebook Trademark Dispute

Silicon Valley entrepreneur Aaron Greenspan has filed a petition with the U.S. Patent and Trademark Office, seeking cancellation of Facebook's registered trademark on the term "Facebook." He cited three reasons why Facebook never should have been granted the trademark:

Prior use by Greenspan, who used the term for a feature on his social Web project called houseSYSTEM.

The generic nature of the term within Harvard, where for generations "facebook" guides have been published for each of its dormitory "houses."

Fraud against the trademark agency itself.
http://www.siliconvalley.com/news/ci...nclick_check=1





EBay to Pay Damages in Sale of Fakes
Doreen Carvajal

A French court on Monday ordered the online auction giant eBay to pay 38.6 million euros, or $61 million, in damages to the French luxury goods company LVMH, in the latest round in a long-running legal battle over the sale of counterfeit goods on the Internet.

LVMH, a maker of high-end leather goods, perfumes and other fashion and luxury products, successfully challenged eBay for a second time in the French court, arguing that 90 percent of the Louis Vuitton bags and Dior perfumes sold on eBay are fakes.

The court ruled that eBay, which earns a commission on the sales, was not doing enough to stamp out counterfeit sales.

EBay vowed to appeal the ruling in a brief statement issued immediately after the decision was announced.

“When counterfeits appear on our site we take them down swiftly, and today’s ruling is not about our fight against counterfeiting,” eBay said in a statement from Paris. “It’s about an attempt by LMVH to protect uncompetitive commercial practices at the expense of consumer choice and the livelihood of law-abiding sellers that eBay empowers every day. We will fight this ruling on their behalf.”

EBay has faced several legal challenges in France, where luxury goods companies are fiercely protective of their brands. In another recent case, a court ordered eBay to pay 20,000 euros to Hermes International in Paris for not properly vetting the sale of handbags.

That court concluded that eBay was not doing enough to combat counterfeit sales and should be forcing sellers to post more product information to guarantee authenticity, like series numbers.

The issue has resonated outside France. The jeweler Tiffany & Company has sued eBay in the United States on similar grounds; a decision is pending in the case.

LVMH has pursued other Internet companies as well, saying they help counterfeiters by provided a marketplace for the items. The luxury goods company has won several rounds against Google in France in a quest to force the search engine to remove online advertising from counterfeiters whose spots appear when the names of LVMH brands are typed in.
http://www.nytimes.com/2008/07/01/te...01ebay.html?hp





Department of Civil Disobedience: Google Should Deliver Its YouTube Data to Viacom in Paper Form
Erick Schonfeld

The recent court order directing Google to hand over data to Viacom about every YouTube video ever watched strikes many people as an absurd overreach of the law into the privacy of anyone who has ever used YouTube (i.e., almost everyone on the Internet). Google should definitely keep fighting the ruling if it can.

But if it can’t, perhaps it should comply with it in a creative way. The data in question are data logs containing the records of every video watched on YouTube, by whom, and at what times. The court is also ordering that Google hand over all videos that have ever been taken down for any reason. The logs alone take up 12 terabytes. Google should print them out and deliver them on paper.

It would literally fill up the Library of Congress. That is roughly the equivalent of all the printed books in the Library of Congress (by one estimate, others put it at 20 terabytes—either way, it’s a lot of paper). The court order never states what form, the data must be delivered in.
http://www.techcrunch.com/2008/07/03...in-paper-form/





On Day Care, Google Makes a Rare Fumble
Joe Nocera

Two months ago, Google held a series of secret focus groups with employees who have children in Google’s day care facilities. The purpose was to gauge their reaction to the company’s plan to raise the amount it charged for in-house day care by 75 percent.
Parents who had been paying $1,425 a month for infant care would see their costs rise to nearly $2,500 — well above the market rate. For parents with toddlers and preschoolers, who were charged less, the price increases were equally eye-popping. Under the new plan, parents with two kids in Google day care would most likely see their annual day care bill grow to more than $57,000 from around $33,000.

At the first of the three focus groups, parents wept openly. As word leaked out about the company’s plan, the Google parents began to fight back. They came up with ideas to save money, used the company’s T.G.I.F. sessions — a weekly meeting for anyone who wanted to ask questions of Google’s top executives — to plead their case, and conducted surveys showing that most parents with children in Google day care would have to leave Google’s facilities and find less expensive child care.

Do you think you know how this story ends? You’re probably guessing that because it involves “do no evil” Google, Fortune magazine’s “Best Company to Work For” the past two years, this is a heart-warming tale of a good company reversing a dumb decision.

If only. Although Google is rolling back its price increase slightly and is phasing in the higher price over five quarters, the outline of the original decision remains largely unchanged. At a T.G.I.F. in June, the Google co-founder Sergey Brin said he had no sympathy for the parents, and that he was tired of “Googlers” who felt entitled to perks like “bottled water and M&Ms,” according to several people in the meeting. (A Google spokesman denies that Mr. Brin made that comment.) On Monday, Google began the first phase of its new day care plan, letting go of the outside day care firm it had been using.

In recent months, Google has hit the first rough patch in its short, magical life as a public company. From November to April, Google’s once high-flying stock dropped 44 percent, to $412 from $744. (It has since gained some of that back, closing on Thursday at $537.) It may be a stretch to equate the day care fiasco with the fall in Google’s stock. But maybe not.

When a stock was rising as fast as Google’s once was, it was easy to buy the view that there was something truly special about Google. But when the stock is falling, overlooked problems start to loom large. Having discovered that Google is not, in fact, the promised land, a number of Googlers have left recently to join start-ups, hotter companies like Facebook — and even Microsoft.

“There are many things about Google that are not great, and merit improvement,” blogged Sergey Solyanik, who recently returned to Microsoft after a stint at Google. “There are plenty of silly politics, underperformance, inefficiencies and ineffectiveness, and things that are plain stupid.” Starting, it would appear, with day care.



Google first began offering day care three and a half years ago, and perhaps it is only coincidence that this occurred not long after a woman named Susan Wojcicki returned to the company from maternity leave. Ms. Wojcicki is a figure of significant stature at Google; hers was the garage that Mr. Brin and Google’s other founder, Larry Page, rented while starting up Google. Today she is the company’s vice president for product measurement, though as I discovered in talking to unhappy Google parents this week, not many Googlers seem to know what her exact duties entail. Everybody, however, knows that she’s Mr. Brin’s sister-in-law.

From the start, Ms. Wojcicki has been a passionate advocate for Google’s day care efforts, though there is some dispute about how much decision-making authority she has. Parents who know her point out that the company’s day care approach is very much aligned with her views; for its part, a Google spokesman insists that “these decisions were not made by her; they were made by the executive management team.”

Google’s first facility, called the Kinderplex, was run by the Childrens’ Creative Learning Centers, or C.C.L.C., which, according to its Web site, offers “learning in a play-based, developmentally appropriate environment that incorporates a variety of activities and multicultural aspects in a thematic style.” That sounds perfect for Silicon Valley, doesn’t it? One of C.C.L.C.’s longtime Silicon Valley clients, Electronic Arts, sent me an e-mail statement telling me how happy it has been with C.C.L.C.’s services.

According to Google, there were numerous complains about C.C.L.C., but the Google parents I spoke to disagree. They say that at the Kinderplex, teacher-child ratios were low, teachers were first-rate, the facility was clean and upbeat, and the food — organic, naturally — was terrific.

But at least one parent wasn’t happy: Ms. Wojcicki. She is a proponent of a preschool philosophy called Reggio Emilia, the hot kiddie philosophy of the moment, which stresses even small children’s ability to chart their own learning paths.

A year after the Kinderplex opened, Google opened its second day care center, called the Woods, which Google ran itself. The Woods was an expensive undertaking; in terms of the square footage per child, the aesthetics of its toys, and the college degrees of its teachers, it put the Kinderplex to shame. It also used the Reggio Emilia philosophy.

With the Woods open, Google decided to upgrade the Kinderplex to match the salaries and the teacher-student ratios of the Woods. Google now had 200 day care spots — and such wonderful day care at that! — and was promoting this new perk as a recruiting tool. The company was growing like crazy — its work force now numbers 19,000 — its young employees were starting to have babies, and well, you can just picture what happened next. The wait list ballooned insanely, finally reaching over 700 people. New employees who arrived at Google thinking they were getting in-house day care were stunned to discover that it could take up to two years to land a coveted spot.

Meanwhile, someone at Google woke up one day and realized that the company was subsidizing each child to the tune of $37,000 a year — which nobody had noticed up until then — compared with the $12,000-a-year average subsidy of other big Silicon Valley companies like Cisco Systems and Oracle. Faced with this dilemma, Google decided that the way to solve the dual problems of a too-long wait list and a too-large subsidy was — are you sitting down for this? — to get rid of C.C.L.C. and make the Kinderplex more like the Woods! (Google says it was always planning to replace C.C.L.C.) Given that decision, the only possible way to reduce the subsidy was to raise prices through the roof.

If you are shaking your head at this point, that’s because you lack the proper understanding of Google’s culture. Having conquered the Internet, Google’s executives tend to believe that they can do pretty much everything better than everybody else — even day care. When I spoke to Laszlo Bock, the company’s vice president for “people operations” (a k a human relations), he told me that “what is really driving the cost is eliminating the two-year wait list while focusing on providing really high quality.”

Google can’t just have low teacher-child ratios — it has to have the lowest of anybody. Its teachers have to be the best. Its toys have to be the most advanced. If it costs a lot of money to provide the Greatest Day Care on Earth, well, that’s life.

Plus, the high price of Google day care solves the waiting list problem. Indeed, getting the waiting list down was a huge priority for Google; the spokesman told me that forcing people to wait two years for day care was “inequitable.” And maybe it is.

But parents who talked to me said that several times during the six-week-long day care brouhaha, Mr. Brin made comments indicating that he viewed the whole thing as a giant economics experiment. “This is a supply-and-demand issue,” he told one group of parents — adding that Google needed to charge what the market would bear. (Through a Google spokesman, Mr. Brin denies making such a statement.) Given that Google has lots of pre-I.P.O. millionaires, it can clearly charge a lot.

Indeed, at one meeting, Ms. Wojcicki, a multimillionaire herself, told the parents that she planned to keep her own children in Google day care, despite the higher cost. “I’ve had firsthand experience with the great care provided by these centers and I want as many other parents as possible to have access to it,” Ms. Wojcicki noted in an e-mail message.

Google has also started charging people several hundred dollars to stay on the waiting list; as a result the list has dropped to around 300 parents. By next fall, Google plans to open new facilities with another 300 places. See? No more waiting list.

Google, I should note, believes that it has handled the day care issue in a “Googly” way and object strongly to the criticism by the parents. The company points out that the prices are somewhat lower than originally planned, that it is expanding its day care operation, that its facilities will be state of the art and that it will be giving scholarships to parents who can’t afford to keep their children in Google day care. (Although yet to release the details of the scholarship plan, the company says that employees will have to show proof of household income to qualify.)

But here’s the real problem: providing day care isn’t an economics experiment, nor should it be just another Google perk, alongside organic food and free M&Ms. Day care matters to people’s lives in a way that few other perks do. There are many people in this country — including, I’ll bet, many Googlers — who believe that employer-provided day care, at affordable prices, ought to be like health insurance, a benefit that every company provides as a matter of course. Yet as the technology blog Valleywag noted recently, Google doesn’t even advertise day care as a benefit for its employees anymore. That’s the real shame.

Google may be providing the greatest day care ever, but so what? It doesn’t matter how good the day care is if only its wealthiest employees can afford to use it. If Google had really wanted to do something path-breaking about its day care crisis, it would have spent less time creating elitist day care centers and more time figuring out how to “scale” day care for everybody no matter what their salaries.

Instead, Google has shown that it thinks about day care the same way every other company does — as a luxury, not a benefit. Judging by what’s transpired, that’s what Google is fast becoming: just another company.
http://www.nytimes.com/2008/07/05/bu...nocera.html?hp





Bacteria Evolve; Conservapedia Demands Recount
John Timmer

Noises off

This is a story that starts in triumph, takes a detour through farce, and inadvertently ends raising some profound questions. The triumph is one of scientific progress in the study of evolution; the farce comes courtesy of those who run Conservapedia, who apparently can't believe that any scientific evidence can possibly support evolution. The questions, however, focus on what access the US public should have to the research that their tax dollars support.

Ars covered the research earlier this month, when a paper reporting it was first published in the Proceedings of the National Academies of Science. Richard Lenski and his colleagues have been conducting a long-term experiment in bacterial evolution, one that has encompassed over 30,000 generations of bacteria going back over 20 years. Many of the bacteria have evolved the ability to better utilize the sugar available in their cultures, but one strain underwent at least three distinct changes (at generation 27,000, 31,000 and 33,000) that enabled them to access citrate present in the medium—something their parents were incapable of. Lenski saved samples of every culture at intervals of 500 generations, and his paper suggested his lab was going back and sequencing the genomes of the intermediaries to try to find out the genetic basis for the evolution of this new trait.

Conservapedia meets cognitive dissonance

The denizens of Conservapedia were not amused. They apparently subscribe to the belief that acceptance of some scientific data goes against conservative values. The site tends to present the views of mainstream science and "creation science" as equally valid scientific perspectives, as evidenced by their discussion of kangaroo origins (which is actually much improved since we first checked). The site's relevant sympathies with creationism can be seen in its discussion of information, which uncritically repeats William Dembski's claim that "information cannot be created by natural (nonintelligent) causes." Despite never defining how to measure biological information, Dembski has used this claim to rule out evolutionary origins for new biological capacities.
Clearly, Lenski's bacteria appear to have evolved a significant new capacity. Fortunately, the residents of Conservapedia found a way out of this logical conundrum: Lenski was either misinterpreting his data, or he faked it. In an open letter to Lenski, Conservapedia's Andy Schlafly (an attorney with an engineering background) wrote, "skepticism has been expressed on Conservapedia about your claims, and the significance of your claims, that E. Coli [sic] bacteria had an evolutionary beneficial mutation in your study." Their solution? Show them the data: "Please post the data supporting your remarkable claims so that we can review it, and note where in the data you find justification for your conclusions."

Lenski replied, noting that the whole purpose of scientific paper is to discuss and display data and to use them to justify conclusions; the data were in the paper itself. He also pointed out he'd placed a copy of the paper on his website for those without subscriptions to PNAS. Lenski also spent some time reexplaining some of his conclusions, and pointing out errors and misconceptions in the letter he had received. This response prompted a second letter from Schlafly, suggesting he wanted to review the data underlying the data presented in the paper, and noting that the work is taxpayer funded, giving him a right to it as a taxpayer.

Backstage drama

From here on out, standard Internet drama ensued. By the time of his next reply, Lenski had apparently read the discussion pages attached to the letters, and discovered that Schlafly hadn't actually bothered to read the paper he was demanding the data for. He has also discovered that some Conservapedia members were simply calling the whole thing a hoax, and accusing him of having engaged in research fraud. As a result, Lenski was apparently very annoyed, and his second letter is far more assertive.

Lenski again notes that the paper actually contained the relevant data, and that Schlafly's complaints suggested he wouldn't know what to do with any further data were Lenski to provide it to him. In this, he was backed up by a number of Conservapedia members, who said more or less the same thing in the attached discussion. Several of those individuals are apparently now ex-Conservapedia members, having had their accounts blocked for insubordination. In fact, anyone who questioned Schlafly's demands seem to have been branded an opponent of public access to scientific data; the statement, "I'll add your name to the list above of people who oppose the public release of data" peppers Schlafly's responses throughout the discussion.

Problems with group think and incendiary discussions are common complaints about what happens behind the scenes at Wikipedia. The irony here is that Conservapedia was ostensibly founded as a response to precisely that behavior. It appears that the victims may now be trying the role of oppressors on for size.

What should scientists share?

Lenski's primary argument is that the data needed to evaluate his conclusions are in the paper. Having read the paper, it appears that Lenski is completely correct; some of the data is depicted in graphical form instead of the raw, underlying numbers, but this appears to be largely a matter of making the data easier to interpret. In his response to Conservapedia, Lenski states (accurately) that the underlying data are in the form of the bacteria themselves, which he has stored in freezers at Michigan State. If Schlafly wants those, he can go through the standard channels. He needs to demonstrate that he can store and use them properly and that his use would serve some scientific purpose. If those conditions are met, Schlafly can go through Michigan State's standard Material Transfer Agreement procedures.

The exchange actually touches on some of the issues relevant to the free exchange of scientific data and materials, although that surely wasn't Schlafly's intent. In general, most scientists would agree that the open exchange of ideas and reagents benefits the scientific community, and that the public has a right to the know about the research they've funded. For this reason, the NIH has requested that all papers that describe research it has funded be made open access within six months of their publication; Lenski's beaten that deadline by over five months.

But his second letter raises some significant limits to how far he'll go in handing out the raw materials of his research. In addition to the issues described above, Lenski also intends to make sure he fulfills his ethical obligations as a research mentor by ensuring that his grad students and post-docs who performed the hard work of maintaining the experiment are the ones who benefit by publishing a description of it. He also made no mention of sharing the preliminary data for what his paper explicitly stated was the next step: sequencing the genomes of the new bacteria and their ancestors.

In terms of the argument over public access to taxpayer-funded data, the situation is fairly straightforward. Organizing raw data for public exchange takes time and money, which taxpayers would also foot the bill for. It's generally most efficient for the data to be organized once the gathering stage is complete; taxpayers get a better value for their money this way. In the same manner, it makes no sense for taxpayers to foot the bill for the preparation and shipping of samples to someone like Schlafly, who lacks the facilities or knowledge to do scientific work with the material.

But there's often a large gap between organization and analysis of data and its publication. Here, the ethical concerns—ensuring that the people who did the work receive credit for it via publication—often conflicts with the principles of openness and rapid progress. It's possible some other lab would be able to analyze the sequence data Lenski is gathering more rapidly and thoroughly; by fulfilling his ethical obligations, Lenski may actually be slowing the progress of science. This has been a source of tension within the scientific community for decades, one that has only been exacerbated by the fact that more data is now in electronic form and easy to exchange. It's not something I expect to see resolved any time soon.

Whither Conservapedia?

Although he's brought up some interesting issues regarding the conduct of publicly funded scientific research, Schlafly appears to remain blissfully unaware of it. Schlafly only named specific data that he felt were missing on Friday, two weeks after the exchange of letters started; his comments in the discussion attached the letter exchange suggests he primarily questions Lenski's ability to recognize when bacterial contamination crops up in the experiment. Throughout the discussion, however, Schlafly has demonstrated a scientific illiteracy that undercuts his own arguments by demonstrating that any time Lenski or his coworkers spend accommodating Schlafly would truly represent a waste of taxpayer money.

Of course, that lack of understanding might be expected from someone who seems to believe that there are distinct conservative and liberal forms of science. Still, you can sense the beginnings of a response to the fact that the situation may be spiraling out of Conservapedia's control. When a contributor suggested the exchange was making the site look bad, the response indicated that the any problems could be dismissed as a case of biased perception: "What sort of Liberal defeatism are you bound up in, and why do you assume, without examining the facts of the matter, that this has not gone well?"

As to the longer-term prospect, that Lenski's genome sequencing will actually reveal the creative power of evolution in greater detail, that's apparently nothing that can't be handled by a post-hoc rationalization. "But how are we to know," one contributor asks, "if these traits weren’t 'potentiated' by the Creator when He designed the bacteria thousands of years ago, such that they would eventually reveal themselves when the time was right?"

How indeed? It's precisely the inability to test such a contention that led the scientific community to give up on supernatural explanations in the first place.
http://arstechnica.com/articles/cult...-foibles.ars/1





Epic mash-up

Jefferson Bible Reveals Founding Father's View of God, Faith

Nation's third president compiled the four Gospels into a single text without miracles that ends with Jesus' burial rather than the resurrection.
By Louis Sahagun

Making good on a promise to a friend to summarize his views on Christianity, Thomas Jefferson set to work with scissors, snipping out every miracle and inconsistency he could find in the New Testament Gospels of Matthew, Mark, Luke and John.

Then, relying on a cut-and-paste technique, he reassembled the excerpts into what he believed was a more coherent narrative and pasted them onto blank paper -- alongside translations in French, Greek and Latin.

In a letter sent from Monticello to John Adams in 1813, Jefferson said his "wee little book" of 46 pages was based on a lifetime of inquiry and reflection and contained "the most sublime and benevolent code of morals which has ever been offered to man."

He called the book "The Life and Morals of Jesus of Nazareth." Friends dubbed it the Jefferson Bible. It remains perhaps the most comprehensive expression of what the nation's third president and principal author of the Declaration of Independence found ethically interesting about the Gospels and their depiction of Jesus.

"I have performed the operation for my own use," he continued, "by cutting verse by verse out of the printed book, and arranging the matter, which is evidently his and which is as easily distinguished as diamonds in a dunghill."

The little leather-bound tome, several facsimiles of which are kept at the Huntington Library in San Marino, continues to fascinate scholars exploring the powerful and varied relationships between the Founding Fathers and the most sacred book of the Western World.

The big question now, said Lori Anne Ferrell, a professor of early modern history and literature at Claremont Graduate University, is this:

"Can you imagine the reaction if word got out that a president of the United States cut out Bible passages with scissors, glued them onto paper and said, 'I only believe these parts?' "

"He was a product of his age," said Ferrell, whose upcoming book, "The Bible and the People," includes a chapter on the Jefferson Bible. "Yet, he is the least likely person I'd want to pray with. He was more skeptical about religion than the other Founding Fathers."

In Jefferson's version of the Gospels, for example, Jesus is still wrapped in swaddling clothes after his birth in Bethlehem. But there's no angel telling shepherds watching their flocks by night that a savior has been born. Jefferson retains Jesus' crucifixion but ends the text with his burial, not with the resurrection.

Stripping miracles from the story of Jesus was among the ambitious projects of a man with a famously restless mind. At 71, he read Plato's "Republic" in the original Greek and found it lackluster.

Ever the scientist, he inoculated his wife, children and many of his slaves against smallpox with fresh pus drawn from infected domestic farm animals, according to Robert C. Ritchie, W.M. Keck Foundation director of research at the Huntington Library.

"For a lot of people, taking scissors to the Bible would be such an act of desecration they wouldn't do it," Ritchie said. "Yet, it gives a reading into Jefferson's take on the Bible, which was not as divine word put into print, but as a book that can be cut up."

Jefferson, a tall vigorous man who preferred Thucydides and Cicero to the newspapers of his day, was not the only 18th century leader who questioned traditional Christian teachings.

Like many other upper-class, educated citizens of the new republic, including George Washington, Jefferson was a deist.

Deists differed from traditional Christians by rejecting miraculous occurrences and prophecies and embracing the notion of a well-ordered universe created by a God who withdrew into detached transcendence.

Critics of the time regarded deism as an ill-conceived attempt to reconcile religion with scientific discoveries. For rationalists in the Age of Enlightenment, deism was one of many efforts to liberate humankind from what the deists viewed as superstitious beliefs.

Jefferson was a particular fan of Joseph Priestley, a scientist, ordained minister and one of Jefferson's friends. Priestley -- who discovered oxygen and invented carbonated water and the rubber eraser -- published books that infamously cast a critical eye upon biblical miracles. Jefferson was particularly fond of Preistley's comparison of the lives and teachings of Socrates and Jesus.

Discussions and letters between Jefferson and another friend, Philadelphia physician Benjamin Rush, led Jefferson to compile his "wee little book." In a letter to Rush on April 21, 1803, Jefferson said his editing experiment aimed to see whether the ethical teachings of Jesus could be separated from elements he believed were attached to Christianity over the centuries.

"To the corruption of Christianity I am indeed opposed," he wrote to Rush, "but not to the genuine precepts of Jesus himself."

Therefore, Ritchie said, "for Jefferson, the Bible was a book that could be made and unmade."

The Jefferson Bible remained largely unknown beyond a close circle of relatives and friends until 1904, when its publication was ordered by Congress. About 9,000 copies were issued and distributed in the Senate and the House.

Today several editions of the Jefferson Bible are available through booksellers. A few online versions exist, including one on the website of the Jefferson Monticello, www.monticello.org/library/links/jefferson.html.

It is hard to say whether Jefferson would have objected to publication of the book.

"Say nothing of my religion," Jefferson once said. "It is known to myself and my God alone. Its evidence before the world is to be sought in my life; if that has been honest and dutiful to society, the religion which has regulated it cannot be a bad one."
http://www.latimes.com/news/local/la...,7730914.story
JackSpratts is offline   Reply With Quote
Old 02-07-08, 09:25 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

Christopher Hitchens Waterboards Himself
Cory Doctorow

After Christopher Hitchens wrote a Slate article suggesting that waterboarding wasn't really torture, readers suggested that he try it himself. He did.

So what did it feel like? Hitchens recounts how he was lashed tightly to a sloping board, then, "on top of the hood, three layers of enveloping towel were added. In this pregnant darkness, head downward, I waited until I abruptly felt a slow cascade of water going up my nose ... I held my breath for a while and then had to exhale and - as you might expect - inhale in turn."

That, he says, "brought the damp cloths tight against my nostrils, as if a huge, wet paw had been suddenly and annihilatingly clamped over my face. Unable to determine whether I was breathing in or out, flooded more with sheer panic than with water, I triggered the pre-arranged signal" and felt the "unbelievable relief" of being pulled upright.

The "official lie" about waterboarding, Hitchens says, is that it "simulates the feeling of drowning". In fact, "you are drowning - or rather, being drowned".

He rehearses the intellectual arguments, both for ("It's nothing compared to what they do to us") and against ("It opens a door that can't be closed"). But the Hitch's thoroughly empirical conclusion is simple. As Vanity Fair's title puts it: "Believe me, it's torture."
http://www.boingboing.net/2008/07/02...-hitchens.html





China Inspired Interrogations at Guantánamo
Scott Shane

The military trainers who came to Guantánamo Bay in December 2002 based an entire interrogation class on a chart showing the effects of “coercive management techniques” for possible use on prisoners, including “sleep deprivation,” “prolonged constraint,” and “exposure.”

What the trainers did not say, and may not have known, was that their chart had been copied verbatim from a 1957 Air Force study of Chinese Communist techniques used during the Korean War to obtain confessions, many of them false, from American prisoners.

The recycled chart is the latest and most vivid evidence of the way Communist interrogation methods that the United States long described as torture became the basis for interrogations both by the military at the base at Guantánamo Bay, Cuba, and by the Central Intelligence Agency.

Some methods were used against a small number of prisoners at Guantánamo before 2005, when Congress banned the use of coercion by the military. The C.I.A. is still authorized by President Bush to use a number of secret “alternative” interrogation methods.

Several Guantánamo documents, including the chart outlining coercive methods, were made public at a Senate Armed Services Committee hearing June 17 that examined how such tactics came to be employed.

But committee investigators were not aware of the chart’s source in the half-century-old journal article, a connection pointed out to The New York Times by an independent expert on interrogation who spoke on condition of anonymity.

The 1957 article from which the chart was copied was entitled “Communist Attempts to Elicit False Confessions From Air Force Prisoners of War” and written by Albert D. Biderman, a sociologist then working for the Air Force, who died in 2003. Mr. Biderman had interviewed American prisoners returning from North Korea, some of whom had been filmed by their Chinese interrogators confessing to germ warfare and other atrocities.

Those orchestrated confessions led to allegations that the American prisoners had been “brainwashed,” and provoked the military to revamp its training to give some military personnel a taste of the enemies’ harsh methods to inoculate them against quick capitulation if captured.

In 2002, the training program, known as SERE, for Survival, Evasion, Resistance, Escape, became a source of interrogation methods both for the C.I.A. and the military. In what critics describe as a remarkable case of historical amnesia, officials who drew on the SERE program appear to have been unaware that it had been created as a result of concern about false confessions by American prisoners.

Senator Carl Levin, Democrat of Michigan and chairman of the Senate Armed Services Committee, said after reviewing the 1957 article that “every American would be shocked” by the origin of the training document.

“What makes this document doubly stunning is that these were techniques to get false confessions,” Mr. Levin said. “People say we need intelligence, and we do. But we don’t need false intelligence.”

A Defense Department spokesman, Lt. Col Patrick Ryder, said he could not comment on the Guantánamo training chart. “I can’t speculate on previous decisions that may have been made prior to current D.O.D. policy on interrogations,” Colonel Ryder said. “I can tell you that current D.O.D. policy is clear — we treat all detainees humanely.”

Mr. Biderman’s 1957 article described “one form of torture” used by the Chinese as forcing American prisoners to stand “for exceedingly long periods,” sometimes in conditions of “extreme cold.” Such passive methods, he wrote, were more common than outright physical violence. Prolonged standing and exposure to cold have both been used by American military and C.I.A. interrogators against terrorist suspects.

The chart also listed other techniques used by the Chinese, including “Semi-Starvation,” “Exploitation of Wounds,” and “Filthy, Infested Surroundings,” and with their effects: “Makes Victim Dependent on Interrogator,” “Weakens Mental and Physical Ability to Resist,” and “Reduces Prisoner to ‘Animal Level’ Concerns.”

The only change made in the chart presented at Guantánamo was to drop its original title: “Communist Coercive Methods for Eliciting Individual Compliance.”

The documents released last month include an e-mail message from two SERE trainers reporting on a trip to Guantánamo from Dec. 29, 2002, to Jan. 4, 2003. Their purpose, the message said, was to present to interrogators “the theory and application of the physical pressures utilized during our training.”

The sessions included “an in-depth class on Biderman’s Principles,” the message said, referring to the chart from Mr. Biderman’s 1957 article. Versions of the same chart, often identified as “Biderman’s Chart of Coercion,” have circulated on anti-cult sites on the Web, where the methods are used to describe how cults control their members.

Dr. Robert Jay Lifton, a psychiatrist who also studied the returning prisoners of war and wrote an accompanying article in the same 1957 issue of The Bulletin of the New York Academy of Medicine, said in an interview that he was disturbed to learn that the Chinese methods had been recycled and taught at Guantánamo.

“It saddens me,” said Dr. Lifton, who wrote a 1961 book on what the Chinese called “thought reform” and became known in popular American parlance as brainwashing. He called the use of the Chinese techniques by American interrogators at Guantánamo a “180-degree turn.”

The harshest known interrogation at Guantánamo was that of Mohammed al-Qahtani, a member of Al Qaeda suspected of being the intended 20th hijacker in the Sept. 11 attacks. Mr. Qahtani’s interrogation involved sleep deprivation, stress positions, exposure to cold and other methods also used by the Chinese.

Terror charges against Mr. Qahtani were dropped unexpectedly in May. Officials said the charges could be reinstated later and declined to say whether the decision was influenced by concern about Mr. Qahtani’s treatment.

Mr. Bush has defended the use the interrogation methods, saying they helped provide critical intelligence and prevented new terrorist attacks. But the issue continues to complicate the long-delayed prosecutions now proceeding at Guantánamo.

Abd al-Rahim al-Nashiri, a Qaeda member accused of playing a major role in the bombing of the American destroyer Cole in Yemen in 2000, was charged with murder and other crimes on Monday. In previous hearings, Mr. Nashiri, who was subjected to waterboarding, has said he confessed to participating in the bombing falsely only because he was tortured.
http://www.nytimes.com/2008/07/02/us/02detain.html





Agents Can Randomly Seize Travelers' Laptops or PDAs
Jim Puzzanghera

Bill Hogan was returning home from Germany in February when a customs agent at Washington Dulles International Airport pulled him aside. He could re-enter the country, she told him. But his laptop could not.

U.S. Customs and Border Protection agents said he had been chosen for "random inspection of electronic media," and kept his computer for about two weeks, recalled Hogan, 55, a freelance journalist from Falls Church, Va.

Though it was a spare computer that had little important information, Hogan felt violated.

"It's not an inspection. It's a seizure," he said. "What do they do with it? I assume they just copy everything."

For several years, U.S. officials have been searching and seizing laptops, digital cameras, cell phones and other electronic devices at the border with few publicly released details. Complaints from travelers and privacy advocates have spurred some lawmakers to question the U.S. Customs and Border Protection policy.

As people store more and more information electronically, the debate hinges on whether searching a laptop is the equivalent of looking in your luggage, or more like a strip search.

"Customs agents must have the ability to conduct even highly intrusive searches when there is reason to suspect criminal or terrorist activity, but suspicion-less searches of Americans' laptops and similar devices go too far," said Sen. Russ Feingold, a Wisconsin Democrat who chairs a subcommittee that examined the searches at a hearing Wednesday. "Congress should not allow this gross violation of privacy."

Authorities need a search warrant to get at a computer in a person's home, and reasonable suspicion of illegal activity to search a laptop in other places. But the rules change at border crossings. Courts have ruled that there's no need for warrants or suspicions when a person is seeking to enter the country - agents can search belongings, including computer gear, for any reason.

The latest was the 9th U.S. Circuit Court of Appeals, which ruled in April that agents acted properly in turning over information used to charge a traveler with possession of child pornography. His laptop had been searched in 2005 at Los Angeles International Airport.

Any routine search is considered "reasonable" under the Fourth Amendment, legal scholars agree. But Feingold worries that the law has not kept up with technology.

"People keep their lives on these devices: diaries, personal mail, financial records, family photos. ... The government should not be able to read this information," said Lee Tien, senior staff attorney for the Electronic Frontier Foundation. In February, the group and the Asian Law Caucus sued authorities for more information about the program.

The issue is of particular concern for businesses, which risk the loss of proprietary data when executives travel abroad, said Susan K. Gurley, executive director of the Association of Corporate Travel Executives. After the California ruling, the group warned its members to limit the business and personal information they carry on laptops taken out of the country.

Of 100 people who responded to a survey the association did in February, seven said they had been subject to the seizure of a laptop or other electronic device.

Jayson P. Ahern, deputy commissioner of customs and border protection, said in written testimony to the subcommittee that the agency would "protect information that may be discovered during the examination process, as well as private information of a personal nature that is not in violation of any law." The agency conducts "a regular review and purging of information that is no longer relevant," Ahern wrote.

Feingold said the testimony gave "little meaningful detail" about the program. He is considering legislation to prohibit such routine searches of electronic devices without reasonable suspicion.

But Republican Sen. Sam Brownback of Kansas said U.S. officials have to balance individual rights with protecting the nation.

"Terrorists take advantage of this kind of technology," he said.

Hogan, the freelance journalist, said there was no reason for customs agents to think he was a terrorist. He advised people to take precautions with their laptops when they leave the country.

"I certainly would never take it again," he said.

Jim Puzzanghera writes for the Los Angeles Times.
http://www.baltimoresun.com/business...,3324276.story





European Lawmaker To Sue U.S. Over Data

Suit Illustrates Sticking Point in Transatlantic Pact
Ellen Nakashima

A European Union lawmaker who frequently travels to the United States is suing the U.S. government for access to her personal records, such as credit card information and travel history, that the Department of Homeland Security and other security agencies may have gathered.

The lawsuit to be filed today by Sophie in't Veld, a Dutch member of parliament, comes as the United States and Europe are working on an agreement on privacy protections for transatlantic data-sharing. The pact would permit security agencies to obtain personal information for law-enforcement purposes. One sticking point, however, is the ability of European citizens to sue the U.S. government for access to information and redress if they think the data are inaccurate or have been misused.

In't Veld said her case underscored the need for more explicit data-protection guarantees than those contemplated in the draft of the accord. It is also the first high-level legal test of Bush administration assurances that anyone may access his or her data under the Freedom of Information Act, privacy experts said. The law allows anyone, including non-citizens, to sue for access. But it provides no mechanism for correcting errors.

"The bottom line is, the U.S. is trying to give the impression in Europe that there's a simple, well-established process for records access that any European can avail themselves of," said David L. Sobel, senior counsel for the Electronic Frontier Foundation, which is filing the lawsuit on in't Veld's behalf. "But as this lawsuit shows, it's a difficult, time-consuming process that might ultimately not result in anything being obtained."

In't Veld, who helps develop transatlantic data-sharing policies as a member of the E.U.'s Civil Liberties, Justice and Home Affairs Committee, has been flying to and from the United States for the past three years or so. She is almost always detained as she leaves the United States and sent to secondary screening for questioning and a search of her handbag and luggage.

Last October, she filed a FOIA request for access to her records at three agencies. "I don't expect to find anything specific in the files," she said in a phone interview from Utrecht, the Netherlands. "But I am entitled to know what is in them."

In March, DHS officials responded that a "comprehensive search" of files within agencies including Customs and Border Protection, U.S. Citizenship and Immigration Services, Immigration and Customs Enforcement turned up no "responsive records."

The FBI also said it found no records. The State Department has not responded, according to her complaint.

In't Veld said "there must be something if I'm traveling in and out of the United States." A Washington Post reporter's FOIA request for personal records to the DHS yielded airline travel and reservation records for flights to and from the United States.

A DHS official, who spoke on condition of anonymity because department officials generally do not discuss specific cases, said that in't Veld was not "on any list," including the no-fly list, and that she had not sought redress through DHS's Traveler Redress Inquiry Program (TRIP). The official could not address her records request, which is handled by a separate department.

The proposed agreement, according to a draft final report, contains 12 principles that are standard hallmarks of data privacy. They include ensuring that the information collected is relevant and timely, that it is collected for a specific and legitimate purpose -- in this case, for law enforcement, and that people have access to their data and a means to correct inaccuracies.

It specifies that anyone may have administrative redress for concerns about misuse of data and notes that FOIA allows judicial redress to anyone.

The accord has been the subject of E.U.-U.S. talks since February 2007 -- an effort to "stop the fighting," said Paul Rosenzweig, DHS deputy assistant secretary for policy, referring to difficult negotiations over the transmission of air passenger records and financial transaction data from Europe to the United States.

"The entire point of this exchange of views is for us to discuss with the Europeans what our safeguards are and for them to show us what their safeguards are so that we can be confident that the safeguards each is using are suitable," Rosenzweig said. On the U.S. side, that includes limits on access, how long data can be kept, what the information can be used for and punishment for people who violate the rules, he said.

The Bush administration hopes to finalize the accord by the end of the year.

But European parliamentarians are concerned that broad exceptions could be written into the rules and that a lack of effective redress remedies could open the door to misuse. "The whole issue is not about giving your private data to the United States but not being able to control it and not knowing who is going to protect that data, whether or not a court is going to have any power to correct abuses because abuses are going to take place," said Ignasi Guardans, a member of parliament from Spain.

One solution, he said, would be applying 1974 Privacy Act protections to European citizens, which would allow them to ask a court to force an agency to provide access to personal records held on them and to correct errors.

To do so would require Congress to amend the law, Rosenzweig said, adding that the administrative remedies are at least as effective as going to court. DHS's TRIP has cleared thousands of people off the no-fly list, for example, he said.

Moreover, the Privacy Act is no panacea, as the U.S. government generally exempts national security databases from the statute's judicial-review provision, Sobel said. "In reality," he said, "American citizens are in the same boat as Europeans are."
http://www.washingtonpost.com/wp-dyn...063001895.html





Magnum, P.C.?

New Texas Law Limits Computer Repair To Licensed Private Investigators

Institute for Justice Texas chapter opens in Austin with challenge to statute

IJ client Mike Rife cannot compete with a government-created cartel that demands he close his businesses and complete a three-year apprenticeship under a licensed private investigator to get a state-required license to fix computers.

Austin, Texas—The Institute for Justice—the nation’s leading litigators for entrepreneurs who find their rights violated by the government—opens its new Texas Chapter today by filing a lawsuit against the Texas Private Security Board, a state agency, on behalf of computer repair shops that are being told they need a private investigator’s license to continue solving their customers’ computer problems.

Under the new law enacted in 2007, Texas has put computer repair shops on notice that they had better watch their backs any time they work on a computer. If a computer repair technician without a government-issued private investigator’s license takes any actions that the government deems to be an “investigation,” they may be subject to criminal penalties of up to one year in jail and a $4,000 fine, as well as civil penalties of up to $10,000. The definition of “investigation” is very broad and encompasses many common computer repair tasks.

To get a private investigator’s license, owners of computer repair shops would have to close their business while they either obtained a criminal justice degree or completed a three-year apprenticeship under a licensed P.I.

But the repair shops are not the only ones at risk. The law also criminalizes consumers who knowingly use an unlicensed company to perform any repair that constitutes an investigation in the eyes of the government. Consumers are subject to the same harsh penalties as the repair shops they use: criminal penalties of up to one year in jail and a $4,000 fine, and civil penalties of up to $10,000—just for having their computer repaired by an unlicensed technician.

The newly launched Institute for Justice Texas Chapter (IJ-TX) is challenging the new law under the Texas Constitution by filing a lawsuit in Travis County against the Private Security Board on behalf of Texas computer repair companies and their customers.

Mike Rife, one of the plaintiffs in the suit, operates AustinPCTech, a company he started more than 10 years ago. Rife has hundreds of satisfied customers and his business is thriving. Rife now operates under a cloud of uncertainty about which repairs the government will allow him to perform for his customers.

David Norelid, another plaintiff, is co-owner of Citronix Tech Services in Houston. Norelid started Citronix in Florida before moving to Texas to pursue his degree in information technology management. Norelid said, “If I was required to get a P.I. license to run my business, I’d have to shut my business down.” The flexibility of being an entrepreneur allows him to work full time while going to school.

Rife and Norelid do not doubt their ability to compete with so-called “big box” competitors in the computer repair business. What they cannot compete with is a government-created cartel that demands they close their businesses and complete a three-year apprenticeship under a licensed private investigator to get a state-required license—or risk jail time and large monetary penalties if they continue serving their customers without one.

Thane Hayhurst owns and operates Kiwi Computer Services and iTalent Consulting Group, both in Dallas. Kiwi Computer is a traditional do-it-all computer repair company that Hayhurst has operated in Dallas since 1992. More recently, Hayhurst opened iTalent Consulting, which offers IT outsourcing services to many prominent local businesses. iTalent sends employees on assignments (some lasting for many months) to clients’ businesses where the consultant works to implement on-site computer and IT solutions. Both of Hayhurst’s businesses are impacted by the new law because he and his employees are not licensed private investigators. Hayhurst is worried the government will decide he can no longer offer many of the services he currently provides to his clients. Hayhurst said, “There are thousands of computer contractors performing valuable services for almost every organization in Texas, and this law will hinder their ability to remain gainfully employed.”

Joining the computer repair companies as a plaintiff in this case is consumer Erle Rawlins, who frequently uses independent computer repair shops to keep his Dallas-based real estate buyer agency business running. Rawlins said, “This law is totally unfair. It requires using someone who is more expensive and may not be as good, and it uses government power to limit the number of competitors who are out there. It is bad for consumers and it is bad for entrepreneurs.”

The filing of this case marks the launch of IJ-TX in Austin. Lead attorney on the case is IJ-TX Executive Director Matt Miller. Miller said, “Texas is working hard to bring technology innovators to our state. Yet the government is now telling them they need to get a private investigator’s license if they want to continue working here. That is not an effective strategy to grow our technology talent pool.”

Miller concluded, “It makes no sense to require a computer repairman with 10 or 20 years of experience to get a degree in criminal justice just to continue working in his occupation. This law will drive up the price of computer repair for everyone, and that’s exactly what the private investigations industry wants.”

The Institute for Justice is a public interest law firm that advances a rule of law under which individuals can control their destinies as free and responsible members of society. IJ has additional chapters in Arizona, Minnesota and Washington state. IJ-TX litigates under the state and federal constitutions to reinvigorate economic liberty, preserve property rights, promote educational choice and defend the free flow of information essential to politics and commerce.
http://www.ij.org/first_amendment/tx...6_26_08pr.html





Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality
David Price

In 1971, Ron Rosenbaum’s Esquire article, “Secrets of the Little Blue Box”, introduced America to phone phreaks, a subterranean network of geek explorers who probed the global phone system as the world’s largest pre-Internet interconnected machine. A star of Rosenbaum’s piece was Joe Engressia, a blind telephonic hacking pioneer with perfect pitch and a high IQ, who seized control over phone systems by whistling dual-tone, multi-frequency pitches into telephone receivers.

Before the introduction of modern phone-switching technology, audible tones were used to connect phones with distant destinations. As a young child, Engressia was obsessed with the telephone, finding comfort within the steady blare of the dial tone. At the age of 5, he discovered he could dial the phone by clicking the receiver’s hang-up switch, and at 7 he accidentally discovered that whistling specific frequencies could activate phone switches. From there, experimentation, brilliance, networking and perseverance led Engressia to probe weaknesses in the network that allowed him to make free phone calls. His mastery over this global machine was liberating, if not obsessive.

As Rosenbaum was completing his 1971 article, Engressia was arrested for theft of telephone services. At the time it appeared that the phone company had only recently become aware of his activities – though a few years earlier he had been expelled from the University of South Florida for selling fellow students long-distance calls for a dollar each.

Rosenbaum’s 1971 piece put the spotlight on Engressia, as newspapers, magazines and television programs ran features on him and his activities. Engressia became a cultural icon, or proto-hacker stereotype, as characters with his abilities were written into cyberpunk novels and Hollywood screenplays with characters like Sneakers’ Erwin ‘Whistler’ Emory.

Engressia’s IQ loomed somewhere above 170, but as an adult he wished to live as a 5 years old, founding his own church, the Church of Eternal Childhood. His wish to remain an eternal child appears to be linked to the repeated sexual abuse he reported suffering from a nun at the school for the blind that he attended as a child, as well as the academic pressures that led him to miss out on playtime as a child. In 1991, Engressia legally changed his name to Joybubbles. Until his death this last year, Joybubbles ran a phone “story line” in Minneapolis, where callers would call and hear him tell a different children’s story each week – adopting a cadence and personal style reminiscent of his hero, Mister Rogers.

When Joybubbles died last year, I used the Freedom of Information Act to request his FBI file, mostly just to see what the FBI had made of this explorer who had loved and wandered through this pre-Internet global network. I figured there might be something in his file relating to his 1971 arrest, but I hadn’t expected to find an FBI and phone company investigation of him from two years before this arrest.

An August 28, 1969, FBI General Investigative Division report describes an investigation by Kansas City telephone company of three subjects in Kansas City, Miami and Chicago, who had “discovered a means to intercept and monitor WRS and Autovon” phone lines. Autovon (Automatic Voice Network) was a Defense Communication Agency telephone network used for nonsecure military phone communication. The FBI’s report mistakenly claimed that Autovon was a “top secret telephone system utilized only by the White House”, when in fact Autovon was really a nonclassified military telephone system, designed to link military installations even under the unpleasant conditions of nuclear annihilation.

The FBI believed that Engressia was “the ‘brains’ in this matter and was an electronics genius with an I.Q. of one hundred ninety”. Even though the FBI’s investigation had “not revealed any national security aspect to their activities” and phone company officials stated that this group’s use of free phone calls had been “strictly for their own amusement and [the] harassment of [the] phone company”, the FBI’s investigation reports were filed under the heading: “Security matter – Espionage: interception of communications.”

The FBI thought a blue box may have been used to avoid tolls, though they realized that Engressia “was capable of orally emitting a perfect twenty six hundred cycle tone, which could be used to direct distance dial any phone number in the country”.

The FBI reported that without any authorization from law enforcement personnel, an employee of Southern Bell Telephone & Telegraph had contacted Engressia, interviewed him, and later gave information from this interview to the FBI. This employee told the FBI that “Joseph Engressia, age twenty and blind, [was] interviewed and he admitted intense interest in telephone company systems and equipment. He is familiar with the practices as to test numbers, circuits, and operations of telephone companies. Engressia exhibited ability to whistle twenty six hundred cycle notes which is utilized by telephone company in toll network. He claimed he learned majority of information by trial and error using his touch-tone instrument. He claimed he did not wish to violate any law and that his activities with the telephone were for amusement and education.”

The FBI viewed Engressia as a real threat. On August 29, 1969, J. Edgar Hover sent a summary memo regarding Engressia’s activities to John Ehrlichman, counselor to President Nixon, to Melvin Laird, secretary of defense, and to James J. Rowley, the director of the U.S. Secret Service. While Hoover apprised these governmental bodies of his investigation and expressed concerns that Engressia had the power to undertake undetectable wiretaps, the FBI had no actual evidence that Engressia intercepted any phone calls, they only had concerns about such powers.

Fortunately, the FBI employees processing my FOIA request accidentally revealed parts of the identities of the two phone phreaks mentioned in Engressia’s file. An individual referred to as “also known as ‘Tandy Way’” is identified as a blind radio and telephone enthusiast living in Miami, and a “Mr. Jacobs” is revealed as the Kansas City resident accessing free phone calls to talk with Engressia. Jacobs had first met Engressia after seeing him on Huntley-Brinkley TV show, and contacted him first by letter, then by phone.

The FBI report indicates that the phone company had known about Engressia’s abilities for about a year:

“Joseph Engressia Jr. first came to the attention of the SBT&T Company in the summer of 1968. At about the same time there was a routine trouble report in the middle of August 1968, that was received by ___ showing a ‘blue box’ in use on the telephone number ___ Miami subscribed to by ___ Miami. ____ explained that a ‘blue box’ is a device that can be used to defraud the telephone company of the revenue from long-distance toll calls. This device produces multi-frequency tones which enable the user to make long-distance telephone calls and circumvent the billing equipment in the long-distance network”.

It is not clear if Engressia was using an actual blue box (an electronic device designed to make free calls by generating 2600 hz through a speaker) or if he simply whistled into his phone to produce the same results. This Sept. 1, 1969, report includes an account of a Canadian operator reporting Engressia for selling LD phone calls for $1.00 each at the University of Southern Florida. Engressia was suspected and fined $25.00, “however, he was reinstated with full honors shortly thereafter”.

An 8/29/69 FBI memo states that an employee “of the Florida Bell Telephone Company in Miami, Florida, illegally monitored conversations on Joe Engressia’s telephone # 274-0760. It is further alleged that these monitored conversations were divulged by ____ [presumably the Florida Bell employee] to an unnamed FBI Agent in Miami, Florida”. Later interviews confirmed that “the results of the monitoring [were] furnished to a Miami FBI Agent”. Another FBI memo reports that FBI source, employed at Southwestern Bell Telephone Company, learned undisclosed information “by monitoring telephone conversation between [Jacobs] and Engressia”.

On September 3, 1969, Jacobs wrote the FBI a detailed two-page letter extensively citing chapter and verse of the Communications Act and accusing the phone company and the FBI of violating wiretapping sections of the statute.

“I believe there has been a serious violation of the Communications Act of 1934, Section #605. Several days ago, FBI Kansas City agents ____ and ____visited my home and repeated back to me excerpts from a private conversation I had with a Mr. Joe Engressia (Tel: 274-0760) of Miami, Florida. Mr. Engressia for some time believed his phone was being monitored and in order to get the tapper to tip his hand, mentioned many words that might be of interest to the supposed tapper such as Autovon, etc. It is my information that a ____ of the Florida Bell Telephone Company has illegally monitored, recorded, and transcribed telephone conversations without the permission of the receiver and/or the sender and without a court order. ____ then divulged this conversation in the form of a written transcript to a Miami gent ____ who passed it on. Mssrs. ____ and ____ were good enough to confirm, in their visit to my home, that there had in fact been monitoring of a telephone line contrary to 47 U.S.C. 605”.

Jacobs then threatened to expose the FBI’s complicity in this illegal wiretap. He asked the FBI if they would fulfill their legal obligations to investigate his “allegations even though an FBI agent may indeed have been a part to the violation of 47 U.S.C. 605”. The letter closed with a request that the FBI advise him what a U.S. attorney will do with this information.

The FBI released no memos or files from the following few days and then, five days later, there were an odd series of unconvincing memos that appear designed to establish a paper trail of plausible deniability, claiming (in contradiction to FBI report from 8/29/69) that the FBI had been given records illegally obtained by the phone company. A September 8, 1969, memo from the Kansas City Special Agent in Charge to Hoover has the agent now claiming he doubted that the information the Bureau received from the phone company employee was reliable.

The next day the FBI produced a memo designed formalizing its “story”. A Miami FBI agent wrote Hoover claiming, “when interviewed Aug. 28 last by Bureau agents Miami, Re: Activities of Joseph Carl Engressia Jr. and [Jacobs] ____did not reveal telephone company had monitored telephone conversations between [Jacobs] and Engressia”. Given that previous FBI reports stated that their conversations had been illegally monitored by the phone company and illegally shared with the FBI, this report appears to be a ham-handed effort to manufacture records later to be used if Jacobs pushed for an investigation of illegal wiretapping.

In 1967, the Supreme Court ruled in Katz v. United States that Fourth Amendment protections against unreasonable searches extended to telephone conversations, but the following year Congress added provisions to the 1968 Omnibus Crime Bill that fought the court’s decision by identifying a list of specific crimes (kidnapping, organized crime, marijuana distribution, etc.) meriting wiretaps. But the phone company’s spying on Engressia was way out of bounds under 1969 laws.

For a few days, the FBI re-circulated several versions of this same report; it was obviously feathering its nest in case of further legal inquiries at some point. The projected faux sotto voce tone of the FBI memos finds them pretending to “establish” that no actual records of illegally intercepted calls is comically damning. These track-covering memos are the last records appearing in Engressia’s file.

It seems curious that an incident, which a matter of days earlier had been of such urgency that the counselor to the president, the secretary of defense, and the director of the Secret Service had been alerted, was so suddenly dropped so quickly and quietly, never to be mentioned again. That such a formerly urgent matter would be so quickly scuttled, set aside and forgotten is a strong measure of the threat Jacobs’ accusations represented to the FBI and their special relationship with the phone company.

In those years, before Judge Harold Green broke up the phone monopoly and birthed the baby bells, it was easy for Hoover’s FBI to maintain a special arrangement with the phone company - an arrangement under which the FBI ran warrantless wiretaps and pin registers largely as Hoover saw fit and with the phone company’s compliance. No questions were asked. The public inspection of such matters would have threatened Hoover’s special relationship with the phone company.

Fearing public disclosure of its illegal eavesdropping on Engressia, the phone company waited until 1971 to drop the bag on him, once some time had passed and Jacob’s threats were no longer in play.

But this tale, even 37 years later, has relevance beyond the particulars of an ingenious blind renegade phone whistler. It is but one artifact of the largely unexplored history of the FBI’s symbiotic enabling of the phone company’s illegal wiretapping – a history with increasing relevance in the present, as the White House pressures Congress to provide immunity to a historically abusive industry, long protected by the sort of formal arrangements with law enforcement documented in these files.
http://www.counterpunch.org/price06302008.html





Is the Government Tracking Us Through Our Cellphones? Lawsuit Seeks Answers
Matt Richtel

How widely is the U.S. government using cell phones to pinpoint the locations or track the movements of Americans, or people living on American soil?

In November 2007, the American Civil Liberties filed a Freedom of Information Act request with the Department of Justice seeking records related to such tracking practices. The DOJ did not provide the requested information, the ACLU said.

And so Tuesday, the ACLU and the Electronic Frontier Foundation filed a lawsuit in federal court to try to force the DOJ to comply.

In a press release, the ACLU said that the information about how and how often the government tracks Americans using cell phones needs to come to light to determine if the efforts are unconstitutional.

The ACLU said it filed the initial data request after media reports showed that some government officials were claiming not to require “probable cause” of a crime being committed before getting court permission to do real-time tracking of cell phones.

Specifically, the civil-liberties group said, it based its request on an article I wrote in December 2005. That article discussed the discomfort that some courts were feeling about the government’s use of cell-phone tracking technology. In that story, legal officials said that some judges wanted government investigators to show probable cause.

As I noted in that article, the government can get such information from cellular operators, like Verizon Wireless and AT&T, which generally know the location of their subscribers within about 300 feet when their phones are turned on.

Such tracking information could be critical, prosecutors have said, to finding suspects or corroborating their whereabouts. And prosecutors have said that there already are legal protections in place to prevent law enforcement from tracking at will, without cause.

But the ACLU and the EFF, an organization that focuses on Internet and technology law, said that the public has an “overwhelming interest” in finding out how often the government is seeking to track Americans and why. If the information is withheld, it distances Americans from the decision-making process about how and when tracking should be permitted, the legal advocates said.

“Further delays will allow important privacy polices to be developed behind closed doors,” said David L. Sobel, senior counsel to the EFF.
http://bits.blogs.nytimes.com/2008/0...ers/index.html





Judge Rejects Bush’s View on Wiretaps
Eric Lichtblau

A federal judge in California said Wednesday that the wiretapping law established by Congress was the “exclusive” means for the president to eavesdrop on Americans, and he rejected the government’s claim that the president’s constitutional authority as commander in chief trumped that law.

The judge, Vaughn R. Walker, the chief judge for the Northern District of California, made his findings in a ruling on a lawsuit brought by an Oregon charity. The group says it has evidence of an illegal wiretap used against it by the National Security Agency under the secret surveillance program established by President Bush after the terrorist attacks of Sept. 11, 2001.

The Justice Department has tried for more than two years to kill the lawsuit, saying any surveillance of the charity or other entities was a “state secret” and citing the president’s constitutional power as commander in chief to order wiretaps without a warrant from a court under the agency’s program.

But Judge Walker, who was appointed to the bench by former President George Bush, rejected those central claims in his 56-page ruling. He said the rules for surveillance were clearly established by Congress in 1978 under the Foreign Intelligence Surveillance Act, which requires the government to get a warrant from a secret court.

“Congress appears clearly to have intended to — and did — establish the exclusive means for foreign intelligence activities to be conducted,” the judge wrote. “Whatever power the executive may otherwise have had in this regard, FISA limits the power of the executive branch to conduct such activities and it limits the executive branch’s authority to assert the state secrets privilege in response to challenges to the legality of its foreign intelligence surveillance activities.”

Judge Walker’s voice carries extra weight because all the lawsuits involving telephone companies that took part in the N.S.A. program have been consolidated and are being heard in his court.

Jon Eisenberg, a lawyer for Al-Haramain Islamic Foundation, the plaintiff in the case, said the legal issues Judge Walker’s ruling raised were significant. “He’s saying FISA makes the rules and the president is bound by those rules,” Mr. Eisenberg said.

A Justice Department official said the department was reviewing the opinion late Wednesday and would consider its options.

Officials at Al-Haramain say they were mistakenly given a government document revealing the N.S.A. operation. The Federal Bureau of Investigation demanded the document back, and Judge Walker’s ruling made it more difficult for Al-Haramain to use what it claims to have seen . But he refused to throw out the lawsuit, giving the charity’s lawyers 30 days to restructure their claim. “We still have our foot in the door,” Mr. Eisenberg said. “The clock is a minute to midnight, but we’ve been there before and survived.”

The ruling comes as the Senate is overhauling the foreign intelligence law. The measure would reaffirm FISA as the exclusive means for the president to order wiretaps through court warrants, but it would also provide legal immunity to phone companies involved in the eavesdropping program. A vote could come Tuesday.

The immunity issue would not directly affect this lawsuit because Al-Haramain is suing the government, not the phone companies. But the nearly 40 other lawsuits against phone companies that Judge Walker is overseeing would almost certainly have to be dismissed if immunity is signed into law, legal analysts say.
http://www.nytimes.com/2008/07/03/wa...on/03fisa.html





Telecom Amnesty Foes Lobby Obama Using Obama Tech
Ryan Singel

An online campaign to scuttle a deal giving retroactive amnesty to telecoms that helped the government warrantlessly wiretap Americans is growing in strength, catching Senator Barack Obama between the Netroots that helped vaunt him to the nomination and a presidential campaign desire to seem strong on national security.

Last year, Obama won accolades from the netroots by vowing to fight against any bill that granted retroactive amnesty to the telecoms that helped the government warrantlessly spy on Americans.

But last week, portions of the netroots revolted when Obama changed his stance regarding the current version of the bill, saying that while he would fight against amnesty, he would vote for the final bill regardless because exanding the spying powers of the Foreign Intelligence Surveillance Act was necessary for national security.

Obama credied the netroots for improving the bill.

"By demanding oversight and accountability, a grassroots movement of Americans has helped yield a bill that is far better than the Protect America Act," Obama said in a written statement last week.

Those changes and words weren't enough for some his supporters, who created an action group on my.barackobama.com called "Senator Obama - Please Vote No on Telecom Immunity."

That's the senator's own site to motivate supporters to create groups that can take action on their own.

Though just created on June 25, it has quickly grown to quickly grown to being the fifth largest out of more than 7,000 groups, with more than 4,700 members as of Monday morning. That's just one place short of the Women for Obama group.

Len in Indy summed up the groups sentiment in an open letter to Obama on the group's blog, writing:

I have worked for your nomination and voted for you, as I did when I lived in Illinois. This has been the election I have been waiting for - one about hope and about change. I do hope I am right about change.

I understand politics and the need to compromise,[...]

However, there must be some point, there must be some principles, there must be some line that you do not cross. In my view, the new FISA bill is that. It is a simple attempt to camouflage the spineless response of a Democratic congress that is afraid to stand up to the President on civil liberties and is happy to allow any corporation to be blameless for violating our basic rights.

So, I ask myself, why would Senator Obama and the other Democrats cave in to the President. The answer that comes to mind most quickly is the "politics of fear". Are you afraid of being labeled "soft on terrorism"?

A quick survey of the members shows that many of them are new to the Obama site, and were likely motivated to create a profile due to posts at prominent left-leaning blogs Talking Points Memo, Open Left and Daily Kos. But the list of members also includes some of the most influential Netroots bloggers including Matt Stoller and Jerome Armstrong.

Meanwhile prominent lefty blogger Glenn Greenwald and Jane Hamsher of Firedoglake, along with other lefty bloggers and libertarian-leaning fellow anti-immunity travelers, have raised more than $325,000 to fight the FISA bill.

Their Blue America PAC is already targeting House Democrats who voted for the bill, including placing a full-page ad in The Washington Post slamming House Majority Leader Steny Hoyer, who claimed credit for creating the so-called compromise bill. The coalition plans to follow-up with a Ron Paul-style money bomb, which will be used to target key senators, according to Greenwald.

The Senate is set to take up the bill, along with a few amendments to limit or strike the amnesty clause, on July 8. The bill is widely expected to pass, and in February, similar amendments to strip or limit the immunity failed to pass.

That leaves a little more than a week to see how Obama, now one of the leaders of his party, responds to the new technological revolution in politics that he has championed.

As OpenLeft contributor Mike Stark writes:

The really cool thing about all of this technology? It is exactly what Barack Obama wants to see happen; it comports perfectly with his vision of an engaged electorate. Over and over again on the campaign trail, Obama has talked about what YOU have done. He aspires to represent "we, the people" and consistently disparages the old system of lobbyist-fueled special interest politics. So...

If you want to be the change you desire, take a few seconds, visit this group and sign up. It'll provide Barack Obama with an unprecedented opportunity to lead by listening to the people.

The Obama campaign did not return a call seeking comment.
http://blog.wired.com/27bstroke6/200...m-amnes-1.html





Obama Voters Protest His Switch on Telecom Immunity
James Risen

Senator Barack Obama’s decision to support legislation granting legal immunity to telecommunications companies that cooperated with the Bush administration’s program of wiretapping without warrants has led to an intense backlash among some of his most ardent supporters.

Thousands of them are now using the same grass-roots organizing tools previously mastered by the Obama campaign to organize a protest against his decision.

In recent days, more than 7,000 Obama supporters have organized on a social networking site on Mr. Obama’s own campaign Web site. They are calling on Mr. Obama to reverse his decision to endorse legislation supported by President Bush to expand the government’s domestic spying powers while also providing legal protection to the telecommunication companies that worked with the National Security Agency’s domestic wiretapping program after the Sept. 11 attacks.

During the Democratic primary campaign, Mr. Obama vowed to fight such legislation to update the Foreign Intelligence Surveillance Act, or FISA. But he has switched positions, and now supports a compromise hammered out between the White House and the Democratic Congressional leadership. The bill is expected to come to a vote on the Senate floor next Tuesday. That decision, one of a number made by Mr. Obama in recent weeks intended to position him toward the political center as the general election campaign heats up, has brought him into serious conflict for the first time with liberal bloggers and commentators and his young supporters.

Many of them have seen the issue of granting immunity to the telecommunications companies as a test of principle in their opposition to Mr. Bush’s surveillance program.

“I don’t think there has been another instance where, in meaningful numbers, his supporters have opposed him like this,” said Glenn Greenwald, a Salon.com writer who opposes Mr. Obama’s new position. “For him to suddenly turn around and endorse this proposal is really a betrayal of what so many of his supporters believed he believed in.”

Jane Hamsher, a liberal blogger who also opposes immunity for the phone companies, said she had been flooded with messages from Obama supporters frustrated with his new stance.

“The opposition to Obama’s position among his supporters is very widespread,” said Ms. Hamsher, founder of the Web site firedoglake.com. “His promise to filibuster earlier in the year, and the decision to switch on that is seen as a real character problem. I know people who are really very big Obama supporters are very disillusioned.”

One supporter, Robert Arellano, expressed his anger on the Obama site.

“I have watched your campaign with genuine enthusiasm,” Mr. Arellano wrote, “and I have given you money. For the first time in my life, I have sensed the presence of a presidential candidate who might actually bring some meaningful change to the corrupt cesspool of national politics. But your about-face on the FISA bill genuinely angers and alarms me.”

For now, the campaign is trying to put a positive spin on the new FISA fight among its supporters.

“The fact that there is an open forum on BarackObama.com where supporters can say whether they agree or disagree speaks to a strength of our campaign,” said Bill Burton, a campaign spokesman.

Several activists and bloggers predicted that Mr. Obama’s move toward the center on some issues could sharply reduce the intensity of support he has enjoyed from liberal activists. Such enthusiasm helped power his effort to secure the Democratic nomination, and it has been one of his campaign’s most important tools for fund-raising and organizing around the country.

Markos Moulitsas, a liberal blogger and founder of the Daily Kos Web site, said he had decided to cut back on the amount of money he would contribute to the Obama campaign because of the FISA reversal.

“I will continue to support him,” Mr. Moulitsas said in an interview. “But I was going to write him a check, and I decided I would rather put that money with Democrats who will uphold the Constitution.”

Greg Craig, a Washington lawyer who advises the Obama campaign, said Tuesday in an interview that Mr. Obama had decided to support the compromise FISA legislation only after concluding it was the best deal possible.

“This was a deliberative process, and not something that was shooting from the hip,” Mr. Craig said. “Obviously, there was an element of what’s possible here. But he concluded that with FISA expiring, that it was better to get a compromise than letting the law expire.”
http://www.nytimes.com/2008/07/02/us...cs/02fisa.html





Copying Issue Raises Hurdle for Bush Pick
Adam Liptak

As chief counsel to the Senate Judiciary Committee, Michael E. O’Neill helped steer the Supreme Court nominations of John G. Roberts Jr. and Samuel A. Alito Jr. through the confirmation process. An expert on judicial nominations, Mr. O’Neill later spoke with pride to a legal magazine about helping place “some difficult federal judicial nominees” onto the lower federal courts.

The shoe is now on the other foot. President Bush nominated Mr. O’Neill to be a judge on the Federal District Court here last month, and there are signs that his nomination might be a difficult one as well.

Last year, a peer-reviewed legal journal, the Supreme Court Economic Review, issued a retraction of an article by Mr. O’Neill in 2004. “Substantial portions” of the article, the editors wrote, were “appropriated without attribution” from a book review by another law professor. In addition, at least four articles by Mr. O’Neill in other publications contain passages that appear to have been lifted from other scholars’ works without quotation marks or attribution.

Long passages in the 2004 article are virtually identical to the book review, which was published in 2000 in the Virginia Law Review and was written by Anne C. Dailey, a law professor at the University of Connecticut.

For instance, Professor Dailey wrote: “Bounded rationality is not a refutation of the rational actor model; to the contrary, it attempts to fine-tune the model to take account of predictable cognitive limitations and biases. Despite occasional references to irrationality in the literature, there is nothing in fact irrational about bounded rationality.”

Four years later, Mr. O’Neill wrote this, without quotation marks or attribution to Professor Dailey: “Bounded rationality is not a refutation of the rational actor model; to the contrary, it seeks to recalibrate the neoclassical model to take account of predictable cognitive limitations and biases. Despite occasional references to irrationality in the literature, there is nothing especially irrational about bounded rationality.”

In an interview on Thursday in the dining room of his home in Chevy Chase, Md., Mr. O’Neill was contrite about the duplications, blaming “a poor work method.” He said he often mingled research materials and his own work in a single computer file. “I didn’t keep appropriate track of things,” he said. “I frankly did a poor and negligent job.”

Mr. O’Neill, a boyish 46-year-old who wore jeans and a wrinkled blue button-down shirt, said he had never knowingly passed off other scholars’ statements as his own. “So much of it is sort of dry and straightforward stuff,” he said. “To me, it all sounds generic and plain. I didn’t catch it.”

Deborah L. Rhode, an authority on legal ethics at Stanford, said the retraction by the Supreme Court Economic Review was “extremely unusual” and amounted to “a textbook case of conduct that casts doubt on someone’s fitness for judicial office.”

“That’s a serious form of misconduct in an academic career,” Ms. Rhode said. “I would think it would be viewed equally seriously in a judicial career. In my judgment, that would be disqualifying.”

In an interview, Senator Arlen Specter, the Pennsylvania Republican who was chairman of the Judiciary Committee until last year, said he had known for some time about the questions concerning Mr. O’Neill’s scholarship.

“I heard him out on it and put it in the balance of everything else I knew about him,” Mr. Specter said. “I believe he is an excellent prospect for the district court.”

“He was my chief counsel and staff director at a very difficult time,” Mr. Specter continued, referring to the nominations of Chief Justice Roberts and Justice Alito, the withdrawn Supreme Court nomination of Harriet E. Miers and a host of legal issues, including civil rights, bankruptcy and asbestos litigation.

Mr. Specter said Mr. O’Neill’s nomination “has been thoroughly vetted on a number of levels,” including by the Federal Bureau of Investigation and the White House. “I was told it went to the president,” he said.

Emily A. Lawrimore, a White House spokeswoman, said Mr. O’Neill had been “completely forthcoming” from the start of the vetting process and had “expressed remorse for his actions.”

“He was highly recommended to President Bush,” Ms. Lawrimore said of Mr. O’Neill, “and the president is confident he will make an excellent judge.”

Friends and colleagues describe Mr. O’Neill as a creative, fair and exceptionally able lawyer. He is a graduate of Brigham Young University and Yale Law School, and he served as a law clerk to Justice Clarence Thomas on the Supreme Court and Judge David B. Sentelle of the United States Court of Appeals for the District of Columbia Circuit. He is working on a master’s degree in writing fiction.

The flawed 2004 article was not an isolated incident. Passages in the other articles by Mr. O’Neill, now an associate professor at George Mason University School of Law, also bear striking similarities to other scholars’ work.

Shown a copy of a 2000 article by Mr. O’Neill in the Brigham Young University Law Review, Gerald M. Caplan, a former Justice Department official and former dean of the McGeorge School of Law in Sacramento, said it included a verbatim reproduction of a passage from a 1985 article he wrote in the Vanderbilt Law Review. Mr. O’Neill did not quote or cite Professor Caplan.

“Well, he’s got me word for word,” Professor Caplan said.

“And there is some evidence that it’s not innocent or inadvertent,” he added, referring to the nature and extent of the duplication.

“It shows him to disadvantage,” Professor Caplan said. “If I were on the Judiciary Committee, I would want to know more.”

Similarly, parts of a 2000 article by Mr. O’Neill in the George Mason Law Review bear a striking similarity to a 1997 article in the Michigan Law Review by Neal Kumar Katyal.

Professor Katyal, of the Georgetown University Law Center, said he knew Mr. O’Neill and admired him.

“Mike is an innovative thinker and has always had integrity in my many dealings with him,” Professor Katyal said. “I can’t imagine that he would intentionally copy this banal point from my article.”

Daniel D. Polsby, an editor of the Supreme Court Economic Review and the dean of the George Mason School of Law, said he had learned about the similarities to the book review in a letter from its author, Professor Dailey. (Professor Dailey declined to comment.)

“It was my opinion at the time that this was negligent behavior,” Dean Polsby said, “and he was duly chastised. The idea of O’Neill committing a theft is just impossible. It’s just impossible.”

But the law school and Mr. O’Neill agreed that the lack of attribution in the article would have serious consequences for him as a law professor. “By agreement, by a handshake,” Dean Polsby said, “he stepped away from tenure and will reapply for it.”

Mr. O’Neill said the law school’s investigation concluded that his conduct had not been willful.

“The range of possible sanctions was a hug and a cookie to firing you,” he said. “They felt like it was a significant mistake on my part. They didn’t think it was intentional.”

Asked how he would have viewed a judicial nominee like himself in his old job on the Judiciary Committee, Mr. O’Neill answered elliptically.

“I’ve tried to have a decent reputation with people,” he said. “It’s certainly my fault. You’d like to be not just defined by the mistakes that you make in life.”
http://www.nytimes.com/2008/07/04/wa...hp&oref=slogin





Limbaugh and Clear Channel in $400 Million Deal
Brian Stelter

Striking a deal estimated to be worth $400 million through 2016, the conservative talk radio host Rush Limbaugh has renewed his contract with Clear Channel Communications and its syndication subsidiary Premiere Radio Networks.

The contract renewal was announced Wednesday by the companies, and the financial details were provided by Mr. Limbaugh in an interview with The New York Times Magazine for an article to be published on Sunday. In the interview, Mr. Limbaugh said the new contract would pay him about $38 million a year for eight years. He also said he would receive a $100 million signing bonus.

The deal, which comes a month shy of the 20th anniversary of “The Rush Limbaugh Show,” reiterates Mr. Limbaugh’s position as the nation’s leading purveyor of political talk radio. His new contract is believed to be the most expensive in radio since 2004, when Sirius Satellite Radio paid Howard Stern $100 million a year for five years. That deal, however, also covered the staff, production and studio costs for Mr. Stern’s show.

“First and foremost I’m a businessman,” Mr. Limbaugh told Zev Chafets, the writer of the magazine profile. “My first goal is to attract the largest possible audience so I can charge confiscatory ad rates. I happen to have great entertainment skills, but that enables me to sell airtime.”

Mr. Limbaugh reaches an audience of nearly 20 million listeners. His program is syndicated on about 600 radio stations nationwide and the contract renewal will assure that “The Rush Limbaugh Show” continues for several years to come.

Mr. Limbaugh’s existing contract, which was worth $285 million over a nine-year period, was set to expire next year.

“Broadcasters of Rush’s quality come along once in a lifetime,” John Hogan, the chief executive of Clear Channel Radio, said Wednesday in a statement. “We’re privileged to continue our relationship which is unprecedented in the history of our industry.”

Suffering from sluggish advertising sales and a consumer base that has embraced iPods and other forms of media, the terrestrial radio industry relies on a bench of heavy-hitting stars, like Mr. Limbaugh, to attract audiences.

“The terrestrial radio industry must provide the best possible programming, or it will not survive in the face of the competition on the Internet and from other new technologies,” said Michael Harrison, the editor of the radio industry publication Talkers Magazine, in an interview on Wednesday. “The industry has to make sure it has the major league stars in broadcasting; therefore, it makes sense that the most money and the longest contract would go to the biggest star in radio today, and that’s Rush.”
http://www.nytimes.com/2008/07/03/bu...a/03radio.html





More Politicians Ask FCC For Satellite Merger Conditions
FMQB

Three Democratic Senators and five Democrats from Minnesota are the latest politicians to support the combination of HD Radio technology with new satellite radio receivers, if the XM-Sirius merger is passed. Sens. John Kerry (D-MA), Claire McCaskill (D-MO) and Ben Cardin (D-MD) have co-signed a letter to FCC Chairman Kevin Martin, voicing their concerns over the proposed merger. The senators say that the inclusion of HD Radio technology in future satellite receivers is "an essential check against the merged entity using its monopoly power to stifle a promising new free, over-the-air technology." They also take issue with the plan to lease a number of channels to minority and non-commercial programming, asking for a greater percentage of the total spectrum to be leased, up to 20 or even 50 percent. However, the Senators conclude their letter by saying the FCC's best possible action would be to just reject the merger.

Five House Democrats from Minnesota have also written to Chairman Martin, echoing many of the same concerns. Reps. Timothy Walz, Betty McCollum, Keith Ellison, Collin Peterson and James Oberstar also suggest leasing out a larger percentage of the total satellite radio spectrum, as well as incorporating HD Radio capabilities into future satellite radios.

In other satellite merger news, Sirius announced on Monday that it sees approximately $400 million in savings for 2009, if it is allowed to merge with XM. According to Reuters, Sirius predicts the deal will close sometime in the third quarter of '08.
http://fmqb.com/Article.asp?id=771643





RIAA Suggestions for Content of ACTA

These are the substantive suggestions for provisions of the ACTA that the RIAA sent to the USTR on March 17, 2008.

Enforcement Best Practices

A.Legal Obligations
Parties shall:
1. Make deterrence against piracy and counterfeiting a priority legal matter.
2. Provide criminal sanctions for any act of copyright infringement that takes place on a commercial scale, including in the online environment, regardless of whether such acts are undertaken with a financial incentive.
3. Make it a criminal offense to import or export, manufacture, sell or otherwise distribute a device or system, or a component of a device or a system, knowing or having reason to know that the device or system is primarily used or designed to circumvent technological protection measures used in conjunction with materials protected by intellectual property rights.
4. Provide monetary fines and sentences of imprisonment for the importation, exportation, distribution, sale or other manner of making available of counterfeit or pirated goods sufficient to deter future infringements, consistent with a policy of removing the infringer's monetary incentive.
5. Provide for the availability of civil and injunctive relief against landlords that fail to reasonably exercise their ability to control the infringing conduct of their tenants.
6. In territories with high rates of production of pirated optical discs, provide for a system of licensing prior to the manufacture or export of optical discs, as well as the import or export of manufacturing equipment, and manufacturing materials, including optical grade polycarbonate, "stampers" and "masters."

B.Investigatory Provisions
Parties shall:
1. Provide law enforcement authorities ex officio powers to investigate criminal infringements of intellectual property rights and initiate criminal actions on their own initiative.
2. Permit law enforcement authorities, both at the border and internally, to seize clearly infringing copyright and trademark materials and to seize and/or place under seal equipment or materials suspected of being used to produce such infringing copies without the need for a complaint from the right holder, and without regard to whether protected materials have been recorded or otherwise registered with border authorities.
3. Allow law enforcement officials to communicate and share information with right holders with respect to material evidence of infringement of intellectual property that officials have in their possession.
4. Ensure that courts have the authority to issue ex parte search orders.
5. Provide that orders by judicial authorities need not individually identify the items subject to seizure, so long as they fall within general categories specified in the order.

C. Border Control
Parties shall:
1.Provide that goods that have been determined to be pirated or counterfeit by competent authorities at the border shall be destroyed, except in exceptional cases.
2. In no event authorize their border authorities, except in exceptional circumstances (such as to facilitate a controlled delivery or other law enforcement operation), to permit the exportation or transshipment of counterfeit or pirated goods.
3. Provide that competent authorities have the authority to initiate border measures ex officio, with respect to imported, exported, or in-transit merchandise suspected of being counterfeit or confusingly similar trademark goods, or pirated copyright goods, without the need for a formal complaint from a private party or right holder, and regardless of whether the relevant right that is being infringed is recorded with Customs otherwise registered.
4. In civil judicial proceedings concerning the enforcement of intellectual property rights, provide that judicial authorities have the authority to order a party to desist from an infringement, in order, inter alia, to prevent, immediately after they clear customs, the entry into the channels of commerce in the jurisdiction of those authorities of imported goods that involve the infringement of an intellectual property right, or to prevent their exportation.

D.Seizure of Materials
Parties shall:
1. Provide that judicial authorities have the authority to order the seizure of suspected counterfeit, pirated or other infringing goods, any related materials and implements including that used in the commission of the offense, any assets traceable to the infringing activity, and any documentary evidence relevant to the offense.
2. Provide that orders by judicial authorities need not individually identify the items subject to seizure, especially when the seizure involves a large amount of infringing items, so long as they fall within general categories specified in the order.
3. Allow for ex parte freeze orders to give the territory's authorities and rights holder an opportunity to ensure that infringer's profits are confiscated and that monetary damages are recoverable.

E. Destruction of Materials Determined to be Pirated or Counterfeit
Parties shall:
1. Provide that goods that have been determined to be pirated by competent authorities shall be destroyed, except in exceptional circumstances.
2. Provide that courts shall confiscate and destroy the equipment used for the manufacture of pirated goods in order to ensure that infringing parties do not repeat their illegal activities,
3. Provide that goods determined to be infringing are subject to forfeiture and destruction regardless of whether any action for infringement is initiated, whether civil, administrative or criminal and without any compensation of any kind to the defendant, and regardless of whether there has been any finding of liability on the part of any person.

F.Evidentiary Standards
Parties shall:
1. Provide that the person whose name is on the protected material is presumed to be the relevant right holder.
2. Provide that proof of ownership may be obtained by means of an affidavit, unless this issue is placed into question by material evidence to the contrary.
3. Provide that the presumption of ownership may be rebutted only if the defendant is able to provide concrete evidence to the contrary.1
4. As a deterrent to groundless defenses, award plaintiffs full costs and fees for overcoming frivolous challenges to titles.

G. Transparent Judicial Proceedings, Policies and Guidelines
Parties shall:
1. Provide clear, transparent, and predictable judicial proceedings, policies, and guidelines related to intellectual property enforcement.
2. Provide that final judicial decisions and administrative rulings of general application pertaining to the enforcement of intellectual property rights be in writing and state any relevant findings of fact and reasoning or the legal basis on which the decision or rulings are based.
3. Publicize information on their efforts and actions to provide effective enforcement of intellectual property rights in their civil, administrative, and criminal systems, including any statistical information that may be collected for such purpose.
4. Publish information related to respective intellectual property enforcement actions, including relevant statistical information.

H.Penalties
Parties shall:
1. Establish policies or guidelines that encourage judicial authorities to impose remedies at levels sufficient to deter future infringements and to adequately compensate right holders, particularly bearing in mind that many large scale infringements are properly understood as criminal conspiracies and/or organized crime.
2. Establish statutory minimum and maximum penalties that are adequate to deter persons that engage or contemplate engaging in acts of piracy.
3. Provide, whenever law enforcement authorities' investigatory powers are dependent on the level of minimum/maximum penalties available for criminal infringements, that criminal penalties are set at a level that ensures that law enforcement authorities have adequate powers to investigate copyright infringements. For example, penalties should be set at a level that ensures that law enforcement officials have the authority to initiate investigations, search prel1Jises, seize goods, and arrest suspects of criminal activity.
4. Continuously monitor the level of fines imposed and where necessary issue sentencing guidelines to ensure that fines imposed by the judicial authorities remove all gains from the infringer and deter future infringements.
5. Provide that right holders are entitled to recover their costs of investigation and litigation against infringers of intellectual property rights.
6. Provide that courts have the authority to close commercial outlets and manufacturing plants that have been used to manufacture or distribute pirate or counterfeit products.
7. In criminal matters, provide that competent authorities keep an inventory of goods and other materials proposed to be destroyed, and have the authority temporarily to exempt such materials from the destruction order to facilitate the preservation of evidence upon notice by the right holder that it wishes to bring a civil or administrative case for damages.

I. Monitoring Activities
Parties shall:
1. With respect to A.1 above, provide adequate safeguards against the unauthorized manufacture of infringing optical discs, and provide that facilities producing such products comply with the standards established by the association of replicators (IRMA) in their Anti-Piracy Compliance Program.
2. Compel manufacturers of optical discs in their territory to maintain complete and accurate records to enable right holders and public authorities to trace the person or entity that ordered the infringing discs.
3. Require that OD replicators apply unique source identification codes to all optical discs, including master discs and stampers. Secure and unique identifiers enable the tracing of the source of a product and provide a deterrent against piracy.

J. Online Infringing Activities

Parties shall:
1. Provide exclusive rights under copyright to unambiguously cover Internet use.
2. Establish appropriate rules regarding liability of service/content providers:
(a) Establishing primary liability where a party is involved in direct infringement; and ensure the application of principles of secondary liability, including contributory liability and vicarious civil liability, as well as criminal liability and abetting if appropriate.
(b) Establishing liability for actions which, taken as a whole, encourage infringement by third parties, in particular with respect to products, components and/or services whose predominant application is the facilitation of infringement.
3. Provide remedies and injunctive relief against any entity that:
(a) Creates or otherwise maintains directories of infringing materials;
(b) Provides "deeplinks" to infringing files;
(c) Commits any act, practice or service that has little or no purpose or effect other than to facilitate infringement, or that intentionally induces others to infringe (specifically allowing proof of "intent" by reference to objective standards--i.e. a reasonable person would surmise such an intent);
4. Require internet service providers and other intermediaries to employ readily available measures to inhibit infringement in instances where both legitimate and illegitimate uses were facilitated by their services, including filtering out infringing materials, provided that such measures are not unduly burdensome and do not materially affect the cost or efficiency of delivering legitimate services;
5. Require Internet service providers or other intermediaries to restrict or terminate access to their systems with respect to repeat infringers.
6. Establish liability against internet service providers who, upon receiving notices of infringement from content provides via email, or by telephone in cases of pre-release materials or in other exigent circumstances, fail to remove the infringing content, or access to such content, in an expeditious manner, and in no case more than 24 hours;

or

Provide that, in the absence of proof to the contrary, an internet service provider shall be considered as knowing that the content it stores is infringing or illegal, and thus subject to liability for copyright infringement, after receiving notification from the right holder or its representative, normally in writing, including by email or by telephone in the case of pre-release materials or in other exigent circumstances.
7. Establish, adequately fund and provide training for a computer crimes investigatory unit.
8. Provide injunctive relief against intermediaries whose services are used for infringing activities regardless of whether damages are available.
9. Establish policies against the use of government networks and computers, as well as those networks and computers of companies that have government contracts, to prevent the use of such computers and networks for the transmission of infringing materials, including a ban on the installation of p2p applications except, and to the extent to which, some particular government use requires such installation.
10. Consideration to be given to the following: possible rules on data retention, the right to information giving right holders access to data held by ISPs in the preparation and course of proceedings including in civil proceedings, and availability of complete and accurate WHOIS data.

K. Organizational Issues
Parties shall:

1. Establish anti-piracy units, including at a minimum Police and Customs officers. Such units will gather intelligence on IP crime in order to facilitate policy formulation and generate criminal investigations. Units would be expected to prepare annual reports on the criminal environment in the key IP sectors. This would document key facts on manufacturing sources and distribution networks, including any international links/exports. References would be made, inter alia, to key personalities, organized crime groups, and links to terror networks.
2. Establish single point of contact for law enforcement officials from other countries, as well as for afflicted right holders.
http://www.keionline.org/index.php?o...sk=view&id=190





RIAA's ACTA Wishlist Includes Gutted DMCA, Mandatory Filters
Nate Anderson

You can't see the text of the proposed Anti-Counterfeiting Trade Agreement (ACTA) because it's being drafted in secret, but it's not so secret that the RIAA doesn't get to submit its own wishlist to the government. Knowledge Ecology International, an NGO that works on trade and public knowledge, published the alleged list (hat tip to Michael Geist) late last week. I hope you like mandatory ISP filtering.

Filters aren't just for faucets

William Patry, Google's top copyright lawyer, wrote recently about news from several sources that indicated such ISP filtering language was making its way into the text of the treaty. The RIAA certainly hopes so, asking the government to require "Internet service providers and other intermediaries to employ readily available measures to inhibit infringement in instances where both legitimate and illegitimate uses were facilitated by their services, including filtering out infringing materials, provided that such measures are not unduly burdensome and do not materially affect the cost or efficiency of delivering legitimate services."

Of course, "repeat infringers" should also have their Internet connections cut off, and ISP liability (both direct and secondary) would be increased, and any "deeplinking" to infringing content could incur liability. That last provision should go over really well with search engines.

The RIAA's points, taken in tandem, seem aimed at gutting the best part of the DMCA (yes, it wasn't all bad), the "safe harbor" rules that gave ISPs immunity from material passing through their networks. In the RIAA's world, ISPs would themselves become filters and enforcers, cutting off users and immediately removing access to material based simply on a phone call. In addition, P2P use would be generally banned on government computers.

Lock up the polycarbonate

It's not just Internet users and ISPs that would feel the heat, though; traditional CD stampers are still targets. The RIAA suggests that countries "with high rates of production of pirated optical discs" be required to institute a licensing system that would control both the manufacture and export of discs—even supplies of optical grade polycarbonate would be restricted.

Replicators around the world would also be required to "maintain complete and accurate records" so that rightsholders could figure out who ordered a batch of infringing discs, and unique ID codes would need to stamped into each disc for easier tracking.

Don't ask, don't tell

As we've noted in our past ACTA coverage, the hysteria over "iPod-searching border guards" seems largely misplaced. The real rightsholder concerns here are to crack down on big pirate stamping operations on the one hand, and Internet P2P use on the other. Unfortunately, while rightsholders appear to have access to government treaty-makers, the public has been largely excluded from the process so far.

That might be less important when trade deals are really of concern only to specific industries, but the Internet, it's fair to say, has broader applications than swapping copyrighted songs. Is it really too much ask that the billions of users this might affect get a say in the treaty before it emerges full-grown into the light of day?
http://arstechnica.com/news.ars/post...-wishlist.html





Court Hits BitTorrent Users Who Failed to Appear
enigmax

Last week, lawyers Davenport Lyons who are currently threatening hundreds of BitTorrent users with legal action, tasted victory in Central London County Court with wins in cases against four file-sharers. Fortunately, these ‘victories’ mean little, as Davenport chose not to go after people who defend themselves, instead picking on people they knew wouldn’t even come to court.

To those in the BitTorrent community, the name Davenport Lyons will be familiar. The London-based lawyers are responsible for a barrage of threatening letters sent to hundreds of alleged file sharers. They want people who they accuse of uploading Dream Pinball 3D, Colin McRae Dirt and Call of Juarez to comply with their demands, which means accepting that the highly-suspect evidence provided by anti-piracy tracking company Logistep is actually correct, promising never to share files again and then paying several hundred pounds to Davenport Lyons to call off the legal action.

Several individuals accused by Davenport in the Dream Pinball 3D case have access to some formidable resources and are actually relishing the opportunity of having their day in court. However, as we recently reported, Davenport Lyons like to carefully pick their prey - they simply cannot afford to lose a case due to faulty evidence. TorrentFreak is in contact with many people who are accused by Davenport of uploading, and it’s becoming apparent that people who dig in their heels - who refuse to be intimidated and refuse to be bullied - are mysteriously left alone and not taken to court.

But before we get carried away, here’s some sobering news. Last Friday, seemingly against all the odds and proving our previous articles completely wrong, Davenport Lyons achieved court victories against four file-sharers it accused of unauthorized distribution of Topware’s Dream Pinball 3D.

David Gore, a partner at Davenport Lyons said: “Copyright owners spend millions of pounds developing copyright works for sale to the public for their enjoyment and yet many think it is acceptable to obtain the work illegally and for free by procuring a copy on a peer-to-peer network.”

The four were hit with fines of £750 each - to be paid within a week - along with £2000 costs. Ouch. Surely these historic victories would now open the flood gates to enable the lawyers and anti-pirates to absolutely hammer the hundreds of people who also stand accused?

Well, not quite, no. Not even close.

The victories claimed by Davenport Lyons at Central London County Court on behalf of publisher Topware were all achieved by way of so-called ‘default judgment’. In basic terms, this means that as the individuals accused didn’t bother to turn up at court or even answer court documents, the court had no alternative than to hand victory to Davenport Lyons and Topware.

The remaining several hundred people accused of file-sharing by Davenport Lyons will be heartened to know that the company only has the confidence to go after people it knows will not turn up at court, assuring them of victory.

Loading up its metaphorical gun and getting ready to fire more legal bullets into a small barrel of defenseless fish, Davenport says it has more of these cases lined up to ‘win’ later on this week, while everyone else stands around yawning wondering when they’ll pick on someone who will actually fight back.

If you are one of the four who lost their case last Friday or have been served with court documents to appear in the future, please get in touch via the contact page, we want to speak with you.
http://torrentfreak.com/court-hits-b...appear-080702/





Download Revolution Busted
Thomas Mennecke

There’s an ominous shift in the copyright enforcement tactics used by the entertainment industry. While BitTorrent busts seem to come cheap these days, a significant number of the entertainment hungry populace have abandoned this protocol in exchange for file-sharing communities that use upload sites such as MegaUpload.com and RapidShare. Such was the case for DownloadRevolution.net, where nearly 30,000 individuals traded prime entertainment in a forum environment.

The diversification of file-sharing towards centralized, upload based websites like RapidShare has its benefits. Because these sites are download only, there is little concern for the end user. Downloaders have historically faced virtually no enforcement action – an action generally reserved for uploaders. Secondly, there are no upload bandwidth considerations, allowing the end user to download rather large files without consuming tremendous amounts of bandwidth. And because the files are stored in a centralized repository, there’s often times little concern whether the file will download in a manageable amount of time. Like Usenet, if the file is viable, it will download as fast as the end user’s download speed.

These incentives have driven many individuals away from BitTorrent and P2P and towards centralized resources such as DownloadRevolution.net and Usenet. However this convenience comes at a price. Today, Italian police raided the home administration of DownloadRevolution.net, arresting 4 individuals. According to one translated Italian report, 3 of the 4 individuals were “children”, however, their ages weren’t divulged. The raid on the administration’s home resulted in the seizure of 17 computers, 3 external hard disks, 1 memory card, 486 CD-ROMs and DVDs and, according to the difficult to read translation, about 5,700 unauthorized duplications. According to the police and the prosecution, their investigation revealed that over “6,405 works protected by copyright between music files, videos, games, software and various movies” were traded, most of which were music files.

The raid and closure of DownloadRevolution.net highlights the benefits and deficiencies of P2P networking. Although P2P and BitTorrent can be slow at times, its decentralized nature ensures its longevity. Centralized trading sites like DownloadRevolution.net can provide blazing speeds and near-guaranteed downloads, however, once the head is cut, the remaining community loses its cohesion. DownloadRevolution.net is gone forever, yet the desire for entertainment isn’t going anywhere.
http://www.slyck.com/story1700_Downl...olution_Busted





The Pirate Bay to Sue Anti-Piracy Agencies?
Posted by Sirius

The PIrate bay, which calls itself the world’s largest bittorent tracker, has announced its intention to file for damages against The International Federation of Phonographic Industry (IFPI) an organisation which claims to represent the interests of recording industries worldwide. The website want compensation for the trafic that was blocked by a Danish ISP after a court ruled that it had assisted copyright infringement after allowing access to the site. The ruling apparently contravened European union Law.

The pirate bay has also announced that any money it recieves in settlement will be used to provide grants to Danish musicians who share their music online. Earlier, They had launched, a new website, called the Jesper bay after the head of Danish IFPI, which contained instructions on how to circumvent the block.

The original ruling has also come under scrutiny because The PIrate Bay was not involved in the Procedings at all and was not heard in court. The IFPI also had no rights over the music of some of the people it claimed have suffered as a result of file sharing, and had names them in the law suite without consulting them. It also transpired that the police officer incharge of the investigation might have been hired by Warner Bros while the investigation was in progress.

Prior to this, the PIrate Bay had also filed a police complaint against anti-piracy company Media Defender, which works on behalf of Sony, Universal, Paramount and Ubisoft amongst others. The Pirate Bay showed tha emails leaked from media defenders servers clearly showed that the company had launched illegal denail of service attack on the pirate bay’s servers, engaged in illegal hacking and repeatedly flooded them with spam.
http://techonoid.com/the-pirate-bay-...iracy-agencies





Open Letter

29 June 2008

Dear Friends of IMSLP, Former Users, Contributors and Supporters:

Some people have doubted that we would keep our word. Some people have questioned our competence. Some people have sworn, despite being sympathetic, that IMSLP was struck down once and forever.

I am here to prove them wrong.

It is with great joy that I bring you news of the resurrection of IMSLP. We continue to believe that the access to our culture and the Arts is a fundamental right of every human being. And holding this belief, we continue in our journey towards the goals of providing public access to the musical public domain, and the facilitation of the study of music, the understanding of music, and the enjoyment of music.

And in this spirit of openness and accessibility, I here officially dedicate the IMSLP to Ottaviano Petrucci, a pioneer whose achievements made music so much more accessible to musicians and music lovers for the past six centuries. IMSLP will henceforth be known as both IMSLP and the Petrucci Music Library. The domain name petruccimusiclibrary.org will soon (in the next few days) redirect to imslp.org.
* * *

Before I go into all the details that are involved in this resurrection, I would like to give proper thanks to several people and organizations that made today possible.

Obviously, this resurrection would be impossible without proper legal support, and I would like to thank the folks at the Canadian Internet Policy and Public Interest Clinic (CIPPIC) and the Stanford Fair Use Project (FUP) for providing crucial support during times of crisis, and Professors Michael Geist and Lawrence Lessig for recommending the IMSLP case to the two legal clinics. Even though IMSLP currently has other avenues of legal support, the support of the two clinics proved a godsend for both IMSLP and myself personally.

In addition, I would like to thank Project Gutenberg leader Michael Hart, and GNU project leader Richard M. Stallman. Mr.Stallman has continuously helped IMSLP, even during the darkest periods and despite what must be a frighteningly busy schedule, and for which I am extremely grateful. I am also very sorry that no deal was reached between Project Gutenberg and IMSLP, but I believe that the current outcome is the best for both parties. I will, however, be very interested in pursuing a mirroring agreement, where Project Gutenberg will have access to the entirety of the IMSLP site, and which should prove very useful in case of an emergency of any sort.

I would also like to thank all the IMSLP contributors whose work was indispensable for the resurrection of the IMSLP, which included a thorough copyright review of all 16,000+ files. I greatly look forward to working with you in the future, towards our common goal.

Last, but very certainly not least, I would like to thank everyone who supported IMSLP in some form or another. You have let your voices heard, and we have answered. IMSLP will continue.


To publishers:

I am very appreciative of the amount of support given to the IMSLP by the users and contributors of the IMSLP, which could be seen directly in the volume of e-mails I received after the shutdown of the IMSLP. But a misconception of our stance seems to have arisen. IMSLP is, by no means, an antithesis of the music publishing industry. Rather, I see some of the goals of both music publishers and the IMSLP to be in many ways the same: both are interested in the promotion and dissemination of music.

Due to this shared interest, IMSLP is very much willing to collaborate with music publishers in the promotion of new music, under a Creative Commons or similar license. I know full well how little of the overall profits come from selling actual scores (and I have no evidence that IMSLP affects those profits to any great extent, if at all), and how much comes from royalties from performances. Would it not make much more sense to use IMSLP to promote new composers, instead of attempting to sue IMSLP for composers who will be entering the public domain all over the world very soon, if not already? Considering the fact that IMSLP contributors and users are made up mainly of musicians and music lovers, isn't IMSLP precisely the audience that music publishers should be working with?

I am heartened by the fact that, indeed, many music publishers have seen IMSLP as a friend, and have indeed used IMSLP in the promotion of their contemporary composers. Perhaps ironically, IMSLP's resurrection is due in no small part to the help of several of these publishers.

However, permit me to make one point clear here in no uncertain terms. IMSLP will continue to oppose organizations who attempt to limit and restrict the already much-shrunken public domain. A primary goal of IMSLP is to facilitate public access to the musical public domain, and thus IMSLP will resist strongly any attempts to shrink the public domain, and will raise the alarm among the general public should there be such an assault upon the world's cultural heritage. The reorganized IMSLP will not be so easily silenced.

But let us not end on such a distasteful note. One member of the publishing industry with whom I have recently corresponded expressed the opinion that the classical music world is too small to fight amongst ourselves. I wholeheartedly agree.


To IMSLP users and supporters:

As you probably have noticed after a quick walk through the site, many things have changed. I have tried to make everything as intuitive as possible, but I do welcome all discussions and questions about new or preexisting features. Official documentation for some of IMSLP's new features is still in progress, but do feel free to seek help on the forums for questions, or simply to leave comments and suggestions for improving the usability of the IMSLP.

And some of you may have noticed the opening of the International Music Database Project (IMDBP). IMDBP is an offspring of IMSLP that is still very much a work in progress (just started I might add), and you can find more information about the goals and time line of the project on the IMDBP main page. There is no major change in the submission process for IMSLP due to the creation of the IMDBP, besides having to click on one extra link, so former IMSLP contributors should find the new system fairly intuitive. Please do not hesitate to contact me if you think the submission system can be improved in some way; this is one of the high priorities on my list.

There are also discussions of major collaborations between other organizations and IMSLP underway. More news on the specifics of a discussion will be posted as soon as the plan is solidified, and both the other organization and IMSLP are ready to make the discussion public.

I have started a backup system for anyone wanting to keep a portion of IMSLP usable offline. A significant amount of files will be available via this system, and anyone interested should take a look at the corresponding page. Due to a variety of concerns including privacy, we are not able to offer public backups of the text on the wiki at this time, but, as I mentioned near the beginning of this letter, we would be very willing to have a mirroring/backup plan with Project Gutenberg, which would include the text.

I have also noticed people asking how they could donate to IMSLP. I have set up a page explaining the ways to donate to IMSLP; some even without actually donating money, though money donations are obviously welcome.

The forum is still where it was before the shutdown, and a blog is well in planning. If someone is feeling generous and is willing to donate a chunk of a server for a Moveable Type blog (Perl based), I would be very grateful.
* * *

Welcome back everyone, and by all means, enjoy your stay!

Yours,
Edward W. Guo (a.k.a. Feldmahler)
Project leader
Contact: feldmahler {at} imslp.org, or leave a message on my talk page.

P.S. This open letter, like the first open letter, is licensed under a Creative Commons Attribution 3.0 license. Please do feel free to translate this letter, and post the translation on this wiki or the forums, so that an IMSLP admin can integrate the translation into this page.
http://imslp.org/wiki/IMSLP:Open_Letter_(Reopening)





Making Music with Verizon Wireless
Laura M. Holson

When most people think about music and mobile phones, Apple’s iPhone usually comes to mind. But other companies were hawking songs on mobile phones well before the iPhone existed.

Verizon Wireless has been doing it since 2006, when it launched VCast Music, a comprehensive mobile music service that allowed subscribers to download music to their phones. This year it is expanding that service, according to John Harrobin, the senior vice president for Verizon’s digital media marketing, who oversees the music offerings.

In an interview this week, he said he envisioned a not-too-distant future where Verizon sells more bundled products – including suites of ringtones, ringback tones and downloadable singles from favorite artists. And as paying for items via hand-held devices becomes more acceptable, mobile phone users will be able to more easily download whole albums and buy concert tickets, T-shirts and other items. Mobile phone makers like Nokia are betting on this too.

Some of this will be driven by the changing music industry. “Artists are going to go out on their own once you start seeing their music deals expire,” said Mr. Harrobin. The most successful, he added, will be iconic acts, not up-and-comers who still need distribution. But all musicians in a digital era “need the ability to mine the single,” Mr. Harrobin said. “That is where most of the money is made.”

Analysts agree that of all the wireless carriers, Verizon is the most innovative in offering its own music and entertainment services. “The others are trying to catch up,” said Roger Entner, a senior vice president at IAG, a market research firm.

Last year Verizon Wireless teamed up with Fergie and issued wireless tickets to some concerts via cellphones. Concertgoers received a bar code picture message on their phones which they showed at the door to get in. At the end of the show, Fergie sent “thank you” text messages to those fans.

In February, Verizon announced plans for its first “mobile producer in residence” program, giving Timbaland that title, with the goal of introducing an entire mobile album this year. And in April, the company organized a live global mobile simulcast, with performances from Madonna’s exclusive show at the Roseland Ballroom in New York City to promote “Hard Candy.”

Of course the path to mobile music success won’t be entirely lined with $100 bills. “You’ll see failed experiments too,” Mr. Harrobin said. One of those, he said, is likely to be ad-supported music downloads. “It’s fine for a radio format,” he said. “But I don’t think that will take off.”
http://bits.blogs.nytimes.com/2008/0...ess/index.html





The Rising Cost of Texting
Marguerite Reardon

If you thought gas prices were rising too quickly, check out what's been happening to text messaging.

Since 2005, rates to send and receive text messages on all four major carrier networks have doubled from 10 cents to 20 cents per message. This percentage of increase is on par with similar price hikes at the gas pump as crude oil prices skyrocket. In 2005, Americans paid on average about $2.27 per gallon for gas compared with more than $4 a gallon today.

Last October, Sprint Nextel was the first to introduce the new price of 20 cents per text message. AT&T and Verizon Wireless soon followed with their price hikes going into effect this spring. And this week Engadget reported that T-Mobile USA will match the other big three wireless operators in jacking up SMS texting rates to 20 cents per message. The price increase goes into effect August 29.

On Tuesday, AT&T announced that texting will cost new iPhone users more than it had previously. The old iPhone plan included 200 text messages in the $59.99 voice and data plan. But plans for the new iPhone 3G that hits store shelves next week will cost $5 extra for 200 text messages, bringing the total price of a comparable voice and data plan on the new iPhone 3G to $74.99 a month. (This is with the $69.99 "Nation 450" bundle plus $5 for the 200 text messages.)

The new wave of price hikes comes just one year after all the major carriers raised individual text messaging rates from 10 cents a message to 15 cents per message.

So what's with the 100 percent price hike in two years? Well, there's nothing that has changed in terms of the cost associated with delivering this service. In fact, text messages cost carriers very little to transmit. And when compared with what carriers charge for transmitting other data services, such as music downloads or surfing the Web, the text messaging rates seem exorbitant.

Carriers limit the number of characters that can be transmitted in a text message to 160 characters. Each character is about 7 bits, which works out to a maximum of about 140 bytes of data per text message. This is peanuts compared with the size of sending or receiving an e-mail or downloading an MP3 song over a cellular network.

One blogger has done the math. If the same pricing was applied on a per-byte basis to downloading one 4MB song it would cost the user almost $6,000 to download a single song via SMS texting.

One can easily assume that the mark-up on a text message is several thousands times what it actually costs carriers to transmit this little bit of data, considering that mobile operators are only charging $30 to $40 a month extra for mobile data plans that offer 5MB worth of data per month.

The reason that carriers are charging so much for text messages is because they can. Even at 15 cents and 20 cents a pop, people are willing to pay for it. The carriers are also trying to get consumers to sign up for text messaging packages and unlimited plans that vary in price from $5 a month extra for 200 messages to $20 a month extra for unlimited texting on AT&T's network, for example.

The massive price markup on texting and the growing popularity of texting have resulted in huge profits for mobile operators. Verizon reported that for the first quarter of 2008, its wireless customers spent $11.94 a month on data services, an increase of about 33 percent from a year earlier. The carrier didn't break out what percentage was spent on text messaging versus other services, but there's a good guess that a lot of the additional revenue from data came from texting. In total, mobile data accounted for about 20 percent of all wireless sales for Verizon's first quarter.

Unfortunately, it doesn't look like consumers have much legal recourse for getting carriers to adjust their pricing to a more reasonable rate. There's nothing illegal about charging as much as the market will bear for any service.

But that doesn't mean that consumers like it. What do you think about the high cost of texting? Are you feeling the pinch in your wallet yet? I'd love to hear your thoughts in the "Talk Back" section below.
http://news.cnet.com/8301-10784_3-99...l?tag=nefd.top





Dell Offers 'Windows Vista Bonus' to Frightened Customers

Gavin Clarke
The 'bonus' is XP instead of Vista

Dell is actively promoting a Microsoft licensing loophole to channel partners eager to keep selling PCs installed with Windows XP, after Microsoft's official cut off.

The Dell channel blog is pointing resellers to the loophole in the Windows Vista license that enables business customers to downgrade from the unwanted Windows Vista to its dated, but comfortable and better-supported predecessor.

According to the blog: "Dell can sell what we've branded 'Windows Vista Bonus' which allows us to preinstall XP Professional with a Vista license (on select system categories). This lets customer's upgrade to the Vista platform when they're ready. And yes, Dell will support both OSs."

Dell's blog points resellers to further information here.

Dell, meanwhile, is also making Windows XP available as an image to those partners using the company's Custom Factory Integration service.

The blog was designed to coincide with the last day Windows XP was officially available from Microsoft. From now on, you can only get Windows Vista. Officially.

Dell has taken a leading position in continuing to offer Windows XP. Earlier this month Dell vowed to keep selling PCs running the operating system until "at least 2009".

Dell's stance of not just offering Windows XP directly but actively telling its huge ecosystem of resellers how they, too, can game Microsoft's system and continue selling Windows XP demonstrates a significant shift in the OEM's relationship with Microsoft.

With chief software architect Bill Gates' departure fresh in the air, it should be remembered how, under Gates' tenure last decade as chief executive, Microsoft exploited its position as supplier of a popular PC operating system to play hardball with PC OEMs on licensing Windows.

During the US Department of Justice's antitrust trial, IBM revealed that Microsoft had delayed giving IBM access to Windows 95 simply because IBM refused to kill its own OS/2 operating system or agree to not bundle its SmartSuite rival to Office on IBM PCs.
http://www.channelregister.co.uk/200...ll_xp_channel/





Study Claims Windows Usage Market Share Could Fall Below 90% Soon
Christian Zibreg

A new study released by Net Applications indicates that a decreasing percentage of the Internet population is using Windows as their operating system. It appears that Mac OS X could soon be listed in the double digit-range, while Windows could fall below the 90% mark.

Net Applications’ most recent operating system survey is pointing to continued market share gains of Mac OS X at the expense of Windows, echoing similar figures in a recently published browser market share survey. The research firm measures market share by recording which operating systems are used to browse a set of hand-picked web sites that are described to be representative for the overall market – which means that the Net Applications survey does not provide precise market share figures in terms of sales or unit shipments, but provide trends in terms of usage. According to the research firm, the data is collected from a base of “approximately 160 million visitors per month.”

The survey lists Apple’s Mac OS X operating system market share in June with a record 7.94%, which is a 0.11 point increase over the previous month. This figure makes OS X the best-selling UNIX variant ever with the largest overall share of the market. Linux currently stands at 0.80% market share in this survey, a slight improvement over the 0.68% recorded last month. Windows machines still dominate the market and came in at 90.89%, down from 91.13 percent in the month ago. Although the lead of Windows remains unquestioned, its share has been dropping slowly but steadily over the past two years.

At the current pace, Windows could drop below the 90% in the fourth quarter of this year.

Apple’s iPhone OS X variant held steady at 0.16% market share in June. "Apple has confirmed that its online inventories for the original version of the iPhone are sold out in the US and UK,” Net Applications said. “Apple appears to be clearing out its inventories in preparation for the iPhone 2.0 release. This, in conjunction with customers holding off purchasing until 2.0 is released has temporarily leveled off the iPhone usage share."
http://www.tgdaily.com/html_tmp/cont...38232-113.html





Newspapers, Reeling from Slumping Ads, Slash Jobs

Deep job cuts, outsourcing and more asset sales coming as the newspaper industry retrenches
Seth Sutel

Even for an industry awash in bad news, the newspaper business went through one of its most severe retrenchments in recent memory last week.

Half a dozen newspapers said they would slash payrolls, one said it would outsource all its printing, and Tribune Co., one of the biggest publishers in the country, said it might sell its iconic headquarters tower in Chicago and the building that houses the Los Angeles Times.

The increasingly rapid and broad decline in the newspaper business in recent months has surprised even the most pessimistic financial analysts, many of whom say it's too hard to tell how far the slump will go.

"They're in survival mode now," said Mike Simonton, a media analyst at Fitch Ratings, a credit analysis agency.

"We had very grim expectations for the sector," Simonton said, and publishers have either met or surpassed his estimates for how bad the results would be.

Last week alone, deep staff cuts were announced at The Hartford Courant and The (Baltimore) Sun -- two Tribune papers -- as well as at The Palm Beach Post and the Daytona Beach-Journal, while The Detroit News and Detroit Free Press said they hoped to reduce the head count in their joint operations by 7 percent through buyouts. The Boston Herald said up to 160 employees would be laid off as it outsourced its printing operations, and in a memo explaining the terms of its job security pledge, the Star-Ledger in Newark, N.J., said it is operating in the red. The week before, McClatchy Co. said companywide staff cuts of 10 percent were coming.

Tribune, meanwhile, told its employees Wednesday that it hoped to wring more value out of its "underutilized" real estate in Chicago and Los Angeles, extending an asset-selling program Tribune is pursuing to service a $13 billion debt load, much of which it took on from going private.

Tribune has already reached a deal to sell one of its largest newspapers, Long Island-based Newsday, but ran into delays early this month in liquidating Wrigley Field, where the Chicago Cubs play, when negotiations for the field's purchase by a state agency broke down over financing. Tribune is also moving to sell the Cubs.

Tribune has enough money to meet its debt requirements this year, bond analysts have said, but it must make headway on asset sales in order to meet its obligations in 2009.

Tribune's troubles reflect broader problems in the industry, where a deepening economic downturn is worsening losses from a long-term shift away from print advertising toward online, especially in classified categories like help wanted, autos and real estate, where rivals such as Craigslist, Move.com and AutoTrader.com are thriving.

Advertising is by far the most important source of revenue for newspapers. And in the first quarter, their overall ad revenue slumped 12.9 percent, led by a 24.9 percent drop-off in classifieds, compared with the same period a year earlier.

In fact, the industry group that compiles and releases ad revenue figures, the Newspaper Association of America, this month stopped putting out quarterly press releases with the numbers, though it quietly updated them on its Web site.

NAA spokeswoman Sheila Owens said in an e-mailed statement that the organization will now put out press releases only with full-year data "to keep the market focused on the longer-term industry transition from print to a multiplatform medium."

Some say complacency in the industry about the threat the Internet posed is to blame for the current quagmire.

Speaking on the CNBC business news cable channel Friday, Sam Zell, the real estate magnate who is now Tribune's CEO, said newspapers have historically been "monopolies" in their local markets and "insulated from reality," according to a transcript of his remarks provided by CNBC.

Going forward, if ad revenues continue to slide rapidly, companies including Journal Register Co., MediaNews Group Inc. and -- in the absence of further asset sales -- Tribune could then risk violating their loan terms, said Emile Courtney, a media industry credit analyst for Standard & Poor's.

Already, just two major publishers have investment-grade debt under S&P's ratings -- Gannett Co. and The New York Times Co. The industry is divided between them and "everybody else," Courtney said.

Given the current poor climate for the business, he said: "I have doubts banks will be as willing as they were in the past to waive or amend covenants."
http://biz.yahoo.com/ap/080629/newsp...acks.html?.v=3





Need Press? Repeat: ‘Green,’ ‘Sex,’ ‘Cancer,’ ‘Secret,’ ‘Fat’
Joanne Kaufman

The original pitch landed in the inbox with a whiff of medical authenticity overlaid with a snicker-inducing headline: “Toxic Ties to ‘New Shower Curtain Smell’ Evident, According to Latest Laboratory Testing.”

There was a news conference, this release said, at New York University Medical Center. It was led by a doctor representing an obscure if official-sounding group that few people have heard of, the Center for Health, Environment and Justice. There were revelations about how shower curtains that are “routinely sold at multiple retail outlets” and can “release as many as 108 volatile chemicals into the air.”

Thus, the Toxic Shower Curtain Story was born.

ABCNews.com picked up on it, only to debunk it. With varying amounts of credulousness, other outlets ran with it as well, including U.S. News & World Report, The Daily News in New York, MSNBC.com and The Los Angeles Times. The gist of some of the coverage was that it was all a tempest in a bathtub, though other reports took the information at face value.

How do stories of this ilk get such bounce from major news organizations?

Those who make their living composing news releases say there is an art to this easily dismissed craft. Strategic word selection can catapult an announcement about a study, a product or a “breakthrough” onto the evening news instead of to its usual destination — the spam folder or circular file.

“P.R. people want to invest time in things that are going to get picked up, so they try to put something to the ‘who cares?’ and ‘so what?’ test,” said Kate Robins, a longtime public relations consultant. “If you say something is first, most, fastest, tallest — that’s likely to get attention. If you can use the words like ‘money,’ ‘fat,’ ‘cancer’ or ‘sex,’ you’re likely to get some ink in the general audience media.”

David Seaman, a P.R. stunt planner and the author of a book to be published in October, “Dirty Little Secrets of Buzz,” is a proponent of “safe,” “easy” “secret,” “trick” and “breaking” because they suggest that something is new and fresh, he said.

Anyone who read or heard the Toxic Shower Curtain Story can probably relax: the unsettling findings about possible respiratory, liver and reproductive damage were dismissed by the Consumer Product Safety Commission. “Our staff scientist found many problems with the testing methodology, which called into question the credibility of the science,” said Julie Vallese, a spokeswoman for the commission.

The Center for Health, Environment and Justice stands by its study and says that it was trying to issue an earnest public warning about an environmental hazard. “It’s so important to let people know all the evidence out there when making decisions about which products to bring into their homes,” said Dianna S. Wentz, a spokeswoman for the group.

The center was founded by Lois Gibbs, who in the ’70s fought successfully against the toxic waste dump at Love Canal.

But if the organization’s testing methodology drew skepticism, its P.R. methodology was spot on.

“Anytime you have ‘toxic’ next to an item everyone has in their house and has always been assumed to be the last thing that would harm them, you can be sure it will get picked up on the news, and the Web will spread it like wildfire,” said Allen P. Adamson, managing director of Landor, a corporate branding firm, and the author of “BrandSimple.”

The words that attract media attention change with the times. “Anything that speaks to long-term health risks is good these days, because there is a belief that there’s a lot of stuff out there harming us, from the cellphone on down,” Mr. Adamson said.

David B. Armon, the president of PR Newswire, a distribution service for public relations professionals, likens writing a news release to writing a headline for the front page of a newspaper: every word has to do heavy lifting.

“It’s a lot more scientific than it used to be,” Mr. Armon said, “because you’re not just trying to get media pickup, but to get search engine attention.”

To aid in this endeavor, PR Newswire offers its members a so-called keyword density tool. “It lets you know the words someone would have to type into a search engine for your particular press release to be found, and helps put your release at the top of the search engine,” Mr. Armon said.

“Green” and “environment” are huge right now, he said, as is “foreclosure.” “We’ve done 412 press releases that incorporate that word so far in ’08, up from 261 last year.” For the record, Mr. Armon added, the use of the word “toxic” in news releases is up 5 percent.

The words that may help get a news release picked up vary from region to region. Brenda Baumgartner, the news director and anchor at KPVI, the NBC affiliate in Pocatello, Idaho, for example, looks for words like “fishing,” “hunting,” “Mormon” and “polygamy,” she said, “because they fit the culture we live around.” KPVI also went with the toxic curtain story. “Everybody takes showers,” Ms. Baumgartner said, by way of explanation.

Words that help elevate a news release also vary from industry to industry. For instance, Tom Gable, the head of a San Diego public relations firm, said a news release about video games could benefit from a phrase like “faster graphics.” When talking about technology, he said, it would be “ ‘cost breakthrough,’ like the $200 computer.”

In the entertainment industry, on the other hand, the most basic of nouns will do — baby, breakup, marriage, divorce — according to Cindi Berger, co-chief executive of the public relations firm PMK/HBH. “Now attach names like Madonna or Jessica Simpson,” Ms. Berger said, “and of course the assignment editor is going to pay attention.”

Perhaps because many people in public relations are former journalists, they know what grates on the Fourth Estate. Mr. Gable, who was once the business editor of The San Diego Union, has compiled a list of words that will do a news release no good whatsoever, like “solutions,” “leading edge,” “cutting edge,” “state of the art,” “mission critical,” and “turnkey.”

Mr. Gable said that his company once did a weeklong survey of the releases that came out of PR Newswire and Business Wire, a commercial news distribution service, “and most of the releases identified their company as ‘a leader’ and described their research as ‘cutting edge.’”

“They were empty, unsubstantiated and had no news value,” he said.

Ken Sunshine, the head of a P.R. firm in Manhattan, said he thought the media had an institutional bias against “hype-y terms” like “world renowned” and “once in a lifetime,” which he studiously avoids putting in his news releases. “But ‘unique’ is fine,” he said, “if something really is unique.”

Ultimately, perhaps, the whole thing is less about terms than timing.

“Was it really the issue of toxic shower curtains that fired up assignment editors?” asked Mr. Armon of PR Newswire. “Or was it just a slow news day?”
http://www.nytimes.com/2008/06/30/bu...a/30toxic.html





Clay Felker, Magazine Pioneer, Dies at 82
Deirdre Carmody

Clay Felker, a visionary editor who was widely credited with inventing the formula for the modern magazine, giving it energetic expression in a glossy weekly named for and devoted to the boisterous city that fascinated him — New York — died on Tuesday at his home in Manhattan. He was 82.

His death was of natural causes, said his wife, the author Gail Sheehy. He had throat cancer in his later years.

Mr. Felker edited a number of publications besides New York magazine. There were stints at Esquire, The Village Voice, Adweek and others. He also created an opposite-coast counterpart to New York and called it New West.

But it was at New York that he left his biggest imprint on American journalism. He had edited the magazine when it was a Sunday supplement to The New York Herald Tribune founded in 1964. Four years later, after the newspaper had closed, Mr. Felker and the graphic designer Milton Glaser reintroduced New York as a glossy, stand-alone magazine.

New York’s mission was to compete for consumer attention at a time when television threatened to overwhelm print publications. To do that, Mr. Felker came up with a distinctive format: a combination of long narrative articles and short, witty ones on consumer services. He embraced the New Journalism of the late ’60s: the use of novelistic techniques to give reporting new layers of emotional depth. And he adopted a tone that was unapologetically elitist, indefatigably trendy and proudly provincial, in a sophisticated, Manhattan-centric sort of way. The headlines were bold, the graphics even bolder.

The look and attitude captured the attention of the city and influenced editors and designers for years to come. Dozens of city magazines modeling themselves after New York sprang up around the country.

Mr. Felker’s magazine was hip and ardent, civic-minded and skeptical. It was preoccupied with the foibles of the rich and powerful, the fecklessness of government and the high jinks of wiseguys. But it never lost sight of the complicated business and cultural life of the city. Articles were often gossipy, even vicious, and some took liberties with sources and journalistic techniques.

A National Profile

Tom Wolfe, Jimmy Breslin, Gloria Steinem and others in Mr. Felker’s stable of star writers helped give the magazine national prominence. Meanwhile, what he called its “secret weapon,” its service coverage — on where to eat, shop, drink and live — kept many readers coming back.

Mr. Felker eventually lost New York magazine to Rupert Murdoch in a bitter takeover battle in 1977. But his influence can still be felt in the current magazine, from its in-crowd tone to its ubiquitous infographics and inventive typography tailored to each article.

“American journalism would not be what it is today without Clay Felker,” Adam Moss, New York’s current editor, said in a statement yesterday. Mr. Felker, he once said, “was obsessed with power, and he invented a magazine in the image of that obsession,” one that “reported on the secret machinations of the city’s players.”

Mr. Felker’s roster of writers also included Ken Auletta, Julie Baumgold, Steven Brill, Elizabeth Crow, Gael Greene, Nicholas Pileggi, Richard Reeves, Dick Schaap, Mimi Sheraton and John Simon. Many of them called him the best editor in the country, although some said he was autocratic and took joy in hectoring and humiliating them.

“His voice, his personality, his superhuman animation were horrifying, of course, but they were also the best part of working with him,” Ms. Crow, who later became editor of Mademoiselle and who died in 2005, wrote in 1975. “Clay’s booming tenor voice was simply the most noticeable manifestation of the 100 percent in-your-face and in-your-ears and in-your-brain atmosphere he created wherever he went.”

The supercharged atmosphere of New York was a long way from Webster Groves, Mo., where Clay Schuette Felker, born on Oct. 2, 1925, grew up. (His German immigrant forebears had changed their name from von Fredrikstein to Volker and later anglicized it as Felker.) Journalism ran in his family. His father, Carl, was the managing editor of The Sporting News; his mother, Cora Tyree Felker, had been women’s editor of The St. Louis Post-Dispatch before having children.

After enrolling at Duke University, Mr. Felker left college for a three-year hitch in the Navy before returning to graduate in 1951. At Duke he edited the undergraduate newspaper and married Leslie Aldridge, another undergraduate. The marriage ended in divorce, as did his second marriage, to Pamela Tiffin, an actress.

In 1984 he married Gail Sheehy, who first wrote for him at The Herald Tribune and who later became widely known as the author of “Passages” and other books.

After college, Mr. Felker was a reporter for Life magazine for six years and worked on the development of Sports Illustrated. He later became features editor of Esquire but quit when his rival, Harold Hayes, got the top job. In 1963 he joined The Herald Tribune and became founding editor of the supplement called New York.

A Debut Hits the Stands

When he and Mr. Glaser rolled out the revamped, stand-alone version in 1968, the reviews were mixed. “Though occasional critics find New York excessively slick and too often frivolous, the magazine undeniably generates excitement — an excitement that is winning readers not just in Manhattan but in urban centers across the country,” Newsweek said in 1970.

Others were less impressed. “Boutique journalism,” Mr. Breslin called it when he quit the magazine in 1971, fed up, he said, with its dilettante attitude. Ms. Steinem was bothered by the magazine’s East Side orientation. “When the city is falling apart, we are writing about renovating brownstones,” she said.

But Ms. Steinem stayed on as a staff writer and was rewarded when Mr. Felker helped her and others start the feminist magazine called Ms. He inserted a 40-page preview of Ms. in New York’s issue of Dec. 20, 1971, and helped finance the first issue.

Many of Mr. Felker’s writers followed him from The Herald Tribune. One, Mr. Wolfe, the magazine’s most visible stylist, shared many of Mr. Felker’s views and thrived on the freedom his boss gave him to write satiric, sometimes savage articles about what became known as the New Society.

“Together they attacked what each regarded as the greatest untold and uncovered story of the age — the vanities, extravagances, pretensions and artifice of America two decades after World War II, the wealthiest society the world had ever known,” Richard Kluger wrote in his book “The Paper: The Life and Death of The New York Herald Tribune” (Alfred A. Knopf, 1986).

Probably no article better captured this strain of social-history journalism than one whose title created an American idiom: “Radical Chic.” With unsparing detail and barely concealed mockery, Mr. Wolfe, exhausting 20,000 words, described a fund-raising party given by Leonard Bernstein in his glamorous Manhattan apartment, attended by rich liberals and Black Panthers, the recipients of the evening’s charitable proceeds. The article, appearing in June 1970, outraged both the liberals and the Panthers, but the issue sold out.

Mr. Felker’s New York magazine became a prime practitioner of the New Journalism, again to mixed reactions. The form’s admirers believed it represented events more truthfully than traditional objective reporting could. Conventional journalism, they said, reported what people said; the New Journalists tried to present what people really felt and thought.

“Nonsense,” its critics countered. They considered New Journalism fiction masquerading as reportage, and its practitioners as manipulators of reader responses.

One article, about a prostitute and her pimp, titled “Redpants and Sugarman,” drew heavy criticism when it was later revealed that Redpants was a composite figure created from all the prostitutes that the writer, Ms. Sheehy, had interviewed.

Mr. Felker later said he had erred in not letting readers know the truth about Redpants. He said that Ms. Sheehy had originally explained her method in the second paragraph but that he had removed it. “I felt it slowed the story down,” he said in an interview with The New York Times in 1995.

“But we learned a lesson,” he said. “Composite is never used any more. "

One-Borough Town

Few readers flipping through its pages would have mistaken New York as a magazine for the five boroughs. That was never the idea.

“Everybody who worked on New York lived in Manhattan,” Mr. Felker told The Times. “So it was essentially a Manhattan magazine. And I believe that print — now that broadcast has become the dominant mass media — has to be aimed at educated, affluent people.”

He added: “I’ve been criticized for being elitist, but that’s who, broadly speaking, consumes print. That was our set of values — our attitude — to understand how to make life more interesting, to explain New York life.”

In its first year as an independent publication, with an initial circulation of 50,000, New York lost $1.7 million. In the fall of 1969, still in the red, New York went public, offering 20 percent of its stock at $10 a share. The next year, with circulation at 240,000, the magazine finally broke even, and Mr. Felker became publisher as well as editor.

Demanding as his job at New York was, he was hungry for more. In 1974 New York acquired The Village Voice, the liberal New York weekly. (That same year he moved New York into new quarters on Second Avenue, complete with gym, staff dining room and full-time chef; today, the magazine, published by New York Media Holdings LLC, has headquarters in SoHo.) In 1976 Mr. Felker started a clone of New York for the California market, calling the magazine New West.

A Takeover Drama

By the end of that year, Mr. Murdoch, the Australian press baron who had just paid $30 million to add The New York Post to his chain of newspapers in Australia, Britain and the United States, made an offer to buy New York magazine. It set off several weeks of high drama, complete with front-page coverage in the New York press.

Mr. Felker refused the Murdoch offer. Then, worried he might lose his magazine, he asked his old friend Katharine Graham, the publisher of The Washington Post, to back him in a bid to keep the company. Mrs. Graham offered to buy out Carter Burden, the principal stockholder, who held 24 percent of the stock. Mr. Burden, who had once been the subject of an unflattering profile in Mr. Felker’s magazine, turned her down.

The next day Mr. Murdoch flew to Sun Valley, Idaho, where Mr. Burden was skiing, and made a deal. Mr. Felker immediately obtained a temporary restraining order to block the sale. Meanwhile, tales of Mr. Murdoch’s lurid tabloid journalism were causing such agitation among New York staff members that they walked off the job an hour before the magazine’s closing deadline, saying they would never work for Mr. Murdoch.

Concerned that the walkout would hurt his efforts to block the sale, Mr. Felker frantically tried to find his writers and get them back to work. After looking through bars on the East Side, he finally found them at a restaurant. But by then it was too late to meet the deadline.

And suddenly it was over: Mr. Felker was out. An agreement was signed before dawn on Jan. 7, 1977. Mr. Murdoch gained control of the company and agreed to buy Mr. Felker’s shares for $1.4 million.

Mr. Felker was never able to recreate the brio of New York. In 1978 he joined with Associated Newspapers to buy Esquire and was its editor and publisher until 1981. He became a producer at 20th Century Fox; the editor of Daily News Tonight, an afternoon edition of The Daily News in New York; the editor of Manhattan, inc., a magazine for Wall Streeters; and editor of various smaller publications.

In addition to Ms. Sheehy, Mr. Felker is survived by a sister, Charlotte Gallagher; a daughter, Mohm Sheehy of Cambridge, Mass.; a stepdaughter, Maura Sheehy of Brooklyn; and three stepgrandchildren.

Although repeated surgery to address his throat cancer impinged on his ability to speak in his later years, Mr. Felker continued as a consultant to magazines. In 1994 he became a lecturer at the Graduate School of Journalism at the University of California, Berkeley. The next year the school established the Clay Felker Magazine Center.

The West Coast became his second home. And while he loved teaching, nothing ever quite equaled those high-living and hard-working days when New York City was his muse and New York magazine his darling.

“I know why Clay is such a good editor,” said his friend the novelist and playwright Muriel Resnick. “He works until 8 o’clock. He goes somewhere every night. He’s out with people, he talks to people, he listens to people, and he doesn’t drink.”

David Carr contributed reporting.
http://www.nytimes.com/2008/07/02/bu.../02felker.html





Reflections: The Death of Gallium
Robert Silverberg

I mourn for the dodo, poor fat flightless bird, extinct since the eighteenth century. I grieve for the great auk, virtually wiped out by zealous Viking huntsmen a thousand years ago and finished off by hungry Greenlanders around 1760. I think the world would be more interesting if such extinct creatures as the moa, the giant ground sloth, the passenger pigeon, and the quagga still moved among us. It surely would be a lively place if we had a few tyrannosaurs or brontosaurs on hand. (Though not in my neighborhood, please.) And I’d find it great fun to watch one of those PBS nature documentaries showing the migratory habits of the woolly mammoth. They’re all gone, though, along with the speckled cormorant, Steller’s sea cow, the Hispaniola hutia, the aurochs, the Irish elk, and all too many other species.

But now comes word that it isn’t just wildlife that can go extinct. The element gallium is in very short supply and the world may well run out of it in just a few years. Indium is threatened too, says Armin Reller, a materials chemist at Germany’s University of Augsburg. He estimates that our planet’s stock of indium will last no more than another decade. All the hafnium will be gone by 2017 also, and another twenty years will see the extinction of zinc. Even copper is an endangered item, since worldwide demand for it is likely to exceed available supplies by the end of the present century.

Running out of oil, yes. We’ve all been concerned about that for many years and everyone anticipates a time when the world’s underground petroleum reserves will have been pumped dry. But oil is just an organic substance that was created by natural biological processes; we know that we have a lot of it, but we’re using it up very rapidly, no more is being created, and someday it’ll be gone. The disappearance of elements, though—that’s a different matter. I was taught long ago that the ninety-two elements found in nature are the essential building blocks of the universe. Take one away—or three, or six—and won’t the essential structure of things suffer a potent blow? Somehow I feel that there’s a powerful difference between running out of oil, or killing off all the dodos, and having elements go extinct.

I’ve understood the idea of extinction since I was a small boy, staring goggle-eyed at the dinosaur skeletons in New York City’s American Museum of Natural History. Bad things happen—a climate change, perhaps, or the appearance on the scene of very efficient new predators—and whole species of animals and plants vanish, never to return. But elements? The extinction of entire elements, the disappearance of actual chunks of the periodic table, is not something I’ve ever given a moment’s thought to. Except now, thanks to Armin Reller of the University of Augsburg.

The concept has occasionally turned up in science fiction. I remember reading, long ago, S.S. Held’s novel The Death of Iron, which was serialized in Hugo Gernsback’s Wonder Stories starting in September, 1932. (No, I’m not that old—but a short-lived SF magazine called Wonder Story Annual reprinted the Held novel in 1952, when I was in college, and that’s when I first encountered it.)

Because I was an assiduous collector of old science fiction magazines long ago, I also have that 1932 Gernsback magazine on my desk right now. Gernsback frequently bought translation rights to European science fiction books for his magazine, and The Death of Iron was one of them. The invaluable Donald Tuck Encyclopedia of Science Fiction and Fantasy tells me that Held was French, and La Mort du Fer was originally published in Paris in 1931. Indeed, the sketch of Held in Wonder Stories—Gernsback illustrated every story he published with a sketch of its author—shows a man of about forty, quintessentially French in physiognomy, with a lean, tapering face, intensely penetrating eyes, a conspicuous nose, an elegant dark goatee. Not even a Google search turns up any scrap of biographical information about him, but at least, thanks to Hugo Gernsback, I know what he looked like.

The Death of Iron is, as its name implies, a disaster novel. A mysterious disease attacks the structural integrity of the machinery used by a French steel company. “The modifications of the texture of the metal itself,” we are told—the translation is by Fletcher Pratt, himself a great writer of fantasy and science fiction in an earlier era—“these dry, dusty knots encysted in the mass, some of them imperceptible to the naked eye and others as big as walnuts; these cinder-like stains, sometimes black and sometimes blue, running through the steel, seemed to have been produced by a process unknown to modern science.” Which is indeed the case: a disease, quickly named siderosis, is found to have attacked everything iron at the steel plant, and the disease proves to be contagious, propagating itself from one piece of metal to another. Everything made of iron turns porous and crumbles.

Sacre bleu! Quel catastrophe! No more airplanes, no more trains or buses, no bridges, no weapons, no scissors, no shovels, no can-openers, no high-rise buildings. Subtract one vital element and in short order society collapses into Neolithic anarchy, and then into a nomadic post-technological society founded on mysticism and magic. This forgotten book has an exciting tale to tell, and tells it very well.

It’s just a fantasy, of course. In the real world iron is in no danger of extinction from strange diseases, nor is our supply of it running low. And, though I said a couple of paragraphs ago that the ninety-two natural elements are essential building blocks of the universe, the truth is that we’ve been getting along without two of them—numbers 85 and 87 in the periodic table—for quite some time. The periodic table indicates that they ought to be there, but they’re nowhere to be found in nature. Element 85, astatine, finally was synthesized at the University of California in 1940. It’s a radioactive element with the very short half-life of 8.3 hours, and whatever supply of it was present at the creation of the world vanished billions of years ago. The other blank place in the periodic table, the one that should have been occupied by element 87, was filled in 1939 by a French scientist, who named it, naturally, francium. It is created by the radioactive decay of actinium, which itself is a decay product of uranium-235, and has a half-life of just 21 minutes. So for all intents and purposes the world must do without element 87, and we are none the worse for that.

Gallium, though—

Gallium’s atomic number is 31. It’s a blue-white metal first discovered in 1831, and has certain unusual properties, like a very low melting point and an unwillingness to oxidize, that make it useful as a coating for optical mirrors, a liquid seal in strongly heated apparatus, and a substitute for mercury in ultraviolet lamps. It’s also quite important in making the liquid-crystal displays used in flat-screen television sets and computer monitors.

As it happens, we are building a lot of flat-screen TV sets and computer monitors these days. Gallium is thought to make up 0.0015 percent of the Earth’s crust and there are no concentrated supplies of it. We get it by extracting it from zinc or aluminum ore or by smelting the dust of furnace flues. Dr. Reller says that by 2017 or so there’ll be none left to use. Indium, another endangered element—number 49 in the periodic table—is similar to gallium in many ways, has many of the same uses (plus some others—it’s a gasoline additive, for example, and a component of the control rods used in nuclear reactors) and is being consumed much faster than we are finding it. Dr. Reller gives it about another decade. The Week in Review is edited and published by Jack Spratts. Hafnium, element 72, is in only slightly better shape. There aren’t any hafnium mines around; it lurks hidden in minute quantities in minerals that contain zirconium, from which it is extracted by a complicated process that would take me three or four pages to explain. We use a lot of it in computer chips and, like indium, in the control rods of nuclear reactors, but the problem is that we don’t have a lot of it. Dr. Reller thinks it’ll be gone somewhere around 2017. Even zinc, commonplace old zinc that is alloyed with copper to make brass, and which the United States used for ordinary one-cent coins when copper was in short supply in World War II, has a Reller extinction date of 2037. (How does a novel called The Death of Brass grab you?)

Zinc was never rare. We mine millions of tons a year of it. But the supply is finite and the demand is infinite, and that’s bad news. Even copper, as I noted above, is deemed to be at risk. We humans move to and fro upon the earth, gobbling up everything in sight, and some things aren’t replaceable.

Solutions will be needed, if we want to go on having things like television screens and solar panels and computer chips. Synthesizing the necessary elements, or finding workable substitutes for them, is one obvious idea. Recycling these vanishing elements from discarded equipment is another. We can always try to make our high-tech devices more efficient, at least so far as their need for these substances goes. And discovering better ways of separating the rare elements from the matrices in which they exist as bare traces would help—the furnace-flue solution. (Platinum, for example, always in short supply, constitutes 1.5 parts per million of urban dust and grime, which is ever-abundant.)

But the sobering truth is that we still have millions of years to go before our own extinction date, or so we hope, and at our present rate of consumption we are likely to deplete most of the natural resources this planet has handed us. We have set up breeding and conservation programs to guard the few remaining whooping cranes, Indian rhinoceroses, and Siberian tigers. But we can’t exactly set up a reservation somewhere where the supply of gallium and hafnium can quietly replenish itself. And once the scientists have started talking about our chances of running out of copper, we know that the future is rapidly moving in on us and big changes lie ahead.
http://www.asimovs.com/_issue_0806/ref.shtml





Netsukuku

http://netsukuku.freaknet.org

--

1. What is this?

2. Get the code!

3. Build and install

3.1 Static Binaries and Packages

4. Kernel dependencies

5. How to use it

6. Where to get in touch with us

7. Bug report

8. Hack the code

9. License and that kind of stuff...

--


**
**** 1. What is this?
**

Netsukuku is a mesh network or a p2p net system that generates and sustains itself autonomously. It is designed to handle an unlimited number of nodes with minimal CPU and memory resources. Thanks to this feature it can be easily used to build a worldwide distributed, anonymous and not controlled network, separated from the Internet, without the support of any servers, ISPs or authority controls.

This net is composed by computers linked physically each other, therefore it isn't build upon any existing network. Netsukuku builds only the routes which connects all the computers of the net.

In other words, Netsukuku replaces the level 3 of the model iso/osi with another routing protocol.

The Domain Name System is also replaced by a decentralised and distributed system: the Abnormal Netsukuku Domain Name Anarchy.

The complete features list of Netsukuku is here:
http://netsukuku.freaknet.org/files/..._features_list


In order to join to Netsukuku you have to use NetsukukuD, which is the daemon implementing the Npv7 protocol.

Before doing anything, please read the documentation in doc/ or in
http://netsukuku.freaknet.org


**
**** 2. Get the code!
**

Get the tarball of the latest stable version from:
http://netsukuku.freaknet.org/files/


If you want to download the development code you have to checkout it from the svn repository:
(Warning: It is highly probable the development code will not work!)

$ svn co http://dev.hinezumi.org/svnroot/netsukuku/trunk netsukuku

Once you've checked out a copy of the source tree, you can update your source tree at any time so it is in sync with the latest and greatest by running the command: # cd netsukuku/
# svn update


**
**** 3. Build and install
**

To compile the code you can use scons or just go with the old school way:

# ./configure && make && make install

But SCons is cooler:
http://www.scons.org/
(You should have installed at least the 2.4 version of Python in order to avoid dirty bugs in scons)


The code depends also on the libgmp,zlib and openssl. Generally you have already them installed on your system, but eventually you can retrieve them here:
for the libgmp: http://www.swox.com/gmp/
the openssl library here: http://openssl.org
and finally the zlibs: http://zlib.net

Then go in the src/ directory and type:
$ scons --help

That will show you all the options you can use in the build and installation process. Finally execute:

$ scons

The code will be compiled. If all went well install NetsukukuD with:

# scons install

Now you should give a look at /etc/netsukuku.conf (or wherever you installed it) and modify it for your needs, but generally the default options are good.

- Notes:

If you want to change some scons option to do another installation, (i.e. you may want to reinstall it with another MANDIR path), you have to run:
$ scons --clean


**
**** 3.1 Static Binaries and Packages
**

If you prefer to just install Netsukuku, without compiling it, you can download the static binaries suitable to your platform. They come packed in various formats (.tgz, .deb, .ipk).

The packages repository is at:
http://netsukuku.freaknet.org/packages/


**
**** 4. Kernel dependencies
**

On Linux be sure to have the following options set in your kernel .config.
These options are taken from linux-2.6.14.

#
# Networking options
#
CONFIG_PACKET=y
CONFIG_UNIX=y
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_MULTIPATH=y
CONFIG_NET_IPIP=y
CONFIG_NETFILTER=y

and these from linux-2.6.16.19.

#
# Core Netfilter Configuration
#

CONFIG_NETFILTER_XT_MATCH_CONNTRACK=y
NETFILTER_XT_TARGET_CONNMARK=y

#
# IP: Netfilter Configuration
#

CONFIG_IP_NF_IPTABLES=y
CONFIG_IP_NF_FILTER=y
CONFIG_IP_NF_TARGET_REJECT=y
CONFIG_IP_NF_NAT=y
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=y

If you are using modules you have to load them before launching the daemon.


**
**** 5. How to use it
**

Before doing anything do:

$ man ntkd
$ man andna

when you feel confortable and you are ready to dare type with root priviledges:

# ntkd

then just wait... ^_-

(For the first times it's cool to use the -D option to see what happens).

- Note:
The daemon at startup takes the list of all the network interfaces which are currently UP and it uses all of them to send and receive packets. If you want to force the daemon to use specific interfaces you should use the B<-i> option.

**
**** 6. Where to get in touch with us
**

> Mailing list

Subscribe to the netsukuku mailing to get help, be updated on the latest news and discuss on its development.

To subscribe to the list, send a message to:
netsukuku-subscribe@lists.dyne.org
or use the web interface:
http://lists.dyne.org/mailman/listinfo/netsukuku

You can browse the archive here:
http://lists.dyne.org/netsukuku/
http://dir.gmane.org/gmane.network.p...peer.netsukuku


> IRC

We live night and day in IRC, come to see us on channel
#netsukuku
on the FreeNode irc server (irc.freenode.org).


**
**** 7. Bug report
**

{ Don't panic! }

If you encounter any bug, please report it.
Use the online bug track system:
http://bugs.dyne.org/
or the mailing list:
http://lists.dyne.org/netsukuku/
and explain what the problem is and if possible a way to reproduce it.


**
**** 8. Hack the code
**

Feel free to debug, patch, modify and eat the code. Then submit your results to the mailing list ^_-

There is a lot to code too! If you are a Kung Foo coder, get on board and help the development writing some nice poems. For a start you can take a look at the src/TODO file.

**
**** 9. License and that kind of stuff...
**

All the Netsukuku code is released under the GPL-2, please see the COPYING file for more information.

The authors of Netsukuku and NetsukukuD are listed in the file AUTHORS.


- netsukuku.org is part of Netsukuku project. Please refer to its licence for further informations –
http://netsukuku.freaknet.org/?pag=about





Cracking Physical Identity Theft

Social engineering expert reveals brick-and-mortar identity theft risks in banks, ISPs, and other firms
Kelly Jackson Higgins

A researcher performing social engineering exploits on behalf of several U.S. banks and other firms in the past year has “stolen” thousands of identities with a 100 percent success rate.

Joshua Perrymon, hacking director for PacketFocus Security Solutions and CEO of RedFlag Security, says organizations typically are focused on online identity theft from their data resources, and don’t think about how the same data can literally walk out the door with a criminal posing as an auditor or a computer repairman. He once walked out of a client site carrying their U.S. mail tray with 500 customer statements inside it, he says.

“This is the forgotten and overlooked” security risk for identity theft, Perrymon says. “That’s why the first time we show [our clients] what we can do, it blows them away." But with the Federal Trade Commission’s (FTC) new identity theft regulations requiring banks, mortgage firms, credit unions, automobile dealerships, and other companies that provide credit to assess identity theft risks as well as add policies and procedures to pinpoint any “red flags” as of this November, Perrymon and his team are in hot demand to perform undercover social engineering exploits for banks and other firms to test their ID theft vulnerabilities.

During one recent social engineering caper for a large credit union with 15 locations, Perrymon and his team posed as federal investigators for the FDIC. They used their fake ID-making machine that spits out phony drivers’ licenses and official-looking badges and after two days of reconnaissance, they donned suits and their forged FDIC badges and went on-site at one of the credit union locations during its busiest and most hectic time of day, lunchtime. “I walked in with a camera around my neck that looks like a digital 35 millimeter, but the whole time it’s recording video, and with a clipboard. We walked right in, posing as federal auditors,” Perrymon recalls. “Ninety-eight percent of the time someone asks if I need anything or any help... At that point I sit them down and ask them thirty questions about their internal security procedures – dye bags, sound alarms, etc.”

Perrymon says he then walked around the individual offices and found one that was empty, and voila: “Most of the time customer data is right there on the desk, so I snatch that right up,” he says. “My favorite thing to do is open the credenza, take seven or eight folders and slide them right under the clipboard. Our goal is to be in and out in seven minutes.”

And that’s about how long it took him to steal -- unfettered -- sensitive identity information on seven of the credit union’s customers.

“We’ve also done [social engineering jobs] for secure hosting companies – we get into data centers and get to their drawings and internal sensitive documents,” he says. “We were able to bypass the RFID security at a hosting company.”

Another time, he posed by the door with a large vendor equipment box, and a helpful data center worker held the door for him and let him in. “I walked right in, opened the box and plugged right into the backbone of a big ISP,” he says.

And while Perrymon and his team have “drivers' licenses” and other phony IDs, they are rarely asked to present them. They even try to make the IDs somewhat inconsistent with legitimate ones to see if anyone notices -- typically no one does, he says. “What we want to see is if an employee says ‘that’s not a real badge,’” he says. “So we try not to make the IDs perfect... so they can pick up on [it]. But nine times out of ten, they’re really not going to question you.”

“Over the past five years, we have [had] a 100 percent success ratio of walking out of each engagement with at least five complete identities,” he says
http://www.darkreading.com/document....WT.svl=news1_1





Diary of a Deliberately Spammed Housewife

What happened when 'Penelope Retch' answered her spam e-mail
Ellen Messmer

For Tracy Mooney, a married mother of three in Naperville, Ill., the decision to abandon cyber-sense and invite e-mail spam into her life for a month by participating in a McAfee experiment was a bit of a lark.

The idea of the Spammed Persistently All Month (S.P.A.M.) experiment — which fittingly started on April Fool's Day — was to have 50 volunteers from around the world answer every spam message and pop-up ad on their PC.

What would be the experience in 10 countries when everyday people, armed with a PC and e-mail account McAfee provided for the Global S.P.A.M. Diaries project, clicked through the spam and chronicled the results?

Mooney — who had observed the family's PC crippled just before Christmas by a virus — was game, especially because McAfee was giving a free PC to all participants. She was selected to be among the 50 volunteers picked by McAfee out of 2,000 people who applied to be part of the adventure.

By the time it was all over, after every bank-account phishing scam, Nigerian bank scheme, and offer for medication, adult content and just plain free stuff had been pursued. "I was horrified," says Mooney, a realtor by profession. "It's all snake oil. I'm amazed at what true junk is out there when you're clicking through on e-mail."

McAfee is releasing the results Tuesday of its free-wheeling month-long S.P.A.M. experiment, done largely to illustrate — if you didn't know already — how spam is connected to malware and criminal activity, not to mention some of the slimiest marketing ever devised. (Compare antispam products.)

Each S.P.A.M. volunteer saw an average of 70 spam messages arrive in their in-box each day, with men receiving about 15 more per day than women. That was a lot to answer, but "Penelope Retch" — the alias that Mooney chose for her S.P.A.M. adventure — answered every single message.
The spammed life of Penelope Retch

In her guise as Penelope Retch, Mooney answered the e-mail that came into her account. "I'd see an interactive spam, open it, click on it and asked to be removed. That would only make it worse," she says. "They'd say 'no.'"

Whether trying to win an iPod online, get free travel brochures, weight-loss tea or Maybelline eyeliner, the effect of entering a home address was extreme. Immediately, a deluge of mail landed at her doorstep, directed to the attention of Penelope Retch.
"One of the mail offers I got was a $7,500 credit card for Penelope Retch," Mooney says, noting that the sudden upsurge in junk mail left the neighborhood postman somewhat aghast. "It grew exponentially, so I stopped giving out my home address," she says, adding, "I am concerned about the environment."

Mooney clicked through on the phishing e-mails for fake Wells Fargo and other bank sites, sat back as the supposed government of Nigeria sought to give her an inheritance, and watched a foreign IP address go after a dummy PayPal account that had been set up as part of the S.P.A.M. experiment.

Overall, the most obvious result of the S.P.A.M. experiment was that the PC that McAfee had provided for the project noticeably slowed down, clogged up with spyware, Mooney says.

According to McAfee, which selected five participants from each of 10 countries for the S.P.A.M. experiment, the five U.S. participants received the most spam: 23,233 messages over the course of the month.
Related Content

Brazil and Italy were in the 15,000-plus category, and Mexico and United Kingdom above 10,000. Australia, The Netherlands and Spain were in the 5,000 to 9,000-plus spam range. The S.P.A.M. volunteers in France and Germany got the least, less than 3,000 for the month. McAfee didn't even include what it calls "grey mail" (e-mail that arrived after participants signed up for a newsletter, for example) in this count.

Phishing e-mail accounted for 22% of the spam received by the Italian volunteers and 18% of the U.S. ones. In general, spam appears to still largely be delivered in English; French- and German-language spam were the only non-English spam to amount to more than 10% of spam received by the participants in France and Germany respectively.

Some oddball facts that emerged from the experiment are that fake Chase.com was the most common phishing e-mail spotted during the project, and that the British volunteers received the most Nigerian scam e-mail.

In addition to Mooney, the other S.P.A.M. participants also kept a blog about the experience, which some found amusing and others disturbing. One participant in Australia named Marika wrote, "I don't know whether I would feel safe to surf to that extent again. I tried to sign up for jobs that would generate an at-home income with what seemed like respectable sites, however these sites led to massive amounts of spam."
http://www.networkworld.com/news/200...xperiment.html





"Lost" Beatles Interview Uncovered

A film enthusiast has discovered a long lost interview with The Beatles from 1964 which has not been broadcast since.

Richard Jeffs came across 64 canisters of film stored in a damp garage in South London, and when he started to go through them he stumbled across a piece of pop history.

The conversation with Scottish television dates from April 30, 1964, according to the BBC, which played excerpts from the nine-and-a-half minute interview on the radio on Tuesday.

It came shortly after the Fab Four's trip to the United States during which they were besieged by fans and watched by a television audience estimated to be about half the country's population when they played The Ed Sullivan Show.

During the interview, Paul McCartney and John Lennon discussed how they came up with their tunes, and Jeffs said it shed light on the songwriting process within arguably the biggest band ever.

When asked how they collaborated, Lennon replied: "Well, you know, it depends. Sometimes we write them on old pianos, anything that's lying around."

McCartney added: "Normally we sit down and try and bash one out. But then again, there's no formula, because he (Lennon) can come up with one day completely finished. We still say we both wrote it, though."

The two also recalled where they first met.

"I was playing at a garden fete in the ... village where I lived just outside Liverpool, playing with a group, and he came along and we met," said Lennon.

Jeffs said the canisters were probably discarded after the tele-recording machine they were made on was replaced by a video machine.

The Beatles recording was on the second can of film that he viewed, he told BBC Radio.

"The first one I opened had got a clip of Cilla Black on it," he said, referring to the British television personality.

"But this was the second one that we took along to get copied, and when they copied it they said 'this must be worth millions'.

"And it is very much like being the man with the million pound note because of course there aren't millions (to be spent) in television and I can't get anyone to play the film in television."

As well as the comments on the songwriting process, Jeffs said the interview was remarkable because it was so relaxed.

"Most of the interviews from this time were them at airports being rushed from one place to the other, and this is a relaxed nine-and-a-half minute interview with them in a studio where they are very happy."

He said he was looking forward to discovering what was in the remaining 62 canisters.

(Reporting by Mike Collett-White; editing by Keith Weir)
http://www.reuters.com/article/lifes...17796420080701





Online Tunes, in Service to Africa
Robert Levine

The music business is known for supporting causes with events like the Live Aid and Live Earth concerts, which generate lots of money and publicity for a relatively short time. But on Monday (RED), a nonprofit organization that arranges for companies to contribute a share of profits on certain products to fight AIDS in Africa, is starting a digital music service for that purpose, and it plans to operate for the long haul. The new venture has already arranged to release new songs from U2, Bob Dylan, Elvis Costello, Elton John, Emmylou Harris and Death Cab for Cutie.

The still-unnamed service, which is scheduled to start in September, will deliver customers three new pieces of exclusive content a week for a monthly fee of $5. Half of that money will go through (RED) to the Global Fund, and the other half will go to the artists who contribute songs and to their record companies. As with (RED)’s branded products, like a special iPod and Motorola phone, companies will sacrifice part but not all of their profits, and consumers will know that some of the money they spend goes to the AIDS-in-Africa cause.

Each week (RED)’s service will deliver two songs in MP3 format, one from a superstar act like U2, whose frontman, Bono, was a co-founder of (RED), and one from a less established artist. The third piece of content will be a “crackerjack surprise,” a song, video or short story. The idea is to appeal to Internet users who are interested in music but alienated by commercial radio or the chaos of some online music sites.

(RED)’s president for content, Don MacKinnon, previously put together music products for Starbucks, where he had success connecting with adult consumers. “The idea, then as now, is music discovery,” Mr. MacKinnon said. “People want someone to send them music from artists they love as well as acts that are emerging.”

Bono, in an e-mail message, said, “Don MacKinnon might just be the penicillin the ailing music business needs.”

He added, “I have no doubt that some of the music software we are working on at (RED) will help change the way music is received, as well as changing the lives of Africans who will die without the AIDS drugs that (RED) can provide.”

In the past (RED) has been criticized for not funneling enough AIDS relief compared with the amount of money that companies spend promoting the (RED)-branded products. But the organization’s approach is to find businesses that can finance AIDS drugs in a sustainable way. A subscription music service that generates steady revenue would fit that approach.

Many music executives say they believe adults have trouble locating music on the Web that they will enjoy. “There’s so much music out there now, and people aren’t getting their information in the ways that they grew up with,” Paul McGuinness, U2’s manager, said. “I think there’s quite an opportunity to help people keep current with music.”

(RED)’s service will provide visuals along with the music. The artists can choose 30 images that they believe evoke their songs, and users will see them as the music plays. Listeners can then choose an image, separate from those chosen by the artists, that they think represents the song; when enough do so, subscribers will be able to play the song to a stream of images that other listeners have chosen.

(RED)’s music software will deliver updates on how the organization’s money is being used in Africa. It will also encourage customers to share the service with friends and colleagues: subscribers can e-mail their friends an offer for a two-week free tryout.

(RED) will get some of its songs from “Spectacle: Elvis Costello With ...,” a music-theme talk show that will make its debut on the Sundance Channel this fall. The organization will be able to use almost all the music performed by Mr. Costello and his guests, although it will not necessarily take all of it. “If you’re going to create something,” Mr. Costello said, “it’s good to know that there’s more to it than profit.”
http://www.nytimes.com/2008/06/30/arts/music/30red.html





Stairway Surprise

A back-of-the-napkin analysis of the lifetime worth of the most requested rock tune in history.
Miriam Datskovsky

In the big, bad game of rock and roll, “Stairway to Heaven” is undeniably a winner. Released by Led Zeppelin in 1971, the eight-minute song is considered a musical masterpiece and is one of the most-played rock tunes of all time. Proving its longevity, “Stairway” hit the U.K. charts again last fall and was a top download in the U.S., after Zeppelin’s first downloadable album launched on iTunes. But because the band is notoriously protective of its work, “Stairway” hasn’t met its full moneymaking potential. While other artists have made big bucks by licensing songs to Hollywood and Madison Avenue—think of Bob Dylan’s “Love Sick” in that Victoria’s Secret commercial—Zeppelin has shunned most opportunities. We consulted executives in the music, advertising, and entertainment industries to come up with some numbers, real and potential, for the value of “Stairway."

PUBLISHING ROYALTIES
Zeppelin hasn’t licensed “Stairway” for movies or commercials. But songwriters Jimmy Page and Robert Plant and Warner/Chappell, the song’s publisher, make money off royalties from record sales, radio plays, and live performances. Zeppelin has played “Stairway” at every gig since 1971, yielding about $150,000 in royalties. Everyone from Frank Zappa to the London Philharmonic has also performed it, and let’s not forget the hundreds of thousands of proms, weddings, and bar mitzvahs where it’s been played. (D.J.’s and venues pay a small annual fee for the right to play it.) Estimated gain: $400,000. Royalties from album and DVD sales total about $8.6 million. Plus “Stairway” has been played on the radio an estimated 2,985,000 times (equal to more than 45 years of uninterrupted airtime), netting nearly $2 million. It’s also thought to be the bestselling piece of sheet music in rock history, with royalties of $1 million.
ESTIMATED TOTAL: $12 million

THE MASTER RECORDING
In 1972, Zeppelin and its label, Atlantic Records, sparred over the band’s refusal to release “Stairway” as a single. But as a result, the public had to buy the album, known as Led Zeppelin IV, to get the song, snapping it up as if it were a single. All told, “Stairway” has appeared on four Zeppelin albums, sales of which have earned Atlantic and the band $500 million, including $56 million for last year’s downloadable album, Mothership. Sales of 2 million DVDs featuring live performances of “Stairway” have brought the band and the distributor, Warner Bros., $48 million. Last fall, Zeppelin, surprisingly, signed a deal believed to be worth $2 million with Verizon Wireless that made ringtones, alert tones, and full-song downloads of "Stairway" available. The band, publisher, and label will share a 10 percent royalty on every download.
ESTIMATED TOTAL: $550 million

POTENTIAL EARNINGS
Does the Verizon deal signal a change of heart? In 2002, Zeppelin licensed a hit for the first time: “Rock and Roll,” for a Cadillac campaign. If the band licensed “Stairway,” advertising experts say it could net as much as $8 million for just one campaign—and a lot more if Zeppelin does other deals. (Licensing songs for use in TV and movies brings in much less: about $80,000 for one deal.) Royalties from the song’s use on sites like YouTube offer a new potential earnings stream: A YouTube search for “Stairway” brought 11,000 results. But if Zeppelin wants to cash in, it should move before nostalgic baby boomers get too old. “If the target market is 45-plus, the song is extremely valuable,” says Izzy DeBellis, executive creative director at Kirshenbaum Bond & Partners. “It’s associated with every last dance you ever had. Prom—it was the makeout song. If you were still dancing slow at the end of the song, you were in.”
Estimated total: $10 million or more

THE BOTTOM LINE
Nearly 37 years after the release of “Stairway,” there seems to be no end to its revenue stream. But Zeppelin could up the total if it wants to go commercial.

VALUE OF "STAIRWAY" EARNINGS: $562 million
VALUE OF POTENTIAL LICENSING DEALS: $10 million and up
TOTAL VALUE OF "STAIRWAY": $572 million or more

Sources: Todd Brabec, American Society of Composers, Authors, and Publishers; Led Zeppelin: The Complete Guide to Their Music, by Dave Lewis; Nielsen Broadcast Data Systems and SoundScan; Recording Industry Association of America; Danny Strick, president, Sony/ATV Music Publishing; Alan Wallis, executive director of valuation and business modeling, Ernst & Young.
http://www.portfolio.com/culture-lif...irway-Surprise





Led Zeppelin Uncomfortable Lending Music to Rhythm Games
Earnest Cavalli

Despite the success of Guitar Hero and Rock Band, you won't see Led Zeppelin's iconic tunes pop up in either game any time soon, according to the Wall Street Journal.

The band, specifically Zeppelin guitarist Jimmy Page, is not comfortable giving gaming companies access to the group's master recordings -- a necessary step in adding the band to any game.

While it's depressing that we won't see "Stairway" in any of our virtual set lists any time soon, I'd definitely prefer no Zeppelin to horrendously covered Zeppelin. Activision and Harmonix's efforts to gain access to the band's master tapes at least demonstrate that the companies have finally stopped relying on terrible covers when they're unable to get the original tune.
http://blog.wired.com/games/2008/07/...ppelin-un.html





Reborn for the Fourth of July
Jon Pareles

Back when punk and new wave were new, the Feelies might well have been the band with the oddest calendar: they became known for playing on holidays. They might have appeared on the Fourth of July or Flag Day or Valentine’s Day. Or not, since they also went for months or years between shows.

When they did perform, they pushed the rock ’n’ roll basics — two or three chords, an unswerving beat — toward the ecstatic. They defined those few chords with intricately interlocking parts, bearing down on them to turn repetition into a frenetic rave-up. “Our manager used to wonder if we were going to explode onstage,” said Bill Million, one of this New Jersey band’s two founding guitarists, singers and producers, along with Glenn Mercer.

The Feelies have taken nearly 17 years to resurface for two sold-out shows on Tuesday and Wednesday nights at Maxwell’s, in Hoboken, followed by a concert opening for Sonic Youth in Battery Park on Friday, for which the free tickets disappeared in minutes online.

The band lineup is the one that gelled in 1983 and made the last three of the four Feelies albums. It has Mr. Mercer, 53, and Mr. Million, 54, on guitars; Brenda Sauter, 49, on bass; and Dave Weckerman, 58, and Stan Demeski, 47, on drums and percussion. Mr. Mercer and Mr. Million have resumed their songwriting collaboration, and the sets will include some new material.

The Feelies were a vivid apparition between 1977, when they played their debut show at a high school here, and 1991, when they released their fourth album, “Time for a Witness,” and played a final Fourth of July show at Maxwell’s. Then they disappeared. Mr. Million suddenly moved to Florida without leaving a forwarding address and gave up guitar, and the band was no more.

When the Feelies emerged — in the 1970s heyday of CBGB, Max’s Kansas City and the Mudd Club — punk and art rock around New York were awash in Minimalist drones and patterns and a primitivist return to the basics. The early Feelies made no secret of their admiration for the Stooges and the Velvet Underground. (Later they would tour with Lou Reed.) But where other bands were pouring on distortion and noise, the Feelies made their impact through precision. At early rehearsals they decided that a cymbal crash obscured a realm of high frequencies they wanted to explore, so they replaced cymbals with more clearly delineated layers of guitars and percussion.

“Our sound is defined by what we left out and didn’t play, as much as by what we did,” said Mr. Mercer in an interview at his basement studio here, where the band has been rehearsing. He looks studious behind large, horn-rimmed glasses, and measures his words. “I think in a loose way the idea of keeping it minimal goes beyond just the music. It’s my whole approach to everything. Don’t say too much whenever possible. We’re just trying to get the most impact out of the least amount.”

That impact has been especially strong on musicians. The Feelies’ guitar interplay and unassuming vocals now echo through collegiate and indie rock, both directly and via acknowledged fans like R.E.M. and Sonic Youth. They have also attracted film directors. Jonathan Demme had the band perform in a high school prom scene in “Something Wild,” and Susan Seidelman commissioned Mr. Mercer and Mr. Million to write the score for “Smithereens.”

The Sonic Youth guitarist Thurston Moore recalled seeing the Feelies at the Mudd Club in the late ’70s. “They came out and proceeded to just mow the place down with their guitar playing,” he said. “And these guys were buttoned-up-collars nerd boys from the ’burbs. They were totally straight from the backyard cookout. So it was cool to be not cool.”

When Sonic Youth was asked to choose an opening act for its Fourth of July show this Friday in Battery Park, the date made Mr. Moore think about the Feelies. “I had this fond memory of the Feelies always playing on American holidays,” Mr. Moore said. “I thought, ‘Why don’t we get the Feelies? Do they exist?’ ”

That was a complicated question. Mr. Mercer, who had been playing in other groups with Feelies members, said he and Mr. Million had been talking for years about reconvening the band. “It’s not like we got mad at each other and said, ‘We broke up,’ ” Mr. Million said in a telephone interview. “We just stopped playing, as we had done periodically since we got together.”

Mr. Million said he “simply lost interest” in the music while the band was doing its 1991 shows. “I would be looking down at the set list and thinking, ‘Only a few songs to go.’ So I really had to stop because it didn’t mean the same thing.”

When he abruptly moved to Florida, he worked on security for Disney World, doing computer programming for access systems. But when one of his sons started playing guitar, Mr. Million was drawn back to the instrument. “It sounds odd to me to even call this a reunion,” he said. “It’s just that we’ve gotten together after a long break.”

Mr. Mercer said he had earned more lately from Feelies royalties than he had when the band was active. One Feelies song, “Let’s Go,” turned up in a Volvo commercial.

“We’ve had offers to play, we’ve had a lot of interest in the band,” Mr. Mercer said. “And we’ve had a lot of offers recently for licensing of songs. So it just seemed like people were interested in having us back.”

His studio, where the band worked on its 1988 album, “Only Life,” as well as on “Time for a Witness,” is a small, tidy room, barely large enough to swing a guitar, with photographs of a rock pantheon — Elvis Presley, Chuck Berry, Bob Marley, John Lennon and an autographed Little Richard (“To Glenn, God loves you”) — on the walls.

“We’ve always been a basement band,” Mr. Million said. “We started out in my basement and eventually moved into Glenn’s basement, and we’re still in the same basement.”

The Feelies’ recording career was commercially modest. Its studio recordings reveal the blueprints of the songs, but only rarely do they hint at the guitar maelstroms the Feelies could create onstage. An early lineup — Mr. Mercer and Mr. Million, with Anton Fier on drums and Keith DeNunzio (a k a Keith Clayton) on bass — made the Feelies’ dizzying 1980 debut album, “Crazy Rhythms” (Stiff/reissued on A&M), and soon broke up, generating the first of many intertwined Feelies spinoff bands: the Trypes, the Willies and Yung Wu. The Feelies’ more stable lineup arrived with “The Good Earth” (Coyote/Twin Tone), which was released in 1986; produced by Peter Buck of R.E.M., it moved the band toward thoughtful folk-rock.

Then came the band’s major-label stint: two albums, “Only Life” in 1988, and the darker, more psychedelia-tinged “Time for a Witness,” for A&M. Its albums have slipped out of print, though the Feelies own the rights to “Crazy Rhythms” and “The Good Earth” and are negotiating to have them reissued.

The Feelies’ re-emergence is determinedly low-key. Members with day jobs are keeping them. The band has no manager, no recording contract and no tour dates planned beyond Independence Day, though that is likely to change. They have learned three dozen songs and are writing more, with the goal of recording again.

“We were never very proactive,” Mr. Mercer said. “Things would present themselves to us, and we would either go with it or not.“

Behind his glasses he ventured a half-smile. “There’s no game plan,” he said. “We don’t want to jump in too far into the deep end. Just to wade toward it.”
http://www.nytimes.com/2008/07/01/ar...ic/01feel.html

















Until next week,

- js.






























Current Week In Review





Recent WiRs -

June 28th, June 21st, June 14th, June 7th, May 31st, May 24th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles, press releases, comments, questions etc. in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - September 22nd, '07 JackSpratts Peer to Peer 3 22-09-07 06:41 PM
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM






All times are GMT -6. The time now is 03:52 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)