P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 22-09-05, 06:28 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default Peer-To-Peer News - The Week In Review - September 24th, ’05



























"I swear to god, the DJ was playing Solitaire throughout the dinner and cocktail hour. It seems sort of silly to pay someone a lot of money to sit at a laptop and put on songs when we can do the exact same thing." – Future Bride Jessica Spence


"It's something that's followed me forever and today I'm going to finally admit once and for all the truth about my breasts." – Tyra Banks


"Women like to be gay. I like to be gay. They want to be happy. I try to make them happy." – Porfirio Rubirosa


"We didn't need high-quality audio to accomplish this, we just used a $10 microphone that can be easily purchased in almost any computer supply store." – Feng Zhou


"We were horrified when we first heard about the new copy-protection policy that is being implemented by most major labels, including Sony (our own label), and immediately looked into all our options for removing this from our new album." – Tim Foreman


"Historically, universities were focused on inquiry and the free exchange of information." – Richard Doyle


"I can discriminate between forms of p2p, leave some on, block others." – Monty Bannerman


"It's the most powerful privilege the government has. It's the nuclear option. It never fails." – William Weaver






































September 24th, 2005




Net Takes Power From Music's Big Four
BBC

The internet has fundamentally changed the relationship between music's so-called "big four" labels, independents and consumers, industry analysts have said.

Seventy per cent of the world's music market is controlled by four companies - EMI, Warner, SonyBMG and Universal.

The labels not only control what is released, but also influence radio and TV airplay, as well as urban and street culture.

But many in the industry - including the big four themselves - believe that the power balance is changing, due in particular to the internet.

Downloads, peer-to-peer (P2P) file-sharing, piracy, podcasting and online ad hoc radio stations - as well as a rejuvenated independent label sector and a new generation of music entrepreneurs - are shifting the power balance.

"It's rapidly changing and different to how it was 10 years ago, five years ago, three years ago, two years ago," Tom Smith, lead singer of British group Editors, told BBC World Service's The Music Biz.

The group reaped success with indie label Kitchenware after making their music available online.

"It seems to me that it means people can listen to more music, they can decide for themselves early on if they like or don't like something.

"So they can actually listen to more than they ever would listen to and then go out and buy the record."

Helping indies

Under an earlier name, Snowfield, Editors had been unsuccessful in getting a deal from a major label.

However, they began to build a fanbase through the internet, and attracting people to gigs as more people discovered the band online. Major labels then became interested, but, now in a stronger position, Editors rejected them to go with Kitchenware.

"The first record was very limited edition, and not many people could get their hands on it - but you could obviously get the songs and hear the B-sides on the internet and from various places," Smith said.

"I think that's healthy and people sharing music is healthy."

The story is similar for some small independent record labels.

In November last year, Saddle Creek become one of the most talked about and respected independent rock enterprises in the US when their act Bright Eyes - one of only 12 bands on their books - secured the top two slots in the US singles chart.

Then in January, Saddle Creek released two Bright Eyes albums simultaneously. Both were well-received critically and went on to break 100,000 sales mark.

Saddle Creek's Matt McGinn, who was part of the small group that established the label as young teenagers, said that the internet had "really helped independent music."

"I think all of our bands have seen growth due to people being able to share bands that they find and love with other people, who are then turned on to the music too," he added.

"We've put up a couple of downloads for every record we release, and that, you know, shows that we want to share some of the music just for free, just to check it out, and I think that's definitely helped."

'Out of our hands'

And Keith Jopling of the International Federation of the Phonographic Industry said digital market is very good news for independent music labels.

He explained that traditionally, it has been difficult for independents to get high marketing budgets and exposure for their artists

But he said that online, they can "have more innovative marketing concepts," as well as allowing consumers to listen to the music before they decide to buy it".

"In theory, the whole development of the market digitally should be to the benefit of independents," he added, also explaining that new consumption patterns are emerging, with music fans buying in many different ways.

"Online, people are more likely to download catalogue, they're more likely to download lesser-known bands - and that's good for independents," he said.

"What we're seeing is that for independent rock artists - indie-type bands that don't have the marketing exposure of those acts on the major labels - a higher proportion of their sales is now taken up by digital."

Rob Owen of EMI admitted that the majors were playing "catch-up," but added they were now dramatically improving.

"We didn't really know where it had come from, and I think over the past couple of years great inroads have been made by all the record companies - not just the majors but the indies as well," he said.

"Learning daily I think is the case, really. We're kind of catching up, but we're getting there."

He also defended the major label's initial fears that technology could bring them down - which made them slow to react.

"It was out of our hands," he said.

"There was the file-sharing, peer-to-peer services, illegal downloads, and they'd completely and utterly taken over what we were meant to be doing as a record industry.

"We have caught up now, and I think people are sitting up and taking notice. They know where they can get things legally."
http://news.bbc.co.uk/go/pr/fr/-/1/h...ic/4271940.stm





WinMX PNP Network Ends Operations
Thomas Mennecke

WinMX began its time as a simple OpenNap client in a time when Napster and Scour ruled the P2P scene. When Napster and Scour were banished from the Internet, WinMX's importance took on a new burden of importance. It reinvented itself from a mere OpenNap client to become one of the premier P2P networks of its day.

During its height, WinMX, developed by FrontCode Technologies, eclipsed the Napster P2P network in not only resourcefulness, but also in population. During mid- 2002, its population had reached over 1.5 million simultaneous users. With an active community, plenty of independent user forums and steady development it appeared there was nothing that could stop this network.

Then something mysterious happened. From July 2003 to July 2004, there were no updates to WinMX - nothing to improve the network architecture, the dreaded queues or any other attributes. Then in July 2004 after nearly a year of frustration, FrontCode released addition betas which many perceived as a mere "filler" versions. Version 3.53 did little more than feature “a major upgrade of the chat component and other minor improvements." Another beta version (3.54) was subsequently released, which improved the media library.

That would be the last anyone would hear from WinMX ever again. Slyck maintained communications with FrontCode president Kevin Hearn, who stated that work was still being continued on the mystical version 4.0. During the early part of the summer, Mr. Hearn told Slyck.com that something might be available towards the end of the 2005 summer.

However, another plot twist appears to have mixed things up once again. On September 13, 2005, WinMX was the recipient of a letter (along with 6 other P2P firms) from the RIAA. The letter demanded the receiving developers they cease infringing operations immediately, and offered to "discuss pre-litigation resolution of these claims."

Like Alberto Treves' decision to release the source of Ares Galaxy, or Sam Yagan's decision to join the DCIA, every move a P2P developer makes is immediately questioned to be in direct response to the RIAA's letter campaign. Such is the case for FrontCode Technologies. Or should we say WinMX Technology Associates?

Currently, the WinMX.com homepage, the FrontCode.com homepage, the WinMX PNP Network and all of its host caches are down. It is impossible to connect to the network, and those remaining online will only stay online as long as their host supernodes do. But is this the end of WinMX?

Perhaps not. Interestingly enough, if one conducts a DNS whois for "WinMX.com", the result directs owner ship to a "WinMX Technology Associates" - not FrontCode Technologies as it has in the past. Even more interesting is the geographical relocation from Toronto, Canada to Port Vila, Vanuatu. Many will remember that Sharman Networks pulled a similar stunt to avoid prosecution in the Netherlands and to capitalize on "tax efficiencies."

FrontCode.com is still registered in Canada. Kevin Hearn, who is usually readily available for comment with Slyck.com, has not responded to inquiries for several weeks.

Before anyone clamors the end of the WinMX PNP network, time needs to be given to allow for this development to unfold. Although it appears WinMX.com was reregistered prior to this event, its occurrence cannot be downplayed until this fluid situation is resolved.
http://www.slyck.com/news.php?story=921





P2P Music Sites Closing Doors In Legal Fallout
Sue Zeidler and Eric Auchard

Popular file-sharing site WinMX.com ceased operating and the New York office of another, eDonkey.com, appeared to be closed, in the continuing legal fallout among underworld peer-to-peer music services, industry sources and users said on Wednesday.

The turmoil among file-sharing networks follows the landmark ruling by the U.S. Supreme Court in June that held anyone who distributes a device used to infringe copyright is liable for the resulting acts of infringement by others.

In the wake of the decision, the trade group Recording Industry Association of America (RIAA) last week sent out "cease-and- desist" letters to seven file-sharing groups. A spokeswoman for the RIAA declined to name the targets.

Popular file-sharing sites BearShare, eDonkey and WinMX were reportedly among the targets.

The decentralized nature of most peer-to-peer file-sharing software makes it uncontrollable once it is released over the Internet. However, shutting off sites where users first download the software may strangle the flow of new users.

"There's certainly a big realignment of networks going on after the RIAA letters. Everyone is going to see a fallout since the ruling is making it tough for these companies to exist," said Marc Morgenstern, vice president for Loudeye, during the Digital Hollywood conference in Santa Monica.

An eDonkey executive with a Boston phone number was not immediately available to comment. Industry sources said the phone in the New York office had been disconnected.

A spokesman for Frontcode Technologies, developers of the WinMX application, could not be located to comment.

Users in both Europe and North America complained that the WinMX site (http://www.winmx.com)) was unavailable throughout the day on Wednesday. Free Peers Inc., backers of BearShare, did not respond to attempts to contact them via e-mail.

The latest developments come on the heels of a pending deal in which file-sharing service Grokster Ltd. is set to be acquired by Mashboxx LLC, a new company formed with the intent of establishing a legal peer-to-peer music company, sources familiar with the matter said.

A spokesman for Mashboxx, formed by former Grokster President Wayne Rosso and other partners, declined comment.

Michael Page, a lawyer for Grokster, which makes software that has been widely used to illegally swap music over the Internet, also declined to comment.

Both Grokster and Morpheus, distributed by StreamCast Network Inc., were on the losing end of the Supreme Court's ruling.

Shotgun Weddings In The Making

The Rosso spokesman declined to comment on the talks with Grokster but said he expects the Mashboxx service to launch in the next few months. Mashboxx has announced a licensing deal with Sony Corp. and is talking with other major labels.

The sources familiar with the matter said the pending deal with Mashboxx helped pave the way for settlement discussions between Grokster and the major record labels.

Michael Weiss, Morpheus's chief executive, declined to comment on whether his company had engaged in settlement discussions.

Last June, the Supreme Court sent the case against Grokster and Morpheus back to a lower courts for further action on whether or not the file-sharing networks encouraged its users into infringing action.

Weiss has said he is confident Morpheus can prove it did not induce copyright violation. On Wednesday, he said he was awaiting his next date in court in mid-October.

The current generation of file-sharing networks are all descendants of the original music-sharing phenomenon Napster, which was forced to shut down, and now operates as a legal music service.

However, peer-to-peer technology has lived on in programs like WinMX, which represent a sort of transitional generation of media- sharing programs between the pioneering Napster and more modern programs like Gnutella and eDonkey.

Despite the legal wrangling, free file-sharing has persisted and many in the industry believe it is about to embark on a new era in which it will finally be embraced commercially by media companies for legitimate purposes.

"Six months from now, P2P usage will be beyond what it is today," said Weiss during a panel at the Digital Hollywood conference.
http://news.yahoo.com/s/nm/20050922/...p_shutdowns_dc





Hollywood Taking Lab Route To Fight Piracy

With the menace of film piracy showing no sign of letting up six Hollywood studios - Disney, Paramount, Fox, Sony Pictures Entertainment, Universal and Warner will finance a multimillion-dollar research laboratory. The aim will be to find new ways to foil movie pirates.

It is to be called Motion Picture Laboratories, or MovieLabs, and is scheduled to begin operation this year. Media reports indicate that MovieLabs will have a budget of more than $30 million for its first two years. The idea arose from Hollywood's contention that the consumer electronics and information technology industries are not investing heavily or quickly enough in piracy-fighting technology.

The venture will explore new technologies to detect illegal videotaping of films in theaters and evaluate new computer hardware and software that is being used by networks to distribute films.

MovieLabs will be looking at ways to jam camcorders, detect and block P2P transfers on campus and business networks.

It will build spyware for peer 2 peer networks and look at better ways to prevent home and personal digital networks from being tapped into by unauthourised users. The lab is modelled after CableLabs, which since 1988 has spearheaded pivotal innovations in the cable television industry - hastening the adoption of fiber optics, cable modems, telephony and digital video.
http://www.indiantelevision.com/head...sep/sep228.htm





Where ya been Steve?

Jobs Says Record Labels 'Getting Greedy'

Apple Computer boss Steve Jobs, the man behind the popular iPod digital music player, called the music industry greedy for considering a hike in the price of digital downloads, warning that such a move would drive users back to piracy.

Record companies have begun rethinking how to price songs sold over Apple's iTunes Internet shop--99 cents each in the United
States and 79 pence in Britain--before new contract negotiations come up with the California-based company.

"If they want to raise the prices, it means that they are getting greedy," Jobs, chief executive of Apple, said at a news conference here Tuesday. "If the price goes up, they (consumers) will go back to piracy and everybody loses."

Hit hard over the past five years by the rapid spread of illegal song copying over the Internet, music companies are struggling to revamp their business models as sales shift to more legal digital downloads from the CD format.

Vivendi's Universal Music, Sony BMG Music Entertainment and Warner Music are responsible for three out of every four albums sold around the world.

Apple, which Jobs said had more than 80 percent of the U.S. digital music market, unveiled this month the pencil-thin iPod Nano digital music player, which is aimed at securing the company's lead.

Jon Rubinstein, senior vice president of the iPod division, told journalists the company was not planning to add radio features on to its digital player because there was not enough demand for it.

Jobs also cast a skeptical eye on the future of the market for downloading music on mobile handsets.

"It is not clear that buying songs over the air makes economic sense," Jobs said. "I am skeptical because of the cost...but we will see."

Jobs said it was cheaper for consumers to download songs onto their computer than directly onto their mobile phones.

Mobile phone operators, however, expect music downloads to be a significant driver of revenue growth after having invested heavily in technology and infrastructure to support the service.

Jobs declined to say whether Apple was planning to launch an all Apple-made iPod phone after having introduced two weeks ago a music-playing handset developed with Motorola.

"We do not say anything about future products," Jobs said. "We work on them in secret, then we announce them."

On a separate matter, Jobs said Apple was on target to ship computers fitted with Intel chips by June as targeted. "We are on track to do that."
http://news.com.com/Jobs+Record+labe...3-5874443.html





Writers Sue Google, Accusing It of Copyright Violation
Edward Wyatt

Three authors filed suit against Google yesterday contending that the company's program to create searchable digital copies of the contents of several university libraries constituted "massive copyright infringement."

The lawsuit, filed in United States District Court in Manhattan, is the first to arise from the Google Print Library program, the fledgling effort aimed at a searchable library of all the world's printed books.

Google intends to make money from the project by selling advertising on its search pages, much as it does on its popular online search-engine site.

The plaintiffs, who are seeking class-action status, also include the Authors Guild, a trade group that says it represents more than 8,000 published authors. Listed as plaintiffs in the suit are Daniel Hoffman, a former consultant in residence at the Library of Congress and the author of many volumes of poetry, translation and literary criticism; Betty Miles, an author of children's and young adult fiction; and Herbert Mitgang, the author of a biography of Abraham Lincoln as well as novels and plays. Mr. Mitgang is a former cultural correspondent and editorial writer for The New York Times.

Each of the plaintiffs claim copyright to at least one literary work that is in the library of the University of Michigan, according to the suit. Michigan is one of three universities, along with Harvard and Stanford, that agreed last year to let Google create searchable databases of their entire collections. The New York Public Library and Oxford University also entered into agreements with Google, but only for the works in their collections that are no longer covered by copyright.

Paul Aiken, executive director of the Authors Guild, said the organization did not know whether Google had yet copied any of the works by the plaintiffs. But he noted that they were seeking an injunction against copying and a declaration that the program violates copyright law, as well as damages from any violations so far.

The suit contends that Google knew or should have known that the Copyright Act "required it to obtain authorization from the holders of the copyrights in these literary works before creating and reproducing digital copies of the works for its commercial use and for the use of others."

Google has said from the beginning that its program is covered by the "fair use" provision of the copyright law, which allows limited use of protected works. In a statement issued in response to the suit, Google also said its program respected copyrights.

"We regret that this group has chosen litigation to try to stop a program that will make books and the information within them more discoverable to the world," the statement said. "Google Print directly benefits authors and publishers by increasing awareness of and sales of the books in the program. And, if they choose, authors and publishers can exclude books from the program if they don't want their material included. Copyrighted books are indexed to create an electronic card catalog and only small portions of the books are shown unless the content owner gives permission to show more."

Google temporarily suspended its library project last month to give authors and other copyright holders until November to opt out by telling it that they did not want certain works to be copied.

But Mr. Aiken said that offer turned longstanding precedents in copyright law upside down, requiring owners to pre-emptively protect rights rather than requiring a user to gain approval for use of a copyrighted work.

Some aspects of the Google Print program have encountered relatively little opposition, particularly one that invites publishers to submit their books to Google for scanning and inclusion in the Google search engine. Most of the large commercial publishing houses have submitted books to Google for scanning, in the hope that the program will lead users to find and buy their books more easily.
http://www.nytimes.com/2005/09/21/te...gy/21book.html





Chinese Search Engine Baidu to Appeal
Christopher Bodeen

Chinese search engine Baidu.com plans to appeal a court verdict ruling it violated copyrights held by a local affiliate of global music giant EMI, Baidu's lawyer said Tuesday.

Beijing's Haidian District Court found Baidu guilty on Monday, saying it provided access to Web sites offering illegal MP3 files of music belonging to recording company Shanghai Push, also known as Shanghai Busheng Music Culture Media Co.

Baidu, whose share price more than quadrupled following its listing on the Nasdaq last month, argued it merely provided a search function, not downloading services, and therefore wasn't violating copyrights.

"We believe that the district court order was based on a misunderstanding of the search engine technology and therefore is without merit," Baidu's lawyer, Li Decheng of the Zhonglun W&D Law Firm in Beijing, said in a statement e- mailed to The Associated Press.

"We will vigorously appeal on behalf of our client," Li said.

There was no telephone directory listing for Shanghai Busheng and the company's spokesmen could not be reached for comment on Tuesday.

Baidu's mp3.baidu.com MP3 search page has made it hugely popular among young, increasingly tech-savvy Chinese. Analysts say it has grown into China's largest search engine, prompting U.S. search giant Google to buy 2.6 percent of the company last year.

But its high profile has also exposed it to the ire of international record companies, such as Universal, Warner, Sony BMG and their local subsidiaries, who are trying to stem losses attributed to illegal music downloading. Baidu is facing seven separate copyright infringement lawsuits filed by the four major record labels or their affiliates over the last four months. The cases are scheduled for a hearing on Sept. 26.

Baidu's stock, which soared at its IPO on Aug. 5, slumped last week after two securities firms that underwrote its initial public offering issued reports saying its price was too high. The stock price rose 1.5 percent on Monday on the Nasdaq to $79.53 _ still almost triple the price at which it listed.

Li said the Beijing court ordered Baidu to stop providing the alleged downloading services related to songs copyrighted by Shanghai Push and pay the company 68,000 yuan ($8,395) _ 2,000 yuan ($247) for each of the 34 copyrights the company said Baidu violated.

However, he claimed that blocking access would severely interfere with Baidu's search function by forcing it to filter or block access to all files containing the same file names as Push's songs. Legitimate multimedia file owners and Internet users could be cut off from copyrighted files, he said.

"We believe the district court's order would constitute an unfair restriction on the search engine, legitimate multimedia file owners as well as Internet search users," Li said.
http://www.washingtonpost.com/wp-dyn...092000330.html





German Legal Machinery Against P2P Users Running Smoothly
Craig Morris

Thousands of charges against users of filesharing programs have been filed with the state prosecutor's office in Karlsruhe -- and guilty parties are now facing their first legal consequences. For several weeks now, the state prosecutor's office has been warning suspects in writing that "preliminary inquiries have been launched against you for a breach of copyright."
Anzeige

The letter states that charges will not be filed if the accused party agrees to settle out of court. The preliminary inquiries are discontinued if a certain amount (between 50 and 500 euros depending on the severity of the violation) is paid to the state chancellery. The accused do not have to defend themselves against the accusations. However, if they do not pay, the state prosecutor's office explains that it will "press charges against you without further notice."

For some time, several thousands of charges have been filed with the state prosecutor's office in Karlsruhe for violations of copyright in the eDonkey P2P network. Law firm Schutt-Waetke is behind the charges. In turn, this law firm has contracted Logistep on behalf of the holders of copyright to search through peer- to-peer networks for files protected by copyright. If Logistep finds any, it stores the provider's IP address and the date and time when the file was offered. These data are then transmitted to the law firm.

The "anti-piracy" investigators, as the lawyers see themselves, seem to be focusing on the Earth 2160 game from Zuxxez Entertainment of Karlsruhe. According to Zuxxez, the law firm has filed more than 18,000 charges against users of filesharing programs who are offering that game. Two weeks ago, only 12,000 cases had been filed when heise online first published a report about these events.

The law firm in Karlsruhe that is representing Zuxxez get the personal data of the accused parties from the files at the state prosecutor's office so it can press charges. Zuxxez Executive Director Dirk P. Hassinger told heise online that the purpose of this campaign is to give users of peer-to-peer networks "something to think about." After all, he points out, the fines charged only amount to around 150 euros including damages. The fines are only greater in individual cases when the accused parties are "repeat offenders."

In a written warning provided to heise online, the law firm estimates that the amount in dispute is 25,000 euros and calculates that the fee that the law firm could charge according to commonly applied rates would be 911.80 euros. The law firm explains that it is, however, "willing to meet you in the middle" and only charge 650 euros as a friendly gesture. The letter does not charge that there have been repeat offenses. The lawyer representing the party that received this letter stated that her client is not willing to pay that fee.
http://www.heise.de/english/newsticker/news/64216





The Story Of Finnish Copyright Law

Copyright law has received much attention in Finnish press for past 3 days.

The new Finnish copyright law is in its final stage in parliament. What started over 10 years ago in WIPO has lead to an evil law and citizens are protesting against it. Members of parliament are reported to receive over 600 e-mail a day about the new law and its flaws.

Citizens sending mail are terrorist

The X-minister of culture Kaarina Dromberg who was responsible for the first version of the law has been making statements that the members of parliament are victims of e-mail terrorism. The current minister of culture x-miss Finland Tanja Karpela has said that there are certain forces behind the e-mail flood. She is right. The e-mails were send by worried normal citizens. The ones that voted the members to the parliament. The ones that have enjoyed freedoms of consuming copyrighted material. The citizens that are affected deeply by the new law that takes those rights away.

The leader of left wing party Suvi Anne Siimes said in her Blog that the citizens and members of parliament are late. The law has gone through committees where there was a chance to make changes. Member of Parliament Jyrki Kasvi notices that "If a member of parliament isn't a member of the committee they have only one chance to influence the law".

Law in different committees

The law has had mixed response from different committees. The constitutional committee said that consumers have right to make private copies of works that are they have legally bought. The culture committee didn't care. They didn't care to listen to the expert study by Marja Leena Mansala who said that citizen should have a right to bring couple (less than 10) Cd's to country with out showing where they bought them and their legality. Best of all the study was commissioned by minister of culture. The new law treats citizens as criminals from the beginning. It is up to you to show that you have a right to bring a CD from the common market of EU when you come back from your trip to say London.

Corruption and lobbying behind the scenes

The law was written 2002 when Dromberg was minister of culture. She had a special adviser Lauri Kaira who is currently manager of Finnish performance rights organization Gramex. His responsibility is "outside relationships". It is like the scene in lord of the rings. The king is without power, the land is weak and the special adviser hisses his message to ear of the king. Copyright is hard for most politicians to understand. The Industry lobby had their inside man to take advantage of the fact.

The Finnish press has also found out that the civil servant Jukka Liedes (also holds a high place in WIPO) who was responsible of the copyright chapter of the ministry has been in the board of ESEK. ESEK is part of GRAMEX the organization led by Lauri Kaira. ESEK is responsible for distributing GRAMEX monies for the artists. Law professor Olli Mäenpää is saying in Tietokonelehti, that it doesn't sound right that there is such connection with the industry and the civil servant.
http://hietanen.typepad.com/copyfrau...ory_of_fi.html





No bypassing DRM

Proposed New Copyright Law Would Allow Personal Copies Of CDs, But With Restrictions

Minister of Culture to address Grand Committee of Parliament on Friday

Contrary to fears expressed by some Finnish music lovers, the government’s bill for new copyright legislation that is currently before Parliament would not actually make it illegal to copy music onto MP3 players for personal use. However, if it is passed into law, it could set up a few obstacles.

Under the proposed law, it would be permissible to copy music for personal use, but not to bypass copy protection for this purpose. Only a small percentage of CDs on the market at present are copy-protected, but the general expectation is that such protection is likely to spread. DVDs, which are increasingly being used also for music recordings, come with copy protection.

Jukka Liedes, the Ministry of Education & Culture official who headed preparation of the proposed legislation, says that the breaking of copy protection for the copying of the content of a sound or video recording for personal use would be prohibited.

At the same time, there would be no specific criminal sanctions for such an act, but a record company would be entitled to demand compensation for the illegal copying, if the matter came to light.

The breaking of copy protection to allow the performance of an original CD or DVD (for example on another device in the home or car) would nevertheless be permitted under the proposed legislation.

The copying of illegal music files from the Internet for private use would be prohibited under the new law, but once again this would not be subject to legal sanctions, according to Liedes. The copyright holder could nevertheless demand compensation from transgressors.

The bill for a new copyright law is before Parliament’s Grand Committee on Friday. The committee still has the power to make changes to the proposed law.

Speaking before the Grand Committee on Friday will be Minister of Culture Tanja Karpela, who hopes to assuage worries about perceived shortcomings of the proposed law.

The committee can either change the text of the bill, or could propose to a plenary session of Parliament the inclusion of a statement calling on the government to make changes to the law if it leads to unreasonable practices.

Karpela said on Thursday that the bill should not be changed, because an EU directive bans the breaking of copy protection.

Heidi Hautala, the chair of the Parliamentary group of the Green League, noted that the EU directive allows member states a certain amount of leeway, which Finland has not used. She criticised Karpela for being "uncooperative" in the matter.

Grand Committee Chairman Jari Vilén (Nat. Coalition) said that the committee should listen to Karpela to get more than just her initial reaction.
http://www.helsinginsanomat.fi/engli.../1101980971029





P2P Pro Given Broad Powers At New Microsoft

Redmond announces major reorganization
AP

Microsoft Corp. is reorganizing its corporate structure and giving one of its newest executives broader powers in an effort to better compete against its rivals, including Google Inc. and Yahoo Inc.

The corporate changes announced Tuesday are designed in part to help Microsoft move toward more Internet-based service offerings, which have been championed by those competitors and are seen by some as a serious threat to Microsoft's dominant Windows operating system. The moves also are aimed at helping the company become more nimble.

"These changes are designed to align our business groups in a way that will enhance decision-making and speed of execution, as well as help us continue to deliver the types of products and services our customers want most," Microsoft Chief Executive Steve Ballmer said in a news release.

Under the changes, Ray Ozzie, a highly respected software veteran who came to Microsoft when it acquired his company, Groove Networks, will be charged with helping the company coordinate and improve Internet-based service offerings. These include Windows Update, the company's online tool for issuing security fixes; its MSN consumer online unit, including Web-based e-mail, instant messenger and search technology; and its Xbox Live online videogame service.

Ozzie will retain his title of chief technical officer. He is one of three at the company.

The company also plans to reorganize from seven broad business units to three new business divisions.

Microsoft Platform Products and Services will include the company's Windows, server and tools, and MSN online divisions. It will be led by Kevin Johnson and Jim Allchin.

Allchin, a longtime executive charged with overseeing its flagship Windows operating system, will retire at the end of 2006, after the new version of Windows is released.

The other two units are Microsoft Business Divison, which will include its Office products and products for small- and mid-sized businesses, and Microsoft Entertainment and Devices Division, which will include its Xbox game console, other games, mobile phone and handheld devices products.
http://www.nytimes.com/2005/09/20/te...n er=homepage





Europe Considers New Charges Against Microsoft
Paul Meller

Almost 18 months after the European Commission ruled that Microsoft had abused its dominance in the software market, Europe's antitrust authority is considering opening new cases against the company, Neelie Kroes, the competition commissioner, said Monday.

The commission ruling resulted in a fine of 497 million euros against Microsoft and an order to change the way it sells software in Europe. The changes have not formally taken effect yet and the ruling is under appeal at the European Court of First Instance.

In an interview at her office in Brussels, Ms. Kroes said she was not going to wait for a court outcome before taking further action. "We have had informal complaints, and we are using our time now to look at them," she said, adding: "We're not going to wait and do nothing."

The informal complaints Ms. Kroes has received since taking office late last year focus on the bundling of existing applications and future ones. She refused to give details. Among the areas the new complaints might focus are on the bundling of the Office suite of software applications that include Microsoft Word, the word processing software, and Outlook, the e-mail program. These are sold as a package in most new personal computers, making it hard for rival word processors and e- mail programs to compete.

Microsoft responded Monday by saying it was keeping the commission apprised of its new products.

"We have kept the commission very closely informed of all Microsoft's plans for new technology development and we will continue to respond quickly and comprehensively to any requests for information," Horacio Gutierrez, associate general counsel for Microsoft in Europe, the Middle East and Africa, said in a statement.

Last year, Microsoft was ordered to introduce a version of Windows that excluded Media Player, the company's music and video-playing program. The aim was to prevent Microsoft from having any unfair advantage over rival music and video players.

Three months ago, Microsoft introduced Windows Edition N without Media Player, as required by the ruling.

Delays in putting last year's ruling into effect, as well as the growing suspicion that part of the proposed remedy will not have the desired effect, have left some lawyers wondering about the value of last year's antitrust decision.

Despite Ms. Kroes's assurances, she has had little success getting Microsoft to comply with parts of last year's ruling. Her antitrust officials are still assessing the company's proposals, and she could not give a date for when the commission would announce its decision, even though Microsoft submitted its technically complex proposals more than three months ago.

According to Thomas Vinje, a partner in the Brussels office of the law firm Clifford Chance, Microsoft's attempts to stall any new legal challenge to its operations in Europe have worked so far. Mr. Vinje works for the European committee of interoperable systems, or E.C.I.S., which is supporting the European Commission in the case.

"It's a typical Microsoft tactic to draw things out as much as possible, and in a way it's working because E.C.I.S. is so busy working on the appeal that it hasn't had time to submit a fresh complaint against Microsoft," Mr. Vinje said.

Ms. Kroes, who will visit New York later this week to meet with her United States counterparts, said Microsoft's stalling tactics were failing, as far as she was concerned. "We are not out of the game. We are following what's going on," she said.
http://www.nytimes.com/2005/09/20/bu...s/20trade.html





File-Sharing Services Seek Pact With Record Studios
Saul Hansell

At least five online file-sharing companies have started trying to reach an accord with the music industry to convert the free trading of copyrighted music on their networks to paid services, according to several recording industry and file-sharing executives.

The most advanced discussions are between the recording industry and Grokster, a small California company that has been sued by the entertainment industry, recording industry executives said.

Grokster has agreed in principle to be acquired by Mashboxx, a new company backed by Sony that is trying to start a legal file-sharing service, a person involved in the negotiations said. Mashboxx has made overtures to some file-sharing companies including eDonkey, Morpheus and LimeWire, but negotiations are not active, the person said.

The tentative agreement between Grokster and Mashboxx was first reported by The Wall Street Journal. MashBoxx would make a nominal payment for Grokster, but would share future revenue, the person involved in the negotiations said.

"We are looking at a number of acquisitions," said Wayne Rosso, the founder of MashBoxx, "but they have to make sense."

Michael Page, a lawyer for Grokster, did not return calls seeking comment.

Separately, iMesh, a file-sharing service that last year reached an accord with the music industry to convert to a legal paid service, has made overtures to acquire a number of the other file-sharing services, on the condition that they settle their claims with the recording industry, said Robert E. Summer, the executive chairman of iMesh.

"We have initiated discussion with a number of well-known players," Mr. Summer said. He said it was difficult to say which, if any, of those discussions would lead to acquisitions, in part because of the complexity of potential deals with the recording industry.

Mr. Summer declined to say how much money iMesh was offering the other services, but said "I don't think anyone will get rich off these deals." Rather, he thinks that such arrangements offer the owners of those services the ability to avoid litigation.

Such acquisitions, he said, "are good for iMesh and good for the industry." Mr. Summer is the former president of Sony Music International and former president of RCA records. He was hired by the founders of iMesh, which has moved to New York from Israel, to oversee relations with the record industry.

IMesh has agreements with all the major record labels and plans to introduce its service to consumers "imminently," Mr. Summer said.

Mashboxx announced a deal with Sony in June that would allow Mashboxx to sell Sony's music on its network. The company is in talks with other record labels, Mr. Rosso said. He hopes to introduce a public test of the service in December. He served as president of Grokster from 2001 until 2003 and remains close to Daniel Rung, the California entrepreneur who founded and owns Grokster.

The recording industry was handed more legal leverage in June when the Supreme Court ruled, in MGM v. Grokster, that the owners of file-sharing services can be held liable for contributing to the infringement of copyrights under certain circumstances. The case, which has both Grokster and Streamcast Networks, the owner of Morpheus, as defendants, was sent back to a lower court for further action. Last week, the Recording Industry Association of America sent letters to several file-sharing services, including LimeWire, eDonkey, and BearShare. The letters demanded that the companies stop allowing users to trade copyrighted files and invited them to discuss potential settlements in advance of litigation. A majority of the recipients of those letters have initiated at least preliminary settlement discussions, according to a recording industry executive.

Jenni R. Engebretsen, a spokeswoman for the recording association, confirmed that those letters were sent but declined to discuss any negotiations that have resulted.

Record industry and file-sharing executives say that the recording industry is looking for settlements that resemble its deal with iMesh, which paid $4 million in damages and promised to convert to a paid service that blocked the trading of copyrighted files without the permission of the copyright owner. None of the executives would discuss the amounts that the industry has been asking in the most recent settlement discussions.

"Ever since the Grokster decision, we have been thinking about what our next iteration should be and obviously the letter last week made that process more urgent," said Sam Yagan, the president of MetaMachine, which distributes eDonkey. He said he had talked to both iMesh and MashBoxx but had not decided whether to sell the company, to offer his own legal service, or to continue to fight the record industry.

Mark Gorton, the chief executive of LimeWire, said his company had not decided how to respond to the recording industry's letter. He declined to discuss any prospective acquisition offers. Michael Weiss, the chief executive of StreamCast, declined to comment on potential deals with iMesh or Mashboxx. BearShare executives did not return calls for comment.

While iMesh has taken nearly a year to develop its paid service - allowing free trading of files in the interim - the industry is likely to demand that other services stop free file-trading relatively quickly. That will require complex software development and business negotiations.

File-sharing services allow users to download files from each other's computers. Both iMesh and Mashboxx intend to use technology that examines files being downloaded and compares them with a master list of copyrighted files provided by record companies. If a user tries to download a copyrighted file, the download may simply be blocked or the user may be asked to pay a fee as with services like Apple's iTunes Music Store.

Both iMesh and Mashboxx have developed methods they hope will help lure users accustomed to free music into paying for songs. Mashboxx will allow users to download files free at low quality several times before being forced to pay for the song. Mr. Summer declined to detail iMesh's marketing plan, but music industry executives say it involves offering a long free trial of a subscription service, which allows users to listen to an unlimited number of songs for a fixed monthly fee.
http://www.nytimes.com/2005/09/20/te...0grokster.html





Mashboxx Appoints Music Industry Insider As CEO

Rosso becomes chairman
Tony Smith

Mashboxx, the legal P2P software provider, has appointed a former Napster and Universal Music Group executive as President and CEO.

Wayne Rosso, the colourful current incumbent, will become chairman, handing over the running of the company he founded to Mike Bebel, The Register has learned.

Bebel is a something of a music-industry insider. He has been a senior VP at Universal Studios, and co-founded Universal Music Group's elabs venture. He went on to run Pressplay, the digital music distribution business set up by Universal and Sony, as CEO.

Pressplay was later acquired by Roxio, which subsequently bought the Napster name and used Pressplay as the foundation for its licensed music download business. Bebel became the Napster division's President and COO, a role he quit last year.

Despite his move to offer a legitmately licensed peer-to-peer operation, Rosso, as one-time head of P2P software provider Grokster, isn't exactly one of the music industry's best buddies. With so many P2P services now going offline in response to the Recording Industry Ass. of America's cease-and-desist requests, Rosso undoubtedly reckons it's now time to give Mashboxx a public face untarnished by the first file-sharing era and one the major labels will feel confidendent in dealing with.

Someone, in other words, who is 'us' not 'them'.

Rosso's goal with Mashboxx was to create a legal P2P service that would nonetheless co-exist with the questionable ones. The RIAA's actions, fueled by the US Supreme Court's judgement against Grokster and StreamCast, leaves Mashboxx's as-yet-unlaunched network in a vacuum, at least until other legal P2P services come on stream. Indeed, Mashboxx itself may yet prove Grokster's saviour, and we can't help wondering if that's not, at least in part, behind Rosso's change of role.

"I am completely confident that Mike will not only take us to market successfully, but build Mashboxx into a long term meaningful entity in the digital entertainment delivery realm," Rosso told The Register by email today.
http://www.theregister.co.uk/2005/09...oxx_reshuffle/





It's A Nice Day For An iPod Wedding
Alorie Gilbert

As a bride-to-be, Jessica Spence was taking extra care to note the details at a friend's wedding recently.

One thing that stood out to her was an idle-looking DJ who hit a few buttons on his laptop and appeared to take the rest of the night easy.

"I swear to god, the DJ was playing Solitaire throughout the dinner and cocktail hour," Spence noted in an online forum at wedding-planning site TheKnot.com. "It seems sort of silly to pay someone a lot of money to sit at a laptop and put on songs when we can do the exact same thing."

With their confidence in wedding DJs dented, Spence and her fiance are counting on their iPod to provide the musical entertainment at their wedding reception in Minneapolis later this month. They're among a growing number of couples making personal music players a central part of their big day.

Keeping wedding budgets in check is one reason couples are going the digital-DJ route. According to wedding-planning guide Bridal Bargains, professional DJs charge an average of $600 per wedding. A live band can run upwards of $1,000. If a couple has already plunked down $300 or so for an iPod or an iRiver, and spent hours refining their digital-music collection, it's easy to see why a DJ might seem superfluous.

"What could be easier?" said Lori Leibovich, editor of IndieBride.com, a Web site for brides. "You bring it, you program it, it sounds great. It doesn't surprise me at all that more people are doing it."

Do-it-yourself wedding music has emerged as a popular discussion topic on IndieBride's discussion forums, as well as those at TheKnot.com. In another signal that the trend is on the rise, the latest edition of the best-selling book "Bridal Bargains" features a section on "the iPod wedding."

Celebrities are looking into iPods as DJs, too. Rock star Alanis Morissette, who's engaged to actor Ryan Reynolds, has said during recent interviews that she may use an iPod at her wedding next year.

Indulging your inner DJ

Saving money obviously isn't the only motivation. Many couples view their wedding music as an opportunity to express themselves and put a personal stamp on their event. A digital-music player seems to set a more relaxed tone, too, one bride-to-be said.

"I think it will really add to the feel of the night not being so staged," said Emily Mighdoll, who is planning to use an iPod at her wedding next year in Delray Beach, Fla. "There's music, but no one will be telling us what to do the whole night. It's also sort of neat being able to control a piece of how the party goes."

It's also the ultimate way to indulge a bride or groom's inner disc jockey. Grooms, in particular, find that aspect appealing, Mighdoll said.

"My fiance is definitely an audiophile and has tons and tons of music--anything we'd want a DJ to play and more," she said. "He's definitely selecting the playlists." (Mighdoll, however, said she's retaining veto power over the song selection.)

But do-it-yourself wedding music is not as simple as it might sound. For one thing, most couples find that they need to borrow or rent a sound system, including speakers, amplifiers, cables and a microphone. Rental costs can easily exceed $100.

Couples may also want to ask a trusted friend or family member to play MC and manage music transitions from dinner to dancing. Others advise using a laptop to sidestep some of pocket-size players' limitations, such as some iPods' 2-or 3-second pause between songs. Backing up music to a CD in case of a technical malfunction is also not a bad idea.

Music selection can also be tricky, a former radio DJ writes on IndieBride's online forum. "From a DJ's perspective, the music is not for you," she writes. "You are not playing your favorite songs. You are playing songs people want to hear and that people want to dance to."

She recommends sticking to crowd pleasers like "YMCA" by the Village People and "Whip It" by Devo.

Professional DJs say all of this detail is too much for most amateurs to handle. That's why the technology isn't putting any DJs out of business, said Jim Tremayne, editor of DJ Times magazine.

"A good, experienced, professional mobile DJ will offer more than music selection," Tremayne said in an e-mail interview. "That DJ will offer the timing that an iPod can't. He'll do introductions. He'll play the music at the exact time that you want. He'll offer the expertise of someone who's done this hundreds of times."
http://news.com.com/Its+a+nice+day+f...3-5874790.html





Credit Card Battle Hits Stalemate
James Kelleher

SECURITY experts at the world's two biggest credit-card associations said the battle against internet-based thieves had reached a stalemate and the industry would have to spend millions of dollars over the next decade just to keep up with the criminals.

John Shaughnessy, senior vice president for fraud prevention at Visa USA and Suzanne Lynch, vice president for security and risk services at MasterCard International, said that organized crime rings - with the help, in many cases, of former Soviet KGB cryptographers - were successfully using the internet and "crimeware" software programs to circumvent the defences credit-card issuers erected against them.

The picture they presented of an escalating struggle between commerce and criminality offered little hope of quick relief for consumers worried about identity theft or for investors in card-issuing banks concerned about security's escalating costs.

The credit-card companies were battling loosely knit, elusive criminal networks responsible for much of the fraud, they said.

"They're very, very good at what they're doing," Mr Shaughnessy told the Bank Card Conference, "and they're a few steps ahead of us in a couple of areas. They've done their homework about the payments system and because of (them) we all have a chance to lose some sleep at night."

Mr Shaughnessy said FBI data showed the number of internet-related credit-card crime reports rose 66 per cent in 2004 and the average reported loss associated with the online scams tripled to $US2,400 from $US800 in 2003.

Part of that jump reflects the rise of business done on the internet, but part of it also reflects the increasing sophistication of the criminals.

"We build a 10-foot wall," Ms Lynch said, "and the bad guys build an 11-foot ladder".

While the criminals are increasingly savvy, in many cases they were inadvertently helped by sloppy security policies within the payment chain itself - and by slip-ups by merchants, third-party processors or the credit-card companies themselves.

"I will say that of all the hacks we've seen - and we've seen hundreds and hundreds of these - had the third-party been in compliance (with association rules), they probably wouldn't have been hacked," Mr Shaughnessy said.

He said Visa and others were looking at ways of protecting data so that even if a consumer's credit card information was compromised, it would be useless to the criminal. But he warned it would take many years, and lots of money, to set up such a system.


"This is going to take big investments over a number of years and we're talking hundreds of millions of dollars to come up with a secure system," he said. "Maybe 10 years from now we'll have it solved . . . It's a tough situation."
http://australianit.news.com.au/arti...-15319,00.html





Surveillance

Crave Privacy? New Tech Knocks Out Digital Cameras
Michael Kanellos

Researchers at the Georgia Institute of Technology have come up with an inexpensive way to prevent digital cameras and digital video cameras from capturing that secret shot.

The technology they've devised detects the presence of a digital camera up to 33 feet away and can then shoot a targeted beam of light at the lens, according to Shwetak Patel, a grad student at the university and one of the lead researchers on the project.

That means that someone trying for a surreptitious snapshot of, say, a product prototype or an amorous couple gets something altogether less useful--a blurry picture (or a video) of what looks like a flashlight beam, seen head on. (A video of how the system works can be viewed here.)

The group has developed a lab prototype--which consists of a digital projector with a modified video camera mounted on top--but will soon design a device that could be manufactured and sold commercially. The group, which presented a paper on its work at Ubicomp (The Seventh International Conference on Ubiquitous Computing) in Tokyo last week, is also in contact with large consumer electronics manufacturers.

Though photo-foiling gadgets are one possibility, the technology might also eventually be incorporated into digital projectors and other devices as a feature.

The Georgia Tech researchers aren't alone in their pursuit. Tech giant Hewlett-Packard, for one, has applied for a patent on technology that could remotely cause blurry pictures in digital cameras, but it requires putting additional circuitry inside the camera. HP and others are also working on projection technology meant to stymie video piracy.

The technology is a stab at ameliorating the privacy problems that have arisen with the advent, quick ubiquity and tiny dimensions of digital cameras. Nearly 85 percent of cell phones in Japan come with built-in digital cameras, and the figure for North America and Western Europe is supposed to rise to 80 percent by the end of next year, according to market researcher Gartner.

"It certainly is a concern, and it has been a concern since cameras have gotten really small," said Steve Baker, an analyst at NPD Group. "It is a lab trick that has some real-world application."

Companies commonly confiscate digital cameras temporarily from visitors coming to their labs or confidential meetings. "But you can't confiscate a phone. Someone might be expecting an important call," Patel said.

Many companies also maintain strict no-photography policies in quasi public places. Someone trying to take pictures inside a Wal-Mart or an electronics boutique will immediately draw a warning, or expulsion. Conferences also have similar rules. Patel himself got in trouble trying to take a picture of a "No Photography" sign to illustrate where theinvention could be used.

"If it is a big exhibit hall, it is impossible to confiscate all of the cameras," said Patel.

How it works

The Georgia Tech system essentially exploits the "retroreflective" property of digital camera lenses. When light strikes a retroreflective surface, a portion of the light bounces back to the original source. While eyeglasses, bottles, watches and other glass surfaces are retroreflective, a coating on virtually all digital camera lenses puts cameras in a class of their own.

"The film atop lenses (is) highly reflective," said Patel. "A lot of people probably have known this but they haven't thought about leveraging it."

In this system, a device bathes the region in front of it with infrared light. When an intense retroreflection indicates the presence of a digital camera lens, the device then fires a localized beam of light directly at that point. Thus, the picture gets washed out.

The neutralizing light continues until the camera lens can no longer be detected, which prevents video cameras from capturing clear footage.

For added security, the system emits light beams in a pattern that prevents cameras from compensating for the light. (In the lab prototype, the video camera, with its built-in infrared beam, serves as the camera detector, while the projector is the neutralizer.)

The technology can detect and block multiple cameras and works on cameras with either CCD or CMOS imagers, which are used in the vast majority of digital cameras.

The neutralizing light is also highly focused to minimize distractions. "We only light up pixels where the reflection is coming from," Patel said.

More work lies ahead for the researchers. The current implementation works indoors and only up to certain distances--it's effective at a range of up to 10 meters and covers a 45-degree area. Cameras close to the detector and at a sharp angle can fall into an undetectable dead zone. Fast shutter speeds might also present some challenges, as do filters, though it turns out that the camera detector can spot lenses cloaked with infrared filters.

While the prototype relies on a digital projector for the neutralizing light source, the group believes it can also use a laser pointer and two mirrors to foil photographers.

"That will make it a lot cheaper to do," Patel said.

The prototype is also rather indiscriminate--it knocks out whatever it believes to be a camera. Some companies have released antiphotography tools, but those tools work only if the camera or cell phone has a Bluetooth chip--and then only if the gadgets are preprogrammed to shut down when the chip receives a "no photographs" message.

So the broad nature of the Georgia Tech system is a good thing, Patel said. "It doesn't require cooperation of the camera."
http://news.com.com/Crave+privacy+Ne...3-5869832.html





Roberts Vote May Delay Data Security Debate
Anne Broache

A trio of personal data security bills likely won't get attention from the Senate Judiciary Committee until next week, a committee representative said Tuesday. Instead, much of the committee's Thursday business meeting will be devoted to a decision on Judge John Roberts' Supreme Court nomination and continued work on a habeas corpus measure.

Still up for consideration are the sweeping Personal Data Privacy and Security of Act of 2005 and two shorter proposals, all of which propose prompt notification when security breaches occur, award increased regulatory power to the federal government, and set minimum standards for data security. The measures have appeared on the committee's executive business meeting agendas since before Congress' summer recess but have not yet come up for debate.
http://news.com.com/Roberts+vote+may...3-5874811.html





EU Lawyers Slam Data Retention Proposal

Draft would have public pay for state surveillance

European Council and Commission lawyers say a controversial plan for retaining telephone and Internet data, proposed last April by the UK and several other Member States, is partly illegal.

Both legal services say that provisions in the draft Framework Decision, which would oblige telcos to retain phone and Internet data, would be illegal. This, they argue, is because the matter should instead be dealt with under EC internal market laws regulating telecommunications.

In fact, a controversial EC Directive of 2002 already covers this issue by leaving member states the option of requiring telecoms service providers to retain public data for use by law enforcement agencies. The proposed Framework Decision would go further by forcing member states to impose such requirements on telcos and by detailing the precise obligations that must be imposed.

However, the two legal services did not address whether or not the proposed measures would infringe the right to privacy. As a prior Statewatch analysis showed, the initial proposal suffered from profound and fundamental flaws.

In light of these flaws, Statewatch says the initial proposal cannot be justified in light of the right to privacy guaranteed by the EU Charter of Fundamental Rights, the general principles of EU law, Article 8 of the European Convention on Human Rights, national constitutions and other international human rights treaties.

But if the proposed Framework Decision is split into two measures, as suggested by the legal services, the European Parliament will be able to show its concerns about the right to privacy. Parliament could then either veto the draft Directive or make fundamental changes to it, in order to ensure that this fundamental human right is protected.

This would also be an opportunity for the European Parliament to insist on a proper initial impact study, to assess whether the huge cost which the proposal would entail for an industry crucial to Europe's economic growth can be justified, in light of the less intrusive but more effective measures that could be taken to focus police investigations on people who are reasonably suspected of involvement in serious crime - instead of mass surveillance of the entire society.

Statewatch editor, Tony Bunyan, says: "The proposal should be withdrawn as the law enforcement agencies have all the powers they need. If it goes ahead and the costs are borne by the communications industry we will all end up having to pay to be placed under surveillance by the state!"
http://europe.tiscali.co.uk/index.js...ntent=38 6332





EU Sets New Plan On Data Retention
Kevin J. O'Brien

The European Commission, seeking to break a four-year deadlock over anti-terrorist legislation that would require telephone network operators and Internet service providers to keep detailed data on their customers, proposed a compromise Wednesday that tries to overcome lingering privacy and cost concerns.

Experts were divided over whether a proposal by the EU justice minister, Franco Frattini, to retain Internet traffic data for six months and phone records for one year would break the impasse, which has pitted law enforcement officials against privacy advocates and telecommunications companies since the Sept. 11, 2001, terrorist attacks in the United States.

The latest push for movement on the data retention proposal followed this summer's bombings in London. It shortens the length of time records would need to be stored and takes into account the cost to companies of doing so.

Frattini, speaking at a news conference in Brussels, said the commission's proposal, which would require approval by the European Parliament and the Council of Ministers, would help both law enforcement officials and protect privacy concerns.

Frattini said the EU could no longer "allow safe havens in Europe" caused by a diversity of national laws that might allow terrorists to escape.

"This package is not only a data-retention package but a data-protection package as well, " he said.

The EU's 25 countries have no unified law on data retention.

There are some members, like Germany, that impose no legal requirement on operators at all, and others, like Italy, that require them to keep the records for up to four years.

Frattini offered his compromise after EU justice and home affairs ministers meeting informally on Sept. 8 in Newcastle, England, split over their separate plan to mandate a one-year retention of Internet traffic and three years for phone records. He said he hoped to negotiate an agreement before the end of the year.

Privacy advocates and telecommunications operators reacted cautiously - if not downright warily - to his plan.

"I don't think this means that Europe is moving forward on creating a data retention law any time soon. I think the chances are still slim at best," said Gus Hosein, a lecturer in technology policy at the London School of Economics and member of Privacy International, a London-based group that opposes data retention. "This latest plan only further muddies the issue."

Michael Bartholomew, director general of the European Telecom Network Operators Association, an industry group that represents 41 telecommunications companies in 34 European countries, said European network operators already routinely cooperate with law enforcement officials, providing them on a case-by-case basis with information that operators collect in the normal course of business.

The EU proposals, if adopted, would require operators to collect much more extensive data, such as the destination of calls that didn't get an answer and the locations of cells from which mobile calls were placed. Bartholomew said that would require some operators to reconfigure their networks.

"The proposal goes much further than the current practice in the types and duration of data to be collected," Bartholomew said. "We are asking that there first be more consultation at EU levels with the industry to ensure that any adopted measures are feasible, proportionate and effective."

Martin Selmayr, a spokesman for the European Commission's Information Society and Media directorate, which collaborated with Frattini on the latest proposal, said the EU would reimburse telecommunications companies and Internet service providers for the costs of retaining data under the new plan - something that is not addressed under the plan being considered by justice and home affairs ministers.

Selmayr said estimates of the costs to companies ranged from 50,00, or $60,000, per network operator per year to "several millions of euros."

Under Frattini's plan, EU telecommunications operators would be required to keep data that would identify the times, locations and identities of callers, but not the content of the conversations or text messages. Likewise, Internet access companies would be required to keep data that identified individual computer users, their devices, their locations and the Web sites they visit but not the contents of the Web pages or of their e-mail messages.

Hosein of Privacy International said EU parliamentarians were unlikely to approve any form of data retention because of conflicts with European national privacy laws that are far more restrictive than in the United States, which he said does not mandate data retention.

"This type of data retention would never fly in the United States because of privacy concerns and because the industry would not allow it," said Hosein, who is American. "Even in the U.S., the Department of Homeland Security has not been able to mandate this type of retention measure."

The British government, which holds the revolving EU presidency until the end of the year, said Wednesday it was committed to pushing through a law this year, even though recent attempts to mandate data retention nationally in Britain have failed.

A spokesman for the British Home Office, which has been spearheading efforts by the EU justice and home affairs ministers to pass the stricter retention law, said it was prepared to consider Frattini's proposal.

"We will consider the commission proposal carefully to see whether it meets member state requirements," the spokesman said. "We are taking the offer of a deal seriously, but will only proceed if the right deal is on the table."

Overcoming national differences could prove difficult. In Germany, for example, state privacy regulators in Hamburg, the home of AOL Deutschland, are in conflict with German federal regulators in Berlin over data retention, with state law requiring no retention at all and federal law allowing for retention for up to six months.

The conflict, for example, has prevented Internet service providers in Germany from selling services that alert customers by SMS when friends who are also customers of the same service are located by the network and found to be within a certain distance of the caller.

Andreas Koenig , the European sales manager for Network Appliance, a company based in Sunnyvale, California, that sells data storage hardware and software to European network operators such as Deutsche Telekom, Vodafone, Orange and British Telecom, said Frattini's offer that the EU pick up the costs might relieve the financial burden on network operators and eliminate their opposition to the proposal.

"What is good is that under the new proposal, the EU would pick up the costs, not the consumer," Koenig said.
http://www.iht.com/articles/2005/09/...iness/data.php





NSA Granted Net Location-Tracking Patent
Declan McCullagh

The National Security Agency has obtained a patent on a method of figuring out an Internet user's geographic location.

Patent 6,947,978, granted Tuesday, describes a way to discover someone's physical location by comparing it to a "map" of Internet addresses with known locations.

The NSA did not respond Wednesday to an interview request, and the patent description talks only generally about the technology's potential uses. It says the geographic location of Internet users could be used to "measure the effectiveness of advertising across geographic regions" or flag a password that "could be noted or disabled if not used from or near the appropriate location."

Other applications of the geo-location patent, invented by Stephen Huffman and Michael Reifer of Maryland, could relate to the NSA's signals intelligence mission--which is, bluntly put, spying on the communications of non-U.S. citizens.

"If someone's engaged in a dialogue or frequenting a 'bad' Web site, the NSA might want to know where they are," said Mike Liebhold, a senior researcher at the Institute for the Future who has studied geo-location technology. "It wouldn't give them precision, but it would give them a clue that they could use to narrow down the location with other intelligence methods."

The NSA's patent relies on measuring the latency, meaning the time lag between computers exchanging data, of "numerous" locations on the Internet and building a "network latency topology map." Then, at least in theory, the Internet address to be identified can be looked up on the map by measuring how long it takes known computers to connect to the unknown one.

The technique isn't foolproof. People using a dial-up connection can't be traced beyond their Internet service provider--which could be in an different area of the country--and it doesn't account for proxy services like Anonymizer.

Geo-location, sometimes called "geo-targeting" when used to deliver advertising, is an increasingly attractive area for Internet businesses. DoubleClick has licensed geo-location technology to deliver location-dependent advertising, and Visa has signed a deal to use the concept to identify possible credit card fraud in online orders.

Digital Envoy holds a patent on geo-location, and Quova, a privately held firm in Mountain View, Calif., holds three more, one shared with Microsoft.

"It's honestly not clear that there's anything special or technically advanced about what they're describing," Quova Vice President Gary Jackson said, referring to the NSA's patent. "I'd have to have our technical guys read it, but I don't think it impacts us in any way."
http://news.com.com/NSA+granted+Net+...3-5875953.html





Keystrokes Reveal Passwords to Researchers
AP

If spyware and key-logging software weren't a big enough threat to privacy, researchers have figured out a way to eavesdrop on your computer simply by listening to the clicks and clacks of the keyboard.

Those seemingly random noises, when processed by a computer, were translated with up to 96 percent accuracy, according to researchers at the University of California, Berkeley.

''It's a form of acoustical spying that should raise red flags among computer security and privacy experts,'' said Doug Tygar, a Berkeley computer science professor and the study's principal investigator.

Researchers used several 10-minute audio recordings of people typing away at their keyboards. They fed the recordings into a computer that used an algorithm to detect subtle differences in the sound as each letter is struck.

On the first run, the computer had an accuracy of about 60 percent for characters and 20 percent for words, said Li Zhuang, a Berkeley graduate student and lead author of the study. After spelling and grammar checks were deployed, the accuracy for individual letters jumped to 70 percent and words to 50 percent.

The software learned to improve as researchers repeatedly fed back the same recordings, using results of spelling and grammar checks as a gauge on correctness. In the end, it could accurately detect 96 percent of characters and 88 percent of words.

''If we were able to figure this out, it's likely that people with less honorable intentions can -- and have -- as well,'' Tygar said.

Researchers said there is some limitation to their technique. For one, their work did not take into account the use of a computer mouse or the ''shift,'' ''control,'' ''backspace'' or ''caps lock'' keys. They did, however, describe approaches for taking those into account.

The use of a computer mouse is another challenge, the researchers said.

The Berkeley research builds on the findings of an International Business Machines Corp. study in which 80 percent of text was recovered from the sound of keyboard clicks.

The IBM team, however, relied on controlled conditions such as using the same keyboard and training the software with known text and corresponding sound samples.

Bruce Schneier, chief technology officer of Counterpane Internet Security Inc., called the study ''a great piece of research.'' He said audio eavesdropping is just one of many possible techniques to spy on PC users.

''If the bad guys can get access to your physical space, they can eavesdrop on your stuff,'' he said. ''They can install a camera or a keyboard logger on the wire. They can install a microphone.''

The Berkeley researchers built their system using off-the-shelf equipment.

''We didn't need high-quality audio to accomplish this,'' said Feng Zhou, another Berkley graduate student and study author. ''We just used a $10 microphone that can be easily purchased in almost any computer supply store.''

The Berkeley researchers, part of the Team for Research in Ubiquitous Secure Technology, will present their results Nov. 10 at a computer and communications security conference in Alexandria, Va.
http://www.businessweek.com/ap/finan...h_down&chan=tc





Verizon wireless, records vendor settle

Tennessee Firm Will Stop Selling Data on Cellular Telephone Customers' Calls
Jonathan Krim

A Tennessee company will stop selling personal cell phone records of individuals over the Internet and will provide information on how it acquired such data under an agreement reached last week with Verizon Wireless.

The firm, Source Resources Inc. of Cookeville, Tenn., was among dozens of companies advertising that for fees starting under $100, they would provide records of calls placed to and from any phone user.

Call records frequently are used by law enforcement, which obtains them through court orders. But small data brokers and private investigators have made a business of getting and selling the information online, often acquiring the information using deceptive or illegal practices, according to experts.

Although phone records cannot lead to the type of financial fraud that can result when other types of personal data are stolen, experts said they can be exploited by criminals, such as stalkers or abusive spouses trying to locate their victims.

Wireless carriers say cases of purloined records are rare and that they take measures to safeguard the information. But the Electronic Privacy Information Center, a leading privacy rights group, last month urged the Federal Communications Commission to crack down on carriers for having inadequate security.

Verizon Wireless sued Source Resources in July, after a Verizon Wireless customer complained that his records had been obtained from Source Resources without his permission.

Officials at Source Resources did not return messages seeking comment.

Verizon Wireless spokesman Jeffrey Nelson said that the information was obtained through a commonly used tactic known as pretexting.

The companies that sell the records impersonate actual customers, using private data provided by the people seeking to buy the information. Nelson said the company is continually updating its procedures and training of call-center employees to guard against pretexting.

And he said Verizon Wireless is looking forward to learning more about the various sources of call records and how they are acquired.

"If you are one of these companies that are stealing people's identities, you better sleep with one eye open," Nelson said.
http://www.washingtonpost.com/wp-dyn...091901693.html





Tesco Stocks Up On Inside Knowledge Of Shoppers' Lives

· Crucible database is exhaustive - and secret
· Government bodies are tapped for information

Heather Tomlinson and Rob Evans

Tesco is quietly building a profile of you, along with every individual in the country - a map of personality, travel habits, shopping preferences and even how charitable and eco-friendly you are. A subsidiary of the supermarket chain has set up a database, called Crucible, that is collating detailed information on every household in the UK, whether they choose to shop at the retailer or not.

The company refuses to reveal the information it holds, yet Tesco is selling access to this database to other big consumer groups, such as Sky, Orange and Gillette. "It contains details of every consumer in the UK at their home address across a range of demographic, socio-economic and lifestyle characteristics," says the marketing blurb of dunnhumby, the Tesco subsidiary in question. It has "added intelligent profiling and targeting" to its data through a software system called Zodiac. This profiling can rank your enthusiasm for promotions, your brand loyalty, whether you are a "creature of habit" and when you prefer to shop. As the blurb puts it: "The list is endless if you know what you are looking for."

This publicity material was, until recently, available on the website of dunnhumby, but now appears less forthcoming. Attempts by a number of Guardian reporters to retrieve their own personal information under the Data Protection Act led to a four month battle; the request was ultimately denied so the Guardian has appealed to the Information Commissioner. Tesco has provided some personal data held by Clubcard, the loyalty scheme that monitors members' shopping and which has been credited with fuelling the supermarket group's astronomical growth in the past decade.

But as far as Crucible is concerned, the company admits it has "put great effort into designing our services" so information is classed in a way that circumvents disclosure provisions in the Data Protection Act. Clues about the content of dunnhumby's database have appeared in the company's marketing literature. Crucible, it says, is a "massive pool" of consumer data. "In the perfect world, we would know everything we need to know about consumers. We would have a complete picture: attitudes, behaviour, lifestyle. In reality, we never know as much as we would like." But Crucible, it suggests, has got much further than rival systems by pooling data from several sources and then using the vast Clubcard data pool to profile customers.

Together, Crucible and Zodiac can generate a map of how an individual thinks, works and, more importantly, shops. The map classifies consumers across 10 categories: wealth, promotions, travel, charities, green, time poor, credit, living style, creature of habit and adventurous.

A "Mrs Pumpkin" is cited: she makes pennies work when she shops, mostly uses cash, has a steady repertoire of products but experiments with the new, shops at various times, spends a little more on eco-friendly items, is involved with charitable giving, is rarely away and likes promotions for things she buys.

How does Tesco get the information? Clubcard is used to target promotions at particular cardholders. But Crucible is separate and Tesco insists that while loyalty scheme data is used by Crucible it does so anonymously rather than a house-by-house, name-by-name basis.

Dunnhumby's chairman, Clive Humby, offers a few more clues. Companies such as Experian, Claritas and Equifax have databases on individuals and Crucible collects from them all. Any questionnaire you may have completed, any reader offers you responded to, are bought to build up a picture of attitudes and habits. Crucible also trawls the electoral roll, collecting names, ages and housing information. It uses data from the Land Registry, Office for National Statistics and other bodies to generate a profile of the area you live in. Zodiac is employed to provide a more detailed profile. The combination is valuable to many consumer goods firms: dunnhumby generated profits of £4m on sales of £28m in the last year for which accounts are available. Some £12m of business was done directly with Tesco.

Mr Humby and Edwina Dunn founded dunnhumby. The two have a reputation as shrewd operators in the marketing industry and still own shares in the firm alongside Tesco's majority stake. How the supermarket group and other customers use the data is less clear. One former employee involved in the company's marketing told the Guardian that it can be used to decide how to target offers to individuals or where to open new stores.

A Tesco spokesman said last night: "All work carried out by dunnhumby is regulated by the Data Protection Act and the Direct Marketing Association Code of Practice." But, as the supermarket unveils yet another set of sparkling half-year figures today, one thing is clear: while past success may have been built on the company knowing its customers, Tesco plans to secure its future by knowing everyone else's customers as well.

Profile of an upmarket C10 deserter

When it comes to my personal information, I'm a natural paranoid. So when signing up for a Tesco Clubcard to get those cashback vouchers and offers, I made a point of providing as little information as the application would allow.

No matter. According to Tesco's disclosures under the Data Protection Act (DPA), in the year my card was in use the supermarket managed to build a substantial - if rather wayward - portrait of this reluctant shopper's habits. A formal DPA request, followed by numerous letters to and fro, a terse telephone conversation and finally, a fax explaining that, yes, this information would be used in a journalistic exercise, finally produced two sides of information.

Apparently, I'm a gal who hankers after "finer foods"- indeed, a "natural chef", though friends tell me this probably has more to do with my tendency to cook with natural ingredients than any signs of being a budding Nigella. I am, Tesco determines, "upmarket" - a reference, I suspect, to my habit of buying organic food (Green & Blacks mint chocolate being a particular favourite).

The database defines me through the past four years, placing me in the mysterious "C10" category for 2003, having been an "H13" a year earlier - whatever that means. My "family type" is "other," though alternative social options are not listed. Most importantly for the supermarket, I just don't spend as much as I could there. Under "share of spend" with Tesco I am deemed to have "potential".

My household carries a "reference number", the date of my last visit, with branches used in the past. It says whether I have used Clubcard vouchers and correctly states I do not want my personal information to be passed to other parts of the "Tesco Group". There is no information as to whether I am diabetic, teetotal or have a special diet.

Five slots describe my "shopping habits", each carries the words "Not shopped in last eight weeks". Clearly, I'm a Tesco deserter and a prime candidate for those £10-off vouchers that have been dropping through the letter box of late.

· To learn how to get your personal information under the Data Protection Act, see www.guardian.co.uk/foi
http://www.guardian.co.uk/business/s...573821,00.html





Local news

Secrecy Power Sinks Patent Case
Kevin Poulsen

When New England inventor Philip French had his epiphany 15 years ago, he didn't dream it would lead to an invention that would be pressed into service in a top-secret government project, or spawn an epic court battle over the limits of executive power. He was just admiring a tennis ball.

The ball's seam, with its two symmetrical halves embracing each other in a graceful curve, intrigued him. "I thought, my god, I bet you can do something with that kind of shape," he recalls. He was right. French and two colleagues went on to design and patent a device now called the Crater Coupler, a simple, foolproof connector for linking one pipe or cable to another without nut threads or bolted flanges.

The device is interesting on its own, but the broader legal legacy of the invention may be more important. In a little-noticed opinion this month, a federal appeals court ruled against the Crater Coupler patent holders and upheld a sweeping interpretation of the controversial "state secrets privilege" -- an executive power handed down from the English throne under common law that lets the government effectively kill civil lawsuits deemed a threat to national security, even if the state is not a party to the suit.

The ruling is notable as a rare appellate interpretation of the state secrets privilege as it applies to patent holders. As such, it is a potentially worrying development for inventors -- particularly those developing weapons, surveillance and anti-terror technologies for government contractors -- who may find infringement claims dismissed without a hearing under the auspices of national security. It also offers a fascinating, if limited, view into the machinery of official secrecy at a time when the privilege is being exercised as never before.

"It's the most powerful privilege the government has," says William Weaver, senior adviser to the National Security Whistleblowers Coalition. "It's the nuclear option. It never fails."

French says he and his partners -- Charles Monty and Steven Van Keiren -- got the first inkling of a national security application for the Crater Coupler a decade ago. While shopping the new design around to "a whole mess of quick-disconnect companies," the trio received an intriguing inquiry from Lucent Technologies, the reincarnation of the legendary Bell Labs research center, and at that time still part of AT&T.

Lucent wanted to evaluate the Crater Coupler for use as a fiber-optic "wetmate" -- an airtight connector for two fiber-optic cables designed to operate underwater. It was part of a contract with a U.S. government agency that, the company said, would have to remain unnamed. "It was a secret black job, they couldn't divulge what it was for," says French. "Who it was for, the Navy or the CIA, or who knows, they never said."

A Lucent spokesman confirmed that the company had contact with French in 1995, but wouldn't discuss the details, citing government secrecy concerns.

But according to French, the inventors agreed to help Lucent try to adapt the Crater Coupler to the company's needs, with the expectation that Lucent would license the group's patent if it all worked out. The inventors sent over plans, sketches and a model, and French began consulting and advising a Lucent engineer in monthly phone calls.

After about a year of development and testing, Lucent had good news for the inventors: The device passed all the tests, shaming a competing, clunky design that French says resembled an old thermos. But when the inventors got on the phone with Lucent's lawyers to discuss license terms, the company dropped a bomb. "Almost the first thing they said was, 'Well, we don't have to do anything, because this is under some sort of provision for military secret stuff where we don't have to pay anything,'" says French.

French felt betrayed. "This was after a year of encouragement, with me helping them and them informing us of their progress," says French. "That was one hell of a shock."

Lucent eventually offered the inventors $100,000 for the right to produce 1,000 wetmate couplers. The offer caused a rift between French and his partners: They wanted to make a counteroffer of $500,000, but French -- in his 60s and recently retired -- wanted to take what was on the table. "I said, well, Lucent doesn't have to do a thing, so why don't we take $100,000 and be happy with that?"

Unable to agree, French's partners bought him out for a flat $30,000. "I used some of the money to have a garage built," French says.

Lucent rejected the remaining inventors' counteroffer, and in 1998 Monty and Van Keiren, now incorporated as Crater Corp., filed a federal lawsuit in eastern Missouri against Lucent alleging patent infringement, trade-secret theft and breach of contract. Crater's attorney, Robert Schultz, says there's a question of basic fairness. "Lucent's made a ton of dough, and my clients are out in the cold," says Schultz.

The patent-infringement portion of the case has since been dismissed, under a federal law that says a company can't be sued for infringement if the development was for the exclusive use of the government.

After a year of pretrial wrangling, the case had progressed to the point that Schultz could start subpoenaing documents to support his claim, when the government intervened to assert the state secrets privilege.

Never passed by Congress, the privilege has its roots in English common law and was cemented into American jurisprudence by a landmark 1953 Supreme Court case titled U.S. v. Reynolds. In Reynolds, the widows of three men who died in a mysterious Air Force crash sued the government, and U.S. officials tried to quash the lawsuit by claiming that they couldn't release any information about the accident without endangering national security. The Supreme Court upheld the claim, establishing a legal precedent that today allows the executive branch to block the release of information in any civil suit -- even if the government isn't the one being sued.

According to research by Weaver, an associate professor of political science at the University of Texas, the government invoked the privilege only four more times in the next 23 years. But following the Watergate scandal, the executive branch began applying state secrecy claims more liberally. Between 1977 and 2001, there were at least 51 civil lawsuits in which the government claimed the state secrets privilege -- in every case successfully.

"There was more oversight of presidential activity" after Watergate, says Weaver. "In response to that, I think presidents resorted to the state secrets privilege to keep that oversight from cramping their style."

Under Reynolds, the head of a federal agency must personally intervene to invoke the privilege. In Crater v. Lucent, it was Richard J. Danzig, then-secretary of the Navy, who did the honors. In a March 1999 declaration, Danzig claimed that permitting Crater to pursue a legal inquiry into the government's alleged use of their coupler would tip off U.S. adversaries to certain highly classified government operations and "could be expected to cause extremely grave damage to national security."

"Those operations and programs are currently ongoing," Danzig wrote. "It is therefore my opinion that disclosure of information concerning them would permit potential adversaries to adopt specific measures to defeat or otherwise impair the effectiveness of those operations and programs."

Judge E. Richard Webber granted the government's request immediately, and blocked the Crater inventors from obtaining any information from Lucent or the feds about the government's alleged use of the Crater Coupler or any other coupling device. In the legal battle that followed, it emerged that the order covered an astonishing 26,000 documents -- some of which were not only unclassified, but had already been entered into the public record. In 2002, Webber examined those documents in chambers, and concluded that not one of them would be available for Crater's use in pressing its case.

Schultz turned to the Federal Circuit Court of Appeals. This month a divided three-judge panel ruled (.pdf) that the lower court had properly applied the state secrets privilege. "I would have thought that courts would be more hesitant to apply it to the patent area, but in this case there was no hesitancy whatsoever," says Weaver.

In a dissenting opinion, Circuit Judge Pauline Newman wrote that the ruling efficiently killed Crater's lawsuit, and argued that a saner solution would have been to proceed with the case behind closed doors -- a procedure already used to protect classified information during criminal espionage prosecutions.

"Although there may be areas of such sensitivity that no judicial exposure can be countenanced -- such as, perhaps, the formation of the Manhattan Project -- there is no suggestion that the sensitive information concerning the Crater Coupler cannot be protected by well-established judicial procedures for preserving the security of sensitive information," Newman wrote.

Schultz argues that the secrecy order shouldn't apply to documents concerning an unclassified presentation that Lucent held in which it allegedly showed off the Crater Coupler. He plans to ask for a rehearing of the appeal but claims to be optimistic that the case can proceed with or without access to the evidence.

If so, it would be a rarity, says Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. "The privilege has worked very effectively for the government," says Aftergood. "In almost every case where they've invoked it, it leads to the termination of litigation."

Indeed, the list of cases in which the state secrets privilege has been invoked seems a pantheon of injustice. The privilege was upheld in 1982 to prevent former Vietnam War protestors from learning more about an illegal CIA and NSA electronic surveillance effort that targeted them during the 1970s. In 1991, it was used to stop a lawsuit by a banker who'd unwittingly been roped into an illegal CIA money-laundering operation, and who claimed the agency had ruined his career when he tried to get out.

In 1998, workers at the Nevada airbase known colloquially as Area 51 were blocked from learning what chemicals they'd been exposed to during illegal burning of toxic waste by base administrators.

In 2004, the Bush administration resorted to the privilege to silence former FBI translator Sibel Edmonds, who said she was fired from the bureau after reporting security breaches and misconduct in the agency's translation program. And in perhaps the most disturbing case, this year the Justice Department asserted the privilege to kill a lawsuit by Maher Arar, a Syrian-born Canadian citizen who, in 2002, was picked up by U.S. officials as a suspected terrorist while changing planes at JFK, and promptly shipped off to Syria for a year of imprisonment and torture.

"Here's a guy who was a victim of a crime, that is, kidnapping, who was sent by us to a foreign country to be tortured to get information for us," says Weaver. "That violates all kinds of laws and the Convention Against Torture and who knows what else."

Weaver says the state secrets privilege is a blunt instrument that too often utterly obliterates any further inquiry by the plaintiffs in a civil case. "I'm not saying it's always invoked for evil purposes -- it almost certainly is not. But we can't tell when it is, and that's the problem." He faults Jimmy Carter for being the first president to use the privilege with frequency, and George W. Bush for using it systematically. "This presidency is the first one in history to use the secrecy privilege in a programmatic, organized comprehensive policy," Weaver says. "It's the first secrecy presidency."

"It effectively shuts down the judicial process," says Aftergood. "It tells people that they cannot have their day in court because national security will not permit it, and that's a terrible message to send."

Justice Department spokeswoman Cynthia Magnuson says the department generally doesn't comment on how the state secrets privilege is applied. "The only thing I can say is it's applied if appropriate only," she says.

But if the outcome sometimes seems unjust, it's a necessary trade-off to preserve national security, says Washington attorney Shannen Coffin, a lawyer at Steptoe and Johnson and a former U.S. deputy assistant attorney general from 2002 to 2004.

"That is the balance the court has struck in certain circumstances," says Coffin. "A lawsuit that relates to monetary damages isn't nearly as important as protecting the security of the American people."

While at the Justice Department, Coffin was involved in several cases asserting the privilege. "I've been in meetings with cabinet officials that have invoked the privilege, and they don't take it lightly," Coffin says.

If there's been an increase in the exercise of the privilege, "It is simply a recognition that information is a weapon in the modern day and age," says Coffin. "And that is a serious concern for national security."

Coffin says bold action, like withholding 26,000 documents in the Crater case, is sometimes necessary to prevent a U.S. adversary from compiling bits and pieces of seemingly harmless, unclassified information into a state secret. That "mosaic theory" of national security is frequently cited in litigation surrounding the privilege, and Department of Justice attorney Lisa Olson raised the argument in the Crater case last year.

"The more information that is disclosed, the easier it becomes to disclose more, and soon the floodgates are opened and nothing is secret," Olson told Judge Webber.

A Navy spokeswoman declined to comment on the Crater case, but outside experts say it's easy enough to guess the nature of the top-secret project the government is protecting. "It's all but self-evident that it has to do with the clandestine monitoring of fiber-optics communications cables on the ocean floor," says Aftergood.

"They've been interested in it since the first fiber-optic cable was ever invented," says James Bamford, author of two books on the NSA. "It's clear that they have a major operation in terms of tapping into sea cables."

Fiber-optic cables were well on their way to supplanting less-secure communications technologies at the time that Lucent approached the Crater inventors, and it's been widely reported that the switch threatened to cut off the electronic spies at the NSA. "There's been this huge shift from using satellite communications, which is very easy to tap into, to using both terrestrial and transoceanic fiber-optic cables, and that's presented a major problem for NSA," says Bamford.

To counter that problem, and keep the electronic intelligence flowing, NSA has reportedly developed sophisticated techniques for wiretapping undersea cables, relying on specially equipped Navy submarines, the most advanced of which is the newly recommissioned USS Jimmy Carter, fresh from a $1 billion upgrade that reportedly includes state-of-the-art technology for tapping into undersea fiber-optic communications.

French, now 74 and living in Maine, is not a party to the case since his partners bought out his interest in the invention. But he still has bad feelings over the affair.

"If it had been war time, World War II, I'd have given it to them. But if they're hiding behind some friggin' law, basically to screw somebody...." says French, trailing off.

Lucent spokesman John Skalko says the court's secrecy order prevents him from addressing the inventors' claims in depth. "We deny any breach of contract or any misappropriation of trade secrets," says Skalko.

"You can't try this case in your publication, it's only to be tried in a court of law," Skalko adds -- a prospect that seems increasingly unlikely.
http://www.wired.com/news/technology...,68894,00.html





Study: Wi-Fi Services To Bring In The Bucks
Staff

Worldwide revenue from wireless network services will more than triple over the next four years, according to a report released Tuesday by In-Stat.

The market researcher says revenue will rise to $3.46 billion in 2009, up from the $969 million expected in 2005.

The growth is being fueled by an increasing number of hot spots, the researcher said, predicting that the number of hot-spot locations will double in the next four years from the present 100,000.

The pace of growth, however, will drop in the short term, In-Stat said, particularly in the beginning of 2006, as the market begins to mature.

Also, over time, the average price-per-connection figure will fall, because of declining pay-as-you-go pricing, increasing service subscriptions and the increased presence of free hot spots, In-Stat analyst Amy Cravens said in a statement.

According to In-Stat, the most growth in the sector will come from the cafe segment. The segment--which includes coffee shops, fast food and restaurants--will grow 2.5 times from 40,000 venues now to just less than 100,000 hot spots by 2009, In-Stat said.

"Much of the growth in the cafe/restaurant market will be characterized by branded deployments such as the Starbucks, McDonald's and Panera Bread hot-spot networks," Cravens said.

Significantly, just about a month ago, Intel, with the help of many others, such as IBM, Dell and Cisco, launched a program for rolling out municipalitywide wireless networks in 13 cities. The cities that join the initiative, dubbed Digital Communities, are meant to have a broadband wireless infrastructure that lets the public better connect with police and fire personnel, as well as with public-works employees.
http://news.com.com/Study+Wi-Fi+serv...3-5874906.html





Avidly Seeking Wireless Clues From Google
Steve Lohr

Google, with deep pockets and seemingly boundless ambition, keeps marching steadily beyond Internet searching into new markets like e-mail, advertising, book searches, a satellite map service, instant messaging and telephony. Where next?

The most intriguing recent guess, based on a few Google experiments, is free wireless Internet service. And there appear to be fascinating hints on several Web pages nestled in Google's site. They describe a new test service called Google Wi-Fi and indicate how to use its wireless desktop software, Google Secure Access.

On one page, the features and terms of the new service are described as answers to questions.

"Is there a fee for using Google Secure Access? No, Google Secure Access is free."

"Where can I go to download Google Secure Access? The program can currently be downloaded at certain Google Wi-Fi locations in the San Francisco Bay area."

Citing those Web pages, Reuters carried an article yesterday saying that Google was preparing to introduce its own wireless Internet service. Later in the day, Reuters distributed a revised version of the article saying that Google had begun a limited test of the wireless service.

Google started two wireless access points in Silicon Valley in July, a spokesman said yesterday, one at a pizzeria and the other at a gymnastics center. Recently, it also talked with San Francisco officials about setting up public wireless networks in the city, where it established a single access point in Union Square last spring with a partner, Feeva.

Any further plans, a national rollout perhaps? "We have nothing to announce now," the spokesman, Nathan Tyler, said.

The early efforts, Mr. Tyler said, are part of Google's public outreach program and in keeping with the corporate mission to "make the world's information available."

Google is always guarded about new offerings. Its "billionaires with a heart" image - fostered in language and culture by its young founders, Larry Page and Sergey Brin - only serves to make industry analysts and rivals think that some marketing strategy is to be teased out of even the most innocuous pronouncements.

Speculation that Google may be planning free wireless service around the country has been rising. Last month, an article in Business 2.0 said that for the last year, the company had "quietly been shopping for miles and miles of 'dark,' or unused, fiber optic cable across the country," presumably as a step toward building a wireless network.

Such a free wireless service could make business sense, according to John Battelle, author of "The Search," a new book about Google published by Portfolio Hardcover. "It would be another way for Google to sell targeted advertising and burnish its brand," Mr. Battelle said. "And it's very much in the tradition of Google's brand promise - great stuff free."

Having its own wireless service, some analysts said, could reduce the risk Google would face if a big Internet service provider, like AOL, which now generates a lot of Google traffic, fell into the hands of its rival Microsoft. AOL and Microsoft have held talks recently. "Google may want to have more control over its own destiny," said Jordan Rohan, an analyst with RBC Capital Markets.
http://www.nytimes.com/2005/09/21/te.../21google.html





Talking in the Dark
Clive Thompson

When was the last time you heard a "busy tone" on a telephone? Probably not for years. Our phone system is so robust, our mobile phones are so ubiquitous and voice mail and e-mail are such reliable backups that instant, unhindered access to friends, colleagues and relatives has come to seem a right and not a privilege. Indeed, if you include instant-messaging, blogs and cellphone text messages, you might think we're living in the golden age of communications.

Except when disaster hits. Two weeks ago, I tried calling a colleague down in New Orleans - and found myself listening to the annoying honk of a busy signal and the static of a dead phone line. Katrina had disrupted the city's communications grid, and residents and emergency responders were grappling with the chaos that ensued. For a week, just about the only people with communications were those government officials and reporters lucky enough to have two-way radios or satellite phones with adequately charged batteries. Everyone else staggered around in blind ignorance - which helped produce horrifying pandemonium. We saw a similar lesson in 9/11: When communications crumble, so does society.

Is there a way to prevent such breakdowns in the future? In fact, disaster-preparedness experts and high-tech inventors are already developing the idea of blanketing cities with what they call a "WiFi mesh." WiFi, of course, is the technology you may use at home or in a Starbucks to connect a laptop wirelessly to the Internet; a mesh is a vast, self-correcting network of WiFi antennas that could work together to provide crucial backup in a disaster.

To understand what makes WiFi useful in a catastrophe, consider some frailties of our regular phone-company communications. Phone systems are reliable on a day-to- day basis, but they have a key vulnerability: They're centralized. In any city, a handful of central "switches" handle the work of routing local phone calls. During 9/11, several important switches were located across the street from the World Trade Center and were damaged in the towers' collapse, blacking out parts of New York.

To make matters worse, phone systems are rarely designed to allow more than 10 percent of the population to talk simultaneously, and far more people than that rush to the telephone in an emergency. In the New York City blackout of 2003, while most land lines continued to function, the cellphone circuits were overjammed.

Katrina posed even worse problems. As phone traffic surged, the water was destroying a vast area, including underground phone lines. Mobile-phone networks, too, were ruined, because they're routed through communication towers that crumpled like paper in Katrina's 140-mile-an-hour winds. As a final insult, Katrina knocked out the power grid in swaths of the Gulf Coast - which was fatal for phone systems that require thousands of watts of juice. The surviving mobile-phone sites in New Orleans could run on diesel-generator backup, but with just one tank of gas each, they were capable of operating for only a few days. Even the mayor nearly lost contact with the outside world. After their satellite phones ran out of power, employees of the mayor's office broke into an Office Depot and lifted phones, routers and the store's own computer server.

WiFi meshes elegantly dodge our phone system's central problems. They're low-power and ultracheap - and decentralized like the Internet itself, which was initially conceived to withstand a nuclear attack. You can use WiFi to build a do-it-yourself phone system that is highly resistant to disaster.

In Chicago, the Center for Neighborhood Technology, a nonprofit organization, hooked up dozens of households in the neighborhoods of North Lawndale and Pilsen with WiFi nodes that form a mesh. Each node can communicate with its neighbor a few hundred feet away; by cooperating in this fashion, they form an enormous bucket brigade, each passing the data signal along until everyone is sharing it. If one single household connects to the Internet, all the other households can instantly dip in. Best of all, the WiFi mesh can handle not only data but also phone calls - via the magic of "voice over IP," an increasingly popular technique for transmitting conversation over the Internet. Should the local phone lines suddenly collapse, the residents of these neighborhoods can still make calls to one another using headsets attached to their computers. In essence, they are their own backup phone company.

Unlike a normal land-line or mobile phone system, a WiFi mesh has no single weak point. Knock out any single node in one of the Chicago neighborhoods - destroy an entire house, for that matter - and the mesh has enough redundancy to work around the missing link. The nodes are also durable; they're tiny shoe-box-size devices, which means they're far less likely to be wiped out by hurricanes than enormous mobile-phone-company antennas. "We've been running these little Apollo 13 disaster scenarios where a bunch of our nodes get taken out, and the whole system just reconfigures itself automatically," said Paul Smith, who helped build the Chicago networks.

So why don't cities build their own WiFi meshes to help cope with the next disaster? Scatter enough nodes on rooftops citywide, and then if the phone system collapses, there will probably be a surviving mesh strong enough to serve as a rudimentary backup. Connect even a single satellite uplink to the mesh, and the entire town remains linked to the outside world. Best of all, each WiFi node uses extremely little power - about 10 watts, barely a sixth of the average light bulb. Even if a city's power grid fails, a car battery or solar panel could keep a node running for days or weeks, filling the gap while the phone companies rebuild their land-line and mobile-phone structures.

These disaster experiments are already under way. When Katrina hit, Smith and other volunteer communications enthusiasts rushed down to Louisiana. In Rayville, his team of techies clambered up a local tower to blast WiFi signals 50 miles through the countryside; their signals reached refugees clustered in church basements with computers but no Internet connections. "We're trying to make sure families can contact each other, and get online to register with FEMA's Web site," Smith told me.

The cost is laughably small. City engineers could build a mesh using parts on sale at any Circuit City. (Smith's neighborhood mesh in Chicago cost $350 per node, and he figures it could take only $650 apiece to equip every node with an emergency battery.) Alternatively, a city could simply hire a mesh-networking company like Tropos Networks, which estimates a cost of $70,000 to cover a square mile with DSL-speed connections. These numbers are so low that they are virtually rounding errors in any city's budget.

WiFi does have its limitations. To begin with, an antenna can communicate with another antenna only if it has a clear line of sight. But because the system is so inexpensive, it wouldn't be difficult to address this problem by placing antennas closely together in congested areas. Of course, a WiFi mesh wouldn't work if its users had no supply of electricity. And emergency responders and the military will always need to rely on their own high-quality two-way radios and satellite phones. But for the rest of us, when disaster next strikes, WiFi meshes could be the clever system that keeps people in contact - from house to house.
http://www.nytimes.com/2005/09/18/magazine/18idea.html





Groups Call For Broadcast Flag Hearings
Anne Broache

The battle against the "broadcast flag," a controversial copy-protection technology designed to limit piracy of digital TV programs, is picking up again.

This time, non-profit groups Public Knowledge, Consumers Union and the Consumer Federation of America have dispatched a joint letter to the chairman of the U.S. Senate Commerce Committee, urging federal lawmakers to convene hearings on the matter.

Public Knowledge and other public interest organizations were behind the initial legal challenge against the broadcast flag. A federal court in May unanimously tossed out Federal Communications Commission regulations that would have prohibited the manufacture of computer and video hardware without certain copy-protection features.

The decision did, however, leave Congress the option of giving the FCC such regulatory power. Non-profit groups say they're now concerned that such a proposal could slip through as an amendment to one of the large spending bills lawmakers will likely pass this fall.

Congress needs to understand that "there are alternative techniques for protecting television content that do not require putting the FCC in control of the design of almost all digital products, everywhere, that might conceivably contain or transmit digital television," the Sept. 19 letter said.

"A full hearing of the issues surrounding Internet piracy of television...would show that content owners now have all the legal tools they need to pursue, punish, and deter infringers of television and other content," it went on.

At this point, the groups haven't encountered a draft bill or amendment that would revive the flag, but "we're reaching a point where people on the Hill are starting to focus on the issues, and we wanted to make certain this is part of the thought processes," Art Brodsky, communications director for Public Knowledge, said in an e-mail.
http://news.com.com/2061-10796_3-5873042.html





TiVo Users Fear Recording Restrictions
AP

Many fans of digital video recorders made by TiVo Inc. are beginning to fear that Hollywood studios will one day reach into their set-top boxes to
restrict the way they record and store movies and programs.

Among the functions included in TiVo's latest software upgrade is the ability to allow broadcasters to erase material recorded by TiVo's 3.6 million users after a certain date. That ability was demonstrated recently when some TiVo customers complained on TiVo community sites that episodes of ``The Simpsons'' and ``King of the Hill'' they recorded were ``red-flagged'' for deletion by the copyright holder.

Some users also were upset that they were prevented from transferring these red-flagged shows to a PC via the TiVoToGo service.

Elliot Sloan, a TiVo spokesman, called the red-flag incident a ``glitch'' and said it affected only a handful of customers. ``It's a non-story,'' Sloan said.

Nonetheless, skeptics among TiVo users questioned why TiVo would own such a technology unless the company planned to one day use it.

TiVo and other digital video recorders let users skip commercials and jump around a recording quickly. Since TiVo introduced its DVR in the late 1990s, customers have enjoyed the ability to record anything they want, and store it indefinitely.

But last year, TiVo quietly disclosed that it would employ copyright-protection software from Macrovision Corp. for pay-per-view and video-on-demand programs. According to a post on TiVo's Web site, the software allows broadcasters to restrict how long a DVR can save certain recordings or in some cases prevent someone from recording altogether.

``Program providers decide what programs will have Macrovision copy protection,'' said the TiVo post.

Matt Haughey, creator of PVRblog.com, the Web site where the complaints first appeared, said some fans are overreacting about the red-flag incident. However, he said he is worried that TiVo has handed Hollywood a means to restrict recordings.

``TiVo would be of limited utility in the future if the studios were allowed to do this with regular broadcast content,'' Haughey said. ``This is like cell-phone jammers. What if you couldn't talk on your cell phone? If customers can't do something with their TiVo that they could in the past, they will stop using it.''

TiVo is among many platforms that could be transformed by the entertainment industry's demands for tighter copyright controls.

Broadcasters have also tried to force electronics manufacturers to insert a technology known as the broadcast flag into new televisions to prevent programs from being copied or disseminated on the Internet.

The Federal Communications Commission at one point required such piracy preventions, but those rules were blocked in May by a three-judge panel for the U.S. Circuit Court of Appeals for the District of Columbia. Congress may get the last word.
http://www.siliconvalley.com/mld/sil...y/12705682.htm





Symantec: Mozilla Browsers More Vulnerable Than IE
Tom Espiner

Mozilla Web browsers are potentially more vulnerable to attack than Microsoft's Internet Explorer, according to a Symantec report.

But the report, released Monday, also found that hackers are still focusing their efforts on IE.

The open-source Mozilla Foundation browsers, such as the popular Firefox, have typically been seen as more secure than IE, which has suffered many security problems in the past. Mitchell Baker, president of the foundation, said earlier this year that its browsers were fundamentally more secure than IE. She also predicted that Mozilla Foundation browsers would not face as many problems as IE, even as their market share grows.

Symantec's Internet Security Threat Report Volume VIII contains data for the first six months of this year that may contradict this perception.

According to the report, 25 vendor-confirmed vulnerabilities were disclosed for the Mozilla browsers during the first half of 2005, "the most of any browser studied," the report's authors stated. Eighteen of these flaws were classified as high severity.

"During the same period, 13 vendor-confirmed vulnerabilities were disclosed for IE, eight of which were high severity," the report noted.

The average severity rating of the vulnerabilities associated with both IE and Mozilla browsers in this period was classified as "high", which Symantec defined as "resulting in a compromise of the entire system if exploited."

The Mozilla Foundation did not immediately respond to requests for comment.

Symantec reported that the gap between vulnerabilities being reported and exploit code being released has dropped to six days on average. However, it's not clear from the report how quickly Microsoft and Mozilla released patches for their respective vulnerabilities, or how many of the vulnerabilities were targeted by hackers, though Microsoft generally releases patches only on a monthly basis.

Symantec admitted that "at the time of writing, no widespread exploitation of any browser except Microsoft Internet Explorer has occurred," but added that it "expects this to change as alternative browsers become increasingly widely deployed."

There is one caveat: Symantec counts only those security flaws that have been confirmed by the vendor. According to security monitoring company Secunia, there are 19 security issues that Microsoft still has to deal with for Internet Explorer, while there are only three for Firefox.

The report also highlighted a trend away from the focus of security being on "servers, firewalls, and other systems with external exposure." Instead, "client-side systems--primarily end-user systems--(are) becoming increasingly prominent targets of malicious activity."

Web browser vulnerabilities are becoming a preferred entry point into systems, the report stated. It also highlighted the trend of hackers operating for financial gain rather than recognition, increased potential exposure of confidential information, and a "dramatic increase in malicious code variants".
http://news.com.com/Symantec+Mozilla...3-5873273.html





Opera Nixes Banner Ads In Free Version
Martin LaMonica

The latest free version of Opera Software's namesake browser will be available without an advertising banner.

With version 8.5 of the Opera browser, which was released Tuesday, the company said that it has removed banner ads from its free edition. Until now, Opera customers had the option of paying to eliminate the ads and receive premium support.

With the licensing change, Opera hopes to accelerate uptake of its browser, the company said.
"Removing the ad banner and licensing fee will encourage many new users to discover the speed, security and unmatched usability of the Opera browser," Jon von Tetzchner, CEO of Opera Software, said in a statement.

Premium support via e-mail is still available from the company for $29 per year.

Version 8.5 also addresses some security vulnerabilities and includes a feature called Browser JavaScript, which automatically fixes out-of-date browser scripts.
http://news.com.com/Opera+nixes+bann...3-5874093.html
JackSpratts is offline   Reply With Quote
Old 22-09-05, 06:29 PM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

Rock Band Shows Fans How To Crack DRM

'Heavy hearted' musician publishes digital rights management workaround
Ken Young

A rock musician has expressed anger at digital rights management (DRM) technology after hearing complaints from fans who are having difficulty importing his group's songs to programs like iTunes.

Speaking on a music forum, Tim Foreman, bassist with San Diego rock band Switchfoot, wrote: "My heart is heavy with this whole copy-protection thing.

"We were horrified when we first heard about the new copy-protection policy that is being implemented by most major labels, including Sony (our own label), and immediately looked into all our options for removing this from our new album.

"Unfortunately, this is the new policy for all new major releases from these record companies. It is heartbreaking to see our blood, sweat and tears over the past two years blurred by the confusion and frustration surrounding this new technology.

"It is also unfortunate when bands such as ourselves, Foo Fighters, Coldplay, etc. are the target of this criticism, when there is no possible way to avoid this new industry policy."

Foreman then went on to provide details of how to crack the digital rights protection.

He justified his actions saying: "We refuse to allow corporate policy to taint the family we've developed together.

"We deeply regret that there exists the need for any of our listeners to spend more than 30 seconds importing our music, but we're asking as friends and partners in this journey together to spend the extra 10 minutes that it takes to import these songs."

John Buckman, founder of music download service Magnatune, said: "Users do not want DRM so I am not surprised that a band is doing this.

"Music sales are sold by the four majors and not many bands are actually in favour of DRM because it stops you ripping CDs and is implemented in a range of ways by the online music sellers like iTunes.

"Advising fans to get round the technology could be a bit risky. It is a crime in the US to subvert DRM and therefore it may be a crime to incite people to do so."

The title of Switchfoot's latest album, Nothing is Sound, seems strangely prescient.
http://www.vnunet.com/vnunet/news/21...fans-round-drm




DRM wasn’t ready

Nokia Delays N91 Music Mobile Phone
Rex Merrifield

Mobile phone giant Nokia said on Tuesday it was delaying the launch of its premium N91 music phone until the first quarter of next year.

The company said it wanted to ensure that the phone, holding thousands of songs, would work on the widest range of music platforms and be a true "jukebox" mobile phone.

That compares with the Rokr music phone launched by Motorola Inc. and Apple Computer Inc. this month, which stores 100 songs and works with Apple's

iTunes music store.

The Finnish mobile firm had originally planned to get the N91 onto the market during the last quarter of this year, in time for the Christmas and end-of-year holiday seasons.

"What we basically decided is that we will postpone it a few weeks, push it out to Q1 and do this Microsoft DRM implementation solidly," Jonas Geust, vice president of music in Nokia's Multimedia division, said in an interview.

"And that's how we want to ensure that we get a great user experience already from launch."

Microsoft Corp.'s Digital Rights Management (DRM) platform allows the controlled transfer of music or other copyrighted material between computer or mobile phone.

Nokia said it wanted consumers to be free to choose how to get their music -- from CDs copied to a PC, directly from Internet stores, or from their mobile network operator -- and be able to harmonize their collections at the click of a button.

That would mean they are not locked into a single channel, such as Apple's iTunes.

The N91 multimedia phone's 4-gigabyte hard drive stores up to 3,000 songs, using advanced coding systems to minimize space needed. The phone will also run on high-speed 3G and wireless LAN networks.

Music Choices

Geust declined to give Nokia's sales expectations or say which telecoms firms were keen to offer the N91 to their subscribers.

"What we can say is there is great interest from the big, big operators and we are actively working on integrating their preferred music services onto the devices," he said.

Asked what Nokia thought about the Rokr, Geust said competition would increase consumers' awareness of music devices, adding only: "We see quite a few limitations on the choices there, but those have been debated in public already."

Critics have said the Rokr's limited storage hampers its ability to compete with portable music players. It is being offered by U.S. operator Cingular; several operators in Britain are expected to offer it soon.

Nokia announced on Monday it was launching a new music edition of its 6630 smartphone to compete in the market for music on the move. That model, with a memory card that can store up to 15 CDs, would start shipping later this month in Europe, the Middle East and Africa. Unlike the N91 it does not allow for music downloads from Internet music stores.

Nokia said it was using open computer platforms and wanted Internet service providers to develop applications to work with them.

"Let it be that whatever brands in the world are providing music services, or let it be iTunes, we welcome all of those initiatives and that is what we basically have been investing in and working on for years, by developing these platforms," Geust said.

Mobile users should be able to grab music by subscription, as offered by Yahoo Inc. <YHOO.O>, or on a pay-per-song basis and Nokia was in talks with mobile operators on this.

"We have a very strong joint interest to ensure that 3G networks are there to support the download of music," he said.

Nokia expected that pay-per-song downloads over the air direct to the mobile would be charged at a premium, compared to downloads over broadband connections at home.
http://today.reuters.co.uk/news/news...archived=False





On campus

Just What the Professor Ordered
Ian Ayres

IN time for the new school year, the Government Accountability Office has released a sobering report on the soaring price of textbooks. Over the past two decades, the report tells us, "college textbook prices have risen at double the rate of inflation."

We're used to paying $25 for a hardcover novel, but my casebook on contracts now sells to students for $103, and the best-selling general chemistry textbook (co- authored by my father-in-law) costs $148. At state universities, textbooks and supplies account for 26 percent of all student fees, including tuition. At junior colleges, they are a whopping 72 percent.

The G.A.O. report falls short, however, by attributing this run-up in prices to the development of "CD-ROM's and other instructional supplements." The real problem is the lack of price competition. A series of mergers has ensured that although there are hundreds of textbooks to choose from, the five largest publishers control 80 percent of the market.

It's easy for prices to drift upward when the person choosing the product doesn't really care how much it costs. Instead of competing on price, publishers compete for professors' attention with an excess of computerized bells and whistles.

Indeed, the pricing problems with textbooks are eerily analogous to those affecting prescription drugs. In both cases you have doctors (Ph.D.'s or M.D.'s) prescribing products. In neither case does the doctor pay for the product prescribed - in many cases, he or she doesn't even know what it costs. And the clincher is that in both cases, the manufacturers sell the same product at substantially reduced prices abroad.

The analogy to prescription drugs suggests a possible solution. Perhaps universities can take a lesson from managed health care. Health maintenance organizations are often criticized for being too stingy, but let's not forget that they've played an important role in containing health care costs.

So just imagine what would happen if universities started to provide textbooks to their students as part of the tuition package. Of course tuition would have to rise, but for the first time universities would start caring about whether their professors were too extravagant in the selection of class materials.

This "textbook maintenance organization" wouldn't require a huge centralized bureaucracy. Universities would probably give professors a textbook budget per student. Those who exceeded the budget would have to seek their deans' approval. Some enlightened colleges might even give a share of the savings to professors who don't use up all of their budgets.

Even publishers might not do so badly under this new system. Under the current arrangement, many students protest exorbitant prices by simply refusing to buy textbooks. They make do with slightly older editions, read library copies or share with other students.

Not only do publishers lose these sales, but teachers are irritated because students cannot read along in class or look up information that is relevant to the discussion. Under textbook maintenance organizations, we'd return to the old days where everyone was on the same page.

Still think a system where schools provide free textbooks would never work? Well, we already have one at the elementary and secondary levels. Unlike Hogwarts, which requires Harry Potter to buy books each year, most American public schools own their assigned books and buy new editions only when it's absolutely necessary.

Such a system at the university level would also do away with some conflicts of interest. Because at the moment, professors' incentives in choosing textbooks are in some ways more distorted than doctors' incentives in choosing drugs. You see, I earn a $10.30 royalty on every copy of my textbook that a student buys. Instead of just trying to get the best book for my class (and to do so I should weigh both quality and price), I might also consider assigning my own book and increasing my profit.

This is a self-dealing transaction, which would be presumptively illegal if professors owed a fiduciary duty to students. Some professors realize this and donate to charity the royalties they earn when they assign students their own books.

So this year, I am going to do something different. I will give $11 to each of my contracts students who buys my book. That way, we will all know that I assigned the book for the right reason. The textbook isn't included with my students' tuition, but at least in my contracts class the royalty will be.

Ian Ayres, a professor at Yale Law School, is a co-author of the textbook "Studies in Contract Law."
http://www.nytimes.com/2005/09/16/op...icle_popular_3





LionShare Provides Legal, Free File Sharing
Bethany Fehlinger

Penn State students can still use the test pilot version of Penn State's file-sharing service LionShare, but there is no exact timeline for the release of the official university-wide service.

LionShare is not yet a service for Penn State students and faculty but a research and development project, LionShare Project Director Michael Halm said.

The project uses a peer-to-peer (P2P) technology that is downloaded and used for file sharing, Jim Frost, previous research project associate, said.

The project is an attempt to create a quality program from P2P that is not only powerful but also legal, said Richard Doyle, director of the composition program in the English department.

Halm said LionShare is "responsible file sharing related to academic content" and focuses on accessing files for collaboration of classes, project groups, research groups and contact with other universities.

"Historically, universities were focused on inquiry and the free exchange of information," Doyle said.

Frost said LionShare's only restriction is that copyrighted material cannot be shared. The program won't eliminate illegal file sharing 100 percent, but the user's name will be next to each file they shared, he said.

"We are trying to keep LionShare a legitimate, academic, file-sharing space," he added.

However, an enforcement policy to prevent illegal file sharing has not yet been developed, Frost said.

The LionShare 1.0 test pilot was presented yesterday at the Internet2 meeting in Philadelphia, and the program will be released to the public on Sept. 30.

Halm said Penn State still needs to figure out the infrastructure of the program so it can be provided as a service and able to handle the expected volume of usage.

However, unlike many anonymous file sharing applications, sharing and downloading files on LionShare will be private by using a Penn State access account, Frost said.

Using their access account name as a screen name, users can also take advantage of an instant-messenger application to talk to others on LionShare, Halm said.

Users that do not have an access account can still download LionShare but can use the service for searching and viewing only, Frost said.

Trey Conner (graduate-English) said his English 202C (Technical Writing) students installed LionShare on the computers in Waring Dining Commons over the summer and tested the program. Additionally, Conner said he told the students to write what worked and what did not in their class journals.

Conner, who collaborated with Frost on the project, said users can openly share and download files, but there are some limitations on who can use the service and what they can share.

LionShare is different from any other service provided by Penn State because it is more flexible with the size of files, and the viewing restrictions are up to the user. For example, users can restrict file sharing to classmates, Frost said.

The university was awarded a $1.1 million grant in 2003 from the Andrew W. Mellon Foundation to help develop the technology. The Simon Fraser University of Canada is also helping to develop LionShare with Penn State.
http://www.collegian.psu.edu/archive...05dnews-05.asp





University, Entertainment Industry Leaders Address Campus File-Sharing In Report To Congress

Schools with legitimate music, movie services more than triple; local area networks, iTunes hacks among biggest challenges ahead

Informed by reports from college and university presidents across the country, the Joint Committee of the Higher Education and Entertainment Communities today (Sept. 21) issued an update to Congress outlining the latest efforts to address illegal file-sharing on campuses and the emerging challenges ahead.

The new report highlights considerable progress during the past academic year in the growth of legitimate music and movie services, the adoption of technological measures, and education and enforcement programs on campuses. According to the report, the number of schools with legitimate services on campus has more than tripled to nearly 70 in the last year. As a result, more than 670,000 students now have access to a legitimate music service through their university -- a number that is rapidly on the rise.

Despite these great strides, the report also cites several key challenges in need of immediate attention within the university community. According to the report, student-run file-sharing systems on schools' Local Area Networks (LANs) as well as the increased use of unauthorized hacks of the legitimate online service iTunes are emerging as significant problems.

"Universities have made impressive progress in combating piracy of music and movies through educational efforts, technical controls, and the adoption of legitimate on-line services," said Graham Spanier, president of Pennsylvania State University (PSU) and the Committee's co-chairman. "At the same time, we in higher education must expand the reach of our efforts and must continue to be vigilant."

"When it comes to file-sharing, students are beginning the new academic year this fall in a vastly different climate than we saw even one year ago," said Cary Sherman, RIAA president and the Committee's other co-chairman. "We are thrilled to see the number of schools offering legitimate services more than triple in the last year and remain hopeful that these partnerships will continue to flourish. At the same time, complacency looms as a constant threat to the tremendous progress we have made. As the landscape changes, so must the anti-piracy programs within the university community. There is much promise in the coming years, but our work is far from done."

Comprised of leaders representing universities, higher education organizations, and music and motion picture executives, the Joint Committee was formed in 2002 to develop collaborative solutions to address illegal file-sharing at colleges and universities.

The committee aims to provide a range of resources to school administrators in three basic areas: educational efforts (including practices surrounding the use of copyrighted works and student responsibility), technological solutions (including computer network management technologies available to reduce illegal file sharing and the development of legal, campus-based music and movie/entertainment services), and examining differences and exploring prospects for collaboration on legislative initiatives.

The report released today will be submitted to the Subcommittee on Courts, the Internet and Intellectual Property of the U.S. House of Representatives Judiciary Committee, in anticipation of a hearing to be held by the Subcommittee on Thursday, September 22nd. It is a follow-up to an August 2004 report to the Subcommittee, which has long been focusing on illegal file-sharing on college campuses.
http://live.psu.edu/story/13595





Colleges Combat Illegal File Sharing
Iza Wojciechowska

In the wake of recent lawsuits over illegal file sharing, many universities are making moves to prevent their students from incurring legal action.

After giving last year’s freshmen iPods and digital recording devices, Duke continued its iPod revolution this year with selective in-class distribution. But in addition to the educational benefits the University hopes students will gain from such technology, the gadgets may also encourage illegal file sharing.

Though the University had nine official violations of its peer-to-peer sharing policy last academic year, no official action is being taken to change students’ accessibility to music and movie files.

Some universities, however, are trying to take initiative and protect their students from lawsuits by providing them with safe methods of transferring files to each other.

“We subscribe to Napster, and it’s personally funded by student activities fees from the student activities board on campus,” said Jeff Rehbach, facilities manager and policy advisor for library and information services at Middlebury College.

Middlebury students have been using the legal file-sharing system for two years and have thus far had no inquiries from the Recording Industry Association of America. Before it began using Napster, the college was averaging 10 to 20 legal cases monthly, Rehbach said, adding that so far Napster has proven a good investment for the student body.

At Duke, students are referred to the Office of Judicial Affairs after receiving more than three notices from the RIAA, which constitutes a policy violation.

Despite the complications, officials do not want to prohibit students from using file-sharing technology.

“Duke’s take is that peer-to-peer software can be used for both legal and illegal purposes, and given that fact, we will not block its use on the Duke network,” said Chris Cramer, information technology security officer.

Some schools like Emory University had similar concerns but took a more drastic step, blocking peer-to-peer software from their student networks altogether.

“We are not stopping them from downloading what they need for academic research or for their school—we are just not allowing them to do it via P2P applications,” said Jay Flanagan, security administrator for technical services at Emory.

He added that the administration was prompted to move in this direction because of viruses, hackers and copyright issues. Of more than 4,000 students on the network, only 10 have complained about the new policy, Flanagan said.

Administrators at the University of Washington also acknowledged the dual nature of peer- to-peer sharing, but they realized that it is inevitable that students will share music and movies. As a potential solution, UW is following in Middlebury’s footsteps this fall. It will implement the use of Napster for its students in addition to making local radio broadcasts available on the Internet.

“It allows us to move forward in experimenting with providing digital materials to our students in ways they may find interesting,” said Oren Sreebney, director of client services and learning technologies for computing and communications at UW. “We’re trying a whole bunch of different things in terms of trying to just move legally.”

Duke administrators, look into the possibility of acquiring Napster or similar programs annually, but as of now no changes are being considered to alter the current policies. “Every year we feel more strongly that there’s no reason to do this,” said Larry Moneta, vice president for student affairs. “The market for downloadable music and other books and films is more publicly accessible every year.”

Moneta said having an institutionalized network would most likely have no impact on students, and those who download files illegally would probably continue to do so.

Such violations at the Napster-using universities may still be present, but diminished. Some students argue that the programs are not as beneficial as they may seem, in part because of incompatibility with computers and in part because of inconvenience.

“I don’t personally use the [Napster] policy because I have an Apple and it’s not available on my computer, but those who do use it say that the selection is extremely limited and really not worth the trouble,” Middlebury freshman Mario Ariza said.
http://www.chronicle.duke.edu/vnews/.../4331417534424





File Sharing Options Plentiful

UNC yet to take definitive action
Brian Hudson

The UNC system has moved ahead with plans to allow system schools to install legal music downloading, but in the mean time, UNC-Chapel Hill officials are continuing to shop for a permanent service provider.

During the summer, UNC-system officials signed contracts with music providers Cdigix and Ruckus, and they signed a contract Thursday with Napster.

In the spring semester UNC-system schools established free pilot programs on six campuses that allowed students to use those three companies and Rhapsody.

The contracts with the companies are bare on details, and individual campuses are expected to set out the finer points of their music downloading programs, said Tom Warner, director of coordinated technology management for the UNC system Office of the President.

“It just sets a foundation so if one of the campuses, one of the schools would want to do this, there’s the foundation there,” he said.

UNC-CH has not made a definitive move on installing a permanent music downloading program.

“I will say we have not made any decision at this point,” said Jeanne Smythe, director for computing policy for UNC-CH.

She said Information Technology Services officials are continuing to hear proposals from companies, and they also are looking to how other system schools will react.

When implemented, the program probably will require students to pay individually, Smythe said, rather than requiring the entire student body to pay.

As UNC-CH officials hear proposals from downloading providers, the possibility of introducing legal movie downloading has come up in the discussions.

“Some of the providers have limited movie offerings as well as music downloading,” Smythe said.

But because downloading movies requires more Internet bandwidth, the idea is still on the drawing board.

“Understand we really are in the infancy here,” Smythe said.

UNC-system officials have not considered exclusive contracts with a movie downloading provider, Warner said, but they would consider it if it was something system schools pushed for.

“We just wait for the schools to tell us what they’re interested in.”
http://www.dailytarheel.com/vnews/di.../4330dcd4cb2e4





What's a Shut-In to Build? A Robot
Charles Isherwood

Jennifer Marcus, ensconced in the messy fortress of her bedroom, clicking away at the keyboard and refusing to take out the garbage, is a suburban mom's worst nightmare, for sure. But the feisty heroine of "The Intelligent Design of Jenny Chow," a new play by Rolin Jones, isn't beaming instant messages to her girlfriends, retailing gossip about boys or news of shoe sales. She's swapping technospeak with rocket scientists, hellbent on creating her very own android.

This boldly imagined, even far-fetched notion provides the dramatic impetus for Mr. Jones's fanciful comedy, which has been staged with playful affection by Jackson Gay. The glaring topicality of the title is a little misleading. The play, which opened last night at the Atlantic Theater Company, does not concern itself with the possibility of divine intervention in the course of human evolution. The intelligent design is Jennifer's scheme to whip up that robot, who will be dubbed Jenny Chow and will venture where her homebound creator cannot.

Jennifer, you see, is a Generation-Y (or is it Z?) model of that familiar type, the troubled genius. She sticks to her bedroom because she can't step outside the front door. Sometime in high school, a garden-variety obsessive-compulsive disorder morphed into a wicked case of agoraphobia. Now Jennifer's only contacts with live human beings are hissing confrontations with her irritable, overworked mom, idle exchanges with her pleasantly passive dad and occasional visits from the pizza-delivery guy, who is also her quasiboyfriend.

Mr. Jones unfolds his tale of pioneering science fueled by post-adolescent angst with pleasing agility. Although much of the play consists of e-mail exchanges improbably cast in dialogue form, "The Intelligent Design of Jenny Chow" possesses a brisk theatricality that attests to Mr. Jones's own assured design skills and his gift for capturing the voices of pleasingly curious characters. ("Um, so I got a job re-engineering obsolete missile components after I lost my job at the mall," Jennifer explains, deadpan, to one of her correspondents.)

Mr. Jones and Ms. Gay, in collaboration with the gifted set designer Takeshi Kata and lighting designer Tyler Micoleau, also conjure onstage a poetic vision of today's world that feels fresh and true, funny and mildly saddening. It's a place where intimacy between ardent e-mail correspondents proves more durable than the bonds between members of a family living under the same roof, and emotional distance is more easily bridged by technology than human interaction.

In the pursuit of her goal, Jennifer forges firm digital relationships with a rumpled Russian-born scientist, an aeronautics engineer and a Mormon missionary (all played with boisterous energy by the skilled caricaturist Remy Auberjonois). Her mother Adele (Linda Gehringer), meanwhile, insisting on communication of the old-fashioned verbal kind, drives Jennifer deeper into her own personal cybercocoon.

Jennifer's loneliness - and perhaps her illness, too - derives both from the brilliance that set her apart and a deeper sense of unbelonging tied to her origins. An adoptee, she's Chinese by birth, and her dogged attempts to fit the mold of California girlhood (she was even the school mascot for a while) masked a profound alienation. As she and her mother have gradually evolved into antagonists, Jennifer has become more curious about her birth mother. The Jenny Chow project is her ambitious attempt to pursue some answers.

Mr. Jones's natural ear for the layered patterns of speech (and the distinctive syntax of the e-mail) is notable and commendable. (Michael Cullen and Ryan King are terrific as Jennifer's contrastingly quirky father and friend, respectively.) But a play cannot succeed equally as a sci-fi adventure story and a comedy-drama about a fraying family trying to stitch itself back together.

As we take off into the heady realm of fantasy, with Jennifer's robot lumbering to life and evincing signs of complex intelligence, the play loses altitude on other fronts. A drama about a young woman's uneasy relationship with the real world naturally begins to seem hollow when reality itself is gleefully abandoned.

Ms. Gay's direction also tends to favor the play's whimsy over its pensive underpinnings. Julienne Hanzelka Kim's energetic performance as Jennifer certainly holds the attention, but she overplays the character's brash juvenility. A 22-year-old agoraphobe would surely be less perky and more complicated than the exhaustingly bouncy figure presented by Ms. Kim.

Bright and engaging as "Jenny Chow" often is, the emphasis on the superficial excitements of woolly yarn-spinning over the more nuanced pleasures of truth-telling is a disappointment. (The lovely score, by Matthew Suttor, is one of the few elements that whispers insistently of the humanity that is elsewhere slighted.) Mr. Jones, a newly hot young playwright whose career is now steaming along (he's on the staff of Showtime's "Weeds"), will surely soon learn that a flight of fancy, however bold, is never as rewarding as a journey through the challenging maze of real experience.
http://theater2.nytimes.com/2005/09/...ws/20desi.html





Sony To Slash 10,000 Jobs Worldwide
Miles Costello

Sony, the struggling Japanese electronics and entertainment group behind Walkmans and the Playstation computer games, is to cut 10,000 jobs worldwide, shut 11 factories and sell off £600 million of assets over the next two years as part of a radical overhaul designed to lift its profits.

Sony, which employs 6,000 staff outside Japan, said this morning it was introducing the swinging cuts as its moves to generate savings of nearly £1 billion (200 billion yen) by the end of its financial year 2007.

Sony said it will also cut the number of products it offers by a fifth.

At the same time, Sony reversed its forecast in July that it was on course to make full-year profits of nearly £50 million - the group now believes it will tumble to a near £50 million loss for the year.

The long-awaited restructuring at the company, which also makes Vaio PCs, is being spearheaded by Sir Howard Stringer, Sony's Welsh-born new chief executive who only took charge in June.

Sir Howard is only the second non-Japanese to run such a well-known brand in the country and was brought on board to rejuvenate Sony's flagging performance in the fiercely competitive market for consumer electronics.

The company has already disclosed plans to shut a CRT TV assembly plant in Wales with the loss of 650 jobs as it begins to focus more heavily on flat TV screens.

Under the terms of today's rethink, Sony said it will scrap its traditional corporate structure and centralise decision-making power under the chief executive of Sony Electronics. It said the move would allow it to "streamline" decision-making across all of its product areas and ensure "decisive" spending on planning, and research and development.

As it detailed its effort to revive its ailing sales, Sony said: "This will include rationalising unprofitable businesses, reducing the number of product models, and consolidating manufacturing sites, leading to a reduction of 10,000 in the global group headcount.

"We will also review our real estate, stock holdings and certain non-core assets with a view to making disposals amounting to 120 billion yen (£993 million) by the end of fiscal 2007."

Sony said it had "identified" 15 business categories for "downsizing, alliances and disposals" and reached the decision to "reduce the number of manufacturing sites by 11, from 65 to 54".

A spokesperson for Sony in the UK was not immediately available to comment about the implications for Sony staff and businesses in Britain.

To cover the cost of today's restructuring, Sony will take a charge of just over £1 billion although it expects to recoup this by end of its financial year 2008.

Sony has already been through two years of a three-year restructuring programme designed to reduce its cost base. As well as realigning its television business, which made substantial losses last year, Sony also wants to re- establish itself in the market for portable music players.

The once-mighty company, which invented the life-changing Walkman players, has been outflanked by the success of Apple's sales of iPods and its online iTunes music service.

Sony said today that it is aiming to achieve group sales of more than £39.8 billion and a profit margin of 5 per cent (4 per cent in the electronics division) by the end of its financial year 2007.
http://cache.directorym.com/creative...urce=140x600_B





So maybe broadcast TV isn’t all bad


No men allowed.

Model Tyra Banks Gets Nasty Rumor Off Chest On TV

Supermodel Tyra Banks underwent a sonogram on her own television show to quell rumors that she had breast implants.

But first she ordered all the men out of the audience, a spokeswoman for her program said on Wednesday.

Banks, 31, told the audience for her syndicated talk show on Tuesday that she was tired of rumors that her breasts were fake.

"It's something that's followed me forever and today I'm going to finally admit once and for all the truth about my breasts," the Victoria's Secret model said as she removed her push-up bra from underneath a T-shirt.

She took a break and returned wearing a bathrobe and accompanied by plastic surgeon Garth Fischer.

He and an assistant performed a sonogram in front of the audience that was broadcast with certain part of Banks' anatomy blacked out.

Fischer said, "I've performed approximately 8,000 breast implant surgeries, I've examined you, I've reviewed your sonogram … and Tyra Banks has natural breasts."

Banks added, "By no means am I against plastic surgery, by no means am I saying that breast implants are a bad thing, but it's just not a choice that I made … it's something that a lot of people think I have and that is so frustrating to me."
http://www.google.com/url?sa=X&oi=ne...3Fid%3D1147349





Books

A Jet-Set Don Juan, Right Up to the Final Exit
William Grimes

The cad, the bounder, the roué and the lothario. Where are they now, those male predators of yesteryear? Gone the way of the dodo. Already an endangered species when the Charleston came into vogue, they vanished with the arrival of the playboy, a sleek, fast-moving animal perfectly adapted to the modern era of jet travel, night clubs, film stars and gossip columns.

Porfirio Rubirosa - Rubi to his countless conquests and to grateful headline writers across the globe - stood head and shoulders above the rest of this international pleasure pack. Rubirosa, the Dominican Republic's answer to Pepé le Pew, provided the model that others could only emulate. A tireless presence at chic nightspots and watering holes, a keen race-car driver and polo player, a friend to the rich and infamous, a relentless pursuer of women with huge bank accounts, he went on a lifelong tear that ended, fittingly, with a spectacular car crash in 1965 after a night of heavy drinking at a Paris club. Even his 28-year old wife - his fifth - agreed that Rubi would have wanted it that way.

As Shawn Levy amply documents in "The Last Playboy," his bubbly, breathless and appropriately inconsequential biography, Rubirosa worked hard at having fun. Well into his 50's, when he crossed paths with the Rat Pack, he set a pace that few could match. Sammy Davis Jr., wrecked and staggering after a night on the town with Rubi, ran into his host the next day at lunch. Rubirosa, none the worse for wear, was leaning against the bar, elegantly turned out and casually sipping a Ramos gin fizz. Davis asked him how he did it. "Your profession is being an entertainer," Rubirosa said. "Mine is being a playboy." He found his vocation early. While attending school in Paris, where his father had been posted as ambassador, he took every opportunity to haunt the nightclubs of Montmartre. "Books didn't find in me a very faithful friend, nor did the professors find a conscientious student," he wrote in his memoirs. "The only things that interested me were sports, girls, adventures, celebrities - in short, life." That version of life requires money, and Rubirosa, despite his polished manners and undeniable charm, had none. That changed when he caught the eye of the Dominican Republic's new strongman, Rafael Trujillo, who saw in Rubirosa a potential ally who could win over the country's golden youth to his regime. For the next 30 years, Rubirosa profited by the connection, sometimes serving in diplomatic posts and, just as often, playing the unofficial role of goodwill ambassador and high-level fixer.

Rubirosa's first audacious move was to marry Trujillo's daughter, a potentially career-ending, or even life-ending, bit of chutzpah. In time, he would capture even bigger prizes. While a diplomat in Paris, he set his eyes on Danielle Darrieux, France's biggest female film star, who quickly became his second wife.

When, after the war, the couple were interviewed by Doris Duke, heir to the R. J. Reynolds tobacco fortune and one of the richest women in the world, Rubirosa suddenly decided that the American version of the woman could be rather appealing too. Marriage No. 3 took place in 1947, followed quickly by divorce and, in 1953, by marriage No. 4, to Barbara Hutton, another fabulously wealthy American heiress. All the while, Rubirosa pursued his side interests with zeal. "One woman is not enough for him," Darrieux complained to the press. "A man like him needs a harem." Just what was the appeal? Mr. Levy, the author of "Rat Pack Confidential" and the film critic for The Portland Oregonian, makes a fairly convincing case that the Rubi magic came down to a combination of charm, mystique and, quite possibly, physical attributes, not limited to Rubi's darkly handsome features. (Mr. Levy writes that cheeky waiters referred to the largest pepper-mill in the house as "the Rubirosa.") Rubirosa spoke five languages, three of them fluently. His dress and his manners were impeccable, his appetite for women stupendous. He preferred that they be rich and beautiful, but in a pinch, anything with curves would do: the hat-check girl, a waitress, a low-rent prostitute. In his prime, he was unstoppable. "He wraps his charm around your shoulders like a Russian sable coat," the gossip columnist Hedda Hopper wrote. Even women determined to resist, and warned in advance, found themselves saying yes when Rubirosa mounted a full-scale offensive. Even Zsa Zsa Gabor, a grandmaster at the sex-for-money chess game, succumbed, although she drew the line at marriage. Her tempestuous relationship with Rubirosa provides Mr. Levy with some of his best material. Rubirosa, who surely saw in Ms. Gabor the challenge of a lifetime, pursued his prey ardently and relentlessly, in full view of the panting press.

It made for spectacular theater. When Ms. Gabor refused to leave her current husband, the actor George Saunders, Rubirosa struck her. Ms. Gabor called a news conference and showed up wearing an eye patch. "In Spanish, Rubirosa means a red rose, but to me it's a black eye," she told reporters. The headline in The New York Daily News read: "I Said No, So Porfy Poked Me: Zsa Zsa." Strapped for cash, Rubirosa proceeded to marry Barbara Hutton. The marriage lasted 75 days and netted the happy husband cash and property worth $3.5 million, enough to finance his polo ponies, tailored suits and lavish partiers for years to come. And Rubirosa, a superbly conditioned nightlife athlete, had lots left in him. Eartha Kitt, Ava Gardner, Rita Hayworth, the Empress Soraya of Iran - there was scarcely an actress or princess alive whose name was not linked with Rubirosa's at some point in the 1950's and even the 1960's, when he began to slow down just a bit.

There's some poetic justice in Rubirosa's increasingly desperate attempts to keep up with his fifth wife, the French actress Odile Rodin. A ferocious nightclubber, she would frequently skip off to Paris, and the arms of her many male admirers, while Rubi stayed home in the suburbs, tending the garden and playing with his Chihuahua. He came to enjoy the simple pleasures, but then again, for Rubirosa, everything in life was simple.

"Women like to be gay," he once explained to a radio interviewer. "I like to be gay. They want to be happy. I try to make them happy." That's all there was to it.
http://www.nytimes.com/2005/09/16/books/16book.html





Music Biz Offers Anti-P2P Technology

Software automatically deletes illegally downloaded tracks
Iain Thomson

The British Phonographic Industry (BPI) is offering a software tool that claims to sniff out and disable peer- to-peer systems.

Dubbed the Digital File Check the software was developed to search a hard drive automatically and block any P2P applications, like Kazaa or eDonkey, from functioning on that machine.

It also deletes any music, film or image that may have been copied or distributed without the permission of the copyright holders.

"Digital File Check is a simple to use tool which will help people stay on the right side of the law," said BPI chairman Peter Jamieson.

"We are committed to working with business to help them develop policy and ensure that they are not breaking the law by illegally file sharing music across company networks."

The BPI is also releasing a corporate guide to file sharing which will be distributed to IT managers to warn them of the dangers. The BPI estimates that P2P systems cost its members £376m in lost revenue in 2004.

A PDF of the BPI's corporate guide can be downloaded here.
http://www.vnunet.com/vnunet/news/21...offer-anti-p2p





U.K. Startup Challenges Vonage, Skype

Switch Call, a little 16-man U.K. telecom startup that, until now, has specialized in B2B services, has launched itself into the consumer arena with a voice over Internet Protocol (VoIP) offering that sets new lows for pricing and vows to take on the likes of Vonage and Skype. Its rates look to be about half those of Vonage’s in the U.K., and about 20-percent less than Skype charges for its SkypeOut service to the switched telephone network.

Normally, yet another VoIP startup would get little note, but Switch Call’s advent comes fast on the heels of eBay’s deal to buy Skype for as much as $4.1 billion and, notably, Switch Call’s revenues of $12.67 million last year are almost double what Skype recorded.

“The new service from Switch Call takes it head-to-head against rival services SkypeOut and Vonage,” the company said in announcing its service, making no bones about whom it is targeting.

What Switch Call is offering is a service that starts at $9 per month, with 500 minutes of calling included, or twice that for unlimited calls, roughly the same as Vonage charges for such service. Its long-distance calls to the United States and most places in Europe, however, are half of Vonage’s rates and 20 percent less than Skype. As with just about every VoIP service, calls between Switch Call users are free and unlimited.

Switch Call rates include a free VoIP phone as part of a one-time “joining fee” of $45 or $90, depending on the model of phone chosen. The company is offering phones that simply plug into a PC’s USB port, with no need for the traditional VoIP adapter. That feature, Switch Call argues, makes it the simplest VoIP service offered to set up, a selling point the company plans to tout heavily.

“Technologies tend not to become truly mass-market until they become simple as well as beneficial,” argues Switch Call Managing Director Nick Kaulbach. “Many people fully understand that VoIP services are beneficial to them based on their low cost. But until now, I think that there has not been a service simple enough to break through into the mass market.”

In a final swipe at Skype, which uses P2P technology instead of SIP, Switch Call also points out in its marketing material that its service is “NOT PEER TO PEER – No loss of bandwidth – unlike some of Switch Call’s better known competitors, Switch Call does not use up YOUR internet connection for OTHER PEOPLE’S calls!”
http://www.telecomweb.com/news/1127331418.htm





Keeping Skype @Bay
Ted Stevenson

Atlanta-based Verso Technologies last week announced the introduction of a carrier grade tool or 'application filter' designed to let cable operators and other IP service providers "selectively disable undesirable network traffic and improve service levels on their networks," according to a press release (WiR 9/17). The product is aimed specifically at peer-to-peer (p2p) applications, such as VoIP, instant messaging, conferencing, and other types of streaming media.

Skype is the poster child for such 'undesirable' traffic, from the point of view of facilities based network operators, as the VoIP technology provider and its peers bring no network capacity to the party; they essentially piggyback on others' pipes.

How big is this problem?

Monty Bannerman, president and CEO of Verso, pointed out to VoIPplanet.com that NANOG [the North American Network Operators' Group] has probes all over the primary backbones. "They've been able to measure the rise in peer-to-peer traffic," Bannerman said. "The last stats I saw—and that was at least a year ago—at that point over 30 percent of the backbone was p2p traffic—and rapidly growing." This is traffic that brings in not a penny for the carriers whose networks the p2p traffic traverses.

"It's one thing if you're just having a rise in certain kind of traffic and its driving more capacity and people are buying bigger pipes from you as a carrier. But if that same traffic is robbing your paid subscriber base, it's like eating poison every day," Bannerman said. "There are really two camps here." Bannerman continued. "There's the p2p camp that says Skype's an incredible new thing that everyone loves, but if you're watching your business model being eroded every day, you're in the other camp."

Bannerman pointed out that Verso has a deep experience in content filtering, through its NetSpective product line. " We've been looking at optimizing networks via content filtering for a long time. As a direct result of that core expertise, we've identified how you can identify p2p traffic on a network and have determined methods whereby you can selectively block it. Say, I just don't want to allow Napster—because of the potential liability—or Skype, because they're raiding my paid subscriber base. Or Kazaa or any other p2p. We have multiple means whereby we can both identify different kinds of traffic and then selectively allow or deny the traffic on the network."

As a matter of fact, in addition to the carrier grade filtering, the same technology is being included in NetSpective version 2.0, announced Tuesday at the VON conference in Boston.

So, does a network operator have the right to block certain traffic?

It all depends where that network is. Bannerman alluded to the fact that Verso's customer base is large and global and that there are different regulatory constraints in different countries. "Some don't allow p2p VoiP at all. In others, you're not allowed to block VoIP," Bannerman commented. "No matter where you go, you're going to almost have two camps: those that like this [filtering capability]—made up of people that have a revenue-based business model and don't want to see free services erode their base—and those that are strictly non-facilities peer-to-peer based where they don't have any infrastructure that they purchased, and want to gain access to someone else's facilities."

Although the FCC has at least once fined a broadband provider for blocking VoIP traffic, the long-term picture around this issue in the United States is far from clear. Alluding to this ambiguous climate, Bannerman said, "I believe that the answer to this is going to have to be regulatory."

As implemented today, Verso's carrier-grade application filtering involves selective blocking. "I can discriminate between forms of p2p, leave some on, block others," Bannerman said. "Today it's on/off, but selectively." He went on to describe Verso's "deep skill set" in QoS technology, derived in part from its NetPerformer product line that provides compression and QoS plus routing for VoIP over satellite. "Tomorrow, there's no reason I can't extend that by assigning a QoS by type of p2p traffic. So I could actually degrade certain types of traffic—or prioritize others."

Verso's carrier grade application filter runs on Intel-based NEBS-compliant hardware. "Now that the application has successfully completed its preproduction trials, we are working with tier-one carriers to conduct the first production field trail," said Bannerman. "We believe that the application has tremendous market opportunity because it addresses an increasingly critical carrier requirement as p2p traffic continues to grow worldwide."
http://www.internetnews.com/infra/article.php/3550691





Avaya Acquires Embedded P2P Player
Robert Liu

Underscoring the growing importance of peer-to-peer (P2P) technologies in the voice-over-IP (VoIP) arena, Avaya kicked off the work week today announcing it has acquired Nimcat Networks, a developer of embedded P2P communications software.

As first alluded to last night on a popular VoIP blog by INTERNET TELEPHONY magazine’s Rich Tehrani, the deal is the clearest sign that P2P technologies are creating new competitive pressures for PBX vendors. The argument is that you will not need servers let alone a central PBX if you can just plug VoIP phones with embedded P2P software into a network that auto- recognize endpoints, as Tehrani concluded back in August.

Nimcat Networks' IP communications software, currently called nimX, is designed for just that – to be embedded within enterprise IP phones. By placing the intelligence in the phone and eliminating additional hardware, such as call processing and application servers, installation is vastly simplified and start-up costs are sharply reduced, Avaya stated in its press release.

Ottawa-based Nimcat Networks was acquired for CDN $46 million in cash.

Avaya said it expects the acquisition to be one cent dilutive in the company's fourth fiscal quarter, primarily related to approximately $3.2 million of in-process research and development costs. Research and development plans include incorporating Nimcat Networks software into Avaya IP telephony offers. This process is expected to take up to 12 months, after which Avaya will release its first integrated Nimcat Networks-based product.

The acquisition follows Microsoft’s deal to acquire P2P player Teleo and, of course, the widely reported acquisition of P2P leader Skype by eBay. The latest deal leaves Popular Telephony’s Peerio as the last company in the space, leading to the speculation that larger enterprise networking companies like Nortel or Cisco could be shopping around for a P2P partner.

And the business logic reasons are compelling. Nimcat’s nimX plug-and-play software delivers low total cost of ownership for customers who want a select set of telephony features and applications. Adding users is as simple as plugging another phone into the network.

Nimcat Networks software is based on the industry standard Session Initiation Protocol (SIP), clearly demonstrating Avaya's commitment to open and standards- based solutions. Developing solutions using the SIP standard can accelerate the integration of Nimcat Networks software into Avaya and other leading industry solutions.

"The addition of Nimcat Networks' capabilities is another step in our plan to make intelligent communications applications available to all customers regardless of size," said Mike Thurk, group vice president, Global Communications Solutions, Avaya. "Peer-to-peer technology is an important emerging communications architecture, and this move clearly illustrates our determination to maintain leadership in IP telephony innovation. When peer- to-peer is integrated with the rest of enterprise networks, businesses will be able to select communications applications to match the right level of functionality and cost to address the needs of different locations."

Avaya said Nimcat Networks will be part of its Global Communications Solutions group. The company expects to continue selling Nimcat Networks' software to other equipment manufacturers and to support existing Nimcat Networks customers.
http://www.tmcnet.com/usubmit/-avaya...ep/1183454.htm





ILN News Letter
Michael Geist

RIAA Withdraws Contested File Sharing Suit

The RIAA has withdrawn a file-sharing lawsuit against a Michigan woman when it became clear that the woman had no experience or knowledge of computers. The court denied an attempt to relaunch the case against the woman's 13-year old daughter. Decision at
http://info.riaalawsuits.us/priority...an_order_1.pdf


BBC Test May Raise Internet TV Viewing

The BBC will later this month begin a test that could spur more television networks to broadcast their programs over the Internet. About 5,000 selected viewers in the UK will be issued a computer program called the iMP (interactive media player) that allows them to download and share most of the BBC's TV programs for up to seven days, including its long-running soap opera EastEnders, the nightly news and major sporting events.
http://online.wsj.com/article/0,,SB1...546878,00.html





Verizon Introduces Fiber Optic TV Service
Ken Belson

Verizon Communications began taking orders yesterday for its new television service, which the company hopes will draw business away from cable and satellite providers.

As part of a national strategy, about 9,000 Verizon customers in Keller, Tex., 30 miles west of Dallas, will be the first to subscribe to the television service, called FiOS TV. The service includes more than 180 digital video and music channels, 20 high-definition channels and video-on-demand for $39.95 a month, carried over fiber optic cables that were installed to replace older copper lines.

The service in Keller is part of Verizon's plan to compete head-on with cable companies that in the last 18 months have started selling digital phone lines. To keep customers from defecting, Verizon and SBC Communications are starting to sell digital programming to complement their phone and broadband services.

The companies have taken different routes. Verizon is spending billions of dollars to run fiber lines all the way to customers' homes - lines that also carry phone calls and broadband connections. SBC, by contrast, is running fiber lines to neighborhoods and using existing copper lines to reach homes.

Either way, the phone companies are trying to assemble bundles of phone, high-speed Internet and television services that match what the cable industry offers.

Verizon's new television product will include more local channels not often found on satellite systems, and customers can order additional programming based on a genre, like sports and movies.

"This is just the beginning of TV that rides on a wave of light into people's homes," Steve Banta, president of Verizon's southwest region, said.

The company plans to introduce FiOS TV in six other markets, including several in Florida, Virginia and California, by the end of the year, when its fiber optic network will be available to three million homes.

Verizon has signed deals to obtain programming rights from most major television and movie studios. The company also signed franchise agreements with individual municipalities in Texas before the state government passed a law this summer that would allow Verizon and others to obtain agreements from the Texas Public Utility Commission. Instead of negotiating with towns for an agreement, which can take up to 18 months, Verizon can get approval from the commission instead.

Texas, however, is the only state to pass such a law, which means Verizon must still negotiate deals with individual cities in other states.

Verizon expects to sign up 20 percent of homes that can receive FiOS service in Keller by the end of the year, according to Bob Ingalls, the president of the company's retail group.
http://www.nytimes.com/2005/09/23/te...23verizon.html





Report: Cable Broadband Prices Jump, While DSL Declines

The price gap between cable broadband service and phone carriers' digital subscriber lines widened to an all-time high in August, according to a survey by SG Cowen.

Cable-modem service was, on average, 75.8 percent more expensive than DSL during the month, up from a 53.3 percent gap in July. While phone carriers cut prices -- the average DSL price decreased by 9.2 percent -- cable companies raised them.

Leading the price decline was Verizon Communications which rolled out a slower service that cost just $14.95 a month, with a free month of service with a one-year commitment.

By contrast, cable broadband service got 4.1 percent more expensive, on average. Comcast Corp. raised prices an average of 7.9 percent, while Time Warner Cable raised by 5.8 percent, according to the survey.

Aggressive price cuts have helped phone carriers make headway in the broadband market and challenge cable companies, analyst Lowell Singer said in a note.

During the first and second quarters of 2005, cable companies captured 47.8 percent and 46.3 percent of net new broadband subscribers, respectively, down from 50.3 percent in 2004 and 60.8 percent in 2003. SG Cowen estimates that cable companies will capture about 47.3 percent of net new broadband subscribers in 2005.

Cable companies ``must continually reassess whether to accept share losses or to fight back by reducing high speed data pricing and accepting lower margins,'' Singer wrote.

Singer or one of the other authors of the report own shares of Cablevision; SG Cowen or one of its affiliates has managed or co-managed a public offering of Cablevision and Comcast securities in the last three years.
http://www.siliconvalley.com/mld/sil...y/12665600.htm





Study: Broadband Penetration Slowing
Marguerite Reardon

Americans are putting the brakes on broadband adoption growth, according to a new study.

The survey, published by independent think tank Pew Internet & American Life Project, found that high-speed Internet adoption, after growing quickly in the past several years, has been losing steam and is poised to slow even further. During the first six months of 2005, 53 percent of home Internet users said they use a broadband connection, up from only 50 percent during the previous six months.

This is a much slower growth rate than reported for the same periods a year earlier. From November 2003 to May 2004, high-speed Internet penetration grew by 20 percent, from 35 percent of home users in December 2003 to 42 percent in May 2004, according to the Pew data.

Results of the study will be presented at the Telecommunications Policy Research Conference in Arlington, Va., Sept. 23 to Sept. 25.

Pew attributed the slowdown in broadband penetration to a maturing of the market. Early adopters, who are typically savvy about the Internet, well- educated and well-paid, have already signed up for broadband service.

Today's dial-up customers, by contrast, tend to be older adults with lower incomes and educational levels. Most importantly, they do not use the Internet to do much beyond basic Web surfing and e-mailing.

"The low-hanging fruit of early adopters is gone," John Horrigan, director of research at Pew, said Wednesday. "And the remaining dial-up population seems unenthused in terms of the Internet, so mathematically, that makes for a smaller fruitful pool for providers to select from."

At least one analyst agrees, in part, with Pew's analysis. "There's no question that broadband growth will slow over time," said Jim Penhune, an analyst at Strategy Analytics. "But what we're seeing now is providers using aggressive pricing to entice new customers."

DSL service has become available for less than the cost of a dial-up connection only in the past few months. In June, SBC announced a one-year promotion to offer its DSL service for $14.95. Just last month, Verizon Communications followed suit with a slower-speed offering that also costs $14.95. Some experts believe that this could have a significant impact on today's dial-up customers.

"The (telephone companies') challenge is persuading the people plunking along on AOL dial-up to switch to broadband," Penhune said. "And I think the $15 products are just the thing."

Cable companies are also going after these consumers by offering special pricing on "triple play" bundles of service that combine telephone, high-speed broadband access and TV service. Cablevision currently offers a package of all three for $90 per month. Whether dial-up consumers are enticed into subscribing to broadband services is yet to be seen, but it's clear that providers realize that they must change their strategy to win them over.
http://news.com.com/Study+Broadband+...3-5875981.html





You're not supposed to pay for it

Microsoft Sues More Resellers In Piracy Battle
Joris Evers

Information from an antipiracy hotline and "secret shoppers" has led to eight lawsuits against companies accused of peddling pirated Microsoft software.

The lawsuits were filed in Arizona, California, Illinois, Minnesota and New York against companies that allegedly sold counterfeit copies of software such as Office 2000 Professional and Windows XP, Microsoft said in a statement Monday.

Some of the resellers also allegedly dealt in fake and used Certificate of Authenticity labels, which are used to identify Microsoft products as genuine, the company said. A Certificate of Authenticity includes a product key code and is designed to prevent counterfeiting.

The lawsuits are part of Microsoft's continued crackdown on software piracy, which the company acknowledges cuts into its earnings. According to the Business Software Alliance, of all the software installed on personal computers worldwide in 2004, 35 percent was pirated, resulting in $33 billion in losses.

Tips from users who called Microsoft's piracy tip line (1-800-RU-LEGIT) and information derived from the company's Windows Genuine Advantage program helped identify some of the accused sellers of pirated products, Microsoft said. The software maker also used its own "secret shoppers" to gather evidence, it said.

Windows Genuine Advantage is a system designed to prevent people with pirated copies of Windows from downloading additional software from Microsoft. The WGA check became mandatory in July for people attempting to get product updates.

People who find out through WGA that they were duped into buying bogus Microsoft products in some cases can get free licensed versions of the software.
http://news.com.com/Microsoft+sues+m...3-5873069.html





Commerce Department To Send Teams To Combat Piracy Abroad
AP

The Commerce Department is sending teams of experts into countries known for piracy and counterfeit goods in an effort to combat intellectual
property theft abroad, U.S. Commerce Secretary Carlos Gutierrez said Wednesday.

The groups, called Intellectual Property Rights Experts, will operate in Brazil, China, India, Russia and elsewhere. They will follow up and monitor cases as well as have daily contact with officials in those countries, Gutierrez said in a speech to Silicon Valley executives.

``We are doing everything possible to defend and protect what you create,'' he said at the Sunnyvale campus of chip-equipment maker Applied Materials Inc.

Intellectual property theft is a top concern in Silicon Valley and other high-tech centers around the nation.

``When software thieves go unpunished, innovation suffers and the economy doesn't grow as fast as it should,'' said Robert Holleyman, chief executive officer of the Business Software Alliance. ``Today's announcement will provide software makers with important on-the-ground assistance to combat theft in problematic regions.''

A recent study by the BSA and the research firm IDC found that 90 percent of software used in China was pirated. The figure was 64 percent in Brazil, 74 percent in India, 87 percent in Russia, 70 percent in Thailand and 58 percent in the Middle East.

In July, the Bush administration created a new position to coordinate government efforts to battle the foreign theft of intellectual property. President Bush named Commerce Department official Christian Israel to the post.
http://www.siliconvalley.com/mld/sil...y/12705678.htm





Almost Before We Spoke, We Swore
Natalie Angier

Incensed by what it sees as a virtual pandemic of verbal vulgarity issuing from the diverse likes of Howard Stern, Bono of U2 and Robert Novak, the United States Senate is poised to consider a bill that would sharply increase the penalty for obscenity on the air.

By raising the fines that would be levied against offending broadcasters some fifteenfold, to a fee of about $500,000 per crudity broadcast, and by threatening to revoke the licenses of repeat polluters, the Senate seeks to return to the public square the gentler tenor of yesteryear, when seldom were heard any scurrilous words, and famous guys were not foul mouthed all day.

Yet researchers who study the evolution of language and the psychology of swearing say that they have no idea what mystic model of linguistic gentility the critics might have in mind. Cursing, they say, is a human universal. Every language, dialect or patois ever studied, living or dead, spoken by millions or by a small tribe, turns out to have its share of forbidden speech, some variant on comedian George Carlin's famous list of the seven dirty words that are not supposed to be uttered on radio or television.

Young children will memorize the illicit inventory long before they can grasp its sense, said John McWhorter, a scholar of linguistics at the Manhattan Institute and the author of "The Power of Babel," and literary giants have always constructed their art on its spine.

"The Jacobean dramatist Ben Jonson peppered his plays with fackings and "peremptorie Asses," and Shakespeare could hardly quill a stanza without inserting profanities of the day like "zounds" or "sblood" - offensive contractions of "God's wounds" and "God's blood" - or some wondrous sexual pun.

The title "Much Ado About Nothing," Dr. McWhorter said, is a word play on "Much Ado About an O Thing," the O thing being a reference to female genitalia.

Even the quintessential Good Book abounds in naughty passages like the men in II Kings 18:27 who, as the comparatively tame King James translation puts it, "eat their own dung, and drink their own piss."

In fact, said Guy Deutscher, a linguist at the University of Leiden in the Netherlands and the author of "The Unfolding of Language: An Evolutionary Tour of Mankind's Greatest Invention," the earliest writings, which date from 5,000 years ago, include their share of off-color descriptions of the human form and its ever-colorful functions. And the written record is merely a reflection of an oral tradition that Dr. Deutscher and many other psychologists and evolutionary linguists suspect dates from the rise of the human larynx, if not before.

Some researchers are so impressed by the depth and power of strong language that they are using it as a peephole into the architecture of the brain, as a means of probing the tangled, cryptic bonds between the newer, "higher" regions of the brain in charge of intellect, reason and planning, and the older, more "bestial" neural neighborhoods that give birth to our emotions.

Researchers point out that cursing is often an amalgam of raw, spontaneous feeling and targeted, gimlet-eyed cunning. When one person curses at another, they say, the curser rarely spews obscenities and insults at random, but rather will assess the object of his wrath, and adjust the content of the "uncontrollable" outburst accordingly.

Because cursing calls on the thinking and feeling pathways of the brain in roughly equal measure and with handily assessable fervor, scientists say that by studying the neural circuitry behind it they are gaining new insights into how the different domains of the brain communicate - and all for the sake of a well-venomed retort.

Other investigators have examined the physiology of cursing, how our senses and reflexes react to the sound or sight of an obscene word. They have determined that hearing a curse elicits a literal rise out of people. When electrodermal wires are placed on people's arms and fingertips to study their skin conductance patterns and the subjects then hear a few obscenities spoken clearly and firmly, participants show signs of instant arousal.

Their skin conductance patterns spike, the hairs on their arms rise, their pulse quickens, and their breathing becomes shallow.

Interestingly, said Kate Burridge, a professor of linguistics at Monash University in Melbourne, Australia, a similar reaction occurs among university students and others who pride themselves on being educated when they listen to bad grammar or slang expressions that they regard as irritating, illiterate or déclassé.

"People can feel very passionate about language," she said, "as though it were a cherished artifact that must be protected at all cost against the depravities of barbarians and lexical aliens."

Dr. Burridge and a colleague at Monash, Keith Allan, are the authors of "Forbidden Words: Taboo and the Censoring of Language," which will be published early next year by the Cambridge University Press.

Researchers have also found that obscenities can get under one's goosebumped skin and then refuse to budge. In one study, scientists started with the familiar Stroop test, in which subjects are flashed a series of words written in different colors and are asked to react by calling out the colors of the words rather than the words themselves.

If the subjects see the word "chair" written in yellow letters, they are supposed to say "yellow."

The researchers then inserted a number of obscenities and vulgarities in the standard lineup. Charting participants' immediate and delayed responses, the researchers found that, first of all, people needed significantly more time to trill out the colors of the curse words than they did for neutral terms like chair.

The experience of seeing titillating text obviously distracted the participants from the color-coding task at hand. Yet those risqué interpolations left their mark. In subsequent memory quizzes, not only were participants much better at recalling the naughty words than they were the neutrals, but that superior recall also applied to the tints of the tainted words, as well as to their sense.

Yes, it is tough to toil in the shadow of trash. When researchers in another study asked participants to quickly scan lists of words that included obscenities and then to recall as many of the words as possible, the subjects were, once again, best at rehashing the curses - and worst at summoning up whatever unobjectionable entries happened to precede or follow the bad bits.

Yet as much as bad language can deliver a jolt, it can help wash away stress and anger. In some settings, the free flow of foul language may signal not hostility or social pathology, but harmony and tranquillity.

"Studies show that if you're with a group of close friends, the more relaxed you are, the more you swear," Dr. Burridge said. "It's a way of saying: 'I'm so comfortable here I can let off steam. I can say whatever I like.' "

Evidence also suggests that cursing can be an effective means of venting aggression and thereby forestalling physical violence.

With the help of a small army of students and volunteers, Timothy B. Jay, a professor of psychology at Massachusetts College of Liberal Arts in North Adams and the author of "Cursing in America" and "Why We Curse," has explored the dynamics of cursing in great detail.

The investigators have found, among other things, that men generally curse more than women, unless said women are in a sorority, and that university provosts swear more than librarians or the staff members of the university day care center.

Regardless of who is cursing or what the provocation may be, Dr. Jay said, the rationale for the eruption is often the same.

"Time and again, people have told me that cursing is a coping mechanism for them, a way of reducing stress," he said in a telephone interview. "It's a form of anger management that is often underappreciated."

Indeed, chimpanzees engage in what appears to be a kind of cursing match as a means of venting aggression and avoiding a potentially dangerous physical clash.

Frans de Waal, a professor of primate behavior at Emory University in Atlanta, said that when chimpanzees were angry "they will grunt or spit or make an abrupt, upsweeping gesture that, if a human were to do it, you'd recognize it as aggressive."

Such behaviors are threat gestures, Professor de Waal said, and they are all a good sign.

"A chimpanzee who is really gearing up for a fight doesn't waste time with gestures, but just goes ahead and attacks," he added.

By the same token, he said, nothing is more deadly than a person who is too enraged for expletives - who cleanly and quietly picks up a gun and starts shooting.

Researchers have also examined how words attain the status of forbidden speech and how the evolution of coarse language affects the smoother sheets of civil discourse stacked above it. They have found that what counts as taboo language in a given culture is often a mirror into that culture's fears and fixations.

"In some cultures, swear words are drawn mainly from sex and bodily functions, whereas in others, they're drawn mainly from the domain of religion," Dr. Deutscher said.

In societies where the purity and honor of women is of paramount importance, he said, "it's not surprising that many swear words are variations on the 'son of a whore' theme or refer graphically to the genitalia of the person's mother or sisters."

The very concept of a swear word or an oath originates from the profound importance that ancient cultures placed on swearing by the name of a god or gods. In ancient Babylon, swearing by the name of a god was meant to give absolute certainty against lying, Dr. Deutscher said, "and people believed that swearing falsely by a god would bring the terrible wrath of that god upon them." A warning against any abuse of the sacred oath is reflected in the biblical commandment that one must not "take the Lord's name in vain," and even today courtroom witnesses swear on the Bible that they are telling the whole truth and nothing but.

Among Christians, the stricture against taking the Lord's name in vain extended to casual allusions to God's son or the son's corporeal sufferings - no mention of the blood or the wounds or the body, and that goes for clever contractions, too. Nowadays, the phrase, "Oh, golly!" may be considered almost comically wholesome, but it was not always so. "Golly" is a compaction of "God's body" and, thus, was once a profanity.

Yet neither biblical commandment nor the most zealous Victorian censor can elide from the human mind its hand-wringing over the unruly human body, its chronic, embarrassing demands and its sad decay. Discomfort over body functions never sleeps, Dr. Burridge said, and the need for an ever-fresh selection of euphemisms about dirty subjects has long served as an impressive engine of linguistic invention.

Once a word becomes too closely associated with a specific body function, she said, once it becomes too evocative of what should not be evoked, it starts to enter the realm of the taboo and must be replaced by a new, gauzier euphemism.

For example, the word "toilet" stems from the French word for "little towel" and was originally a pleasantly indirect way of referring to the place where the chamber pot or its equivalent resides. But toilet has since come to mean the porcelain fixture itself, and so sounds too blunt to use in polite company. Instead, you ask your tuxedoed waiter for directions to the ladies' room or the restroom or, if you must, the bathroom.

Similarly, the word "coffin" originally meant an ordinary box, but once it became associated with death, that was it for a "shoe coffin" or "thinking outside the coffin." The taboo sense of a word, Dr. Burridge said, "always drives out any other senses it might have had."

Scientists have lately sought to map the neural topography of forbidden speech by studying Tourette's patients who suffer from coprolalia, the pathological and uncontrollable urge to curse. Tourette's syndrome is a neurological disorder of unknown origin characterized predominantly by chronic motor and vocal tics, a constant grimacing or pushing of one's glasses up the bridge of one's nose or emitting a stream of small yips or grunts.

Just a small percentage of Tourette's patients have coprolalia - estimates range from 8 to 30 percent - and patient advocates are dismayed by popular portrayals of Tourette's as a humorous and invariably scatological condition. But for those who do have coprolalia, said Dr. Carlos Singer, director of the division of movement disorders at the University of Miami School of Medicine, the symptom is often the most devastating and humiliating aspect of their condition.

Not only can it be shocking to people to hear a loud volley of expletives erupt for no apparent reason, sometimes from the mouth of a child or young teenager, but the curses can also be provocative and personal, florid slurs against the race, sexual identity or body size of a passer-by, for example, or deliberate and repeated lewd references to an old lover's name while in the arms of a current partner or spouse.

Reporting in The Archives of General Psychiatry, Dr. David A. Silbersweig, a director of neuropsychiatry and neuroimaging at the Weill Medical College of Cornell University, and his colleagues described their use of PET scans to measure cerebral blood flow and identify which regions of the brain are galvanized in Tourette's patients during episodes of tics and coprolalia.

They found strong activation of the basal ganglia, a quartet of neuron clusters deep in the forebrain at roughly the level of the mid-forehead, that are known to help coordinate body movement along with activation of crucial regions of the left rear forebrain that participate in comprehending and generating speech, most notably Broca's area.

The researchers also saw arousal of neural circuits that interact with the limbic system, the wishbone-shape throne of human emotions, and, significantly, of the "executive" realms of the brain, where decisions to act or desist from acting may be carried out: the neural source, scientists said, of whatever conscience, civility or free will humans can claim.

That the brain's executive overseer is ablaze in an outburst of coprolalia, Dr. Silbersweig said, demonstrates how complex an act the urge to speak the unspeakable may be, and not only in the case of Tourette's. The person is gripped by a desire to curse, to voice something wildly inappropriate. Higher-order linguistic circuits are tapped, to contrive the content of the curse. The brain's impulse control center struggles to short-circuit the collusion between limbic system urge and neocortical craft, and it may succeed for a time.

Yet the urge mounts, until at last the speech pathways fire, the verboten is spoken, and archaic and refined brains alike must shoulder the blame.
http://www.nytimes.com/2005/09/20/science/20curs.html
















Until next week,

- js.





















Current Week In Review


Recent WiRs -

September 17th, September 10th, September 3rd, August 27th

Jack Spratt's Week In Review is published every Friday. Please submit letters, articles, and press releases in plain text English to jackspratts (at) lycos (dot) com. Include contact info. Submission deadlines are Wednesdays @ 1700 UTC.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Old 23-09-05, 05:04 PM   #3
Mazer
Earthbound misfit
 
Mazer's Avatar
 
Join Date: May 2001
Location: Moses Lake, Washington
Posts: 2,563
Default

Model Tyra Banks Gets Nasty Rumor Off Chest On TV

Not really P2P news but I'll take it.
Mazer is offline   Reply With Quote
Old 23-09-05, 06:22 PM   #4
Nicobie
Registered User
 
Join Date: Mar 2000
Posts: 5,522
Default

nobody gives ashit
__________________
May your tote always stay tight and your edge eversharp :wink:
Nicobie is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 05:47 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)