P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 11-05-06, 11:05 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - May 13th, ’06


































"P2P sharing has become a helpful tool for us." – Steven Page


"The acoustics in a trailer are terrific. It was unbelievable. ... It was one of the best times that we've had since I was a senator." – Barack Obama, D-IL


"The government's interest in learning who the whistle-blowers were in a case that's finished is less important, than the ability of journalists to protect their confidential sources." – Eve Burton


"Men will do the same stupid thing over and over again and be happy." – Will Wright


"I feel like Apple beat me up and stole my lunch money." – Phil88


"It's the largest database ever assembled in the world." – Surveillance Expert


"Are you telling me that tens of millions of Americans are involved with Al Qaeda?" – Senator Patrick J. Leahy, D-VT


"We better all hope nothing happens to Arlen Specter, the Republican head of the Senate Judiciary Committee, because he might be all that is standing between us and a full-blown dictatorship in this country." – Jack Cafferty


"It's our government, our government! It's not one party's government, it's America's government!" – Senator Patrick J. Leahy, D-VT


"He only appears to record moments of great change and enormous upheaval. His presence now does not bode well." – Doctor Strange
































What’s the Story

Louis B. Mayer, the legendary manager of the movie studio that bore his name, grew increasingly frustrated with employees who put more and more energy into technique and style and less and less into basic plot and character development. While a proponent of showy technologies like five channel stereo (Just put a speaker where you want the sound!), color film and widescreen lenses, he always believed the story came first. It wasn't easy convincing younger filmmakers seduced by new machinery, but his "Tell me a story!" rants were famous around the halls of the MGM executive suites.

The recording industry fell into the same trap a few decades ago. By the 1960s recording technologies had progressed such that most listeners were unable to tell recorded from live so it was apparent that fi was about as high as it would ever need to be. Unfortunately the record business didn't have its own Louis Mayer to guide it, and being addicted to using increasing advances in recording technology to market albums, it veered off into the nether-world of hyper-fi with dubious processors like the notorious Aphex Aural Exiter, used infamously to produce both Elton John's and America’s mid-seventies greatest hits packages, rendering them into shiny saccharine fields of synthetic chaff. Each guitar pluck, each note, each everything isolated and surrounded by it’s own artificial reality field, where it seemed a listener might hear the artist’s intent in every motion. Startling to say the least and initially breathlessly seductive, but then saddening when one realized it was all just an illusion, an image created by machine to sell more product by shamelessly manipulating the buyer’s emotions. At least the old albums were still around for people to enjoy, not so for the original works increasingly being released with this "new and improved" plasticized sound.

The punkers and the party bands with their minimalist approach to audio production and jumpy three-minute songs were one reaction to the creeping bloat and artificiality of corporate rock. Whatever CBS did (Journey, REO Speedwagon etc) punkers and partiers did the opposite, creating a movement both musical and political that continues today. One up and coming band in that anti-corporate faction was the Red Hot Chilli Peppers.

It’s no accident that .avis and .mp3s are popular today. Given a choice consumers will sacrifice a glimmer of surface gloss for the deeper story. Not to say Lossless codecs won't become popular too, but only as they serve to bring listeners closer to the original recordings emotional intent, and not as substitutes for real feelings, unlike the artificial variety oozing out of slick digital signal processors.

While I appreciate any bands efforts at capturing the true sonics of their performance, if it takes a year and a half to "engineer" an album there is probably something missing from the songs to begin with, and groups like the RHCP know better than most that no amount studio post-processing will ever fix that problem (Dark Side of the Moon was recorded in less than half that time for instance). It comes then as a sad surprise that the Chilli Peppers, once celebrated for their hedonistic approach to peppy party songs is now huffily denouncing swappers for passing out less than pristine copies of their latest self-described sacred opus. The Chilli Peppers? Sacred? Apparently so. But seven years after Napster one would suppose a band with their street smarts would have figured out a way to use the internet to their advantage instead of getting sandbagged by it. So we’re led to believe they’ve been caught unaware by a common leak, and it justifies hostility towards their biggest fans. Well those fans are guilty of nothing more than a curiosity so burning it’s intense enough to disregard whatever sterling sonic attributes the secondhand files might lack, and that’s no crime. Most musicians would kill for that kind of adulation. This band’s hyperbolic anti-filesharing rhetoric rings hollow to these ears.















Enjoy,

Jack


















May 13th, ’06






NSA Has Massive U.S. Call Database

Creating a record of every call ever made inside this country
Leslie Cauley

The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.

The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans — most of whom aren't suspected of any crime. This program does not involve the NSA listening to or recording conversations. But the spy agency is using the data to analyze calling patterns in an effort to detect terrorist activity, sources said in separate interviews.

"It's the largest database ever assembled in the world," said one person, who, like the others who agreed to talk about the NSA's activities, declined to be identified by name or affiliation. The agency's goal is "to create a database of every call ever made" within the nation's borders, this person added.

For the customers of these companies, it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others.

The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks, the sources said. The program is aimed at identifying and tracking suspected terrorists, they said.

The sources would talk only under a guarantee of anonymity because the NSA program is secret.

Air Force Gen. Michael Hayden, nominated Monday by President Bush to become the director of the CIA, headed the NSA from March 1999 to April 2005. In that post, Hayden would have overseen the agency's domestic call- tracking program. Hayden declined to comment about the program.

The NSA's domestic program, as described by sources, is far more expansive than what the White House has acknowledged. Last year, Bush said he had authorized the NSA to eavesdrop — without warrants — on international calls and international e-mails of people suspected of having links to terrorists when one party to the communication is in the USA. Warrants have also not been used in the NSA's efforts to create a national call database.

In defending the previously disclosed program, Bush insisted that the NSA was focused exclusively on international calls. "In other words," Bush explained, "one end of the communication must be outside the United States."

As a result, domestic call records — those of calls that originate and terminate within U.S. borders — were believed to be private.

Sources, however, say that is not the case. With access to records of billions of domestic calls, the NSA has gained a secret window into the communications habits of millions of Americans. Customers' names, street addresses and other personal information are not being handed over as part of NSA's domestic program, the sources said. But the phone numbers the NSA collects can easily be cross-checked with other databases to obtain that information.

Don Weber, a senior spokesman for the NSA, declined to discuss the agency's operations. "Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide," he said. "However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law."

The White House would not discuss the domestic call-tracking program. "There is no domestic surveillance without court approval," said Dana Perino, deputy press secretary, referring to actual eavesdropping.

She added that all national intelligence activities undertaken by the federal government "are lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists." All government-sponsored intelligence activities "are carefully reviewed and monitored," Perino said. She also noted that "all appropriate members of Congress have been briefed on the intelligence efforts of the United States."

The government is collecting "external" data on domestic phone calls but is not intercepting "internals," a term for the actual content of the communication, according to a U.S. intelligence official familiar with the program. This kind of data collection from phone companies is not uncommon; it's been done before, though never on this large a scale, the official said. The data are used for "social network analysis," the official said, meaning to study how terrorist networks contact each other and how they are tied together.

Carriers uniquely positioned

AT&T recently merged with SBC and kept the AT&T name. Verizon, BellSouth and AT&T are the nation's three biggest telecommunications companies; they provide local and wireless phone service to more than 200 million customers.

The three carriers control vast networks with the latest communications technologies. They provide an array of services: local and long-distance calling, wireless and high-speed broadband, including video. Their direct access to millions of homes and businesses has them uniquely positioned to help the government keep tabs on the calling habits of Americans.

Among the big telecommunications companies, only Qwest has refused to help the NSA, the sources said. According to multiple sources, Qwest declined to participate because it was uneasy about the legal implications of handing over customer information to the government without warrants.

Qwest's refusal to participate has left the NSA with a hole in its database. Based in Denver, Qwest provides local phone service to 14 million customers in 14 states in the West and Northwest. But AT&T and Verizon also provide some services — primarily long-distance and wireless — to people who live in Qwest's region. Therefore, they can provide the NSA with at least some access in that area.

Created by President Truman in 1952, during the Korean War, the NSA is charged with protecting the United States from foreign security threats. The agency was considered so secret that for years the government refused to even confirm its existence. Government insiders used to joke that NSA stood for "No Such Agency."

In 1975, a congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named "Shamrock," led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping.

Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA.

Over the years, NSA code-cracking techniques have continued to improve along with technology. The agency today is considered expert in the practice of "data mining" — sifting through reams of information in search of patterns. Data mining is just one of many tools NSA analysts and mathematicians use to crack codes and track international communications.

Paul Butler, a former U.S. prosecutor who specialized in terrorism crimes, said FISA approval generally isn't necessary for government data-mining operations. "FISA does not prohibit the government from doing data mining," said Butler, now a partner with the law firm Akin Gump Strauss Hauer & Feld in Washington, D.C.

The caveat, he said, is that "personal identifiers" — such as names, Social Security numbers and street addresses — can't be included as part of the search. "That requires an additional level of probable cause," he said.

The usefulness of the NSA's domestic phone-call database as a counterterrorism tool is unclear. Also unclear is whether the database has been used for other purposes.

The NSA's domestic program raises legal questions. Historically, AT&T and the regional phone companies have required law enforcement agencies to present a court order before they would even consider turning over a customer's calling data. Part of that owed to the personality of the old Bell Telephone System, out of which those companies grew.

Ma Bell's bedrock principle — protection of the customer — guided the company for decades, said Gene Kimmelman, senior public policy director of Consumers Union. "No court order, no customer information — period. That's how it was for decades," he said.

The concern for the customer was also based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers' calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered.

The financial penalties for violating Section 222, one of many privacy reinforcements that have been added to the law over the years, can be stiff. The Federal Communications Commission, the nation's top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of "violation." In practice, that means a single "violation" could cover one customer or 1 million.

In the case of the NSA's international call-tracking program, Bush signed an executive order allowing the NSA to engage in eavesdropping without a warrant. The president and his representatives have since argued that an executive order was sufficient for the agency to proceed. Some civil liberties groups, including the American Civil Liberties Union, disagree.

Companies approached

The NSA's domestic program began soon after the Sept. 11 attacks, according to the sources. Right around that time, they said, NSA representatives approached the nation's biggest telecommunications companies. The agency made an urgent pitch: National security is at risk, and we need your help to protect the country from attacks.

The agency told the companies that it wanted them to turn over their "call-detail records," a complete listing of the calling histories of their millions of customers. In addition, the NSA wanted the carriers to provide updates, which would enable the agency to keep tabs on the nation's calling habits.

The sources said the NSA made clear that it was willing to pay for the cooperation. AT&T, which at the time was headed by C. Michael Armstrong, agreed to help the NSA. So did BellSouth, headed by F. Duane Ackerman; SBC, headed by Ed Whitacre; and Verizon, headed by Ivan Seidenberg.

With that, the NSA's domestic program began in earnest.

AT&T, when asked about the program, replied with a comment prepared for USA TODAY: "We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law."

In another prepared comment, BellSouth said: "BellSouth does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority."

Verizon, the USA's No. 2 telecommunications company behind AT&T, gave this statement: "We do not comment on national security matters, we act in full compliance with the law and we are committed to safeguarding our customers' privacy."

Qwest spokesman Robert Charlton said: "We can't talk about this. It's a classified situation."

In December, The New York Times revealed that Bush had authorized the NSA to wiretap, without warrants, international phone calls and e-mails that travel to or from the USA. The following month, the Electronic Frontier Foundation, a civil liberties group, filed a class-action lawsuit against AT&T. The lawsuit accuses the company of helping the NSA spy on U.S. phone customers.

Last month, U.S. Attorney General Alberto Gonzales alluded to that possibility. Appearing at a House Judiciary Committee hearing, Gonzales was asked whether he thought the White House has the legal authority to monitor domestic traffic without a warrant. Gonzales' reply: "I wouldn't rule it out." His comment marked the first time a Bush appointee publicly asserted that the White House might have that authority.

Similarities in programs

The domestic and international call-tracking programs have things in common, according to the sources. Both are being conducted without warrants and without the approval of the FISA court. The Bush administration has argued that FISA's procedures are too slow in some cases. Officials, including Gonzales, also make the case that the USA Patriot Act gives them broad authority to protect the safety of the nation's citizens.

The chairman of the Senate Intelligence Committee, Sen. Pat Roberts, R-Kan., would not confirm the existence of the program. In a statement, he said, "I can say generally, however, that our subcommittee has been fully briefed on all aspects of the Terrorist Surveillance Program. ... I remain convinced that the program authorized by the president is lawful and absolutely necessary to protect this nation from future attacks."

The chairman of the House Intelligence Committee, Rep. Pete Hoekstra, R-Mich., declined to comment.

One company differs

One major telecommunications company declined to participate in the program: Qwest.

According to sources familiar with the events, Qwest's CEO at the time, Joe Nacchio, was deeply troubled by the NSA's assertion that Qwest didn't need a court order — or approval under FISA — to proceed. Adding to the tension, Qwest was unclear about who, exactly, would have access to its customers' information and how that information might be used.

Financial implications were also a concern, the sources said. Carriers that illegally divulge calling information can be subjected to heavy fines. The NSA was asking Qwest to turn over millions of records. The fines, in the aggregate, could have been substantial.

The NSA told Qwest that other government agencies, including the FBI, CIA and DEA, also might have access to the database, the sources said. As a matter of practice, the NSA regularly shares its information — known as "product" in intelligence circles — with other intelligence groups. Even so, Qwest's lawyers were troubled by the expansiveness of the NSA request, the sources said.

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard.

Trying to put pressure on Qwest, NSA representatives pointedly told Qwest that it was the lone holdout among the big telecommunications companies. It also tried appealing to Qwest's patriotic side: In one meeting, an NSA representative suggested that Qwest's refusal to contribute to the database could compromise national security, one person recalled.

In addition, the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.

Unable to get comfortable with what NSA was proposing, Qwest's lawyers asked NSA to take its proposal to the FISA court. According to the sources, the agency refused.

The NSA's explanation did little to satisfy Qwest's lawyers. "They told (Qwest) they didn't want to do that because FISA might not agree with them," one person recalled. For similar reasons, this person said, NSA rejected Qwest's suggestion of getting a letter of authorization from the U.S. attorney general's office. A second person confirmed this version of events.

In June 2002, Nacchio resigned amid allegations that he had misled investors about Qwest's financial health. But Qwest's legal questions about the NSA request remained.

Unable to reach agreement, Nacchio's successor, Richard Notebaert, finally pulled the plug on the NSA talks in late 2004, the sources said.

Contributing: John Diamond
http://www.usatoday.com/news/washing...5-10-nsa_x.htm





Bush Says U.S. Spying Is Not Widespread
John O'Neil

President Bush today denied that the government is "mining or trolling through the personal lives of innocent Americans," as Democrats expressed outrage over a news report describing a National Security Agency program that has collected vast amounts of telephone records.

The article, in USA Today, said that the agency did not listen to the calls, but secretly obtained information on numbers dialed by "tens of millions of Americans" and used it for "data mining" — computer analysis of large amounts of information for clues or patterns to terrorist activity.

Making a hastily scheduled appearance in the White House, Mr. Bush did not directly address the collection of phone records, except to say that "new claims" had been raised about surveillance. He said all intelligence work was conducted "within the law" and that domestic conversations were not listened to without a court warrant.

"The privacy of all Americans is fiercely protected in all our activities," he said. "Our efforts are focused on Al Qaeda and their known associates."

In the Senate, Democrats denounced the program, citing it as evidence that Congress had failed to carry out its duty to make sure that the intelligence activities did not violate civil rights.

And Senator Arlen Specter, the chairman of the Senate Judiciary Committee, said he would call executives of AT&T, BellSouth and Verizon "to see if we can learn some of the underlying facts."

He said he would question them about "what we can't find out from the Department of Justice or other administration officials."

The article named those three companies as cooperating with the security agency's request; it said that Qwest had refused to provide the information. AT&T, BellSouth and Verizon all issued statements declaring that they have always acted within the law.

"BellSouth does not provide any confidential customer information without proper legal authority," said a company spokesman, Jeff Battcher.

"AT&T has a long history of vigorously protecting customer privacy," said a spokesman, Selim Bingol. "If and when AT&T is asked to help, we do so strictly within the law and under the most stringent conditions."

And Robert Verettoni, a Verizon spokesman, said, "We do not comment on national security matters, we act in full compliance with the law and we are committed to safeguarding our customers' privacy."

The New York Times reported last December that the agency had gathered data from phone and e-mail traffic with the cooperation of several major telecommunications companies.

But Democrats reacted angrily to the USA Today article and its description of the program's vast size, including an assertion by one unnamed source that its goal was the creation of a database of every phone call ever made within the United States' borders.

"Are you telling me that tens of millions of Americans are involved with Al Qaeda?" Senator Patrick J. Leahy of Vermont, the committee's ranking minority member, asked angrily.

Like Mr. Specter, Mr. Leahy made a link between the new charge and the administration's refusal to answer the many of the committee's questions about the security agency's warrantless wiretaps of calls between the United States and overseas in which one person is suspected of terrorist ties.

"It's our government, our government!" he said, turning red in the face and waving a copy of USA Today. "It's not one party's government, it's America's government!"

Other Democrats demanded that the administration officials, including Attorney General Alberto Gonzalez and former Attorney General John Ashcroft, be subpoenaed to testify under oath about both programs.

And they made clear that they thought the new surveillance issue would complicate the nomination of Gen. Michael V. Hayden, a former head of the security agency, to be the new director of the Central Intelligence Agency.

"I want to ask General Hayden about these programs before we move forward with his nomination, which I was inclined to be supportive of, if he showed the requisite independence," said Senator Charles E. Schumer, a New York Democrat and member of the Judiciary Committee.

Republicans urged caution before drawing any conclusions based on the article, and noted that it described the program as collecting information only about phone numbers, not about the contents of conversations.

"It's not a wiretapping program, it's simply a compilation, according to the report here, of numbers that phone companies maintain," said Senator Jeff Sessions of Alabama, who is also on the judiciary panel.

He compared it to "mail covers" and "pen registers," techniques long used by law-enforcement authorities to record the addresses on letters or calls made by individuals under investigation. No warrant is needed for such efforts, but the government must certify with a court that the information likely to be obtained is relevant to an ongoing investigation.

But at least one prominent Republican expressed reservations. "I am concerned about what I read with regard to N.S.A. databases of phone calls," Representative John A. Boehner of Ohio, the House majority leader, told The Associated Press.

Senator Dianne Feinstein, the California Democrat who is a member of the Intelligence Committee as well as the Judiciary Committee, appeared to confirm at least the gist of the article, while stressing that what was under discussion was not wiretapping. "It's fair to say that what is in the news this morning is not content collection," she said.

Even so, she warned, "I happen to believe that we are on our way to a major Constitutional confrontation on the Fourth Amendment guarantees over unreasonable search and seizure."

Senator Russell D. Feingold, a Wisconsin Democrat who is also on both the judiciary and intelligence panels, expressed dismay over what he termed the administration's "arrogance and abuse of power." He said the United States can fight terrorism and still protect privacy, "but only if we have a president who believes in these principles."

The Times article disclosing the data mining program last December quoted officials in the government and the telecommunications industry who have knowledge of parts of the program as saying the N.S.A. has sought to analyze communications patterns to glean clues from details like who is calling whom, how long a phone call lasts and what time of day it is made, and the origins and destinations of phone calls and e-mail messages. Calls to and from Afghanistan, for instance, are known to have been of particular interest to the N.S.A. since the Sept. 11 attacks, the officials said.

In the USA Today article, the White House defended its overall eavesdropping program and said no domestic surveillance is conducted without court approval.

"The intelligence activities undertaken by the United States government are lawful, necessary and required to protect Americans from terrorist attacks," said Dana Perino, the deputy White House press secretary, who added that appropriate members of Congress have been briefed on intelligence activities.

The anger among committee members carried over to a number of other related developments. Senator Specter said he was sending a letter to the Justice Department in response to a news report that an investigation by the Justice Department's ethics office into the lawyers who gave approval to the domestic surveillance program was abandoned because the investigators were refused the necessary security clearances.

"It's sort of incomprehensible that that was done," Senator Specter said, adding that he was asking that the clearances be granted so the review could continue.

Senator Richard J. Durbin, an Illinois Democrat on the Judiciary Committee, called the decision "clear evidence of a cover-up within this administration."

Mr. Specter also said that he "had some indication" that Mr. Ashcroft and James Comey, a former deputy Attorney General, had some knowledge about the domestic surveillance program, but said he didn't think it would be "fruitful" to subpoena them to testify.

And Mr. Specter said that he believed he had the agreement of all 10 Republicans on the committee for a bill he has proposed that would ask the special court that handles requests for warrants on foreign intelligence to rule on the Constitutionality of the domestic surveillance program.

But several Democrats indicated that they were not likely to support the bill in the absence of more information about the surveillance the government is conducting in general.

"How can we approve this without knowing much more?" asked Mr. Durbin.

David Stout contributed reporting from Washington for this article.
http://www.nytimes.com/2006/05/11/wa... ner=homepage



Wolf Blitzer, CNN Anchor: Let's get some words of wisdom from Jack Cafferty. He's in New York right now -- Jack.

Jack Cafferty, CNN: I don't know about wisdom, but you'll get a little outrage. We better all hope nothing happens to Arlen Specter, the Republican head of the Senate Judiciary Committee, because he might be all that is standing between us and a full-blown dictatorship in this country.

He's vowed to question these phone company executives about volunteering to provide the government with my telephone records and yours and tens of millions of other Americans. Shortly after 9/11, AT&T, Verizon and BellSouth began providing the super-secret NSA with information on phone calls of millions of our citizens. All part of the war on terror, President Bush says.

Why don't you go find Osama bin Laden and seal the country's borders and start inspecting the containers that come into our ports? The president rushed out this morning in the wake of this front page story in "USA Today" and declared the government is doing nothing wrong and all this is just fine.

Is it? Is it legal? Then why did the Justice Department suddenly drop its investigation of the warrantless spying on citizens? Because the NSA said Justice Department lawyers didn't have the necessary security clearance to do the investigation.

Read that sentence again. A secret government agency has told our Justice Department that it's not allowed to investigate it. And the Justice Department just says, OK, and drops the whole thing. We're in some serious trouble here, boys and girls.

Here's the question: Does it concern you that your phone company may be voluntarily providing your phone records to the government without your knowledge or your permission? If it doesn't, it sure as hell ought to. E-mail us your thoughts at caffertyfile@CNN.com or go to CNN.com/caffertyfile -- Wolf.
http://transcripts.cnn.com/TRANSCRIP...itroom.01.html





With Access Denied, Justice Department Drops Spying Investigation
Scott Shane

An investigation by the Justice Department ethics office into the conduct of department lawyers who approved the National Security Agency's domestic surveillance program has been closed because investigators were denied security clearances, according to a letter sent to Congress on Wednesday.

The head of the department's Office of Professional Responsibility, H. Marshall Jarrett, wrote in the letter to Representative Maurice D. Hinchey, Democrat of New York, that "we have been unable to make meaningful progress in our investigation because O.P.R. has been denied security clearances for access to information about the N.S.A. program."

Mr. Jarrett said his office had requested clearances since January, when it began an investigation, and was told on Tuesday that they had been denied. "Without these clearances, we cannot investigate this matter and therefore have closed our investigation," the letter said.

Mr. Hinchey said the denial of clearances was "hard to believe" and compounded what he called a violation of the law by the program itself, which eavesdrops without court warrants on people in the United States suspected of ties to Al Qaeda.

Brian Roehrkasse, a Justice Department spokesman, said that the N.S.A. program was "highly classified and exceptionally sensitive" and that "only those involved in national security with a specific need to know are provided details about this classified program." He said the legality of the eavesdropping program had been reviewed by other Justice Department offices and by the N.S.A. inspector general.
http://www.nytimes.com/2006/05/11/wa.../11secure.html





Beatles Lose Suit Against Apple Computers
Jennifer Quinn

Apple Computer Inc. is entitled to use the apple logo on its iTunes Music Store, a judge ruled Monday, rejecting a suit filed by Apple Corps Ltd., the guardian of The Beatles' commercial interests.

Apple Corps, which claimed that the computer company had broken a 1991 agreement in which each side agreed not to enter into the other's field of business, said it would appeal.

Judge Edward Mann of Britain's High Court ruled that Apple Computer used the fruit logo in association with the store, not the music, and thus did not breach the agreement.

"I conclude that the use of the apple logo ... does not suggest a relevant connection with the creative work," Mann said in his written judgment. "I think that the use of the apple logo is a fair and reasonable use of the mark in connection with the service, which does not go further and unfairly or unreasonably suggest an additional association with the creative works themselves."

Though Apple Computer CEO Steve Jobs said he was "glad to put this disagreement behind us," the case appears far from over. Neil Aspinall, the manager of Apple Corps, said his company would immediately appeal.

"We felt that during the course of the trial we clearly demonstrated just how extensively Apple Computer has broken the agreement," Aspinall said in a statement.

Apple Computer has sold more than 1 billion songs through the iTunes Music Store, which is available throughout Europe as well as in the United States, Canada, Australia and Japan. Though there are more than 3 million tracks available for purchase in the U.S. - and 2 million in Britain - there are no Beatles' songs listed. The band's catalog is not available on iTunes.

In his brief statement, Jobs said he hoped the ruling would help rectify that situation: "We have always loved the Beatles, and hopefully we can now work together to get them on the iTunes Music Store."

Apple Corps attorney Nick Valner says the 1991 agreement between the two companies should have prevented any more legal action.

Lawyers for Cupertino, Calif.-based Apple Computer had argued that the company was conducting its business legally and consumers are smart enough to tell the difference between the logos. Apple Corps uses a shiny green apple as its logo, while Apple Computer has a cartoon-like apple with a neat bite taken out.

Lawyers for each side tussled during the hearing over advertisements for iTunes featuring musical acts U2, Eminem and Coldplay, using the logo. The judge confessed early on that he owned an iPod.

The 1991 agreement ended previous lengthy litigation over the logo. Apple Computer told the court that it paid the Fab Four's company $26.5 million as part of the 1991 out-of-court settlement, and in return had received "a considerably expanded field of use." The terms of the deal were kept confidential at the time.

Mann refused Apple Computer's application for an immediate interim payment of 1.5 million pounds ($2.8 million) from Apple Corps toward its legal costs, pending further hearings. Apple Corps faces a similar bill for its own legal expenses.

While the case may have seemed glamorous because of the litigants, it really came down to the interpretation of a contract - the 1991 agreement - said Jonathan Riley, an intellectual property lawyer with London firm Lawrence Graham.

"It was watched with interest, but also some distance, because I don't think it's hugely significant for either the computer industry or the music industry," he said.

Apple Corps was started by the Beatles in 1968 and is still owned by Paul McCartney, Ringo Starr, the widow of John Lennon and the estate of George Harrison. Apple Computer was formed in 1976, when college dropouts Steve Jobs and Steve Wozniak filed partnership papers on April Fools' Day.
http://hosted.ap.org/dynamic/stories...LATE=DEFA ULT





Blubster, Piolet, now this

Manolito Strikes Back
Thomas Mennecke

Everything is about BitTorrent these days. It’s taken over as the leading file-sharing network, has become synonymous with obtaining information over the Internet, and has nearly consolidated P2P development under one roof. Is there any hope for the P2P simpleton?

There is, and comes as the rejuvenation of the Manolito P2P (MP2P) network.

The MP2P network is the work of Pablo Soto and his associated Optisoft company in P2P friendly Spain. Based loosely on the Gnutella network, Pablo created one of the most successful file-sharing networks. During its early days, the MP2P was spearheaded by the Blubster client and became popular under the self-contained 1.2.3 version.

Soon after its release in the summer of 2001, Blubster immediately began mustering an impressive, albeit modest, user base. With the collapse of Napster imminent and Gnutella not quite mature enough to accommodate the masses, the MP2P network saw its network grow to over 3,000 users by February 2002. At the time, its competition was the rapidly expanding FastTrack network with 500,000 users, iMesh with 165,000, eDonkey2000 with just over 100,000 and Gnutella with a population of approximately 60,000 simultaneous users.

Yet these powerhouse networks were out of reach for the fledgling MP2P network. More humble competition took the form of the now defunct SongSpy and FileNavigator networks. MP2P would have significant work ahead to remain competitive, as SongSpy and FileNavigator boasted populations of over 8,000 users.

However the relatively small MP2P network maintained one distinct advantage – decentralization. Before the MGM vs. Grokster decision, the music industry successfully negated P2P networks by forcing the shutdown of their centralized indexing servers. The tactic worked against Napster, Scour Exchange and AudioGalaxy. Just about any network that resembled the Napster or Scour architecture quickly fell, including SongSpy and FileNavigator.

The inability of these networks to adapt to the rapidly changing P2P world facilitated their demise. While FileNavigator was already fading by early 2002, the promising SongSpy P2P community was struck down by mid summer and absorbed by IMG Entertainment on July 31, 2002. The new owners of SongSpy attempted to reintroduce the application as a legitimate resource, however this never materialized.

With most of the smaller file-sharing networks now removed, MP2P now had the distinction of being the leading mediocre P2P network. Although middling at best, the lack of small scale competition gave MP2P the opportunity to reveal its potential. This mediocrity would slowly dissolve into credibility, as by September 2002 M2P was topping 20,000 simultaneous users. By November MP2P was topping 50,000 simultaneous users. With a burgeoning community poised to strike at the major networks, it seemed nothing would stop this network from reaching its potential – perhaps with the exception of internal politics.

The shareholders of this community, Optisoft; and Pablo Soto, the lone developer, saw different visions for Blubster. The inability for the two sides to reconcile their visions led to Pablo’s departure in late 2002. The exact details of this split are unclear, however it’s widely believed Optisoft was pushing for a more commercialized product, while Pablo was looking to keep such commercialism to a minimum. Optisoft retained the right to distribute Blubster by purchasing the licensing rights to the MP2P technology. Out of the Optisoft picture yet still in control of the underlying technology, Pablo went on to found Piolet (pronounced Pee-oh-lay) on January 3, 2003.

The shakeup appeared to have little effect on the already established network. Piolet was readily accepted as the successor to Blubster and by the end of January 2003 the MP2P network was topping 100,000 simultaneous users. With over 200,000 by mid-2003, it yet again seemed nothing would stop this network. It survived the shakeup of Optisoft and the rebranding of Blubster – but not WinMX syndrome.

Like many file-sharing applications and networks, Piolet and the MP2P network appeared to spiral into self-destruct during its peak. The last version, 1.05, was released in March 2003. The MP2P community would not see another update until August 2004. With over a year between updates and absolutely no news in 2005, MP2P was largely considered dead despite a reunification with Optisoft. It continued to function reasonably well into late 2004 and early 2005, however rapid advancements with Gnutella and BitTorrent rendered MP2P nearly irrelevant.

However MP2P wasn’t neglected because of a lack of interest. Rather, personal health problems in 2005 prevented Pablo from concentrating on his nearly five year old project. Healthy again in 2006, Pablo has reinvigorated the MP2P project. MP2P fans were surprised this week to see the Piolet.com homepage renovated, with the release of a new product: Manolito.

Currently, the Manolito client contains no appreciable differences from the latest version of Piolet. Many changes are coming however, as Pablo now has a team of developers working on the project with him. In addition, the Manolito homepage promises “anonymity” for the end user – details of which should be released by the development team soon.

The new Manolito client maintains many of the attributes of its predecessor, such as being free from spyware and adware – an attribute that will maintain throughout its future. Like LimeWire or BearShare, there is the standard free version and the more “enabled” $19.99 version.

However the current Manolio homepage lacks the community feel of the old Blubster.com. Although more utilitarian in appearance than the spit and polish Manolito.com, it laid an excellent foundation for the MP2P community to interact, grow and prosper. Manolito shows promise, yet if it wishes to fulfill its never obtained potential, it needs to reestablish this community architecture.
http://www.slyck.com/news.php?story=1182





Warner To Start Movie Downloads
Peter Bowes

Warner Brothers is to start selling film downloads via the internet using the same technology once blamed for helping people swap illegal copies.

The Hollywood studio has reached a deal with the web company Bit Torrent, which uses peer-to-peer technology to allow the quick distribution of large files.

Warner says users will be able to buy downloads of films and TV shows on the same day they become available on DVD.

Pricing for a feature film will be about the same as the DVD release.

The cost of a television show could be as low as a dollar.

Rivals to follow?

Warner added that whether a TV show or feature film, it will only play on the initial computer used to make the download.

The downloads will not therefore work on other PCs or standard DVD players.

Other Hollywood studios are now likely to launch similar services.

They believe movie fans will prefer to pay a reasonable price for a legal downloaded movie rather than risk illegally swapping a computer file that could contain viruses or be a poor quality copy of a film.

Peer-to-peer connections enable people to quickly swap files between their computers without having to go via an internet server.
http://news.bbc.co.uk/go/pr/fr/-/1/h...ss/4753435.stm





Click Fraud Concerns Hound Google
Michael Liedtke

John Thys still hasn't figured out how much his company has paid Google Inc. for bogus sales referrals caused by "click fraud" - a sham aimed at a perceived weakness in the Internet search leader's lucrative advertising network.

But Thys says he has uncovered enough of it to conclude that Google is trying to shortchange his company and thousands of other advertisers by offering refunds totaling $60 million to settle a lawsuit.

"It's almost like an insult that they expect us to take this token money," said Thys, director of Internet marketing for Radiator.com.

Google also expects to pay $30 million to the lawyers who settled the case on behalf of advertisers, raising the settlement's total value to as high as $90 million. Still, that's a fraction of the more than $10 billion in cash held by the Mountain View, Calif.-based search company.

An Arkansas judge is expected to consider the proposed class-action settlement in late July.

The refunds, which will be provided in the form of advertising credits, are meant to compensate Google's customers for undetected click fraud, which contributed to the $13.3 billion in ad revenue that has poured into the company since 2001.

Google's offer works out to a $4.50 refund on every $1,000 spent in its vast advertising network over the past 4 1/4 years.

Meanwhile, independent studies assert that anywhere from $100 to $400 of every $1,000 stems from click fraud. If those estimates prove correct, Google might be on the hook for $1 billion to $5 billion in advertising refunds.

Click fraud takes different shapes, but the end result is usually the same: Merchants are billed for fruitless traffic generated by scam artists and mischief makers who repeatedly click on an advertiser's Web link with no intention of buying anything.

Based on a monthlong analysis of the traffic that Google ads referred to Radiators.com, Thys suspects click fraud may have accounted for 35 percent of the Web site's $20,000 ad bill.

After reviewing Thys' evidence, Google said its internal safeguards had spotted the suspicious activity as it occurred and never billed Radiators.com for fraudulent clicks. But Thys said the search engine didn't provide him with any data to back up its findings in an e-mail signed simply by "Ray" from Google's click quality team.

Google maintains its class-action settlement represents a fair offer that underscores how well it has shielded advertisers from the costs of click fraud.

The class-action settlement of the Arkansas lawsuit will likely test advertisers' faith in Google. The company is supposed to send out notices of the settlement later this month, giving advertisers until late June to reject or protest the refund offer. Radiators.com already has decided to reject the offer.

If the entire deal is rejected, lawyers then go back to the negotiating table; individual advertisers can also declare they won't participate, freeing them to file their own lawsuits seeking better deals or join a separate one pending in California.

Miller County Circuit Court Judge Joe Griffin is scheduled to decide whether to approve the settlement in a two-day hearing beginning July 24.

Meanwhile, Yahoo Inc. - owner of the Internet's second-largest advertising network - continues to fight similar click fraud allegations in the same Arkansas court as well as a federal court in California. A click-fraud lawsuit filed against Google in that same federal court has been suspended while its Arkansas settlement is reviewed.

The Google settlement, announced in early March, already has focused more attention on click fraud.

The shady activity produces revenue for Google, Yahoo and a long list of Web sites that display the ads because the clicks trigger sales commissions even if a referral doesn't produce a sale.

Suspected motives vary. Sometimes Web merchants try to deplete a rival's advertising budget. In other instances, the owners of small Web sites participating in the marketing networks run by Google and Yahoo are believed to click on ads to generate more commissions for themselves.

Complicating the click fraud issue even further, search engine advertising isn't subjected to independent auditing like the advertising done in newspapers, magazines and broadcast media.

In search advertising, Web site owners sign contracts obligating them to pay for all valid clicks - and the search engine has discretion over what is valid.

Google is examining ways to make its fraud-fighting efforts more transparent without revealing crucial information that might help swindlers elude detection, said Shuman Ghosemajumder, the company's product manager for trust and safety.

Outside help also may be on the way.

The class-action settlement requires a report from a yet-undisclosed independent expert to verify that Google has made reasonable efforts to weed out click fraud.

Separately, Minneapolis-based Fair Isaac Co. is studying the issue, drawing on its years of helping lenders fight fraud.

San Antonio-based Click Forensics Inc. recently set up a free service that intends to issue quarterly reports on the frequency of click fraud, compiling information from more than 1,000 advertisers.

The index's initial findings, released in late April, estimated Google and Yahoo suffered a click fraud rate of 12 percent, translating to more than $1.5 billion of Google's ad revenue.

Given those findings, the settlement amount in the Arkansas class action "was very surprising to us," said Tom Cuthbert, Click Forensics' chief executive. "If I were an advertiser, I would take great care in studying that settlement."

Attorneys suing Google in the California case say they will do everything possible to persuade advertisers to reject the Arkansas settlement.

"Google's motto is 'do no evil,' but it's not following its own advice by entering into this kind of settlement," lawyer Brian Kabateck said.

If enough advertisers balk, it might derail the deal. Google has the right to nullify the settlement if advertisers that supplied more than 5 percent of its revenue since 2001 reject the agreement.

Google spokesman Barry Schnitt said Kabateck and his colleagues are trying to rally opposition to the Arkansas settlement so they can revive the California lawsuit in an attempt to drum up more fees for themselves.

Stephen Malouf, a Dallas lawyer who negotiated the Arkansas settlement, doubts advertisers can get a better deal than what Google has offered. "It's easy to take cheap shots now, but what is the alternative and what are the chances of success?"
http://hosted.ap.org/dynamic/stories...MPLATE=DEFAULT





Yahoo Is Unleashing a New Way to Turn Ad Clicks Into Ka-Ching
Saul Hansell

When Yahoo finally switches on the new search-advertising software code-named Project Panama this summer, users of its search engine will hardly notice a difference. But if Yahoo's project was worth the two years and tens of millions of dollars it cost — far more money and time than it expected — users will find the text ads adjacent to the main search results just a little more interesting, luring them to click on those ads a little more often.

Those clicks should immediately turn into a lot more cash for Yahoo. It will not say how much. But Jordan Rohan, an analyst for RBC Capital Markets, estimates that if the strategy works, Yahoo will increase search-advertising revenue at least 20 percent right away — about $125 million in the fourth quarter of this year and $600 million next year.

That is a big impact from new software, and it speaks to the complex art and science of running a search engine. When hundreds of thousands of advertisers bid for the attention of hundreds of millions of searchers, little changes can have big results.

It is also a sign of how well Google, Yahoo's rival, has mastered those nuances. Mr. Rohan estimates that Google's ability to draw more advertisers and show the right ads to searchers lets it earn about 40 percent more from every search than Yahoo does.

Yahoo realized that its existing software had limitations shortly after it paid $1.6 billion in 2003 to buy Overture Services, the company that invented search advertising. But its effort to rebuild the software was delayed as it shifted its resources to creating its own Web search engine.

Daniel L. Rosensweig, Yahoo's chief operating officer, says he does not regret putting the search-advertising system behind the main search engine.

"We have been very clear that the goose that laid the golden egg is the audience," he said.

When the company turned its full attention to search-advertising software in late 2004, the task was bigger than it initially expected, partly because Yahoo wanted the system to be able to handle ads with graphics and video eventually, not just text.

But now the software is almost done. Today, Yahoo is releasing the technical specifications so that its customers can prepare for changes that will affect many millions of individual advertisements. At an analyst presentation on May 17, the company will offer more details about the introduction and financial impact of Project Panama.

In the meantime, Yahoo's existing system is straining to keep up with the search market. It is harder for advertisers and their agencies to use than Google's, and it has suffered from a series of embarrassing disruptions, leaving paying customers unable to buy ads. Yahoo also faces emerging competition from Microsoft, which has been developing its own search-advertising system.

"Yahoo has taken a lot of bumps and bruises," said Peter Hershberg, a managing partner of Reprise Media, a New York search-advertising agency. "We would get notification every day that data was not available, and that made it very challenging to manage our campaigns." He added that these problems had been cleared up in recent weeks.

Yahoo says the new system is more stable and is built for much higher volume. It hopes to make the system easier to use, both for small businesses and for giant marketers.

Most important, it is building a far more sophisticated system to determine the order in which it displays advertisements. That is crucial because users have a strong propensity to pick from among the top few ads.

When Overture began as Goto.com, an advertising-only search engine, it introduced what turned out to be two powerful innovations: Customers paid for an advertisement only when users clicked on it; and the price of an ad was set by a computerized auction. Thus, the advertiser that bid the most per click was listed first, and so on.

When Google got into the search-advertising business in 2002, it realized that Goto had made a critical mistake. Its system allowed obscure advertisers to gain a prominent position, even if they were not appealing to users and were unlikely to be clicked on. So Google found a way to predict the popularity of ads in order to put the ones that would bring in the most dollars on top.

Google's models have become quite sophisticated, trying to take into account that different ads may appeal to users in different locations at different times. Indeed, Google asserts that a supercomputer network of 100 machines evaluates more than a million variables in milliseconds to pick which to display each time someone searches.

Yahoo is building a cadre of mathematicians and economists to build similar models. But it acknowledges that it does not yet analyze as many data elements as claimed by Google.

Late last month, there was a clear sense of urgency at the headquarters of what is now called Yahoo Search Marketing in Burbank, Calif., near Los Angeles. Amid a sea of Yahoo's trademark purple cubicles, there were signs with "Panama: Are you ready?" written in big letters.

Under them was a mosaic of color-coded notations, tracking the work of 28 teams in three locations that are building the system. On other walls, more signs coordinated another effort, known as Roosevelt, a series of technological bandages meant to keep the old system running until the new one is ready.

"We are flying an airplane while rebuilding it," said David Henke, whom Yahoo hired last year as group vice president for engineering in the search-advertising group. "This is a bigger project than we expected because we are doing it in parallel with our existing systems. It required additional personnel and expertise."

Still, he said he had the complete support of Terry S. Semel, Yahoo's chief executive, and Susan L. Decker, its cost-conscious chief financial officer. When he asked earlier this year for a "gigantic" amount of money to buy a big portion of the thousands of servers and other machines that Panama requires, the approval came back in six hours.

"They said, 'Go figure what it takes and do it right,' " Mr. Henke said.

Gigantic for Yahoo, however, may well be pipsqueak compared with its free-spending competitors. Google plans to spend at least $1.5 billion this year on servers, networking equipment and the facilities to house them, and it is hiring 1,000 people each quarter, many of them engineers. Microsoft plans to spend $2 billion on search and Internet technology this year.

Ellen Siminoff, a former Yahoo executive who now runs Efficient Frontier, a search-advertising agency in Mountain View, Calif., said Yahoo had to recognize that it was in a technological arms race.

"Yahoo hires a lot of smart people, and they can do this if they want to," she said. "The big issue for them is their willingness to spend and keep up with Google's R.& D."

While the underlying Panama system has a lot of capabilities, the first version will present only a subtle difference from what Google offers. Advertisers will simply enter the keywords they want their ad to appear next to and the maximum price they are willing to pay for a click. The most significant option will be to specify a certain geographic region in which the ads will be shown, a feature Google also offers.

Microsoft, in contrast, has sought to distinguish itself by allowing advertisers to enter bids based on the sex, age and other characteristics of the ad viewer. Even though Yahoo could do the same, it says that for now such an approach is not helpful to advertisers.

"The system is built to handle many variables," said Tim Cadogan, the vice president who runs the business side of Yahoo's Web search operation. "We don't want to go overboard" and confuse customers with too many choices.

Yahoo says the main distinction from Google will be in providing information about how a given ad is displayed. Google is often criticized by advertisers as a black box: they do not really know how a given bid will affect the placement of their ads. Yahoo isn't going to tell advertisers either — as its computers will keep experimenting to get the highest ad revenue.

But as advertisers enter each bid, they will see an estimate of how many clicks they will receive each day. More important, a graph will show how many more clicks they can expect for each increased bid.

"One of the primary complaints we get is users can't explain to their bosses what they could get for spending the next $1,000," said Steve Mitgang, the Yahoo senior vice president who oversaw the development of Project Panama. "Now they can take this to their bosses to justify spending more."
http://www.nytimes.com/2006/05/08/te...y/08yahoo.html





Music Swapping The Old-Fashioned Way
Hiawatha Bray

It may be a crime to swap digital music over the Internet, but there is no law against doing it through the Postal Service. That is the theory behind La La Media, a start-up company that encourages music lovers to trade tunes by mail.

"People just really love La La because it helps them discover so much music," said Bill Nguyen, founder of the company, which is based in Hillsborough, California.

The lala.com Web site charges its members a small fee to barter actual music disks among themselves.

Members publish "have" lists of the music CDs they own. Because so many music lovers copy their CDs to their computers, lala.com provides software that can generate a list of albums on a computer's hard drive.

In addition, users can log into the La La Web site and type in the names of the albums in their collections. Users also create "want" lists of CDs they would like to own. La La members can then search each other's lists. Members also get postage-paid mailing envelopes for shipping CDs.

When a member sees a desired disk, he puts in a request for it. If he or she is willing, the owner of the disk addresses it to the other member and mails it. The recipient pays La La $1, plus 49 cents for postage. There is no annual membership fee. Lala.com gives each member a credit for every disk sent to another member. Members can save credits for later use and use them to trade with any other La La member. Lala.com will not open to the general public until summer.

The music industry has not taken a stand on the legality of Lala.com. But Jim Gibson, director of the Intellectual Property Institute at the University of Richmond Law School, said Lala.com was on the right side of the law.

"It seems to be perfectly legal," Gibson said, for the same reason that retailers can buy and sell used books and CDs. "If you are the owner of a particular physical copy of a CD or a book or anything that's copyrighted, you have the right to dispose of that CD or book any way you wish."

Of course, a La La member could swap away his old CDs while keeping digital copies on his hard drive or portable music player - and that probably would be a violation of copyright law. La La cannot prevent people from doing this, but in a message on the Web site, Nguyen urges customers to delete their digital copies of albums they have traded away. "I ask you to do your part by doing the right thing: remove songs from your iPod or PC if you've agreed to send the CD to another member," he writes.
http://www.iht.com/articles/2006/05/...iness/swap.php





New 'Mission' Opens Weaker Than Expected
Sharon Waxman

Paramount Pictures and its leading star, Tom Cruise, failed to live up to expectations this weekend when "Mission: Impossible III" opened to weak numbers at the domestic box office despite a barrage of public appearances by Mr. Cruise to promote the film.

The poor opening followed nearly a year of public mocking of Mr. Cruise, Hollywood's most reliable star and the centerpiece of Paramount's biggest franchise, across the pop culture landscape — by Internet bloggers and late-night comedians and constantly on tabloid covers — after his public, over-the-top wooing of the actress Katie Holmes and his outspoken remarks against psychiatry and antidepressant medications last year.

Opening in 4,054 theaters, "Mission: Impossible III" had estimated ticket sales of $48 million for the weekend, according to Exhibitor Relations, almost $10 million less than the second "Mission: Impossible" movie in 2000, which opened in 385 fewer theaters and at lower ticket prices. Based on market research, the film had been expected to reach about $65 million at the box office.

Many in Hollywood had been watching expectantly to see if the negative publicity surrounding Mr. Cruise would have an effect at the box office, and this weekend — as "Mission: Impossible III" kicked off the film industry's peak summer moviegoing period — it appeared as if it had.

Paramount reported that "Mission: Impossible III" took in $118 million worldwide in 55 countries, doing well in Asia, Latin America and Britain and poorly in Germany, Austria and Switzerland, where there is public opposition to Mr. Cruise's championing of his religion, Scientology.

But Paramount executives said that Mr. Cruise's public image did not hurt the film. "I don't believe that is a factor in how the movie opened," said Rob Moore, Paramount's president for worldwide marketing, distribution and operations. He noted that the opening domestic figure was close to that of "Mr. and Mrs. Smith" last summer, which starred Angelina Jolie and Brad Pitt, and said the "Mission" franchise was struggling against the fact that it had been six years since the previous installment.

Others disagreed, noting that Mr. Cruise personally spearheaded the marketing campaign. He visited four countries in rapid succession ahead of the opening — going to Rome, Paris, London and Mexico City — and on Friday attended four different premieres in Manhattan alone, traveling by helicopter, fire truck, subway and boat in a promotional blitz across the city.

"I can't fault the marketing campaign; I can't fault the trailers," said Paul Dergarabedian, president of Exhibitor Relations, which tracks the box office, adding that the film, directed by J. J. Abrams, received strong reviews. "The only X factor here is the Tom Cruise factor."

The derision of Mr. Cruise began last spring when he embarked on his relationship with Ms. Holmes just as both actors were preparing to release big-budget movies, "War of the Worlds" for Mr. Cruise and "Batman Begins" for Ms. Holmes. The news media and fans expressed skepticism at the public nature of the romance, which intensified even as the formerly private Mr. Cruise increasingly involved Scientology in his business affairs.

Since then, Mr. Cruise has evolved into a kind of cultural punch line. In "Scary Movie 4," which is still in theaters, one scene is a parody of Mr. Cruise's couch-jumping appearance on "The Oprah Winfrey Show" last May.

Several reviews of "Mission: Impossible 3" pointed out that Mr. Cruise's public persona had become a distraction when watching him on the big screen. "It's impossible to watch 'M:I-3' without asking: Do we still, you know, like Tom Cruise?" the critic Owen Gleiberman wrote in Entertainment Weekly, while Manohla Dargis wrote in The New York Times: "It would be a stretch to say that Tom Cruise needs a hit. What this guy needs is an intervention."

In addition to being the kickoff for the summer movie season, "Mission: Impossible III" was the first major release that had been given a green light by Paramount under Brad Grey, who took over as chairman in early 2005. Mr. Grey caused a stir last year when the studio threatened to pull the plug on the movie just ahead of production unless the budget was cut and Mr. Cruise — who is also a producer of the film — cut his fee.

As a result of that stand, the budget was trimmed to $165 million from about $200 million, and Mr. Cruise agreed to take about 25 percent of the movie's gross revenue, several percentage points less than his original deal, according to a senior Paramount executive.

Paramount executives said that exit polls this weekend showed the film's audience to be mainly over 25, adding that they hoped strong word-of-mouth would help drive a younger audience to the film as the summer continued. But market research ahead of the movie's release also showed that Mr. Cruise had lost ground among an important part of his fan base, female moviegoers.

In Hollywood many were left this weekend pondering the future of star power and looking ahead to the next test case, "The Da Vinci Code," starring Tom Hanks, on May 19. As Mr. Dergarabedian put it, "It shows you the importance of the star and their public image."
http://www.nytimes.com/2006/05/08/movies/08impo.html





Hauling In The Hollywood Hackers

How undercover FBI agents nab the bootleggers who threaten the movie biz

Under the predawn sky on June 29, 2005, federal agents armed with arrest warrants and Glock handguns banged on the door of the house at 38244 Hastings St. in Fremont, Calif. "FBI!" they shouted. Their target was a heavyset 24-year-old biker named Chirayu Patel, alleged to be a leader of the "Boozers" and a handful of other underground gangs that illegally copy and load onto the Internet blockbuster movies such as Star Wars: Episode III -- Revenge of the Sith and Batman Begins. Patel's dad answered the 6 a.m. wake-up call, FBI officials say. Ten agents swept the house, guns drawn. Patel was found in his bedroom, where he was cuffed and arrested.

In nearby San Francisco, FBI special agent Julia B. Jolie was pacing through the "op center," a 30-foot-by-30-foot room with photos and handwritten rap sheets pinned to the walls for Patel and 25 other digital pirates who were being arrested that morning. As head of the sting, dubbed Operation Copycat, Jolie had just given the "go" order to agents in the field. Video pirates, who are often clean-shaven and hold professional jobs, certainly don't look dangerous. But the manpower committed to the case demonstrates how seriously the feds take them. "Are these big bad mafia types? No," Jolie says later. "But this is a huge criminal activity."

Welcome to Hollywood's Napster moment. If movie studios hope to dodge the fate of the music industry, whose growth was cut short in part by illegal downloading, they need to come up with a solution to illegal copying. Part of that is to develop a model for legal movie downloads over the Net. Hollywood has taken baby steps in that direction. Studios have two Web sites, Movielink.com and CinemaNow.com, that offer movies via the Net. But downloads are slow, and the movies, which cost a few dollars to rent and $20 to own, can't be burned to a DVD. So studios also are prodding the feds to put some fear into pirates. The goal: stem the $6.1 billion that the industry estimates was lost to illegal copying in 2005. (Worldwide box-office sales were $23.5 billion.) Half of pirated material is in DVDs sold on street corners, but $3 billion comes from pirates stealing digital movies and posting them online. And stolen movies are also sent via the Net to facilities where the illicit DVDs are made. So, "the Internet is very much involved in all forms of piracy even if you're talking about street piracy," says Dan Glickman, CEO of the Motion Picture Association of America (MPAA).

That's why federal prosecutors and undercover sleuths have labored for the past two years to put some muscle behind the warning that's so familiar to home movie viewers ("Federal law provides severe civil and criminal penalties for the unauthorized reproduction, distribution or exhibition of copyrighted motion pictures..."). The California sting is part of a global investigation that is methodically targeting piracy rings from Chicago to Charlotte, N.C., to China. To date, the California investigation has won 24 convictions. Five more arraignments are expected in May, according to Assistant U.S. Attorney Mark Krotoski, who is prosecuting the case. Sentencing begins late this summer.

The picture that emerges from these investigations is of loosely knit cybergangs, driven more by competitive zeal than profit motive. A skilled "cammer," who records movies in a theater and sends them off for uploading to the Net, can make up to $2,000 per film. But most pirates, such as Patel, are in it for the thrill of proving their coding skills.

Think of piracy as a pyramid. The power sits at the top, where guys like Patel enable others to get content. By the time a movie shows up on peer-to-peer Internet networks, it can be downloaded, often for free, by anyone capable of typing "Mission: Impossible" into a search engine. That's why the feds zero in on the most sophisticated pirates and mostly ignore end users. "Targeting the top tier is a key way to catch these industry parasites," says intellectual property attorney Alan Fisch of Kaye Scholer LLP in Washington.

Quick Study
Video pirates aren't easily duped. It takes the FBI months to infiltrate groups. But they do have one vulnerability: All gangs need a place to store the massive amounts of media content they gather. (In the Copycat case, stolen movies, games, and other software grew to 27 terabytes of data, more than three times the contents of a typical video store.) That creates an opening for law enforcement.

The aspiring thief has to set up shop inside a powerful computer server, often inside a big company. Access might come from a disgruntled employee with authority to hand out passwords for remote or on-site access to the server. Once announced, the site operator becomes a magnet for specialists, granting access to "suppliers," who provide movies and computer parts, and "rippers," who crack copyright codes. Together, they make up what pirates call a "warez" (as in "softwares") group.

The Silicon Valley sting centered around a server that was leased by agents from an Internet service provider in the Bay Area. Agent Jolie's real coup, though, was in recruiting a thirtysomething Oakland agent (initials A.J.) who used to work in the computer industry. He proved to be a quick study. Shortly after interviewing with Jolie, A.J. discovered that warez groups used Linux server coding, which he learned in one night. "He can teach himself anything," Jolie says.

To slip into the pirate scene, A.J. became "Griffen" and started popping up in chat rooms. Several months later he hooked up with Patel and another bandit, David Fish. Once alerted to the available server, warez members swarmed in. One set up the computer for piracy, but group members judged the job so sloppy that they sought out Fish, whose scripting skills were legendary. Fish, 24, lived 3,000 miles away in Watertown, Conn. His day job was with a computer network company. In late March, 2004, court documents show, he began programming the server so his pals could send movies straight from their e-mail accounts. He set up a competition, pitting members against one another to see who could upload the fastest.

By spring of 2004, Fish and Griffen were busily loading movies -- 68 in all, including Hotel Rwanda, Blade: Trinity, and Monster-in-Law, plus hot new PlayStation 2 and Xbox video games. For example, in July, Fish -- going by the nickname x000x -- told Griffen to put a PlayStation 2 game into the server's DVD player, and explained what was necessary to encode it. A July 2 chat gave Griffen a sense of what was to come:

x000x: interested in ps2 games?
griffen: u bet, funny, just decided to get a ps2, played socom2 and loved it!

x000x: cool, well ur gonna be hooked up lol.

The chatter, sounding like two pre-teens trading instant messages, belied Fish's sophisticated skills. In November, Fish told A.J. to install a disk drive into the server and copy a programming file to it. That updated the flash memory, allowing Fish to read Xbox games remotely and copy them to the main drive.

griffen: ok, it's all ready...let her rip.

x000x: burnin. hopefully this works.
griffen: s--t, u the man, works great!

Meantime, Griffen was building trust with Patel, the Fremont pirate. Patel liked to show off. In late April, 2004, according to court documents, he boasted to Griffen about a TV news report on piracy that included a shot from a film he was stealing.

Of course, all the technological prowess is worthless without a steady supply of movies. Most come from inside the industry, prosecutors say. Sources include studio projectionists and workers at disc-stamping plants, where an estimated 15% of DVDs are discarded as defective. Even movie critics who get early copies sometimes pass them along.

Not every movie can be lifted before its release. That's where people like Curtis Salisbury come in. Salisbury, 20, worked in the box office at the Des Peres Cinema 14 in St. Louis. Last June he agreed to record The Perfect Man and load it onto the server for a warez group, court documents say. One night after the theater had closed, he used camcorder equipment to record copies of Bewitched and The Perfect Man from the projection booth.

With the help of friends, documents say, Salisbury connected his gear to the projector sound board to record. Later, he used his home computer to sync the audio. Salisbury sent a copy of The Perfect Man off to Griffen, who removed copyright watermarks (tiny, randomly placed security dots that identify the print). But first Griffen made a copy with the marks and shot it off to the MPAA. Technicolor, the film-print company, was able to determine that the copies came from the Des Peres. A month later, on July 27, the FBI showed up at Salisbury's door.

Today, Salisbury, Patel, and Fish have all been convicted on counts of criminal copyright infringement after pleading guilty. Salisbury, expected to be sentenced in June, is facing a maximum of eight years in prison but could get off with probation. Patel and Fish await sentencing in August. Patel faces up to eight years, Fish up to 23 years. Each could be ordered to pay from $4,000 to $1 million in fines. (Calls to attorneys for the three were not returned.)

Jolie claims the busts slowed pirate activity. But she recognizes that victory is elusive. "You have to liken it to a gang war," Jolie says. "We try to make an effective dent and glean more intelligence for the next takedown."


Most recent comments

Nickname: Mojo
Review: Great job FBI! Rape a child and get 10 years. Steal a movie and it's 23. If only children were as rich as the MPAA.
Date reviewed: May 9, 2006 1:34 PM

Nickname: barry
Review: This is so lame. Ohhhh movie pirates! Be careful trying to hunt down these bad boys.
Date reviewed: May 9, 2006 1:31 PM

Nickname: DavdJemeyson
Review: No one has caught the real DVD mob yet, www.RealPiracy.com
Date reviewed: May 9, 2006 1:26 PM

Nickname: Annon
Review: So nice to see our tax dollars at work for the Hollywood Movie Cartel.
Date reviewed: May 9, 2006 1:18 PM

Nickname: aerosquid
Review: What nonsense. The MPAA never lost $6.1 billion to piracy. Not everyone who downloads a movie would have gone and seen it or rented/bought it. You can't stop pirates anymore than you can win the war on drugs. All you can do is put little people in jail. Yay America.
Date reviewed: May 9, 2006 1:08 PM

Nickname: MasterRanger
Review: More FBI funds wasted on victimless crimes. Way to go.
Date reviewed: May 9, 2006 1:01 PM

Nickname: steve
Review: "If movie studios hope to dodge the fate of the music industry, whose growth was cut short in part by illegal downloading..." Most studies say the opposite. Downloading has actually helped the music industry. Why the music industry has faltered is that the product released by mainstream acts mostly sucks. It's all forumula based and written more by marketing teams than artists. I think growth in indie labels--because of a quality product, better pricing, no Sony rootkit scams etc.--is where the major industry profits have gone. As for movies, when's the last time there's been a good original movie? They're either remakes or sequels or movies where 95% of the budget is special effects, and the remaining 5% is script, editing, photography etc.
Date reviewed: May 9, 2006 12:47 PM

Nickname: Digitalbrian
Review: Well I said it before and I'll say it again, lower the prices on DVD and movie tickets. The amount charged right now is ludicrous. Personally I can afford it but the teens and students that use pirated goods can't.
Date reviewed: May 9, 2006 12:15 PM

Nickname: Jay
Review: Nice article. I am of the utmost belief that "stealing" movies while they are at cinemas is destroying the industry. However, I do have a few questions. 1) "You have to liken it to a gang war." How can you compare guns, drugs, and underground physical activies such as prostitution to uploading pre-released movies? And doesn't Jolie contradict this by saying that movie pirates are not big bad mafia types? 2) Is this really just action by the US government to please major corporations? 3)15% of DVDs discarded as defective? Surely fixing this problem would eventually greatly increase revenues. With MPAA saying that DVD prices are very much justified, surely reducing this 15% would greatly increase their profits from DVDs.
Date reviewed: May 9, 2006 12:15 PM

Nickname: Boone
Review: Nice to see those tax dollars at work--at work for a few movie industry execs. Stop wasting money and go catch real crooks. Who cares about the movie indutry.
Date reviewed: May 9, 2006 12:03 PM
http://www.businessweek.com/magazine...gn_id=bier_tcm





Hollywood Detective Accused of Ordering 'Hit' on Witness
David M. Halbfinger and Allison Hope Weiner

Anthony Pellicano, the jailed private detective charged with wiretapping and conspiracy in Hollywood's biggest scandal in decades, conspired recently with organized-crime figures to try to assassinate a key witness against him, federal prosecutors say.

He has also made threatening statements about F.B.I. agents and the lead prosecutor in the case, federal evidence shows.

In a court filing circulated late on Monday, prosecutors said Mr. Pellicano had tried to put "a 'hit' " on Alexander Proctor, a convicted drug dealer who first implicated him in the threats against a journalist that led to the federal investigation nearly four years ago.

In 2002 Mr. Proctor was recorded telling an F.B.I. informant that Mr. Pellicano had hired him to threaten a Los Angeles Times reporter, Anita Busch. A search of Mr. Pellicano's offices that November revealed what prosecutors say was a mountain of evidence of illegal wiretapping.

During a jailhouse visit in January with his girlfriend, Sandra Will Carradine, Mr. Pellicano asked her to find a contact at the federal prison in Greenville, Ill., where Mr. Proctor was incarcerated, prosecutors said at a bail hearing in February.

"If something happens to Proctor, he couldn't testify against me," Mr. Pellicano told Ms. Carradine, prosecutors asserted in court.

In their Monday filing, prosecutors said they had now corroborated that Mr. Pellicano "recently conspired with known organized crime connections in Chicago to place a 'hit' on Alex Proctor."

Mr. Pellicano's lawyer, Steven F. Gruel, said he first learned of what he called the government's "phantom claim" that Mr. Pellicano had ordered the killing of Mr. Proctor in a phone call from prosecutors on Friday. "It's one thing to say something, it's another to charge it, and third, it's another to prove it," he said.

Mr. Proctor has since been transferred to a medium-security federal prison in Jesup, Ga.

Summaries written by F.B.I. agents of their interviews with Ms. Carradine describe her accounts of a series of threats against government investigators. According to those summaries, Ms. Carradine heard Mr. Pellicano speak of his ties to organized-crime figures in Chicago. They also say she heard him claim to have murdered people in Chicago before moving to Los Angeles, and make threatening statements about the law-enforcement officials pursuing him.

During a jailhouse conversation in May 2005, Mr. Pellicano railed against the F.B.I. agents who were searching a storage unit in which he had locked away a computer and a cache of disks, Ms. Carradine later told Special Agent Stanley E. Ornellas. In a summary Mr. Ornellas wrote: "Pellicano said if he could, he would douse 'them' with gasoline and set them on fire and after they were burning, he would pour more gasoline on them."

Mr. Pellicano also threatened Daniel A. Saunders, the assistant United States attorney in charge of the case, during at least two of Ms. Carradine's jailhouse visits, she told Mr. Ornellas. She said that on Oct. 3 Mr. Pellicano had described seeing "images of being in a courtroom and lunging across a table towards Saunders."

And Ms. Carradine told Mr. Ornellas that on Oct. 6 Mr. Pellicano had vowed one day to "take Saunders's life like he took mine," according to Mr. Ornellas's notes. Mr. Saunders declined to comment.

In the same F.B.I. interview, Ms. Carradine expressed concern for her safety once Mr. Pellicano learned of her cooperation, according to the summary. Her lawyer, Peter L. Knecht, declined to comment on Tuesday. The Monday court filing describing the alleged threat against Mr. Proctor, which was first reported by The Los Angeles Times, was the government's response to a demand by Mr. Gruel for prosecutors to turn over all evidence, including search warrants and witness statements, involving Mr. Proctor or Steven Seagal, the movie actor Ms. Busch was researching an article about when she was threatened in 2002. (Mr. Seagal has not been accused of any wrongdoing.)

Mr. Gruel argued that the F.B.I. had used the "alleged Proctor-Pellicano-Seagal relationship" to get a warrant to search Mr. Pellicano's office.

But in their response, Mr. Saunders and another prosecutor, Kevin M. Lally, said evidence about Mr. Proctor and Mr. Seagal was irrelevant to the wiretapping case, though Mr. Pellicano faces separate charges of threatening Ms. Busch in state court, not in the federal case.

Instead, the two prosecutors accused Mr. Pellicano of subterfuge: "The government believes that defendant is using this motion to try to find out what, if anything, Proctor has said about him, not because it has any relevance to this case (it does not), but so defendant can determine whether Proctor is cooperating against him in connection with the state case."

Ms. Carradine pleaded guilty to perjury in January and has been cooperating with the government since July, which has given rise to another dispute between prosecutors and Mr. Pellicano's lawyer. Mr. Gruel has argued that Ms. Carradine, who continued to visit Mr. Pellicano frequently and acted at times as a go-between for him with Mr. Gruel, in effect became a government operative, violating Mr. Pellicano's lawyer-client privilege.

In their Monday filing, prosecutors insisted they had not received any information from Ms. Carradine about Mr. Gruel's communications with Mr. Pellicano. But they said Mr. Pellicano's conversations with Ms. Carradine were fair game. "There is simply no 'girlfriend privilege' recognized under the law," they wrote.

Asked to comment on Ms. Carradine's account of Mr. Pellicano's threatening statements about law-enforcement officials, Mr. Gruel declined. "I'm reluctant to talk about something that is under the scrutiny of the government for potential leaks," he said.

The summaries of F.B.I. interviews, including those with Ms. Carradine, some of which have been reviewed by The New York Times and cited in articles about the Pellicano investigation, are themselves the subject of an offshoot federal investigation.

The F.B.I. summaries cited by The Times were included in a trove of evidence turned over to defense lawyers by prosecutors in early April, subject to a protective order, prosecutors have said in court filings. After The Times began publishing articles based on the summaries, federal prosecutors said they would hold off turning over some additional evidence to defense lawyers, and they also began an investigation into how the summaries became public. That inquiry is being led by the United States Attorney's Office in San Diego.
http://www.nytimes.com/2006/05/10/arts/10pell.html





Q. What Could A Boarding Pass Tell An Identity Fraudster About You? A. Way Too Much

A simple airline stub, picked out of a bin near Heathrow, led Steve Boggan to investigate a shocking breach of security
Steve Boggan

This is the story of a piece of paper no bigger than a credit card, thrown away in a dustbin on the Heathrow Express to Paddington station. It was nestling among chewing gum wrappers and baggage tags, cast off by some weary traveller, when I first laid eyes on it just over a month ago.

The traveller's name was Mark Broer. I know this because the paper - actually a flimsy piece of card - was a discarded British Airways boarding-pass stub, the small section of the pass displaying your name and seat number. The stub you probably throw away as soon as you leave your flight.

It said Broer had flown from Brussels to London on March 15 at 7.10am on BA flight 389 in seat 03C. It also told me he was a "Gold" standard passenger and gave me his frequent-flyer number. I picked up the stub, mindful of a conversation I had had with a computer security expert two months earlier, and put it in my pocket.

If the expert was right, this stub would enable me to access Broer's personal information, including his passport number, date of birth and nationality. It would provide the building blocks for stealing his identity, ruining his future travel plans - and even allow me to fake his passport.

It would also serve as the perfect tool for demonstrating the chaotic collection, storage and security of personal information gathered as a result of America's near-fanatical desire to collect data on travellers flying to the US - and raise serious questions about the sort of problems we can expect when ID cards are introduced in 2008.

To understand why the piece of paper I found on the Heathrow Express is important, it is necessary to go back not, as you might expect, to 9/11, but to 1996 and the crash of TWA Flight 800 over Long Island Sound, 12 minutes out of New York, with the loss of 230 lives. Initially, crash investigators suspected a terrorist bomb might have brought down the aircraft. This was later ruled out, but already the Clinton administration had decided it was time to devise a security system that would weed out potential terrorists before they boarded a flight. This was called Capps, the Computer Assisted Passenger Pre-screening System.

It was a prosaic, relatively unambitious idea at first. For example, in highly simplistic terms, if someone bought a one-way ticket, paid in cash and checked in no baggage, they would be flagged up as an individual who had no intention of arriving or of going home. A bomber, perhaps.

After 9/11, the ambitions for such screening grew exponentially and the newly founded Department of Homeland Security began inviting computer companies to develop intelligent systems that could "mine" data on individuals, whizzing round state, private and public databases to establish what kind of person was buying the ticket.

In 2003, one of the pioneers of the system, speaking anonymously, told me that the project, by now called Capps II, was being designed to designate travellers as green, amber or red risks. Green would be an individual with no criminal record - a US citizen, perhaps, who had a steady job and a settled home, was a frequent flyer and so on. Amber would be someone who had not provided enough information to confirm all of this and who might be stopped at US Immigration and asked to provide clearer proof of ID. Red would be someone who might be linked to an ever-growing list of suspected terrorists - or someone whose name matched such a suspect.

"If you are an American who has volunteered lots of details proving that you are who you say you are, that you have a stable home, live in a community, aren't a criminal, [Capps II] will flag you up as green and you will be automatically allowed on to your flight," the pioneer told me. "The problem is that if the system doesn't have a lot of information on you, or you have ordered a halal meal, or have a name similar to a known terrorist, or even if you are a foreigner, you'll most likely be flagged amber and held back to be asked for further details. If you are European and the US government is short of information on you - or, as is likely, has incorrect information on you - you can reckon on delay after delay unless you agree to let them delve into your private details.

"That is inconvenient enough but, as we tested the system, it became clear that information was going to be used to build a complete picture of you from lots of private databases - your credit record, your travel history, your criminal record, whether you had the remotest dubious links with anyone at your college who became a terrorist. I began to feel more and more uncomfortable about it."

Eventually, he quit the programme.

All of this was on my mind as I sat down with my computer expert, Adam Laurie, one of the founders of a company called the Bunker Secure Hosting, to examine Broer's boarding-pass stub. Laurie is known in cyber-circles as something of a white knight, a computer wizard who not only advises companies on how to make their systems secure, but also cares about civil rights and privacy. He and his brother Ben are renowned among web designers as the men who developed Apache SSL - the software that makes most of the world's web pages secure - and then gave it away for free.

We logged on to the BA website, bought a ticket in Broer's name and then, using the frequent flyer number on his boarding pass stub, without typing in a password, were given full access to all his personal details - including his passport number, the date it expired, his nationality (he is Dutch, living in the UK) and his date of birth. The system even allowed us to change the information.

Using this information and surfing publicly available databases, we were able - within 15 minutes - to find out where Broer lived, who lived there with him, where he worked, which universities he had attended and even how much his house was worth when he bought it two years ago. (This was particularly easy given his unusual name, but it would have been possible even if his name had been John Smith. We now had his date of birth and passport number, so we would have known exactly which John Smith.)

Laurie was anything but smug.

"This is terrible," he said. "It just shows what happens when governments begin demanding more and more of our personal information and then entrust it to companies simply not geared up for collecting or securing it as it gets shared around more and more people. It doesn't enhance our security; it undermines it."

Just over $100m had been spent on Capps II before it was scrapped in July 2004. Campaigners in the US had objected to it on grounds of privacy, and airlines such as JetBlue and American faced boycotts when it emerged that they were involved in trials - handing over passenger information - with the Department of Homeland Security's Transportation Security Administration. Even worse, JetBlue admitted it had given the private records of 5 million passengers to a commercial company for analysis - and some of this was posted on the internet.

But the problems did not end with the demise of Capps II. Earlier that month, after 18 months of acrimonious negotiation, the EU caved in to American demands that European airlines, too, should hand over passenger information to the United States Bureau of Customs and Border Protection, BCBP, before their aircraft would be allowed to land on US soil. The BCBP wanted up to 60 pieces of information routinely gathered by booking agencies and stored as a Passenger Name Record, PNR. This included not only your flight details, name, address and so on, but also your travel itinerary, where you were staying, with whom you travelled, whether you booked a hire car in the US, whether you booked a smoking room in your hotel, even if you ordered a halal or kosher meal. And the US authorities wanted to keep it all for 50 years.

At first, the European Commission argued that surrendering such information would be in breach of European data protection law. Eventually, however, in the face of huge fines for airlines and cancelled landing slots, it agreed that 34 items from PNRs could be handed over and kept by the US for three and a half years.

Capps II was superseded by a new system called Secure Flight in August 2004. Later, in October last year, the BCBP demanded that airlines travelling to, or through, the US should forward "advance passenger information", including passport number and date of birth, before passengers would be allowed to travel. It called this the advance passenger information system, or APIS. This is the information that Laurie and I had accessed through the BA website.

"The problem here is that a commercial organisation is being given the task of collecting data on behalf of a foreign government, for which it gets no financial reward, and which offers no business benefit in return," says Laurie. "Naturally, in such a case, they will seek to minimise their costs, which they do by handing the problem off to the passengers themselves. This has the neat side-effect of also handing off liability for data errors.

"You can imagine the case where a businessman's trip gets delayed because his passport details were incorrectly entered and he was mistaken for a terrorist. Since BA didn't enter the data - frequent flyers are asked to do it themselves - they can't be held responsible and can't be sued for his lost business."

By the time I found the ticket stub and went to Laurie, he had already reported his suspicions about a potential security lapse to BA (on January 20) by email. He received no response, so followed up with a telephone call asking for the airline's security officer. He was told there wasn't one, so he explained the lapse to an employee. Nothing was done and he still has not been contacted.

Three months ago, after further objections in the US, but before our investigation, Secure Flight was suspended after costing the US taxpayer $144m. At the time, Kip Hawley, transportation security administrator, said: "While the Secure Flight regulation is being developed, this is the time to ensure that the Secure Flight security, operational and privacy foundation is solid."

The TSA said it would continue its passenger pre-screening programme in yet another guise after it had been audited and added that it had plans to introduce more security, privacy and redress for errors - confirming critics' suspicions that no such systems were yet in place. To the consternation of privacy activists in Europe, the TSA also spelled out plans for its desire for various US government departments to share information, including yours and mine.

Dr Gus Hosein, a visiting fellow specialising in privacy and terrorism at the London School of Economics, is concerned about where the whole project will go next.

"They want to extend the advance passenger information system [APIS] to include data on where passengers are going and where they are staying because of concerns over plagues," he says. "For example, if bird flu breaks out, they want to know where all the foreign travellers are. The airlines hate this. It is a security nightmare. Soon the US will demand biometric information [fingerprints, retina scans etc] and they will share that around.

"But what the BA lapse shows is that companies cannot be trusted to gather this information without it getting out to criminals who would abuse it. The potential for identity theft is huge, but the number of agencies among which it will be shared is just growing and growing."

And that is where concern comes in over the UK's proposed ID cards, which may one day be needed to travel to the US. According to the Home Office, the identity cards bill currently going through Parliament allows for up to 40 pieces of personal information to be held on the proposed ID card, with digital biometric details of all of your fingerprints, both your irises and your face, all of which can be transmitted to electronic readers. The cards will contain a microchip the size of a grain of sand linked to a tiny embedded antenna that transmits all the information when contacted by an electronic reader.

This readable system, known as Radio Frequency Identification, or RFID, has recently been installed in new British passports. The Home Office says the information can be transmitted across a distance of only a couple of centimetres because the chips have no power of their own - they simply bounce back a response to a weak signal sent from passport readers at immigration points.

However, the suspicion is that the distance over which the signal can be read relates only to the weakness of the signal sent out by the readers. What if the readers sent out much stronger signals? Potentially, then, criminals with powerful readers could suck out your information as you passed by. The Government denies that this scenario is viable, but, in January, Dutch security specialists Riscure successfully read and de-encrypted information from its country's new biometric passports from a distance of about 30ft in just two hours.

"The Home Office says British passport information is encrypted, but it's a pretty basic form of encryption," says Hosein. "Everyone expects the ID cards to be equally insecure. If the government insists they won't be cracked, read or copied, they're kidding themselves and us."

BA has now closed its security loophole after being contacted by the Guardian in March, but that particular lapse is beside the point. Because of the pressure being applied to airlines by the US, breaches will happen again elsewhere as our personal data whizzes around the globe, often without our knowledge or consent.

Meanwhile, accountability remains lamentable. Several calls to the US Transportation Security Administration were not returned.

Perhaps the last word should go to Mark Broer, the man whose boarding pass stub started off this virtual paper chase. He is aged 41 and is a successful executive with a pharmaceutical recruitment company. When I told him what we had done with his boarding pass stub, he was appalled.

"I travel regularly and, because I go to the US, I submitted my personal information and passport number - it is required if you are a frequent flyer and want to check yourself in," he says. "Experienced travellers today know that they have to give up information for ease of travel and to fight terrorism. It is an exchange of information in return for convenience. But as far as I'm concerned, having that information leaked out to people who could steal my identity wasn't part of the deal."
http://www.guardian.co.uk/idcards/st...766266,00.html





OpenDocument Foundation to MA: We Have a Plugin
Pamela Jones

I have just heard from the OpenDocument Foundation's Gary Edwards, with news about a plugin the Foundation is offering the Commonwealth of Massachusetts in response to the Commonwealth's request for information on any plugin that could "allow Microsoft Office to easily open, render, and save to ODF files, and also allow translation of documents between Microsoft's binary (.doc, .xls, .ppt) or XML formats and ODF."

The Foundation says it has such a plugin, it has finished testing it, and it is good to go.

Edwards tells me the following:
The OpenDocument Foundation has notified the Massachusetts ITD that we have completed testing on an ODF Plugin for all versions of MS Office dating back to MS Office 97. The ODF Plugin installs on the file menu as a natural and transparent part of the open, save, and save as sequences. As far as end users and other application add-ons are concerned, ODF plugin renders ODF documents as if it were native to MS Office.

The testing has been extensive and thorough. As far as we can tell there isn't a problem, even with Accessibility add ons, which as you know is a major concern for Massachusetts.

Now that we've had a chance to fully review their RFI document, we expect to submit a formal line by line reply, offering the ODF Plugin for immediate testing, review and implementation.

Some people might wonder why the Foundation would be interested in "extending" the life and vested value of these Win32 bound desktops?

Our reply is that this isn't about "Windows" or MS Office. It's about people, business units, existing workflows and business processes, and vested legacy information systems begging to be connected, coordinated, and re engineered to reach new levels of productivity and service. It's also about the extraordinary value of ODF and it's importance to the next generation of collaborative computing. And it's about ODF rising to meet the needs of key information domains as they are represented by desktop productivity environments; publishing, content and archive management systems; SOA efforts; and the Open Internet.

So, to Microsoft: never mind. You don't need to lift a finger.
http://www.groklaw.net/article.php?s...60504015438308





Captain America – Fugitive

Marvel's new series has your favourite superheroes fighting George Bush and the Patriot Act
Guy Dixon

Captain America is about to battle his most fearsome foe yet: The government of the United States.

Today, Marvel Comics is releasing the first in its miniseries Civil War, which can only be described as a gutsy comic-book series focusing on the whole debate over homeland security and tighter government controls in the name of public safety.

The seven-issue series once again puts superheroes right back in the thick of real-world news, just as DC Comics has Batman battling al-Qaeda in a soon-to-appear comic and Marvel's X-Men continue to explore themes of public intolerance and discrimination.

It also recalls the plotline during the Watergate years when Captain America's alterego, disillusioned by White House politics, stopped donning the patriotic costume.

But with Civil War, hero is pitted against hero in the choice of whether or not to side with the government, as issues ranging from a Guantanamo-like prison camp for superheroes, embedded reporters and the power of media all play in the mix.

The Fantastic Four's elastic Mr. Fantastic has already joined Iron Man to support Washington in earlier editions of Marvel comics leading into the Civil War series. Doctor Strange isn't taking Washington's side.

But what about Spider-Man, that hero of many counterculture kids? Will he side with the Man? Or will the rest of the Fantastic Four? (There's even a rumour that Marvel's Canadian hero Alpha Flight might get into the mix.)

Civil War starts with a clever premise. A number of incidents involving Marvel's rough-and-ready heroes has turned the good guys into targets of U.S. lawmakers: There is, for instance, one accident where a group of novice superheroes gets in over its head, leading to the death of a schoolyard full of children.

The politicians are concerned about public safety. So Congress passes a bill forcing all superheroes to register with the government as human weapons of mass destruction, and to work, in effect, for Washington. Superheroes who don't comply will themselves be branded fugitives.

Washington insider Tony Stark, aka Iron Man, argues that siding with Washington is a way for the heroes to work with lawmakers, not against them, in this moment of trouble. Others see it as a way to gain recognition from the authorities, at long last, or even a way to get government funding to help fight the bad guys.

But other heroes aren't having any of it. In one comic leading up to the series, Doctor Strange gets hopping mad when he first hears about the bill (albeit in his debonair, "master of the mystic arts" kind of way). And Captain America, who couldn't be more all-American if he tried with that costume of his, finds himself leading the fugitive heroes.

In the first issue of Civil War, he brilliantly folds an entire dissertation on security into one succinct dialogue bubble by saying: "Don't play politics with me, lady. Superheroes need to stay above that stuff or Washington starts telling us who the supervillains are."

But Marvel says it isn't trying to take one side or the other.

"We need to present both sides' arguments, both sides of the coin, as fairly and as accurately as possible, and really let the readers make their own decision," said editor-in-chief Joe Quesada. "Marvel readers come in all shapes and sizes, and we speak to so many different people, different demographics. It's unfair for us to make this our bully pulpit and sit there and say, 'This bad. That good.'."

The series is also far removed from the era when DC Comics' Superman, Batman and Wonder Woman were punching out the Nazis or Japanese during the Second World War.

In Civil War, there is no Iraq war, although George W. Bush is the president in the series. The story, though, focuses on the central issue of public security versus personal freedoms with two factions of superheroes battling among themselves on the question (with comic fanboys living vicariously through them).

But what does it say about us if Captain America and Iron Man start to occupy some readers' attention more than the latest real news?

"One of the best ways to broach these conversations and bring up this discussion is through entertainment and through characters that people are familiar with. And again, for us, it's communicating both sides of the argument," Quesada said.

In the end, one of the cleverest touches in Civil War may be a few panels, a momentary breather in the story, in which the giant figure of The Watcher stands silently in the corner of Doctor Strange's sanctum. As the Strange explains: "He only appears to record moments of great change and enormous upheaval. His presence now does not bode well."

Disturbingly, that could be how many of us feel, watching events unfold.
http://www.theglobeandmail.com/servl...rtainment/home





Boot Camp: Apple Bobs for Suckers
Jim Louderback

Don't get too excited about the whole Mac/Windows dual-boot thing. Although a wide range of starry-eyed experts—including some in our very own lab—have lauded Boot Camp (aka BC) in tones not heard since the days of OS/2, it's really nothing to get excited about. Here are my top reasons why—at least to real computer users—"Boot Chump" is a snore.

• Design: The more effete among us have embraced BC because now they can run all their favorite Windows apps on a saucy, sexy Mac. The underlying assertion embraced here is that Apple machines are just so much cooler than their PC counterparts. Hogwash. There are dozens of better-looking notebooks out there than those tired, industrial-looking iBooks and PowerBooks that dribble out of Infinite Loop. Want silver? Toshiba's razor-thin Portégé looks better and won't give you a hernia if you carry it around the corner. Acer's Italian-inspired lineup ranges from testosterone-pumping Ferrari red to svelte and sweet. Even Dell now has discovered red.

• Performance: Some idiot wrote recently that "Apple now makes the fastest Windows machines on the planet." What was I thinking? Now that the meds have worn off, let's take a closer look at how fast these BC machines really are. Sure, they run a Photoshop benchmark test as fast as or faster than Windows dedicated machines. But throw in anything needing fast graphics and you're SOL. The dual-core Mac mini uses shared memory for its anemic graphics, which will seriously eat into that default 512MB of RAM. Every time I see Boot Camp benchmark test scores, they come with caveats. Apple apologists give their favorite company more latitude than any other PC company on the planet—I just don't understand it. Substitute "Microsoft" or "Dell" for Apple in any of the recent reviews and a firestorm of bloggers would be criticizing the reviewer up and down the Web. Instead, the laurels just pile on higher and higher. But I digress. This brings me to the next reason you don't want Boot Camp….

• Expandability: Remember the bad old days of OS/2 and Windows NT, and MIPS- and Alpha-based computers? Fanatics tried to push these supposedly better systems on everyone, touting power, capability, and destiny. It was all bunk, and each died from neglect. Neglect from a vast array of add-on hardware vendors that just didn't have the time or inclination to write drivers for all those "other" platforms. Sure, a Mac that runs Windows looks good on paper. But how do you know that that expensive scanner, graphics card, or sound device will actually work on a BC system? To be fair, USB and FireWire devices that work in Windows ought to work under BC. But what about add-in cards? That legacy SCSI adapter that you just can't quit? Until we have an Intel-based Mac tower we have no clue what will work. But I predict that legacy hardware—and even some existing boards—will be difficult to run in both environments. Will the high-end video-digitizing Kona card work under Windows? What about M-Audio's multichannel audio input cards? I'll believe it when I see it. Got more faith? Go ahead, buy a dual-core Mac. And have fun upgrading it.—Continue reading...

• Reliability: I don't know about you, but when I buy a computer I want everything to work right. I have some confidence that peripherals and software will work on my PCs, because I either built them myself or bought them outright from a vendor who knows how to make Windows PCs. So what happens when that critical new part, new application, or new Web site fails to run? Who is going to help? Apple? Hardly. Last I checked, Boot Camp is unsupported. So you're out of luck. And even when it ends up in OS X, it will probably receive marginal support at best. Don't expect your garden-variety tech at the Mac store to help out, for instance.

• Flexibility: Speaking of building computers, if you like building your own computers, you are out of luck again. Apple's not interested in a DIY Mac, nor is it concerned with the case-mod culture of the PC. Oh, I guess that doesn't matter; lemming-like Apple fans aren't interested in actually doing anything different with their cookie-cutter computers that aspire to "Think Different" but, like that old Pete Seeger song about little boxes, "all look just the same." The really creative computer users are the case modders who build extravagant designs to house their systems. And that's just not possible if you aspire to run Windows and simultaneously "Think Different."

• Price: And that leads me to the biggest reason of all to ignore this whole Windows and Macintosh mash-up. Apple's not really known as the low-cost or value leader when it comes to computers. There's a premium to pay for "Think Different" that has nothing to do with performance or capability. After you've already been overcharged for a Mac, you need to spend another hundred dollars or so buying Windows, just for the privilege of tainting the Apple core with Microsoft's OS. You'll probably need more memory, too. Is it really worth all that extra money? From where I sit, no—but a fool and his money have always been quickly parted.

All of this leaves me with just one thing to say: Would you buy a Windows computer from this man [insert picture of Steve Jobs]? This is a guy who has been ripped off by Microsoft for 20 years: Do you think he's about to just up and join the enemy? I doubt it. "Boot Chump" is just a Trojan horse, designed to get Windows users (aka chumps) to sample Macintosh hardware. Once you've laid out a few kilobucks on your BC system and been frustrated a few times with Windows limitations, what are you going to do? Jobs's bet: You'll start spending more and more time in OS X, until you—too—become one of the pod people. It's sad to see so many of my compatriots being turned into lemmings. Perhaps they'll wake up and smell the Apple pie in the sky—and realize they've been taken for a ride. But I doubt it. Because I'm a firm believer that once you start using a Mac, your IQ begins to creep downwards, inversely proportional to an increase in your AAF (Apple Acceptance Factor).

In fact, I'm blaming the AAF for a wide-range of habits espoused by supposedly "creative people." I'll bet it's responsible for tattoos, piercings, and the wide-spread adoption of the phrase "no worries." In fact, I believe that most of today's societal ills can be either indirectly or directly attributed to Apple. Widespread hearing loss? Blame the iPod. Carpal tunnel? Blame the Newton. Upswing in hernias? That Infinite Loop idiot who decided to put a handle on the first iMac—and started the whole luggable trend. No, Boot Camp is just the latest diabolical piece of Steve Jobs's grand plan to dumb us down and mangle our bodies. It's no coincidence that all this is happening just as Jobs has taken over as the head of Disney (which also owns ABC). Pretty soon we'll be good for nothing but sitting on our butts and watching TV. So go ahead and Boot Camp if you must. But don't come running to me when your mind and body prematurely degenerate. I'll be smart, fit, and enjoying my real Windows computers, while you ooze slowly into the Pixar-Disney-ABC swamp of mindlessness. Chump.
http://www.pcmag.com/print_article2/...=177291,00.asp





Chinese Student Caught Sharing Pirated Songs On-line

Hong Kong Customs Anti-Internet Piracy Team has arrested a 16-year-old student in Sau Mau Ping after cracking a case in which more than 600 pirated songs were provided for free downloading from a personal website.

According to a government press release on Thursday, acting on a complaint from a copyright owner, following intensive investigations, Customs officers seized from a residential unit in Sau Mau Ping a desktop computer with broadband Internet devices, worth about 7,700 HK dollars (987 U.S. dollars).

The student is now on bail pending further investigation.

More than 600 pirated songs had been available on the personal website for free downloading by Internet users. The personal computer had been converted into a server by means of a "Dynamic IP Re-direction Service" provided by a U.S. website.
http://en.chinabroadcast.cn/811/2006/05/11/53@87712.htm





Net Censorship Spreads Worldwide
Mark Ward

Repressive regimes are taking full advantage of the net's ability to censor and stifle reform and debate, reveals a report.

Written by the Reporters Without Borders (RSF) pressure group the report highlights the ways governments threaten the freedom of the press.

The report has a section dedicated to the internet and the growing roster of nations censoring online life.

This censorship is practised on every continent on Earth, said the report.

Power play

Although the internet is changing the way the media works as blogs, chat forums and social networking sites turn passive consumers into active critics, it is not just citizens who are taking advantage of its technological power warned the report.

Julien Pain - who heads the internet freedom desk at the RSF and was one of the report's authors, noted: "Everyone's interested in the internet - especially dictators".

Mr Pain said the world's dictators have not remained powerless in the face of the explosion of online content. By contrast, many have been "efficient and inventive" in using the net to spy on citizens and censor debate.

In many nations, the net used to be the only uncensored outlet and the place people turned to for news they would never hear about through official channels.

However, noted the report, governments have woken up to the fact that the people they regard as dissidents are active online. Many are now moving to censor blogs and the last year has seen many committed bloggers jailed for what they said in their online journal.

For instance, in Iran Mojtaba Saminejad has been in jail since February 2005 for putting online material ruled offensive to Islam.

China was the nation that came in for most criticism for its efforts to monitor and censor the net. The RSF noted that net censorship in the country had undergone a significant shift in the last two years.

Originally, said the report, China was only interested in monitoring political dissidence on the net. Now its scrutiny covers general unrest in its population - ironically something that has grown because the net makes it easier for people to communicate.

Jail term

China's success at censorship means it has effectively produced a "sanitised" version of the internet for its 130 million citizens that regularly go online.

The wide-ranging scrutiny also means that it is the biggest jailer of so-called cyber dissidents. RSF estimates that 62 people in China have been jailed for what they said online.

Net users have also been jailed in Egypt, Iran, Libya, the Maldives, Syria, Tunisia and Vietnam.

Where China has led, other nations are following and taking active steps to filter the net before it gets to their citizens. Zimbabwe is reportedly buying technology directly from China to beef up its censorship efforts.

Many other nations, including Burma, Cuba, Iran, Libya, Nepal, North Korea, Saudi Arabia, Syria, Turkmenistan, and Vietnam censor the net. Often this filtering involves stopping access to some types of sites, such as those showing pornography, but it can also involve blocking sites critical of governments or religions.

Some nations, such as Turkmenistan, have banned home net connections and restrict people to using net cafes which, said the RSF, were much easier to control. Burma has banned web e-mail systems such as Hotmail and Yahoo mail and every five minutes screen grabs are taken of what people are looking at in net cafes.

But criticism of the obstacles put before open net access was not limited to nations known for their repressive policies. The European Union was criticised too for its policy of leaving the decision on which sites to censor up to net service firms. This, said the RSF, created a "private system of justice" in which technicians take the place of a judge.

The 153-page report also criticised Western firms for selling technology to repressive regimes to help them monitor what people do online.

The report was produced to mark World Press Freedom Day.
http://news.bbc.co.uk/go/pr/fr/-/2/h...gy/4973114.stm





Everyone’s Interested In The Internet - Especially Dictators

The Internet has revolutionised the world’s media. Personal websites, blogs and discussion groups have given a voice to men and women who were once only passive consumers of information. It has made many newspaper readers and TV viewers into fairly successful amateur journalists. Dictators would seem powerless faced with this explosion of online material. How could they monitor the e-mails of China’s 130 million users or censor the messages posted by Iran’s 70,000 bloggers? The enemies of the Internet have unfortunately shown their determination and skill in doing just that. China was the first repressive country to realise that the Internet was an extraordinary tool of free expression and quickly assembled the money and personnel to spy on e-mail and censor “subversive” websites. The regime soon showed that the Internet, like traditional media, could be controlled. All that was needed was the right technology and to crack down on the first “cyber-dissidents.” The Chinese model has been a great success and the regime has managed to dissuade Internet users from openly mentioning political topics and when they do to just recycle the official line. But in the past two years, the priority of just monitoring online political dissidence has given way to efforts to cope with unrest among the population. The Internet has become a sounding-board for the rumblings of discontent in most Chinese provinces. Demonstrations and corruption scandals, once confined to a few cities, have spread across the country with the help of the Internet. In 2005, the government sought to counter the surge in cyber-dissidence. It beefed up the law and drafted what might be called “the ten commandments” for Chinese Internet users - a set of very harsh rules targeting online editors. The regime is both efficient and inventive in spying on and censuring the Internet. Other government have unfortunately imitated it.

The Internet’s jailers

Traditional “predators of press freedom” - Belarus, Burma, Cuba, Iran, Libya, the Maldives, Nepal, North Korea, Saudi Arabia, Syria, Tunisia, Turkmenistan, Uzbekistan and Vietnam - all censor the Internet now. In 2003, only China, Vietnam and the Maldives had imprisoned cyber-dissidents. Now more countries do. A score of bloggers and online journalists have been thrown in jail in Iran since September 2004 and one of them, Mojtaba Saminejad, has been there since February 2005 for posting material deemed offensive to Islam. In Libya, former bookseller Abdel Razak al-Mansouri was sentenced to 18 months in prison for making fun of President Muammer Gaddafi online. Two Internet users have been jailed and tortured in Syria, one for posting photos online of a pro-Kurdish demonstration in Damascus and the other for simply passing on an e-mailed newsletter the regime considers illegal. A lawyer has been in jail in Tunisia since March 2005 for criticising official corruption in an online newsletter. While a UN conference was held in Tunis in November 2005 to discuss the future of the Internet, this human rights activist was in a prison cell several hundred kilometres from his family. A grim message to the world’s Internet users. Censorship of the Web is also growing and is now done on every continent. In Cuba, where you need permission from the ruling party to buy a computer, all websites not approved by the regime are filtered. The situation has worsened in the Middle East and North Africa. In November 2005, Morocco began censoring all political websites advocating Western Sahara’s independence. Iran expands its list of banned sites each year and it now includes all publications mentioning women’s rights. China can now automatically censor blog messages, blanking out words such as “democracy” and “human rights.” Some Asian countries seem about to go further than their Chinese “big brother.” Burma has acquired sophisticated technology to filter the Internet and the country’s cybercafés spy on customers by automatically recording what is on the screen every five minutes.

Complicity of Western firms

How did all these countries become so expert at doing this? Did Burma and Tunisia develop their own software? No. They bought the technology from foreign, mostly American firms. Secure Computing, for example, sold Tunisia a programme to censor the Internet, including the Reporters Without Borders website. Another US firm, Cisco Systems, created China’s Internet infrastructure and sold the country special equipment for the police to use. The ethical lapses of Internet companies were exposed when the US firm Yahoo! was accused in September 2005 of supplying the Chinese police with information used to sentence cyber-dissident Shi Tao to 10 years in prison. China is now passing on its cyber-spying skills to other enemies of the Internet, including Zimbabwe, Cuba, and most recently Belarus. These countries will probably no longer need Western help for such spying in a few years time. Democratic governments, not just the private sector, share responsibility for the future of the Internet. But far from showing the way, many countries that usually respect online freedom, now seem to want to unduly control it. They often have laudable reasons, such as fighting terrorism, child sex and cyber-crime, but this control also threatens freedom of expression. Without making any comparison with the harsh restrictions in China, the Internet rules recently adopted by the European Union are very disturbing. One of them, requiring Internet service providers (ISPs) to retain records of customers’ online activity, is presently being considered in Brussels and seriously undermines Internet users’ right to online privacy. The United States is also far from being a model in regulation of the Internet. The authorities are sending an ambiguous message to the international community by making it easier to legally intercept online traffic and by filtering the Internet in public libraries.
http://www.rsf.org/rubrique.php3?id_rubrique=578





Blu-Ray Discs Delayed By A Month
Thomas K. Arnold

While high-definition DVD titles trickle into stores, the arrival of the first titles in the rival Blu-ray Disc format has been pushed back by a month until June 20.

Sony Pictures Home Entertainment president Benjamin Feingold said his studio's first batch of Blu-ray releases will be ready May 23, as planned.

"But the majority of our retail base and hardware partners have requested that we reconsider this date to better coincide with the first commercially available Blu-ray-compatible hardware," Feingold said.

The decision to hold off shipping Blu-ray titles to retailers comes several weeks after Samsung announced its first Blu-ray player wouldn't arrive in stores until June 25, a month behind schedule.

Feingold said the first eight Blu-ray Disc titles from Sony won't ship until then "in an effort to ensure a more coordinated launch."

The first Blu-ray Disc titles from Warner Home Video are expected to arrive in stores around the same time, although no firm dates or titles have been announced.

The Sony Blu-ray Disc titles that are now slated to arrive in stores June 20 are "Underworld Evolution" (arriving the same day as the DVD), "50 First Dates," "The Fifth Element," "Hitch," "House of Flying Daggers," "A Knight's Tale," "The Last Waltz," "Resident Evil Apocalypse" and "XXX."
http://today.reuters.com/news/articl..._US-BLURAY.xml





Warner Music Posts Narrower - Than - Expected Loss

Warner Music Group Corp. (WMG.N), which earlier this week rejected a $4.2 billion takeover bid by EMI Group Plc. (EMI.L), on Friday posted a narrower-than-expected loss, helped by rising U.S. CD sales and digital revenues.

Analysts said the strong growth by Warner Music will put pressure on EMI to raise its $28.50-per-share bid.

``The numbers are very strong, significantly better than we and investors were expecting,'' said Richard Greenfield analyst at Pali Research. ``It bodes well for renewed vigor from EMI to make a higher offer.''

Warner Music, the fourth largest music company and home to such acts as Madonna and Green Day, posted a net loss of $7 million, or 5 cents a share, in the second quarter, versus a net profit of $4 million a year earlier.

But on a diluted basis, the company posted a year-earlier loss of 28 cents a share, despite the bottom-line profit which was due to unrealized gains of $39 million on warrants issued to former parent Time Warner Inc. (TWX.N) that were recognized in net income, but excluded from the earnings per share.

Analysts polled by Reuters Estimates on average expected a net loss of 15 cents.

Revenue rose 3.8 percent to $796 million from $767 million a year earlier. In the fast-growing digital segment, the company posted revenue of $90 million, nearly triple a year earlier and representing 11 percent of quarterly revenue.

Laura Martin analyst Soleil Media Metrics said the revenue figures were ``excellent'' compared to the industry average. ``It means EMI's got to pay between $30 to $33 a share.''

Warner Music said its major sellers during the quarter included Madonna, James Blunt and Sean Paul helping to push U.S. recorded music revenue up by 22 percent.
http://www.nytimes.com/reuters/busin...sic-earns.html





AOL to Add Free Phone to Instant Messaging Feature
Saul Hansell and John Markoff

AOL is preparing to offer the 41 million users of its instant messaging system a free phone number that will allow people to call them from regular phones while they are online.

The move is part of a broad effort by AOL — which has been buffeted by defections from its flagship dial-up Internet service — to capitalize on the continued popularity of its decade-old AIM instant message system.

In addition to expanded Internet calling features, AOL also plans to introduce AIM Pages, an effort to compete with MySpace.com, the rapidly growing social networking service. MySpace, which is owned by the News Corporation, gives its 70 million mostly young members a place to post their writings, photographs, favorite music and video clips.

"Our strategy is to protect and extend our instant messaging business," said James P. Bankoff, executive vice president for programming and products at AOL, a unit of Time Warner. "You have to play offense."

The free phone number is a new twist on services that allow calls between regular phones and PC's, an idea made popular by Skype, which is owned by eBay, and copied by others, like Yahoo through its instant message software. As with those services, the new AOL Phoneline service, to be introduced May 16, will allow users to call each other free if both are online, typically using headsets or microphones attached to their computers.

Other services charge about $30 to $40 a year for a telephone number to receive incoming calls, and about 2 cents a minute to place phone calls from a computer to an ordinary telephone line.

AOL will sell outgoing calls only as part of a flat-rate package that costs $14.90 a month for unlimited calling, or at an introductory price of $9.95 a month for people who subscribe when the service starts.

Skype has not taken off in the United States as it has in other countries because telephone rates are much lower here, said John McKinley, the president of AOL's digital services division. Free incoming calls, he said, are more appealing in this country, especially for people who mostly use cellphones but do not want to give their cell number to casual acquaintances.

These people can give the AOL number out freely. They can then receive notifications on their cellphones of new voice mail messages left at their AOL number.

AOL will make phone numbers available in 50 metropolitan areas. The company hopes to profit both from displaying advertisements to users and from the outbound calling charges and additional services, like ring tones and call forwarding.

AOL is joining a growing list of companies that are attacking the traditional telephone market with the aid of the Internet. There are now about five million subscribers to so-called Voice over Internet Protocol, or VoIP, communications services, according to International Data Corporation, a market research firm based in Framingham, Mass. Because cable and Internet companies are aggressively marketing the service, that is expected to increase to about 30 million subscribers by 2009.

"What's really intriguing about this is how cheap and easy some of this stuff is to use," said Will Stofega, research manager for VoIP services at International Data.

The other new piece of AOL's strategy for its AIM network, AIM Pages, hopes to match MySpace in giving users broad flexibility in designing their pages, but it is also meant to be easier to use. AOL has created a series of modules users can place on their pages, including photo albums, buddy lists and other information about themselves and their interests. It offers ways to add content from AOL and its sister Time Warner companies, like AOL music videos and CNN headlines.

But there are also modules for adding material from rival services, including the Flickr photo-sharing site, owned by Yahoo, and videos from the popular video-sharing service YouTube. There will be advertising on users' pages, and marketers will be able to set up their own sites on the service and offer modules for people to include in their pages.

A preview version of the social networking service will be available to AIM users by the end of next week.

Those with some proficiency in Web page design can change any element of the page, as they can on MySpace, and pull in content from other sites. Analysts credit MySpace's design flexibility as one reason it has become more popular than competitors like Friendster.

AIM, which is available as a free download, is still the leading messaging service with 38 percent of the market, followed by Yahoo and Microsoft, according to comScore Networks, a research service. But the market is getting more competitive. Google has introduced Google Talk, and MySpace is developing its own instant message service.

Many MySpace users communicate with friends using AIM, and AOL is hoping they will find AIM Pages easier to use than MySpace. AIM users will see an icon next to the names of people on their buddy lists who have updated their pages.

Analysts who have been briefed on the service said that it had promise for revitalizing AOL in the face of new social-networking rivals.

"There is no question that AIM is a real network," said David Card, vice president and senior analyst at Jupiter Research. "There's life in the old dog yet."

Ken Belson contributed reporting for this article.
http://www.nytimes.com/2006/05/05/te...y/05phone.html





Judges Challenge Internet Wiretap Rules

'Your argument makes no sense,' appeals judge tells FCC lawyer

A U.S. appeals panel sharply challenged the Bush administration Friday over new rules making it easier for police and the FBI to wiretap Internet phone calls. A judge said the government’s courtroom arguments were “gobbledygook.”

The skepticism expressed so openly toward the administration’s case encouraged civil liberties and education groups that argued that the U.S. is improperly applying telephone-era rules to a new generation of Internet services.

“Your argument makes no sense,” U.S. Circuit Judge Harry T. Edwards told the lawyer for the Federal Communications Commission, Jacob Lewis. “When you go back to the office, have a big chuckle. I’m not missing this. This is ridiculous. Counsel!”

At another point in the hearing, Edwards told the FCC’s lawyer that his arguments were “gobbledygook” and “nonsense.”

The court’s decision was expected within several months.

In an unrelated case last year affecting digital television, two of the same three judges determined the FCC had significantly exceeded its authority and threw out new government rules requiring anti-piracy devices in new video devices. Lewis was also the losing lawyer in that case, and Edwards also was impassioned then in his criticisms of the FCC.

In the current case, Edwards appeared especially skeptical over the FCC’s decision to require that providers of Internet phone service and broadband services must ensure their equipment can accommodate police wiretaps under the 1994 Communications Assistance for Law Enforcement Act, known as CALEA.

The new rules go into effect in May 2007.

The 1994 law was originally aimed at ensuring court-ordered wiretaps could be placed on wireless phones.

The Justice Department, which has lobbied aggressively on the subject, warned in court papers that failure to expand the wiretap requirements to the fast-growing Internet phone industry “could effectively provide a surveillance safe haven for criminals and terrorists who make use of new communications services.”

Critics said the new FCC rules are too broad and inconsistent with the intent of Congress when it passed the 1994 surveillance law, which excluded categories of companies described as information services.

The FCC asserted that providers of high-speed Internet services should be covered under the 1994 law because their voice-transmission services can be considered separately from information services. “Congress intended to cover services (in the 1994 law) that were functionally equivalent” to traditional telephones, Lewis said during the hearing in U.S. Circuit Court for the District of Columbia.

“There’s nothing to suggest that in the statute,” Edwards replied. “Stating that doesn’t make it so.”

The panel appeared more inclined to support the FCC’s argument that Internet-phone services — which allow users to dial and receive calls from traditional phone numbers — may be covered under the 1994 law and required to accommodate court-ordered wiretaps. The technology, popularized by Holmdel, N.J.-based Vonage Holdings Corp., is known as “voice over Internet protocol,” or VOIP.

“Voice-over is a very different thing,” U.S. Circuit Judge David B. Sentelle said. He said it offered “precisely the same” functions as traditional telephone lines.

Edwards told the lawyer for the civil liberties groups, Matthew Brill, that on his challenge that VOIP services aren’t covered under the surveillance law, “I didn’t think you have it.”
Education groups had challenged the FCC rules because they said the requirements would impose burdensome new costs on private university networks.

The third judge on the panel, Janice Rogers Brown, did not comment or ask any questions during the arguments.
http://www.msnbc.msn.com/id/12645488/





Many Hate Groups Favor U.S. Internet Servers

Watchdog group bemoans lack of oversight of inflammatory Web content

Hate groups around the world, including Islamic militants, often use Internet servers based in the United States to send propaganda and instructions to followers, according to a report released Thursday by the Simon Wiesenthal Center.

In its eighth annual report on Internet hate speech, the Wiesenthal Center said it had logged some 6,000 Web sites in the past year used by racists and bigots to incite violence.

The pages, many of which the center archived on compact disc, range from rantings by American white supremacists to execution videos distributed by Islamic terror groups.

Clearinghouse for global hate
In one gruesome Internet post, labeled “Hidden Camera Jihad,” anonymous producers combined home movies of American soldiers being killed with a laugh track and the kind of comical sound effects you hear on “America’s Funniest Home Videos.”

That clip proved difficult to trace, the report said, but thousands of others first appeared on U.S. computer servers, often maintained by companies that offer cheap disk space and don’t usually monitor what clients do with their Web sites.

Much of the hateful material originated overseas, but when extremist anti-Americans go looking for a place to post their bile, they often find it easier and cheaper to use a site hosted in America.

The United States, after all, has free speech and little Internet censorship, explained Wiesenthal Center senior researcher Rick Eaton, who was involved in preparing the report.

“If you want to circumvent your own country’s laws, you post it on an American server,” Easton said.

Watchdog on the Net
An international Jewish human rights organization, the Wiesenthal Center routinely complains to Internet companies when it discovers violent, hateful speech on their networks and has succeeded in getting thousands of such pages removed, said Rabbi Abraham Cooper, associate dean of the center’s Museum of Tolerance.

Recently, the center also has been intercepting an increased number of online tutorials and how-to manuals aimed not at the general public, but at sympathizers who might actually be recruited to carry out attacks.

Some of that material includes children’s games urging kids to get involved in violent struggle against Israel and the West, including a puzzle showing a child throwing a rock at a tank.

The center passes most of that material on to law enforcement officials.

“We’ve now reached a point where the Internet is the cornerstone of terrorist groups,” Cooper said.
http://www.msnbc.msn.com/id/12635543/





Amnesty: Torture ‘Widespread’ In U.S. Custody

Human rights group says U.S. ‘creating climate’ in which abuse can flourish

Torture and inhumane treatment are “widespread” in U.S.-run prisons in Afghanistan, Iraq, Cuba and elsewhere despite Washington’s denials, Amnesty International said on Wednesday.

In a report for the United Nations’ Committee against Torture, the London-based human rights group also alleged abuses within the U.S. domestic law enforcement system, including use of excessive force by police and degrading conditions of isolation for inmates in high security prisons.

“Evidence continues to emerge of widespread torture and other cruel, inhumane or degrading treatment of detainees held in U.S. custody,” Amnesty said in its 47-page report.

It said that while Washington has sought to blame abuses that have recently come to light on “aberrant soldiers and lack of oversight”, much ill-treatment stemmed from officially sanctioned interrogation procedures and techniques.

“The U.S. government is not only failing to take steps to eradicate torture, it is actually creating a climate in which torture and other ill-treatment can flourish,” said Amnesty International USA Senior Deputy Director-General Curt Goering.

U.N. set for review
The U.N. committee, whose experts carry out periodic reviews of countries signatory to the U.N. Convention against Torture, is scheduled to begin consideration of the United States on Friday. The last U.S. review was in 2000.

It said in November it was seeking U.S. answers to questions including whether Washington operated secret detention centers abroad and whether President George W. Bush had the power to absolve anyone from criminal responsibility in torture cases.

The committee also wanted to know whether a December 2004 memorandum from the U.S. Attorney General’s office, reserving torture for “extreme” acts of cruelty, was compatible with the global convention barring all forms of cruel, inhumane or degrading treatment.

In its own submission to the committee, published late last year, Washington justified the holding of thousands of foreign terrorism suspects in prisons abroad, including Guantanamo Bay in Cuba, on the grounds that it was fighting a war that was still not over.

“Like other wars, when they start, we do not know when they will end. Still, we may detain combatants until the end of the war,” it said.

U.S. image takes a beating
The U.S. human rights image has taken a battering abroad over a string of scandals involving the sexual and physical abuse of prisoners held by American forces in Afghanistan, Iraq and Guantanamo Bay.

In its submission, Washington did not mention alleged secret prisons.

Amnesty listed a series of incidents in recent years involving torture of detainees in U.S. custody, noting the heaviest sentence given to perpetrators was five months in jail.

This was the same punishment you could get for stealing a bicycle in the United States, it added.

“Although the U.S. government continues to assert its condemnation of torture and ill-treatment, these statements contradict what is happening in practice,” said Goering, referring to the testimony of torture victims in the report.
http://www.msnbc.msn.com/id/12602098/





Pixar Becomes Unit of Disney
AP

Shareholders of Pixar Animation Studios voted on Friday to approve the company's acquisition by the Walt Disney Company for $7.4 billion in stock.

The vote makes Pixar a subsidiary of Disney and makes the former chief executive of Pixar, Steven P. Jobs, the largest shareholder of Disney, with about a 7 percent stake.

The deal is an effort to help restore Disney's luster as a leader in the animated film business. Disney's own efforts have faltered over the last 10 years, while Pixar's films have been successful.

Mr. Jobs was named to Disney's board as a nonindependent member. Under the plan, Pixar shareholders will exchange each of their shares for 2.3 shares of Disney stock.

The acquisition closed quickly after the vote. Regulators had previously cleared the deal.

As part of the deal, important Pixar figures will take executive positions at Disney's animation and theme parks units.

Pixar will keep its brand name and continue to be based in Emeryville, Calif., as part of an effort to preserve the creative culture that has fueled its success.

John A. Lasseter, who was Pixar's executive vice president, will become chief creative officer of the animation studios and principal creative adviser at Walt Disney Imagineering, which designs and builds the company's theme parks.

Mr. Lasseter began his career as a Disney animator and is the creative force behind Pixar's films.

Pixar's president, Edwin E. Catmull, will serve as president of the combined Pixar and Disney animation studios.

The deal comes just a month before a distribution agreement between the companies was set to expire.

Disney agreed to finance Pixar's first computer-animated feature film, "Toy Story," in 1991. The film was released in 1995, the same year Pixar became a public company.

The relationship between the companies has produced a string of box-office hits, including the films "Finding Nemo" and "The Incredibles." The seventh and last film under the old distribution agreement, "Cars," will be released June 9.

Shares of Disney rose 69 cents, to $29.09. Shares of Pixar rose $2.41, to $67.69.
http://www.nytimes.com/2006/05/06/bu...a/06pixar.html





Fighting Off Satellites and the Bells
Ken Belson

THE last year was rough for cable companies. Everyone from Hollywood to New York predicted the industry's demise as satellite providers continued to steal cable customers, as the Bell companies geared up to sell television and as Disney, CBS and other networks started distributing shows over the Internet.

But the outlook for cable companies may be turning. Comcast, Cablevision and others are adding basic subscribers once again, and they are signing up record numbers of broadband and digital phone customers.

More change is on the way. By midyear, Time Warner Cable and Comcast hope to complete their purchase of Adelphia Communications and its 4.9 million subscribers.

As part of the deal, Time Warner Cable will also, for the first time, be publicly traded, increasing the spotlight on Glenn A. Britt, the company's decidedly low-profile chief executive. Mr. Britt has spent more than three decades in the Time Warner universe, working at Time Inc. and HBO before Time Warner Cable.

In an interview this week, Mr. Britt discussed the company's prospects. Following are excerpts:

Q. Time Warner Cable reported strong first-quarter earnings this week. Are satellite customers returning to cable?

A. The triple play — the combination of video, phone and broadband — is really, really popular with consumers and they tend to vote with their feet. The satellite companies have done a wonderful job making themselves look cheaper than cable. Some introductory packages are cheaper. But their average revenue per customer is about the same as cable. So the reality is that what people pay for satellite is about the same.

Q. Most cable stocks are up this year, but analysts remains wary. Why?

A. Wall Street has two concerns about cable. They are both going to be proven wrong. The first is the phone companies are going to crush the cable companies. But the reality is that it will take them many, many years to build out the whole country. When they get to where we are today, we'll be selling all these new things.

The second thing is whether all television is going over the Internet. The answer to that is not anytime soon. The Internet as it exists today is not capable of delivering hundreds of channels to millions of homes. The second reason is we gather an audience and guarantee revenue back to the networks, and they use the money to make more programming. Networks aren't going to put their content on the Internet unless there is a replacement.

Q. But Disney is now putting some of its shows on the Internet free. Isn't that a threat to your business?

A. Media companies are under pressure to experiment with putting a few shows on the Internet. It's a valid experimentation and if something takes off, people will do it. What I don't want to say is that there will not be a lot of video on the Internet. There's a huge amount of consumer-generated video. But that's a lot different than networks putting video on the Internet free.

Q. What will the acquisition of Adelphia Communications do for Time Warner Cable?

A. The really important part of the deal is that we'll be able to consolidate the Los Angeles market. We will go from having 15 percent of the market to having 85 percent.

Q. Time Warner and other cable companies are working with Sprint to develop wireless products. When can consumers expect to see them?

A. We will be in test markets later this year and those products will be fairly rudimentary. The things we really want to do are across platforms, like getting all your e-mail in one box or being able to get your Internet service on your cell. There isn't that big of a rush. It isn't clear what will be popular.

Q. Some consumer and religious groups want cable companies to sell channels on an à la carte basis. How likely is this?

A. The underlying economics of the television business and what it costs to produce the array of television in this country are what drives this phenomenon of big packages. We could offer à la carte technically. But if we offered à la carte, it would introduce all sorts of other costs. Think about being a new subscriber to cable. The average customer service phone call is five minutes. But with à la carte, operators would have to explain all the different channels. It might take half an hour and we would have to pass that cost along. It would not be cheaper but more expensive.
http://www.nytimes.com/2006/05/06/bu...interview.html





The Bare Naked Truth On Music File Sharing
Jim Ducharme

A conversation with Steven Page of Barenaked Ladies about why Canadian music fans who share files are not thieves.

The first 45 (remember them?) I ever bought with my own money was Steve Miller's "Take The Money and Run". At that time, it never occurred to me that I would in any way be a criminal if I made a tape of it for a friend. After all, I wasn't trying to rip off the "Space Cowboy". I was only trying to share his music with friends and I was under the impression that they would then likely go out and buy their own copies of his album. I really thought I was doing anything but taking Steve's money and running.

Talking this week to Barenaked Ladies front man Steven Page, I saw that he also had similar memories when he recalled the first time he got a tape from his cousin, who had recorded "Rock Lobster" by the B52s from CHUM FM on his portable recorder. To get that recording, which he listened to for the whole summer, Steven had to place his recorder mic next to his cousin's speaker.

Nowadays, MP3s will do just fine, and that's exactly what Steven and I discussed when we went over a new initiative from some of Canada's biggest music stars, who have joined together to form the Canadian Music Creators Coalition (CMCC) to support their fans and speak out on the issue of music sharing. CMCC wants the Canadian Recording Industry Association (CRIA) to know that Canadian music fans are not thieves just because they share music.

Based on the rhetoric coming from the recording industry, perhaps Steve and I will both be busted for confessing we taped music. Not too bad, I suppose - sharing a cell with Steven Page, spending my time singing harmony on BNL classics. Unfortunately, in reality, I'd probably end up in a cell with some tone deaf guy named "Bubba" who would insist on calling me "Jane".

Music sharing is not new. It's been happening for decades. The only thing that has changed is the technology. This is the crux of the issue - home taping (despite industry propaganda to the contrary) did not kill music. Nowadays, P2P file sharing over the web is faster and brings together huge numbers of people (and does not have the quality issues that tape recording had). This, understandably, scares the begeebers out of record execs. Whether they want to admit to it or not, CRIA and the record labels have had an extreme knee jerk reaction to this because they can't seem to understand the technology or, worse yet, music fans and the culture of the web. Now, entrenched in their position, they can't afford to take a step back and look at the issue from a new perspective.

As Steven points out, P2P sharing is the most accessible method people have to music. "There's no reason to punish fans for what they've always been doing. Better technology is just a means for them to enjoy their music better and it should be a way for us to help our business rather than preserving a business model that is out of date," says Steven.

I understand the need to protect copyrights. I often have to engage in this kind of policing myself when some other website lifts one of our stories without first asking for permission. However, because of the way they've dealt with the issue, even folks like me, who used to share CRIA's concerns, have changed our tunes.

Steven makes the case that record labels still need to learn that music is not a commodity, and marketing it in that way alienates fans who view it in an almost spiritual sense. Music is a touchstone in our lives - it's the soundtrack of our past, tied directly to our emotions and memories. The impression of fans is that the recording industry wants to control what most people consider to be something very personal.

Should we have banned the tape recorder or the VCR? That's what the TV industry wanted then. Looking back on it, it doesn't make any sense, does it? In fact, it sounds ridiculous, since VCRs created an entirely new channel to generate even more revenue, while giving video fans exactly what they wanted. P2P file sharing is today's VCR or tape recorder. It's no more likely to destroy the music industry than my Uncle's pet Airedale.

"How do we embrace the P2P (file sharing) world in a way that is unobtrusive for the consumer/music fan, so that it doesn't seem like a sell-out or a co-opt? How do we reconnect with our fan base? It's time to listen to what fans want and give it to them. We need to find ways to truly make it the same experience for people, but easier, with more stuff available and guilt-free, in a way that artists and labels get paid.", says Page.

Now, there is a business model which I can pretty much guarantee will work.
http://www.pcworld.ca/news/column/00...379858/pg2.htm





Canadian Musicians Band Together To Promote Progressive Copyright Reform
Tyler Morency

Broken Social Scene and Avril Lavigne may not have much in common musically, but they share a concern for the way music is shared and listened to in Canada.

To ensure the voice of musicians is heard in the copyright debate, Steven Page of the Barenaked Ladies created the Canadian Music Creators Coalition. Members of Blue Rodeo along with Sam Roberts, John K Sampson of The Weakerthans, Broken Social Scene, Avril Lavigne and others have publicly joined the coalition.

Page says the Canadian Recording Industry Association (CRIA), which represents the interests of the major record labels, doesn’t speak for the interests of the artists and that it is important for the people actually making the music to participate in the debate on copyright reform.

“Our main message isn’t necessarily for them (the CRIA), it’s to our fans and Ottawa, to say that the CRIA doesn’t speak on our behalf,” says Page. “For along time, we as musicians have allowed them to.”

The three core values of the organization are these: suing fans is wrong and counterproductive; digital locks on music, which prevent music from being copied to other media players, are standing in the way of music getting to the fans; and that Canadian musicians deserve support from the government.

Many independent record companies left the Canadian Recording Industry Association (CRIA) two weeks ago, including Nettwerk records which produces records for the Barenaked Ladies.

“Now especially, they’re (CRIA) purely representing the values and goals of the four multinational big record labels,” Page says. “We want to make sure that people understand that Canadian artists deserve a say in Canadian cultural policy.”

CRIA has stated they are against file sharing in all its forms and that they consider music downloads to be piracy.

Despite these claims, the Copyright Board of Canada declared that while uploading music to distribute over the internet is illegal, downloading music is not. A bill aimed at changing Canadian copyright laws died on the order paper last year when the federal election was called.

The US counterpart of CRIA has sued fans in high profile lawsuits for the possession of downloaded music over the last several years. Page doesn’t want to see the same practice in Canada.

“That’s not how we want to earn our living from our fans,” Page says. He adds that a better option is to introduce a levy or tariff, similar to the existing ‘private copying’ tariff on blank CDs, to digital media files.

“They (CRIA) know what the most popular files are and what is being moved around, and they use that data to complain about the process. But they could also use that data to collect and distribute monies from levies,” Page says. “In an ideal situation, that’s where we’re going to start seeing income from our copyrights. In the interim, the last thing we want to do is push our audience away.”

Page says Canadian copyright laws and record companies need to adopt a hands-off attitude towards P2P sharing.

“P2P sharing has become a helpful tool for us,” Page says of his own band, adding that copyright law reform needs to meet the needs of both the artist and the recording industry.

“We’re going to keep moving forward as musicians and we’re going to do it without the labels, and it’s their choice to keep up.”
http://www.vueweekly.com/articles/default.aspx?i=3871





Fair Use Faltering
Roy Mark

Rep. Rick Boucher has Hollywood all flustered. Again. Don't you just hate that?

The Virginia Democrat enjoys wide respect, if not support, from both sides of the aisle for his grasp of technology issues. You may not agree with Boucher, but you almost always come away agreeing he has a point.

The latest case in point: fair use rights.

Boucher supports legislation that would allow consumers to "circumvent a technological measure in order to obtain access [to works] for purposes of making non-infringing use of the work."

H.R. 1201, the Digital Media Consumers' Rights Act of 2005, further adds, "Except in cases of direct infringement, it shall not be a violation of the Copyright Act to manufacture or distribute a hardware or software product capable of substantial non-infringing uses."

Boucher's bill would amend two key provisions of the Digital Millennium Copyright Act (DMCA), which currently prohibits the circumvention of a technical protection measure guarding access to a copyrighted work, even if the purpose of the circumvention is to exercise traditional consumer fair-use rights.

"We need to have a true balance in the law that respects the rights of copyright owners but also respects the rights of users," Boucher has repeatedly preached.

Hollywood so dislikes this idea that earlier this week a Universal Music Group attorney told a House panel that Boucher's bill "would undermine the legitimate marketplace by granting a 'hacking' right to consumers."

Michael Ostroff went on to claim, "This bill is unnecessary and dangerous."

Congress passed the DMCA in 1998 in response to Hollywood's concerns over piracy. Content owners stressed that with digital technology a copy of a copy of a copy has the same clarity and perfection as the original work.

Copyright owners -- even before the explosion of peer-to-peer (P2P) music services -- said that with a click of the mouse, thousands of those perfect copies could be sent around the world.

Congress's solution was to ban it all.

Under the DMCA there is no requirement that the circumvention be for the purpose of infringing the copyrights. Instead, any act of circumvention without the consent of the copyright owner is a criminal act.

"If you want to copy a portion of a chapter of a book to quote in a book report, you cannot steal the book in order to do so," Ostroff said. "Yet that is exactly what H.R. 1201 would do."

The interesting point about Ostroff's diatribe against Boucher's bill is that the hearing had doing to the legislation.

The hearing was all about digital radio.

Having ripped the very concept of fair use embraced under Boucher's bill, Ostroff launched another attack on satellite radio service XM's development of handheld devices that give XM subscribers the ability to receive live broadcasts and time shift it for later listening.

The handhelds also allow subscribers to play MP3 music collections.

Hollywood: Not fair!

"Congress gave the satellite services a compulsory license to perform our music, so that their subscribers could listen to it," Ostroff said, adding that the music industry help launch satellite radio service by agreeing -- through the compulsory license -- to below market rates.

"Now XM wants to stretch and reinterpret the government imposed license into a service that enables their subscribers to make permanent copies of our music," Ostroff said.

XM: Get a life.

"As an industry, satellite radio is the single largest contributor of sound recording performance royalties to artists and record labels," XM CEO Gary Parsons said.

"In fact, XM and Sirius pay more in such performance royalties than all other digital broadcasters and webcasters combined."

Parsons told the lawmakers the XM handhelds do not allow any of the recorded content to be moved off the device in digital form, including uploading to the Internet.

"Content saved to the device from XM stays on the device and cannot be copied or removed," Parsons said. "The only output on these devices goes to your headphones in analog form. The new products ... promote personal listening enjoyment, not Internet piracy."

Ostroff insisted that allowing XM to distribute music while paying only performance fees is unfair to iTunes, Napster and other distribution services.

"The growth of digital distribution in its many forms -- via cell phones, Internet, cable and now via broadcast signals -- depends on a legitimate marketplace," he said. "A legitimate marketplace, in turn, depends upon the ability to protect content effectively."

From Hollywood's point of view, that ability to protect content, it appears, seems to preclude any consumer fair-use rights.

Too bad more people aren't listening to Rick Boucher.
http://www.internetnews.com/commenta...le.php/3604241





In Case You Were Wondering…

How to Rip DVDs to Small AVI or MPG Formatted Files





Ignore Consumer Tech At Your Peril, CIOs Warned It's Not A Fad And It Won't Go Away, Says Gartner...
Andy McCue

Businesses must embrace the 'consumerisation' of technology and not ban staff from downloading or using new technologies and software at work.

Analyst Gartner has warned that technologies such as wikis and those offered by Google and Skype will increasingly find their way into the enterprise, and CIOs and IT directors will not be able to stop the trend by simply banning or ignoring them.

The majority of new technologies which businesses adopt between 2007 and 2012 will have their roots in the consumer market, according to Gartner.

David Smith, VP and Gartner Fellow, said consumers are now more tech-literate and less willing to be limited by the traditional confines of corporate IT.

He said in a statement: "A primary agent of this phenomenon is the second internet revolution in which the internet serves as a proving ground for new technologies. The internet's ease of use has made people view technology differently, with less hesitancy."

Gartner warned these new technologies will find their way into the enterprise whether CIOs like it or not and that, instead of trying to ban them, CIOs should experiment to find ways the business can get productivity gains and competitive advantage from them.

This includes creating "experimentation zones" where IT staff and other users can become familiar with new consumer technologies and identify possible uses in the enterprise to aid collaboration and efficiency.

Gartner also said the potential security threat of new consumer-based technologies in the enterprise also needs to be addressed. silicon.com's CIO Jury IT user panel recently slammed Google's new desktop search tool because of the security risk it poses.

But Smith said businesses need to recognise the 'consumerisation of IT' trend will continue to gain momentum.

He said: "It isn't a fad that's going to go away next year. Don't try to stop it - you will fail."
http://management.silicon.com/itdire...9158689,00.htm





Local news

Danbury Library Offers Audio Books For Download
Erik Ofgang

Last week Danbury Library implemented a new program that allows patrons to download audio books from the Internet onto their home computers and MP3 players.

Once downloaded, these books can be played on an MP3 player anywhere, any time.

Sue Horton, the audio video coordinator at the library, said she thought it would be "phenomenal" for library patrons.

There are more than 1,248 audio books available, and the number is constantly rising. Titles include "Cell" by Stephen King and "1776" by David McCullough.

To download the audio books, one needs to start a netlibrary account. Members of Danbury Library can start an account online, while members of other libraries need to go to Danbury Library to start an account, Horton said.

Once the account is established, an audio book can be downloaded in about 12 minutes with a high-speed connection. If a book is available, there is no limit to the number of people who can access it.

"Over 100 people could download the same item at one time," said Horton.

The audio book will work for three weeks, and patrons will be able to renew it once. There is no need to worry about late fees, because after the allotted time the book will basically "return itself," Horton says, because it will no longer play.

However, the convenience does come with a hefty price tag for the library. Horton said the program will cost the library $12,000 a year because it pays Recorded Books, an audio book company, for the service.

The bigger a library's readership, the more the fee, because it is likely that more people will use the service.

Horton said the library choose Recorded Books over its competitor Overdrive because of the high quality of the recordings and because a large majority of the books are unabridged,

Also, although Overdrive had a larger selection, Recorded Books had more selections of well-known books. One draw back to Recorded Books is that the audio books cannot be played on an Apple iPod.

Horton said this year will be a test for the program. The library will seek feedback on whether Recorded Books was the right choice.

Mary Monahan, a reference librarian who is involved with letting high school students know about library services, said she anticipates local students will use the service. "Kids are a lot more sophisticated with technology," she aded.

Monahan said the service will be particularly handy for student's summer reading lists, because "500 kids could access (a required book) it at the same time."

Diane Greenwald, assistant director at the library, purchased an MP3 player so she could to try out the new audio books.

"It's great because it goes wherever I go," said Greenwald. "I can listen around the house, in the car, wherever I want to be."

Danbury Library joins the ranks of several Connecticut libraries, including Booth Library in Newtown in offering downloadable audio books.

"It's our goal to be the best library in Connecticut," Horton said, so "we had to do this."

Danbury Library is at 170 Main St. Its Web site is www.danburylibrary.org.
http://news.newstimeslive.com/story....category=Local





420 friendly

The Nitpicking Nation
Stephanie Rosenbloom

THEY are single, gay, straight, biracial, conservative, liberal and tattooed — and they have as many preferences for a potential roommate as an online dater has for a potential lover. They are bankers, fetishists, self-declared nerds and drug users. They have old wounds and new hopes, and are willing to barter their cooking and sexual expertise for free or discounted rent.

They are all seeking and selling housing on Craigslist.org, the electronic listing service with sites in all 50 states and more than 200 worldwide. And because users pay nothing (for now) and are able to go on at length about who they are and what they want, their postings provide a sociological window into housing trends and desires across the country, from the neon cityscape of the Las Vegas Strip to the wheat fields of Wichita, Kan.

Myriad other sites provide roommate-matching services, but in the last decade Craigslist has emerged as the gold standard. It is easy to navigate, has an extensive number of listings and does not require people to complete an online sign-up sheet to view postings in their entirety. And the intimate and sometimes politically incorrect nature of Craigslist postings can make them fun to read — amusing, frank and even kinky.

Perhaps the most eyebrow-raising thing about the housing listings is the abundance of users — even young, savvy residents of anything-goes metropolises like Los Angeles and Miami — who want mellow, nonpartying roommates. Las Vegas sounds more like Snore City if you judge it by its housing listings. And New Yorkers can come off sounding square. "No parties" and "no drama" are common refrains.

There are exceptions, but even club-hopping Paris Hilton hopefuls seem to have their limits. As four women (ages 19 to 22) seeking a fifth roommate in Boston wrote, "We want a partier, not a puker."

People in their 20's often list their alma maters and request a roommate in their own age group. Cleanliness is a must, or at least "clean-ish," "decently clean" or "clean in public spaces." And spending life with a "professional" appears to be just as important to users of Craigslist's housing listings as it is to users of Match.com.

Some listings have stirred up trouble, however, and the Chicago Lawyers' Committee for Civil Rights Under Law, a nonprofit group, has filed a lawsuit in federal court against Craigslist for "publishing housing advertisements which exclude prospective tenants on the basis of race, gender, family status, marital status, national origin and religion."

A news release issued by the organization said that the Craigslist postings contained such language as "no minorities," "African-Americans and Arabians tend to clash with me so that won't work out," "ladies, please rent from me," "requirements: clean godly Christian male," "will allow only single occupancy," and "no children."

The suit is addressed on Craigslist: "Although in all likelihood this suit will be dismissed on the grounds that Internet sites cannot legally be held liable for content posted by users, Craigslist has no need to hide behind this well-established immunity."

The statement also says that Craigslist respects constitutionally protected free speech rights and that "discriminatory postings are exceedingly uncommon, and those few that do reach the site are typically removed quickly by our users through the flagging system that accompanies each ad."

Craig Newmark, the founder of Craigslist, said that its "culture of trust" inspires users to be straightforward. In fact, some users do not even feel compelled to embellish the descriptions of their spaces, as housing advertisements commonly do. Rather, they take a certain pride in the gritty crudeness of their offerings. A small room for rent in the East Village is described as "definitely a young person's apartment" with "two small junky TV's that we have cheap antennas on, but we get the normal channels, and that is enough for us."

"There is no window," the listing says, "but you have a full-sized door."

And where else do you find housing listings that include candid photographs of the owner or leaseholder instead of the property they are advertising? (A man in Fort Lauderdale, Fla., compromised and included images of his bare room and his bare chest.)

Indeed, Craigslist is where sex and real estate can truly merge. Near Dallas, a married couple are looking for a female roommate "with benefits." A listing for Astoria, Queens, reads: "I am offering a free room for up to three months for any females who are ticklish." A single man in Los Angeles is offering foot massages and free rent to women with comely feet.

Those are some of the tamer overtures, though the majority of roommate listings are not suggestive.

But just who are the most desirable roommates?

Many people prefer women to men. There are women who feel more comfortable sharing a home with someone of the same sex, men who say they get along better with female housemates, and a few cyberspace Casanovas who want to take a shot at turning a roommate into a bedmate. Interns are also desirable, apparently because they are thought to be hard-working, responsible and willing to pay good money for cramped rooms.

But couples are sometimes lumped into a list of the unacceptable, like cigarette smoking. Over all, Democrats are more vocal than Republicans in expressing a desire not to live with the opposing party, though two "hip professional guys" found elusive harmony on Capitol Hill: "One guy is straight, and one is gay. One is a Republican, and the other is a Democrat," they wrote in a listing for a third roommate. "We appreciate and welcome diversity."

Users in the San Francisco Bay Area appear to be among the least interested in rooming with a pet. This area had the highest percentage of "no pets" listings during a key-word search last Thursday (slightly more than 16 percent of 32,295 housing listings). In Boston, about 14 percent of 45,880 listings said "no pets."

Dallas, Wyoming and Birmingham, Ala., seemed quite pet-friendly by comparison: only about 1 percent of the housing listings in each location said "no pets." But Wichita, Kan., emerged as one of the most accepting places, with less than 1 percent of the listings snubbing pets.

In some parts of the country Craigslist housing postings are an essential part of the real estate biosphere. New York is by far the leader in this regard (it had some 180,245 housing listings last Thursday).

Mr. Newmark said there were two reasons for that. "New York real estate is kind of a blood sport," he said, "and also, because our site is free, brokers tend to post a lot of redundant ads."

He said he hoped to address that problem in a matter of weeks by beginning to charge a fee.

Although Mr. Newmark has not studied how the number of housing listings fluctuates day to day, he believes they remain fairly steady on weekdays and drop off on weekends.

Boston had 45,880 housing listings last Thursday, and the San Francisco Bay Area had 32,295. In other places like Montana and Louisville, Ky., there were just a few hundred postings, and North Dakota had fewer than 100.

The New York listings include some of the most expensive, precarious sleeping arrangements in the country. A sofa bed in the living room/kitchen of a one-bedroom apartment on 55th Street between Eighth and Ninth Avenues is $683 a month. You could get a 780-square-foot one-bedroom cottage in Savannah, Ga., for $665 a month. A couch on the West Coast, in a Los Angeles apartment belonging to three actors, is merely $400 a month and includes utilities, cable, Netflix membership, Starbucks wireless membership and wireless Internet, as well as household staples like toothpaste and shampoo.

New Yorkers are also adept at constructing what the military calls a zone of separation. A woman with an apartment at Union Square posted a photograph, not of the bedroom she wanted to rent out for $1,150 a month, but of a large divider she planned to use to create the bedroom from part of her living room.

Near Columbus Circle, a "very small, but cozy space enclosed by tall bookshelves and bamboo screens" is listed for $1,700 a month. Potential occupants are advised that they must be older than 30 and cannot wear shoes inside the apartment, smoke, consume alcohol, invite guests over or have "sleepovers."

A plethora of "no smokers" statements in the New York housing listings make it appear that the public smoking ban has infiltrated private spaces, too.

But while cigarettes are a deal breaker for some, a number of Craigslist users across the country (Denver and Boulder, Colo.; San Francisco; Boston; and Portland, Ore., to name but a few) say that they are "420 friendly," slang for marijuana use. References to 420 were nonexistent in other cities, including Little Rock, Ark.; Santa Fe, N.M.; and Boise, Idaho.

There are also myriad references to amenities, everything from the use of old record collections and video games to a trapeze suspended in a Brooklyn loft. A posting for a room for rent in Detroit lacks images of the property, though there is a photograph of the L.C.D. television.

And if nothing else, Craigslist housing postings in the United States confirm the zaniness of the hunt and provide a taste of the free-spirited, random connections that have always been part of the experience.

A posting in Asheville, N.C., says that two 21-year-old women are planning to drive almost 20 hours to Austin, Tex., this summer, where they will rent a two-bedroom apartment for $550 a month. "We are looking for one or two (yeah, you can bring a buddy) cool people to ride out there and split an apartment with us," the listing reads. "Are you up for being spontaneous?"

Would-be Jack Kerouacs, take note: they hit the road at the end of the month.
http://www.nytimes.com/2006/05/07/re...07listing.html





More Questions Surface in the Wake of a Congressman's Bribery Case
Paul von Zielbauer and David Johnston

A federal investigation into one congressman's bribe-taking last year has produced a second round of inquiries into the actions of officials at the C.I.A. and the Homeland Security Department and of members of the House Intelligence Committee, government officials say.

These new inquiries reach beyond Randy Cunningham, the former Republican House member from California who was sentenced in March to more than eight years in prison for taking $2.4 million in bribes from military contractors. The investigations suggest a growing suspicion among some lawmakers that corrupt practices may have influenced decision-making in Congress and at executive-branch agencies.

Last month, The San Diego Union-Tribune and The Wall Street Journal reported that federal investigators were looking into whether the military contractors involved in Mr. Cunningham's bribery had also arranged limousines, poker parties and prostitutes for him at the Watergate and Westin Grand hotels here.

Law enforcement officials have confirmed these reports, and a manager at the Watergate has said the hotel was subpoenaed by federal officials seeking documents related to the poker parties. Calls to Mr. Cunningham's lawyer, K. Lee Blalack II, seeking comment were not returned.

The investigation has led to further official inquiries into who arranged and attended the poker parties and their connections to the military contractors who played roles in Mr. Cunningham's bribery.

The inspector general of the Central Intelligence Agency, the agency says, is conducting an inquiry into Kyle Foggo, its executive director, who said this week that he attended some of the parties over the years.

Mr. Foggo, the C.I.A.'s third-ranking official, is a longtime friend of Brent R. Wilkes, one of the military contractors whose role is described in the indictment against Mr. Cunningham. Mr. Wilkes has not been charged, and his lawyer did not return calls on Friday.

Mr. Wilkes is a business associate of Mitchell Wade, a military contractor who pleaded guilty in February to providing more than $1 million in bribes to Mr. Cunningham. Mr. Wade's lawyer declined Friday to discuss his client's role in the investigation.

A C.I.A. spokesman said Saturday that Mr. Foggo has said he did not violate agency rules in the awarding of contracts and that the poker games were nothing more than a gathering of friends. Mr. Foggo was promoted to his job at the C.I.A. by Porter J. Goss, who abruptly resigned Friday as director of the agency. There has been no suggestion by officials involved in these investigations that Mr. Goss did anything wrong or was under investigation.

The inquiry into the poker games has also put a spotlight on the limousine company that ferried Mr. Cunningham and others to the Watergate and Westin Grand. The company, Shirlington Limousine and Transportation, is operated by Christopher D. Baker, a man with a history of criminal convictions and financial troubles. Shirlington won a contract worth as much as $25.2 million to drive homeland security employees and officials around Washington.

Lawyers for Mr. Baker did not return calls seeking comment, and a message left with Shirlington Limousine's answering service on Saturday did not bring a response. The company is listed at several addresses in the region, including a post office box in Arlington, Va., and an apartment in a residential building in downtown Washington.

Shirlington provided 12 minibuses five days a week to drive homeland security employees among downtown offices, and 10 drivers to ferry department executives around the region in department-owned sedans.

F.B.I. agents have talked to Shirlington employees about driving Mr. Cunningham and prostitutes to hotel poker parties, and have interviewed women who work for escort services, said a lawyer involved in the investigation.

On Friday, Republicans and Democrats on the House Committee on Homeland Security announced that they planned to investigate Shirlington Limousine's contract.

"The information we've obtained raises a number of serious questions, from the contracting process to possible security concerns," said Representative Mike Rogers of Alabama, the Republican chairman of the House subcommittee in charge of management and oversight at the Department of Homeland Security. "The appearance of a lack of background checks on contractors is another troubling personnel issue at D.H.S. that we are examining."

In a draft letter to the inspector general of homeland security, to be sent Monday, Representative Bennie G. Thompson of Mississippi, the ranking Democrat on the Homeland Security Committee, asks why the department hired the limousine company and whether Shirlington's bid received preferential treatment. It seeks a list of official passengers.

Democrats on the committee said Friday that they plan to ask homeland security officials about the Shirlington contract in a May 18 hearing.

Larry Orluskie, a homeland security spokesman, said background checks were conducted on all Shirlington drivers before they were given access to department cars and officials. He stressed that the department does not use Shirlington's limousines and that it has been "absolutely satisfied" with the company since awarding it a contract in April 2004.

"The drivers are professional," he said. "The buses are always on time. The contract is just perfect."

In January, the top Republican and top Democrat on the House intelligence committee announced their own inquiry into whether Mr. Cunningham's bribery schemes had influenced the committee's business. The intelligence committee oversees the 16 intelligence agencies and their $44 billion annual budget.
http://www.nytimes.com/2006/05/07/wa...07inquire.html





Someone Has to Pay for TV. But Who? And How?
Randall Stross

THEY will take my remote control away only when they pry it from my cold, dead hands.

This thought followed my first reading of a patent application for a new kind of television set and digital video recorder recently filed by a unit of Royal Philips Electronics at the United States Patent and Trademark Office. The design appears to threaten the inalienable right to channel-surf during commercials or fast-forward through ads in programs you've taped.

A second, calmer reading of the patent application revealed that the proposed design would uphold the right to avoid commercials, but only for those who paid a fee. Those disinclined to pay would be prevented from changing channels during commercials. If the viewer tried to circumvent the system by recording the program and skipping the ads during playback, the new, improved recorder would detect when a commercial segment was being displayed and disable the fast-forward button for the duration.

As a business proposition, the concept appears dead on arrival: what consumer would voluntarily buy a television designed to charge fees for using it? When I spoke last week with Ruud Peters, the executive in charge of intellectual property at Philips, to learn how it would be pitched to consumers, he explained that the patent application had no connection to any Philips products in the pipeline. And, he explained, the notion of temporarily crippling the remote control to protect advertising is already out there and did not originate with his company.

But limiting remote controls is a possibility that could be realized in a new technical standard — M.H.P., for multimedia home standard — that the television industry is contemplating for the future. Neither broadcasters nor television manufacturers, whose joint cooperation would be necessary, have yet to adopt the standard. If the television industry embraced M.H.P., broadcasters could insert special signals to immobilize the remote control during commercials. If this came to pass, Mr. Peters said the Philips technology would "give consumers the freedom of choice" — "freedom" defined as exercising the option to pay a fee in order to regain the use of the remote control.

Philips's pay-to-surf proposal may be the first of its kind, but we should expect to see other ideas that would not have appeared in days past, when advertising-based television thrived. Today, the digital video recorder is slowly, but surely, tunneling through the television industry's foundation. Ten million homes had DVR's in 2005, according to Forrester Research; the number is expected to jump to 15 million this year, 30 million next year and 42 million in 2010. Scientific-Atlanta, which supplies set-top boxes to all the major cable companies, reports that fully half its boxes going out today are equipped with DVR's.

What this means for traditional advertising can be divined in data collected by TiVo, which has 4.4 million subscribers. Davina Kent, a TiVo vice president, said that when its customers watch recorded programs, they skip 70 percent of the commercials.

This has not escaped the notice of advertisers. Josh Bernoff, a principal analyst at Forrester, predicted that "next year, you'll see significant decline in TV ad spending as a result of digital video recorders."

The television industry has not figured out how best to respond. Four years ago, Jamie Kellner, then head of the Turner Broadcasting System, remarked in an interview in CableWorld magazine that viewers who used DVR's to fast-forward past commercials were committing "theft," then a moment later described it as "stealing the programming." He did allow trips to the bathroom as a noncriminal exemption.

The remarks brought instant criticism outside the industry. But he anticipated the adoption curve for DVR's when he said in the same interview that broadcasters needed to come up with a "new model" for collecting revenue from consumers who used recorders to skip commercials.

CBS OnDemand, which rents commercial-free episodes for a modest fee as low as 99 cents, but which must be viewed within 24 hours of downloading to a PC, is one experiment. (Those CBS downloads reveal just how much time commercials occupy in the traditional broadcast: with commercials stripped out, a 60-minute program may run as short as 41 minutes.) The abundant network program offerings at iTunes, which cost $1.99 but do not go poof after a set time, is a work in progress, too. An industrywide hardware standard that could immobilize remote controls, and the related Philips pay-to-surf proposal, are also in the mix of possible responses to the industry's quandary.

I have not paid close attention to the online offerings of single television episodes because my DVR works well and the fast-forward function on my remote works very, very well. (The button I've programmed to perform a 30-second skip is holding up beautifully, even though it is pressed as emphatically as a hospital button connected to a morphine pump.) Why would I ever buy what the DVR effortlessly records at no cost? Even if I were to feel a twinge of concern that by skipping ads, I am violating an implicit contract that Mr. Kellner asserted exists between broadcaster and viewer of ad-supported television, I take comfort in the knowledge that no such contract exists.

James Boyle, a law professor at Duke University, said that broadcasters offer a program knowing that only a fraction of the audience watches the commercials. Advertisers, he added, buy nothing more than "an option on a probability," and the viewer is no more obligated to watch every commercial than a driver is obligated to read every billboard.

The trickiest legal issue posed by DVR's is not ad-skipping, but something even more basic: the right to freely make a copy of a program for personal use in the first place. My assertion of an inalienable right to fast-forward through commercials would be rendered moot if the creators of the program that I am racing to rejoin were permitted to fully exercise the protections of copyright and impose control over the copying of their creative work.

Since the dawn of the videocassette recorder designed for home use in the mid-1970's, we have copied copyrighted television programs with impunity, enjoying the "fair use" exemption granted for this, a private, noncommercial purpose. The legality of home copying based on "fair use" was enshrined in a Supreme Court decision, Sony Corporation v. Universal City Studios Inc., handed down in 1984.

That decision addressed copying with a Betamax videocassette recorder, and it remains the key decision that protects copying with DVR's today. But the more one looks at how the court arrived at its decision in the Sony case — a 5-to-4 squeaker — and at how recording technology has changed and new business opportunities have opened since then, the more difficult it is to see how a majority of the court could possibly uphold the same position today.

The courts uphold "fair use" only when it doesn't harm the commercial value of the copyrighted work. At the time the suit was brought, skipping ads during playback on a clunky tape machine was hardly worth the considerable trouble. At the trial, survey data showed that only about 25 percent of recorded ads were skipped. In the face of testimony by Fred Rogers of "Mister Rogers' Neighborhood" on PBS, who welcomed home copying of his program, the movie studios that brought the lawsuit failed to convince the judge that VCR copying of televised movies was hurting their business.

WOULD indisputable evidence that DVR's facilitated ad-skipping make a difference if the Sony case were decided today? Paul Goldstein, a professor at Stanford Law School, thinks that it might. "If you were working with a clean slate, and everything was the same except for the ad-skipping rate — that's a compelling fact that could have made a difference," he said.

Randal C. Picker, a law professor of the University of Chicago, pointed to the commercial availability of network programs at places like iTunes as another enormously important change to be considered by the court if a case like Sony were litigated today.


How to pay for free television is the overarching but unanswered question, Professor Picker said. Speaking as a viewer, he said: "I want the other guy to watch advertising. But we can't all not watch."
http://www.nytimes.com/2006/05/07/bu...ey/07digi.html





Legalise Personal Music Copying, Says BPI
Andrew Murray-Watson

The British music industry is to recommend to the Government that consumers be allowed to legally copy music without fear of prosecution.

The BPI, the body that represents British record companies, believes copyright on CDs and records should be changed to allow consumers to copy music if it is for personal use. Currently, it is technically illegal for anyone to copy a CD onto their computer for the purposes of downloading music onto their own portable music player.

In its submission to the Gowers Review - the independent review body set up by the Treasury to examine the UK's intellectual property framework - the BPI has asked for the issue of this area of music copyright to be addressed.

It is believed the organisation, which represents the likes of EMI and Sanctuary, prefers the option of altering copyright protections on music without the requirement for a change in legislation.

The BPI has vigorously prosecuted consumers who share music illegally over the internet using peer-to-peer (P2P) websites. It wants the current legislative protections to remain in place for these music "pirates", but believes allowances should be made for individuals who simply want to copy music for their own use.

"This is about the UK music industry responding effectively to the changing way music is consumed," said a senior industry figure yesterday.

If Gowers endorses the BPI's preferred solution to the issue of copying music, it will lead to one of the most significant changes in UK copyright law in decades.

Some of the UK's existing music copyright laws date back nearly 100 years, to the days when the gramophone was cutting-edge technology.

The Gowers Review, led by Andrew Gowers, the former editor of the Financial Times, will look to update a raft of antiquated laws and address the contentious issue of artists losing copyright protection on recorded music after 50 years.
http://www.telegraph.co.uk/money/mai...ixcitytop.html





Thermal Greasy: Apple Sics Lawyers on Something Awful

After a Something Awful denizen took apart his MacBook Pro and discovered that Apple had slathered on far too much thermal grease, he found that using a more modest amount dropped his MacBook Pro’s temperatures by several degrees. Now the forum has recieved a threatening letter from Apple’s legal staff, requesting a link to this image [pictured above] be removed because “The Service Source manual for the MacBook Pro is Apple’s intellectual property and is protected by U.S. copyright law.”

Of course the real problem isn’t the single excerpted page being linked from Something Awful, but instead the fact that the image shows the extremely sloppy manufacturing process that is causing the MacBook Pro to run at temperatures as high as a 95 degrees Celcius under full load. (A temperature so high that the processor is at risk of malfunctioning.) Rather than addressing the problem of the shoddy workmanship, documented not only by those who purchased Apple’s $2,500 laptop but by Apple’s own service manual, Apple is trying to silence those from the Macintosh community who are trying to help other Mac users fix Apple’s mistake.

My MacBook Pro has the problem with the whining screen, too. Perhaps I’ll wait until they acknowledge the sloppy application of the thermal grease before I go in to request repair. In the meantime I will keep telling people how much I love using my Mac while silently questioning my devotion to a company who would rather use the law than service to assuage their customers’ complaints.
http://www.gizmodo.com/gadgets/lapto...ful-171394.php





D’oh!

New Disclaimer
David Canton

Rob Hyndman had a post yesterday that said: I’m so impressed with the artistry of this disclaimer that I may just have to find a way to work it into the technology contracts I draft.

Rob linked to an amusing but clear rock climbing disclaimer.

I took that as a challenge, and offer below an amended version for technology contracts. I'm sure it can be improved upon (this calls for a wiki).

Read Rob's post and the rock climbing disclaimer


WARNING
Business is unpredictable and unsafe. The Internet is dangerous. Many blogs have been written about these dangers, and there's no way we can list them all here. Read the blogs.

The Internet is covered in slippery slopes with loose, slippery and unpredictable footing. The RIAA can make matters worse. Patent trolls are everywhere. You may fall, be spammed or suffer a DOS attack. There are hidden viruses and worms. You could break your computer. There is wild code, which may be vicious, poisonous or carriers of dread malware. These include viruses and worms. E-mail can be poisonous as well. We don't do anything to protect you from any of this. We do not inspect, supervise or maintain the Internet, blogsphere, ISP’s or other features, natural or otherwise.

Real dangers are present even on the Web. E-commerce is not the mall. It can be, and is, steep, slippery and dangerous. Web features made or enhanced by humans, such as firewalls and spam filters (if any) can break, collapse, or otherwise fail catastrophically at any time. We don't promise to inspect, supervise or maintain them in any way. They may be negligently constructed or repaired. The web is unsafe, period. Live with it or stay away.

Stay on trusted sites whenever possible. The terrain, in addition to being dangerous, is surprisingly complex. You may get lost. Carry food, water and an APU at all times.

Ads for things you don’t want and other objectionable content can arrive from nowhere. This can happen naturally, or be caused by people around you that are being used as bots. Spam and disgusting images of all sizes, including huge images, can arrive, or pop-up with no warning. Use of spam filters is advised for anyone approaching the Internet. They can be purchased or rented from us. They won't save you if you get hit by something big or on a port you left open. A whole DOS attack might collapse on you and squash you like a bug. Don't think it can't happen.

Public opinion can be dangerous, regardless of the forecast. Be prepared with extra damage control, including press releases. Ticking off the blogsphere can kill you. The Streisand effect can turn a simple nastygram into a deathtrap.

If you make hasty comments about those in high places (making unsupported comments that reduce the image of a person, often posted quickly and without thinking) without proper thought and, or allow your employees to do so, you are making a terrible mistake. Even if you know what you're doing, lots of things can go wrong and you may be sued for libel. It happens all the time.

We do not provide rangers or security personnel. The other people on the web, including other visitors, our employees, agents, and guests, and anyone else who might sneak in, may be stupid, reckless, or otherwise dangerous. They may be mentally ill, criminally insane, drunk, using illegal drugs and/or armed with deadly malware and ready to use them. We aren't necessarily going to do anything about it. We refuse to take responsibility.

If you surf at work, you may become pre-occupied with it. This is true whether you are experienced or not, trained or not, equipped or not, though training and equipment may help. It's a fact, surfing at work is extremely dangerous. If you don't like it, surf at home. You really shouldn't be doing it anyway. We do not provide supervision or instruction. We are not responsible for, and do not track how much time you surf at work (although we could if we wanted to.) As far as we know, your employer may find out and send you plunging to unemployment. There are countless tons of loose management staff ready to be dislodged and fall on you or someone else. There are any number of extremely and unusually dangerous conditions existing on and around the Web, and elsewhere on the Internet. We may or may not know about any specific hazard, but even if we do, don't expect us to try to warn you. You're on your own.

Rescue services are not provided by us, and may not be available quickly or at all. Local computer geeks may not be equipped for or trained in hard drive recovery. If you are lucky enough to have somebody try to get rid of a virus or find that deleted file, they may be incompetent or worse. This includes your local computer store. We assume no responsibility. Also, if you decide to participate in a rescue of some other unfortunate, that's your choice. Don't do it unless you are willing to assume all risks.

By entering our site, you are agreeing that we owe you no duty of care or any other duty. We promise you nothing. We do not and will not even try to keep the premises safe for any purpose. The premises are not safe for any purpose. This is no joke. We won't even try to warn you about any dangerous or hazardous condition, whether we know about it or not. If we do decide to warn you about something, that doesn't mean we will try to warn you about anything else. If we do make an effort to fix an unsafe condition, we may not try to correct any others, and we may make matters worse! We and our employees or agents may do things that are unwise and dangerous. Sorry, we're not responsible. We may give you bad advice. Don't listen to us. In short, ENTER AND USE THIS SITE AT YOUR OWN RISK. And have fun!
http://www.canton.elegal.ca/archives...isclaimer.html





Welcome to the New Dollhouse
Seth Schiesel

AROUND lunchtime one recent Sunday, Francesca Rookwood, 9, and her brother Richard, 6, were hard at play in Pelham, N.Y., renovating the four-bedroom house they share and picking up after the wayward family they look after.

"Who left food on the floor?" Francesca sighed, turning toward Richard and almost rolling her eyes.

"It wasn't me," he said quickly. "It was probably Francine."

Francesca picked the microwave dinner up off the kitchen floor and put it back on the table. "Yeah, you're probably right," she said. "Francine can be a little messy."

Francine is Francesca and Richard's mother, but that's not who they meant. Instead, the children were referring to the other Francine — the matriarch not of their flesh-and-blood family but of their family in The Sims, the wildly successful computer game that has found its most fervent audience among millions of children across the country.

Francesca and Richard have been playing the game since last fall and within its electronic confines have built a fantasy world that looks surprisingly similar to their own. Comfortable suburban home. Parents named Mark and Francine. Children named Francesca and Richard. Antique French sofa in the entry hall. Lots of leopard-skin patterns scattered about the house.

At the moment, the suspected food-dropper — call her Sim Francine — was coming out of the shower and trying to decide whether to take a nap. Sim Mark was working out in his new home gym. Naturally, Sim Francesca and Sim Richard were at school.

As the small animated characters move through their daily lives, they evoke living dolls.

As far as we know, children have always played with dolls of one sort or another to act out variations on their own lives, or lives they observe or imagine. Today, a vast and growing number of kids are doing the same thing — but with a very new tool. Instead of dolls, they are using video games. And perhaps most of all, they're using The Sims.

Some video games let players battle aliens or quarterback a pro football team; The Sims drops the player into an even more fantastic environment: suburban family life. Each Sim, as the characters are known, is different — one might be an old man, one might be a young girl; one is motivated primarily by money, for instance, while another may want popularity — and it's up to the player to tend to those needs. As in real life, there are no points in The Sims and you can't "win." You just try to find happiness as best you can.

And though video game players are often stereotyped as grunged-out, desensitized slackers, it is the nation's middle-class schoolchildren, particularly girls, who have helped make The Sims one of the world's premier game franchises, selling more than 60 million copies globally since its introduction in 2000.

"I like Sims more than other games, and Sims is way more fun than TV because TV gets so boring — you just stare at a screen and watch and watch and watch," Francesca said in her (real) airy playroom as she tinkered with the layout of the new (imaginary) home office she was designing on the monitor connected to her Dell computer. "But in The Sims you make your own characters and give them a personality and give them stuff and build their houses and make them live."

Standing at Francesca's side so he could see the screen more easily, Richard said firmly: "Making characters is a lot more fun than watching TV. And with commercials you have to wait. I don't like to wait."

In the impeccably maintained real-life Rookwood household, there was no food on the floor, or on the stove for that matter, so Francine Rookwood, 44, ordered pepperoni and mushroom pizza. "Initially I was a little concerned because it is rated T for Teen and Francesca said she had tried it at a friend's house and I was concerned that she had done that without checking with me first," she said after the pizza showed up. "But then I looked into it and now I don't mind them playing this game at all. Actually, it seems to have some value for them. And I'll tell you, she used to really be into dolls, like Barbies and the Bratz dolls; once The Sims came along the dolls were done. And I mean done."

Mark Rookwood, 46, a currency trader in Manhattan, didn't seem to have had any initial reservations. "The entire concept seems very creative," he said. "It seems as if it teaches them a lot about the different motivations and desires people have in life and it shows some of the frustrations of running a household. In other games you see a lot of violence and we're not into that as a family. But it's interesting to see how they react to things with The Sims that normally a parent would have to deal with, like if one of their Sims doesn't want to go to school or is messy or if there are conflicting desires in the family."

As Francesca explained: "They need to take care of fun, comfort, hygiene, food, room, energy, bladder and social life."

"And is it hard to keep them happy?" her mother asked.

"Yeah, it's hard because they have a lot of different desires and they don't always listen," Francesca replied.

"Ah, so it's frustrating sometimes when they don't listen?" said Mom, with only the faintest hint of amusement. Francesca nodded. "O.K. then," and finally a chuckle. "Keep that in mind."

Not every parent is so comfortable with the game. Miranda Saylor, a 14-year-old who lives in Montclair, N.J., has played The Sims since shortly after its introduction. But her father, Durston Saylor, an architecture photographer, said he was still a bit baffled by it.

"I think it's a little more stimulating than television and I don't think it's harmful, but I still don't like it very much," he said. "I've never quite understood what the pleasure is of constantly monitoring the characters' various emotional and financial thermometers to make sure they're getting enough food and happiness to keep your characters buzzing around."

"That is kind of what life is," Mr. Saylor said. "But the difference is that in real life it's happening to you and when you're in a relationship you feel real pleasure, and it's not this vicarious thing like it is with The Sims."

AMONG psychologists and education experts, it is widely accepted that playing with dolls is a safe and perhaps even essential part of self-discovery and growing up for many children, especially girls. Now, some of those experts are catching on to how quickly video games are moving into the territory formerly dominated by a slim blonde named Barbie.

"It's not that surprising when you look at the game," said James Paul Gee, an education professor at the University of Wisconsin who directs a program that studies the intersection of learning and gaming among both adults and children. "It's a great resource for them to design and think about relationships and social spaces."

"We leave most of the social work in our society to women and The Sims lets young girls, in particular, work out their desires and conflicts about those relationships," said Professor Gee, whose team has formally interviewed about 100 children and included more than 50 others in continuing projects during the four years they have studied video games. "Rather than calling it a dollhouse, it's like they are writing their own interactive stories in The Sims to do what novelists do, which is explore personal themes about social relationships. And they have fun doing it."

When adults or older adolescents play The Sims, it is often with the slightly perverse goal of seeing just how dysfunctional or outlandish a household they can create — "Three's Company" meets "Peyton Place," perhaps, with maybe a little "Brokeback Mountain" sprinkled in. But when children play, they usually try to make healthy "normal" families, often modeled on their own lives.

As to how the stories that children create when playing The Sims differ from those in traditional doll play, there appear to have been no serious studies.

Caitlin Kelleher, a doctoral candidate in computer science at Carnegie Mellon University, helps to run a program that uses interactive storytelling software to encourage girls to pursue computer programming. Over the past two and a half years, about 300 girls have passed through the workshop.

"One of the things that children and adolescents really deal with is trying to figure out who they are as people and what their values are," she said. "One of the ways they do that is by role-playing through different social situations. Figuring out their reaction to those situations helps them understand their values and priorities. Things like The Sims help them make that thought process concrete. By creating actual characters that they can see and manipulate, the game becomes a tool through which they can explore these life issues and issues of identity."

Naturally, the young players don't describe their favorite game in quite those terms, but they say basically the same thing.

Fresh off the miniature golf links at Walt Disney World in Florida last month, Meghan McGoldrick, 12, also from Pelham, explained by cellphone why she switched from dolls to The Sims two years ago.

"You can't really develop the dolls," she said. "But in the Sims you're building the houses and putting the characters into different situations. You can actually decide what you want to happen and it's more descriptive when you're playing it because you can see what the characters are really doing. And also you can see how they get older and how they grow over time."

Asked what he had learned from the game, Meghan's brother, Conor, 10, was blunt: "I learned don't leave your baby crying or people will come take your baby away."

Boys certainly play The Sims, but more than half of the game's players are female, according to Electronic Arts, the game's publisher. That is a huge anomaly in an industry in which fewer than 25 percent of video game players are women; for many of the more violent and intense games that figure falls to less than 5 percent.

The popularity of The Sims among girls dovetails neatly with some researchers' ideas about the fantasy lives of kids. "Children generally want to create characters, but with girls we see them wanting to create a friend," said Marjorie Taylor, head of the psychology department at the University of Oregon and author of "Imaginary Companions and the Children Who Create Them" (Oxford, 1999). "It might be expressed through a doll or something like The Sims or be completely imaginary, but with a girl that character is often going to be someone just like them, another girl that they can relate to."

"But with boys," she said, "they are often more interested in actually taking on a pretend identity. Rather than it being a character outside themselves, boys want to create a character and actually inhabit it."

Why might The Sims take girls where no other video game has gone before? Will Wright, its creator (and long one of the luminaries of game design) has a few theories. "To start, I think women are much more discriminating in general than men in their choice of entertainment experience," he said. "Men will do the same stupid thing over and over again and be happy. Women tend to want a more complex, creative experience. And The Sims appeals to that."

"Also," he said, "if you look at movies and books and television, many of the most successful properties are set in normal contemporary situations. And I don't really understand why we don't have more games like that. So if you look at boys and men, there are a lot of games that appeal to them, but it seems like women have fewer choices."

(In Mr. Wright's next big game, called Spore, players will create an entire species from scratch and guide it through billions of years of evolution. As with The Sims, Spore, due out in the next year or so, will enable players to define their own goals and style of playing, rather than navigate a set of predefined obstacles.)

BUT the very characteristics that appear to make The Sims popular among girls — free-form game play and everyday setting — may also help explain why many girls stop playing The Sims once they actually start living young adult lives. The game as training ground gives way to the real thing.

Anna Harbaugh, 18, a freshman at the University of Oregon (and Professor Taylor's step-daughter), said she started playing The Sims regularly when she was around 15 but stopped fairly abruptly halfway through her senior year of high school, around the time guys entered the picture.

"The Sims was really an important part of my life for a few years," she said. "But I stopped because real life started to get more interesting, so at that point games like that started to seem a little bit less relevant. Around that age is when my social network started expanding and that kind of interaction was no longer something you had to practice in The Sims."

To some researchers, stories like Ms. Harbaugh's are as demoralizing as they are revealing. "Modern girls are very interested in video games, but then when they get toward high school they start to gravitate away because they begin to think that boys don't like girls who play games," said Professor Gee. "They give up their interest in video games around the same time they give up their interest in science and math and that's a real problem because boys use video games to foster an interest in technology, and if girls give that up we're going to continue to see a real gender imbalance in these areas."

Ms. Kelleher of Carnegie Mellon said her research with school-age girls made much the same point. "If you walk into a room full of girls and ask them, 'Who wants to learn to program computers?' you don't get very many hands," she said. "But if you ask them, 'Who wants to learn how to make a movie like Pixar or perhaps something like The Sims?', you get a very different response. And fundamentally, those two activities can be the same thing."

Back in Pelham, Francesca Rookwood wasn't thinking about such broad issues as she and her brother picked out a new leopard-pattern rug for her parents' bedroom.

"It's just I never saw a game like this before," she said. "You get to make the game however you want it to be, and I like that. I like making the characters and the houses and taking care of them. I'm really happy they made this game. I just wish there were more games like The Sims."
http://www.nytimes.com/2006/05/07/ar...=1&oref=slogin





Sen. Obama Gets Neil Young's Endorsement
AP

Rocker Neil Young may want Sen. Barack Obama to run for president, but the freshman Democratic senator from Illinois isn't having any of it - at least not yet.

In his latest album, "Living With War," Young mentions Obama in the song "Lookin' for a Leader." In it, Young sings of the nation's need for a new leader, singing, "Yeah maybe it's Obama, but he thinks that he's too young."

The 44-year-old Obama said at a news conference before a fundraiser Saturday that he had read the lyrics. But despite being name-checked by a Rock and Roll Hall of Famer, Obama said he has no intention of running for president in two years.

That doesn't mean Obama is dissing Young completely: "I'm a big Neil Young fan," Obama said.

He and Young met in Chicago at last year's Farm Aid concert. Obama said he sat in a trailer while Young rehearsed the song "Southern Man."

"The acoustics in a trailer are terrific. It was unbelievable. ... It was one of the best times that we've had since I was a senator," Obama said.

For his part, Young doesn't pin all his hopes on the Illinois senator. In the same song, Young says the needed leader may also be a woman, possibly a reference to Sen. Hillary Clinton of New York.
http://news.newstimeslive.com/story....egory=Politics





Isabella Rossellini's Tribute to Her Father, Cinema's Great Neorealist Talking Belly
Caryn James

The groundbreaking Italian director Roberto Rossellini was born 100 years ago today, which makes him sound like a dusty relic. Yet he learned firsthand the perils of the age of celebrity in 1949, when Ingrid Bergman (married to someone else) became pregnant with his child, the couple's fame turned to infamy and they were effectively exiled from Hollywood.

All these years later, at least one of their children has failed to calculate how media attention can boomerang. Ingrid Rossellini has complained publicly about "My Dad Is 100 Years Old," a short film written by and starring her twin sister, the actress Isabella Rossellini, and directed by the innovative Canadian filmmaker Guy Maddin. Ingrid has said that the impressionistic film, in which her father is depicted only as a giant, pillowy tummy, is an inappropriate tribute for his centennial: remarks that were reported around the world, calling attention to a tiny film that might otherwise have been ignored.

Inadvertently, she did film lovers a big favor. "My Dad Is 100" is an affectionate, playful and above all artful work, which displays Isabella Rossellini's emotional attachment to her father, and presents a savvy little description of his films and his reputation. Isabella is the twin who understands fame and how to use it.

"My Dad" will be shown tonight at 7 on the Sundance Channel, followed by Roberto Rossellini's 1945 classic of neorealism, "Open City." A DVD of the short film will also be included with a slight but charming companion book by Isabella, "In the Name of the Father, the Daughter and the Holy Spirits: Remembering Roberto Rossellini" (Schirmer/Mosel, $35, to be published on May 24).

In the 17-minute black-and-white film, Isabella Rossellini appears as herself, speaks her father's words, and also portrays characters including Alfred Hitchcock, Federico Fellini and her own mother. (The twins were born two years after their parents married; the scandalous pregnancy produced their older brother Roberto.) Offering not a biographical document but her interpretation of her father, she describes a childhood in which he seemed the maternal figure; she liked to cuddle against his belly and he pretended to be a mother sow.

The other filmmakers she portrays debate the talking belly about their opposing philosophies of what movies should do. Rossellini, who died in 1977, was more influential than popular, capturing reality in the most straightforward manner possible in films of social conscience like "Open City," with Anna Magnani as a woman resisting the Nazis.

On a set that looks like an old movie theater, the Isabella-as-Hitchcock figure argues that films are about storytelling; her David O. Selznick character says they are entertainment; most important, Fellini (one of the screenwriters of "Open City") talks about the dreamlike quality of his films, only to be called a cinematic traitor by Rossellini, the neorealist tummy.

Mr. Maddin himself is a most Felliniesque director, and one of Isabella Rossellini's smartest moves was to get him to collaborate on "My Dad." Why try to mimic her father's realism, an approach that could only seem derivative? Steeped in and evoking old movies, Maddin films (like "Dracula: Pages From a Virgin's Diary") operate on a kind of dream logic. Isabella Rossellini appeared in his 2003 black comedy, "The Saddest Music in the World," in which she plays a wealthy woman who has glass legs filled with beer and somehow makes them seem glamorous.

Like Rossellini's films, though, Mr. Maddin's are stylistically pure and polarizing. Viewers have been known to walk out of a Maddin film in confused irritation, and to leave a Rossellini film bored to death. "My Dad" acknowledges as much. In her own voice Isabella Rossellini looks at the camera and says she thinks her father was a genius, but not everyone agrees. "Indeed, they are very slow," she says of his films. "Yet their simplicity and starkness move me profoundly."

At the end, as we peer down at the grown Isabella reclining against her dad's belly, she looks up and scolds the camera for its arty, unnatural angle, saying her father would have called it immoral. She instructs the camera to come back to eye level and his "perfectly simple Rossellini framing."

Mischievous and witty, "My Dad" coexists perfectly well with films like "Open City," and even includes a glimpse of that film's climactic scene. (The short will also be included in the Museum of Modern Art's major Rossellini retrospective later this year.)

"My Dad" is not just a tribute to Rossellini, but to the rich variety of moviemaking itself. The film's most poignant, honest moments mingle fantasy and realism, family and Hollywood history. When Isabella plays her mother, whom she strikingly resembles, Ingrid Bergman is dressed in gleaming white, gazing down at her daughter from a tattered movie screen.

Isabella, dressed in black, looks up and tells her mother, "Some say that father destroyed your career."

Ingrid Bergman — at once Mama and icon — serenely replies: "No, he didn't destroy my career. I destroyed his."

This is, of course, a conversation that Isabella Rossellini is having with herself, and its unanswerable question could lead everyone in circles forever. It also represents the film's fanciful, eloquent acknowledgment that as a way to emotional truth, realism has nothing over dreams — even if Roberto Rossellini might have disagreed.
http://www.nytimes.com/2006/05/08/movies/08ross.html





For Heaven's Sake, Don't Touch the Mona Lisa
Alan Riding

THE Louvre is silent. Lights are dimmed and security cameras activated. In the Grande Galerie, masterpieces from the Italian Renaissance are mere shapes in the gloom. In the adjacent Salle des États, Leonardo da Vinci's "Mona Lisa" smiles to herself. Then, shortly after 11 p.m., footsteps are heard and a senior museum official appears.

No, Henri Loyrette, the president-director of the Louvre, is not gunned down by an albino Opus Dei monk. But everything else resembles the opening scene of "The Da Vinci Code." In fact, only last July, a naked corpse did lie nearby on the parquet floor, as Ron Howard began filming the screen adaptation of Dan Brown's best-selling novel inside Europe's greatest museum.

The much-awaited movie, which opens the Cannes Film Festival on May 17, will be released around the world on May 19. And, not for the first time, the Louvre will be in the spotlight. The novel's popularity helped to bring a record 7.5 million visitors to the museum last year. Now, Mr. Loyrette is bracing for still more.

As it happens, not everyone in France thought it proper for the venerable Louvre to hire out its space to a $125 million Hollywood blockbuster, particularly since the novel was rife with mistakes about the workings of the museum and even the geography of Paris. But Mr. Loyrette, who lives with his family in an apartment in the Louvre, was unfazed.

"This is not the first time a film has been shot here," he said, striding down the 930-foot-long Grande Galerie one Thursday night in late April, two security guards in his wake. " 'Belphégor, Phantom of the Louvre' with Sophie Marceau was made here. Others too. But we've never had a film as large as this. It was complicated. It involved enormous preparation. But things worked out very well."

Naturally, the Louvre charged a fee, which the museum and the production have so far refused to divulge. It also laid down strict conditions and mobilized a score of curators and guards to ensure that they were respected. No equipment was allowed into the museum during open hours, which meant filming took place overnight, with external lights sending "moonlight" through the windows. More critically, no artwork could be touched or lighted directly, equipment had to be kept at a safe distance from paintings, no "blood" or mystical drawings could mark the wooden floors, even food and drink for the production crew were banned.

Oh, yes, and no filming of "Mona Lisa," in the Salle des États, where Leonardo's small oil looks out toward Veronese's immense "Marriage at Cana."

But Mr. Howard had no complaints. "The restrictions were daunting cinematically, but totally understandable," he said in a telephone interview from New York. "And we were able to work our way around them. At first, the curators were kind of nervous and then later realized we were true to our word. We didn't have a single disagreement. They were always very positive about it."

In the end, he said, even the prohibition on lighting the paintings brought unexpected results. "The very low light levels led us to create this very mysterious kind of ambiance, very eerie and absolutely appropriate," he explained. "When we moved the camera toward the art, it would kind of emerge and reveal itself. It turned out to be a creative blessing."

In adapting a novel that blurs fantasy and reality, it was a coup to be able to film the book's first 100 or so pages in their original setting, starting when the story's curator, Jacques Saunière, played by Jean-Pierre Marielle, races through the Louvre's Denon Wing before being shot by the albino monk Silas, played by Paul Bettany.

True, Mr. Marielle was not allowed to tear down Caravaggio's "Death of the Virgin" in order to trigger the descent of an iron gate. In reality, there is no iron gate.

No matter. The real point was to have three of the movie's stars there in the Grande Galerie — Tom Hanks as the "symbology" professor Robert Langdon; Audrey Tautou as Saunière's cryptographer granddaughter, Sophie Neveu; and Jean Reno as the police inspector Bezu Fache — all in the company of Leonardo, Raphael, Titian, Tintoretto, Caravaggio and other greats.

Additional Louvre sites were also used: exterior shots of its imposing courtyard, the Cour Napoléon; I. M. Pei's famous glass pyramid, which serves as the museum's main entrance; and, for the story's denouement, the inverted glass pyramid inside the Carrousel du Louvre shopping mall.

Such was the scramble of squeezing in six hours of filming a night, Mr. Howard said, that he often ran from one part of the Louvre to another. Even so, there were moments when the art imposed itself.

"Tom Hanks and I found ourselves standing in front of 'Mona Lisa,' " he recalled. "There was a guard but it was really just the two of us. We looked at each other and said, 'Well, we did all that underwater work for 'Splash' and weightlessness for 'Apollo 13.' Those were great adventures. But at this point in our lives, we appreciate this as much as those experiences.' It was fantastic."

Without a film crew standing by, the museum's mood on this April night is still more tranquil. Mr. Loyrette recalls frequent visits to the Louvre as a child, and often joins the night watchmen on their tours. Now, after also pausing before "Mona Lisa," he leads the way through sculpture galleries. At the top of a wide staircase, the Louvre's other tourist favorite, "The Winged Victory of Samothrace," hovers in the dark like a giant headless eagle.

For the movie production, two weeks of shooting at the Louvre still left a fair amount to be recreated at Pinewood Studios outside London. Only there, for instance, could Mr. Howard show Saunière grabbing the Caravaggio (a smaller copy of the original) before bleeding to death. There too, Sophie was able to find hidden writing on the glass protecting "Mona Lisa" as well as an embossed key behind Leonardo's "Madonna of the Rocks" — both paintings also copied for the occasion.

Imagination was again required to depict the other crucial Paris location, the Church of St.-Sulpice. In the novel's account of the search for the Holy Grail, it is here that Silas the Monk digs for clues. Two years ago, though, with the novel already a hit in France, this church signaled distaste for its sudden notoriety with a notice in French and English. And it is still there.

"Contrary to fanciful allegations in a recent best-selling novel, this is not a vestige of a pagan temple," it begins. "No such temple ever existed in this place."

So the movie production did not even ask to film inside the church, opting instead for some exterior shots. More cooperative was Olivia Hsu Decker, a California real estate agent who owns the 17th-century Château de Villette, which in the novel is the home of the eccentric English art historian Sir Leigh Teabing, played in the movie by Ian McKellen.

In Britain, where the plot then moves, there was no less a need to be visually convincing. And there the production was able to film inside the 12th-century Temple Church in London and at the 15th-century Rosslyn Chapel in the Scottish village of Roslin, both packed with symbols deemed relevant to the story.

"But Westminster Abbey declined to have us shoot inside," Mr. Howard noted, referring to an important scene involving the ornate tomb of Sir Isaac Newton. "So we recreated Newton's tomb and shot it in Lincoln Cathedral. These cathedrals were built around the same time, so we were quite pleased with the match."

For some prelates, the novel's premise — that Jesus married Mary Magdalene and fathered a child with her — is too much to digest. Indeed, anticipating the movie's release, the Archbishop of Canterbury, Dr. Rowan Williams, in his Easter address last month, referred to the novel as "cynical," while a senior Vatican official, Archbishop Angelo Amato, has called for a boycott of the film, describing the book as "stridently anti-Christian."

The Louvre, though, had no such problems.

"It's a thriller," Mr. Loyrette said.

He shrugged off the description of Saunière still working at 75; all French curators must retire at 65. He felt confident that anyone entering the Louvre illicitly — like Silas — would be immediately spotted. And, standing before Caravaggio's "Death of the Virgin," an 8 feet by 12 feet oil in a heavy frame, he seemed amused to learn that the novel has it thrown to the ground by an old man.

Did that mean he had not read the book?

"The truth is," he said with just a hint of embarrassment, "with all the excitement around the film, I am constantly asked if I have read it. I say no and it stops there. But if you say you have read it, they want to know what you thought of this and that moment. It's simpler this way."

He paused and looked down the magnificent length of the Grand Galerie.

"But I will go and see the film," he added with a smile.
http://www.nytimes.com/2006/05/07/movies/07ridi.html





SuprNova.org: The Story of a Legend
Michael Ingram

Despite the domain being on sale for over a week, there has been no news or discussion on the apparent end to the once all-powerful BitTorrent site, Suprnova.org. Nobody even noticed, and if they did, they decided the news was not worthy or reporting to the world.

It was not always this way, once upon a time SuprNova was as much part of BitTorrent as the client itself, serving up torrents to 420,000 unique visitors a day. Without question, the site revolutionised the dynamics of internet traffic.

The Birth of a Legend

The story beginnings in Ljubljana, the beautiful capital of Slovenia, with a local teenager called Andrej Preston. Preston was one of the first to start using BitTorrent when it debuted in 2002.

At the time there were only about half-a-dozen all-purpose BitTorrent sites, but Preston was quickly hooked on the technology. Inspired by the now defunct BitTorrent websites Donkax.com and Turok.info, he decided to begin a BitTorrent site of his own in late 2002.

Being a huge Star Trek and sci-fi fan, Preston wanted to name the website Supernova, but the domain name was already taken, hence SuprNova, the universal BitTorrent source, was born.

As the administrator of this new site, Preston used his internet pseudonym Sloncek, which is a derivative of his childhood nickname “Slonček”, meaning “Little Elephant” in Slovenian.

The site was originally hosted on a Linux box connected to a basic domestic broadband line at Sloncek’s home address. With the aid of Microsoft FrontPage, Sloncek painstakingly uploaded every torrent to the website manually.

The foundations were rocky, but curiosity in the site and BitTorrent in general was stirring. Having spammed his favorite internet forums and all over IRC, interest in SuprNova was rising. While other site administrators got tired of the upkeep their sites demanded, Sloncek continued to put in the hard hours. To help, the MPAA began sending threatening letters to the owners of BitTorrent sites, giving SuprNova almost monopoly control of the market.

It was not long before SuprNova outgrew the Linux box, which had a measly upload of 16kb/s. For comparison, the modern day Mininova peaks at nearly 10,000kb/s.

Laying The Foundations

It was June 2003. Random Nut’s Kazaa Lite K++ was the file sharing client of choice and the Ares network population was struggling to break past the 10,000 mark. The RIAA had just publicized their intention to collect evidence for their first round of lawsuits and more and more file sharers were discovering the joys of BitTorrent.

To handle the expediential growth, SuprNova was fully upgraded. A new script automatically uploaded new torrent submissions to the site and another script regularly checked trackers in order to produce seed and leech statistics.

The website was otherwise minimal. Originally SuprNova gave detailed information about each torrent, such as the tracker used and details of each file within the download, but this was later dropped. Only the torrent name, the total file size, the number of seeds and leeches and a URL to more information was offered. It was simple, but loved for it.

SuprNova had one more trick to play. To overcome the problem of hosts shutting down the site after each letter from the MPAA, SuprNova also began using a unique system of mirrors. Hosts, which were paid for by SuprNova or donated by users, acted as either a server for the SuprNova webpage, or a server for the torrent files. Both were controlled and updated by a central server.

It succeeded in what is was meant to do. Hosts would come and go, but SuprNova stayed online in the long term.

The system was far from perfect and suffered frequent short-term downtime. Furthermore, the database of torrents could not even be searched within SuprNova.org until nearly a year later, in April 2004.

Despite the troubles, the timing of the upgrade was perfect. The site now had everything it needed to boom.

Boom and Bust

The site gained a reputation of completeness and integrity. Thousands of people submitted tens of thousands of torrent files. The fakes were all weeded out by a group of only 20 moderators. Their job was made easier with unmoderated submitters, who had gained the trust of the moderators, so could publish torrents directly to the front page.

As part of a study into BitTorrent and SuprNova by J.A. Pouwelse, et al. at Department of Computer Science, Delft University of Technology in the Netherlands, researchers attempted pollute SuprNova with fake files, but failed to get any past the moderators.

8 months after the upgrade, SuprNova was receiving 675,000 visits per day. 4 months later, daily visitors reached 830,000, and another 4 months after that, the figure was over 1.2 million.

By this time it was November 2004. On the surface, everything was sound. The associated forums were among the largest forums in the world, and the site even had its own radio station. It was the same month that the mainstream press started to report CacheLogic's research that found BitTorrent accounted for 35% of the total traffic on the internet. It was difficult to imagine a world without SuprNova.

However, behind the scenes the pressure was swelling.

Technologically, SuprNova was slipping behind. At least two websites, Bi-Torrent and LiteNova, offered SuprNova torrent files in an easy to browse and search format, and was much faster than SuprNova. The SuprNova team originally attempted to block these sites, but was forced to give up when his measures caused problems for SuprNova users.

Meanwhile, other websites were collecting and hosting torrent files of their own. Youceff hosted nearly as many files as SuprNova, but was faster, provided more detailed information on each torrent, allowed users to comment on torrents and provided a database of passwords for passworded torrents.

At the same time, sites like isoHunt and TorrentSpy had started to scan the internet for torrent files, creating a huge database of files and giving detailed information on each. They also had SuprNova’s staying power and are still online today.

SuprNova had competition.

Meanwhile, the French anti-piracy company RetSpan was after blood. Sloncek casually dismissed the threat, telling Slyck.com:

“Since I am sure I am not doing anything wrong, I think that there shouldn’t be a reason to worry about it.”

Later in the month he learnt that the Slovenian authorities were not so sure. According to Sloncek’s version of events, the local police raided the main SuprNova servers. At the time, the police took no further action. Sloncek claims he would not have even known it had happened if his ISP had not called to tell him.

Shortly after, the local press picked up on a Reuters story about SuprNova. The combination of the police raid and his name in the headlines were enough to spook Sloncek, so he made the decision to take down the site. On December 19th 2004, SuprNova.org as a torrent site and a force on the internet died, but not before it revolutionized the free distribution of media on the internet.

Final 18 Months

Before the shutdown, Sloncek was already working as a spokesman for another project called eXeem. eXeem was a failed attempt at creating a distributed version of BitTorrent and SuprNova, which could both report the latest files and act as a tracker.

Within a fortnight of SuprNova closing, Sloncek used SuprNova’s radio station, NovaStream, to officially announce eXeem.

SuprNova was then turned into an advert for eXeem. At the time, Sloncek had not explained the closure of SuprNova, which caused rumors to quickly spread around the internet that Sloncek was attempting to sell the SuprNova traffic to eXeem, which contained Cydoor adware. Love quickly turned to hate and Sloncek was sidelined from the community as a sellout.

In January 2005, eXeem was officially launched to the public for beta testing. The once all-powerful SuprNova remained as a worthless advert. SuprNova.org would remain this way for the next 9 months.

About the same time, the police knocked on Sloncek’s door at 6.30am. Sloncek, who believed himself to be clear of any trouble now SuprNova was offline, was shocked and shaken by the move. After showing a court order, the police confiscated two computers, CDs and some documents to help their investigation into Sloncek’s involvement with SuprNova.

Only the SuprNova Forums remained as an indication to previous importance of the domain, but even they closed and merged with the Snarf-It forums in March 2005.

Unsurprisingly, the traffic to SuprNova plummeted, but this was perhaps the least of Sloncek’s worries. Sloncek was called to a police hearing in reference to SuprNova. After the hearing, the police turned over their evidence to the prosecutor.

Sloncek was still waiting to hear from the prosecutor in September 2005, when he resurrected SuprNova as a P2P News resource - 9 months after the site was closed as a torrent site.

“The main theme of SuprNova.org will stay the news, but with time I hope it becomes one of the biggest resources for P2P (or possibly something else, if users think it would better serve the community),” he announced on the front page, having removed the eXeem advert.

A month after SuprNova was reinvented as a news site, Sloncek received some good news. The prosecutor had dropped the case against him and returned his computers and other confiscated equipment.

After a strong start, the news on SuprNova began to dry up. There was a steady downward spiral in new content and within six months the site became a cobweb.

Sloncek’s vision SuprNova becoming a P2P Mecca never came to fruition. The site spawned SuprFile.org, an image hosting service, but was otherwise a failure. Without putting in the hard hours that originally made SuprNova a success, Sloncek was unable to recapture the magic of the original SuprNova. It did not help that no free media was on offer.

The site had once again descended into obscurity.

Sometime over the last few weeks, SuprNova.org went up for sale on Sedo.com. Once a file sharing hero, the MPAA’s worst nightmare and an internet giant, yet nobody cared enough to report that the site is now up for sale.

But this seems to be of little concern to Sloncek, who unlike his creation is still very much active.

"SuprNova.org is being redone and during that time I put some different advertisments on," Sloncek told Slyck.com.

Perhaps validating hope to die-hard SuprNova.org fans, Sloncek expressed some optimism. "[SuprNova.org]...is not really for sale, I am just interested if I get any nice offers. If offer was very, very nice I would sell it. But I don't think I ever will, cause this domain is part of me and I dont think I could go without it."

If Sloncek does not get any "very, very nice" offers, he plans to relaunch the SuprNova P2P news site, this time with more news, a fresh new layout and independent movie and music content.
http://www.slyck.com/news.php?story=1177





French Fight Copyright Proposals

Demonstrators in Paris have protested against proposed laws which will make online file-sharing illegal in France.

The law, being debated by the French Senate, will ban the unauthorised downloading of copyrighted files.

Around 300 people laid a wreath "in memory of private copying and free software in France" near the city's culture and communications ministry.

It follows a decision by the government in March to scrap a bill to legalise downloading in return for a flat fee.

The draft copyright law introduces fines of between 38 and 150 euros (£26-£104) for people pirating music or movies at home.

Digital rights

Demonstrators also attacked plans to bolster digital rights management technology, which prevents commercial files from being freely shared over the internet.

Apple, which runs the iTunes music store, has criticised the draft law for the opposite reason.

The law calls upon Apple and rivals Sony and Microsoft to share their proprietary copy-protection - to ensure that digital music can be played on any player, regardless of its format or source.

Currently most online stores lock consumers into their own downloading systems and players.

Apple argues that one digital rights management system would leave legal download services vulnerable to illegal file-sharing.
http://news.bbc.co.uk/go/pr/fr/-/1/h...nt/4751459.stm





Floppy polycarbonate

Hitachi Maxell Develops Optical Storage Technology
Mark Peters



Hitachi Maxell develops optical storage technology : Hitachi Maxell, Ltd. has developed an optical storage technology "stacked volumetric optical discs (SVOD)" that can boost per-volume capacity by using a film-type disc medium with a thickness of 92 μm. The prototyped disc is a recordable disc with a diameter of 12 cm which is equivalent to that of DVDs. It includes two 92 μm thick disc media that are bonded with each other, and the capacity on both sides totals 9.4 GB. Based on the new technology, the company has succeeded in the development of a high-capacity optical storage system having 940 GB by accommodating 100 newly developed discs in a dedicated cartridge (thickness: 6.5 cm; width: 13.3 cm; depth: 16.1 cm).

Next generation disc - Blue-violet laser
The company plans to commercialize SVOD as early as the beginning of 2007. The target price is set at ¥40,000 or lower for a cartridge holding 100 discs. Although the system is mainly targeted for commercial use, Norio Ota, Fellow and Chief Engineer of Hitachi Maxell commented; "It is possible that the product will be provided for consumer use, too."The technology can also be applied to the next-generation optical disc that utilizes a blue-violet laser. In that case, the capacity that can be achieved by using a cartridge with 100 discs reaches 3 to 5 TB.

Thin disc record/playback technique
Two features were stressed as key points in the development of SVOD: disc manufacturing technique with the adoption of 92 μm thin film, and thin disc record/playback technique. CD and DVD disc media are usually manufactured by injection molding, which method cannot be employed to make a disc as thin as the one used in the new optical storage system. Hitachi Maxell has adopted a polycarbonate sheet which is used in a protective layer of the Blu-ray discs.

Nanoimprint technique
According to the process developed by Hitachi Maxell, the sheet is subjected to heat pressing in order to obtain land and groove pattern on its surface. This process is referred to as nanoimprint technique. Although it required 6 minutes for heat pressing at the initial stage of the development, it has been reduced to 8 seconds by now. The company claims that a yield comparable to that of DVDs is expected.

Hitachi Maxell recordable system - Optical head
The recordable system demonstrated at a press conference was fabricated by using an optical head and driver LSI included in typical DVD systems. It enables 8x recording on recordable discs. Hitachi Maxell boasts that the size of the prototyped system supporting two-sided recording has been reduced to less than 1/10 that of a typical DVD library system.
http://www.letsgodigital.org/en/news...tory_7786.html





New Century in Mobile Malware
JP

In less than half a year our tally of mobile malware has doubled to 200. Many of those in that count are variants of already detected viruses, but the speed at which the number grows has real implications for all those with unprotected smartphones. At the least, this is a testing ground. What comes next?
http://www.f-secure.com/weblog/archi....html#00000864





Fox To Release Unaltered Star Wars Flicks

Move Comes Despite Earlier Lucas Statements
Scott Nance

Fans of the original Star Wars trilogy have reason to celebrate.

Fox said it intends to release the original unaltered theatrical versions of the first three Star Wars movies on DVD on Sept. 12, according to SciFi Wire.

The release comes despite statements by creator George Lucas in which he said that 2004's digitally restored Star Wars trilogy DVDs were definitive versions of his movies.

Fans, however, clamored for unaltered DVDs of the original films. Fox said it will release new two-disc DVDs, priced at $30 each, of "Star Wars," "The Empire Strikes Back" and "Return of the Jedi" that will look as they did when they first appeared in theaters, along with the new, restored versions (now available in the four-disc $70 Star Wars trilogy).

The individual DVDs will be taken off the market on Dec. 31, a strategy that Disney uses on many of its classic releases.

This new set of DVDs does not constitute "George changing his mind," Lucasfilm's Jim Ward told USA Today. "What we've always said is George viewed the revised versions of the films as the definitive versions."

The original films' video quality will not match up to that of the restored versions.

"It is state of the art, as of 1993, and that's not as good as state of the art 2006," Ward said.
http://www.syfyportal.com/news.php?id=2554





Q&A: Sun's Radia Perlman Speaks Out On Being Stuck With IP, New Life For Spanning Tree And Her Answer To Data Security: The Ephemerizer

Distinguished engineer weighs in on the state of network research and her latest projects.
Bob Brown

Some people refer to Sun Labs distinguished engineer Radia Perlman as the Mother of the Internet and the creator of the spanning tree algorithm used by bridges and switches. Others know her as the author of network textbooks such as Interconnections. Network World even singled her out in March as one of 20 people who changed the industry over the past 20 years. But when I met with her recently at a security event in Boston I wanted to know this: What have you done for us lately?

One week I get to see Tim Berners-Lee, the Father of the Web, and the next week I get to meet with the Mother of the Internet. What more could a networking editor ask for?

Mother of the Internet. That’s kind of a strange marketing sound bite. I cringe when people emphasize my gender, because it's really a very small part of my life, especially my professional life. Recently a recruiter for a company sent me e-mail saying "We are particularly interested in you as a female thought leader." I didn't reply, because I wasn't interested in a job, but I fantasized replying: "Thank you for your interest. Although my credentials as a thought leader are impeccable, I must warn you that I am not that qualified as a female. I can't walk in heels, I have no clothing sense, and I'm not particularly decorative. What aspects of being female are important for this position?"

What exactly does a distinguished engineer do?

The job is not that well defined so I get to kind of do whatever I want. I enjoy talking to various groups in and out of Sun to find out what they're doing and often it intrigues me with some problem that needs to be solved. Or I meet two groups that ought to know each other and I introduce them. At Sun Labs it's nice if we do things that make the company money but it's also nice if we change the world. Though if all I did was change the world, then I assume that would be a bad thing.

What's your take on the state of networking and security research these days?

The taste of whoever is in the funding agencies tends to cause everyone to look at the same stuff at the same time. Often technologies get hot then go away. There was active networking for a while, which always mystified me and has now died. In security the money is behind digital rights management, which I think ultimately is a bad thing -- not that we need to preserve the right to pirate music, but because the solutions are things that don’t solve the real problems in terms of security. The few dishonest people will always manage to steal things. But most people are basically honest, and are willing to pay if you make it convenient. If there's a trust relationship there most people will wind up buying things. I hate to see so much emphasis on digital rights management.

Where should the funding go?

The things that seem absolutely unsolvable but that we have to solve is the user interface stuff. Everything is so complicated. People tell you to turn off cookies because they are dangerous, but you can't talk to anything on the Web without using them. People build this horribly complicated software, put up all these mysterious pop-up boxes and then blame the users when things don't go right. I keep hearing people say, like with distributed denial of service, that there are all these grandmothers out there who don’t know how to maintain their systems. Don't blame the grandmothers; blame the vendors. Liability is one of those things I don't understand. Somebody makes a toy and some kid manages to stick a piece up his nose and dies from it, that company has to pay millions of dollars because everyone is so sympathetic. But in the software industry, when you install something there is this 9,000-page legalese that basically says: "We have no idea what this thing does, we're not claiming it does anything, if it remotely does anything useful you should be grateful to us, but you shouldn’t blame us if it doesn't do what you expect." And they get away with it!

We could use more standards, such as with document formats. Customers would be better off, but it's not really in the interest of the vendors to do that. And customers actually don't want standards; they want the cheapest thing that works. Even though it's good for them, how do you convince people to eat broccoli instead of chocolate bars?

Yeah, broccoli can be tough. Even tougher might be getting them to use something called an "ephemerizer." What's this security project of yours all about?

You want to be able to create files that have expiration dates and make lots of copies of all of your storage so even if your data center burns down you can buy a brand new machine, reinstall the file system from scratch, get your backup tapes and be able to recover all the data that hasn’t expired and not be able to recover any data that has expired. You want to be able to do this in a way that can be very scalable and in which you won't lose performance and to do it with key managers that manage time-release keys in a way you don’t really have to trust them.

We've been working on it for a few years and it's been evolving. Originally the design was every time you opened a file that had an expiration date you had to go to a key manager, like an external site, and ask him to unlock the file for you. When I tried to sell it to the file system groups they were unhappy about the overhead every time you opened a file and the amount of information you'd have to keep in the header of the file was a whole bunch. After that I changed it so that only after a file system recovers from a crash does it have to ask for one decryption from an outside agent and otherwise it works autonomously so it has no performance problems. In the header of a file all I need is about 4 bytes for a key ID.

What form might this all take in products?

The intention is that it will get built into file systems, but I'm just in research and who knows when and if things will happen. I'm optimistic that it will and fairly soon.

I've read your "Algorhyme" poem about spanning tree [plays off of Joyce Kilmer's "Trees"]. I'm thinking that coming up with words that rhyme with "ephemerizer" might be tough.

True. The spanning tree one just sort of came out. My son actually set that poem to music and my daughter and I had a chance to perform it at a concert at her office [Click here to hear Radia (on piano) and her daughter Dawn Perlner (voice) performing at MIT's Lincoln Laboratory.]

What else is on your plate?

I'll tell you, but there's a story behind it. A couple of years back there was this Boston Globe article about a hospital network melting down and in the middle of it was mentioned the spanning tree algorithm. I'm thinking: those are words that don’t belong in a Boston Globe article even if spanning tree was involved. Eventually we tracked down the company providing the switches and indeed it was a giant bridged network.

Now, bridging was never intended to do that: it was kind of a hack because people at the time were all confused about what Layer 3 was and they thought Ethernet was a competitor to DECnet. With bridges we did such a good job and it was so plug-and-play that you didn’t have to think about them, so people are still taking large networks and doing bridges. As it turns out people kind of believed IP must have been the best protocol ever because it just took over the world (just like English must be the best language ever because it's going to take over the world, but no, it has nothing to do with how good a language it is).

DECnet would have been a much better protocol for the world to have adopted. It had a lot of advantages, like a larger address space (We're still talking about will IPv6 ever happen and if it does, there's nothing better about it than what we could have had 15 years ago). One of the advantages DECnet had was the ability to have a whole campus that was zero-configuration, that all had the same prefix , and you didn’t have to divvy up your address space for every link like IP does. But given that companies didn't go in that direction they're using bridging, which is inherently more fragile, especially when you take that notion and try to make it more responsive by doing all these things that involve lots of configuration. If you get the configuration wrong things can melt down. You shouldn’t be stressing it really hard.

One of the things I'm trying to do now, given that we're stuck with IP, is come up with something that gives you the advantages of bridging so it can be all zero-configuration within a campus and all look like one big prefix and not be confined to just transmitting data along the spanning tree. You'd be able to use shortest paths and will be safer if you have temporary loops, so it shouldn’t melt down. About a year ago we finally got through the politics and got an IETF working group started called TRILL, which stands for "transparent interconnection of lots of links." I'd written a paper about this five years ago and have been trying to sell it to the various standards bodies. I'm pretty sure it will get implemented. There are a lot of companies asking the sort of questions that only would be asked if they were planning to.

So TRILL is kind of like a new spanning tree?

You can think of it as a replacement to spanning tree that has the same properties of being zero-configuration, just plug it together and it works and it looks like one big thing but performs better because you have optimal paths. With spanning tree it's like taking the highway system and saying you don’t need both Rtes. 128 and 495 [to use local roads here in Massachusetts] just because they both sort of go in the same direction.

Jeez, I wasn't even going to ask you about spanning tree. I figured it was old news.

Something else you would think is old news is my thesis from 1988 on how to design a network that had the property that even if some of the routers were really malicious and were trying to do bad things (lying about who they were connected to, flooding the network with garbage, etc.) how could you cope with that. My thesis sounded really hard and important when I proposed it but the solution turned out to be embarrassingly simple. I found out years later that University of Washington networking people were required to read it. The thing was, though, that my proof of concept required a small enough network that all of the routers in it could keep track of all the source destination pairs talking at the same time. Recently I was discussing my thesis with someone else and we realized it does not extend to larger networks where you need hierarchy. We had to rethink it and do it in a totally different way which also has implications for congestion control. That's another paper that I've been working on recently.

Speaking of schools, I understand you aren't thrilled about how networking is being taught these days.

I get frustrated. Universities tend to teach it like it's a trade school. As if the only thing that every existed is TCP/IP The attitude seems to be that everything about it is perfect, so you just need to get your students to learn how to use it and write applications to it. But there are a lot of problems with this field where people just repeat things and nobody questions them anymore. Including in text books that are used at reputable universities. There's a lot in there that's just wrong. Like that ISO failed because it had too many layers. Or, if everything were encoded in XML it would all be interoperable or that security problems will go away once you have IPv6. What I'd like to see more of, and what I tried to do in [my book] Interconnections is to get people to think about things conceptually. One problem is that the books out there today only tend to deal with one or two layers and if they do all of networking they tend to only be strong in the areas of the writer's expertise. I've thought of collaborating with others on a book that would look at all of networking.
http://www.networkworld.com/news/200...interview.html





Local news

Band Manager Is Sentenced In R.I. Club Fire
Kathleen Burge

PROVIDENCE -- Minutes after he wept through an apology yesterday to the families of the 100 who died, Daniel M. Biechele was sentenced to four years in prison for lighting the fireworks that sparked the 2003 Station nightclub fire.

''Mr. Biechele, the greatest sentence that can be imposed upon you has been imposed upon you by yourself, that is, having to live a lifetime knowing that your actions were a proximate cause of the deaths of 100 people," said Superior Court Judge Francis J. Darigan Jr., as he announced the sentence, less than half the 10 years in prison that prosecutors requested.

Some relatives of the dead moaned and cried out as Darigan announced his sentence and afterward said they were incensed that Biechele, the first person to be convicted in the deaths, would not spend more time in prison.

Biechele's lawyers had requested that he be sentenced to community service, with no prison time. Biechele could be eligible for parole in about 16 months.

The Feb. 20, 2003 fire was the fourth deadliest nightclub fire in US history.

As Biechele, the tour manager for the heavy metal band Great White, was led away in handcuffs for the drive to the state prison in Cranston, Patricia Belanger, whose daughter, Dina DeMaio, died in the fire, yelled in the courtroom to Biechele's parents, ''What do you think of your son now?"

''He's got his family," Belanger said later, outside the courthouse. ''What do we [have]?" Now, she said, Biechele's mother will ''suffer just like we've been suffering because of her son."

''He's going to serve less time than we have already served," said Annmarie Swidwa, mother of victim Bridget Sanetti.

Biechele, who pleaded guilty in February to 100 counts of involuntary manslaughter, addressed the victims' families and Darigan, sobbing, just before the sentence was handed down. He apologized for his actions, saying he never meant to harm anyone.

''I don't know that I'll ever forgive myself for what happened that night, so I can't expect anyone else to," he said.

As Darigan announced his sentence -- 15 years with 11 years suspended -- he cautioned that reading the sentence as a measure of the value of the lives of those who died would only dishonor their memories.

''You and the victims' families will forever be mindful of that fateful night, and it is not within the power of this or any other court to fashion a sentence reflective of the enormity of the tragedy," he said.

Prosecutors had sought 10 years, the maximum sentence allowed under the plea agreement. In his statement in court, Assistant Attorney General Randall White reminded Darigan of the dozens of relatives of the dead who had given moving statements over two previous days.

''The suffering is endless, and the extent and the depth of the pain is bottomless," White said.

But some of the relatives said that punishing Biechele, 29, who had been living in Florida with his wife, whom he married last month, would not bring their loved ones back.

Sarah Mancini, whose son, Keith, died in the fire said she felt Biechele's sentence was appropriate. No matter how many years he spends in jail, she said, her son will still be dead.

''I lost my son," she said. ''I will miss him till I die. But I can feel this young man's pain as well as my son's loss."

Biechele's lawyer, Thomas G. Briody, said his client showed courage by deciding to plead guilty, against the advice of his attorneys.

''Daniel Biechele is the only man in this tragedy to stand up and say, 'I did something wrong,' " Briody said. ''He's the only one to apologize."

Biechele wrote letters to the families of each of the victims, apologizing for his role in the fire. Darigan said the handwritten letters will be made available to the families by the court in the future.

Briody argued that the fire was caused by a deadly series of building-code violations in the nightclub, circumstances beyond Biechele's control.

Biechele could not have known that the soundproofing foam along the walls was highly flammable or that the club's exits would not allow everyone to leave the building quickly enough to escape the fire, he said.

''Daniel Biechele's conduct alone is not the cause of the horror, the carnage, the destruction at the Station nightclub," Briody said.

Attorney General Patrick Lynch said he was disappointed that Darigan had not imposed a longer sentence, but defended the plea agreement with Biechele.

Nearly 10 months after the fire, a grand jury indicted Biechele and club owners Michael and Jeffrey Derderian, who are brothers, on 200 criminal counts using two different theories of involuntary manslaughter: 100 counts of misdemeanor manslaughter and 100 counts of criminal negligence. Many victims and their families said state fire and regulatory officials, as well as band members, were also at fault.

When Biechele's plea deal was announced in January, the criminal negligence charges were dropped.

The misdemeanor manslaughter charge, which is a felony, referred to his lighting the pyrotechnics without a license. In the case of the Derderians, the misdemeanor charges stem from the use of soundproofing insulation that was not flame-retardant.

Michael Derderian's trial is scheduled to begin July 31; no trial date has been set in his brother's case.

Lynch would not discuss whether Biechele would testify against the Derderians or any details of the case against them.

Andrew Horwitz, a professor at the Ralph R. Papitto School of Law at Roger Williams University in Bristol and director of the school's criminal defense clinic, said Biechele will probably testify if the Derderians go to trial.

Horwitz said he was surprised that the plea deal did not include an agreement that Biechele would cooperate with prosecutors. ''It continues to surprise me," he said.

Such cooperation agreements are common in plea deals and the fact that this agreement was reached without Biechele agreeing to cooperate means that if Biechele does take the witness stand against the Derderians, his testimony will be more credible, Horwitz said.

Horwitz said the case against the Derderians -- that installing the soundproofing foam was the direct cause of death for each of the 100 victims -- will be difficult for prosecutors to prove.

J. Richard Ratcliffe, a Providence lawyer and former chairman of the Rhode Island Bar Association's Criminal Law Bench/Bar Committee, said Darigan's ruling is significant for the Derderians in that it sets a benchmark for punishment in the criminal cases.

Biechele's sentence will be one piece of information used by the Derderians and their lawyers to decide whether to go to trial or seek a plea bargain, Ratcliffe said, and he noted that the Derderians should not expect to receive similar leniency.

Lawyers for the Derderians could not be reached for comment.

Matthew Brelis and Ralph Ranalli of the Globe staff contributed to this report.
http://www.boston.com/news/local/rho...fetime_burden/
JackSpratts is offline   Reply With Quote
Old 11-05-06, 11:12 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

Accelerating The Internet To The Speed Of Light
Nick Miller

Australian scientists believe they are on the verge of a breakthrough in optical circuitry that may improve the speed of the internet by a factor of 1000.

The Centre for Ultrahigh bandwidth Devices for Optical Systems, a research consortium of five universities, is trying to create a photonic chip that processes optical signals free of slow, silicon electronics.

Optical-signal processing allows unprecedented bandwidth - one optical fibre has a capacity of hundreds of terabits a second. At this speed, a high-definition movie could be downloaded in a fraction of a second, rather than the hours it takes with current technology.

Today, our international internet links are bedevilled by unavoidable lag - the time it takes for data to travel from the US to a user's PC in Australia.

For most of its journey, the data travels at the speed of light along optical fibres. But each time the information stream is switched, amplified, reprocessed or regenerated, it requires silicon-based electronics, which are much slower.

These bottlenecks stand in the way of a 1000-fold increase in the practical speed of the internet, the centre's researchers say. But they could be removed with optical computing, which uses light to switch light, without electronic interference.

Research director Ben Eggleton says the centre's program has four strands: a "regenerator" that reproduces an optical signal without electronics; a switch that uses a light signal to direct another light signal; optical buffers to slow light pulses, making them easier to handle; and three-dimensional photonic circuits.

The centre's participants at Sydney University and the Australian National University are about a month away from demonstrating an optical switch, he says. (The centre's other members are Macquarie University, University of Technology Sydney, and Swinburne University of Technology.)

Although scientists around the world work on the same problem, Professor Eggleton says the centre takes a unique approach.

It is working with a soft glass called chalcogenide, which changes its refracting properties when hit by high-intensity pulses of light - becoming a basic switch. The glass switches at very low powers, which makes it easier to work with and promises more practical applications.

Chalcogenide can also be printed, to create circuits. Scientists created "band gap" structures within the glass - patterns of tiny holes that further control the light beams. Professor Eggleton says this band gap could be the photonic equivalent of the basic unit of electronics - the semi-conductor.

"The band gap allows light to be moved in a particular direction. It allows us to make circuitry," he says. "So we have a very compact, low-power optical switch that can be incorporated into an optical circuit, which can be made using basic lithography (circuit printing)."

Other optical switches have been demonstrated using silicon, but the use of glass should allow much higher speeds.

The team hopes to demonstrate its first optical switch within the next few months. This would be an early step in creating a practical photonic circuit.

Such a circuit would dramatically improve the speed of data-flow around the world.

"The aim is to do more and more signal processing optically," Professor Eggleton says.

A beam of light is much faster and more agile than an electronic current. "Electronics relies on electrons moving through semi-conducters and that has a real, inherent speed limit," Professor Eggleton says.

"Photonics could be used in telecommunications or even in computing technology."

THE PHOTONIC CHIP

1 Optical data signals (light pulses) enter the chip via glass fibres thinner than a human hair. They are squeezed to fit the optical circuitry.

2 A switch, controlled by light, rapidly combines packets of optical data.

3 Integrated components act on the light, for instance changing its colour from blue to red, amplifying or delaying the signals.

4 The prism-like structure allows some colour data channels to be dropped while other channels are added for the next leg of the trip.
http://www.smh.com.au/news/technolog...940441025.html





Pretty spacey

Drexel Professor: For a Bigger Computer Hard-drive, Just Add Water
Press Release

Imagine having computer memory so dense that a cubic centimeter contains 12.8 million gigabytes (GB) of information.

Imagine an iPod playing music for 100 millennia without repeating a single song or a USB thumb-drive with room for 32.6 million full-length DVD movies.

Now imagine if this could be achieved by combining a computing principle that was popular in the 1960s, a glass of water and wire three-billionths of a meter wide. Science fiction? Not exactly.

Ferroelectric materials possess spontaneous and reversible electric dipole moments. These dipole moments are times when the material gains a charge, in this case an electric one. For example, the Earth¹s magnetic field generates a dipole moment that causes compasses to face north, but the stability of ferroelectric charges has been a problem for researchers.

Until recently, it was difficult to stabilize ferroelectricity on the nano-scale. This was because the traditional process of screening the charges was not completely effective. However Dr. Jonathan Spanier from Drexel University and his research colleagues and the University of Pennsylvania have proposed a new and slightly unusual mechanism stabilizing the ferroelectricity in nano-scaled materials:

surrounding the charged material with fragments of water.

Ferroelectric materials are compounds that possess electric dipole moments; similar to the magnetic dipole moments of Earth¹s magnetic field that causes a compass to always point north. Until recently, it was difficult to miniaturize ferroelectric materials because of problems with screening.

All ferroelectric materials, even Spanier¹s wires that are 100,000 times finer than a human hair, need to be screened to ensure their dipole moments remain stable. Traditionally this was accomplished using metallic electrodes, but Spanier and his team found that molecules such as hydroxyl

(OH) ions, which make up water, and organic molecules, such as carboxyl (COOH), work even better than metal electrodes at stabilizing ferroelectricity in nano-scaled materials, proving that sometimes water and electricity do mix.

³It is astonishing to see that molecules enable a wire having a diameter equivalent to fewer than ten atoms to act as a stable and switchable dipole memory element,² said Spanier, an assistant professor of materials science and engineering at Drexel.

If commercialized, ferroelectric memory of this sort could find its way into home computers, rendering traditional hard-drives obsolete. The extreme capacity offered by such a device could easily put a room full of hard-drives and servers into a jacket pocket, but this idea can be applied to other computer components, such as ferroelectric RAM.

RAM is necessary in a computer because it stores information for programs that are currently running. As this news release was written, RAM stored the words in a file. Because RAM can transfer files faster than a hard-drive, it is used to handle running programs. However most RAM is volatile, and if the computer loses power all the information in RAM is lost. This is not the case with ferroelectric memory.

Ferroelectric memory is non-volatile, so it is entirely possible for files to be stored permanently in a computer¹s RAM. Applying nano-wires and the new stabilization method to existing ferroelectric RAM would deal a double blow to hard-drives in size and speed.

Spanier and his colleagues, Alexie Kolpak and Andrew Rappe offrom the University of Pennsylvania and Hongkun Park of Harvard University, are excited about their findings, but say significant challenges lie ahead, including the need to develop ways to assemble the nanowires densely, and to develop a scheme to efficiently write information to and read information from the nanowires. In the interim, Spanier and his colleagues will continue to investigate the role of molecules on ferroelectricity in nanowires and to develop nano-scaled devices that exploit this new-found mechanism.

Support for the research at Drexel is from the Army Research Office and at Harvard and at Penn from the National Science Foundation, the Packard Foundation, the Dreyfus Foundation, the Office of Naval Research, and the Center for Piezoelectric Design.
http://www.drexel.edu/dateline/defau...&f=20060508-01





OLED, Paper Displays $10.2 Bln by 2011?
Geoff Duncan

Research firm NanoMarkets forecasts the global market for OLED and Paper-like displays will reach $10.2 billion by 2011.

Virginia-based research firm NanoMarkets is forecasting that the market for Organic LED (OLED) and paper-like displays will grow to some $10.2 billion worldwide by the year 2011, and grow to $14.7 billion by the year 2013.

Organic LED, or OLED, displays are not made of semi-conductors like traditional LEDs, but from much smaller carbon-based molecules which can be printed on media and substrates. OLED displays do not require a backlight and, thus, consume far less power than traditional LCD displays. A number of technologies exist for paper-like displays, with the most common to-date tiny colored spheres suspended between layers of film: electrical charges sent through the film cause the spheres to rotate, showing a light side or dark side (or, in some cases, a "grey" made up of half-dark, half-light).

NanoMarkets foresees that decreasing cost to manufacture OLED and paper displays combined with increased production capacity will transform the signage and advertising industries, enabling retailers to constantly update things like shelf-edge displays. OLED technology will also soon have the resolution and color capability to enter the television and video market; NanoMarkets believes OLED televisions will account for $2.2 billion in revenue in 2011 and begin seriously cutting into the LCD television market. Other key markets for OLED and paper-like displays include mobile computing and consumer electronics devices.
http://news.digitaltrends.com/article10322.html





Dell Shares In Spotlight After Outlook
David Koenig

Shares of Dell Inc. took a beating after the world's largest personal computer maker warned it will miss its own targets for sales and profits during the first quarter because of "pricing decisions."

Analysts said Dell's move showed that it cannot dodge tough competition and savage price-cutting for personal computers.

Dell said late Monday that it expects a profit of about 33 cents per share in the three months that ended Friday - down from its previous forecast of 36 cents to 38 cents per share. Analysts were expecting 38 cents per share, according to a survey by Thomson Financial.

The Round Rock-based company, which sells computers directly to businesses and consumers, also said first-quarter sales would be about $14.2 billion. It had previously forecast revenue of $14.2 billion to $14.6 billion.

The announcement sent Dell shares tumbling $1.72, or 6.5 percent, to $24.71 in early Nasdaq trading Tuesday, below the stock's previous 52-week low of $25.10.

Dell shares are down nearly 12 percent so far this year.

In a statement, the company said the shortfall in expected earnings was driven "primarily by pricing decisions in the second half of the quarter." During the quarter, Dell aggressively discounted some of its products as it lost ground to rivals.

Chief Executive Kevin Rollins said the company "continued to execute on our strategy to reinvigorate growth by making investments in our support infrastructure and product quality and by accelerating pricing adjustments."

Company officials declined to comment further. Dell will announce first-quarter results on May 18.

Steve Kleynhans, an analyst at META Group, said Dell was being swept up in price-cutting wars among PC makers, especially for low-end machines. He said Dell was hindered by its reliance on computer chips from Intel Corp. instead of less-expensive parts from Intel's chief rival in PC microprocessors, Advanced Micro Devices Inc.

"We're experiencing a slowdown in the growth of the PC market, and prices are coming down," said Samir Bhavnani, a PC industry analyst with market researcher Current Analysis. "And PC makers, with Dell especially as the biggest one, are paying for pricing decisions they made months ago."

Charles Smulders, vice president of client computing at market-research firm Gartner Inc., agreed that the first-quarter results would put more pressure on Dell to consider AMD as a supplier. He also suggested Dell might try to change investors' expectations about its historically rapid growth.

"There is a mismatch between the financial expectations based on their history, and what the market can deliver in the current pricing environment," Smulders said.

Smulders said Dell is cutting prices to compete and increase revenue, but that won't generate the kind of profit growth that investors have come to expect from Dell.

Stamford, Conn.-based Gartner said Dell saw its share of industry computer shipments decline to 16.5 percent in the first quarter of 2006 from 16.9 percent a year ago. Though Dell shipped 10.2 percent more PCs than it did in last year's first quarter, Gartner said the growth rate was Dell's slowest since the third quarter of 2001.

---

AP Technology Writer May Wong contributed to this report from San Jose, Calif.
http://hosted.ap.org/dynamic/stories...MPLATE=DEFAULT





Down by the river

Ga. Student Suspended for Threatening Song
AP

A high school student was suspended for five days after singing a spoof of ''On Top of Ol' Smokey'' that includes lyrics about shooting a teacher.

Beth Ann Cox, 16, a junior at Peachtree Ridge High School, said she had been humming the song during German class but denied singing loudly or directing the lyrics at her teacher, Phil Carroll.

''I'd had a song stuck in my head all day, like the tune of it,'' she said. ''This kid in front of me asked me about the song. So I told him the words. I didn't say them loudly.''

The song includes the lyrics: ''On top of Ol' Smokey, all covered with blood, I shot my poor teacher with a .44 slug.''

Administrators pulled Cox out of class later Friday and asked why she had threatened her teacher. She was suspended Monday.

Cox has had differences with the teacher in the past, said her mother, Suzanne Cox.

''We feel that Dr. Carroll has some kind of a vendetta out for our daughter. And he used this to take a stand against her,'' Suzanne Cox said.

Sloan Roach, spokeswoman for the school district, about 30 miles northeast of Atlanta, said the suspension was ''appropriate disciplinary action'' for disrupting class.
http://www.nytimes.com/aponline/us/A...Suspended.html





Mom Said To Help Girls Bake Ex-Lax Cookies
AP

A 43-year-old woman is charged with helping her daughter and two other teenage girls bake cookies laced with a laxative that were then given to a teacher.

Julie Hunt appeared in Skowhegan District Court on Monday and pleaded innocent to a charge of misdemeanor assault.

Hunt was arrested Friday after a police investigation into the attempted prank at Carrabec Community School in Anson that sickened four seventh- and eighth-grade children.

The cookies, which were baked with Ex-Lax, were left on the teacher's desk on April 10 with a note saying, "We made these cookies just for you, hope you enjoy them."

According to a police affidavit, Hunt told the girls how to crush the laxative pills and mix them in with the cookie batter. The girls, who are 13 and 14, used an entire box of pills, the affidavit says.

Mary Adley, the principal of the school, called police on April 24 after hearing two girls talking about the incident.

Maine State Police Lt. Dale Lancaster said that the girls were not facing criminal charges. The affidavit said all three girls were suspended by school officials.

But Hunt's involvement could not be overlooked, Lancaster said.

"If you assist children with perpetrating these kinds of crimes, you will be charged," he said.
http://hosted.ap.org/dynamic/stories...MPLATE=DEFAULT





U.S. Subpoenas Newspaper for Sources in Steroid Case
Adam Liptak

In the latest effort by the government to learn the identities of reporters' confidential sources, the United States attorney in Los Angeles issued grand jury subpoenas to The San Francisco Chronicle and two of its reporters on Friday.

The relative ordinariness of the case, which arose out of reporting on steroid use in baseball rather than on covert operatives, domestic eavesdropping or secret prisons, may make its outcome instructive.

As a practical matter, the case will answer whether, after a series of recent setbacks, reporters retain any rights to protect their confidential sources in federal court.

Phil Bronstein, the editor of The Chronicle, said the paper would move to quash the subpoenas.

Whether it succeeds will turn in large part on which of two competing approaches the courts adopt. Both were represented last year in a federal appeals court's decision that sent Judith Miller, then a reporter for The New York Times, to jail in an investigation centering on the disclosure of the identity of Valerie Wilson, an officer of the Central Intelligence Agency.

The three appeals judges who heard that case agreed that a 1972 decision of the United States Supreme Court, Branzburg v. Hayes, ruled out any First Amendment protections for reporters from federal grand jury subpoenas except in cases of prosecutorial harassment.

But one judge, David S. Tatel, proposed an alternative approach rooted in the federal common law of evidence rather than the First Amendment. A similar test is part of a proposed federal shield law likely to be introduced in the Senate shortly.

Judge Tatel said judges should balance "the public interest in compelling disclosure, measured by the harm the leak caused, against the public interest in newsgathering, measured by the leaked information's value."

In the Miller case, Judge Tatel said, the disclosure of Ms. Wilson's identity may have jeopardized her safety, her work and "friends and associates from whom she might have gathered information in the past." On the other hand, he wrote, Ms. Wilson's identity "had marginal news value."

Under that balancing, Judge Tatel wrote, Ms. Miller lost. But that same balancing, if adopted by the judge in the case involving The Chronicle, may yield a different result.

The subpoenas served Friday seek testimony and documents concerning three articles published by the paper in 2004 about a grand jury investigation into the Bay Area Laboratory Cooperative, or Balco, which distributed performance-enhancing drugs to athletes.

The articles quoted, apparently verbatim, transcripts of grand jury testimony from prominent athletes, including the baseball stars Barry Bonds and Jason Giambi. Whoever provided those transcripts to The Chronicle probably violated the law.

Mr. Bronstein, The Chronicle's editor, said the proper way to strike the balance between the value of the information and the harm caused by its disclosure was plain to him, if not to all his paper's readers.

"Had the reporting not been done and not been published," Mr. Bronstein said, "we would not have had a very strong debate about the illegal use of steroids in professional sports."

Readers, on the other hand, "have hammered us quite severely," he continued. There is, he said, "an awful lot of sentiment expressed about the sanctity of the grand jury process."

Thom Mrozek, a spokesman for Debra Wong Yang, the United States attorney in Los Angeles, declined to comment. The investigation is presumably being conducted from Los Angeles because federal prosecutors in San Francisco had had access to the leaked materials.

Eve Burton, vice president and general counsel of the Hearst Corporation, which owns The Chronicle, said the legal balance should be struck in favor of the reporters, Mark Fainaru-Wada and Lance Williams, given that the Balco grand jury appears to have concluded its work.

"The government's interest in learning who the whistle-blowers were in a case that's finished is less important," she said, "than the ability of journalists to protect their confidential sources."
http://www.nytimes.com/2006/05/09/us/09leak.html





Survey says! Oh wait…

Patterns of Deceit Raise Concerns About Teenage Sex Surveys
Eric Nagourney

Does signing a virginity pledge after you have had sex make you a virgin again?

It hardly seems likely. But how else to explain a new study in which teenagers who said they had had sex in one survey then signed a pledge and told a different story in a survey a year later?

The study, which appears in the June issue of The American Journal of Public Health, was based on surveys by the National Institute of Child Health and Human Development involving more than 13,000 students in grades 7 to 12.

The students were questioned two times, a year apart.

The most delicate questions were given through headphones, and the students typed their answers into a computer.

Among the questions students were asked: "Have you taken a public or written pledge to remain a virgin until marriage?" They were also asked if they had had sexual intercourse.

In the first survey, about 13 percent of the students said they had taken a pledge of virginity. In the second survey, the study found, more than half of that group denied having taken one.

Those who reported having sexual relations for the first time in the second survey were three times as likely to retract a virginity pledge as those who did report having had sex then.

About a third of the students said in the first survey that they had had sex, but about 10 percent of them denied it when asked the second time.

Those who had newly made a pledge were four times as likely to retract reports of sexual activity.

Why did so many students change their stories? "We can't really get inside their heads and know what they're thinking," said the study's author, Janet Rosenbaum, a doctoral student at the Harvard School of Public Health. But the study raises questions about how much reliance should be placed on surveys about sexual activity among teenagers, and how accurately experts can measure the results of programs that encourage them to abstain from sex to avoid pregnancy and sexually transmitted diseases.

"Survey respondents typically reconcile their memories with their present beliefs," the study said. "Respondents may recall only memories consistent with their cur- rent beliefs or report actions that did not occur but are consistent with their current beliefs."

Such behavior is not unheard of when it comes to surveys. Studies have found, for example, that people who tell survey takers before an election that it is important to vote are more likely to claim falsely later that they did.

But there is a big difference between what happens in the voting booth and what happens in the bedroom or the car.

"Self-reported voting can be verified with official voting records," Ms. Rosenbaum wrote, "but self-reported sexual abstinence cannot."

Apart from what it says about the reliability of the pledges and abstinence programs, the study also raises concerns about whether they may make tracking sexually transmitted diseases more difficult.

"I think all of this has public health implications, particularly with respect to S.T.D.'s, insofar as we are not getting a clear picture from teens' own report of their sexual activity," said Cynthia Dailard, a public policy analyst at the Guttmacher Institute, a research and advocacy group that studies reproductive rights.
http://www.nytimes.com/2006/05/09/health/09virg.html





Thaslada Playmates!
Jack

All of 'em, from December '53 to this month. Amazing thread.





Sony to Sell PlayStation 3 for $499
Matt Richtel

Sony said on Monday that it planned to sell the base model of its PlayStation 3 video game console for $499, a price that industry analysts said could put it at a competitive disadvantage to rival Microsoft and its Xbox 360.

Sony said that it also planned to sell a higher-priced model with a larger hard drive for $599.

The console will be released on Nov. 11 in Japan and Nov. 17 in United States and Europe, Sony executives said. It will cost about $536 in Japan and $636 in Europe.

The release date and prices, made public at a flashy news conference in Los Angeles, were disclosed with pomp and circumstance, befitting Sony's vigorous effort to keep itself fresh in the minds of video game players.

Sony said it planned to ship six million consoles by the end of March 2007, including two million when the system is introduced in the fall.

The company had originally expected to begin selling the PlayStation 3 this spring, but said in March that it would postpone the release until November. The delay has given a full-year lead to Microsoft, which introduced its Xbox 360 last November.

The 360 sells at two prices, $299 for a basic system and $399 for a ramped up one.

Paul Jackson, a video game industry analyst with Forrester Research, said the price of the PlayStation would put Sony at a competitive disadvantage to Microsoft. The consoles will sell out at first because of the cult of PlayStation users, he said. But after that, he said, prices will have to come down quickly.

At its announcement, Sony executives tried to make the case that the PlayStation 3 would be the most advanced game system to date, with enough features to justify its price.

Some of the game players, analysts and journalists gathered at the news conference said they were not convinced.

The system "is as expensive as I expected, and that is to say it is outrageously expensive," said Chris Kohler, a freelance video game journalist and avid game player who lives in San Francisco. He said that Sony did not make a sufficient case that the console's features justify the cost. "They didn't show it today."

He added, "What they showed looked very much like the games you can get on the 360."

Sony also said for the first time that the hand-held controllers supplied with the games will enable players to manipulate activity on their television screens. For example, players will be able tilt their hands to make an airplane move to the left or right, or roll.

Even at the price announced on Monday, Sony will probably sell the PlayStation systems at a substantial discount to what it costs to make them, analysts said. The gap is attributable to the high cost of the console's components, notably its powerful cell processor and a high-definition DVD format called Blu-ray.

But the economics of the video game business can potentially support a model in which console makers subsidize their machines because they can make a lot of money by collecting royalty fees for games sold for those consoles. And further, Sony cannot afford to price its console too much higher than the 360.

The news conference was timed to coincide with the industry's big annual trade show, an immersion into high-technology sensory overload known as E3, which starts Wednesday at the Los Angeles Convention Center.

The other console makers, Microsoft and Nintendo, have scheduled announcements for Tuesday.

The business stakes are immense for all three, and for the hundreds of companies that make video games and accessories for the consoles, as well as the investors banking that the industry will continue to grow.

Perhaps no company is in the spotlight this week like Sony. It is the reigning heavyweight champion of console makers, with its PlayStation 2 having sold more than 100 million units since it was introduced in 2000.

Its dominance has been challenged by Microsoft, which sold around one-quarter that many Xboxes.

Microsoft's introduction of the 360 was met with consumer enthusiasm, and a caveat. The company initially sold as many consoles as it could make, but that turned out not necessarily to be a function just of customer demand but also of Microsoft production snags that limited supply.

Still, Michael Pachter, a video game industry analyst with Wedbush Morgan Securities, said Microsoft would probably have sold 10 million Xbox 360 consoles by the time the PlayStation 3 reaches the market.

Sony said it decided to delay the console's release to allow software developers to create games that take better advantage of the powerful processor and graphics technology of the PlayStation 3.

Yet the delay has been painful for those software makers and their investors. Companies like Electronic Arts, a big video game maker, have said that the slower-than-expected transition to a new generation of consoles is one reason they are in a significant sales slump that it appears will last for at least a year.

As for Sony, whether it can take over Microsoft's early lead depends in part on a business battle that is somewhat tangential to the console competition. In promoting Blu-ray as a high-definition DVD format, Sony is in a pitched battle with Toshiba, which is promoting a rival technological standard.

If Toshiba wins out, Sony's heavy investment in Blu-ray, and its inclusion in the PlayStation 3, could wind up being a costly mistake. But if Blu-ray prevails, users could be drawn to the PlayStation 3 in part for its ability to play vivid movies.

"Blu-ray is going to decide it," Mr. Pachter said of the console wars. "Consumers will pay more for a Blu-ray drive if we believe it has value."

He added that he thought Sony would prevail. "Sony's going to kill Toshiba because it has to," he said.
http://www.nytimes.com/2006/05/09/te... tner=homepage





The Bamboozle Draws Them by the Thousands for an Emo Jamboree
Kelefa Sanneh

"Make some noise, Giants Stadium!" It was Saturday night, and Tyson Ritter, from the All-American Rejects, was saying five words he had probably always wanted to say. Unfortunately, he had to add two more words, but he didn't seem to mind. The full phrase was, "Make some noise, Giants Stadium parking lot!" And the parking lot did as it was told.

The occasion was the Bamboozle, a Saturday-and-Sunday festival that brought about 25,000 thousand fans each day to the picturesque concrete expanse behind the stadium. From noon until 10 p.m. on both days, 10 dozen bands took to six stages; the headliners were Fall Out Boy and Taking Back Sunday. Even more than the traveling Warped Tour, the Bamboozle is a tribute to the health and energy of the plaintive, punkish music known as emo: nearly every band onstage fit that description, comfortably or un-.

Unlike lots of music festivals, this one made an emphatic point. After two long, often exciting, meteorologically tricky (the temperature plummeted at sunset), not-at-all-unpleasant days, it seemed clear that the emo onslaught wouldn't — and shouldn't — end any time soon.

Something else seemed clear, too. For these listeners, emo mainly lives on MP3's and other digital media; in fact, you might say emo is the first major rock genre of the MP3 era. (But the current boom in emo has antecedents in the 1980's and 90's.) And so while other festivals are full of fans devoted to specific groups this one was full of fans devoted to songs. Whatever was happening onstage, some people — maybe lots of people — were sure to be singing along.

The popularity of the All-American Rejects is testament to this song-centric culture. They specialize in big, straightforward, slightly whiny rock songs; they aren't particularly cool, loud, raucous or — to say the least — punk. But no matter; everyone knew these songs ("Move Along," their current single, has reached No.15 on Billboard's Hot 100), so everyone joined in.

The scene wasn't much different at the smaller stages. This was a well-informed crowd, thanks in part to myspace.com, which makes it easy (and free) to sample new music. So there were few surprises: these concertgoers already knew which bands they liked, and they moved among the stages like savvy consumers scouring familiar shops. It wasn't unusual to see a seemingly uninterested fan wandering away from the stage while mouthing every word. In lieu of hard statistics, here's a guess: at least half the bands had at least one song that at least half the concertgoers knew.

Right now, some of the biggest bands in this world — and at this festival — are the most theatrical. Fall Out Boy has sold over 2 million copies of its most recent album, "From Under the Cork Tree" (Island Def Jam), which is full of witty, petulant odes; the band's set was triumphant proof that few emo bands write better or more infectious songs. Other Bamboozle bands currently near the top of the emo heap: the emerging favorites Panic! at the Disco (which played an impressive set overstuffed with arch, often ridiculous lyrics); the strutters in the Long Island band Taking Back Sunday (whose new album hit the charts at No. 2 last week); the long-running California goth-punk act AFI (which is to release a new album next month).

A few bands were eyeing a more straightforward path to success. The Jonas Brothers, a young group that's getting used to being described as a (slightly) louder version of Hanson, played a low-key set on one of the smallest stages; it's getting a huge promotional push, which may well earn it the screaming preteen fans it clearly wants. At the same time, the hard-working pop-punk band Paramore was attracting a bigger crowd. The band is led by Hayley Williams, a tiny and energetic 17-year-old with a big voice. All she needs is a few more catchy songs; here's hoping she gets them soon.

Some of the most exciting music at the Bamboozle came from bands that managed to smuggle melodies into chaotic, metal-influenced songs. The band From First to Last has already released one of the year's best emo albums, "Heroine" (Epitaph). One of the weekend's highlights was a spitting-mad version of "The Latest Plague" from that CD. The Michigan band Chiodos showed off their quick-cut tantrums (metal riffs suddenly giving way to keyboard interludes) on Saturday, then returned on Sunday — under a pseudonym — to do it again.

And then there was Underoath, a Christian band from Florida with a good shot at becoming one of this year's emo success stories. While it played, an airplane circled above, advertising its new album, "Define the Great Line" (Tooth & Nail/Solid State), due out next month. The songs veered from death-metal chaos to anthemic choruses. And despite the airplane, the singer, Dallas Taylor, claimed he didn't mind if fans couldn't wait for the release date. "I'm not offended if you've already downloaded it," he said. "Just sing the words."
http://www.nytimes.com/2006/05/09/ar...bamb.html?8dpc





Apple to sell Fox shows on iTunes
AP

Apple Computer Inc.'s iTunes Music Store has started selling TV programs from Fox Entertainment Group's networks, including shows such as "24," the companies said Tuesday.

Shows for sale will cost $1.99 each to download and will come from the News Corp. unit's networks including Fox and FX as well as the 20th Century Fox Television library.

In addition to "24," programs will include "The Shield," "Prison Break," and "Buffy the Vampire Slayer," among others.

Apple already sells shows from ABC, CBS and NBC on iTunes.
http://www.businessweek.com/ap/finan...h_down&chan=tc





Chatterbox

SO ******. I am never buying anything from iTunes again. I could have spent $10 more dollars and gotten a RHCP membership and already had my tickets.
Jennabee

I feel like apple beat me up and stole my lunch money.
Phil88
http://discussions.apple.com/thread....73429&tstart=0





They can spam a million users a minute, but they can’t email a promo code…

iTunes Users Furious Over Botched Ticket Promo
Katie Marsal

A large number of Apple Computer's iTunes customers, who paid in advance for rock band Red Hot Chili Peppers' new album "Stadium Arcadium" in order to receive a Ticketmaster code that would allow them to purchase advance tickets for the bands upcoming tour, did not receive those codes before ticket pre-sales began on Tuesday and are now enraged with the iPod maker.

Hundreds of the angry iTunes customers are convening on the company's support forms, demanding to know why they did not receive their Ticketmaster pre-sale code Monday evening as Apple had led them to believe.

In an April press release advocating the promotion, Apple said: "Red Hot Chili Peppers fans who pre-order the album on iTunes will also receive an email with a code that they can use at Ticketmaster.com starting May 9 to purchase concert tickets before they go on sale to the general public on May 13."

A large majority of the customers still had not received their codes by Tuesday afternoon, despite the fact that pre-sales for many of the band's shows had already begun. Some of these customers reported receiving blank emails or emails about the promotion that lacked the special code, while others say they received no correspondence from Apple whatsoever.

One customer looking to purchase tickets for the Chili Peppers' Toronto, Canada show had not received his ticket code on Tuesday when he was informed that floor seats for the show had already sold out.

"I don't have my code yet either. This is the whole reason I pre-ordered Stadium Arcadium in the first place," said another disgruntled customer who plunked down $20 to participate in the promo. "Will someone at Apple please give us a shout?"

Apple has made no official comment on the issue, though several customers who contacted the company's various telephone hotlines were informed "Apple is aware of the problem" and that it is "working to get the emails [with the codes] out as soon as possible."
http://www.appleinsider.com/article.php?id=1732





Red Hot Chili Peppers Left Broken Hearted After 'Stadium Arcadium' Leaks Online

Red Hot Chili Peppers have been left broken hearted after their new double album 'Stadium Arcadium' was leaked online ahead of its official release on May 8.

Posting on the band's official website, bassist Flea has revealed that learning of the leak has been a "bitter pill to swallow".

"If you down load it now off one of these file sharing sites you will be getting a pale imitation of the record," he said. "It will be of the poor sound quality of the technique they used to get it on there and that will break my heart, it will break John Frusciante's heart, it will break Anthony Kiedis' heart and it will break the heart of Chad Smith."

He added: "Yes, we worked for a year and a half to make the epic record of our lives and it is sad to me for the business reasons of course. I think we are selling something really cool and we put all we had into it, 28 songs, 2 hours of the best that we can offer and I think it is a fair deal for everyone.

"For people to just steal a poor sound quality version of it for free because some asshole stole it and put it on the internet is sad to me."

However, in the lengthy posting, Flea explained that the worst thing about 'Stadium Arcadium' being available on filesharing sites is the inferior quality of the internet versions.

"The thing that really bums me out is we worked so hard, and so thoughtfully, all of us, for so long to make this record sound as warm and full from top to bottom as was possible," he said. "We spent day and night for a year making sure every little sound was just right, that they were all put together in the most beautiful way we could.

"I can not put in words how much this record, 'Stadium Arcadium', means to us, how sacred the sound of it is to us, and how many sleepless nights and hardworking days we all had thinking about how to make it be the best sounding thing we could and now, for someone to take it and put it out there with this poor sound quality it is a painful pill for us to swallow."

Signing off the message, Flea urged fans to "let (your conscience) be your guide)" over whether they choose to illegally download the album, adding: "To take a version that has been defiled sound wise, a version in which some idiot has taken our year and a half of soul baring work and pissed all over it - that will break our hearts."

Meanwhile, to celebrate the official release of 'Stadium Arcadium', Red Hot Chili Peppers have announced details of their summer North American tour.
http://www.nme.com/news/red-hot-chili-peppers/22971





A duck in every pot, a mod in every box

China Campuses' Internet Hall Monitors
Howard W. French

To her fellow students, Hu Yingying appears to be a typical undergraduate, plain of dress, quick with a smile and perhaps possessed of a little extra spring in her step, but otherwise decidedly ordinary.

And for Hu, in her second year at Shanghai Normal University, coming across as ordinary is just fine, given the parallel life she leads. For several hours each week she repairs to a little-known on-campus office crammed with computers, where she logs on, unsuspected by other students, to help police her university's Internet forums.

Once online, following suggestions from professors or older students, she introduces politically correct or innocuous themes for discussion.

Recently, she says, she started a discussion of which celebrities make the best role models, a topic suggested by a professor as appropriate.

Politics, even university politics, are banned on university bulletin boards like these. Hu says she and her fellow moderators try to steer what they consider negative conversations in a positive direction with a well-placed comment. Anything they deem offensive, she says, they report to the university's Web master for deletion.

During some heated anti-Japanese demonstrations last year, for example, moderators intervened to cool nationalist passions, encouraging students to mute their criticisms of Japan and discouraging any bellicose remarks.

Part traffic cop, part informer, part discussion moderator - and all done without the knowledge of her fellow students - Hu is a small part of a huge effort in mainland China to sanitize the Internet.

For years, China has had its Internet police, reportedly including as many as 50,000 state agents who are online, blocking Web sites, erasing commentary and arresting people for what is deemed anti-Party, or anti-social, speech.

But Hu, one of 500 students at her university's newly bolstered, student-run Internet monitoring group, is a cog in a different kind of machine, an ostensibly voluntary one that the Chinese government is mobilizing to help it manage the monumental task of censoring the Web.

In April, that effort was named "Let the Winds of a Civilized Internet Blow," and is itself part of a broader "socialist morality" campaign started by the Chinese leadership to reinforce social and political control, known as the Eight Honors and Disgraces.

Under the Civilized Internet initiative, service providers and other companies have been urged to purge their servers of offensive content, ranging from pornography to anything that smacks of overt political criticism or dissent.

The Chinese authorities say that more than two million supposedly "unhealthy" images have already been deleted under this campaign by various mainland Internet service providers, and more than six hundred supposedly "unhealthy" Internet forums were shut down.

These deletions are presented as voluntary acts of corporate civic virtue, but have a coercive aspect to them, because no company would likely risk being singled out as a laggard.

Having started its own ambitious Internet censorship efforts, or "harmful information defense system," long before the latest government campaign, Shanghai Normal University, where Hu monitors her fellow students, is promoting itself within the education establishment as a pioneer.

Although most of its students know nothing of the university's Internet monitoring efforts, the leaders of Shanghai Normal conducted seminars last week for dozens of other Chinese universities and education officials on how to emulate their success in taming the Web.

University officials turned away a foreign reporter, however, making clear that the university does not wish to publicize its activities more broadly. "Our system is not very mature, and since we've just started operating it, there's not much to say about it," said Li Ximeng, deputy director of the university propaganda department. "Our system is not open for media, and we don't want to have it appear in the news or be publicized."

For her part, Hu beams with pride over her contribution toward building what the government calls a "harmonious society."

"We don't control things, but we really don't want bad or wrong things to appear on the Web sites," she said. "According to our social and educational systems, we should judge what is right and wrong. And as I'm a student cadre, I need to play a pioneer role among other students, to express my opinion, to make stronger my belief in communism."

While the larger Civilized Internet campaign all but requires companies to step forward and demonstrate their vigilance against what the government deems harmful information, the new censorship drive on college campuses shows greater subtlety and some might say greater deviousness, too.

It is here that the government is facing perhaps its most serious challenge: how to orient and maintain control of young people's thoughts in a world of increasingly free and diverse information. And the answer relies heavily on stealth.

For one thing, interviews with numerous students at a sprawling and well- manicured campus of Shanghai Normal University showed that few knew anything about the student-run monitoring, and none of those who had heard of it had imagined that such a large number of students had been enlisted for it.

"It's true there are some bad things on the Internet, but they shouldn't overdo it," said one student, Liao Xiaojing. "Five hundred is too many."

Others expressed more alarm. "Five hundred members sounds unbelievable," said a male undergraduate who gave his name only as Zhu. "It feels very weird to think there are 500 people out there anonymously trying to guide you."

The monitors themselves have been convinced that they are not engaging in censorship, or exercising control over the free speech of others. In interviews with five of the monitors, each initially rejected the idea that they were controlling expression, and occasionally even spoke of the importance of free speech.

Tang Guochao, 20, spoke in fervent terms about what he and his fellow monitors were doing. "A bulletin board is like a family, and in a family, I want my room to be clean and well-lit, without dirty or dangerous things in it."

Chinese efforts to censor and control the Internet in the broader society have often come up short against the curiosity and inventiveness of ordinary Web surfers, who constantly develop ingenious ways to find content that is banned and to discuss controversial topics.

"I don't think anybody can possibly control any information in Internet," said Ji Xiaoyin, 20, a third-year Shanghai Normal student studying mechanical design. "If you're not allowed to talk here, you just go to another place to talk, and there are countless places for your opinions. It's easy to bypass the firewalls, and anybody who spends a little time researching it can figure it out."
http://www.iht.com/articles/2006/05/...s/chinanet.php





We’re the monopoly and we’re not going to take it!

Smaller Cable Firms Take Aim At Net Neutrality Fans
Anne Broache

Young, wealthy Internet companies like Google shouldn't expect to get "special favors" from network operators that have sunk billions of dollars into fiber investments, the head of a smaller cable company said Monday.

Rocco Commisso, CEO of New York-based Mediacom Communications, delivered the latest commentary in the ongoing Net neutrality fray at an annual Washington, D.C., summit organized by the American Cable Association, a lobbying group for small and medium-size independent cable companies. Mediacom, which bills itself as the nation's eighth-largest cable television provider, counts 1.5 million basic-cable subscribers across 23 states, according to its Web site.

"I think what the phone industry's saying and what we're saying is we've made an investment, and I don't think the government should be coming and telling us how we can work that infrastructure, simple as that," Commisso said during a panel discussion about issues faced by companies like his, adding, "Why don't they go and tell the oil companies what they should charge for their damn gas?"

The remarks indicated it's not only the nation's largest broadband players, both in the cable and the telecommunications sectors, that have voiced public opposition to what they refer to as unprecedented governmental regulation of the Internet. They've said repeatedly that without evidence of a problem, there's no need for new laws.

Net neutrality, also called network neutrality, is the philosophy that network operators should not be allowed to prioritize content and services--particularly video--that come across their pipes. Proponents have launched a campaign to enact detailed regulations barring such practices, and so far they've won over some congressional Democrats.

Network operators counter that they deserve the right to charge premium fees to bandwidth hogs in order to offset their vast investments in infrastructure and to ensure the quality and security of their products. Mediacom has made $1.7 billion in capital investments over the past decade, according to Commisso.

"It's incredible that a company like Google that's got market capitalization bigger than the combined value of the cable business....these guys just started five, 10 years ago, and they're asking for special favors already," Commisso said.

His statement conjured up earlier admissions by telecommunications power players, including one Verizon executive who cautioned that Google should not be entitled to a "free lunch."

Net neutrality advocates--which include Google, Microsoft, Amazon.com and a medley of mostly left-leaning consumer groups--argue that such a business model would lead to increased costs for Web surfers and would assault the Internet's historically open architecture.

Their rallying cry--and their very selection of the term "Net neutrality"--is nothing more than a "very, very clever D.C. campaign," charged Tom Might, CEO of Arizona-based Cable One, which has customers in 19 states with large rural populations. Politicians, he suggested, "don't know what it is, but they're afraid to be against Net neutrality because it sounds so wonderful, like Mom and apple pie."
http://news.com.com/Smaller+cable+fi...3-6069873.html





US Patent and Trademark Office to Use Peer to Patent Program
Michael Hoffman

The public will get a chance to review patents before they are approved by the USPTO

The US Patent and Trademark Office has received praise for officially launching the Peer to Patent program -- the purpose of Peer to Patent is to find patents that have been issued for already made products or items that don't properly qualify for a patent. Because the USPTO usually does not have the manpower and time to thoroughly check every patent that comes into the office, many are unjustly rubber stamped. A New York law school helped develop the Peer to Patent program that will help ease the workload of "underpaid and overwhelmed" patent examiners. The pilot program will officially begin on May 12.

One of the goals of the program is to excessively scrutinize inventions while increasing certainty and stability in the patent program. To get some more information about the Peer to Patent program, please look around this website, which also includes a very extensive FAQ section. An interesting policy is the project's response on companies or individuals that may attempt to game the system:

Competition will drive more information into the process. So long as people make valid arguments as rated by their peers, their personal agenda is irrelevant. Having many participants in the process dilutes the effect of any bad apples or unconstructive participants. Within any social reputation system, norms evolve to safeguard the quality of participation and we can expect something similar here.

Certainly, there are some interesting connotations with this idea. Imagining IBM, AMD and Intel validating or invalidating each other's patents would solve dozens, if not hundreds of fringe IP law suits before they even occur.
http://www.dailytech.com/article.aspx?newsid=2217





Yea, more cables!

Putting the Wire Back Into Networking
Damon Darlin

Back in the Stone Age of home networking, anyone who wanted to play on a computer not hooked directly into an Internet connection had to snake phone lines or Ethernet wires across floors and up staircases.

People talked about a promising idea: using the electrical wiring already in the house to move data from room to room. One early application, the X10 system for controlling lights and appliances, didn't always work well. The technology was certainly not ready to be used to bring Web pages to computers anywhere in the house.

Along came the wireless network. For $50, you could get the Internet sprayed across the house and never be tethered by a cord to the wall. It was slow in those early days, notoriously unreliable, and open to interception if you couldn't bother with setting up the encryption codes.

But it caught on. According to estimates made by Parks Associates, a market research firm based in Dallas, about 12.5 million homes now have wireless networks; another 10 million homes, mostly newer ones, have Ethernet or coaxial cables in the walls.

Cheap and ubiquitous is a hard combination to beat. But wireless networks did not end the quest to put data through electrical wires.

Technology companies continued to work on the idea. Some tried using phone circuits. A version for power lines called HomePlug came out in 2002, and while it hardly affected sales of wireless network equipment, it sold enough that major companies like Intel, Cisco, Sony, Sharp and Comcast created the HomePlug Alliance to push for next-generation products, with the first to come out later this year.

"I don't think anyone had expected the technology to progress," said Andy Melder, senior vice president for sales, marketing and business development at the Intellon Corporation, a maker of chips for home networking devices that use power lines.

Some companies are not waiting. Panasonic, Netgear and Marantz are already offering products that will move data through home electrical lines faster than routers using the current Wi-Fi standard for wireless networking, 802.11g.

Panasonic started selling its HD-PLC Ethernet adapters for power lines last month. A $200 starter kit provides two units, each about the size of two sticks of butter.

One adapter is attached to a router with a short Ethernet cable and plugged into a nearby wall outlet. The second device is plugged into an outlet elsewhere in the house. When a computer is linked to it with an Ethernet cable, data is transmitted through the home's electrical wiring at speeds of up to 190 megabits a second. Up to seven devices can run on the network.

Netgear, a leading maker of wireless networking gear, will be selling a similar system next month for about $300. (Every additional module costs about $150.) It moves data at a slightly faster rate.

Marantz says its ZR6001SP receiver will send music to special speakers in another room over power lines. The system, which includes both devices, will sell for about $1,300. Additional speaker units cost about $300. The music listener controls the receiver and the CD players or iPods connected to it from a control pad on the speakers.

"We were getting many requests from installers, like how do I get multiroom audio if I can't run wires," said Kevin Zarow, vice president for marketing and product development. The Marantz device also solves the problem of running speaker wires across a room.

At first blush, these products may seem to be nonstarters. After all, who would want to pay two or three times the price of a wireless network?

The answer lies in the simplicity.

Robert Stephens, founder and "chief inspector" of the Geek Squad installation and troubleshooting division at Best Buy, said installing wireless networks was the leading reason for house calls. "It's why most people need us," he said, noting that the complexity of installing a wireless network is evident from the fact that return rates on wireless networking devices drop to nearly zero when his installers do the work.

The Panasonic network over power lines, on the other hand, was up and running in less than five minutes. Encryption was automatically enabled, and there was no need to configure anything. It worked well even in a house with 90-year-old cloth-wrapped tube-and-knob wiring where the lights sometimes flicker. And though Panasonic warns that operating a power drill or a vacuum cleaner on the same outlet may cause an interruption of Internet service, running both while using the HD-PLC on the old wiring did not pose a problem.

The makers of all three products said that people who cannot get whole-house coverage with a wireless system or those plagued by dead zones might find it appealing.

But the real selling point for the technology is that it can transmit high-definition video without pixelating or skipping. It can claim that advantage over wireless networks — at least for now — because it has a higher data transmission rate.

"Three years ago, the majority of devices connected to a home network were home computers," said Mike Timar, national marketing manager for Panasonic's communications and home office electronics division. "But today there are MP3 players, game consoles and high-definition TV."

Wireless routers using the 802.11g standard move data at 54 megabits a second. That's fine for Web pages, but too constrained to move a high-definition video image, which needs about 85 megabits of capacity. The Panasonic and Netgear products have more than enough room to handle that, as will the HomePlug devices coming out later this year.

The next-generation wireless routers, using the 802.11n standard, will also transmit about 200 megabits a second, but a network may initially cost $150 to $250, erasing the cost advantage that wireless now holds.

Pitching the device to the next generation of TV watchers with high-definition televisions and DVD players also pulls in the market for game console users who might want to run multiplayer games from multiple rooms. It also neatly sidesteps the argument that wireless is more convenient.

"If you are watching TV, you don't care about mobility," said Kartik Gada, Netgear's networking product line manager.

There is a hitch, however. The three companies' products are not compatible with one another. Nor are they compatible with the products adhering to the standards set in August by the HomePlug Alliance.

Netgear and Panasonic jumped the gun on the standard out of frustration with what they said was the slow pace of the alliance. (Marantz is using a system called DAvED, which stands for digital audio via electrical distribution.)

"Not going with a standard-based approach is problematic," said Mr. Melder of Intellon, who is also a spokesman for the HomePlug Alliance. "It tends to freeze the consumer."

Panasonic executives said the company's breaking of the ranks would not necessarily create compatibility problems in the long run. They said a second standards group, the Consumer Electronics Powerline Communication Alliance, is working to ensure that all the networking devices for power lines could coexist and communicate.

There is something that all the makers of such gear, including Netgear and Cisco's Linksys unit, can agree on. People will probably end up having both wireless and wired connections in their homes.

Within about 18 months, cable companies may start offering set-top boxes with networking abilities over power lines. Computer makers, as well as television and DVD makers, will do the same. At that point, all a consumer will have to do is stick the power plug into the wall and the data will come racing down the wires with the electricity.
http://www.nytimes.com/2006/05/11/te.../11basics.html





Demi-Gods
Jack



Spore is the new game from Sim City creator Will Wright. Players assemble exotic avatars in a Pixar-like process, learn behavioral traits and wander strange planets in the richly drawn universe. It’s like a sci-fi Sims adventure for older gamers. Fascinating presentation available for download as a 200 meg .mov file.





Dolphins, Like Humans, Recognize Names

Bottlenose dolphins can call each other by name when they whistle, making them the only animals besides humans known to recognize such identity information, scientists reported on Monday.

Scientists have long known that dolphins' whistling calls include repeated information thought to be their names, but a new study indicates dolphins recognize these names even when voice cues are removed from the sound.

For example, a dolphin might be expected to recognize its name if called by its mother, but the new study found most dolphins recognized names -- their signature whistles -- even when emitted without inflection or other vocal cues.

More than that, two dolphins may refer to a third by the third animal's name, said Laela Sayigh, one of three authors of a paper published in the Proceedings of the National Academy of Sciences.

"They are known to produce these individually distinctive signature whistles, like names," Sayigh said in a telephone interview. She said the researchers wanted to know what information in the whistles helped dolphins identify each other's names.

The scientists already knew that dolphins responded to whistles, but wondered if something in the actual voice of the whistling dolphin was making the identity clear, or if the name itself was enough for recognition.

To find out, they studied bottlenose dolphins in Sarasota Bay, Florida. Instead of playing recordings of actual dolphins making signature whistles, the researchers synthesized signature whistles with the caller's voice features removed and played them to dolphins through an underwater speaker.

In nine out of 14 cases, the dolphin would turn more often toward the speaker if it heard a whistle that sounded like a close relative's.

"It's a very interesting finding that encourages further research, because they are using whistles as referential signals -- that's what words are," said Sayigh, of the University of North Carolina Wilmington. "Dolphins appear to be using these arbitrary signals to identify another dolphin."

She stopped short of saying dolphins might have a human-like language.

"I tend to shy away from using the word 'language' myself, because it's such a loaded term," Sayigh said. "I still really feel strongly that there is no evidence for something like our language. (Dolphins) have got the cognitive skills at least to have referential signals."
http://www.cnn.com/2006/TECH/science...eut/index.html






Korea Unveils World's Second Android

Korea has developed its own android capable of facial expressions on its humanoid face, the second such machine to be developed after one from Japan. The Ministry of Commerce, Industry and Energy invited some 60 children to the Kyoyuk Munhwa Hoekwan in Seoul to introduce Ever-1 to the public. The name combines the first human name found in the Bible, Eve, with the "r" in robot.


The Korean Institute for Industrial Technology (KITECH) said the android, which has the face and body of a woman in her 20s, is 160 cm tall and weighs 50 kg. Ever-1 can move its upper body and “express” happiness, anger, sadness and pleasure. But the robot is still incapable of moving its lower half. Ever-1's skin is made from a silicon jelly that feels similar to human skin. The face is a composite of two stars, and its torso on a singer.

The 15 monitors in the robotic face allow it to interpret the face of an interlocutor and look back at whoever stands near it. Ever-1 also recognizes 400 words and can hold a basic verbal exchange.

"The robot can serve to provide information in department stores and museums or read stories to children; it’s capable of both education and entertainment functions," said KITECH scientist Baeg Moon-hong, part of the team that created the robot. "The Ever-2, which will have improved vision and ability to express emotions and can sit or stand, will be debuted towards the end of the year."
http://english.chosun.com/w21data/ht...605040016.html





Report Casts Doubt on Vista's Security Impact
Matt Hines

An early review of the much-publicized security features due in Microsoft's next-generation Windows Vista operating system concludes that the tools may be so unfriendly to users that they delay enterprises' move to adopt the new product.

In a research report published May 8, analysts at Boston-based Yankee Group said that Microsoft's latest attempt to better secure its dominant OS is significantly off the mark. Based on feedback garnered by the experts from a wide range of software developers already testing preview versions of Vista, Yankee Group said that the intrusive nature of the security features could turn off IT administrators and users alike.

While the researchers laud Microsoft's efforts to reduce account privileges to slow the spread of malware, lock down holes in its Internet Explorer browser, improve network access controls and integrate anti-spyware and anti-phishing applications into Vista, the report concludes that the execution of some of those plans may encourage companies to take a wait-and-see approach with the OS.

Andy Jaquith, the analyst who authored the report for Yankee Group, said that many people already working with Vista feel that Microsoft's security tools are unnecessarily repetitive and even patronizing, and interrupt the workflow of administrators to the extent it makes their jobs harder to perform.

Specifically, Jaquith, who tested a preview version of Vista released in December 2005, said that Microsoft's incorporation of user accounts that strictly limit access privileges via its User Account Control feature will be "particularly problematic."

Microsoft representatives didn't immediately offer comment on the findings of the Yankee Group report, but confirmed that they had read its contents.

Guru Jakob Nielsen offers advice on designing applications for usability. Click here to watch the video.

By forcing end users with such accounts to constantly seek approval from administrators to complete tasks they manipulate freely in today's versions of Windows, and creating headaches for those people charged with handing out such permissions, Jaquith said the features may simply be ignored or shut off by many people.

Read more here about delays in Vista.

"The User Account Control feature is like Chatty Kathy, it's always in your face and the danger is that users are going to start treating it like the snooze button on their alarm clock and hitting 'yes' without looking to see why they've been prompted," said Jaquith. "A lot of people, especially home users, will probably turn the feature off so they'll essentially be no better off than before."

Another issue with the User Access Control is that it is incompatible with popularly used anti-virus applications from companies such as Symantec and McAfee, forcing customers to wait until those firms have rewritten their products to mesh properly with Vista.

The analyst said he was surprised to see that the new SafeDocs backup program shipped with Vista can only be run by IT administrators, not end users.

Next Page: Putting itself at a disadvantage.

Yankee Group contends that Microsoft has also put itself at a disadvantage by failing to invest sufficient effort into its partnership programs for ISVs, making it likely that additional third-party programs being built to run on Vista will need more development work before coming to market.

Related delays could keep Vista-oriented products from arriving for as much as a year after the OS is introduced sometime in 2007, the report said.

Jaquith said that Microsoft is headed in the right direction with its security work in Vista, but he said he believes that it will take the company at least a year before it is able to make the features it has already added more digestible for administrators and end users.

One of the major issues will be the way in which the security tools "fundamentally shift" the way that administrators interact with Vista, he said, in that people who were used to having almost unlimited access to desktop controls will find themselves more limited in their scope of authority.

"It's not a step backward, but the features are going to cause some disruption in the manner that people work and will interfere with some people's perceived ability to do their job in short term," said Jaquith.

"If people had unfettered access to everything before, putting limits on that is going to be pretty jarring, but I think it's something that Microsoft had to do in some way."

So many viruses depend on their ability to take over computers' Windows administrative controls in order to spread themselves that the feature should have success in slowing attacks and protecting corporate networks, the analyst said.

In light of the issues surrounding Vista's security tools, Yankee Group is predicting that the software introduction will have a limited effect on the anti-malware applications industry, at least in the next year or two. Despite the added time to compete against Microsoft, researchers said that many providers of individual security technologies addressed by Vista, such as anti-spyware or anti-phishing filters, will likely consolidate to offer more integrated packages of defense software.

Ziff Davis Media eSeminars invite: Join us on May 11 at 2 p.m. ET to learn critical best practices for e-mail and instant messaging applications, including tips on "hygiene" from Gartner.

"We're telling enterprises, if you've got security controls in place and third-party packages that you're working with, keep using them, but Vista is eventually going to change the need for those," said Jaquith.

"We feel companies should really wait until the end of 2007, or the beginning of 2008 at the very earliest to get into the work, as Microsoft will have likely issued a service pack by that time to address any major issues."
http://www.eweek.com/article2/0,1759,1958355,00.asp





DS Browser Screenshots

The Opera browser for Nintendo DS is a version of the Opera browser for logging onto the internet with the WiFi-enabled Nintendo DS. Using the DS card, you can connect to a network via a HotSpot or wireless router, and begin browsing on two screens. With an on-screen keypad and stylus, users can easily navigate the Web from their Nintendo DS with PDA-like functionality. The two screens are used for multifunction purposes — both can show one web page together, or one can show a zoomed-in view of the page, and when typing, the bottom screen shows the text being entered while the top shows the webpage you are on.
http://wiinintendo.net/?p=110





Spot a Bug, Go to Jail
Jennifer Granick

Circuit Court
A new federal prosecution again raises the issue of whether computer security experts must fear prison time for investigating and reporting vulnerabilities.

On April 28, 2006, Eric McCarty was arraigned in U.S. District Court in Los Angeles. McCarty is a professional computer security consultant who noticed that there was a problem with the way the University of Southern California had constructed its web page for online applications. A database programming error allowed outsiders to obtain applicants' personal information, including Social Security numbers.

For proof, the man copied seven applicants' personal records and anonymously sent them to a reporter for SecurityFocus. The journalist notified the school, the school fixed the problem, and the reporter wrote an article about it.

The incident might have ended there, but didn't.

The school went through its server logs and easily traced the activity back to McCarty, who had made no attempt to hide his tracks. The FBI interviewed McCarty, who explained everything to the agents. Then the U.S. Attorney's Office in Los Angeles charged the security expert with violating 18 U.S.C. 1030, the federal computer crime law.

Will they ever learn? In 2002, the U.S. Attorney in Texas charged Stefan Puffer with violating section 1030 after Puffer demonstrated to the Harris County District Court clerk that the court's wireless network was readily accessible to attackers. The prosecution claimed that Puffer, a security consultant, unlawfully accessed the system. Puffer argued that he was trying to help the county. A jury acquitted Puffer in about 15 minutes.

In 2004, Bret McDanel was convicted of violating section 1030 when he e-mailed truthful information about a security problem to the customers of his former employer. The prosecution argued that McDanel had accessed the company e-mail server by sending the messages, and that the access was unauthorized within the meaning of the law because the company didn't want this information distributed. They even claimed the integrity of the system was impaired because a lot more people (customers) now knew that the system was insecure.

Notwithstanding the First Amendment's free speech guarantees, the trial judge convicted and sentenced McDanel to 16 months in prison. I represented him on appeal, and argued that reporting on security flaws doesn't impair the integrity of computer systems. In an extremely unusual turn of events, the prosecution did not defend its actions, but voluntarily moved to vacate the conviction.

The McCarty prosecution, brought by the same office that so egregiously mishandled the McDanel incident, is in the same vein. As with Puffer and McDanel, the government will have to prove not only that McCarty accessed the school system without authorization, but also that he had some kind of criminal intent.

Likely, they will point to the fact that McCarty copied some applicant records. "It wasn't that he could access the database and showed that it could be bypassed," Michael Zweiback, an assistant attorney for the Department of Justice's cybercrime and intellectual property crimes section, told the SecurityFocus reporter. "He went beyond that and gained additional information regarding the personal records of the applicant."

But if he wanted to reveal USC's security gaffe, it's not clear what else he could have done. He had to get a sampling of the exposed records to prove that his claims were true. SecurityFocus reported that USC administrators initially claimed that only two database records were exposed, and only acknowledged that the entire database was threatened after additional records were shown to them.

In any event, McCarty had arguably already done enough to get himself prosecuted by this Justice Department.

The federal statute and copycat state laws prohibit accessing computers or a computer system without authorization, or in excess of authorization, and thereby obtaining information or causing damage.

What does it mean to access a networked computer? Any communication with that computer -- even if it's simply one system asking another "are you there?" -- transmits data to the other machine. The cases say that e-mail, web surfing and port scanning all access computers. One court has even held that when I send an e-mail, not only am I accessing your e-mail server and your computer, but I'm also "accessing" every computer in between that helps transmit my message.

That means the law frequently rests on the definition of "authorization." Many cases suggest that if the owner doesn't want you to use the system, for whatever reason, your use is unauthorized. In one case I took on appeal, the trial court had held that searching for airline fares on a publicly available, unprotected website was unauthorized access because the airline had asked the searcher to stop.

One Western District of Washington case, Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., says that when a company employee knows he is going to leave his position to go work for a competitor, but continues to use his computer account and copy information there for the purposes of aiding his new bosses, his access is unauthorized. A federal court in Maryland went the other way in a case with similar facts: In International Association of Machinists and Aerospace Workers v. Werner-Matsuda, a union employee who accessed her computer account for the purposes of helping a rival union recruit members did not violate the law. The statute proscribes unauthorized access, not authorized access for unwanted purposes, said the court.

What this means for McCarty is that there are ample legal reasons for the prosecution to drop the charges against him. Yet, there are also ample legal reasons why a security professional, upon finding a database flaw, might worry that the find would bring criminal charges rather than thanks.

This situation must change. People need to be able to exercise a little bit of self-help before plugging their data into web forms, and security professionals who happen upon vulnerabilities shouldn't have to choose between leaving the system wide open to attack and prosecution.

One solution might be to focus more heavily on whether the user has criminal intent when accessing the system. Another might be to criminalize specific activities on the computer, but not access to a public system itself. A third might be to define unlawful access as the circumvention of some kind of security measure. As we have more cases like McCarty's, McDanel's and Puffer's, perhaps security professionals will pressure state legislatures and Congress to improve the computer crime laws.
http://www.wired.com/news/columns/ci...?tw=wn_index_6





Security Absurdity: The Complete, Unquestionable, And Total Failure of Information Security.

A long-overdue wake up call for the information security community.
Noam Eppel

Boiling Frog Syndrome

They say if you drop a frog in a pot of boiling water, it will, of course, frantically try to scramble out. But if you place it gently in a pot of tepid water and turn the heat on low, it will float there quite complacently. As you turn up the heat, the frog will sink into a tranquil stupor and before long, with a smile on its face, it will unresistingly allow itself to be boiled to death. The security industry is much like that frog; completely and uncontrollably in disarray - yet we tolerated it since we are use to it.

It is time to admit what many security professional already know: We as security professional are drastically failing ourselves, our community and the people we are meant to protect. Too many of our security layers of defense are broken. Security professionals are enjoying a surge in business and growing salaries and that is why we tolerate the dismal situation we are facing. Yet it is our mandate, first and foremost, to protect.

The ramifications of our failure is immense. The success of the Internet and the global economy relies on trust and security. Billions of dollars of ecommerce opportunities are being lost due to inadequate security. A recent survey of U.S. adults revealed that three times the number of respondents believed they were more likely to be victimized in an online attack than a physical crime. A recent Gartner survey that indicated that 14% of those who had banked online had stopped because of security concerns, and 30% had altered their usage. People are simply losing trust in the Internet.

The security community is not just failing in one specific way, it is failing across multiple categories. It is being out innovated.

It is losing the digital battle over cyberspace.

Failing? Says Who?

Today we have forth and fifth generation firewalls, behavior-based anti-malware software, host and network intrusion detection systems, intrusion prevention system, one-time password tokens, automatic vulnerability scanners, personal firewalls, etc., all working to keep us secure. Is this keeping us secure? According to USA Today, 2005 was the worst year ever for security breaches of computer systems. The US Treasury Department's Office of Technical Assistance estimates cybercrime proceeds in 2004 were $105 billion, greater than those of illegal drug sales. According to the recently released 2005 FBI/CSI Computer Crime and Security Survey, nearly nine out of 10 U.S. businesses suffered from a computer virus, spyware or other online attack in 2004 or 2005 despite widespread use of security software. According to the FBI, every day 27,000 have their identities stolen. And companies like IBM are putting out warning calls about more targeted, more sophisticated and more damaging attacks in 2006.

Something is seriously wrong.

One only has to open a newspaper and view current headlines documenting the almost constant loss of personal and financial data due to carelessness and hacking. It isn't just careless individuals that are leaking confidential information - it is large, multinational corporations with smart, capable I.T. departments with dedicated security professionals and huge security budgets.

Credit Card Breach Exposes 40 Million Accounts
Bank Of America Loses A Million Customer Records
Pentagon Hacker Compromises Personal Data
Online Attack Puts 1.4 Million Records At Risk
Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time'
Laptop Theft Puts Data Of 98,000 At Risk
Medical Group: Data On 185,000 People Stolen
Hackers Grab LexisNexis Info on 32000 People
ChoicePoint Data Theft Widens To 145,000 People
PIN Scandal 'Worst Hack Ever'; Citibank Only The Start
ID Theft Hit 3.6 Million In U.S.
Georgia Technology Authority Hack Exposes Confidential Information of 570,000 Members
Scammers Access Data On 35,000 Californians
Payroll Firm Pulls Web Services Citing Data Leak
Hacker Steals Air Force Officers' Personal Information
Undisclosed Number of Verizon Employees at Risk of Identity Theft
Just How Bad Is It?

In some cases, even our best recommended security practices are failing.

In a recent experiment, AvanteGarde deployed half a dozen systems in honeypot style, using default security settings. It then analyzed the machines' performance by tallying the attacks, counting the number of compromises, and timing how long it took an attack to successfully hijack a computer once it was connected to the Internet. The average time until a successful compromise was just four minutes!

A person can go to his/her local computer store and purchase an expensive new computer, plug it in, turn it on and go get a coffee. When he/she returns the computer could already be infected with a trojan and being used in a botnet to send out spam, participate in phishing attacks, virus propagation, and denial-of-service attacks, etc.

The first thing most consumers do with a new computer is surf the Internet, play games, send emails - not install patches. However, even if a person was security-aware and even if the person followed SANS Incident Response Center's recommendations for Surviving the First Day of Windows XP, they will still be left vulnerable as the process of downloading and installing the latest Microsoft patches which may be as small as 70 megabytes (MB) or as large as 260 MB, takes longer then the time it takes for an unpatched computer to be compromised. "In some instances, someone had taken complete control of the machine in as little as 30 seconds," said Marcus Colombano, a partner with AvanteGarde.
The Failures Are Everywhere

The effects of our failure can be seen everywhere.

Spyware
The average user's computer is absolutely crawling with spyware and popups. According to the National Cyber Security Alliance a staggering 91 percent in the study have spyware on their computers. According to a report from EarthLink and Webroot Software, a scans of over 1 million Internet-connected computers found there's an average of almost 28 spyware programs running on each computer. Spyware can cause extremely slow performance, excessive and unsolicited pop-up advertisements, hijacked home pages, theft of personal information (including financial information such as credit card numbers), monitoring of Web-browsing activity for marketing purposes, routing of HTTP requests to advertising sites, etc. Sometimes Spyware can cross the line when it expose adult pornography to children.

Eric Howes, a renowned security researcher at the University of Illinois at Urbana-Champaign, found that many of the best-performing anti-spyware scanner "fail miserably" when it comes to removing spyware from infected computers, with some missing up to 25% percent of the critical files and registry entries installed by the malicious programs. Recovering from malware is becoming impossible, according to Microsoft.

Phishing
Phishing scams now exceed 40 million attempts per week. Phishing attacks started as poorly written email messages in broken English that only the most gullible would fall for. Today Phishing attacks are sophisticated operations with emails and fake websites that appear almost identical to the real thing. In June 2004, the Gartner Group reported that online bank accounts had been looted of $2.4 billion just in the previous 12 months. It estimated that 1.98 million adults in America had suffered losses with Phishing attacks which usually impersonate well known brands such as eBay, PayPal, Visa, SouthTrust Bank, KeyBank, AOL, Comcast, Earthlink, Citizen Bank, Verizon, etc.

George Ou revealed that many large American financial institutions are not using SSL to verify their identity to the customer. This makes it more easy for a phishing attacker to intercept and spoof a financial web site. Financial institutions that were identified as not using SSL properly include: American Express, Bank of America, Chase, Countrywide, DCU, Georgia Telco Credit Union, Keybank, NationalCity, NAVY Federal, PSECU, US Bank, Wachovia, and Washington Mutual.

Trojans & Viruses & Worms
There are literally thousands of new trojans, viruses and worms created each and every month. In the past, where as malware-creation was done mostly out of curiosity, entertainment or in search of notoriety, today they are being driven by financial returns and profits. Previously, the greatest potential danger was the deletion of computer files. Nowadays, your money and confidential information is at risk.

The U.S. Federal Bureau of Investigation (FBI) estimates that computer crime costs American companies a staggering $62 billion a year—with computer viruses, worms or Trojan horses plaguing 84 percent of the 2,066 respondents to the agency’s 2005 security survey. Microsoft has had over two billion downloads of its malicious software removal tool in the last year, which tells us something about the overall size of the malicious software problem.

Malware is becoming ever more dangerous and sophisticated. A new class of cyrpto-viruses such as Ransom.A.Trojan and Zippo.A, infects a computer and encrypt documents on the hard drive. These viruses then demands the user to send money via paypal or Western Union to a designated account in order to reveal the password needed to decrypt the files. These "ransomware" viruses usually demand a relatively small amount of money (From 10.99 to a few hundred dollars) in exchange for the password which increases the likelihood that the ransom will be paid.

New generation of rootkits are becoming increasingly difficult to detect. Microsoft Research labs created the first proof-of-concept prototype for virtual machine-based rootkits called SubVirt. VM Rootkits drops a virtual machine monitor underneath an operating system, which makes the rootkit virtually impossible to detect from the host operating system because its state cannot be accessed by security software running on the target system.

Today's malware propagation strategies are overwhelming and exploiting the weakness in the industry-standard, signature-based detection method of most anti-virus software.

The conventional signature-based approach, which involves maintaining a library of characteristics of each and every malicious attack, is fast falling behind. It is completely reactive. The speed of attack and propagation is such that patches simply cannot be issued quickly enough. In 2001, the infamous Code Red Worm was infecting a remarkable 2,000 new hosts each minute. Nick Weaver at UC Berkeley proposed the possibility of a "Flash Worm" which could spread across the Internet and infect all vulnerable servers in less than 15 minutes. A well engineered flash worm could spread worldwide in a matter of seconds.

Another method to bypass signature-detection methods is custom-designed trojans such as Trojan.Mdropper.B and Trojan.Riler.C that are being created to target a specific company or industry. On June 16, the United Kingdom's incident response team, the National Infrastructure Security Co-ordination Centre, warned that stealthy Trojan-horse attacks were targeting specific U.K. companies and government agencies.

"I think it would be very, very naive for any company to ignore these attacks. The lack of instances makes this more insidious, because it's likely that that no one is detecting the attacks. People may only notice it months later--by then, it is too late." said Mark Sunner, chief technology officer, MessageLabs.

Spam
Bill Gates, the co-founder and chief software architect of Microsoft predicted the Death of Spam by 2006. Spam activity has increased 65% since January 2002 according to Postini. And as of April 2006 they report that 70% of all emails - or 10 out of 14 emails - are spam which includes unsolicited commercial advertisements, stock scams, adult content, financial hoaxes, etc.

Not surprisingly, spam is predicted to get much worse. At the 2006 European Institute for Computer Anti-Virus Research conference in Hamburg, John Aycock and Nathan Friess from the University of Calgary presented a paper on how spam can bypass even the best spam filters and trick experienced computer users who would normally delete suspicious email messages. The new technique relies on a new generation of spam zombies that monitor and mine email they find on infected machines, using this data to automatically forge and send improved, convincing spam to others. The next generation of spam could be sent from your friends' and colleagues' email addresses – and even mimic patterns that mark their messages as their own (such as common abbreviations, misspellings, capitalization, and personal signatures) – making you more likely to click on a Web link or open an attachment.

Botnets
When the U.S. Justice Department stepped up its investigation of cybercrime, it found spam originating from an unexpected source: hundreds of powerful computers at the Department of Defense and the U.S. Senate. The machines were "zombies" that had been compromised by hackers and integrated into bot networks that can be remotely controlled to send spam or launch distributed denial of service attacks. Botnets consisting of 100,000 and 200,000 nodes are not uncommon. There's even a case where a real botnet was found with about 1.5 million machines under one person's control.

According to data from PandaLabs, in 2005 more than 10,000 examples of bots were detected, representing an increase of more than 175 percent with respect to the previous year. Bots represented more than 20 percent of all malware detected in 2005. The number of variants of each bot could stretch into the thousands, a figure far too high for signature-based protection to cope with. For example, in the prolific Gaobot family, more than 6000 new variants were found in 2005 alone.

Web Application Vulnerabilities
Mercedes Benz, Fuji Film, Panasonic, US Navy, US Army, Greenpeace, Coldwell Banker, Microsoft, Google, Standford Electric, the National Oceanic & Atmospheric Administration, The SCO Group, the National Weather Service, Stanford University, SANS Institute, Symantec, Mcdonalds, Sandia National Laboratories, the U.S. Geological Survey, Bottom Line Technology, Association of Chief Police Officers, Midwest Express Airlines, the Space and Naval Warfare Systems Command, the Office of Secretary Defense, the Defense Logistics Agency, NASA Jet Propulsion Laboratories.... what do all these have in common? Their web site were recently defaced.

Zone-h.org keeps a digital archive of web site defacements, documenting hundreds of new defacements every day of corporations, organizations, and governments around the world. The majority of these compromises were compromised using an admin configuration mistake (19.4%) or a known vulnerability to which a patch is available (15.3%) or other programming errors. In other words - entirely avoidable. The same insecure programming methods and same programming mistakes are being used over and over - even in web applications developed by tech-savvy corporations such as Google, Yahoo, Hotmail, eBay, Etc.

· October 2005 - A vulnerability in Google's Gmail's authentication and session management discovered allowed a cybercriminal the ability to potentially take complete control of a victim's Gmail account without requiring any involvement of the victim.
· February 2006 - A Hotmail vulnerability allowed cross-site-scripting attacks.
· February 2006 - An Ebay vulnerability was being actively exploited.
· April 2006 - An vulnerability in Yahoo Mail was actively exploited for targeted phishing.
· April 2006 - Phishers were using a Ebay vulnerability discovered April 2006 to trick victims.
· April 2006 - A Myspace vulnerability allowed malicious scripts to be inserted anywhere on the site.

Distributed Denial Of Service Attacks
A Distributed Denial Of Service attack is one in which a multitude of compromised systems flood a single target with data which drains computational resources, such as bandwidth, disk space, or CPU time, thereby causing denial of service for valid users of the targeted system. The attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack. With enough such slave hosts, the services of even the largest and most well-connected websites can be denied.

Gaming sites, blogs, payment gateways, gambling sites, domain registrars advertising services, media organizations, large software companies, security vendors, security professionals and researchers, regularly face intimidation, extortion attempts and downtime caused by DDoS attacks. The extortion works by an attacker shutting down a site using a DDoS attack, and then follow-ups with an email saying, "Pay us or else we will shut down your site again."

"It's happening enough that it doesn't even raise an eyebrow anymore." says Ed Amoroso, chief information security officer at AT&T. Paying an extortionist a few thousand dollars to leave your network alone might make bottom-line business sense if the alternative is enduring a distributed denial-of-service attack that could cost your company millions in lost revenue and public relations damage. And many companies do pay.

"Six or seven thousand organizations are paying online extortion demands. The epidemic of cybercrime is growing. You don't hear much about it because it's extortion and people feel embarrassed to talk about it." said Alan Paller, director of research for security organization SANS. "Every online gambling site is paying extortion." Paller claimed.

Active-X
The security weaknesses of Active-X controls have long been known. Yet they are still highly popular. And its about to get worse. Research by Richard M. Smith, suggests that as much as 50 percent of all Windows computers might contain one or more flawed Active-X control that could allow remote compromises. Smith used a tool to checks for "buffer overflows" in common Active-X controls. Smith found dangerous security problems in Active-X controls distributed by dozens of other major companies, including PC manufacturers and even some of the nation's largest Internet service providers. In some cases, these insecure Active-X controls come pre-installed on Windows PC from the factory!

The Yankee Group is quite clear about their opinion on Active-X when they say "Retire Active-X—now."

Passwords
One-factor authentications using passwords is still the most common form of authentication. New password cracking tools based on Faster Time-Memory Trade-Off Technique which uses pre-generated hash tables can crack complex passwords in a matter of days. While many employees and even executives are still using passwords such as "password" and "12345", a very respectable password (by today's standards) of "Aq42WBp" can be cracked easily using free, downloadable tools. Ophcrack can recover 99.9% of alphanumeric passwords in a Windows SAM database in SECONDS. Two-factor authentication would do a lot to improve user security (such as prevent some forms of phishing attacks) and the industry would benefit to see greater adoption, yet some of the most popular email sites such as Hotmail and Gmail don't support it leaving users with no option.

And while two-factor authentication does have benefits, Bruce Schneier is correct to state that, "Two-factor authentication isn't our savior." In response to the increased adoption of stronger authentication, cybercriminals are already proactively changing their tactics. Recent bank-stealing Trojans wait until the victim has actually logged in to their bank and then it just transfers the money out completely bypassing any authentication controls.

Patch Management
Too often, software vendors are slow releasing patches to fix critical flaws in their products, leaving their customers exposed. Oracle, which likes to claim its software is "Unbreakable", took an astonishing 800 days to fix two flaws, and last year took more then 650 days to publish a fix for another security flaw. Perhaps a good indication of the poor state of information security; the day Oracle announced the Unbreakable campaign, David and Mark Litchfield discovered 24 holes in Oracle products.

Often critical patches released by Microsoft which are intended to protect their customers, instead causes system hangs and crashes.

The security company Scanit recently conducted a survey which tracked three web browsers (MSIE, Firefox, Opera) in 2004 and counted which days they were "known unsafe." Their definition of "known unsafe": a remotely exploitable security vulnerability had been publicly announced and no patch was yet available. Microsoft Internet Explorer, which is the most popular browser in use today and installed by default on most Windows-based computers, was 98% unsafe. Astonishingly, there were only 7 days in 2004 without an unpatched publicly disclosed security hole. Read that last sentence again if you have to.

"There were only 7 days in 2004 without an unpatched publicly disclosed security hole." -- According to a survey by security company Scanit

Zero-Days
On Dec. 27, 2005 a Windows Metafile (.WMF) flaw was discovered affecting fully patched versions of XP and Windows 2003 Web Server. Simply by viewing an image on a web site or in an email or sent via instant messenger, code can be injected and run on the target computer. The vulnerability was in the Windows Graphics Rendering Engine which handles WMF files, so all programs such as Internet Explorer, Outlook and Windows Picture and Fax viewer which process this type of file were affected.

Within hours, hundred of sites start to take advantage of the vulnerability to distribute malware. Four days later, the first Internet messenger worm exploiting the .wmf vulnerability was found. Six days later, Panda Software discovers WMFMaker, an easy-to-use tool which allows anyone to easily create a malicious WMF file which exploits the vulnerability.

While it took mere hours for cybercriminals to take advantage of the vulnerability, it took Microsoft nine days to release an out-of-cycle patch to fix the vulnerability. For nine entire days the general public was left with no valid defenses.

The WMF Flaw was a security nightmare and a cybercriminal dream. It was a vulnerability which (a) affected the large majority of Windows computers (b) was easy to exploit as the victim simply had to view an image contained on a web site or in an email, and (c) was a true zero-day with no patch available for nine days. During those nine days, the majority of the general population had no idea how vulnerable they were.

Most disturbingly, the WMF vulnerability was auctioned off to the highest bidder, and reportedly was sold for $4,000 more than a month before Microsoft issued a patch and two weeks before virus hunters started noticing the potential flaw.

Yes, Zero-day exploits are now a reality. If you aren't scared yet about your online security, you should be.

Wireless Access Points
Millions of wireless access points are spread across the US and the world. According to a FBI presentation at a 2005 Information Systems Security Association (ISSA) meeting in Los Angeles, about 70% percent of these access points are unprotected and left wide open to access by anyone near that location. The rest are protected by Wired Equivalent Privacy (WEP) defined as a security protocol in the IEEE 802.11 standard. Only a small portion are using the new, more secure, WPA standard.

The problem is that the WEP standard is completely broken. Today, easily accessible tools can crack a 128 bit WEP key in minutes. One reason for the low adoption of the new WPA standard is that product manufactures and computer stores continue to make and sell devices which only support the insecure WEP protocol. So even if the average consumer takes the unusual step of attempting to enable security protection, he/she is still left highly vulnerable.

Internal Attacks
Internal attacks cost U.S. business $400 billion per year, according to a national fraud survey conducted by The Association of Certified Fraud Examiners, and of that, $348 billion can be tied directly to privileged users. And according to the 2005 Global Security Survey, internal attacks on information technology systems are surpassing external attacks at the world’s largest financial institutions.

Vulnerabilities In Security Software
Rather than just focus on operating systems, cybercriminals are now also targeting and exploiting anti-virus and security software - the very security software that's supposed to protect PCs. According to a Yankee Group research paper, in a 15-month period ending March 31 2005, 77 separate vulnerabilities have been discovered in products from security vendors Symantec, F-Secure and CheckPoint Software Technologies and others.

For example, in May 2004 a critical remote vulnerability affected almost the entire line of Symantec firewall product line (including versions of Symantec Norton Internet Security, Symantec Norton Personal Firewall,Symantec Client Firewall, and Symantec Norton AntiSpam) which allowed remote kernel access to the system - even with all ports filtered, and all intrusion rules set. In March 2004 the W32/Witty.worm damaged tens of thousands of computers by exploiting computer systems and appliances running security gateway software from network protection firm Internet Security Systems causing an unstable system and corrupted files.

Mobile Viruses
We are discovering that no technology is immune from cybercriminals looking for ways to exploit it. Simply by using a cell phone, or personal digital assistant people can be a walking, talking security risk. There are currently dozens of viruses which target the popular Symbian phone operating system, however many of these are low-risk. While the problem is not yet widespread, it is only a matter of time before malware writers start to write more destructive mobile viruses. From a virus that will dial 1-900 numbers all day long, to the one that automatically buys a hundred ring tones that get added to your phone bill, there is money to be made and therefore there will be cybercriminals looking to exploit the technology.

Threats Everywhere - Even In Music CDs
Seemingly innocuous objects such as music CDs are now attack vectors which can leave you vulnerable. On Oct. 31, 2005 Mark Russinovich of Sysinternals discovered that Sony distributed a copy-protection DRM with music CDs that secretly installed a rootkit on computers. Once a CD is placed in the computer, the software tool is run without your knowledge or consent. The Sony code modifies Windows so you can't tell it's there - a process called cloaking which is a tactic usually used by virus writers - and It acts as spyware, surreptitiously sending information about you to Sony. And trying to remove it can damage Windows. Virus writers begin to take advantage of the Sony rootkit’s cloaking features, making their viruses undetectable by anti-virus software.

Under intense pressure by the media, Sony created an uninstaller program. However, the uninstaller didn't remove the rootkit - it only removed the cloaking features. It was then discovered that the uninstaller had a vulnerability which allowed any web page you visit to download, install, and run any code it likes on your computer. More than half a million networks, including military and government sites run were infected. The rootkit has even been found on computers run by the US Department of Defense.

Encryption
There has been significant advances and cryptography research against security algorithms. In 1999, a group of cryptographers built a DES cracker, effectively killing off the Data Encryption Standard. It was able to perform 256 DES operations in 56 hours. The machine cost $250K to build, although duplicates could be made in the $50K-$75K range. A similar machine built today could perform 260 calculations in 56 hours, and 269 calculations in three and a quarter years. Or, a machine that cost $25M-$38M could do 269 calculations in the same 56 hours. In 2004 Eli Biham and Rafi Chen, of the Israeli Institute of Technology and separately Antoine Joux, announced some pretty impressive cryptographic results against MD5 and SHA. Collisions were also demonstrated in SHA. In February 2005, Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu from Shandong University in China showed that SHA-1 is not collision-free by developing an algorithm for finding collisions faster than brute force.

What does this mean for the average person? While these developments are big news for cryptographers, they present little real-world risks to the average user at the moment. However, what these developments make clear is that its time for a new standard.

Jon Callas, PGP's CTO, said it best: "It's time to walk, but not run, to the fire exits. You don't see smoke, but the fire alarms have gone off."

Come On In... The Water's Fine!

This is no doubt an information security pandemic occurring. We are passed rising temperatures and hot waters - the pot is boiling!

Yet, SANS's Internet Storm Center's Infocon Threat Level is rarely at any level other then a consistent Green; the lowest threat-level rating. While the pot is boiling, the Infocon Threat Level is telling us, "Everything is normal. No significant new threat known." Symantec's ThreatCon is most often at l, which is the lowest threat-level rating. Panda's Software Virusometer is usually at Green - "Normal".

"This condition applies when there is no discernible network incident activity and no malicious code activity with a moderate or severe risk rating. Under these conditions, only a routine security posture, designed to defeat normal network threats, is warranted."

Panda Virusometer (at time of writing, May 1st 2006.) "The Panda Virusometer measures the probability of users being affected by a virus at any given time."

"There are no signs of viruses or hoaxes that represent a threat. Low risk of being infected by a virus or malicious code, as long as the usual precautions are taken."

To steal a line from Arthur Dent in The Hitchhiker's Guide to the Galaxy: "Ah, this is obviously some strange use of the word "safe" that I wasn't previously aware of." It is as if many in the information security community are so used to zero-days, 100,000-node botnets, daily virus threats, spam-clogged email boxes, organized-crime-funded aware, massive identity thefts, etc, that they look at this situation and believe this is "normal." Business as usual.

This attitude is dangerous.

And it must change.

Why Are We Failing?

We operate in a hostile environment. Cyberspace's digital battlefield heavily favors the cyber criminal. A cyber-criminal only needs to identify a single vulnerability in a system's defenses in order to breach its security. However, information security professionals need to identify every single vulnerability and potential risk and come up with suitable and practical fix or mitigation strategy. Furthermore, the freedom, privacy and anonymity cyberspace offers, gives cybercriminals the opportunity and confidence to target victims around the world with little chance of being caught.

Cybercriminals are simply out innovating us. The technology and information security landscape is in a constant state of change and security is a digital arms race with both exploits and defenses continuously improving. While the cyber criminals have adapted and modified their attack and exploit techniques, the security community struggles to modify and adapt not simply their defenses, but their mind set.

For example, when Microsoft wanted to limit Windows Updates to registered copies of Windows, they developed their "Genuine Advantage" system. In less then 24 hours, the it was cracked. Sony spent millions developing a DRM technology called key2audio for their music CDs to prevent unauthorized music duplication, track ripping and piracy. Shortly after CDs with key2audio started hitting store shelves, it was discovered that the DRM technology could be defeated - by a $0.99 cent pen by simply scribbling around the rim of a CD!

Is this image a CAPTCHA or a digital representation of our failure? You decide. Chances are that computer software would have more success decoding this then a human!

Computer users attempting to sign up for an email account or blog are now faced with a mismatch of letters and numbers that they have to try and decode. This system is called CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) - the security community's answer to bot impersonating humans to register for computer services (such as free email accounts used to send spam) which is now in use on sites like Yahoo, Paypal, and Hotmail. However, computer software devoted to circumventing CAPTCHA is becoming so effective, sites have been forced to generate CAPTCHAS that are even difficult for humans to solve! And spammers have already engineered methods to bypass CAPTCHA. This system only serves to frustrate legitimate users and does little to hamper illegitimate bots.

Cybercrime is accessible to anyone. Whereas once one had to possess extraordinary computer skill to become a cybercriminal, today you don't need special skills or knowledge to become a successful cybercriminal. Exploits and detailed vulnerability information are available to anyone on the Internet. Point-and-click wizards, virus generators, and hacking tools dramatically reduce the skill level required to attack a target. For $15 to $20, hackers can buy a "Web Attacker Toolkit" from a Russian web site which sniffs for seven unpatched vulnerabilities in Internet Explorer and Firefox, then attacks the easiest-to-exploit weakness. The toolkit then places a trojan on the victims computer which can be used log keystrokes, download additional code, or open backdoors. You don't even have to participate - armies of coders are available to code custom spyware for money, or perform denial of service attacks for hire such as the one a CEO of a web-based satellite T.V. retailer ordered against his competitors which caused outages as long as two weeks at a time and $2 million in losses.

The "Biggest Bank Heist in History" did not involve technological geniuses breaking encryption algorithms and cracking firewall defenses. In fact, the heist was so simple only the most basic of technological skills were required. Thieves masquerading as cleaning staff installed hardware keystroke loggers on computers within the London branch of Sumitomo Mitsui. Hardware keyboards are tiny devices which are physically installed on the back of a computer between the keyboard and CPU which silently and undetectably records every single key typed on the computer. They can be bought online for less then $100 US. They then proceeded to transfer more that $440 million to various accounts in other countries.

The number of PC users is expected to hit or exceed 1 billion by 2010, up from around 660 million to 670 million today. As the internet expands, it increases the number of opportunities and potential targets of cybercriminals.

Security isn't accessible. Security is a full time job which requires hiring skillful and dedicated security professionals and purchasing a deluge of costly technology systems and devices. For example, purchasing anti-DDoS services to protect against the costly distributed denial-of-service attacks can cost around $12,000 per month from carriers such as AT&T and MCI, according to John Pescatore, Gartner security analyst.

Individuals and most companies simply do not have the time, money, skill and resources required to effectively manage all of today's risks and threats.

Complexity is the enemy of security. As technology becomes more powerful and advanced, the complexity often increases too which only serves to benefit cybercriminals. Today, simple office printers now come equipped with built-in services like Telnet and SMTP, SNMP, Bluetooth, etc. The security of an entire network can be compromised by a printer with a remotely exploitable vulnerability.
How can we fix this?

Solving the security absurdity is a daunting challenge and there is no simple, easy fix. It requires creativity, insight, persistence, adaptation, co-operation, action and support across the entire Internet industry and community. This document is not intended to contain all the answers. Instead it is written to raise awareness of the problem which too many people seem to not want to acknowledge. Through increased awareness can there be new dialogs and discussions on solutions. Because what is clearly missing is more dialog to come up with solutions to today's security challenges.

No one can deny the Internet's immeasurable benefits to our lives. This only heightens the need to confront and stop the overwhelming security threats. These threats are putting at risk the very benefit and value of the Internet. While the Internet opened up new means of communication and data sharing, security threats are closing doors and preventing opportunities. The pot is at a boiling point and action must be taken!

Part Two of this article will contain a list of what we must do to address our current failure. It will incorporate your comments and feedback.

What do you think? How can we stop the failure? Your comments are most welcome.
http://www.securityabsurdity.com/failure.php





Coming Soon: The Code Breakers – a BBC World Documentary on FOSS and Development

A two-part documentary, “Code Breakers” will be aired on BBC World TV starting on 10 May 2006. Code Breakers investigates how poor countries are using FOSS applications for development, and includes stories and interviews from around the world.

The famous digital divide is getting wider. A two-part documentary, "The Code Breakers," to be aired on BBC World starting 10 May 2006 examines whether free/open source software (FOSS) might be the bridge?

FOSS contains 'source code' that can be used, copied, studied, modified and redistributed without restriction. It has been around for over 20 years but most PC owners are not aware that the Internet search engines and many computer applications run on FOSS.

"It's not that FOSS has had a bad press, it has had no press because there is no company that 'owns' it," says executive producer Robert Lamb. "But we found that in the computer industry and among the afficionados, it is well known and its virtues well understood."

The crew of the independent producers who made the film went to nearly a dozen countries around the world to see how the adoption of FOSS presents opportunities for industry and capacity development, software piracy reduction, and localization and customization for diverse cultural and development needs.

Stories from "The Code Breakers" include computer and Internet access for school children in Africa, reaching the poor in Brazil, tortoise breeding programmes in the Galapagos, connecting villages in Spain, and disaster management in Sri Lanka. The documentary also includes interviews from key figures around the world.

Intel, IBM, Sun and Microsoft all seem to agree that FOSS is a welcome presence in computer software.

According to Jonathan Murray of Microsoft "The Open Source community stimulates innovation in software, it's something that frankly we feel very good about and it's something that we absolutely see as being a partnership with Microsoft."

BBC World will air the two-part documentary at the following times:

Episode One

Wednesday 10 May 19:30 GMT

Thursday 11 May 09:30 GMT

Friday 12 May 16:30 GMT

Monday 15 May 01:30 and 07:30 GMT

Episode Two

Wednesday 17 May 19:30 GMT

Thursday 18 May 09:30 GMT

Friday 19 May 16:30 GMT

Monday 22 May 01:30 and 07:30 GMT

For local times, please lookup your country in the TV Listings on BBC World's website http://www.bbcworld.com/content/temp...asp?pageid=668.

Following its ten transmissions on BBC World the documentary will be available copyright-free for broadcast throughout the world.

The International Open Source Network (IOSN), UNDP Asia-Pacific Development Information Programme (UNDP-APDIP), International Development Research Centre of Canada and UNESCO have participated in the production of this documentary.
http://www.apdip.net/news/fossdoc





When "Off" Doesn't Mean Off
Bruce Schneier

According to the specs of the new Nintendo Wii (their new game machine), "Wii can communicate with the Internet even when the power is turned off." Nintendo accentuates the positive: "This WiiConnect24 service delivers a new surprise or game update, even if users do not play with Wii," while ignoring the possibility that Nintendo can deactivate a game if they choose to do so, or that someone else can deliver a different -- not so wanted -- surprise.

We all know that, but what's interesting here is that Nintendo is changing the meaning of the word "off." We are all conditioned to believe that "off" means off, and therefore safe. But in Nintendo's case, "off" really means something like "on standby." If users expect the Nintendo Wii to be truly off, they need to pull the power plug -- assuming there isn't a battery foiling that tactic. Maybe they need to pull both the power plug and the Ethernet cable. Unless they have a wireless network at home.

Maybe there is no way to turn the Nintendo Wii off.

There's a serious security problem here, made worse by a bad user interface. "Off" should mean off.
http://www.schneier.com/blog/archive...ff_doesnt.html





The Worse Google Gets, The More Money It Makes?
Andrew Orlowski

Comment It's hard to imagine now, but there was a time when the mainstream press was barely acquainted with the genius and foresight of today's technology leaders.

Fifteen years ago Bill Gates appeared on the BBC's Wogan show - which the Beeb thought of as a nightly Johnny Carson, but which was really like watching Regis Philbin on cough syrup - to show off his WinPad PC. The wooden Gates made a joke about making his money disappear, with only a couple of clicks, using only a stylus. As Gates blinked, a nation which had never heard of Microsoft, and couldn't quite figure out why the guy in glasses wasn't singing or dancing, looked on in sympathetic embarrassment.

But Gates's prime time TV appearance underscored one point, popular in the public prints at the time, which was that a nerdish, upstart technology was changing the very foundations of the world as we know it. Microsoft was simply smarter, more agile, more cunning, and far more darkly mysterious than the fusty incumbents, like IBM, could ever realize. To stand in the way of Microsoft was to stand in the way of youth, innovation and progress itself.

Now, it may puzzle you as much as it puzzles us that this idea ever gained popular currency - let's save that discussion for another day. But it can't have escaped your notice that this mythical struggle has been reprised by the inkies several times - in the mid-1990s with Netscape - and today with the phoney war between Microsoft and Google.

If you're of the view that history repeats itself the second time round as farce, then the parallels are even more uncomfortable.

Today, Microsoft is a software monopoly that equally, is barely acquainted with its own methods of production. The last Microsoft engineer who worked on the original incarnations of Windows left an engineering capacity at the company a long, long time ago and, as a consequence, a company that once could turn on a sixpence and drop off an OS refresh that seriously screwed a competitor now takes seven years to eke out an update. Insulated by the comfortable monopoly position it enjoys, Microsoft today isn't even in control of Microsoft. But then again, why does it have to worry?

Now fast forward to 2006, where Google, if we're to believe the popular prints, is simply smarter, more agile, more cunning, and far more darkly mysterious than its incumbents can fathom.

Or, er, is it?

When Google unleashed PageRank™ on the world, it really created a monster.

Google was so proud of its algorithm that it liked to boast that it mirrored the "inherent democracy" of the internet, a phrase which coyly and insidiously, flatters us all. PageRank™ was a truer representation of life than we ever realized, Google said, if only we cared to look.

The trouble is, PageRank only worked within a small dataset of peer reviewed academic journals. To extrapolate this into a way of life, as Google's dreamy maths-obsessed boy wonders tried to do, was an essentially utopian gesture, which supposed that no one would try and game the system to their own nefarious ends. Only the inevitable happened, and as Google got more popular, and as the value of appearing in those top spots increased, Google gradually lost control of the algorithm which was once its muse. At the time, we remember, we gained very few plaudits for documenting this weary process - as Google was gradually gamed by desperate trinket salesmen (http://www.theregister.co.uk/2003/10...logged_google/), who built link farms to tout their wares - and by technology evangelists (http://www.theregister.co.uk/2003/04...ed_repurposed/), who mistook overnight popularity for a validation of a lifetimes's achievement. All were to fall to earth eventually, as technology offers no short cuts or backdoors when the calculations are finally made.

So here we are. Today, Microsoft doesn't understand its source code. But nor can Google identify how much of its search index is comprised of robot-generated junk, designed to trick its PageRank™ algorithm. With billions of pages of "content" - pages of junk can be created on demand to populate cheap, disposable "web presences" - it's beyond the wit of any algorithm to determine what's real and what's simulacra.

Like Microsoft, Google has simply been outsmarted. To read the popular press and discover that they're arming for a billion dollar fight is like watching two dunken prize fighters hoping they'll land a punch.

But thanks to blogger Mark McGuire for providing another dimension, one we and everyone else missed.

Just as Microsoft doesn't have to care about the quality of its software, nor does Google (or Yahoo!, or any other want to be web destination) have to care about the quality of its product. Up to a point.

Noting the Big Daddy fiasco - Google's attempt to weed out the spam from its search index - McGuire notes (http://www.jellyfish.com/blog/2006/0...m-irrelevance/) that Google profits from the irrelevance. Google makes next to no money from "search", but makes all of its money from selling advertising.

Mark notes, as we do, a webmaster's comment that the deterioration is gradually turning the SERPS [Search Results] back into a primordial soup:

“At this rate, in a year the SERPS will be nothing but Amazon affiliates, ebay auctions, and Wiki clones. Those sites don’t seem to be affected one bit by the supplemental hell, 301’s, and now deindexing.”

Mark observes:

"Google may take some action here and there, but I believe that they actually like a little mud in the main organic results for commercial terms. Why? Because less than stellar organic results (from practices like web spam) mean higher CTR’s on their paid links and more juice for their quarterly earnings.

"A little irrelevance is good for paid links and paid links is how Google makes money."

If you want to be seen in Google, you have to pay to play - and create an Adwords account. How else are you going to be "seen"? In other words, it's pay to play - the old economy reasserting itself with a vengeance.

This is a fascinating subject - how far can you con the public without being rumbled? Google executives may well look at Microsoft's history and conclude they can ride the goodwill train for many years. A cynic may say the public doesn't really care about the mechancisms, so long as they're being delivered real results.

But the public is increasingly sophisticated, and as the web spammers have proved (the "Big Daddy" fiasco being the primary evidence) more than capable of outwitting Google.
http://www.theregister.co.uk/2006/05...crosoft_redux/





UK Hacker 'Should Be Extradited'

Mr McKinnon could face a lengthy jail sentence in the US
BBC

UK hacker Gary McKinnon should be recommended for extradition to the US, a district judge has ruled.

The decision means Mr McKinnon will face trial in America for what the US has called "the biggest military hack of all time".

Although he has admitted hacking US military networks, Mr McKinnon said he was motivated by curiosity not malice.

The final decision on whether he should be sent to the US for trial rests with the home secretary.

Hack attack

The decision was given at Bow Street Magistrates' Court in London and ends three years of uncertainty for Mr McKinnon.

Speaking outside the court after hearing the decision Mr McKinnon said: "It went as expected and now the appeals process can now start."

Karen Todner, Mr McKinnon's solicitor, said: "We're obviously very disappointed with the judgement that was given this morning. We're proposing to appeal this to the Secretary of State, and if we're still refused we will then appeal to the High Court for a decision to allow Gary to be tried here as a British citizen."

Mr McKinnon was first arrested in 2002 by the UK's National Hi-Tech Crime Unit for hacking into a series of computer networks used by the US Army, Navy, Air Force, and Department of Defense.

The US in its case for extradition said Mr McKinnon caused more than $700,000 (£375,235) of damage while exploring the computer networks at various US military institutions.

It said one attack at the Earle Naval Weapons Station took place soon after September 11, 2001 made it impossible to use critical systems. The US Department of Justice said it took a month to get systems working in the aftermath of this attack.

Mr McKinnon has admitted that he spent almost two years exploring these networks but has said he was motivated by a search for what he called "suppressed technology".

In a recent BBC interview, Mr McKinnon said he had got close to getting pictorial evidence of technologies that could be of huge benefit to everyone but the US government was not releasing.

In numerous interviews about the case, Mr McKinnon has resisted attempts to portray him as a hacking mastermind. By contrast he said he was a "bumbling hacker" that exploited the lax security policies of the US military.

Speaking after the hearing ended, he said: "My intention was never to disrupt security. The fact that I logged on with no password showed there was no security to begin with."

Ms Todner said she was worried that any sentence Mr McKinnon received in the US would be "disproportionate" to the scale of the offences he committed.

"There is power under the Computer Misuse Act to charge him here and he could stand trial here," said Ms Todner. "In fact, had that happened he probably would have been tried, served his sentence and have been released by now"

If tried and found guilty in the US, Mr McKinnon could face decades in jail and fines totalling millions of dollars.
http://news.bbc.co.uk/go/pr/fr/-/2/h...gy/4757375.stm





WTO Entry Must Be In Russia's Interest – Putin

President Vladimir Putin, commenting on Russia's stalled bid to become a WTO member, said on Wednesday that his country should join the global trade body only if it protects Russian economic interests.

Putin, who said in March that U.S. negotiators were creating artificial obstacles to Russian entry, said his country's entry talks "must not become the instrument of trade on questions which have nothing to do with this organisation."

Russia should join the World Trade Organisation "only on the conditions that take into account the economic interests of Russia," Putin said at his annual keynote address to the nation.

Russia, a major energy producer that has seen its trade weight boom amid soaring world oil prices, is the biggest power still outside the currently 149-member WTO, which acts as a forum for international negotiations and a trade watchdog.

Moscow has been negotiating membership for over a decade.

Striking a trade deal with the United States is key to Russia's entry but talks with Washington have been stalled for months over violations of intellectual property rights and access to Russian financial markets.

While Putin said Russia must fight video, music and software piracy, he made no reference to opening up financial markets.

Putin alarmed financial markets last December when he said the activity of branches of foreign banks working in Russia must be banned, a remark seen by the business community as hostile.

"A necessary condition for developing new technology is more reliable protection of intellectual property. We must defend copyright inside the country. That is our obligation to our foreign partners," Putin said.

"We must also ensure protection of intellectual property rights of our own producers."

Putin has said it is one of his top economic priorities to bring Russia into the Geneva-based body, a move that would ensure its exports would not face barriers in key markets.
http://today.reuters.co.uk/news/news...RUSSIA-WTO.xml





My god, it’s full of stars

The Most Realistic Virtual Reality Room In The World
Press Release

More than $4 million in equipment upgrades will shine 100 million pixels on Iowa State University's six-sided virtual reality room.

Jared Knutzon, an Iowa State University graduate student in human computer interaction, demonstrates how Iowa State's C6 virtual reality room can control the military's unmanned aerial vehicles.

That's twice the number of pixels lighting up any virtual reality room in the world and 16 times the pixels now projected on Iowa State's C6, a 10-foot by 10-foot virtual reality room that surrounds users with computer-generated 3-D images. That means the C6 will produce virtual reality at the world's highest resolution.

Iowa State's C6 opened in June 2000 as the country's first six-sided virtual reality room designed to immerse users in images and sound. The graphics and projection technology that made such immersion possible hasn't been updated since the C6 opened.

The difference between the equipment currently in the C6 and the updated technology to be installed this summer, "is like putting on your glasses in the morning," said James Oliver, the director of Iowa State's Virtual Reality Applications Center and a professor of mechanical engineering.

The new equipment -- a Hewlett-Packard computer featuring 96 graphics processing units, 24 Sony digital projectors, an eight-channel audio system and ultrasonic motion tracking technology -- will be installed by Fakespace Systems Inc. of Marshalltown. The project is supported by a U.S. Department of Defense appropriation through the Air Force Office of Scientific Research.

The project began this spring with a prototype upgrade to one wall of the C6. The remainder of the work will continue throughout the summer. Oliver said the improved C6 will open in the fall. A grand opening celebration is being planned for the spring of 2007.

A better C6 will be good news for the Iowa State researchers who study virtual reality.

Chiu-Shui Chan, an Iowa State professor of architecture, has used the C6 to develop 3-D models of buildings, cities and workplaces. He's studying how virtual reality can be a tool to create a library of historical buildings, plan urban growth and test workplace efficiency.

A virtual model of the Xidan business district in Beijing can help city planners manage urban growth.

Chan said the upgrade will improve the visual realism and interactive speed of his virtual reality applications. And that will enhance the sense of place in his applications and the effectiveness of his research.

Chan said the C6's existing technology requires him to balance and sacrifice some of a project's size, speed, realism or human-computer interaction. "With the new system I won't have to worry about that," he said.

Eve Wurtele, an Iowa State professor of genetics, development and cell biology, working with Julie Dickerson, an Iowa State associate professor of electrical and computer engineering, has used the C6 to develop new ways to visualize data from as many as 22,000 genes. She's also developing a virtual cell project that shows cells in 3-D action to help students learn about photosynthesis and other aspects of cell biology.

Wurtele said the higher speeds and better pictures will be a boost for her research and teaching.

"This upgrade is fantastic for us," she said. "It's essential for our research."

Mark Bryden, an associate professor of mechanical engineering, has used virtual reality to develop engineering tools that help engineers make better decisions. He said the C6 upgrade will mean more realistic images capable of transmitting more information. And seeing more information will allow engineers to be better informed when they make decisions.

Bryden also said the upgrade will put the C6 back on the leading edge of technology. He said that will help researchers attract projects and funding.

Oliver is leading a research team that's developing a virtual reality control room for the military's unmanned aerial vehicles. The researchers are building a virtual environment that allows operators to see the vehicles, the surrounding airspace, the terrain they're flying over as well as information from instruments, cameras, radar and weapons systems. The system would allow a single operator to control many vehicles.

The C6 upgrade will move that project forward, Oliver said.

"The idea is to get the right information to the right person at the right time," he said. "There's a tsunami of information coming toward you and you have to convey it effectively. We think this kind of large-scale, immersive interface is the only way to develop sophisticated controls."

So those 100 million pixels are going to make a difference, Oliver said.

"Seeing is going to be believing," he said. "This upgrade will enhance our ability to amplify the creativity and productivity of people. It will help us build on the center's record as a world leader in virtual reality. And it's one more way Iowa State can be the best at putting science and technology to work."
http://www.iastate.edu/~nscentral/ne...c6update.shtml





Get it while you can

Will Sites Like YouTube and The Hype Machine Go The Route Of Napster?
Mike Miliard

Television and movie studios aren’t quite sure what to do with YouTube. While they sort it out, music fans and pop-culture addicts are in hog heaven.

A couple of months ago, a man with the screen name x-amount logged on to Recidivism.org , the blog he maintains with a few of his friends, and made a pronouncement. “YouTube’s obviously blowing up. We’re living in that Napster-like magic moment where you simply can’t believe the kinds of historic stuff available to you with just a simple search. Which means of course that it’s all gonna get shut down ANY MINUTE.”

His fears are understandable. For any pop-culture junky, YouTube.com, barely a year after its launch, may just be the Greatest Site in the History of the Internet. On a recent afternoon, guided by nothing more than capricious free association, I watched about two-dozen clips. The Sex Pistols’ infamous, profanity-laced appearance on Bill Grundy’s Today show. Hüsker Dü chatting with Joan Rivers. Crispin Glover, allegedly on LSD, frightening David Letterman. The only episode of Lookwell, the cop-show spoof written by Conan O’Brien and Robert Smigel, and starring original TV Batman Adam West. The only episode of Heat Vision and Jack, the story of a man and his talking motorcycle, created by Ben Stiller and starring Jack Black. Pudge Fisk’s homer over the Monster in the 1975 World Series. A PSA from a dead-serious Pee-wee Herman warning children about the dangers of crack cocaine.

That’s only the stuff I’m interested in. And it’s not counting the amateur material — game six of the ’86 World Series recreated on Nintendo’s RBI Baseball, or footage of the world’s second largest Tetris game, played out using the lights of a Brown University campus tower — that’s all over YouTube: the many millions of self-produced video curios posted to the site daily, almost one every other second.

Meanwhile, over on The Hype Machine, the hits just keep on coming. The site is an aggregator and search engine that scours the limitless galaxy of mp3 blogs that have cropped up over the past couple of years. You know: those sites with clever, lyrical names like Largehearted Boy and An Aquarium Drunkard? Sites curated by die-hard music fans who deal entirely in rare soul or underground hip-hop or twee indie pop, and who delight in writing music criticism alongside — free for download — the best track from the new Band of Horses album? Or the latest Diplo remix. Or live radio performances by Belle & Sebastian and the New Pornographers. Or tracks from not-yet-released Sonic Youth and Mission of Burma records.

These days, the songs and video clips that people once depended on file-sharing programs like KaZaA and Limewire to unearth are right there online, ready for download. No software installation required. No fear (for now at least) of a subpoena from the Recording Industry Association of America (RIAA), the trade group representing major labels. It’s a new world. Again.

Television and movie studios aren’t quite sure what to do with YouTube. The big record companies have been, on the whole, uncharacteristically quiet about the blogs, which are now more widespread and easier to search than ever. And a few even seem to see them as friends, not foes. While they sort it out, music fans and pop-culture addicts are in hog heaven.

“When you go [to YouTube], it’s kind of like going to a music store, when you know there’s a bunch of stuff you want, but you can’t quite figure out what it is,” says x-amount (whose real name is Beau). “But once you hit the right search term, it’s like, ‘Oh yeah!’ and ‘Oh, and then I could search for this!’ and ‘They might have this!’ It just explodes from there.”

Video stars

When Chad Hurley, 29, and Steve Chen, 27, founded YouTube in Hurley’s garage in February 2005, their plan was for it to be a personal video-sharing network, sort of a Flickr for home movies. It can still offer that function, but it’s also a lot more. “What we’ve become in the last several months,” says Julie Supan, YouTube’s senior director of marketing, “is an entertainment destination.”

And how. By allowing clips to be streamed in lightweight Adobe Flash animation, YouTube made watching online video much more user-friendly than the traditional download-and-wait model. Uploading is a snap too. And by allowing users to insert YouTube videos directly into their blogs and MySpace pages, it helped ensure that its popularity would spread like kudzu. Once Saturday Night Live’s instahit “Lazy Sunday” video found its way onto the site last December, it positively blew up. Since then, says Supan, people have watched “billions” of videos. Nowadays, about six million unique visitors are watching about 40 million clips every day. And every day, about 35,000 more videos are being uploaded to the site. All told, that’s 200 terabytes of data per day — roughly a third of Google’s or Yahoo’s traffic. And it’s all handled by 26 employees headquartered above a San Mateo, California, pizza shop.

The kid-in-a-candy-store exuberance that comes from surfing the site and finding stuff you haven’t seen in years — Chris Elliot’s “Man Under the Seats” on Letterman! A young Adam Sandler on Remote Control! — has helped fuel YouTube’s explosive popularity. Still, those clips, even though you can’t see them anywhere else anymore, are copyrighted. And, of course, so, too, is the “Lazy Sunday” clip. When NBC asked YouTube to take it down in February, it did so in a flash. Same thing happened later with Natalie Portman’s gangsta rap. When CBS complained that it was hosting a news clip of autistic high-school hoops phenom Jason McElwain scoring 20 points in four minutes, YouTube removed that one, too. And it’s not just pulling stuff from the big networks or clips that are available for sale on iTunes. In April, YouTube yanked a homemade video for Weezer’s “This Is Such a Pity,” which used footage from the 1984 break-dancing cult classic Breakin’.

“We’ve been really proactive and cooperative with the rights holders,” says Supan. “If we’re alerted and we have knowledge that there’s been videos uploaded that are unauthorized, we will remove them immediately. Because we’ve been so cooperative and so responsive, I think we’re in a really good position.”

They’ve taken other steps, too. In March they instituted a 10-minute limit on uploads, which will prevent users from uploading complete episodes of The Office or 24. (Independent, non-infringing content producers can sign up as “YouTube Directors,” which will allow them to eschew the time limit.) They’ve also developed more back-end technologies to simplify and automate the identification of infringing files, and to “fingerprint” removed videos so they can’t be uploaded again later.

YouTube is also taking an active role in educating its users, a large chunk of whom are young teenagers. “Uploading programming that’s on your hard drive but you don’t own is illegal,” says Supan. “They’re learning. They don’t realize that television isn’t free.”

All these steps, so far, have earned YouTube plaudits for being a “good corporate citizen” (as the Motion Picture Association of America recently called it). For all the talk of YouTube as a “Napster for video,” Supan is emphatic that the opposite is true. “Napster was a black market for illegal music-file swapping. We’re not a black market. And the biggest difference is that you can’t download anything on YouTube.”

Actually, that’s not exactly true. Already, several sites have sprung up that make downloading YouTube’s Flash clips to your hard drive as easy as copying, pasting, and right-clicking “Save As.” And other programs make it possible to convert those to iPod-ready formats. But with videos so easily and instantaneously available on the site, not everyone feels the need. “If there’s something really totally awesome that I want to have forever, yeah, I’ll go and download it,” says Beau. “But the older you get, you realize you don’t have to own it all.”

When I bring up the site’s marvelous appeal as a nostalgia repository, and I ask Supan if it’s only going after big fish like South Park and Brokeback Mountain (an entire version of which appeared on YouTube for a short time), looking to take down mainstream videos like that as soon as they’re up, she corrects me. “We’re not ‘going after’ any content on the site. We don’t control the content on our site. We’re just a service provider. It’s all posted at the discretion of the users.” And, she adds, “the reality is that it’s hard to say what’s uploaded by the content creator, the user, and what is not. And so therefore one can’t assume at this point.”

It’s a tacit admission that copyrighted material not only exists on the site, but it’s also a primary reason why so many viewers log on every day. But it’s also true that more and more mainstream content producers are catching on to YouTube — and are looking for ways to leverage its popularity by uploading content to it themselves.

When NBC yanked the “Lazy Sunday” clip, that was understandable, in a way. It was on sale for $1.99 on iTunes and available to watch on NBC.com (as long as you didn’t use Mac or Linux). But it was also, in the eyes of many observers, a big mistake. Saturday Night Live is a show that’s been accused more than once of being irrelevant, even moribund. Five million people watched that video, including young people, who may have never watched SNL before. For several weeks, it was a genuine cultural phenomenon. You really can’t buy advertising like that.

Contrast “Lazy Sunday” with another popular clip, the “real life” Simpsons intro, in which actors recreate the show’s opening-credits sequence. That was produced as an ad by the British network Sky One to hype its run of that season’s episodes. In order to get the same type of contagious buzz NBC tried to quash, Sky itself quietly leaked the clip to YouTube — and in short order it had more views than “Lazy Sunday.”

These days many studios and networks are houses divided against themselves: the legal department on one side and the marketing department on the other. As lawyers dry out their tongues licking stamps for cease-and-desist notices, other companies are getting wise to YouTube’s potential. MTV2 shows preview videos on the site, and E! uses it as a tie-in with its clip show, The Soup. Hollywood Records, trying to promote its Queen DVD, put the band’s “Bohemian Rhapsody” video on the site. (In a nifty bit of cross-promotion, the clip also encouraged viewers to tune in to Fox’s American Idol, one episode of which featured contestants singing Queen songs.) The Weinstein Company partnered with the site to show trailers and other promo material for flicks including Scary Movie 4 and Clerks II.

YouTube just secured a second round of funding: $8 million of venture-capital green. “That allows us to expand on all fronts: marketing, sales, infrastructure, being able to build out our data centers around the world,” says Supan, adding, “We’re seeing a huge cultural shift happening right now in digital-media entertainment and how it’s being distributed.”

This is not Napster redux. Unless it’s taken down, or dismantled and built up again as a corporate portal for pay video — as Napster was for music — YouTube is not going away anytime soon. And the sheer volume of it all makes the idea of scrubbing away all the cool (and copyrighted) stuff unrealistic. In the meantime, people are watching.

And then there’s music
The still-new but suddenly omnipresent phenomenon of mp3 blogs is a fraught and murky area. But for now, at least, it looks as though the big record companies may have learned some lessons since Napster first appeared in 1999.

By strict letter of the law, of course, most people who maintain mp3 blogs enable copyright infringement. But there are differences, hardly insignificant, between the blogs and the file sharing so loathed by the RIAA. They have to do with scale and intent.

For one thing, even though there are hundreds, perhaps thousands, of bloggers out there, most uploading several songs every day (compared with the massive number of songs downloaded on file-sharing networks), the traffic the sites attract is small peanuts. For another, even though mainstream stuff is easy to find, for the most part the songs made available on mp3 blogs are from indie artists and are hardly the massive unit movers the RIAA presumably spends the most time fretting about.

Most important, the name of the game here isn’t to get as much stuff as you possibly can for free: it’s to spread the word about new artists and new albums. The blogs almost always make the songs available for just a limited time (a week, maybe two); include links to online retailers such as Amazon.com, eMusic, and iTunes to facilitate purchase of the full album; and post a disclaimer. “Please go out and buy the records!” reads the notice posted on Said the Gramophone, one of the first and best mp3 blogs. “All songs are removed within a week or two of posting. If you are the copyright holder of any song posted here, please contact us if you would like the song taken down early.”

But as it happens, some copyright holders — even the Big Five record companies — are quite happy to have their songs on blogs. In 2004, when the medium was still in its infancy, the New York Times reported that Warner Brothers Records sent an mp3 from the new record by the Secret Machines to eight music bloggers. “They are an indie rock band and we would love for people to hear the band’s music from your site,” an employee, Ian Cripps, wrote. “Here it is, listen to it and let me know if you will post it.”

One blog, Music for Robots, took Warner Brothers up on it. Before long, in the comments section, a few user reviews cropped up that looked a little disingenuous. “I never heard these guys before, but theyre [sic] awesome,” wrote one listener. “I went to their website and you can listen to a lot of ther [sic] other stuff, very cool andvery [sic] good!” Later, that comment and others were found to have come from an IP address used by Warner Music.

When the Phoenix asked the RIAA about its stance on mp3 blogs, we were supplied with the following statement via e-mail: “If artists, record companies, publishers and others choose to use music blogs to distribute their music, that is their choice and we think that’s a great thing. It is important that bloggers respect the value of music by obtaining the appropriate licenses from the copyright owners, or their designees.”

Many indie labels have been known to take advantage — to great effect — of the free buzz the blogs provide. Matador Records has partnered with YouTube, too, for its “Pretty Girls Make Graves ‘Make Our Video’ Contest.” (The Phoenix is also sponsoring a contest, in which four fans will interview the band OK Go and edit their film, which will be posted on YouTube.) And while navigating the bounty of these blogs used to be haphazard, requiring users to surf from one bookmarked page to the next, new efforts to bring the strongest blogs together in one site make taking advantage of their ever-increasing number easier than ever.

About a year ago, Anthony Volodkin, a 20-year-old student at New York’s Hunter College and a moonlighting IT consultant, unveiled The Hype Machine, which aggregates hundreds of the best blogs and makes their songs easily searchable. Elbows is another popular aggregator. The songs may be posted for “sampling” purposes, but spend an afternoon searching for new titles, and you could easily cobble together entire new albums and fill a decent chunk of hard-drive space with all kinds of music you never knew you needed.

Add in the effects of increasingly popular hosting services like YouSendIt and EZarchive, which allow fans in online music groups to post files — sometimes zipped folders containing dozens of songs at a time — and a new paradigm seems to have arrived: an aboveground way to get loads of free music and video. Suddenly, the need for signing on to file-sharing networks has diminished.

Volodkin says he invented The Hype Machine, which updates every hour with new posts from across the blogosphere, simply to make it easy for people to listen to this stuff. “To actually go through and check out every single page and every song that people have up is a lot more difficult and time-consuming. A lot of people might not be able to do that, and they’ll miss out on a lot of great music.”

He also doesn’t think he’s helping facilitate the “stealing” of music. Shawn Fanning he ain’t. “Things like Napster or KaZaA — it was focused on, ‘Okay, let’s look for the artist, let’s download everything they have by the artist, complete CDs, just download media without any thought of it.’ In this case, I’m not sure how many people actually take the trouble to go through and download [a lot of] music. Oftentimes, in my case, at least, I have people buying things through the iTunes links.”

Volodkin prides himself on being a good citizen by linking only to blogs that live up to his standards. “Unfortunately, I think that some people do start mp3 blogs to gather advertising revenue, and to do some things [that are] really unethical. They post copyrighted content to just gather visitors and get hits. Most of those blogs I don’t include in The Hype Machine. I’ve heard also of people posting complete CDs, which I find really despicable, because that goes against everything that mp3 blogs are about.”

Moreover, he argues, blogs, while offering almost limitless free music, help sell songs in many cases. For one thing, they link directly to retailers. This writer, for one, headed directly to eMusic to buy the new Robert Pollard album after hearing a few tracks from blogs. And while it’s doubtful that many label owners will go on record as embracing blogs wholeheartedly — at least not yet — the fact that the majors haven’t gone after them in any significant way (one blog, 45RPM, was served with a cease-and-desist from the RIAA for hosting unreleased Strokes tracks last November) and the fact that at least a few of them are testing the waters suggest that they see potential in them.

Take a look at a few recent examples of this “invisible promotion”: artists like the Arctic Monkeys and Gnarls Barkley seemed to emerge from nowhere, fully formed. They didn’t, of course: the blogosphere was their incubator. The latter’s massive hit, “Crazy,” recently made history by becoming the UK’s first number-one single based on the strength of digital sales alone. A search for “Crazy” on The Hype Machine finds that it has been available for download from more than 20 blogs since last October.

“What’s behind them is a lot of good will,” says Volodkin of the mp3 blogs. “It’s not like file sharing, where it’s just, ‘I wanna spread music.’ We wanna spread enjoyment and passion for music. Not all music customers are thieves at heart.”

On the Web
YouTube: http://www.youtube.com/
The Hype Machine: http://hype.non-standard.net
Elbows: http://elbo.ws/
Recidivism: http://recidivism.org/
Music For Robots: http://music.for-robots.com/
Said the Gramophone: http://saidthegramophone.com/

http://www.thephoenix.com/article_ektid12043.aspx





Police Dogs Sniff for Pirated DVDs

Labradors taught to recognize scent of discs

There are drug-sniffing dogs, bomb-sniffing dogs, people-sniffing dogs, and now DVD-sniffing dogs.

An alliance of film industry groups that includes the Motion Picture Association of America and the Federation Against Copyright Theft has announced the world's first dogs specially trained to detect CDs and DVDs in bags and packages. The idea is that the dogs may be able to alert police to large stashes of pirated movies.

The MPAA says there are currently two DVD-sniffing dogs in the world. They are Labradors named Lucky and Flo working at Stansted Airport in the United Kingdom. The canines have been taught to recognize the unique smell of a compact disc.

"Someone had the wise idea that maybe dogs could sniff out DVDs," Kori Bernards, MPAA spokeswoman, told ABC News. "There are a lot of pirated products that go in and out of Heathrow Airport and airports around the world."

The dogs have had some success so far, according to the MPAA. But there is still more training that needs to be done. At this point, the dogs alert police to any CD or DVD they smell in packages and bags. Customs officials in the U.K. hope one day the dogs will only signal when there are large collections of discs, which would more likely include illegally copied movies.

For the time being, Lucky and Flo are working at a FedEx shipping center at Stansted Airport where they are sniffing packages that are shipped around the world. Trainers say the dogs have been notifying customs agents of packages with discs in them. The packages have been opened but so far no pirated movies have been found.

"We're encouraged by this. It's a new tool against piracy but we welcome it and hope others will adopt such practices," said Bernards.
http://abcnews.go.com/Technology/sto...1944531&page=1





Cyber simian on your back?

Is Internet Addiction A Real Problem?
Eric Bangeman

Studies pointing out the dangers of our technology-enabled lifestyles are nothing new. Topics such the possibility of getting brain tumors from our cell phones and the danger of video game violence translating into real-world violence frequently pop up on the front pages of newspapers and web sites (including this one) around the world.

Another popular topic is addiction, specifically Internet addiction. A new study published in Perspectives in Psychiatric Care says that Internet addiction is a serious problem, manifesting itself in between 5 percent and 10 percent of all surfers.

One problem with the term "Internet addiction" is the looseness of the term as it can be applied to any number of problematic behaviors. The researchers in this case broke the term down into five specific behaviors:

· Cybersexual addiction
· Cyberrelationship addiction
· Net compulsion
· Information overload
· Interactive gaming compulsion

Cybersexual and cyberrelationship addiction along with interactive gaming compulsion are fairly self-explanatory. Net compulsion describes a range of unhealthy online behaviors including stock trading, gambling, and shopping, while information overload covers compulsive web surfing. As one might expect, men are more prone to the cybersexual addictions as well as the net and interactive gaming compulsions. Women seem to struggle more often with the cyberrelationship addictions.

If you're wondering how you stack up on the continuum of net addiction, there's a handy Internet Addiction Test, which comes from the Center for Online and Internet Addiction, in which you can discover how addicted you are. I took it and scored a 41, which puts me at the very low end of the "frequent problems exist regarding use of the Internet." My late-night surfing habits as well as my predilection towards checking e-mail and IM on my way out the door helped raise my score.

Studies such as this are useful in that they point out the fact that some people have a problem managing their online lifestyles along with ways of addressing the problem. The question remains as to whether there is any such thing as Internet addiction. Yes, people become addicted to certain online behaviors. In many cases, however, those behaviors look an awful lot like manifestations of "real-world" problems transported to the Internet. Sexual addiction becomes a cybersexual addiction, codependency and relationship enmeshment translate into a cyberrelationship addiction, and blowing too much money at the casino or horse track too often becomes just another net compulsion.

The behaviors and problems are real. But does putting them into one of five buckets under a broad umbrella of "Internet addiction" really help address the root problems causing those behaviors? When 54 percent of Internet addicts say they have a history of depression, 52 percent drug or alcohol abuse and 34 percent an anxiety disorder, it seems even clearer that cyberspace is just another place for unhealthy and self-destructive behaviors to manifest themselves.
http://arstechnica.com/news.ars/post/20060510-6795.html





The Right Way To Run a Wi-Fi Café
Nathan Willis

One of the benefits of living in a place as exotic as Abilene, Texas, is that it presents you with a choice of not one but three Internet-connected coffee shops. Last week, I spent an afternoon in each, scouting for the place I'll go to hole up and get work done this summer when the triple-digit temperatures hit, when mentally calculating the air conditioning costs begins to prove too distracting at home. I haven't yet reached a final decision, but I have some choice words for anyone weighing the idea of starting up a new Internet coffee shop.

Before I begin, let's be crystal clear about one thing: When I say Internet-connected coffee shop, I mean free Internet. I'm looking at you, T-Mobile and Starbucks -- if I'm interested in paying for a wireless connection, I can do that pretty much anywhere (not to mention more cheaply) without you.

Tip 1: Do as little as possible

Networking-wise, that is. Blocking ports, running portal sign-in pages, time-limiting Dynamic Host Configuration Protocol (DHCP) leases, and all other forms of interference are a waste of your time and your customers'. Consider timing out DHCP leases -- one of the local coffee shops here does that. All the DHCP lease can even theoretically do is make things worse. When it functions properly and the leases are renewed after 30 minutes, nothing is accomplished. When it breaks, it ticks off everyone in the building. The only thing it adds to the customer's experience is the possibility of a new failure mode.

Similarly, don't block ports. As a provider of Internet connectivity, you're not liable if someone wanders into your establishment and uses your connection to post seditious rants about invading Canada or to upload soap operas to peer-to-peer file-sharing networks. On the other hand, by making an ill-informed, arbitrary decision about what TCP ports to permit traffic on, you'll drive away knowledgeable customers who need services such as Secure Shell (SSH), and kids who spend several hours a day gaming and are more than happy to buy beverages from you while they do it.

One of my local coffee shops has browser-detection code in its portal page. Browser detection? What are we, cave men?!?

Tip 2: Do the security right

Start with your router. Broadcast a meaningfully chosen service set identifier (SSID); a wireless network named linksys or wrt54g might as well be named attack me. Besides, naming your network after your establishment makes it clearer to customers which network they need to connect to.

Next, put some basic security measures in place, such as disallowing router management from the Wi-Fi network, changing the default password, and enabling (at least) the basic firewall.

Then tackle the air itself. Encryption: don't leave home without it. There isn't a Wi-Fi-capable machine in the world that cannot connect via password-protected Wi-Fi Protected Access (WPA), and it can make the difference between happy repeat customers and angry snooping victims. I know you don't like to talk about it, but we both know you've already overpaid for that faux-driftwood-framed blackboard on which your assistant manager writes the blends of the day in colored chalk. Add the password to it; you'll look hip to the youngsters, and you might drive a few leechers in from the parking lot. They'll probably still be cheapskates, but that's where your attractive sales staff is supposed to take over.

Tip 3: Preserve the ever-shrinking comfort zone

This boils down to a few key points: Carpet and electrical outlets are good; loud music and hard wooden chairs are bad. I guess the theory behind the tragic proliferation of uncomfortable seating and bad atmosphere is that the quicker you get one customer out, the quicker you get the next one in. I'm no MBA, but that seems short-sighted.

Luckily, the things that attract the Wi-Fi-using laptop toters are the same things that attract coffee shop customers in general. Quiet acoustics let people talk, and they allow computer users to focus on their work. Only electrical outlets offer no real parallel to non-computing customers' needs.

Here, though, pinching pennies and capping the outlets guarantees you less business, and is unnecessary to boot. You can get an electrical usage meter and measure how much juice it takes to charge a laptop battery -- even if all of your outlets are in use all day long, it's still nothing compared to the heating and air-conditioning bill. Besides, we all know the real money comes from charging four dollars for a paper cup filled with milk and coffee. If you're worried about the margins, try to sell more coffee. It's better for business anyway.

Tip 4: Be your own boss

Broadband is cheap, especially compared to commercial rent. Don't get duped by the local wireless Internet service providers (WISP) who want to brand your in-store service. It's a fad, and it only benefits the service provider. Using a time-limited DHCP lease redirects traffic through a portal Web page that users must keep open. It is without a doubt the most irritating thing in the commercial wireless world, and it is forced upon the customer by Clearwire, the WISP that "sponsors" coffee shops' connections in the hopes of selling more home service contracts. I am confident it does not succeed at that.

Only slightly better is one coffee shop that runs a straight no-frills-and-no-browser-ads connection, but has every flat surface in the joint plastered with stickers and signs advertising its WISP sponsor. Even if you don't see the obvious turn-off to customers of this captive propaganda, you surely must recognize that if these WISPs ever start making actual money, they'll increase the rate they charge you to the maximum limit you can afford. And those that never manage to turn a profit will leave you high and dry, scrambling to find a new connection without any time to spare.

It's far better to shop for a normal, business-class DSL line that you can use with no strings attached. More flexibility, fewer annoyances -- these are good things.

Who cares, exactly?

Well, there you have it. If I left something out, feel free to chime in below.

NewsForge readers are among the computer-using customer set, and we want a good Internet coffee shop experience. But since we also have more experience than average at system administration and network administration tasks, we're in a position to prove helpful. I'd be exaggerating to call it a "win-win" scenario -- really, I just want to find a decent coffee shop with a good free network before the July sun starts baking me through the roof.
http://business.newsforge.com/busine...?tid=39&tid=92





A Pie-in-the-Sky Treehouse Made Real
John Schwartz


Spencer Tirey for The New York Times

OBSESSION, like inspiration, comes unbidden and has a habit of latching on. For Ezra Idlet, it struck in Kansas City, between the sound check and the show.

Mr. Idlet, half of a quirky folk-rock duo called Trout Fishing in America, was killing time in a bookstore eight years ago when he picked up the coffee-table book "Treehouses: The Art and Craft of Living Out on a Limb," by Peter Nelson (Houghton Mifflin, 1994). The book, with its gorgeous photos of houses produced by wild flights of imagination, resonated with him. He had never built anything bigger than the woodshed behind his house, but thanks to the diagrams and drawings in the book, "It just looked like it was possible," he said. "I thought, well, yeah!"

What Mr. Idlet, 52, had in mind was not a limb-spanning lean-to for his kids, but a real house nestled in the trees on his land in northwestern Arkansas. He owns 100 acres in the Boston Mountains stretch of the Ozarks, southwest of Fayetteville and down a dirt road. He bought the land in 1992. At the time, he and Keith Grimwood, his musical partner since 1979, had decided to decamp from Houston with their families for wider open spaces. (Mr. Grimwood, now 54, left an apartment in suburban Houston and bought 10 acres with a house and two cabins in West Fork, Ark., about half an hour away from Prairie Grove; Mr. Idlet bought his land with the proceeds from the sale of a house in a heating-up neighborhood, the Heights, just north of downtown Houston.)

When Mr. Idlet returned home from the Kansas trip, he told his wife, Karen, about his treehouse vision. She, in turn, explained her position: No. "She said, 'We have a lot of things we really need to do before we get to that,' " he recalled.

And so, instead of building the treehouse, he wrote a song. (When something is on Mr. Idlet's mind, he said, "it often comes out in a song," and the idea "was really, really working on me.") The song, "Dreaming," became one of the group's best loved:

Dreaming, I see bridges spanning spaces between red oak trees,
Connecting houses in the leaves.
Someday my room will rock and shiver with the wind.
One day I'll eat my pie up in the sky.


Like many of Trout's songs, it is sung from the perspective of a wistful, overgrown kid. When Trout performs for children — they have 12 albums, two of which have been nominated for Grammy awards — they embody a kind of goofball gestalt at odds with the sugary-sweet format of so much other music for the younger crowd. Their songs have titles like "My Hair Had a Party Last Night" and "18 Wheels on a Big Rig" (a song that requires Mr. Grimwood to count to 18 in Roman numerals). And the two have a Mutt-and-Jeff quality — Mr. Idlet is 6-feet-9 and Mr. Grimwood, 5-feet-5 — that delights their fans.

But Mr. Idlet and Mr. Grimwood, who borrowed their group's name from the title of the novel by Richard Brautigan, also perform unabashedly sentimental and wickedly funny songs for grown-ups, with an unexpected emotional punch. In "The Last Day of Pompeii," written by Michael Smith, a woman facing Vesuvius's lava reflects, "If I knew then what I know now":

I would have taken that Mediterranean cruise
Filled up on chocolates, cigarettes and booze
Given some perfect stranger the blues
Hot stuff for me...


Mr. Idlet, accordingly, is not one to give up on his dreams. In the two years that followed, he continued to doodle designs for the treehouse, and would introduce the song at shows by announcing that it symbolized something he really wanted to do, although it was "kind of impractical for the moment."

Still, he kept trying to find ways to realize his obsession without going broke. One day he was talking to a neighbor, Clancy McMahon, who is a professional home builder. Mr. McMahon wanted to buy a couple of horses for his children. Mr. Idlet, who had horses, offered a swap: animals for expertise.

After Ms. Idlet's brother, Jody Thom, who also builds houses, promised to help as well, Ms. Idlet finally agreed. "When Karen saw it didn't require money to get expert, intelligent help, that tipped the scales," Mr. Idlet said. Bit by bit, other friends volunteered to help, drawn by the wild vision of the thing.

The treehouse has now been under construction for more than six years, the work tucked in between musical gigs around the country. On a recent day, Mr. Idlet and Mr. Grimwood sat with a visitor over sandwiches and spicy pickled okra after a grinding, white-knuckle climb in Mr. Idlet's four-wheel drive pickup truck up the hogback hill leading to the treehouse.

About the size of a studio apartment at 540 square feet, the house is a one-room cabin in the air. It is an agreeable space full of light and calm, with a few simple decorative touches (a stained-glass panel over the front door, a small, beguiling mosaic in front of the wood stove). It sits among the trunks of three red oak trees, which come up through the deck; six steel poles provide additional support. It moves and shakes slightly, which takes a little getting used to but eventually feels as natural as the gentle swaying of the trees themselves.

The house is unfinished, but from the steel roof to the wood floors to the composting toilet, it's all coming together. There is a loft for sleeping, and a dormer at the top of the ladder that leads to it, so that Mr. Idlet does not bump his head on the way up. The loft railing, still under construction, will incorporate raw cedar branches. There is no electricity: the stove and refrigerator will run on propane, and the chandelier (bartered for a music workshop) has oil lamps. There is also a wind-up Brunswick phonograph that plays Mr. Idlet's enormous collection of 78-r.p.m. records. "You won't need a lick of electricity up here," he said.

The outside deck has railings that angle outward, with a built-in bench; the effect is of a recliner that creates the illusion of being suspended in air. When a visitor kicked his feet back to stand up and half of his foot pushed against empty space, Mr. Idlet viewed the scene with alarm. "That is a design defect that needs to be addressed," he said. His tone, however, conveyed something approaching pleasure: another problem to solve.

When the treehouse is complete, he said, he hopes to use it as a study in the woods — a place where he can play music and write new songs.

"It'll always be a work in progress," Mr. Grimwood countered. "It's just never going to be over with."

In fact, Mr. Idlet does seem to be constantly planning additions, including a smaller house, or at least a platform, on a nearby white oak, connected to the main house by a rope bridge. But for now, he has a more pressing concern: the local red oak borers that might someday kill the trees. The insect threat, which he learned about only after the project was well under way, has led him to take preventive measures, he said, like watering and fertilizing these trees to strengthen them. If he had known that the borers were coming, he said, he might have been talked out of building.

Driving back down the hill from the treehouse, the truck groaned down the muddy, rocky slope, while a vista of the Ozarks opened ahead, green and startling. Mr. Idlet sighed, admitting that he occasionally thinks about the house he sold in Houston.

"I've been told if I'd held on to my place I'd be rich," he said. Then, after a pause: "But I am."
http://www.nytimes.com/2006/05/11/garden/11tree.html


















Until next week,

- js.


















Current Week In Review






Recent WiRs -

May 6th, April 29th, April 22nd, April 15th

Jack Spratts' Week In Review is published every Friday. Please submit letters, articles, and press releases in plain text English to jackspratts (at) lycos (dot) com. Include contact info. Submission deadlines are Wednesdays @ 1700 UTC.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 04:41 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)