P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 05-09-07, 09:18 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - September 8th, '07

Since 2002


































"It was a dark and stormy night." – Madeleine L’Engle


"An internet provider should block the subscriptions of people who use the internet to share copyright-protected material on a large scale." – Swedish Judge Cecilia Renfors


"If the court orders us to give it back to him, we will give it back to him." – Thomas Bertrand


"It does indeed have something to do with faith. Faith that the universe has meaning, that our little human lives are not irrelevant, that what we choose or say or do matters, matters cosmically." – Madeleine L’Engle


"Last night, I did the last one, and I got a little choked up. I’m going to miss this place." – Tim Isch



































September 8th, 2007





Is Comcast's BitTorrent Filtering Violating the Law?
Chris Soghoian

Disclaimer: I am not a lawyer. I'm a cyber-security PhD student and take classes in the Indiana University law school, but this in no way makes me a legal expert. Caveat Lector.

Within the last few weeks, there have been a number of reports by Comcast customers claiming that their BitTorrent downloads and uploads have been capped or worse, blocked. Torrent Freak recently reported that Comcast, a major US cable company, is using an application from Sandvine to throttle such connections.

Many ISPs routinely filter the traffic on their networks. Many forbid customers from running email servers, web servers, and when the ISP detects that a customer's computer has been hacked, they often sever the Internet connection until the machine has been patched. Thus, the fact that a major ISP is now filtering yet another class of Internet traffic should not be major news--except for two factors: BitTorrent traffic accounts for upwards of 25% of US Internet traffic, and the techniques used by Comcast are essentially the same as those used by the Great Firewall of China.

Before we get deeply into this issue, let us step back for a brief, and high-level lesson in TCP/IP, and Internet filtering technologies. Most Internet applications use the TCP protocol to communicate. This protocol uses a three-way handshake to establish a connection.

The very first step in a three-way handshake involves the client sending a SYN packet to the receiving party. Modern firewalls block this packet for banned types of traffic--that is, they prevent the recipient from receiving it, and as such, the connection can never be established. Your home firewall does this, as well as those used by Comcast and other ISPs to prevent you from sending millions of email spam messages from their network.

Assuming that the SYN packet goes through, the three-way handshake is allowed to happen, then the two hosts will be able to begin communicating. Your ISP can still kill the connection later, should they wish to, merely by blocking the transmission of future packets.

According to Torrent Freak, Comcast is not doing this. They are instead sending a reset (or RST) packet to the Comcast customer, pretending to be from the host at the end of the BitTorrent connection. This RST packet is the TCP equivalent of stating "I don't want to talk to you anymore, please terminate the connection". It is extremely important to note that when Comcast creates and sends this packet, they do not identify themselves as the the source of packet, but instead impersonate one of the parties involved in the BitTorrent connection. This is where things get rather shady.

Last year, researchers from Cambridge University analyzed the Great Firewall of China and found that it used falsified RST packets to terminate connections that matched keyword filters. They were able to determine that users could evade the Chinese government's censorship system by ignoring these reset packets.

Ok, so the Chinese government and Comcast are using the same censorship techniques. Why should we care? The Chinese government doesn't have to pay attention to US law, but Comcast, being a US company, does.

Many states make it illegal to impersonate others. New York, a state notorious for its aggressive pro-consumer office of the Attorney General, makes it a crime for someone to "[impersonate] another and [do] an act in such assumed character with intent to obtain a benefit or to injure or defraud another." (See: NY Sec. 190.25: Criminal impersonation in the second degree). I do not believe that it would be too difficult to prove that Comcast obtains a benefit by impersonating others to eliminate or reduce BitTorrent traffic. Less torrent data flowing over their network will lead to an overall reduction in their bandwidth bill, and thus a huge cost savings.

New York is not the only state with such a law. Several other states including Connecticut and Alabama have similar laws on the books. Should any state AG's office decide to go after Comcast, it is quite possible that Comcast could be looking at a world of regulatory pain.

Comcast is perfectly within its right to filter the Internet traffic that flows over its network. What it is not entitled to do, is to impersonate its customers and other users, in order to make that filtering happen. Dropping packets is perfectly OK, while falsifying sender information in packet headers is not.
http://www.cnet.com/8301-13739_1-9769645-46.html





BitTorrent Continues to Dominate Internet Traffic
Ernesto

A recent analysis of the latest P2P trends wordwide shows that BitTorrent is still the most popular filesharing protocol. BitTorrent traffic is still on the rise and responsible for 50-75% of all P2P traffic and roughly 40% of all Internet traffic.

P2P traffic stats always cause quite a bit of controversy. In 2004 several respectable sources were reporting that BitTorrent was responsible for 35% of all internet traffic. This was probably a huge overestimation at the time, today this figure sounds more realistic.

Ipoque reports in a preview of their 2007 P2P survey that BitTorrent is generating between 50-75% of all P2P traffic. P2P traffic is responsible for 50%-90% of all Internet traffic which means that BitTorrent traffic is generating somewhere between 25% and 65% of all Internet traffic.

However, there is quite a bit of regional variance in the use of P2P applications according to Ipoque: “eDonkey exhibits a regionally varying popularity with shares between 5-50% of all P2P. In certain regions, other protocols have gained a significant importance. In the Baltic States, for instance, DirectConnect has a proportion of about 30% of all P2P traffic”

Ipoque reports that all P2P traffic is still growing. Joost is not yet posing a threat to ISPs, but media streaming services and VoIP applications show significant growth. For example, Ipoque reports that Skype generates up to 2% of the overall traffic in certain networks.

It is probably good to know that this Internet traffic research is often conducted by companies that offer broadband management and optimization solutions. It is in their best interest to overestimate these figures because they design the traffic shaping applications that help ISPs to manage their precious bandwidth.

The 2007 P2P survey will be presented at Technology Review’s Emerging Technologies Conference at MIT, more details later.
http://torrentfreak.com/bittorrent-d...raffic-070901/





Optimize BitTorrent To Outwit Traffic Shaping ISPs
Mike and Robb

These days, nothing worries an internet service provider more than peer-to-peer file trading. Depending on where you live, P2P can account for between 50 and 75% of broadband internet traffic. We mostly have the popularity of BitTorrent to thank for this crazy amount of data going to and fro.

This amount of traffic can raise the ISPs daily costs of delivering service, cause congestion either in your neighborhood or on the ISP's network, and force the ISP to buy increased bandwidth capacity.

But if you've been paying close attention to your BitTorrent transfers lately (or if you've simply been reading the news) you'll notice that ISPs have begun to take drastic measures to slow that flood of data currently clogging up their pipes.

Even though many of them deny it, most ISPs actively engage in traffic shaping, bandwidth throttling, connection denial or some such tactic to keep the amount of bandwidth consumed by high traffic applications on their networks to a minimum. While this does often ensure better performance for everyone in the neighborhood, it can mean painfully slow transfer speeds for those dabbling in P2P -- legit or not.

While there are valid arguments for and against shaping, we're not here to debate. We just want the fastest BitTorrent transfers possible.
Methods of Fooling ISPs

So how to get around an ISP that's throttling your BitTorrent traffic? You can try encrypting or your traffic, changing the default port number, changing the way the protocol behaves, reducing the amount of one-way traffic, or hiding your traffic within an encrypted tunnel.

Of course, different ISPs are employing different methods of control. None of these methods are guaranteed to work. But each one is known to work for some, and they are certainly worth a try.

How To Encrypt to Your BitTorrent Transfers:

The RC4 encryption offered by many popular BitTorrent clients today will obfuscate not only the header but the entire stream, which makes it considerably more difficult for an ISP to detect that you're using BitTorrent. Even if your ISP does not force you to enable encryption, you may be connecting to peers with ISPs that do.

Encryption began appearing on clients in late 2005. By the end of 2006, most actively-developed clients were updated with encryption. While not all torrent clients in a swarm will support encryption, most of them will. As a result, this small percentage of non-encryption capable peers may be a reason not to force encryption on a full-time basis, but there is no reason not to enable encryption that allows the falling back to a non-encrypted connection when needed.

If your favorite client is not listed below, check your documentation.

Azureus/Vuze
Azureus (which now calls its official client Vuze) is written in Java and therefore cross-platform. To turn on encryption, head to the Tools menu. Select Options, then Connection, then Transport Encryption. Check the "Require encrypted transport" box and select RC4 in the "Minimum encryption" drop-down menu.

Azureus/Vuze also offers an "Allow non-encrypted outgoing connections if encrypted connection attempt fails" option, which means you'll still be able to hop on torrents that don't have any encrypted seeders.

µTorrent
µTorrent (and now BitTorrent which is based on µTorrent) is a Windows-only client. In µTorrent, open up the Preferences panel and select the BitTorrent tab. Select Protocol encryption and then choose between "enabled" and "forced." µTorrent's "Enabled" option mirrors Azureus' option to allow unencrypted connections when no encrypted clients exist. It will give you more connections, but it won't be as effective at defeating traffic shapers.

µTorrent/BitTorrent also offers a option to 'Allow legacy incoming connections' which lets non-encrypted clients connect to you. This improves compatibility between clients but again, makes your traffic more vulnerable to shapers.

BitComet
BitComet is another popular Windows Client (98/Me/2000/XP). To turn on encryption in BitComet, head to the Options menu and choose Preferences. Then go to Advanced > Connection and select "Protocol encryption." There are options for "auto detect" and "always."

As with the others, "auto detect" will connect to more peers, but it won't hide traffic as well. You'll need to play with the settings in your program to see if it has any affect on your download/upload speeds.

Other clients that support encryption include KTorrent (Linux), rTorrent (Linux, Mac) and BitTornado (Windows).

How To Change Your BitTorrent Port Number:

The default port for BitTorrent transfers is port 6881, with some clients using different ports within the range of 6881-6999. As a result of ISP interference, all clients allow you to change the port number (or port range, sometimes) used for BitTorrent transfers. The setting is in the Options or Preferences for your client, or can be set using a command-line parameter.

Whenever you change your port, you need to adjust your router to allow incoming connections. An excellent service at http://www.portforward.com/ can guide you through the entire process of locating the current port being used (which allows you to change it), and then configuring your router to match.

How To Change the Way the BitTorrent Protocol Behaves:

The BitTorrent protocol has a distinct handshake. To control uploading by seeders, ISPs have learned to look for this handshake. The recent releases of both µTorrent and Azureus/Vuze include a "Lazy Bitfield" feature to hide seeders from ISPs. When Lazy Bitfield is enabled, the handshake is changed to make a BitTorrent seeder initially appear to be a non-seeding peer (sometimes called a leecher). This is done by sending a bitfield indicating missing pieces. Then, once the handshake is done, the client notifies its peer that it now has the pieces that were originally indicated as missing.

Azureus/Vuze
Azureus (which now calls its official client Vuze) is written in Java and therefore cross-platform. To turn on encryption, head to the Tools menu. Select Options, then Transfer. Enable Lazy-Bitfield here.

µTorrent
Lazy Bitfield is controlled in the Advanced section Preferences: peer.lazy_bitfield.

How To Reduce the Amount of One-Way transfers:

Most downloaders become seeders when they have 100% of the archive, then they spend the next several hours "paying back" the swarm until they have provided at least as many bytes uploaded that they downloaded -- a ratio of 1:1 or 1.00. As mentioned before, some ISPs make efforts to control seeders. Seeders generate one-way (outbound) traffic, and this traffic is sometimes the most troublesome for ISPs to handle.

Most clients are configured with a "speed limit" set Upload Maximum Limit in kB/s and an unlimited Download Maximum Limit. To reduce the amount of one-way transfers, the client needs to upload at the same rate (or less, overall) than it is downloading. While this means that the download will be a lot slower to complete, it also means that it will complete at a 1.00 ratio or above.

For example, perform your transfer with an Upload Limit of 30 KB/s and a Download Limit of 25 KB/s. When you first join you won't upload at all because you have no pieces to share yet. But after several minutes, the total bytes uploaded should be equal to or above the total bytes downloaded. When your download is complete, you will have little or no obligation to continue seeding as you already have uploaded enough to the swarm.

This tactic is not always effective or efficient. Some swarms have too few peers left that need data, making it difficult to reach your desired upload rates.

Many multi-torrent clients (Azureus/Vuze, µTorrent, BitComet, and others) provide the option of setting maximum upload and download rates on a per-torrent basis. These settings are found either in a right-click menu or in the Properties of each torrent. Some clients also allow Global Settings that affect all torrents being managed by the client, however the Global Settings do not provide a correct balance to ensure that a one-way transfer is avoided.

Azureus/Vuze provides the additional useful option of limiting the number of seed connections while downloading. This setting is found on the Options panel of each individual torrent.

How To Hide BitTorrent within an Encrypted Tunnel:

With the advent of Application-Layer Inspection, some ISPs may recognize and control BitTorrent traffic despite your best efforts.

You may be able to hide the BitTorrent traffic in an encrypted tunnel -- a transport path within the normal transport paths provided by TCP and IP. You can tunnel your traffic through cooperatives such as The Onion Router (TOR)* or I2P. Commercial Virtual Private Network (VPN) providers such as Relakks or SecureIX will also help keep your ISP from detecting exactly what you're doing. If you are familiar with SSH and SSH Tunneling, this is also a possibility. However, some ISPs even throttle or inhibit these encrypted tunnels.

Azureus provides in-client support for TOR and I2P. Other clients will have to set up the software as recommend on the TOR or I2P site.

*Note: TOR has been updated to allow peer-to-peer download data, despite any information to the contrary (it used to be prohibited).
Now For the Bad News

ISPs are taking advantage of more sophisticated shaping technology all the time, and many of the newer shapers won't be fooled by encrypted traffic. For instance, Sandvine (the shaping tool many believe Comcast and other ISPs employ) won't be fooled by obfuscating your traffic.

So what can you do beyond obfuscating?

The short answer is not much. There is no fool-proof way to do beat the shapers. You best choice is probably to switch to an ISP that doesn't employ anti-BitTorrent traffic shaping. In the long run, this also has the benefit of sending an effective message to your ex-ISP.

For a list of ISPs to avoid, have a look at the list maintained on the Azureus Wiki.

But what if you have no other option when it comes to ISPs? Start by calling customer service. Call now and call often. Disgruntled consumers often cost an ISP far more money than a large amount BitTorrent traffic. And by all means, try these ideas, though your results may vary considerably depending on what shaping tools your ISP is employing.
http://howto.wired.com/wiredhowtos/i...;category=Play





File-Sharing Battle Reaches Internet Providers

Internet service providers (ISPs) may soon be required by Swedish law to take greater responsibility for unlawful file-sharing.

The author of the official report - 'Music and Film on the Internet - Threat or Opportunity? -, appeals court judge Cecilia Renfors, has called for internet providers to shoulder the burden of defending against breaches of copyright.

"I propose that internet providers should be required to contribute to bringing all copyright infringement to an end," she wrote.

Renfors rejected the notion of introducing a broadband levy to be shared out among copyright holders, which was one idea put forward in the debate surrounding illegal file-sharing. Such a fee, according to the report, would would deny copyright holders the sole rights to their material in a controlled market.

"An internet provider should block the subscriptions of people who use the internet to share copyright-protected material on a large scale," said Renfors.

"While people are not permitted to download material, downloading alone is not sufficient to merit blocking a subscription," she added.

The proposal does not entail that ISPs will be called upon to hunt down file-sharers. Rather it is the copyright holders who may take action to prevent illegal file-sharing.

"If this does not result in a ban, the copyright holder can demand compensation from the internet provider," said Renfors.

Swedish broadband provider Bredbandsbolaget was critical of the report's conclusions.

"It is a bad proposal, ineffective and wrong in principle, and I don't understand how it's supposed to work in practice," said CEO Marcus Nylén.

"We as an operator can't act like we're the police and check where our customers are surfing. Scaring internet users is the wrong way to tackle the issue," he added.

The Swedish Film Institute however took a considerably more positive view of the report's findings.

"The proposal acts as a safeguard for those of us working in the film, television, music and other cultural industries. Internet protection for Swedish creative workers is currently among the worst in Europe.

"This is a step in the right direct to ensure that we get paid for our work," said film producer Joakim Hansson in a statement.
http://www.thelocal.se/8373.html





Father of WWW Tells Congress We Need Net Neutrality
Luke O'Brien

Tim Berners-Lee, the man who invented the World Wide Web, told a house subcommittee on Thursday that the US needs net neutrality to ensure the growth of an open Internet and remain competitive.

Berners-Lee gently but repeatedly emphasized the need for net neutrality during the questioning phase of a hearing in front of the House Commerce Subcommittee on Telecommunications and the Internet.

"Communications between people is what makes us a society, what makes the human race the human race," Berners-Lee said. He described the need to keep the Internet a universal "blank sheet" and said net neutrality was key. "A nondiscriminatory internet provision is very important for a society," he said.

When asked how failing to enshrine net neutrality into law could impact U.S. business, Berners-Lee replied that if he were starting a company and Europe had a more open internet policy than the U.S., he would be "very tempted to move." In other countries, he said, net neutrality is "assumed."

Unfortunately, most of the committee members had cleared out by then. The hearing, which focused on the "future of the world wide web," was interrupted by a vote on the House floor and got off to a slow start as members heaped praise on their august witness for nearly 40 minutes: "Philanthropic," "altruistic," "one of the great scientists and thinkers of the 20th century,' "a great man," "a visionary".

The obeisance, while not inaccurate, went on and on. Even Berners-Lee, a knight of the British empire and no stranger to the spotlight, began to squirm. Too bad. Because only a handful of the committee returned after the recess to see Berners-Lee, who joined hypertext to the Internet and created the first web browser, don his futurist cap and extemporize on where the online world could be headed.

He touched on a range of topics:

• making the internet more accessible to poor people by developing cheaper mobile devices.
• improving the performance of the health care system by increasing remote access and information sharing among doctors.
• using metadata to deal with copyright issues.
• developing a "semantic web" that would allow cutting-edge devices to communicate better and act as access points for information rather than storage systems that users depend on.
• the need to maintain open standards and keep the technology that forms the infrastructure of the internet royalty free.

The hearing was the first of a series on the future of the internet. Next time, hopefully, the flattery will be shorter and the attendance longer.
http://blog.wired.com/27bstroke6/200..._of_www_t.html





Justice Dept Wary of "Net Neutrality" Proposals
Peter Kaplan

Antitrust authorities at the U.S. Justice Department on Thursday warned regulators against imposing "network neutrality" regulations that would bar broadband Internet service companies from charging extra to some content providers.

In comments submitted to the Federal Communications Commission, the department said some net neutrality proposals "could deter broadband Internet providers from upgrading and expanding their networks to reach more Americans."

"Regulators should be careful not to impose regulations that could limit consumer choice and investment in broadband facilities," the department's antitrust chief, Thomas Barnett, said in a statement.

The concept of net neutrality is being studied by the FCC and has been the subject of much debate in Congress. Some lawmakers tried unsuccessfully to get net neutrality legislation passed last year.

Network neutrality proposals, backed by Internet content companies like Google Inc and eBay Inc, would bar Internet providers from charging extra fees to guarantee access to the Internet or give priority to some content.

However, the idea has been staunchly opposed by high-speed Internet providers such as AT&T Inc and Verizon Communications Inc.

Companies like eBay and Google worry that AT&T and Verizon will charge them more to get access to consumers or make it harder for consumers to get access to unaffiliated content.

The network providers counter that they would not block access to public Internet sites but want to offer private Internet-based services with faster speeds for uses such as downloading movies.

Last year, the FCC approved AT&T's purchase of BellSouth Corp after AT&T promised to maintain net neutrality of its high-speed Internet platform for two years. It was one of several key concessions that AT&T made to ease concerns about competition.

The comments from the Justice Department come on the heels of a report in June by antitrust experts at the Federal Trade Commission that expressed similar views and recommended that regulators "proceed with caution" on any such proposals.

The department said proponents of the Internet regulation had failed to show that many consumers had been harmed in a way that would justify government intervention.

It said there was nothing unusual about the practice of setting different levels of service and pricing, citing as an example the various mail options offered by the U.S. Postal Service.

"These differentiated products respond to market demand and expand consumers' choice," the department said.

Advocates of the network neutrality idea criticized the department's conclusions, saying regulations were needed because many consumers had little or no choice of broadband providers.

"This lack of competition and consumer choice for broadband access is the reason why (we support) preemptive safeguards to ensure that cable and telephone companies do not destroy the Internet as we know it," said the Open Internet Coalition, a group comprised of consumer groups and Internet content companies such as Google.

On the other hand, the department's comments were met with praise from AT&T.

"We continue to urge policymakers to focus on the real issue of the broadband era, which is to promote the benefits of broadband services at affordable rates for all consumers," AT&T said in a statement.
http://www.reuters.com/article/compa...36163820070906





Review: After Smoke Clears, FiOS a Hit
John Wilen

If the installers hadn't almost burned my house down, I'd say Verizon's new cable television and high speed Internet service was fantastic.

In fact, ever since the smoke cleared, I've enjoyed more than 100 TV channels, a responsive remote and fast Internet connection that rarely falters. If the installers figure out how to tell where power lines run in a wall, the service is nearly flawless.

Verizon Communications Inc., for those keeping score, is a telephone company that's been branching out into other things, such as cable TV. Cable companies, meanwhile, are broadening their offerings to include high-speed Internet and telephone service.

Verizon, which serves 28 states and Washington, D.C., is spending $23 billion to make fiber-optic connections — which it calls FiOS — available to 18 million homes by 2010. By bypassing the old copper phone lines, the company has much more bandwidth available than anyone else. (AT&T Inc. also is upgrading its service with fiber, though the cables do not extend all the way to each home.)

While it's been available where I live for a while, it wasn't until I moved within the Philadelphia suburbs that the company made me a pitch that was too good to refuse: All my telecom services — landline, cell phone, cable and Internet — on one bill.

The package is about $200, $10 a month more than it used to cost me to buy cable from Comcast, and my landline, Internet and wireless services from Verizon or Verizon Wireless. But I figured that $10 was worth it for faster Internet speeds of up to 5 megabits per second downstream (and 2 Mbps upstream) and 150 free cable channels — dozens more than I was getting from Comcast. Verizon threw in a voice mail box, caller identification service and unlimited calling with no extra charge.

And, I'll admit, I was more than ready to stick it in Comcast's eye after years of consistent 5 percent annual price hikes, mediocre equipment and a remote that barely worked.

I knew I was taking a risk, but how bad can cable TV delivered by a phone company be? Pretty good, as it turns out.

Though my 26-inch Samsung set couldn't take advantage of the service's high-definition offerings, the standard-definition picture quality was at least as good as offered by Comcast.

Verizon's remote and set-top box provided work amazingly well, compared to the Comcast equipment I was using. All the usual channels appear to be there, plus some. On the sports front, I've gained several new versions of ESPN, I now have the NFL Network, and I didn't lose Comcast SportsNet (the two rivals inked a deal letting Verizon carry CSN, home of many local Phillies, Sixers and Flyers games, last year).

We've also benefited from channel inflation in home improvement and cooking networks, and gained a slew of new nature, science and history-related channels, many of which I'd never heard of. One, DIY, repeats some of our favorite shows from other networks, letting us catch programs we used to miss. We've also gained children's channels such as Noggin.

On the Internet side the service has been exemplary. Whereas our old DSL modem had to be reset frequently, I've only had to reset our FiOS modem once. It may be a tad slower than a cable connection, but unless you're downloading gobs of big files, who's the wiser? It's more than fast enough for Webkinz and the occasional cartoon or game.

The landline works and sounds just fine, though it's not your grandfather's phone service — power isn't supplied over the network. Verizon does provide an eight-hour backup battery to help you through blackouts (we've fortunately not experienced any yet).
There was no change to our cell phone service, which we've had through Verizon Wireless for several years now (for the record, the coverage in Bucks County, Pa., is better than Cingular, our previous provider).

One complaint is the lack of documentation. I'm not normally a big manual reader, but a simple channel guide would have been nice (I've since found one online). And to use the voice mail service that came with the FiOS phone connection, I had to call an operator, then an 800 number, then suffer through several transfers before finding someone who could give me basic instructions (such as which number to dial to retrieve voice mail messages, for instance).

And there is the small matter of installation. When Verizon runs fiber to your house, the company needs to install a box on an inside wall. It was in drilling through a wall to connect that box to a fiber conduit that our installer hit an electrical wire. That knocked the power out and left our electrical box — and the front of the house — smoking.

The technicians compounded this error by insisting that we pay for the electrical repairs, then bill them. We'd be reimbursed in 30 days, they assured us. My wife was having none of that. Verizon's insurance company cut us a check for the $2,650 repair within days.

We got a brand-new electrical box out of the deal, for free. But our electrician tells us ours was not the first botched Verizon installation he's been called out to fix.

For its part, Verizon was very apologetic. That's fine, but I want to know how many other people have had similar installation problems.

Very few, Verizon spokeswoman Sharon Shaffer assured me.

"This particular occurrence and the extent of the damage is rare," Shaffer said.

The technician did apparently get a talking-to.

"The training on installation procedures was reviewed with the technician," Shaffer said.

I'm sure the our incident was rare, and all's well that ends well, as far as I'm concerned.

Now, give me that remote.
http://www.localtechwire.com/news/te...story/1780294/





Cablevision CEO a Verizon FiOS Subscriber?
Mike Murray

Is the CEO of Cablevision a Verizon FiOS customer? Well... It appears so. Bernstein Research posted a picture on their site showing a Verizon FiOS can and drop directly above Chuck Dolan's Oyster Bay, Long Island mailbox.

Is the Chairman of Cablevision admitting that the service Verizon is offering is a superior service to that of his own company? Surely it's only installed for "Market Research" testing. Wink. Wink.

Cablevision and Verizon are in the middle of heated battle over Fiber-to-the-Premises (FTTP) broadband and video solutions. If it turns out Dolan's running FiOS as a regular customer, he's soon to be the laughing stock of the CEO world. At least amongst telco and broadband companies.
http://www.my-pc-help.com/OurBlogs/M...5/Default.aspx





Death of a Streamcaster: Web Radio Prepares for the Worst
Tom Corelis

Even after compromises from SoundExchange and the CRB, web radio broadcasters are not optimistic about the future

The U.S. Copyright Royalty Board’s new rates “would bankrupt us,” says Tim Westergren of Pandora, echoing a sentiment reflected widely by the webcaster community. Spurred by SoundExchange’s efforts to raise the cost of broadcasting music on the web to what is widely believed to be unreasonable levels, webcasters everywhere are vigorously fighting what may very well be their end.

In a pair of interviews with DailyTech, Proton Radio’s Jason Wohlstadter and Pandora’s Tim Westergren shared their thoughts on what SoundExchange’s revised royalties plan means to them and their stations. The CRB’s rates are “disruptive for everybody, rightsholders included: even if you increase your rates, and if it puts those rate-paying stations out of business, then you’re going to get nothing. These rates [don’t rely on the] economics of web radio,” says Westergren, “so, I think it’s a terrible ruling and one that needs to be fixed.”

“Kurt Hanson of RAIN estimates that the rate increase is around 400% ... that's pretty ridiculous no matter the reasoning is,” says Wohlstadter.

One of the biggest problems, argues Westergren, was that the original talks in 1998 and 2002 were hamstrung by politics and semantics, and as mentioned before, completely disconnected from reality. “The committee had to abide by language in the federal statute … and that language was monkeyed with.”

“The CRB just missed it,” says Westergren, “if you read the ruling and the rationale as it’s articulated by the royalty board and their subsequent followup to it, it demonstrated a complete lack of understanding of the business that we’re in. I think that there were structural problems and I think that resulted in a really flawed decision handed down.”

Not everyone is affected equally by the CRB’s changes, however. In the case of some independent stations that deal primarily with underground music, deals have been worked out directly with the labels -- many of which are run by fellow enthusiasts. Such is the case for Proton, and Wohlstadler argues that the direct approach is far more valuable to niche artists:

“I see Proton as one of the main avenues of promotion for these artists and labels. We generate revenue for them by linking show tracklists directly to store fronts where listeners can buy songs they just heard. I believe this makes the labels more money than any royalty would. In our niche over 5,000 songs are released a week, our station is one of the few promotional outlets available to labels to extend shelf life.”

Westergren also touches on the challenges from working with niche music from Pandora’s collection of over 40,000 artists:

“We have over half a million songs in our collection. On a daily basis, 94% of those songs play … Of those 40,000 plus artists, 39,000 are not being aired or have never been played on any form of broadcast radio, so it’s a real vital channel for artists.”
The important thing to remember, both stations stressed, is that they have no problems paying the royalties if so compelled provided SoundExchange asks reasonable rates and existing agreements are understood.

“My hope is that if SoundExchange comes to us requesting royalties for Artist A on Label Z, our contract in place with Label Z would take us out of any obligations,” says Wohlstadler. Web radio, according to Westergren, “needs to survive and it needs to be nurtured. Not to say it gets a free pass, but as we resolve this rate debate, we need to really keep in mind the value that it’s offering for musicians.”
http://www.dailytech.com/Death+of+a+...rticle8677.htm





Airing Their Differences About Pay for Play

Musicians and radio station owners turn up the volume in debate over royalties vs. free promotion
Marc Fisher

George W. Bush got perhaps his biggest laugh of the summer when he responded to a question from a voter in Nashville seeking the president's thoughts about forcing radio stations to pay royalties to performing artists:

"Maybe you've never had a president say this," Bush replied. "I have, like, no earthly idea what you're talking about. I'm totally out of my lane. I like listening to country music, if that helps."

That's probably not going to do the trick, but Congress can use all the help it can get as it tries to arbitrate the latest conflict to emerge from the digital revolution's body blow to the music industry.

Artists such as Judy Collins, Don Henley, Tony Bennett and Sam Moore (of the R&B duo Sam & Dave) argue that radio stations ought to pay for the music they play on the air -- but station owners counter that for all the promotion they do for the record industry, it's the labels that should be paying them. Lawmakers can be forgiven for feeling as if they've landed inside a fraternal brawl.

They have. This summer's lobbying effort by a new recording industry-sponsored group, MusicFirst, has breathed new life into the drive to make radio pay artists -- and not just writers and publishers -- for playing their songs, but the issue is as old as Top 40. What's different now is that the music industry, in deep trouble, is casting around for ways to make up for the steep decline in revenue that hit the recording business after digital downloading changed the business's basic structure.

"The issue here is simply, it's about fairness," folk singer Collins told a congressional panel in August. "Radio is a multibillion-dollar business built on our creativity, our passion and our soul." Collins and other artists who rose to fame singing other people's songs say they must tour well into their golden years in good part because they never got paid for all the radio play their music received.

Besides, they argue, with Internet and satellite radio stations now paying royalties to performers, why shouldn't broadcast AM and FM stations have to do the same?

Because as much as the record business is hurting, so is radio, says Dennis Wharton, executive vice president of the National Association of Broadcasters, who notes that radio revenue has been flat for several years and says his industry is in no position to carve out a new entitlement for artists.

Rep. Howard Berman, the California Democrat who chairs the House subcommittee on intellectual property, is expected to introduce a bill this month that would grant royalties from radio stations to performers -- the latest salvo in a battle that has been fought about once a decade since the 1940s.

The original fight over royalties pitted performers against both radio and the record companies. Back then, artists saw the two businesses as connected pieces of a larger system that made megabucks on the backs of the artists who provided their content.

But the record and radio industries in the '40s successfully drove a wedge between composers and songwriters on one side and performers on the other, creating an anomaly that persists to this day. Radio station owners continue to pay about 2 percent of their revenues, a total of $450 million last year, to the people who write and publish the songs played on the air, but leave it to the record companies to pay performers through their contracts for new albums.

There's no special reason to make that distinction. "It's just always been that way," says Wharton of the NAB, which has a deep interest in keeping it that way.

Broadcasters argue that performers shouldn't be paid by radio stations because radio is primarily a promotional device for new music: Airplay gets listeners interested in a song or artist and drives them to go buy the music, providing revenue to the record companies, which therefore should be the ones paying the artists.

The problem is that the business model that has supported the music industry for the past half century is collapsing, thanks to online music sharing, the demise of the CD album, the rise of the iPod and the diminishing roles that both radio and record companies are playing in the economics of music. Sales of music CDs dropped by 13 percent last year, according to the recording industry's trade association.

In the radio business, this drive by artists and record companies to squeeze money out of radio stations is seen as a desperate move by an industry that completely blew the digital revolution. Record companies failed to cultivate new talent, resisted new technologies and alienated an entire generation of potential customers by suing grandmothers and teenagers rather than embracing a new economic model, radio executives argue.

Alfred Liggins, the outspoken chief of Radio One, the nation's largest owner of black-oriented stations, says it's the record industry that should pay radio for promoting their product, not the other way around (though there is a slight legal problem with that scenario, since that kind of financial relationship runs the risk of triggering payola prosecutions).

The new debate over performance rights is a battle of words and influence waged by two mammoth industries, a confrontation between deep-pocketed lobbyists with everyone involved claiming to be economically stressed and on the side of what's right and good.

But history reminds us that at almost every step up technology's ladder, the music industry has resisted change, arguing that giving listeners free access to recorded music would wipe out the market for selling those recordings. When radio moved from live orchestras and bands to spinning records in the late 1940s, the musicians union predicted the loss of thousands of jobs and the record industry hurled lawyers at radio companies.

It turned out that the more radio played records, the more listeners wanted to go out and buy those songs.

Again, in the 1970s, when cassette tapes made it easy for listeners to record music off the radio, the record industry howled in protest, only to find that while some people did create their own bootleg mix tapes, far more happily spent their dollars on prerecorded cassettes.

This time, downloading and file sharing are choking off the record industry's revenue stream, while Web and satellite radio eat away at AM and FM radio's audience.

"The record business is in a world of hurt right now," Wharton says. "And obviously our guys are apoplectic about what they would regard as a money grab by the foreign-owned record companies." (Four of the top five record companies are based in Europe or Japan.)

In the end, new revenue sources are likely to emerge in the reshaped media economy. Already, concerts and direct sales by artists are playing a larger role in the income mix for some performers, and online social communities are becoming essential to the economic model that some bands are cobbling together. But in the history of media, the big players don't always show the flexibility they need to adapt to new technologies. On occasion, they resort to eating their own.
http://www.washingtonpost.com/wp-dyn...=moreheadlines





MTV Aims to Return to Its Days of Glory
Jeff Leeds

Pop culture oddsmakers might have trouble figuring out who faces a tougher road on the comeback trail: Britney Spears or the television giant that helped vault her to stardom, MTV. Both will be trying to recapture better days on Sunday as the music network shows its annual presentation of the Video Music Awards.

After reigning as a primary tastemaker for years, MTV lately has suffered some stumbles (though, unlike Ms. Spears’s, they haven’t become paparazzi fodder). For one thing, critics say the Video Music Awards, intended as a raucous counterpoint to more staid ceremonies, has become stale itself; the show has endured a four-year ratings slump, including a 28 percent drop last year.

Another issue is the channel’s slow response to the explosion of video and social networking online. Music fans are regularly watching music videos on its Web site, mtv.com, which drew about 8.5 million visitors in July. But Yahoo’s music service, which has long showcased videos, attracted 23 million, and MySpace’s music site drew more than 21 million.

To many, the missteps have meant that MTV for once has had trouble keeping up with the shifts in how young fans live, watch and consume. “They were the innovators, and now they’re kind of a step behind,” said Laura Caraccioli-Davis, executive vice president of entertainment for the media-buying firm Starcom MediaVest. “The brands that are talking to this audience are forced to innovate every day. MTV stayed still for a second too long.”

In response, MTV executives are doing what people do when they’re hungry for a quick change in fortune: they are heading to Las Vegas. This year’s Video Music Awards will be shown live from the Palms Casino Resort (where MTV also recorded a recent season of its reality series “The Real World”) and will be substantially revamped. Instead of the usual production built on a single stage, MTV is taking a shotgun approach, scattering cameras around the hotel, with artists performing and receiving awards in decorated suites and the hotel’s own concert hall.

MTV has also shortened the show to two hours, packing in performances by artists like Fall Out Boy, 50 Cent and a resurgent Ms. Spears, who will perform her new single, “Gimme More.”

MTV has a big stack of chips on the table this year. In shaking up its showcase event, the channel is not only aiming to reverse declines in the awards show’s viewership, but also to generate buzz about several new efforts to connect with tech-savvy young viewers drawn to upstart brands like YouTube.

The show’s loss of cachet has paralleled the overall decline of the recording industry, which has long relied on exposing its artists to mass audiences to rack up platinum sales. As a result, MTV may be saddled with the burden of trying to extract a wide audience from a splintered market where no genre is king.

“There isn’t any one movement right now, but rather this gigantic appetite for all things music,” said Amy Doyle, MTV’s senior vice president of music and talent. “The key is being everywhere, but being everywhere in the way the audience wants.”

MTV’s own correspondents, as well as fans at the awards show, will snap candid camera-phone moments and post them on a new area of MTV’s Web site called “You R Here.” The most compelling photos or video recordings from Las Vegas may be presented during the channel’s news segments. Eventually, the site could blossom into MTV’s answer to YouTube.

MTV has its own take on computer-animated “virtual” worlds as well. Even before the awards show takes place, fans can go “in-world” through mtv.com and tour the Palms’ suites and, on Saturday, see performances by computerized re-creations of acts including Boys Like Girls and Peter, Bjorn & John.

Television viewers will see big changes too. To start, there will be only one presentation of the awards program in its original form. In a departure from MTV’s practice of plastering the channel with repeat showings, programmers this year are hoping to attract interest with alternate versions.

The first will be shown with running commentary from celebrities at the show who will chat about their favorite moments. The next will replace portions of the original with previously unshown performances or other moments chosen by visitors to MTV’s Web site. (Visitors to mtv.com are expected to be able to view and choose from unseen performances in the Palms suites and other events recorded in Las Vegas before the broadcast.) MTV plans a third iteration that will highlight the strongest musical performances.

Dave Sirulnick, MTV’s executive producer for the event, said the idea was to add unusual moments to keep viewers of the first show coming back. “Even if you saw it and loved it and watched every moment of it, there’s still more to see,” he said.

For MTV, whose schedule is thick with dating and reality shows like “The Hills,” the awards show also coincides with an effort to raise its stature as a music tastemaker.

One of the biggest initiatives, though, has nothing to do with television programming, let alone music videos. It is Rock Band, a much-buzzed-about game from the MTV-owned game developer Harmonix that lets players perform famous songs with mock instruments. MTV has been coy about its plans for marketing Rock Band, but a version of it will be set up this weekend in the Palms suite where Fall Out Boy is to perform, and — who knows? — it might accidentally end up on camera.

There is also a new effort to introduce up-and-coming performers to MTV’s general audience during commercial breaks. In the 52/52 campaign, MTV spotlights one new act each week by featuring it in skits or short performances during the channel’s promotions of its own programs. In the first few weeks participants like Paramore and Rodrigo y Gabriela have seen their album sales rise after exposure in the ads, sometimes referred to as bumpers.

“Is someone seeing a bumper going to make them buy the record?” said Bob McLynn, whose talent management firm represents acts including Fall Out Boy. “Definitely not. If you combine that with maybe they heard it on the radio, maybe they saw the whole video someplace else, all that combines. It’s all about impressions. There’s still something to putting a face to the music, and that’s what MTV can do for you.”
http://www.nytimes.com/2007/09/06/ar...ion/06mtv.html





Do the Mash (Even if You Don’t Know All the Steps)
Anne Eisenberg

POP music has its mash-ups that combine tunes and vocals from different songs. YouTube viewers do it, too, mixing together segments from various music videos.

Now mash-ups are poised to hit the mainstream, and to spread well beyond music. Yahoo, I.B.M., Microsoft and others are creating systems to let ordinary people who’ve never been near a Java class create useful computer applications by combining, or “mashing up,” different online information sources.

If the technology catches on, many of us may become part-time programmers, instead of waiting for the people in information technology to help.

Here’s just one example: An employee at a chain of hardware stores creates a mash-up that combines inventory data, storm forecasts and the telephone numbers of branch managers. Then, when snow is on the way, the application sends text messages to the managers’ cellphones, telling them how many shovels to order.

Devising that sort of mash-up, which handles multiple data sources to produce a customized solution, is typically the province of a professional. But the new systems are designed, their creators say, so people with modest technical skills can tailor applications to their needs — while writing little or no code.

For now, the technology is free, as its creators race to sign up customers, extend their franchises and perhaps someday dominate the field. Some of the new systems are aimed at businesses, others at consumers who want to entertain themselves by creating games or ornamenting a blog.

Yahoo’s mash-up tool, Pipes, was introduced in February; no separate software plug-ins are required to try the technology.

Imitating someone else’s program on Pipes is a good way to get started, said Jonathan Trevor of Yahoo, who is one of Pipes’ creators. For instance, a user could start by choosing a sample mash-up that combines apartment listings in a neighborhood with addresses of nearby day care centers, then change the neighborhood and services as needed. “Pipes can be a gradual introduction to Web programming,” he said. “You can start by tweaking someone else’s program and then branch out on your own.”

People can view thousands of mash-ups, created by Pipes users, that are displayed on the site. One program starts with messages people send one another when participating in Second Life, the virtual world. The messages are combined with a translation service, Babel Fish, and converted to the recipient’s language, for example, English.

Pipes is currently in a testing phase. “We’re evolving and changing as people tell us what they need,” Dr. Trevor said.

Another new mash-up system, Popfly from Microsoft, was released in a test form in April. John Montgomery, a program manager on the Microsoft team building Popfly, and one of its originators, said his goal from the start was to build an entirely Web-based tool that ran on a browser, and was easy to use. “We wanted to make the programs so simple,” he said, “that people could use them without writing a line of code.”

Popfly’s target audience is consumers, starting with the MySpace generation. “We want to give them a rich set of tools,” he said, so that they can embed their favorite mash-ups on their Web pages. In a typical application, Popfly mashes together the feed from Twitter, a messaging service, with a tool that resolves the location of the twitterer into latitude and longitude and plots the information on Microsoft’s Virtual Earth. Then users can see exactly where their twittering friends are.

Popfly requires users to install extra software, called Silverlight, that creates striking, three-dimensional representations of the data that users drag and drop in a central area of the screen and combine to create mash-ups.

Mr. Montgomery said Popfly might eventually include advertising. “For now, though, it’s more about getting people to try the platform technology,” he said. People can sign up for invitations at www.popfly.com.

THE program from I.B.M., QEDWiki — the QED stands for quick and easily done — is aimed not at consumers, but at sales staff, accountants and others who need to mash up data from different sources to solve business problems.

Soon there will be a downloadable version of QEDWiki that companies can copy and use within their businesses, said Rod Smith, vice president for emerging Internet technologies at I.B.M.’s software group. For now, the program can be tried at http://services.alphaworks.ibm.com/qedwiki.

I.B.M. has posted a 10-minute tutorial on YouTube that takes viewers through QEDWiki.

People want to be able to write programs to exploit new business opportunities, he said. “Companies have lots of databases they want to make mashable,” he said, “and share with their business partners.”
http://www.nytimes.com/2007/09/02/te...novelties.html





No experience necessary

Terra Firma Brings EMI Down to Earth
James Hall

The party could soon be over at EMI. Terra Firma, the new private-equity owner of the record label, is to stamp out any signs of creative extravagance and financial excess at the company, which is home to artists such as Robbie Williams and Lily Allen.

Late last week Terra Firma said it is replacing Eric Nicoli, EMI's chief executive, and Martin Stewart, its chief financial officer, with three executives with no experience of the music industry. Chris Roling, until this year head of finance, procurement and logistics at ICI, the chemicals company, Ashley Unwin, a former management consultant, and Julie Williamson, a Terra Firma insider, will now set about reviewing the business from top to bottom.

An executive close to Terra Firma said the new management's remit is clear: "The assumption is that business discipline has been lacking in this industry. Yes, you need people who know Pete Doherty, but you also need discipline. This assumption could be wrong and arrogant, but the trio are going in to see if it is correct."

EMI insiders said although Nicoli and his predecessor Alain Levy went a long way cutting costs and cracking down on music industry excess, the company is still populated by record industry old-timers. The arrival of the distinctly un-rock 'n' roll management triumvirate has left some EMI executives quaking in their cowboy boots.

"EMI still has a quirky way of working. You are not viewed with credibility until you've served an apprenticeship standing in a North London pub with your arms folded watching some unsigned band," said one former record industry executive.

Even Nicoli, who joined EMI in 1999, was seen as an outsider by many in the industry because he trained as a physicist and spent most of his career in the food-manufacturing sector.

"Eric had been a non-executive before he became chairman but some in the business always viewed him with scepticism.

"He was seen as a man in a suit who occasionally put on a Johnny Cash-style black shirt to give himself credibility," said the former executive.

However, another source said most vestiges of music industry largesse have already been cleared out of EMI. "Had Terra Firma done all of this four or five years ago it would have found very rich pickings. But Nicoli grappled with the historic excess the industry had and instilled a more cost-focused, business-like approach. A lot of the low-hanging fruit has gone," he said.

The most notorious excesses were during the era of Ken Berry, the head of EMI's recorded music division until his departure in 2001, and his wife Nancy, who headed Virgin Music, which was bought by EMI. Berry left with a Ł6.1m payoff on top of his Ł3.7m salary.

Media figures have always tended to be larger than life because they need to be risk-takers in a hit-driven industry where most films and most albums lose money. But the Berry's reign at EMI was also commercially chequered. As head of Virgin, his wife signed Mariah Carey, the US diva, on a rumoured Ł50m five-album contract. However, in January 2002 EMI ditched Carey after her much-hyped album Glitter sold just 2m copies. EMI paid Ł19.6m to terminate Carey's contract and wrote off the Ł18.5m it had spent promoting her.

The media world has had clear-outs of creatives before. Just after the millennium a raft of high-profile showmen bosses such as Steve Case at AOL Time Warner, Tommy Mottola from Sony Music and Jean-Marie Messier at Vivendi left their positions. They were replaced by "suits" such as Andrew Lack at Sony and Jean-Rene Fourtou at Vivendi, neither of whom had worked in the record industry before.
http://www.telegraph.co.uk/money/mai...2/cnemi102.xml





Copyright Challenge To Go Before Judges
Jack

A wide-ranging group of teachers, orchestra conductors, film archivists and distributors is challenging two acts of congress in federal court (pdf); the Copyright Term Extension Act and the Uruguay Round Agreements Act. The aim of the appeal is to roll back so-called Mickey Mouse bills which increase the length of copyrights on material already created. Critics charge the acts unconstitutionally steal works from the public domain and put them into private hands.

A previous challenge failed before the U.S. Supreme Court.





EFF Looks Back at Four Years of RIAA Lawsuits
Christopher Null

This Saturday marks the fourth anniversary of the RIAA's first lawsuits against consumers, alleging that they were violating copyright by sharing songs on peer-to-peer networks. More than 20,000 (and probably about 30,000) people have been targeted since, and the RIAA shows no signs of slowing down. And yet, P2P networks continue to grow in popularity. Are the lawsuits having any effect?

The EFF takes us on a candid and interesting history lesson [PDF link] in this report, walking us through the RIAA's initial attempts to sue the technology companies out of existence, then, when that failed, to issue "DMCA subpoenas by the thousands," which eventually led to the first wave of settlements: One of the first to settle was a 12-year-old girl living in NYC public housing, forced to publicly apologize for her actions and pay a $2,000 settlement. But the RIAA started on the wrong foot, as well, withdrawing lawsuits against the obviously innocent, like a grandma accused of downloading hardcore rap using Windows software... though she had a Mac.

By 2004 the RIAA began suing "John Doe" defendants, basically filing lawsuits against IP addresses without bothering to subpoena the ISPs for a name attached to the IP address. Meanwhile, suits against the poor, disabled, and the dead piled up. The tales of those sued wrongly are legion and, in many cases, quite frightening.

Are the lawsuits working? Doesn't look that way: Globally, the number of P2P users has risen from 3.8 million in August 2003 to 8.9 million by June 2005.

What does the EFF propose to get the RIAA back to sanity? A reasonably-priced, DRM-free, all-you-can-eat P2P system in exchange for, say, $5 a month. While I'm sure the RIAA would never go such a deal (it might jump on a $150 a month plan), I'm hard-pressed to come up with anything better. Anyone got any good ideas on curtailing piracy while keeping artists fairly paid? How about getting rid of the RIAA altogether and sharing the cost of running the organization?

This PDF is a lengthy essay (8 of the 25 pages are footnotes), but if you're at all interested in how the music industry has ended up in the messy state it's in, it's a history lesson definitely worth the read, and the remembrance.

Thanks, Ars Technica!
http://tech.yahoo.com/blogs/null/41308





Staff Editorial: ASUN to Warn About RIAA Suits, Aid Those Already Affected

ASUN will launch a campaign this fall to educate students about the dangers of illegal file-sharing and to give students who have been slapped with lawsuits by the RIAA some legal help.

We applaud this effort by our student government leaders. As college students, and particularly as University of Nebraska-Lincoln students, we need all the help we can get since the Recording Industry Association of America released the hounds on us last year.

This summer, the number of UNL students threatened to be sued by the RIAA topped 90, making UNL the only school to be targeted in each of the first three rounds of pre-litigation letters.

If all the UNL students targeted by the RIAA so far settled out of court, the RIAA would extort more than a quarter million dollars from those settlements alone.

Meanwhile, students who refuse to settle - and some have - could face fines of at least $750 per illegally downloaded song.

The Association of Students of the University of Nebraska's plan, which was presented during the ASUN meeting Wednesday, includes educational handouts to students and information on the student government's Web site about the dangers of illegal downloading. The plan also includes help from Student Legal Services for targeted students and suggestions for legal music downloading alternatives.

We're glad ASUN - after lengthy debate Wednesday - is opposed to any kind of software geared to block peer-to-peer sharing. Such software could inhibit legitimate uses of file sharing - say, for sharing an academic study, paper or sound file. P2P blocking software is also impractical and nowhere near foolproof.

Advising students about downloading dangers and helping those who have been caught in the RIAA's web is all well and good. But we would also like to see more proactive measures.

You see, we have no sympathy for the RIAA.

As its clutches on the music industry slip, the association is lashing out - and making mistakes.

It's not good business for the RIAA to sue its own audience. And it's even worse policy to sue students just because they are unable and unlikely to fight back.

Remember: The money collected by the RIAA in these lawsuits does not go to artists and musicians. Instead, it gets plowed back into funds for more lawsuits.

The association ought to look at other methods - such as a licensing system with makers of large-capacity hard disks or Internet service providers - to recoup losses from illegal music downloading.

Meanwhile, our student government should continue to pressure the university to refuse to forward pre-litigation letters to students - or, at the very least, to demand compensation for forwarding such letters.

In an op/ed piece in Wednesday's Daily Nebraskan, ASUN President David Solheim suggested two legal alternatives to so-called "music piracy": Ruckus, which offers 3 million free downloadable songs to students with .edu e-mail addresses, and Pandora, which is like a free custom online radio.

Both of these alternatives have downsides. And iTunes has the obvious downside of a 99-cent per-song cost.

Lastly, remember that UNL IP addresses are being monitored explicitly by the RIAA. So your risk of getting caught illegally downloading on campus is significantly magnified.

While there is no end in close sight to the RIAA's childish mischief, the public eye isn't going to leave it anytime soon. Until a resolution is at hand, support the efforts of our student government in reasonably defending students' privacy rights.

And - especially if you're still out there downloading - watch your virtual back.
http://www.dailynebraskan.com/news/2...-2952565.shtml





Who Founded Facebook? A New Claim Emerges
John Markoff

Mark E. Zuckerberg is considered the founder of Facebook, the popular social networking Web site estimated to be worth upward of $1 billion.

Three Harvard classmates, the founders of ConnectU, have long claimed that Mr. Zuckerberg stole the idea from them, and they are suing him in Federal District Court in Boston.

Both parties seem to have forgotten Aaron J. Greenspan, yet another Harvard classmate. He says he was actually the one who created the original college social networking system, before either side in the legal dispute. And he has the e-mail messages to show it.

As a Harvard student in 2003 — six months before Facebook started and eight months before ConnectU went online — Mr. Greenspan established a simple Web service that he called houseSYSTEM. It was used by several thousand Harvard students for a variety of online college-related tasks. Mr. Zuckerberg was briefly an early participant.

An e-mail message, circulated widely by Mr. Greenspan to Harvard students on Sept. 19, 2003, describes the newest feature of houseSYSTEM, as “the Face Book,” an online system for quickly locating other students. The date was four months before Mr. Zuckerberg started his own site, originally “thefacebook.com.” (Mr. Greenspan retained his college e-mail messages and provided The New York Times with copies of his communications with Mr. Zuckerberg.)

Later the two students, who both graduated in 2004, exchanged e-mail about their separate projects. When Mr. Greenspan asked what Mr. Zuckerberg was planning and suggested the two integrate their systems, Mr. Zuckerberg responded, a month before starting his own service: “I actually did think about integrating it into houseSYSTEM before you even suggested it, but I decided that it’s probably best to keep them separated at least for now.”

Despite Mr. Greenspan’s entrepreneurial ambitions, Mr. Zuckerberg was the first to move to Silicon Valley, raising venture capital and eventually transforming Facebook from a social networking site for college students into one of the fastest growing Internet sites for both social and business contacts.

Indeed, Mr. Greenspan, who is now 24 and moved to Silicon Valley last year to start a company, appears to be a clear example of a truism in this high-technology region: establishing who is first with an idea is often a murky endeavor at best, and frequently it is not the inventor of an idea who is the ultimate winner.

Mr. Zuckerberg declined to be interviewed, saying through a spokeswoman that he was not sure how to respond. He did not dispute the chronology of events or the authenticity of Mr. Greenspan’s e-mail messages. Mr. Zuckerberg is seeking to dismiss the ConnectU suit.

Mr. Greenspan said that Mr. Zuckerberg’s lawyer contacted him this year in connection with the ConnectU lawsuit but that he had declined a request to serve as a witness, fearing that he would become embroiled in the legal battle.

In an interview at a cafe here this week, Mr. Greenspan said he had mostly made peace with the fact that Mr. Zuckerberg will be the first of his classmates to become a billionaire.

If Mr. Zuckerberg did borrow some of Mr. Greenspan’s concepts, he may have simply been working in a grand Harvard tradition. After all, it was a young Harvard dropout, Bill Gates, and his classmate, Paul G. Allen, who almost three decades earlier copied a version of the BASIC programming language, designed by two Dartmouth college professors, to jump-start the company that would grow into the world’s most powerful software firm.

“I’ve had a long time to think about this, and I’m not as bitter as I was a year ago,” Mr. Greenspan said. “Things like this aren’t surprising to me anymore.”

Still, he does not seem to be entirely at peace with the way things have turned out, and he wants to have the last word.

He has described the original creation of houseSYSTEM, ConnectU and Facebook in “Authoritas: One Student’s Harvard Admissions,” a 306-page unpublished autobiography about his adventures as a college student.

“This book is partly a search for justice,” he wrote in the introduction. “You don’t write an autobiography in your early 20s unless there’s something you need to get off your chest.”

In “Authoritas,” he described his collision with Harvard authorities when he first started his system. He also explained his frustration in getting the student paper, The Harvard Crimson, to write about houseSYSTEM, which was then being used by about 100 students.

Mr. Zuckerberg, by way of contrast, had no difficulty attracting the interest of the paper, Mr. Greenspan said. It wrote about him first because he had developed MP3-playing software, called Synapse, as a high school student. The paper then published frequent follow-up articles.

College classmates describe Mr. Greenspan as extremely bright and an unusually productive software designer. Mr. Greenspan and Mr. Zuckerberg had much in common, said William Most, who was a classmate. “They were both computer guys and self-starters.”

Mr. Greenspan remains extraordinarily energetic and envisions ideas for new projects. Indeed, in an effort to find a publisher for his Harvard manuscript he developed an automated system that generated personalized query letters to more than 800 literary agents nationwide.

Although he has yet to find a publisher, he has deployed his system as a commercial Web service for other potential authors as part of CommonRoom, a social networking and business Web site that he established last year.

He attained brief notoriety on several Internet news sites last year when he published an open letter to Mr. Zuckerberg after reports surfaced that Yahoo had offered his college classmate $900 million for Facebook just two years after the founding of the company.

With barely hidden bitterness, he wrote: “Remember the Web site you signed up for at Harvard two days before we met in January, 2004, called houseSYSTEM — the one I made with the Universal Face Book that predated your site by four months?

“Well, I’ve relaunched it as CommonRoom,” he continued, “and just like its predecessor, it has all sorts of features that might seem familiar: birthday reminders, an event calendar, RSVPs, how you know someone, photo albums, courses posters.

“After all, when you saw all of those features in houseSYSTEM three years ago, you called them ‘too useful,’ but I stood by them as valuable. Fortunately, even though I shut down houseSYSTEM, I can still use those same features on Facebook — and I didn’t even have to write any more code!”

Although CommonRoom has just 1,500 users, compared with Facebook’s 37 million, Mr. Greenspan has not given up on the idea of social networking. He is starting his second company — he founded his first, Think Computer, when he was 15 — with a new partner. He said he has been promised venture capital backing for the new company, Qubescape.

“I’ve been doing consulting and software for business for several years now, and I’ve noticed the same problems again and again in business,” he said. “I think there’s a fairly good chance we’ll turn business software on its head.”

Mr. Greenspan says that he has learned some important lessons since leaving school, although he has no love for the thought of becoming one of the serial entrepreneurs common in Silicon Valley.

“I’ve written a lot about Harvard’s motto being ‘veritas,’ ” he wrote recently in an instant message, “and how uncomfortable I was when I discovered that Harvard actually didn’t abide by the ideals of truth at all times. But it’s a good motto. Possibly the best there is, because if you wait long enough, the truth will come out.”
http://www.nytimes.com/2007/09/01/te...1facebook.html





A Tool to Organize Our Many Organizers
Michael Fitzgerald

WHEN he started his software company, Faizan Buzdar and three friends worked from a spare bedroom in the home of another friend. Their view was inspiring: the lovely house of an entrepreneur who had made a mint from his own start-up. “We would look at it and say we would buy it when we succeeded,” Mr. Buzdar said last week.

He may get the chance. His start-up, the Scrybe Corporation (www.iscrybe.com), which developed a personal information manager, recently said it had received an undisclosed amount of venture funding from Adobe Systems and L.M.K.R., an information technology services company based in Dubai.

Scrybe might have seemed a long shot to get even this far. Mr. Buzdar, 31, is based in Pakistan’s capital city, Islamabad, hardly known as a haven for software entrepreneurs. And Scrybe is trying to enter a well-established market dominated by Microsoft Outlook in the business world and by Google, Yahoo and a host of smaller companies on the Web. But Mr. Buzdar’s product, which is also called Scrybe and made its debut in a seven-minute YouTube video in October 2006, has drawn sustained interest. The reasons suggest he has figured out something fundamental about how we want access to schedules and related information.

Scrybe’s tools include a clever interface that features zooming calendar boxes that become bigger when scrolled over, the ability to print in multiple formats, including wallet- and pocket-friendly versions, and a novel notepad that accepts text and images from the Web as well as the usual typed-in notes. It also works offline, something that Outlook and other existing programs cannot do.

One user, David Gerboni, who works for a community bank in New York, said he had adopted Scrybe because of its interface and because it did a better job of pulling together data than any other calendar he has used, including Outlook.

All of this has made Scrybe, which remains in beta testing, the most anticipated software at the Museum of Modern Betas, a Web site that tracks emerging Web 2.0 projects. More than 300,000 people have watched the YouTube video. Given that the company had a public relations budget of zero dollars, Mr. Buzdar had told his co-founders (three friends he knew from the Pakistani outsourcing industry), that they might attract 10,000 users in six months. Instead, he said, “we had about 100,000 users in a few weeks.”

Of course, Scrybe is not the only new company trying to build a better way to organize personal information. Last week, the Open Source Applications Foundation released a much-delayed preview version of a product called Chandler. Another such tool that is planned to emerge this month is IWantSandy, which aims to handle calendar functions via e-mail.

While calendar sharing may sound mundane, the problem vexes people like David Weinberger, a research fellow at the Berkman Center for Internet & Society at Harvard Law School and author of “Everything Is Miscellaneous,” a book that looks at how things should be organized — or not — in the online age. “I go through contortions like everybody else to sync up my BlackBerry with my Google calendar,” he said.

Mr. Weinberger said that the calendar issue symbolized a much bigger problem with information: It is atomized into various databases and hard to pull together.

“What we need is the ability to associate the people and the times and the places of our lives with the broad messy context of our lives,” he said. He added that the new tools are an early but important step toward giving people and companies a better way to manage their increasingly complicated existence.

A McKinsey & Company study of United States economic activity in 2005 said that 40 percent of labor activity, the biggest chunk, came not from making things or from traditional transactions but from what McKinsey called “the interaction economy,” the part in which people collaborate, solve problems and design products and such. One might also call it “the meeting economy.” It is the least commoditized part of the economy, and the hardest to measure and manage — and it involves the highest-priced labor.

“The nature of work has changed, and so has the technology that matters to businesses,” said James M. Manyika, a senior partner at McKinsey. Personal productivity applications like Scrybe matter more than big companywide applications like enterprise resource planning systems. “You’re not trying to automate the task a human does; you’re trying to complement what the human is doing,” he said.

MR. BUZDAR acknowledged that Scrybe might never solve the problems of large companies. Indeed, John Leckrone, director of venture development at Adobe, said he expected Scrybe to expand the market for organizing software rather than displace existing products. Scrybe’s initial version is basically a personal organizer. But Mr. Buzdar said that he plans to link the tool more closely with Outlook in the near future, and that a version for small and medium-size businesses was in the works.

For its part, Microsoft is certain to continue to adapt its products for the increasingly collaborative world of Web business, as is I.B.M., the other large provider of corporate calendar and information sharing tools.

Paul Saffo, a technology forecaster in Silicon Valley, says Scrybe is among a wave of companies that are forcing businesses to rethink what they do with information. Doing business increasingly means pulling together people across different time zones and companies. E-mail and phones aren’t efficient ways to organize these things, so there is pressure to create publicly viewable calendars.

Mr. Saffo said the big difference between these new personal information managers and those of the past “is that these new things share.”

He said the situation reminded him of the way personal computers broke down corporate information bureaucracies and gave all workers greater access to data. Companies are being forced to deal with such sweeping change again, and it will create confusion and consternation, but ultimately more effective communication.
http://www.nytimes.com/2007/09/02/te...s/02proto.html





Go to Software Download...
Press Release

Computer scientists at Harvard's School of Engineering and Applied Sciences, in collaboration with colleagues from the Netherlands, are using a novel peer-to-peer video sharing application to explore a next-generation model for safe and legal electronic commerce that uses Internet bandwidth as a global currency.

The application (available for free download at http://tv.seas.harvard.edu) is an enhanced version of a program called Tribler, originally created by scientists at the Delft University of Technology and Vrije Universiteit, Amsterdam to study video file sharing. The software exploits the power of peer-to-peer technology, which is based on forming networks among individual users.

“Successful peer-to-peer systems rely on designing rules that promote fair sharing of resources amongst users. Thus, they are both efficient and powerful computational and economic systems,” says David Parkes, John L. Loeb Associate Professor of the Natural Sciences at Harvard. "Peer-to-peer has received a bad rap, however, because of its frequent association with illegal music or software downloads.”

Unlike traditional, centralized approaches, peer-to-peer systems are incredibly robust, as they can scale smoothly since the software adjusts to the number and behavior of individual users. The researchers were inspired to use a version of the Tribler video sharing software as a model for an e-commerce system because of such flexibility, speed, and reliability. “Our platform will provide fast downloads by ensuring sufficient uploads,” explains Johan Pouwelse, an assistant professor at Delft University of Technology and the technical director of Tribler. “The next generation of peer-to-peer systems will provide an ideal marketplace not just for content, but for bandwidth in general.”

The researchers envision an e-commerce model that connects users to a single global market, without any controlling company, network, or bank. They see bandwidth as the first true Internet “currency” for such a market. For example, the more a user uploads now (i.e. earns) and the higher the quality of the contributions, the more s/he would be able to download later (i.e. spend) and the faster the download speed. More broadly, this paradigm empowers individuals or groups of users to run their own “marketplace” for any computer resource or service.

Another idea the researchers believe has enormous but untapped potential is the combination of social network technology with peer-to-peer systems. “In the case of sharing and playing video, our network-based system already allows a group of ‘friends’ to pool their collective upload ‘reserve’ to slash download times. For Internet-based television this means a true instant, on-demand video experience,” explains Pouwelse.

The researchers concede that the greatest challenge to any peer-to-peer backed e-commerce system is implementing proper regulation in a decentralized environment. To keep an eye on the virtual economy, Parkes and Pouwelse envision creating a “web of trust,” or a network between friends used to evaluate the trustworthiness of fellow users and aimed at preventing content theft, counterfeiting, and cyber attacks.

To do so they will use a feature already included in the enhanced version of the Tribler software, the ability for users to “gossip” or report on the behavior of other peers. Their eventual goal is to find a way to create accurate personal assessments or trust metrics as a form of internal regulation.

“This idea is not new, but previous implementations have been costly and are dependent on a company and/or website being the enforcer. Addressing the ‘trust issue’ within open peer-to-peer technology could lead to future online economies that are legal, dynamic and scaleable, have very low start-up costs, and minimal downtime,” says Parkes.

By studying user behavior within an operational “Internet currency” system, with a particular focus on understanding how and why attacks, fraud, and abuse occur and how trust can be established and maintained, the researchers imagine future improvements to everything from on-demand television to online auctions to open content encyclopedias.
http://tv.seas.harvard.edu/press.php





Don't Dismiss Online Relationships as Fantasy
Regina Lynn

Last month, three unrelated stories challenged the idea that internet relationships are just fantasy and therefore less important, less powerful and less real than offline relationships.

They aren't.

First, I read the Wired magazine piece about Thomas Montgomery, a married father of two in New York state. Montgomery invented two alternate identities and got both of them involved online with the 17-year-old girl persona of Mary, a forty-something married woman in West Virginia, whom he met at the games site, Pogo.com. He then became so jealous that she was also seeing his co-worker online, that he shot the guy dead in the parking lot after work.

In real life. Where you can't just get a snack, go pee and log back in.

This is "just fantasy"? No. At least, it's no more fantastic than any other murderer's fantasy image of himself as a tough guy out to keep other men off his woman. Montgomery's was a real -- albeit twisted -- relationship, based on power and manipulation rather than love or sex, and one that resulted in real tragedy.

A Wall Street Journal article described a couple who met online three years ago and whose offline marriage is now on the rocks because of the husband's immersion in Second Life. Or maybe he initially immersed himself in Second Life because the marriage wasn't going so well; it's hard to tell.

Either way, his dedicated online involvement includes owning several businesses, adopting two dogs and getting married. He downplays his in-world marriage as "part of the game," a fantasy he and his Second Life partner have no intention of pursuing offline.

Yet I find it unlikely that a person would devote the majority of his working hours to something that is simply "a game."

Virtual worlds are boring when there's no one to play with; you don't go in there just to defy gravity and buy new costumes for your dolls. You're there for the people -- and you don't spend all day every day with mere casual acquaintances, either. Only relationships with real emotional attachment could foster such commitment.

Last week the Houston Chronicle reported that one in three women who met partners through online dating sites had sex with them "on the first date" -- and that 75 percent of those women didn't use condoms.

The study contrasts this apparently risky behavior with the extensive care women take to stay safe in other ways, like doing formal background checks, meeting in a public place, telling a friend whom they're meeting, and setting up check-in calls.

In this story, an MIT professor of behavioral economics is quoted as saying, "When somebody's sitting by their laptop at home and writing these sterile e-mails to each other, there's no sense of emotionality.... But when they meet and they get aroused, life changes."

Believe me, professor. If the e-mails were sterile or lacking in emotionality, the men would never get to the "first date" stage, much less sex.

Those pre-date e-mails and chats and dancing in virtual clubs build a relationship quickly. A real relationship. Sometimes, it's a relationship so hot that if you climax en route to the "first date," you don't consider it premature.

The common thread among these stories is that people get deeply involved in online relationships and make decisions about their real lives. Calling any of these online relationships "fantasy" dismisses the impact they have on the people involved and on those closest to them.

We all know we do things in the heat of the moment that we might not if we stepped back and thought about it for a while. Online environments can extend that "heat of the moment" feeling over long periods of time; physical environments often don't. And then we do stupid things, like completely ignore our other relationships to be with our online lovers, instead of staying in balance. Or we get caught having IM sex at work and get fired.

Very rarely does someone lose it as completely as Montgomery did. And yet, sexual jealousy is not a new motive for murder. This one is news because of the twists that can only happen online: Two baby boomers successfully fooled each other into believing they were barely legal. But the bonds that formed, however unhealthy, turned out to be all too real.

Even people who might point to the Montgomery case as an example of why the internet should be turned off forever know it's an extreme example. Meanwhile, the rest of us can say, "That's absurd, that doesn't apply to me at all," and still rush blindly into troubles of our own.

For all that I have broadened my horizons since the first Sex Drive column more than four years ago, I have yet to encounter anything that challenges my core belief: Relationships are real wherever they form.

That's why we're so desperate to pretend it's all fantasy if it's online, so we can make the hard, painful, life-crushing parts go away. And that's why I get my panties in a bunch when people try to dismiss the reality of sex in virtual spaces. I'm all for cybersex, of course, but let's not pretend it doesn't have real consequences.

Sex educator Cory Silverberg notes on his blog that "maybe we want to pretend that what happens online stays online because so often, we want it to."

But anyone who has been affected by online love knows the emotions don't turn on when we log on and turn off when we log off.

I mean, just look at Jazz Asylum and Chelle Moore, also known as Joe Trykoski and Michelle Pignatano. They met in Second Life last October and got married in-world. This spring, Michelle moved across four states into Joe's apartment, and they continued to play together in Second Life.

Last month in Chicago, Joe stopped the music at the Second Life Community Convention Masquerade Ball (which felt a lot like being in-world with the props, music and costumes), dropped to one knee, and proposed to Michelle. No one doubted the emotion in her voice when she said yes. The crowd cheered, and the dancing continued.

Now tell me it's just fantasy.

See you next time,
Regina Lynn
http://www.wired.com/culture/lifesty.../sexdrive_0907





As Prostitutes Turn to Craigslist, Law Takes Notice
Bruce Lambert

The eight women visited Long Island this summer along with vacationing families and other business travelers, staying in hotels and motels in commercial strips in middle-class suburbs like East Garden City, Hicksville and Woodbury. Their ages ranged from 20 to 32.

Three had come all the way from the San Francisco Bay area, one from Miami. Two lived less than 60 miles away, in Newark and Elizabeth, N.J. and two even closer, in Brooklyn.

All eight were arrested on prostitution charges here, snared in a new sting operation by the Nassau County police that focuses on Craigslist.org, the ubiquitous Web site best known for its employment and for-sale advertisements but which law enforcement officials say is increasingly also used to trade sex for money.

Nassau County has made more than 70 arrests since it began focusing on Craigslist last year, one of numerous crackdowns by vice squads from Hawaii to New Hampshire that have lately been monitoring the Web site closely, sometimes placing decoy ads to catch would-be customers.

“Craigslist has become the high-tech 42nd Street, where much of the solicitation takes place now,” said Richard McGuire, Nassau’s assistant chief of detectives. “Technology has worked its way into every profession, including the oldest.”

Augmenting traditional surveillance of street walkers, massage parlors, brothels and escort services, investigators are now hunching over computer screens to scroll through provocative cyber-ads in search of solicitors.

In July raids, the sheriff of Cook County, Ill., rounded up 43 women working on the streets — and 60 who advertised on Craigslist. In Seattle, a covert police ad on Craigslist in November resulted in the arrests of 71 men, including a bank officer, a construction worker and a surgeon.

And in Jacksonville, Fla., a single ad the police posted for three days in August netted 33 men, among them a teacher and a firefighter. “We got hundreds and hundreds and hundreds of hits” in phone calls and e-mail messages, said John P. Hartley, the assistant chief sheriff there.

Sex and the Internet have been intertwined almost since the first Web site, but the authorities say that prostitution is flourishing online as never before. And while prostitutes also advertise on other sites, the police here and across the country say Craigslist is by far the favorite. On one recent day, for example, some 9,000 listings were added to the site’s “Erotic Services” category in the New York region alone: Most offered massage and escorts, often hinting at more.

Law enforcement officials have accused Craigslist of enabling prostitution. But the company’s president, Jim Buckmaster, said its 24-member staff cannot patrol the multitude of constantly changing listings — some 20 million per month — and counts on viewers to flag objectionable ads, which are promptly removed.

“We do not want illegal activity on the site,” he said. Asked whether the company supported the police’s placing decoy ads on Craigslist, Mr. Buckmaster said: “We don’t comment on the specifics” of law enforcement.

Craig Newmark, the site’s founder and chairman, deferred all questions to Mr. Buckmaster.

The police have also occasionally turned to Craigslist to trace stolen goods offered for sale or make drug arrests. In June, in Nassau, spotting code words like “snow” or “skiing” to refer to cocaine, they set up a sting with an undercover officer to arrest a man who advertised cocaine for sex.

Experts say that under the federal Communications Decency Act of 1996, the ads are legal and Web site owners are exempt from responsibility for content posted by users. Craigslist, for example, last fall won dismissal of a suit that alleged housing discrimination in ads posted on its Web site. “You hold the speaker liable, not the soapbox,” explained Kurt B. Opsahl, senior staff attorney for the Electronic Frontier Foundation, a digital civil liberties group based in San Francisco.

While Mr. Buckmaster said Craigslist was no different from old-media publications that have long carried sex-oriented ads, law enforcement officials say its scope and format are especially useful to the sex industry. With listings for some 450 cities around the world, Craigslist claims to have 25 million users and 8 billion page views a month. Posting advertisements, except those in the employment and some housing categories, is free, as is responding to them by e-mail.

“The Internet has allowed people to make contact in a way not possible before,” said Ronald Weitzer, a sociology professor at George Washington University and a researcher on prostitution. “Ten years ago this was not happening at all.”

As Nassau’s district attorney, Kathleen Rice, said of Craigslist: “It’s as easy as it gets.”

Tracy Quan, a member of the advocacy group Prostitutes of New York and author of the autobiographical novel “Diary of a Married Call Girl” (Harper Perennial, 2006), acknowledged that “the Internet became a virtual street for people in the sex industry,” but said that “the police are as inventive and as wily as sex workers are.” She said that the stings amounted to entrapment of consenting adults, and that “it seems like an enormous waste of time resources by authoritarian busybodies.”

The police say that Craigslist has changed prostitution’s patterns, with people roaming the country, setting up shop for a week or two in hotels — often near airports — where they use laptop computers and cellphones to arrange encounters for hundreds of dollars, then moving on to their next location.

“They like to move around, that’s for sure,” said Assistant Chief McGuire. “They’re flying in from out of state because there is money here” on Long Island.

In Westchester County this spring, the police in Greenburgh, Rye, Rye Brook and Elmsford formed a joint task force to investigate ads on Craigslist, resulting in 30 arrests. Some of those arrested were out-of-town prostitutes who booked numerous dates in advance, then whisked in for a busy couple of days, the police said.

In Sandpoint, Idaho, population 8,105, R. Mark Lockwood, the police chief, said that an arrest this summer involving Craigslist “was probably our first prostitution case since World War II.”

Amid the police crackdown, in a game of electronic cat-and-mouse, the authorities say that Web site users who get wind of enforcement sometimes post warnings to thwart investigators.

The Craigslist modus operandi provides mobility, helping prostitutes keep a few steps ahead of the law, law enforcement officials say. It also affords a degree of anonymity — if they are caught, being away from home makes an arrest less embarrassing.

Pimps have also adapted to the computer age, the police say. Among those arrested here in August, on charges of promoting prostitution, was Victor Teixeira, 31, of Mineola. “He was managing the technology of it,” said Assistant Chief McGuire. “He recruited the women on the Internet. He put different ads up sometimes three times day. He would screen the calls and make the appointments.”

Mr. Teixeira pleaded not guilty; he could not be reached for comment.

Most of the arrests are on misdemeanor charges, with convictions resulting in fines of a few hundred dollars; only repeat offenders risk jail time. The real penalties are the disruption of business, the cost of lawyers and the seizures of computers and cash — as much as several thousand dollars at a time. The police say the focus on such misconduct is worthwhile because prostitution is often linked to other crimes involving drugs, weapons, physical abuse and exploitation of minors and immigrants.

Law enforcement officials ask why Craigslist even includes Erotic Services among its 191 categories. Mr. Buckmaster, the company president, said the site created that category “at the request of our users” for legitimate massage, escorts and exotic dancers. In an e-mail interview, he said that the police had praised the company’s cooperation, though he did not give examples.

Despite police complaints that Craigslist facilitates prostitution, some experts say the Web site also aids enforcement.

“Craigslist is a very open site, and it leaves digital footprints,” said Leslie A. Harris, president of the nonprofit Center for Democracy and Technology. “It makes it easier for the police.”
http://www.nytimes.com/2007/09/05/ny...raigslist.html





Convicted Peeper Sues to Get Porn Back
AP

A man recently jailed for secretly videotaping a woman and a teenage girl has sued a police department for the return of his massive porn collection taken during the investigation.

Dennis Saunders, 59, filed suit against San Rafael police in Marin County Superior Court after the department refused to give back some 500 pornographic movies and 250 magazines his lawyer described as unrelated to the peeping case.

"There's absolutely no legal foundation for them withholding perfectly legal adult-oriented material," Tiburon attorney Jon Rankin said.

The video collection alone was likely worth at least $10,000, Rankin said.

Saunders was arrested in 2002 and charged with taping the 45-year-old woman and 16-year-old girl in their bedrooms and bathrooms at an apartment complex where he worked. He was convicted of 48 misdemeanors and sentenced to more than eight years in jail, but was released last month with credit for good behavior.

A lawyer representing the city said authorities wanted direction from a judge on whether it would be "lawful or appropriate" to return the material to Saunders, who has a history of peeping-related arrests dating back to 1979.

"If the court orders us to give it back to him, we will give it back to him," city lawyer Thomas Bertrand said.
http://seattlepi.nwsource.com/nation...eper_Sues.html







"Halloween" Slashes Holiday Box Office Record
Dean Goodman

A re-imagining of the classic slasher movie "Halloween" broke the record for a new release during the U.S. Labor Day holiday weekend, according to studio estimates issued on Sunday.

The movie, directed by rock star-turned-filmmaker Rob Zombie, earned about $26.5 million since opening on Friday, easily beating the rosiest predictions.

After two weekends at No. 1, the teen comedy "Superbad" slipped to No. 2 with $12.2 million for the three-day period.

Two other films debuted in the top 10. The martial arts movie parody "Balls of Fury" came in at No. 3 with a modest $11.6 million, while the Kevin Bacon vigilante thriller "Death Sentence" barely registered a pulse at No. 8 with $4.2 million. Their respective studios said the results were in line with expectations.

"Halloween" distributor Metro-Goldwyn-Mayer expects its film will hit $30 million when sales for the Monday holiday are included. Observers had expected it to make $20 million for the four-day period. Final data will be released on Tuesday.

The three-day sum smashes the $16.5 million Labor Day opening record set two years ago by "Transporter 2," which added $3.6 million on Monday. The all-time record for the four-day period is $29.3 million set by 1999's "The Sixth Sense" in its fifth weekend.

"Halloween," the eighth film to be spun off from John Carpenter's 1978 original, focuses on the grim childhood of its villain, Michael Myers. It cost about $15 million to make, said Bob Weinstein, co-founder of the film's closely held producer, the Weinstein Co.

Despite its success, the former Miramax Films chief doubted there would be another "Halloween" film.

"I never say never never ... but it would have to be something very, very different," he told Reuters.

The studio does plan to make two more movies with Zombie, whose real name is Rob Cummings. Zombie, 42, rose to fame in the 1990s at the helm of the heavy metal band White Zombie. He made his feature directing debut with 2003's "House of 1000 Corpses."

After three weekends, "Superbad" has earned $89 million, and the film will easily pass the $100 million mark, said Columbia Pictures, a unit of Sony Corp.

"Balls of Fury" was released by Rogue Pictures, the genre division of NBC Universal's Focus Features. "Death Sentence" was released by 20th Century Fox, a unit of News Corp.
http://www.reuters.com/article/domes...19801620070902





As Labor Talks Near, Studios Play Down Numbers
Brooks Barnes

Hollywood had one of its best summers in recent history, crossing the $4 billion mark in ticket sales for the first time and stockpiling hits to release on DVD. But the movie studios are not quite popping the Champagne — at least publicly.

Indeed, to hear many studio executives talk, the movie business is closer to the edge of a cliff than ever. The 18-week summer season ending today looks great on paper, with 16 movies selling at least $100 million in tickets. But executives quickly point out that $4 billion is not a record when ticket sales are adjusted for inflation. Attendance was also lighter than in years past.

And those blockbuster movies, ranging from “Spider-Man 3” to “Rush Hour 3,” were also some of the most expensive films ever made.

“You have to first realize that before the first ticket is sold, you can have $300 million in costs to recoup,” said Dan Fellman, president of domestic distribution at Warner Brothers Pictures. “It’s hard to judge the health of an entire business based on one summer.”

Some people see a strategy in all of the black bunting: the studios are in the middle of tough labor negotiations with the Hollywood guilds.

“You don’t want to celebrate too much at a time when you’re negotiating new contracts,” said Brandon Gray, publisher of Box Office Mojo, a Web site about the movie business.

Particularly this time around. Agitated by the increasing distribution of movies and television shows online, the unions are more intent than ever on securing pay increases. Negotiations with two of the writers unions are expected to resume on Sept. 19.

“A record summer plays right into our hands, especially from a public perception standpoint,” said one Writers Guild of America executive, who asked for anonymity because he had not been cleared to speak publicly on behalf of the union.

A spokesman for the guild did not respond to requests for comment, but John F. Bowman, the chairman of the union’s negotiating committee, echoed the sentiment in a recent interview. “The studios are reaping windfall profits but pleading poverty to the talent community,” he said.

Studio chiefs say no strategy is at play. They are pleased with the financial performance of the summer — a window in which movie companies can make up to 40 percent of their yearly revenue — but say unsettling spots of weakness cannot be ignored.

Unlike in past years, no independent movie became a sleeper hit along the lines of “Little Miss Sunshine” in 2006. Romantic comedies failed to perform (“No Reservations” took in less than $40 million in the United States), as did lucrative torture-themed horror movies (“Captivity” bombed with $2.6 million). Stars with significant wattage — like Nicole Kidman and Angelina Jolie — drew yawns.

Moreover, Wall Street’s infatuation with movie financing is starting to ease, most studio chiefs say, because of the credit crisis and some high-profile investing mistakes like “Evan Almighty.” The comedy, which cost an estimated $200 million to produce and market, took in about $100 million at United States theaters.

Then there are the glass-half-empty statistics: Despite the glut of big-budget films, the box office failed to beat the summer of 2002 after inflation is taken into account. The total for that summer was $3.79 billion, or $4.39 billion adjusted for inflation.

Movie theaters sold about 606 million tickets from the first weekend in May through yesterday, according to the tracking firm Media by Numbers, down from a peak of 653 million in 2002. “There was certainly brisk business at theaters this summer, but I think a lot of people expected attendance would rebound to a larger degree,” said Paul Dergarabedian, president of Media by Numbers.

In contrast to some recent summers, all of the major studios got a turn at the feeding trough this year, said Gitesh Pandya, editor of the Web site Box Office Guru. Among the top 10 movies were films from Paramount, Sony, 20th Century Fox, Universal, Walt Disney and Warner Brothers.

The top three movies of the summer, as judged on their global popularity, were “Spider-Man 3” (Sony); “Pirates of the Caribbean: At World’s End” (Disney); and “Harry Potter and the Order of the Phoenix” (Warner Brothers). All three movies are hovering in the $900 million range, according to Mr. Pandya, with “Shrek the Third” not far behind.

“For these big sequels, international growth was the story,” Mr. Pandya said.

Paramount led the summer in market share, largely because of the performance of movies incubated at its DreamWorks unit. The studio’s “Transformers” grew into a monster hit, selling more than $300 million in tickets in the United States alone.

Also notable was Universal’s performance. The studio was responsible for the summer’s biggest flop in “Evan Almighty,” but racked up impressive receipts for the raunchy comedy “Knocked Up” and the thriller “The Bourne Ultimatum,” which critics praised and which managed to outperform two previous installments, a rare feat for the third movie in a franchise.

“We’re thrilled that business was so strong,” said Nikki Rocco, president of Universal Pictures distribution.

The summer is poised to end on a quiet note. Through yesterday, overall ticket sales for the Labor Day weekend declined compared to last year, according to Box Office Mojo. In first place was “Halloween,” a remake of the classic horror film from the Weinstein Company and distributor MGM, with $26.5 million. The performance shows that the horror genre, while troubled, still has legs when packaged correctly, box office analysts said.

Rounding out the top five for the weekend were: “Superbad” ($12.2 million); “Balls of Fury” ($11.6 million); “The Bourne Ultimatum” ($10.2 million); and “Rush Hour 3” ($8.6 million).
http://www.nytimes.com/2007/09/03/bu...movies.html?hp





Keeping Piracy in Perspective
Dan Mitchell

THE Motion Picture Association of America’s home page this week showed a big picture of Batman swooping out of the sky, wings outstretched. “The Magic of the Movies,” the caption read.

But while the picture was the dominant element on the home page, nearly every item was about movie piracy — how bad it is for the industry and how severe the penalties can be. There was even an item bragging about how many arrests had been made and how many pirated DVDs had been seized (81 million since last year). That Hollywood film studios just finished their best summer ever at the box office wasn’t mentioned.

Thus the headline on an Ars Technica article: “Movie biz obsesses about pirates even as it plunders box office booty.” And at Techdirt.com, Mike Masnick wrote that though the industry group is “constantly screaming about how piracy is killing the movie industry, putting poor stagehands and grips out of work, you’d be hard pressed to see the problem when you hear that the box office take this summer passed $4 billion for the first time ever.”

Both of the technology news sites, along with many bloggers, used the record numbers to call on Hollywood once again to change its antipiracy strategy. Rather than treating their customers as criminals, they say, movie studios should work harder to make moviegoing and DVD-viewing more enjoyable experiences.

Piracy is, of course, a huge problem, wrote Nate Anderson of Ars Technica (arstechnica.com). “It’s just that the level of concern is out of proportion to how well the industry is actually doing.” Studios, he added, should “make it easy for users to buy and use the legitimate product.”

“Think of how much more they could earn by adopting smarter business models to combat piracy in the marketplace, rather than the courts.”
http://www.nytimes.com/2007/09/08/te.../08online.html





The Price of War, Front and Center
Bill Carter

In the HBO documentary “Alive Day Memories” Dawn Halfaker, 27, a former Army first lieutenant, is sitting in a chair on a stark stage, talking, somewhat incongruously, to James Gandolfini, the star of “The Sopranos.”

Mr. Gandolfini serves as the interviewer in the film, set to have its premiere Sunday night at 10:30. It deals with the recovery of American veterans from devastating injuries inflicted during the war in Iraq.

Ms. Halfaker, whose right arm and shoulder are gone, blasted away by a rocket-propelled grenade, says she has wondered whether her child, if she ever has one, will be able truly to love her. And then a look of intense emotion clouds her face. Ms. Halfaker’s eyes flutter, seemingly looking at some image far, far away. Finally, after a long pause, Mr. Gandolfini asks quietly, “What were you just thinking about?”

And Ms. Halfaker tells him: “The reality of, will I be able to raise a kid? I won’t be able to pick up my son or daughter with two arms.”

Mr. Gandolfini manages to maintain his composure through that and nine other interviews with disabled veterans. As he put it in a telephone interview: “What the heck do I know? I never had the experiences these kids had. How much do they even want to remember?”

For the most part the ex-soldiers in the film — the title refers to the day they sustained, and survived, their injuries — are willing to share memories of what happened to them and to talk about their lives. Three of them — Ms. Halfaker; Jacob Schick, 24, an ex-corporal in the Marines; and John Jones, 29, a former Marine staff sergeant — said in telephone interviews that they had concluded the documentary would provide a valuable service. “I just thought it was important to get my story out,” said Mr. Schick, whose leg was amputated above the knee. “I want the American people to see this is what it’s like.”

Ms. Halfaker said: “When I first got injured, I wouldn’t talk as much. I didn’t want to acknowledge the reality of it. But then I saw the value of bringing some awareness of the things that are going on in Iraq. I think it was a little bit therapeutic.”

On the face of it Mr. Gandolfini makes for an unlikely questioner, as he acknowledged. But his fame, and the familiarity of his character, Tony Soprano, put the soldiers at ease. Mr. Gandolfini was “really respectful with us,” Mr. Schick said. “He didn’t want the cameras on him.”

Mr. Gandolfini is barely seen in the film and only occasionally heard. He insisted on that, Sheila Nevins, the president of HBO’s documentary division, said. “He played a tough guy on TV, but Jim knows these are the real tough guys,” she said.

The film sprang from a visit Ms. Nevins and Mr. Gandolfini made to Walter Reed Army Medical Center in Washington. “He wandered the halls,” Ms. Nevins said. “Everyone knew him. They’d show him their Purple Hearts. I could see him internalizing the whole experience.”

At the time HBO was coming up to the premiere of the documentary “Baghdad E.R.,” which chronicled the extraordinary efforts of military medical personnel and the lives they were saving. The film was at first widely praised in the military. But just before a screening in Washington the Pentagon refused to allow military personnel to appear at the HBO event. Ms. Nevins said she concluded that the Pentagon had decided it was an antiwar film.

She has no hesitation in declaring herself personally opposed to the war, but she argued that “Baghdad E.R.” presented military doctors heroically. And in the visit to Walter Reed, Ms. Nevins saw a follow-up: a look at some of the lives those doctors saved.

She said all was set for production until military officials stepped in, two weeks before shooting was to start, and made Walter Reed off limits to the filmmakers. “There was no explanation why,” Ms. Nevins said.

Of course she suspected similar fears of an antiwar message. And they were not entirely unwarranted. But Ms. Nevins said she was personally overwhelmed by what she saw and heard from the veterans. “I didn’t really understand patriotism until we made this film,” she said.

After losing access to Walter Reed, Ms. Nevins said, “I got to thinking about how we had the operating theater in the first film. And here we heard all about the theater of operations. And Jim was kind of an Off Broadway guy.”

Ms. Nevins put all the theater references together and wound up renting a small downtown performance space in Manhattan, creating an understated theatrical look for the interviews: a stage, a minimal set of just a couple of chairs, a few lights.

Mr. Gandolfini “didn’t pretend to be a journalist,” Ms. Nevins said. “But in that moment where Dawn talks about not being able to hold a child, he just waited, like a good actor in a great scene.”

The soldiers quickly found a comfort level with Mr. Gandolfini. Mr. Jones, who has two prosthetic legs and feet, had reason to be home with Mr. Gandolfini, for his lieutenant would project DVDs of “The Sopranos” on a bathroom wall when stationed in Iraq.
“We began to base ourselves off Tony Soprano and all his gang,” he said. “We’d talk about the godfather” — his commanding officer — “and the lieutenant would tell us to go out and put a hit on a guy.”

Mr. Gandolfini said he wanted to do something for the injured vets: “I think these guys are so ignored.” Not that the experience has made him feel especially good about his contribution. “If somebody gets hurt, and you take them to the hospital, should you feel good about it?”

The film includes video shot by insurgents, of whom Mr. Gandolfini said: “You hear them saying prayers after they blow up a jeep. It makes you want to pick up a gun and kill somebody.”

The soldiers themselves express a range of feelings, from anger to emotional distress. They all acknowledge living with constant pain, physical as well as psychological. One subject, Dexter Pitts, 22, a former Army private, suffers from post-traumatic stress disorder.

“It’s day to day,” Mr. Jones said. “You’re emotional. You have mood swings. I’ll get up in the morning, and it’s O.K., and come home really ticked off. You fight depression.” But he manages to get on ice skates with two prosthetic legs and skate around Bryant Park in Manhattan with his two young children.

Mr. Schick said: “I’m a Christian guy. I try to deal with it as best as I know how. Some days you think: Man, what could I have done differently? At the same time I believe there’s a reason for this. God’s not done with me yet.”

One reason, he said, was to win this battle. “I’ve got the rest of my life to beat my enemy,” Mr. Schick said. “Every day I just have to get out of my bed, and I beat him.”
http://www.nytimes.com/2007/09/06/ar...on/06aliv.html





2 Venice Films Look at Iraq War Horrors
Colleen Barry

Two Hollywood films that take up the politics of the Iraq war grew out of the conviction that the American public was not getting the full picture of the violence.

Oscar-winning director Paul Haggis' "In the Valley of Elah," starring Tommy Lee Jones and Charlize Theron, focuses on the psychological scars that haunt returning soldiers and provides a powerful commentary on how society is treating veterans and their families.

Brian De Palma says he wants to stop the war with his film, "Redacted" by exposing a wider audience to images of horror that he says are not being delivered by the mainstream media.

With Vietnam, "we saw pictures of the destruction and the sorrow of the people who were traumatized. We saw the soldiers ... being brought back in body bags. We see none of that in this war," De Palma told a news conference Friday. One of his previous films, "Casualties of War," dealt with the Vietnam war.

The title, "Redacted," is a term meaning edited that is often used when sensitive material is expunged, or blacked out, from a document.

De Palma's film, inspired by material he found on the Internet, is shot on video to present the film as though it were a series of clips that could be downloaded to your computer. Inspired by actual events, the movie tells the fictionalized story of a group of young soldiers who rape a 15-year-old Iraqi girl, kill her family and then shoot her.

De Palma said he wanted to examine how the soldiers had gone so wrong. The movie doesn't present the judicial resolution, but it does show one soldier who came forward being treated with hostility by the military, in contrast to the more comfortable interrogations of the two main perpetrators.

In reality, four soldiers have been convicted in the case that inspired the film and handed sentences of up to 110 years in prison. A fifth man, who left the Army before being charged, faces a federal death penalty trial. The case has received wide media coverage.

The filmmakers had to negotiate a "legal minefield" to present real events as fiction, De Palma said, and the film opens with a disclaimer, which is slowly blacked out. The final scene is a montage of real-life photographs of Iraqi war dead, including maimed and dead women and children, their eyes blacked out on the advice of lawyers because the film used actors and is not a documentary.

"The irony of 'Redacted' is that it was redacted," De Palma said.

While De Palma said he wants the film to help stop the war, Haggis said he tried to keep his own well-known anti-war politics off the screen.

"I felt I owed it to the audience to put that aside, to tell the story ... and let them decide," Haggis told reporters Saturday ahead of his movie's premiere.

Haggis said he also was driven by an absence from the Iraqi war of the sort of images that shocked the public into opposing the Vietnam war.

"I think that when that doesn't happen, it's the responsibility of the artist to ask those questions," said Haggis, who won an Oscar for 2002's "Crash."

In the film, Jones plays Hank Deerfield, the father of a U.S. soldier who disappears just days after returning from a tour in Iraq. A former soldier himself, he drives across the country to find out what happened to his son and learns hard truths about his son's Iraq tour, while challenging some of his own long-held ideals. Charlize Theron plays a New Mexico police detective drawn into the investigation.

Both movies explore how exposure to war _ both its horrors and its endless tense hours of patrol and manning roadblocks _ desensitizes soldiers to violence, and how that triggers even more tragedy.

Haggis' film takes a very hard look at how society is responding, including in a tight subplot. Early on, the wife of an Iraqi veteran reports to local police her husband's violent drowning of the family's Doberman in the bathtub. Theron's detective refers the woman to the local U.S. Department of Veterans Affairs, saying "crimes against dogs are particularly hard to prosecute."

Later, she answers a call where the woman, too, has been drowned in the bathtub.

Inevitably, the film is political, acknowledged Haggis. "All films are political when your country is at war," he said.

"Redacted," which opens in the United States in December, premiered Friday here, and "In the Valley of Elah," making its U.S. opening in coming weeks, premiered Saturday.
http://www.washingtonpost.com/wp-dyn...090101337.html





Young Fliers See the Film, Be It PG or R
Bob Tedeschi

A husband shoots his wife in the face, then drags her body from the pool of blood. A 12-year-old boy is crushed against a fence by a car. A teenager zips up her jeans in the bathroom after a sexual encounter.

These are images from movies shown to passengers recently on overhead screens in airlines, and they are sources of a new and vigorous outcry from parents, flight attendants and children’s advocacy groups who say that in-flight entertainment has become anything but family-friendly.

Critics say their anger comes as airlines, eager to cater to current tastes and acceding to more permissive standards for the entertainment media, have relaxed their rules for what they show.

Movies with R ratings are more frequently shown, though with editing, along with television reruns including sexual content, violence and other fare intended for teenagers and adults.

Because federal broadcast laws do not apply to in-flight entertainment, and because airlines need not adhere to Motion Picture Association of America ratings or television standards, parental advocacy groups have begun lobbying for change. At least one group has asked federal legislators for laws to curb violence shown on overhead screens.

Flying with children, the critics say, has become a scary experience.

“It’s almost routine now when you’re on a plane to sit there and go, ‘Whoa!’ ” said James Steyer, chief executive of Common Sense Media, which reviews entertainment products for parents. “But you’re a captive audience, and you have almost no control.”

Thomas Fine and Sara Susskind of Cambridge, Mass., recently spent two hours on a United Airlines flight distracting their 6-year-old son, Zachary, from the R-rated “Shooter,” which depicts multiple gory killings. The sound of gunshots from nearby earphones alerted Zachary to look up, Mr. Fine said. “It’s not like he can look away when he hears the sound, and he’s sitting on a plane bored, and he’s 6,” Mr. Fine said.

The airlines counter that they are trying to appeal to the widest possible audience while respecting parents’ needs, and that parents can avoid shows if they wish.

“Parents have to be responsible for the actions of their kids — whether they shouldn’t look at the screen or look away,” said Eric Kleiman, director of product marketing for Continental Airlines.

Last month, Continental featured the R-rated thriller “Fracture,” in which a character played by Anthony Hopkins shoots his wife in the face. The scene shown on the airplane is edited slightly from the version shown in theaters, though it depicts the gunshot and then blood pooling around the victim’s head.

Mr. Kleiman said the changing tenor of airline entertainment was in keeping with the changing standards of network television and other media. “Our approach is consistent with where society is going with this,” he said.

Gavin Minton, an editor with Crest Digital, which edits airline movies, said carriers might be choosing more films in which violence is core to the plot. “Movies in general are more violent,” he said. “No matter how edited it is, there will still be an aspect of it that seems violent.”

It is difficult to quantify the change in programming offered by the carriers, but there is heavy anecdotal evidence that airlines, which buy the movies of their choice from Hollywood, are breaking old barriers as they seek to improve on their shrinking list of amenities.

The Association of Flight Attendants-C.W.A., a union whose members hear complaints from parents, said that the percentage of R-rated movies had jumped in the last two years and that the observed trend was toward more graphic and violent content. Delta started showing R-rated films in December, while United and US Airways have increased the frequency with which they show such films. The three airlines also featured “Fracture” last month.

Also on overhead screens are television programs like “Monk” and “Desperate Housewives,” deemed appropriate by parental review organizations for teenagers but not for children.

Parents have noticed. “You don’t have to have ‘Leave it to Beaver’ on, but for Pete’s sake, you don’t have to have Eva Longoria seducing the high school kid on the dining room table, either,” said Timothy Winter, president of the Parents Television Council, which offers parents advice on program selections. Mr. Winter said he received weekly complaints about airline movies from parents, whereas last year he received none.

Mr. Kleiman, of Continental, said that at times there were not enough popular romantic comedies and other lighter movies to fill the available slots in his airplanes. When an airline chooses to feature R-rated movies, he said, movie studios send an uncut version to the airlines, along with a list of suggested cuts.

Jeff Crawford, who oversees the division of Warner Brothers that markets movies to airlines, said his editors “know what to do,” adding, “They’re doing it both for the airline and for TV, down the road, where we’d obviously try to tone down the graphic violence or blood.”

Nina Plotner, an account manager with Inflight Productions Inc., which works on behalf of many airlines to review and acquire films, said of the editing procedure, “If we take all the good things out, there’s not going to be a lot left to play.”

Ms. Plotner added: “If you get a complaint, you get a complaint. You can’t please everybody.”

Mr. Kleiman, of Continental, agreed, saying: “People love Pepsi, and we don’t serve that, so there you go, we just ruined their flight. That’s an accurate analogy.” Airlines said they received relatively few complaints.

The debate about suitable content in airlines comes against the backdrop of a continuing debate about movie violence in Hollywood. Researchers have determined, for example, that standards for films rated PG-13 (parental guidance suggested for those 13 and under) have become more lax in recent years, with such films often featuring violence, sexual situations and profanity that would have been R-rated (suitable for age 17 or over) a decade ago. Indeed, many airline movies cited by parents and critics have been rated PG-13, including “King Kong.”

Shari Maser of Ann Arbor, Mich., spent part of last year sitting up at night with her 7-year-old daughter, who had nightmares after seeing a preview for “King Kong” on a US Airways flight. It showed people being attacked by dinosaurs.

Researchers who study child psychology said graphic images could stay with small children well into adulthood.

“Children can have nightmares from seeing literally a few seconds of a scene from a horrible movie,” said Joanne Cantor, who taught communications at the University of Wisconsin-Madison. “Young children don’t have the cognitive ability to put the visual aside and say, ‘That’s just a movie.’ ”

Jesse Kalisher, a photographer in Chapel Hill, N.C., this spring introduced KidSafeFilms.org, a Web site on which he is gathering support for restrictions on airline films. Mr. Kalisher said 1,600 people had so far signed an online petition. He has begun lobbying federal legislators to curb violence shown in airline movies.

Airline executives said that as old planes were replaced, passengers would have personal screens with a range of children’s shows and unedited films and cable TV series, as they do on JetBlue and Virgin Atlantic. But even those systems are flawed, critics said.

Children can see the screens of people nearby, and one parent recently did not hear a JetBlue flight attendant telling passengers how to turn off the screens. When the preview for the horror film “28 Weeks Later” appeared on every screen in the aircraft, he hastily unplugged his 9-year-old daughter’s earplugs and ordered her to look away. In front of her, zombies, citizens and soldiers battled in the streets until jet fighters incinerated them.
http://www.nytimes.com/2007/09/01/us/01plane.html





For Studio Chiefs, the End of the Revolving Door?
Michael Cieply

THIS week, on Thursday to be exact, Brad Grey will be entitled to celebrate the 32-month anniversary of his appointment to the top post at Paramount Pictures.

Two years and eight months on the job normally isn’t much of an occasion. But in Mr. Grey’s case — assuming that he gets that far — it seems fair to make an exception.

For fully half of his tenure, after all, this ambitious 49-year-old has been reading that he’s already out the door as Paramount’s chairman.

A year ago this week, when his boss, Tom Freston, was fired as chief executive of Viacom, Paramount’s parent, by his own boss, Sumner M. Redstone, Mr. Grey woke to predictions that he would be next. “Many in Hollywood Expect Ouster of Studio Chief, Too,” declared The New York Times.

Two weeks before that, Mr. Grey was supposed to be on slippery ground when Mr. Redstone undercut him by tossing Tom Cruise off the lot. And only a bit earlier, BusinessWeek hinted that Mr. Grey’s standing might be damaged by his past dealings with Anthony Pellicano, the disgraced private eye to the stars. Earlier still, everybody who knows about these things detected the makings of a palace coup when David Geffen, Jeffrey Katzenberg and Steven Spielberg, having sold their DreamWorks SKG to Paramount, parked the former Universal Pictures chairwoman Stacey Snider — their ally, and whom many consider a perfect replacement for Mr. Grey — in an office on the Paramount lot.

All of which points to a real if little-noticed shift in the once notoriously deadly business culture of Hollywood. In brief, studio chiefs are a lot safer than they used to be.

The change occurred something like this:

Over the last decade or so, managers of big companies like Sony, the owner of Columbia Pictures, and the News Corporation, owner of 20th Century Fox, came to realize that the film business is less about scoring the odd hit than keeping the pipeline full of something other than losers. That happened as the DVD explosion and growing sales abroad showed that even a modest success at the box office could bring home a substantial profit.

Stability trumped brilliance. The cool of a John Calley, the longtime producer who took charge of Sony Pictures Entertainment in the period, replaced the heat of a Peter Guber, whose stormy reign preceded him. High-tension types like Michael D. Eisner and Michael S. Ovitz left the stage.

For studio chairmen, an increasingly colorless lot, the shift in values brought with it a level of job security that was only occasionally achieved a generation ago. Michael Lynton has been chairman of Sony Pictures for four years, while Tom Rothman and Jim Gianopulos have run Fox for seven. Barry M. Meyer took charge of Warner Brothers in 1999, Dick Cook of Disney’s movie group in 1996, and Ron Meyer of Universal in 1995.

In other words, they’ve been around for a while.

With his nearly three years at Paramount, Mr. Grey remains the junior member of this peer group. Yet he’s already been in place a full year longer than, say, Jon Peters, whose term in Sony’s executive suite ran about 19 months, from first rumor through the end of his gig as co-chairman.

In fact, Mr. Grey has outlasted a litany of Hollywood powers from tumultuous times past, including Dawn Steel, David Puttnam, Frank Price, Larry Gordon, Leonard Goldberg, Joe Wizan, Sidney Ganis and, of course, Mr. Ovitz, whose tenure as president of the Walt Disney Company bridged about 16 months, from August 1995 to December 1996.

Durable so far, Mr. Grey nonetheless became a lightning rod for speculation, driven in no small part by those he swept out of Paramount.

“What he had to do was not just pick movies, he had to change the culture of the studio,” Michael Shamberg, co-chairman of Double Feature Films, said of Mr. Grey’s push to move Paramount into the high-volume, high-profile mode. Mr. Shamberg, a Grey ally whose company has a deal with the studio, added, “He’s done a good job of that.”

Mr. Grey, who declined to be interviewed for this column, probably wouldn’t be cheered to know that moviedom and its many chroniclers thrill to his perceived misadventures mostly because they miss the blood sport that once came with a top executive’s fall.

But the Paramount chief, fingers ever seeming to be slipping from the edge, actually provides a spectacle.

He has enemies, including a legion of former Paramount executives who were bounced when he took charge and are now hot-wired together in a personal anti-fan club.

He has foibles, enough to keep the likes of Liz Smith and Defamer busy tracking his Oscar-night snubs and marital woes. He has that wonderful problem with the DreamWorks crowd, who voice their contentment in public but emit signals of something less.

More, Mr. Grey has to contend with Mr. Redstone, who, at the age of 84, has turned into the media world’s own Red Queen, having put relationships with Mr. Cruise and Mr. Freston and within Mr. Redstone’s own family on the block of late.

What’s not to love? With every flap of the blue Paramount flag, another tidbit slips down Melrose Avenue to Ago, where the lunch crowd can tell you who had coffee with him yesterday at the studio’s own Coffee Bean & Tea Leaf, and what that supposedly means.

For those who thrive on drama, the real danger, of course, is that things will eventually settle down. As Mr. Grey approaches the three-year mark, his pipeline — hitherto heavily dependent on DreamWorks-supplied hits like “Transformers” and “Norbit” — is beginning to fill with movies of his own.

IF “Beowulf,” from the director Robert Zemeckis (in partnership with Warner Brothers), survives the holidays, and “Iron Man,” from Jon Favreau (with Marvel Enterprises), beats the averages next May, Mr. Grey’s operation will begin to look as stable as the rest of them.

At least, that’s what his Viacom seniors are betting.

“Paramount in its illustrious history has had many studio chiefs with long tenures,” Philippe P. Dauman, Viacom’s chief executive, noted in a recent phone interview. “When history is written,” he added, “Brad will go down as a man who had one of the longest.”
http://www.nytimes.com/2007/09/02/bu...a/02steal.html





Studios Think Inside the Box as DVD Sales Slip
Thomas K. Arnold

When times in home video get tough, the industry has a way of finding a lucrative new revenue source. Now that DVD sales have flattened, a growing number of industry fingers are pointing to premium-priced gift sets of popular movies or TV shows, packaged in fancy boxes and commanding hefty price tags.

"Collector's sets are a half-billion dollar market, with revenue growing at a nearly double-digit pace," said Jeff Brown, senior vp television and family product at Warner Home Video. "Core fans of popular franchises will buy the sets if they deliver on value."

Brown points to Warner research that shows that while DVD sales overall are in a slight decline, sales of the high-end gift sets are up 7% for the year so far and expected to climb further because 72% of sales occur in the second half.

Gift sets first began popping up several years ago, with such early entries as HBO Video's complete series set of "Sex and the City," packaged like a hardbound book and listing for $300, and Universal Studios Home Entertainment's "Scarface Deluxe Gift Set" ($60), housed in a faux leather box and including such trinkets as a Tony Montoya money clip and a set of collectible lobby cards.

But lately the trend has accelerated, with handsomely boxed complete series sets of such popular TV series as "Friends," "M*A*S*H" and "The West Wing," as well as elegant movie gift sets like the complete collection of "Superman" movies that comes in a tin case along with a reproduction of a vintage Superman comic book and a mail-in offer for five movie posters. All 125,000 copies of the "Superman" tin sold out.

Warner has done so well with its gift sets that it is picking up the pace this year, offering no fewer than 14 sets before Christmas. On the TV side, the studio has complete series sets of such shows as "Gilmore Girls" (coming November 13 for $260), "The O.C." (due November 27 at $200) and "Full House" (hitting stores November 6 at $170), the latter packaged in a replica of the sitcom's trademark row house.

On the movie side, highlights include a five-disc collector's edition of "Blade Runner" packaged in a gray metal briefcase ($79) and a boxed set of all five "Harry Potter" movies so far, which comes in a suitcase and includes five collectible silver-plated bookmarks, available exclusively with the DVD. The "Potter" set will be available on DVD ($119) as well as both next-generation formats, Blu-ray Disc and HD DVD ($149).
http://www.reuters.com/article/indus...24927820070808





High-Speed Video Store in the Living Room
David Pogue

If you had to make a master list of all the world’s problems, “limited access to movies” probably wouldn’t appear until Page 273,996.

Truth is, life is teeming with opportunities to see movies: movie theaters, video stores, DVD-by-mail services, TV movie channels, pay-per-view, video-on-demand, Xbox 360, iTunes, Internet downloads, hotel rooms, airplanes and so on.

But according to the team at Vudu, all of those outlets are flawed.

Video stores: you have to drive back and forth, and the movie you want might be out of stock. Netflix and Blockbuster by mail: you have to wait a day or two for each movie to arrive. Pay-per-view, video-on-demand, Xbox, iTunes and hotel rooms: puny movie selections. Internet downloads: they arrive on your computer, not your TV.

Vudu’s new $400 movie box, to be available at month’s end, has none of those problems. It’s a little black box (about 7 by 9 by 2 inches) that connects to your TV and to the Internet through a high-speed link — and it comes darned close to putting a video store in your house. Its built-in hard drive permits your choice of 5,000 movies to begin playing instantaneously. There’s no computer involved, no waiting and no monthly fee.

There are four really great things about the Vudu box. First, the picture quality is terrific — like a DVD. If you have an HDTV, the box even “upconverts” the picture into pseudo-high definition. Moreover, Vudu will offer movies in true high definition once it finishes negotiating with the movie studios. (Tech note: The Vudu box will play high-def movies through its HDMI connector only — not its component, S-video or composite jacks.)

Second, the remote rocks. It has only four buttons, plus a clickable scroll wheel like the one on a computer mouse. The wheel is a breakthrough; it lets you zoom through lists of movies and categories. During playback, the wheel is a rewind/fast-forward shuttle control. It lets you jump almost instantly to any spot in the movie; it does not, however, actually “seek” — that is, speed up playback while you’re scanning for a certain scene.

The remote is not illuminated, but it doesn’t have to be; if you cannot memorize the four buttons in five minutes, you have bigger problems.

Third, you pay by the movie, not by the month. When life gets busy, you don’t pay anything. You can either rent a movie (usually $2 to $4) — you have 24 hours to finish watching it — or you can buy it ($15 to $20), meaning that it stays on your Vudu hard drive forever.

The 250-gigabyte drive holds 100 full-length movies. In about six months, Vudu plans to activate the box’s U.S.B. jack, so you can attach another hard drive to hold more movies.

Finally, Vudu movies begin playing instantly. There’s nothing to it. Find a movie, either by typing part of its name or by browsing the New Releases, Genres, Staff Favorites or Most Popular lists. Click past the price/confirmation screen. Start watching.

How can one hard drive hold 5,000 movies? This is the best part: it doesn’t. It actually holds only the first 30 seconds of each movie — typically the movie studio logos. While you watch that, the rest of the movie quietly begins to download; the handoff from the starter stub to the downloaded portion is undetectable.

This impressive engineering feat also explains two other quirks of the Vudu box. First, you cannot fast-forward into a movie that just started. Second, you cannot use the Vudu box without a fast Internet connection — preferably a wired one. Cable modems are great, but basic D.S.L. and dial-up connections are not fast enough. Higher-tier D.S.L. plans might have the required speed; a speed-testing button appears at Vudu.com.

(Here’s another clever backstage tech trick: the Vudu boxes communicate with one another, using a peer-to-peer system. When you start watching, say, “The Last Mimzy,” your box receives chunks of that movie from the Vudu boxes of other people who have already downloaded it. None of this affects you one bit — it’s all invisible to you — but it’s a pretty clever way for Vudu, the company, to save money, since it does not have to pay for its own servers to pump out those gazillions of gigabytes.)

The box itself runs cool, it is totally silent, and its remote uses radio waves rather than infrared. That way, you can put the box in a closet; it does not require line-of-sight with the remote. That’s lucky, because the box’s oddball size and shape mean it does not stack well with standard DVD players, VCRs and so on.

The catalog of movies is updated with 10 or 20 new titles each week, and an equivalent number is retired. Since you always have 5,000 to choose from — Vudu plans to expand the list to 10,000 — the odds are excellent that when you’re in a movie mood, you will find something you like. The movies come from every major Hollywood studio, plus a healthy number of independents.

But if you look for one particular movie, you might sometimes be disappointed.

One reason: plenty of the movies are pure filler. They range from no-name horror cheapies (“San Franpsycho” or “Night Fangs,” anyone?) to superniche flicks like “The History of Texas Longhorns Football” and “Yoga for Depression and Gastro-Intestinal Disorders.”

Another reason: Vudu’s catalog is a victim of what Hollywood calls distribution windows. After a movie leaves theaters, it becomes available through other channels in a strict order: (1) hotels and airlines; (2) DVD; (3) pay-per-view television; (4) movie channels like HBO and Starz; (5) TV and everywhere else.

Vudu, as it turns out, gets movies during Phases 2, 3 and 5. Weirdly, that means that a movie might appear on your box, disappear during the HBO window and reappear a year later.

Maybe that’s why the Vudu box, at introduction, has 41 out of 50 movies on Formovies.com’s current Top Rentals list (it has “300” and “Blades of Glory”), but only 10 out of the 50 on Moviefone’s “Best of 2006” list (it is missing “Dreamgirls,” “The Departed” and so on).

Vudu’s dependence on the notoriously conservative, profit-driven movie studios also explains many of its frustrating inconsistencies. Some Vudu movies are available for purchase or rent; others, only for purchase. Some movies have previews (movie trailers); others do not. The list includes hundreds of movies from some studios (Paramount, Sony, Warner) and only a handful from others (Disney).

While we’re nit-picking, it’s worth noting that Vudu offers no DVD extras — deleted scenes, subtitles and so on. Be prepared, too, for a less obvious loss: serendipity. With other movie sources, the limited selection or the wait for the mail carrier can provide a moment of happy surprise when you find something good or open the mailing envelope. Vudu is more like shooting fish in a barrel.

If Vudu sounds familiar, by the way, that might be because of its similarity to MovieBeam, which has been around for a couple of years. MovieBeam’s hard drive contains only 100 movies at a time, but it costs only $150 and does not require an Internet connection (its movies are beamed through the air).

Vudu is clearly a more high-end offering, which may be why it will be initially sold only through www.vudu.com, Amazon.com and home-theater retail stores.

Vudu is a clear win if you, like 30 million other Americans, make several trips to the video store each month. It’s also great if you like pay-per-view but wish you had a better selection. Vudu may not be a Netflix killer, though, unless you think Vudu’s instant access is more important than Netflix’s much larger selection (more than 70,000 movies).

If you do do Vudu, with the time you would have spent driving to the video store or waiting for the mailman, you can do other things — like solving the world’s more pressing problems.
http://www.nytimes.com/2007/09/06/te...ogue.html?8dpc





Toshiba Leads Industry in Bringing Discrete Track Recording Technology to Prototype of 120GB Hard Disk Drive

New technology boosts recording density on an 80GB 1.8 inch single platter drive by 50%
Press Release

Toshiba Corporation today announced a prototype hard disk drive (HDD) that uses Discrete Track Recording (DTR) technology to boost capacity to a record-breaking 120 gigabytes (GB) on a single 1.8-inch platter. The drive is the first in the world to apply DTR, a breakthrough technology that boost the areal density of a perpendicular magnetic recording (PMR) by a full 50 percent. Toshiba plans to start mass production of HDDs integrating DTR technology in 2009.

DTR technology increases recording density by forming a "groove" between the tracks on the PMR medium. The groove reduces signal interference between adjacent data tracks, allowing the pitch of the tracks to be shortened. The improved signal quality also contributes to raising the recording density by 50 percent.

The DTR "groove" forming process is most easily applied to small form factor HDDs, such as 1.8 inch and 2.5 inch drives. It will take these drives to a new level of enhanced capacity.

DTR technology utilizes an electron beam lithography system developed in research related to the "Nanometer-Scale Optical High Density Disk Storage System", a national project supported by Japan's New Energy and Industrial Technology Development Organization (NEDO). http://www.newswire.ca/en/releases/a.../06/c5819.html





Years After Completion, a Persistent Film Makes It to the Screen
David M. Halbfinger

Anton Yelchin’s voice was still changing when, at barely 15 years old, he starred alongside Diane Lane and Donald Sutherland in “Fierce People,” an offbeat, surprisingly dark coming-of-age movie that Griffin Dunne directed in the spring of 2004.

Three and a half years later Mr. Yelchin, 18, is preparing to play his first grown-up — as Pavel Chekov in J. J. Abrams’s updating of “Star Trek” — and “Fierce People” is finally headed for theaters, opening Friday in New York and Los Angeles under the new label of Autonomous Films, a sister company of Lionsgate.

That a film with such a pedigree could sit on the shelf for so long (it’s already available on DVD in Argentina, Finland, Greece and Hungary) is one of the vagaries of a business in which too many movies from too many distributors are vying for too few weekends, good ones that are released theatrically often fail to attract an audience, and countless others go straight to video.

That “Fierce People” did not ultimately get tossed in the celluloid waste bin is a testament both to the persistence of its backers — among them the No. 2 executive at Lionsgate — and to the importance to a film’s marketing of not just money but attention.

The story began, inauspiciously enough, several years ago when Dirk Wittenborn, a New York author, ran into writer’s block and showed an unfinished novel to Mr. Dunne, a friend.

“He had written himself into a hole,” recalled Mr. Dunne, who is best known for his acting roles, including a leading role in Martin Scorsese’s “After Hours.” “I said, ‘How does it end?’ And he said, ‘That’s why I gave it to you.’ ”

But Mr. Dunne said he was so taken with the tale — an East Village 15-year-old and his drug-addled mother, circa 1978, are taken in by an aristocratic crowd in rural New Jersey — that he optioned the movie rights to what became “Fierce People” even before the book’s publication by Bloomsbury in 2002. (Both the movie and the book draw parallels between the boy’s new patrons and the primitive tribe whom his absent father, a scientist, has made his life’s work.)

Lionsgate agreed to an $8 million budget, and Ms. Lane, whom Mr. Dunne said he had long envisioned for the mother’s role, quickly accepted. He shot the movie in British Columbia, and included some 16-millimeter footage supposedly of an anthropological study in the Amazon.

Lionsgate announced a Christmas 2004 release for “Fierce People.” But it was soon abandoned, the first of half a dozen delays, and that inevitably generated bad buzz despite mixed-to-strong reviews after the movie’s premiere at the Tribeca Film Festival in April 2005.

Mr. Dunne said the movie posed a conundrum for its marketers. “We always knew there was tough subject matter in this,” he said. “It doesn’t play like an obscure, obtuse art house picture. It’s quite a commercial and involving, populist approach. But it’s also a social commentary, with anthropological metaphors, and it’s got a climactic, rather brutal attack that changes the tone of the picture. That’s something that appeals to me, but it’s also a challenge from a marketing standpoint.”

Michael Burns, the vice chairman of Lionsgate and a friend of Mr. Dunne’s who shepherded the movie, praised its sharp turn. “You get a little sick of predictability,” he said. “Nobody sees that coming.”

But he agreed that it posed a “very tricky” distribution challenge. “In a weird way the question is whether it’s a wide or a platform release,” Mr. Burns said, using the industry jargon for opening movies in either one large burst or slowly building the number of theaters as word of mouth spreads. “It’s always more difficult for us to focus on platform releases. It’s just not our core business anymore.”

Adding to the worry was that Lionsgate was still smarting from having spent heavily to market several other narrative dramas — “Shattered Glass” in 2003, “Happy Endings” and “Hard Candy” in 2005 — all of which received critical acclaim while taking a bath at the box office. What was needed was a partner who could afford to focus on a movie as small as “Fierce People,” Mr. Burns said. “When you gear up to release a movie in a platform way, you spend just as much time on it as you would on a wide release,” he said.

That partner emerged a year ago, when Lionsgate cut a new distribution deal with Courtney Solomon and Allan Zeman of After Dark Films. Though already notorious for the explicit marketing campaign earlier this year surrounding the torture film “Captivity,” Mr. Solomon said he wanted to model his company after Miramax, releasing more mainstream films under the Autonomous name and horror movies under After Dark.

Mr. Solomon said the deal he struck for “Fierce People” required him to put up less than $2 million toward prints and advertising, which he will recoup from box-office proceeds before Lionsgate is reimbursed for its costs; any profits will be shared 50-50. Lionsgate, which previously sold off the rights in some international markets, will get the proceeds from home video and other markets. Mr. Solomon in turn gets to start his Autonomous Films label for relatively little. For the filmmaker and stars, meanwhile, seeing “Fierce People” at its Los Angeles premiere last week was its own weird trip back in time. Ms. Lane, Mr. Sutherland, Mr. Yelchin and Elizabeth Perkins, who also stars in the film, all attended, and Mr. Dunne brimmed over with relief.

“It’s like that line of Ronald Reagan’s in ‘Kings Row,’ when he wakes up without his legs and says, ‘Where’s the rest of me?’ ” Mr. Dunne said. “I’ve been saying, ‘Where’s the rest of me?’ for the last two years.”
http://www.nytimes.com/2007/09/06/movies/06fier.html





V.6

New "Blade Runner" Cut is "How it Should Have Been"
Silvia Aloisi



Twenty-five years after "Blade Runner" was panned by critics and pulled from theaters, British director Ridley Scott savors revenge with the final cut of the science-fiction film now considered a cult classic.

Presenting the new version of what he considers his most accomplished movie, Scott recalled the difficulties he had when he first pitched the work to Hollywood.

"I was a new kid on the block in Hollywood, so driving to those studios every day was a magical mystery tour. But it was hard, the whole process of making the movie became quite difficult," he told reporters at the Venice film festival after a press screening.

"I wasn't used at that point in my career to having too many cooks in the kitchen, and I think there were many people who started to get involved.

"So out of it came a hybrid version of what I'd originally intended. Consequently ... we had a bad opening, bad previews, confused previews. I was killed by some critics ... then I thought it would be gone away for ever," Scott said.

The futuristic thriller is set in the year 2019 and follows policeman Deckard (Harrison Ford), a "blade runner" trying to catch and kill four human replicants who have escaped from a space-based colony.

The response at early sample screenings before the official release in June 1982 was so weak that the producers forced Scott to add voice-overs to the film and change the final scene to make it a more "happy ending".

"I thought I'd really nailed it, I really thought I'd nailed it. And the person I used to show it to was my brother (director Tony Scott). And my brother, he loved it so much. Then we preview, and the previews are really, really bad, and my confidence is really dented," said Scott.

The reworking of the film led to "voice overs which started to explain what was about to happen, who the characters were and who was going to do what to who, which is the antithesis of a good movie making process," he said.

Cult Movie

Despite the changes and two Oscar nominations, bad reviews and the almost simultaneous release of Steven Spielberg's hugely popular "E.T." ended the theater run of "Blade Runner" prematurely.

Yet the film eventually achieved cult status through re-issue on television and home video.

Scott, 69, said he had almost forgotten about it until he saw clips on music television channel MTV and realized that his film "was having a strong influence on younger generations."

Over the years, five versions of the film have been released, including a director's cut in 1992. But Scott said the "Final Cut" -- which will be issued as a collector's DVD edition later in the winter -- was "really as it was intended to be."

"A good film is like a good book, you might go to the shelf and take it off and revisit it. There are not a lot of films I can do that with from my collection of material," said Scott, whose other titles include international hits such as the first "Alien," "Thelma & Louise" and "Gladiator."

At present, Scott is working on "Body Of Lies," one of several Hollywood movies on the war in Iraq due for release in the next few months. But he said he would like to make another science fiction film.

"I am continuously looking for that so if anyone has got a science fiction script in their briefcase, give it to me."
http://www.reuters.com/article/enter...26047520070902





KTLA-TV's Iconic Home in Hollywood Goes on the Block

The Tribune property, where the first talking motion picture was filmed in 1927, also houses production facilities.
Roger Vincent

The historic former Warner Bros. studio on Sunset Boulevard, now occupied by television station KTLA-TV Channel 5, has been put up for sale by Tribune Co. amid a wave of high-stakes real estate investment in Hollywood.

No price has been set for the block-size property at the southeast corner of Sunset and Bronson Avenue that also houses Tribune Entertainment and Tribune Studios. In recent years, other studios and historic properties in the neighborhood have sold for millions of dollars as investors race to take part in Hollywood's resurgence.

A real estate expert who asked not to be identified because he may become involved in the bidding process valued the property at about $175 million. Nearby Sunset-Gower Studios, the former Columbia Pictures headquarters, sold this month for more than $200 million.

KTLA occupies the prominent Colonial-style mansion facing Sunset that was built by Warner Bros. in 1919.

City officials expressed hope that the property would remain entertainment industry-oriented. Several historic properties in Hollywood are being turned into condos, apartments and shops.

Television shows filmed at Tribune's production facilities on the property -- but separate from KTLA -- include "Judge Judy," "Judge Joe Brown" and "Hannah Montana."

Chicago-based Tribune, which also owns the Los Angeles Times, has retained real estate brokerage Cushman & Wakefield "to explore strategic alternatives for the property," said Gary Weitman, a Tribune spokesman.

Even after a sale, KTLA would remain at its current location as a tenant for an indefinite period, said Carl Muhlstein, a Cushman & Wakefield broker. "They hope to start planning for a new facility either somewhere else on the site or nearby. KTLA has a long-term commitment to Hollywood."

KTLA needs to update its facilities, General Manager Vinnie Malcolm said. "We have been working around a lot of not-very-efficient uses of space. There is no question we could use a better physical plant."

Tribune is moving quickly to sell the property by year-end, Muhlstein said. That could coincide with the company's pending $8.4-billion buyout by Chicago real estate magnate Sam Zell, expected to close in the fourth quarter.

A representative for City Councilman Eric Garcetti said the councilman hoped the property would continue to be a hub for entertainment businesses.

Garcetti "looks forward to having a continuing conversation with the new owners to ensure that we keep vital entertainment-related jobs right here in Hollywood," said David Gershwin, the councilman's chief of staff.

"This stretch of Sunset Boulevard and its surrounding neighborhoods have a critical mass of post-production facilities, entertainment venues and cultural institutions that makes this a prime location for film and television production in the years ahead," Gershwin said.

The Colonial-style building and a sound stage on the former Warner Bros. lot are registered historic properties, Gershwin said, and could not be demolished or substantially altered.

The studio, situated just west of the Hollywood Freeway, was the site of Warner Bros.' first studio. It is where talking pictures were born when Al Jolson recorded his first words in "The Jazz Singer" in 1927. In later years, Warner used the site to produce musicals and dramas.

Paramount Pictures Corp. purchased the studio in 1954 as an annex to its studios a few blocks to the south at Van Ness and Melrose avenues. In 1956, KTLA, then owned by Paramount, moved onto the lot, according to KTLA. Cowboy star Gene Autry bought KTLA and the studio from Paramount in 1964. It was sold to Tribune Broadcasting in 1986.

The site, which includes about 10 sound stages, has plenty of room for expansion, broker Muhlstein said. He predicted that a buyer would add more film and television production buildings and office space. There is little vacant office space in Hollywood, and Technicolor Inc. agreed months ago to rent an entire six-story office building under construction at Sunset-Gower Studios.

Other studio space has been taken off the market, creating a shortage of facilities, Muhlstein said. In recent years, about 70 acres' worth of production facilities such as KTTV's Metromedia Square, KCOP Studios and CBS Columbia Square have been closed to make way for residential and commercial redevelopment, Muhlstein said.

KTLA "is the only active television lot left in Hollywood," City Councilman Tom LaBonge said during a phone call from Ireland. "I hope Channel 5's beacon still stands brightly there as an active television production center. It's so much a part of Hollywood."

Hollywood's largest commercial landlord, CIM Group, will be among those evaluating the property, said Shaul Kuba, a company principal. "We are definitely going to be very interested."

The site is potentially big enough to accommodate studio production, housing, office and retail uses, he said, "but it would require a huge amount of planning to find the right balance."

The site will be marketed to large potential buyers such as CIM Group that are capable of closing the deal by year-end, said broker Michael DeSantis, also of Cushman & Wakefield.
http://www.latimes.com/entertainment...ck=2&cset=true





Cold War Bunker Now Shelters Archive

A Virginia facility that once held $3 billion in cash will protect the world's biggest audiovisual collection.
Susan Decker

"Casablanca" and "Gone With the Wind" are finding refuge in a Cold War-era bunker near Virginia's Shenandoah Valley.

The original negatives of those classic films are part of the world's biggest audiovisual collection, held by the Library of Congress.

Their new home is a radiation-hardened building once used by the Federal Reserve to store cash and emergency supplies in the event of a nuclear attack.

Archivists are filling the facility with more than 6 million items -- films, audio recordings, television shows, posters, screenplays and musical scores -- gathered from storage sites across the United States. They're on the lookout for treasures such as the recently unearthed 1957 Carnegie Hall concert by Thelonius Monk and John Coltrane and the uncensored version of the 1933 Barbara Stanwyck film "Baby Face."

"I'm rediscovering film history through material that's been unseen for decades," said Gregory Lukow, chief of the library's motion picture, broadcasting and recorded sound division.

By January, the National Audio-Visual Conservation Center will open to scholars for research. Its 45-acre campus sits aside Pony Mountain near Culpeper, an hour's drive southwest of Washington.

The audiovisual collection holds copies of the first films ever made, including "The Great Train Robbery" in 1903. It has kinescopes of the earliest black-and-white television shows of comedians such as Milton Berle and Ernie Kovacs; copies of every U.S. movie produced since 1940 and many before that, and radio broadcasts of historic events such as troops landing on Guam in World War II.

"This facility will allow us to preserve them and make them accessible to the public at a faster rate than ever before," Lukow said.

Only a portion of the 420,000-square-foot facility will be open to everyone: an entry hall with exhibition area and a 208-seat Art Deco movie theater, which has a replica of an old Wurlitzer organ to play the soundtracks for silent films.

Nonprofessionals may gain access to the collection at the library's 21 reading rooms on Capitol Hill and via the Internet. New technology is being used to convert artifacts to digital form.

"We have a lot of things here that really help us to preserve this material for future generations," said Mike Mashon, head of the library's moving-image unit.

For sound recordings, the facility has a turntable developed at Lawrence Berkeley National Laboratory that uses optical images to read deep into the grooves of LPs and 78s, even ones that are warped or broken.

Some items, such as Thomas Edison's first film, a seven-second short from 1894 known as "Fred Ott's Sneeze," will remain in Washington at the Library of Congress, the world's largest repository of books, recordings, photographs and maps.

The setting for the audiovisual collection, Culpeper, is a 248-year-old town of 13,000 where Confederate and Union troops camped. Thousands of tourists visit its Civil War sites each week.

The Federal Reserve built its underground shelter in Culpeper in 1969 to house $3 billion in coin and currency, to pump into the economy if the U.S. underwent a nuclear attack. The bunker was decommissioned in 1993.

The building was sold to the Packard Humanities Institute, a nonprofit group run by David Woodley Packard, son of the founder of Hewlett-Packard Co.

The institute spent $155 million to convert it into a storage area for the National Audio-Visual Conservation Center. The group then returned the building to the government -- the biggest gift to the legislative branch in American history, Lukow said.
http://www.latimes.com/entertainment...,1436370.story





Even if You Do Great Art, the Bills Must Still Be Paid
Matt Zoller Seitz

The talking-heads-with-clips format so dominates the contemporary nonfiction film that Daniel Kraus’s “Musician” feels radically fresh: It simply observes its title character, the avant-garde jazz musician Ken Vandermark, in the manner of a 1960s fly-on-the-wall documentary like “Salesman.”

“Musician” is a follow-up to Mr. Kraus’s similarly austere “Sheriff” and the latest in a projected series of features about people doing their jobs, shot and edited with the same inquisitive spirit that defined Studs Terkel’s oral history “Working.”

We are introduced to Mr. Vandermark as he toils on a new composition at his workshop in the basement of his Chicago home, and watch him scratch out phrases on paper, then test them on saxophone and piano. We see him perform for various audiences; hear him explain his optimistic but uncompromising theory that atonal music suits the tone of modern life; and listen in as he figures out how he’s going to maintain his artistic integrity while making the rent.

In one early scene the director splits the screen to show Mr. Vandermark working the phone in his home office, effusively thanking a patron for a gig, and then sheepishly informing a creditor that he won’t be able to settle up until next month. Those seeking a nutshell definition of what it means to be a committed artist need look no further.

MUSICIAN

Opens today in Manhattan.

Directed and edited by Daniel Kraus; director of photography, Mr. Kraus; music by Ken Vandermark; produced by Jason Davis and Mr. Kraus; released by Sheriffmovie. At the Two Boots Pioneer Theater, 155 East Third Street, at Avenue A, East Village. Running time: 60 minutes. This film is not rated.
http://movies.nytimes.com/2007/09/05/movies/05musi.html





Seeking Special Someone but Finding a Giant Pirate
Matt Zoller Seitz

Imagine Larry David’s HBO’s series, “Curb Your Enthusiasm,” without the bile. That’s the tone of “I Want Someone to Eat Cheese With,” the rambling debut feature by Jeff Garlin, a “Curb” regular and one of its executive producers.

Mr. Garlin wrote, directed and stars in this feature, playing James Aaron, a veteran of the Second City improv troupe in Chicago who still lives with his mother (Mina Kolb). He fidgets through Overeaters Anonymous meetings, turns down auditions arranged by his impatient agent (Richard Kind), obsesses over landing the lead in a remake of his favorite movie, “Marty,” and gads about town with his best friend and partner in sarcasm, Luca (David Pasquesi).

He also develops a mild crush on a droll, jazz-loving teacher (Bonnie Hunt) and falls hard for a shockingly funny ice cream parlor employee (Sarah Silverman).

But James’s inevitable personal growth takes a back seat to Mr. Garlin’s digressive sense of humor. The movie carves out space for a late-night candy-hunting trip to a drugstore (where James sees a successful but pompous and neurotic colleague, brilliantly played by Wallace Langham) and a hilarious encounter with another fellow actor (the reliably excellent Joey Slotnick), who is handing out free hot dog samples while wearing a pirate outfit with a huge papier-mâché head.

Laid back and affectionate, “Cheese” is the movie version of a dear friend you could spend all day with.

I WANT SOMEONE TO EAT CHEESE WITH

Opens today in Manhattan; also on Video on Demand.

Written and directed by Jeff Garlin; director of photography, Peter Biagi; edited by Steven Rasch; music by Rob Kolson; production designer, Margaret M. Miles; produced by Mr. Garlin, Erin O’Malley and Steve Pink; released by IFC First Take and the Weinstein Company. At the IFC Center, 323 Avenue of the Americas, at Third Street, Greenwich Village. Running time: 80 minutes. This film is not rated.

WITH: Jeff Garlin (James Aaron), Sarah Silverman (Beth), Bonnie Hunt (Stella Lewis), Amy Sedaris (Ms. Clark), David Pasquesi (Luca), Gina Gershon (Mrs. Piletti), Mina Kolb (Mrs. Aaron), Wallace Langham (Claude Cochet), Joey Slotnick (Larry) and Richard Kind (Herb Hope).
http://movies.nytimes.com/2007/09/05/movies/05chee.html





Doctor Links a Man’s Illness to a Microwave Popcorn Habit
Gardiner Harris

A fondness for microwave buttered popcorn may have led a 53-year-old Colorado man to develop a serious lung condition that until now has been found only in people working in popcorn plants.

Lung specialists and even a top industry official say the case, the first of its kind, raises serious concerns about the safety of microwave butter-flavored popcorn.

“We’ve all been working on the workplace safety side of this, but the potential for consumer exposure is very concerning,” said John B. Hallagan, general counsel for the Flavor and Extract Manufacturers Association of the United States, a trade association of companies that make butter flavorings for popcorn producers. “Are there other cases out there? There could be.”

A spokeswoman for the Food and Drug Administration said that the agency was considering the case as part of a review of the safety of diacetyl, which adds the buttery taste to many microwave popcorns, including Orville Redenbacher and Act II.

Producers of microwave popcorn said their products were safe.

“We’re incredibly interested in learning more about this case. However, we are confident that our product is safe for consumers’ normal everyday use in the home,” said Stephanie Childs, a spokeswoman for ConAgra Foods, the nation’s largest maker of microwave popcorn.

Ms. Childs said ConAgra planned to remove diacetyl from its microwave popcorn products “in the near future.”

Pop Weaver, another large microwave popcorn producer, has already taken diacetyl out of its popcorn bags “because of consumer concerns” but not because the company believes the chemical is unsafe for consumers, said Cathy Yingling, a company spokeswoman.

The case will most likely accelerate calls on Capitol Hill for the Bush administration to crack down on the use of diacetyl. The Occupational Safety and Health Administration has been criticized as doing little to protect workers in popcorn plants despite years of studying the issue.

“The government is not doing anything,” said Representative Rosa DeLauro, a Connecticut Democrat who leads a subcommittee with jurisdiction over the food and drug agency’s budget.

Exposure to synthetic butter in food production and flavoring plants has been linked to hundreds of cases of workers whose lungs have been damaged or destroyed. Diacetyl is found naturally in milk, cheese, butter and other products.

Heated diacetyl becomes a vapor and, when inhaled over a long period of time, seems to lead the small airways in the lungs to become swollen and scarred. Sufferers can breathe in deeply, but they have difficulty exhaling. The severe form of the disease is called bronchiolitis obliterans or “popcorn workers’ lung,” which can be fatal.

Dr. Cecile Rose, director of the occupational disease clinical programs at National Jewish Medical and Research Center in Denver, said that she first saw the Colorado man in February after another doctor could not figure out what was causing his distress. Dr. Rose described the case in a recent letter to government agencies.

A furniture salesman, the man was becoming increasingly short of breath. He had never smoked and was overweight. His illness had been diagnosed as hypersensitivity pneumonitis, an inflammation of the lungs usually caused by chronic exposure to bacteria, mold or dust. Farmers and bird enthusiasts are frequent sufferers.

But nothing in the Colorado man’s history suggested that he was breathing in excessive amounts of mold or bird droppings, Dr. Rose said. She has consulted to flavorings manufacturers for years about “popcorn workers’ lung,” and said that something about the man’s tests appeared similar to those of the workers.

“I said to him, ‘This is a very weird question, but bear with me. But are you around a lot of popcorn?’ ” Dr. Rose asked. “His jaw dropped and he said, ‘How could you possibly know that about me? I am Mr. Popcorn. I love popcorn.’ ”

The man told Dr. Rose that he had eaten microwave popcorn at least twice a day for more than 10 years.

“When he broke open the bags, after the steam came out, he would often inhale the fragrance because he liked it so much,” Dr. Rose said. “That’s heated diacetyl, which we know from the workers’ studies is the highest risk.”

Dr. Rose measured levels of diacetyl in the man’s home after he made popcorn and found levels of the chemical were similar to those in microwave popcorn plants. She asked the man to stop eating microwave popcorn.

“He was really upset that he couldn’t have it anymore,” Dr. Rose said. “But he complied.”

Six months later, the man has lost 50 pounds and his lung function has not only stopped deteriorating but has actually improved slightly, Dr. Rose said.

“This is not a definitive causal link, but it raises a lot of questions and supports the recommendation that more work needs to be done,” Dr. Rose said.
http://www.nytimes.com/2007/09/05/us/05popcorn.html





Some Food Additives Raise Hyperactivity, Study Finds
Elisabeth Rosenthal

Common food additives and colorings can increase hyperactive behavior in a broad range of children, a study being released today found.

It was the first time researchers conclusively and scientifically confirmed a link that had long been suspected by many parents. Numerous support groups for attention deficit hyperactivity disorder have for years recommended removing such ingredients from diets, although experts have continued to debate the evidence.

But the new, carefully controlled study shows that some artificial additives increase hyperactivity and decrease attention span in a wide range of children, not just those for whom overactivity has been diagnosed as a learning problem.

The new research, which was financed by Britain’s Food Standards Agency and published online by the British medical journal The Lancet, presents regulators with a number of issues: Should foods containing preservatives and artificial colors carry warning labels? Should some additives be prohibited entirely? Should school cafeterias remove foods with additives?

After all, the researchers note that overactivity makes learning more difficult for children.

“A mix of additives commonly found in children’s foods increases the mean level of hyperactivity,” wrote the researchers, led by Jim Stevenson, a professor of psychology at the University of Southampton. “The finding lends strong support for the case that food additives exacerbate hyperactive behaviors (inattention, impulsivity and overactivity) at least into middle childhood.”

In response to the study, the Food Standards Agency advised parents to monitor their children’s activity and, if they noted a marked change with food containing additives, to adjust their diets accordingly, eliminating artificial colors and preservatives.
But Professor Stevenson said it was premature to go further. “We’ve set up an issue that needs more exploration,” he said in a telephone interview.

In response to the study, some pediatricians cautioned that a diet without artificial colors and preservatives might cause other problems for children.

“Even if it shows some increase in hyperactivity, is it clinically significant and does it impact the child’s life?” said Dr. Thomas Spencer, a specialist in Pediatric Psychopharmacology at Massachusetts General Hospital.

“Is it powerful enough that you want to ostracize your kid? It is very socially impacting if children can’t eat the things that their friends do.”

Still, Dr. Spencer called the advice of the British food agency “sensible,” noting that some children may be “supersensitive to additives” just as some people are more sensitive to caffeine.

The Lancet study focused on a variety of food colorings and on sodium benzoate, a common preservative. The researchers note that removing this preservative from food could cause problems in itself by increasing spoilage. In the six-week trial, researchers gave a randomly selected group of several hundred 3-year-olds and of 8- and 9-year-olds drinks with additives — colors and sodium benzoate — that mimicked the mix in children’s drinks that are commercially available. The dose of additives consumed was equivalent to that in one or two servings of candy a day, the researchers said. Their diet was otherwise controlled to avoid other sources of the additives.

A control group was given an additive-free placebo drink that looked and tasted the same.

All of the children were evaluated for inattention and hyperactivity by parents, teachers (for school-age children) and through a computer test. Neither the researchers nor the subject knew which drink any of the children had consumed.

The researchers discovered that children in both age groups were significantly more hyperactive and that they had shorter attention spans if they had consumed the drink containing the additives. The study did not try to link specific consumption with specific behaviors. The study’s authors noted that other research suggested that the hyperactivity could increase in as little as an hour after artificial additives were consumed.

The Lancet study could not determine which of the additives caused the poor performances because all the children received a mix. “This was a very complicated study, and it will take an even more complicated study to figure out which components caused the effect,” Professor Stevenson said.
http://www.nytimes.com/2007/09/06/he...h/06hyper.html





Childhood TV Viewing Linked to Teen Attention Problems

Watching television more than two hours a day early in life can lead to attention problems later in adolescence, according to a large long-term study.

The roughly 40% increase in attention problems among "heavy" TV viewers was observed in both boys and girls, and was independent of whether a diagnosis of attention deficit/hyperactivity disorder was made prior to adolescence.

"Those who watched more than two hours, and particularly those who watched more than three hours, of television per day during childhood had above-average symptoms of attention problems in adolescence," Erik Landhuis of the University of Otago in Dunedin, New Zealand, wrote in his report, published in Pediatrics on Tuesday.

Symptoms of attention problems included short attention span, poor concentration, and being easily distracted. The findings could not be explained by early-life attention difficulties, socio-economic factors, or intelligence, says the team.

"This latest study adds to the growing body of evidence that suggests parents should take steps to limit the amount of TV their children watch," adds Bob Hancox, one of the researchers.

Mundane reality

The team studied the long-term habits and behaviours of more than 1000 children born in Dunedin, between April 1972 and March 1973. The children aged 5 to 11 watched an average of 2.05 hours of weekday television. From age 13 to 15, time spent in front of the television rose to an average of 3.1 hours a day.

Young children who watched a lot of television were more likely to continue the habit as they got older, but even if they did not, the damage was done, the study said.

"This suggests that the effects of childhood viewing on attention may be long lasting," Landhuis notes. He offers several possible explanations for the association.

One is that the rapid scene changes common to many TV programs may overstimulate the developing brain of a young child, and could make reality seem boring by comparison.

"Hence, children who watch a lot of television may become less tolerant of slower-paced and more mundane tasks, such as school work," he writes.
Net effects

It is also possible that TV viewing may supplant other activities that promote concentration, such as reading, games, sports and play, he says. The lack of participation inherent in TV watching might also condition children when it comes to other activities.

The study is not proof that TV viewing causes attention problems, Landhuis notes, because it may be that children prone to attention problems may be drawn to watching television. "However, our results show that the net effect of television seems to be adverse."

Previous studies have linked the sedentary habit of TV watching among children to obesity and diabetes, amongst other public health issues, see Childhood TV and gaming is 'major public health issue).
http://technology.newscientist.com/a...ine-news_rss20





Rumors

North Korea Cracks Down on 'Korean Wave' of Illicit TV

Authorities in North Korea are intensifying a crackdown on imports of South Korean popular culture, especially television dramas, but the South’s “Korean Wave” may already have taken a strong hold in the isolated Stalinist state.

South Korean music, soap operas, and movies have already taken the rest of East Asia by storm, and, according to North Koreans now living in the South, the South's arch-rival North Korea is no exception.

One of the smash-hit TV dramas to emerge from South Korea in recent years has been “Winter Sonata,” a delicate and emotional love story that has spawned its own fashions as people seek to imitate details from the story.

“I watched ‘Winter Sonata’ in North Korea and I even recall the name of the leading actor, Bae Young Joon,” said a defector to South Korea identified only by his surname, Kim.

Korean wave

There have been two or three reports of public executions of North Korean young people in major cities including Chungjin, as punishment for having illegally copied and distributed South Korean visual material.

Kang Chul Hwan, vice-chairman of the Seoul-based Committee for the Democratization of North Korea

“North Koreans enjoy South Korean TV drama because it is interesting and realistic,” said Kim, who arrived in the South in 2002. “North Koreans love the fact that South Korean TV drama is not about politics, but about love and life, the fundamentals of human existence anywhere in this world,” he told RFA’s Korean service.

Kim said nowadays, so many North Koreans cross the border into China in the hope of buying food that they are easily exposed to South Korean video material sold in the border regions of northeast China.

The Korean Wave is already lapping on the shores of the communist North, where cultural productions inevitably praise the ruling Korean Workers’ Party and glorify leader Kim Jong Il, he told reporter Young Yoon Choi.

“A lot of people get together in groups and watch South Korean drama on DVDs. DVD players are available at foreign currency stores in North Korea,” he said, adding that in some parts of North Korea people have good reception of Chinese TV signals and watch South Korean drama directly.

But such apparently innocent pleasures can carry a high price tag.

Death sentences reported

“There have been two or three reports of public executions of North Korean young people in major cities including Chungjin, as punishment for having illegally copied and distributed South Korean visual material,” said Kang Chul Hwan, vice-chairman of the Seoul-based Committee for the Democratization of North Korea.

“It is not an overstatement to say that the Kim Jong Il regime is waging war on the South Korean TV drama,” he said, adding that the North Korean authorities have intensified surveillance and searches to prevent South Korean videos from entering North Korea.

But the effectiveness of these efforts is questionable, he said, pointing out that even the politically upright officials who carry out raids on anyone hoping to surf the Korean Wave aren’t immune.

Kang said the agents of the North Korean National Security Agency who conduct the searches for South Korean visual material often end up watching the DVDs they confiscate.

“Can the North Korean authorities prevent people from watching South Korean TV drama? If the people really want to watch it, they will find a way to watch it,” he said.

Movie director John Woo said he believed the Korean Wave would bring change in its wake.

“Culture is always the vanguard of understanding other cultures,” Woo told a recent panel discussion on Korean culture. “The Korean Wave is beginning to reach the North Korean people as well, and they are becoming aware of what South Korean culture is about. I believe that culture has the potential to invite changes in North Korea.”

Region-wide phenomenon

The Korean Wave found its biggest fan base among East Asian women in their 20s and 30s, before spreading out into the wider population, according to U.S.-based Korean culture expert Ji-Hong Lee.

“[It] has by now won the hearts of entire families, and consequently it has tremendous economic value and it boosts the image of Korea,” he said.

Meanwhile, Michael Shin, professor of modern Korean art and literature at Cornell University, said a distinctive feature of South Korean TV drama is that it emphasizes women’s role in society, particularly as mothers, transcending previous male-centered patriarchal stereotypes.

“The South Korean TV drama ‘Winter Sonata’ is the first classic example of this newly emerged matriarchal view of society,” Shin told a recent meeting of the U.S.-based Korean Society in New York.

“The main character doesn’t know who his father is, but his mother is still by his side. This is the key to understanding the popularity of Korean dramas. East Asians sense that they’ve somehow lost their stable identity and seek comfort in the mother figure.”

The Korean Wave of TV drama, movies, and music first made its impact in China in the late 1990s, quickly spreading across the region as broadcasters were quick to buy slick, high-quality productions at bargain prices.

Historic premiere

The themes, which embraced love, family and Confucian ideals, were easily embraced throughout North and East Asia. South Korea has one of the world’s largest film industries, with top stars now commanding as much as U.S. $5 million to appear in a movie.

In May 2007, Hwangjini became the first South Korean movie ever to be publicly previewed in North Korea.

The main character, an artistic and learned woman of great beauty known as a kisaeng, is played by Song Hye Gyo, one of the most popular Korean Wave stars of the moment. The story is based on a novel by North Korean author Hong Seok Jung, and it was previewed at Mount Kumgang in North Korea.

Original reporting in Korean by Chang-Kyun Lee, Jinhee Bonny, and Young Yoon Choi. RFA Korean service director: Jaehoon Ahn. Translated and researched by Greg Scarlatoiu. Written for the Web in English by Luisetta Mudie and edited by Sarah Jackson-Han.
http://www.rfa.org/english/korean/20...17/korea_wave/





Virtual Khabris to Zoom-In on Terrorists
Vinod Kumar Menon

Mumbai police will have access to new software connected to 500 cyber cafes in the city that will send them logs

The Mumbai police will soon have khabris deployed (not physically) at over 500 cyber cafes in the city. A new software will allows cops to swoop down on terrorists the moment a keystroke is pressed at any cyber café across the city.

Investigations into the recent Hyderabad and Mumbai blasts have revealed that the planning was done using the Internet especially, chat rooms.

In fact, it is a well-known fact that terrorists all over the world do not use paper and pen or the phone to communicate. Everywhere, all over the world, it’s the net.

Vijay Mukhi, President of the Foundation for Information Security and Technology says, “The terrorists know that if they use machines at home, they can be caught. Cybercafes therefore give them anonymity.”

“The police needs to install programs that will capture every key stroke at regular interval screen shots, which will be sent back to a server that will log all the data.

The police can then keep track of all communication between terrorists no matter, which part of the world they operate from.This is the only way to patrol the net and this is how the police informer is going to look in the e-age,” added Mukhi.

The Mumbai police are in dialogue with M/s Micro Technologies for procuring a software called CARMS (Cyber Access Remote Monitoring System), a powerful monitoring tool that seeks to curb cyber crime.

CARMS monitors web browsing, file transfers, news, chats, messaging and e-mail, including all encoded attachments. In a sensitive environment, CARMS can also be used to restrict user or group access to only approved external and internal sites, explained a company official.

All cyber cafes in the city will now need a police license to keep their business going. All cafes need to register at the police headquarters and provide details on the number of computers installed, type of computers and technical details like the IP address of each machine.

Privacy breach?

A senior ATS official confirming the move said that those cyber cafes who do not meet the norms will be fined under the Bombay Police Act and the police also reserve the rights to take stringent action for violation of norms.

“The question we need to ask ourselves is whether a breach of privacy is more important or the security of the nation. I do not think the above question needs an answer,” said Mukhi. “

As long as personal computers are not being monitored. If monitoring is restricted to public computers, it is in the interest of security,” said National Vice President, People Union for Civil Liberty.
http://www.mid-day.com/news/city/2007/august/163165.htm





Germany Defends Plan to Use Spyware in Terror Investigations
AP

German officials on Friday defended a proposal to use "Trojan horse" software to secretly monitor potential terror suspects' hard drives, amid fierce debate over whether the measures violate civil liberties.

Interior Minister Wolfgang Schaeuble wants to include the measure in a broader security law being considered by conservative Chancellor Angela Merkel's coalition government.

Carried in e-mails that appear to come from other government offices, the software would allow authorities to investigate suspects' Internet use and the data stored on their hard drives without their knowledge.

Use of the government-produced technology for spying on terror suspects "will cover a serious and scandalous hole in our information that has arisen through technical changes in recent years," Stefan Kaller, a spokesman for Schaeuble told reporters.

The proposal stems from a Federal Court decision earlier this year to block clandestine remote searches of suspect computers until there was a law governing the practice.

It has met with strong criticism from opposition parties and civil liberties groups.

Max Stadler, a security expert with the opposition Free Democrats, insists such practices would weaken citizens' trust in government.

"It is an invasion into the private sphere," Stadler told ZDF television.

Schaeuble's office has not yet released a copy of the bill, but elements of it that were leaked to German media include allowing investigators to send e-mail messages that appear to be from the Finance Ministry or the Youth Services Office, but which actually carry the Trojan horse software.

Thomas Steg, a spokesman for Merkel, said the chancellor supports the broader bill, but expects "a difficult and intensive discussion with the ministries, the coalition and the experts" on it before it is passed into law.

Details about how the technology works were not released.

In February, Germany's Federal Court of Justice rejected federal prosecutors' attempts to search hard drives through the Internet. Prosecutors had argued that the legal reasoning used to allow telephone surveillance and other electronic eavesdropping techniques should also be applied to evidence gathering over the Internet.

Germany, unlike Britain or Spain, has been spared a major terrorist attack, but German and U.S. officials have warned recently of increased dangers, prompting tighter security measures.

In recent weeks, German troops and others working in Afghanistan have been targeted by Islamic radicals in suicide bombings and kidnappings aimed at forcing the withdrawal of the nation's 3,000 troops deployed with the international security force there.

The heightened threat level only makes the matter more urgent, Kaller said, insisting that, "Any delay can mean a security risk."
http://www.mercurynews.com/business/ci_6770364





Logged In and Sharing Gossip, er, Intelligence
Scott Shane



AMERICA’S spies, like America’s teenagers, are secretive, talk in code and get in trouble if they’re not watched closely.

It’s hard to imagine spies logging on and exchanging “whuddups” with strangers, though. They’re just not wired that way. If networking is lifeblood to the teenager, it’s viewed with deep suspicion by the spy.

The intelligence agencies have something like networking in mind, though, as they scramble to adopt Web technologies that young people have already mastered in the millions. The idea is to try to solve the information-sharing problems inherent in the spy world — and blamed, most spectacularly, for the failure to prevent the Sept. 11 attacks.

In December, officials say, the agencies will introduce A-Space, a top-secret variant of the social networking Web sites MySpace and Facebook. The “A” stands for “analyst,” and where Facebook users swap snapshots, homework tips and gossip, intelligence analysts will be able to compare notes on satellite photos of North Korean nuclear sites, Iraqi insurgents and Chinese missiles.

A-Space will join Intellipedia, the spooks’ Wikipedia, where intelligence officers from all 16 American spy agencies pool their knowledge. Sixteen months after its creation, officials say, the top-secret version of Intellipedia has 29,255 articles, with an average of 114 new articles and more than 4,800 edits to articles added each workday.

A separate online Library of National Intelligence is to include all official intelligence reports sent out by each agency, offering Amazon.com-style suggestions: if you liked that piece on Venezuela’s oil reserves, how about this one on Russia’s? And blogs, accessible only to other spies, are proliferating behind the security fences.

“We see the Internet passing us in the fast lane,” said Mike Wertheimer, of the office of the Director of National Intelligence, who is overseeing the introduction of A-Space. “We’re playing a little catch-up.”

It remains to be seen, however, whether technology alone can bring to secretive bureaucracies the connectedness that comes naturally to cybersurfers in the outside world.

Skeptics say turf — the curse of the spy world — might keep analysts from using the tools. Mr. Wertheimer acknowledges that some managers discourage their people from adding to the Web encyclopedia, fearing that their agencies will lose credit for scoops.

And for the intelligence world, putting the Web tools to work requires a cultural revolution. “Need to know” has long been the agencies’ mantra. The juiciest stuff is still called S.C.I., or Sensitive Compartmented Information, and walling off data offers protection against leaks and moles, or so the theory goes.

But the Sept. 11 attacks revealed how hoarding information could lead to catastrophe. In a report released last month, the Central Intelligence Agency’s inspector general described a dysfunctional spy family, in which the National Security Agency refused to share intercepts from Al Qaeda with the C.I.A., and the C.I.A., in turn, withheld information from the F.B.I. More than 50 C.I.A. officers read cables in early 2000 about two future hijackers but failed to ask the State Department to put them on a watch list, the report said.

To prevent such blunders, Congress created the post of director of national intelligence in late 2004 with orders to rope the 16 spy agencies into a single enterprise. The National Counterterrorism Center serves as a hub for threat information. There are plans to train analysts from different agencies together.

And now there are high hopes that a virtual community, linking all of the 100,000 employees of the intelligence world, could help make information-sharing as automatic for spies as it is for middle school students. Agency officials will discuss the new Web tools with private-sector gurus this week at an open meeting in Chicago.

Intelligence veterans and experts generally applaud the new technology, but some warn that it is no panacea.

Amy Zegart, associate professor of public policy at the University of California, Los Angeles, and author of “Spying Blind: The C.I.A., the F.B.I. and the Origins of 9/11,” identified 23 moments when the C.I.A. or F.B.I. might have stopped the plot. But she said she saw “almost zero chance” that the Web would have made a difference, because intelligence officers didn’t recognize the significance of the information they had.

“I think we overemphasize what technology can do,” Ms. Zegart said. “The most important fusion takes place inside people’s brains.”

When Mark M. Lowenthal became the C.I.A.’s assistant director for analysis and production in 2002, he set out to survey the reports the agency was writing — and found that security barriers, clumsy technology and overwhelming volume made the task difficult.

“If A-Space and Intellipedia make it easier for analysts and managers to know what’s being produced across the board, that will be a great thing,” said Mr. Lowenthal, who left the agency in 2005. But he said he had doubts. “My concern about blogs and wikis is the confusion of opinion with expertise,” he said. “Intelligence is expertise.”

Whether A-Space will permit analysts to create personal pages viewable by others remains to be decided; managers are as wary of preening and time-wasting on the Web as parents. But its creators say A-Space will incorporate both secret and unclassified e-mail and chat functions, permit collective editing of documents and allow analysts to type in a name and instantly discover what far-flung agencies have dug up on it.

A Somalia specialist, for instance, will be able to link up with counterparts in other agencies, post to blogs on East Africa and get an alert when the Intellipedia page on Mogadishu is changed.

Aware that such a system could be vulnerable to a mole, officials say computers will flag users who download masses of data or repeatedly seek information outside their work area, just as credit card companies scan transactions for patterns indicating fraud.

But some old-timers still fear that the spy Web could give away the nation’s secrets to hackers and turncoats.

Chris Rasmussen, an analyst turned “knowledge manager” at the National Geospatial-Intelligence Agency and an evangelist for the new tools, has been called a “traitor” and compared to the C.I.A. supermole Aldrich Ames in comments left on his internal blog, he said in a talk in May.

But Mr. Rasmussen, 32, who like half of all intelligence officers was hired within the last five years, is undeterred. To combat turf consciousness, he and about 30 like-minded intelligence officers patrol Intellipedia to remove agency names that are used to label content.

Mr. Wertheimer, who spent 20 years as a code-breaking N.S.A. mathematician, said he was aware of the obstacles but saw encouraging signs. When a crisis breaks, he said, and an article goes up on Intellipedia, “within a few hours we’ve got all 16 agencies contributing.”
http://www.nytimes.com/2007/09/02/we...w/02shane.html





Satellite Imagery Raises Security Questions
Andrew Scutro

Throughout the Cold War, satellite and spy plane imagery of military sites was the sort of valuable, close-hold information that could start or stop a war or spawn a new arms race. Only people with the highest of security clearances got to see those photos.

Today, much of that same information is just a computer keystroke away. And you don’t need to be a spy to see it.

Global information companies such as Google and Microsoft provide millions of regular folks a bird’s-eye view of everything from U.S. military installations to their very own backyards — sometimes with incredible detail.

This widespread availability of overhead imagery has raised serious questions about the security of military personnel, installations and hardware.

With little effort, one can search Google for a forward operating base in Iraq and map out vehicles, berthing areas and security positions. Multiangled photos of highly sensitive facilities such as nuclear submarine maintenance stations are also there for the asking.

Last week, the issue gained a higher profile with the appearance on the Internet of a photograph of the propeller on a Ohio-class ballistic missile submarine while in dry dock at the intermediate maintenance facility in Bangor, Wash. A key to the strategic submarine’s ability to deploy and remain undetected, propeller designs have been kept under wraps for years — literally. When out of the water, the propellers typically are draped with tarps.

The image of the sub with its prop clearly visible appeared on Microsoft’s mapping tool, Virtual Earth. It was discovered accidentally by Dan Twohig, a deck officer on the Washington state ferry service who was using the program to examine real estate on the west side of Puget Sound.

While looking for a new home, Twohig stumbled on the exposed submarine and the surrounding facility. He was shocked.

“My initial reaction was ‘oops’. Then I looked around a while and looked at other things,” he said.

Interestingly, Twohig runs a Web site for mariners and he posted a link to the Microsoft images there.

“My intention of bringing the prop photos to the attention of my readers was in no way malicious,” he said. “I did want to point out the apparent lack of accountability for this type of information being out there for the average Joe to find if he is looking for it.”

Sometimes, the average Joe doesn’t even have to look.

Because of his posting, anyone with an e-mail alert set to the word “navy” received the photograph.

Such accessibility and dissemination has heated up the debate about what’s secret and what’s not in today’s hyper-reactive digital age.
‘Just the world we live in’

Nathan Hughes — a military analyst at Stratfor, a global intelligence company — says it was a major mistake that the sub propeller was exposed at all.

“It’s very sensitive naval technology,” he said. “You always hide that from above.”

He noted that such equipment has been concealed for decades, during and since the Cold War. Just because the Soviet Union collapsed doesn’t mean it’s no longer secret information, he contends.

“The SSBN, especially, with its acoustic signature, [tries] to be as quiet as possible. That [propeller] is national secret,” Hughes said. “This is something that should not be seen from space or an airplane or any other way.”

Such imagery, including pictures of a new Chinese ballistic missile submarine that were splashed across monitors around the world, now appear with increasing — and troubling — frequency, he said.

“This is just the world we live in these days,” Hughes said.

Several Navy watchers said the now widespread Ohio-class sub propeller photo marks a first.

“It’s the first time I’ve seen that in open source. In fact, it’s the first time I’ve seen that ever,” said one naval source who asked not to be named due to his involvement with ongoing Navy programs. “You have to think spy satellites from Russia could have taken pictures of it, too, depending on where they are.”

The source said while knowledge of the propeller has been widespread for some time, its appearance and design have not.

Asked about their policy on publishing such imagery, Microsoft officials offered a statement claiming that the company is willing to blur such imagery if asked.

But to the naval expert, that doesn’t mean much.

“Waiting until you are asked will not be a foolproof way to discourage these instances,” he said. “And that creates a situation where a lot more horses will get out of the barn before the doors can be closed.”

Pam Dixon, executive director of the World Privacy Forum, says that even if the U.S. government has not protested the new image proliferation, other nations have. In April, India protested Google Earth’s display of its government infrastructure, including “military bases, offices of the prime minister and the president, as well as nuclear facilities,” according to a BBC report.

Dixon said several other countries have been “very unhappy” with the efforts to photograph the world from above.

“I call this the race to the bottom,” she said.

But it’s all aboveboard, according to Google.

Company spokeswoman Megan Quinn said that satellite and aerial imagery is available from several sources and that Google is conscientious about what it releases.

Further, the U.S. government has not tried to interfere under “a policy that favors the public availability of commercial remote imaging data, on the grounds that the benefits to the public vastly outweigh the potential risks,” she wrote in an e-mail. “The government has the power to limit the capturing of satellite images whenever appropriate. Google both supports the federal government’s decision and understands the government’s interest to set limits wherever appropriate.”
How big of a breach?

Norman Friedman, a highly regarded authority and author on naval and military topics, has been to the Bangor submarine base and knows any pictures he could have taken there would have landed him in serious trouble.

He acknowledged the Ohio-class submarine propeller configuration was once very secret, but that it’s no longer the case.

“But I still don’t think the Navy likes people hanging around refit sites for nuclear submarines,” he said. “It will be interesting to see if the Navy has the temerity to go after Microsoft ... I don’t believe the public needs to know that an Ohio-class submarine has a [certain sort of] propeller.”

Some experts argue that even with a picture of a secret propeller, a competitor or enemy still has to build it, and in the case of an Ohio-class design, that’s a daunting technical feat.

In a way, Friedman agrees. He doesn’t believe the propeller issue means that much when compared to the proliferation of detailed photographs of sensitive military installations, from submarine piers to combat bases in Iraq.

“I’d be less interested in the propeller and more about someone who can casually take pictures and figure out how the place is laid out,” he says. “Forget about the propeller. Think about the security arrangements on the base.”

Since most of the rest of the world doesn’t have reconnaissance satellites, such publicly available information provides a previously unavailable tool.

“To make it easy for someone to get into a base like that is obscene. And that is something that can kill people. In huge numbers,” Friedman said. “Right now there are people out there in places like Waziristan who want us dead. They don’t have satellites, but they have wonderful fantasies. Why the hell make it easier for them?”

In the days following Sept. 11, 2001, news reports surfaced of suspicious figures photographing New York landmarks. Later, captured terrorists were found to have similar photos, ostensibly for attack planning.

“If you’re not supposed to take pictures of bridge abutments, why are you supposed to take pictures of this stuff?” Friedman asked. “It goes beyond the question of, ‘Are we serious about terrorism?’ A lot of people, with the Internet, think there are no rules.”

Apparently, there are no rules. Not yet, anyway.

“There is a no-fly zone around Navy installations that applies to aircraft,” according to a Naval Sea Systems Command statement. “However, the Navy can not speculate on the type of platform or equipment [that was] used to take the [submarine propeller] image. Additionally, the Navy cannot control the trajectory or orbit of privately owned satellites.”

The Navy says it was not aware the photos were being taken at the time. It has not asked for photos to be obscured in any way.

“The Navy has no agreements with overhead digital imaging companies that control/limit the content of photographs taken of Navy facilities,” according to the statement.

Air Force Maj. Patrick Ryder, a public affairs officer at the Pentagon, said the Defense Department has never asked that such imagery be obscured or removed.

“It is not DoD’s policy, nor do we have the legal authority, to request or demand the degrading of commercial imagery (aerial or satellite) hosted on Google Earth and Microsoft Virtual Earth,” he said in an e-mail. “DoD is not in the business of censoring information in the public domain.”
http://www.navytimes.com/news/2007/0...urity_070819w/





The First Amendment, Satellite Imagery and National Security
Dan Twohig

The correspondence that I have received regarding the Bangor sub photos has sparked a much needed conversation in the world of Post 9/11 National Security.

The Navy Times’ investigative reporter discovered that the prop photos first reported on MonsterMaritime.com were not taken from a satellite but by an airplane on a mapping run of the area. The company that took the photos made them available to the pubic (for a price) then Microsoft Live Search picked them up and broadcast them on the internet for anyone to see. I am certain that I am not the first person to see this photo but I was just the first person to point it out and say, “Whoa, I don’t think that the military is going to be happy with this…” Satellites are one thing, but frankly, I am surprised that the air space over sensitive bases like Bangor is not better controlled.

A month or so later, I was interviewed about my discovery of the photos by a reporter for the Navy Times. He asked me what I thought about this accidental discovery of sensitive data on the internet and I remarked that my pointing this out on my blog was in no way malicious but it certainly has raised the issue in some pretty high places. Hence the controversy.

I recently made a comment on another person’s blog regarding the decision of the Seattle Post Intelligencer not to publish photos of suspicious persons on the Washington State Ferries that were released to the media by the FBI. My personal opinion as to whether the photos should have been published was not at issue. I defended the PI’s First Amendment right to choose not to publish the photos and have since born the brunt of all kinds of negative comments from readers. The Washington State Ferries takes security very seriously and this is of course is a serious matter. But that is not the issue. I hold that a news organization has a duty to report the news. It does not have a duty to publish photos that may or may not violate any persons rights. However, it can publish them if it wishes to and risk the consequences. The PI reported the release of the photos but chose not to publish them. It is a difficult ethical question to deal with. I think the Seattle PI dealt with it in a ethical manner.

What are the needs of National Security with regard to the internet and what is the danger to the Bill of Rights? Where do we draw the line? Is it domestic wire tapping without a warrant? Is a spy satellite directed at a back yard BBQ in Oklahoma really a good use of our resources?

We (the US) throw tons of money at all kind of things in the name of Homeland Security and we get conflicting reports from the news media and various government agencies about the effectiveness of these efforts and the value of funding these programs. As with anything else in our society, security has become big industry and many entities are circling around like sharks looking to pick up the drops that fall in the pond. After 9/11, fear and anger have been tools used to manipulate the populace and bend them back and forth for gain whether political or corporate. A person can be pretty smart. People in a group are pretty dumb. Our political and corporate systems prey on this.

When the government first started doling out the security dollars, states, cities and towns fought tooth and nail for their piece of the security pie. As with many aspects of our system, this security money was dumped into the pork barrel and we have seen all manner of “projects” that are touted as in the interest of Homeland Security. We are building a fence across our southern frontier but not our northern one.

I fear mob mentality. I fear giving up the civil rights that our county’s founding fathers worked so hard to design for us. I fear giving away the rights that our armed forces have sacrificed to protect. I fear a future where the majority of our county’s citizens are OK with being told what to think and what to believe.
I was discussing this topic with an electrician who was doing some work for me last week and he summed it up pretty well. He said, “Personally, I would rather die free than die afraid.”

Me too…

http://www.monstermaritime.com/2007/08/





Lawmakers Challenge Plan to Expand Spying

Concerns Focus on Domestic Use of Satellite Technology and How U.S. Will Protect Civil Liberties
Spencer S. Hsu

Senior House Democrats called on the Bush administration yesterday to delay a planned Oct. 1 expansion of the use of powerful satellite and aircraft spy technology by local and federal law enforcement agencies, challenging the plan's legality and charging that the administration is failing to safeguard the privacy of Americans.

House Homeland Security Committee Chairman Bennie Thompson (D-Miss.) and two Democratic subcommittee chairmen jointly asked the Department of Homeland Security to provide the legal framework for the domestic use of classified and military spy satellites, and to allow Congress to review privacy and civil liberties protections.

"You let this thing go, it may be another blank check to the executive. It may morph into things that will terrify you if you really understand the capabilities of satellites," said Rep. Jane Harman (Calif.), former ranking Democrat on the House intelligence committee.

Their demand was made in a letter after DHS officials testified about the spying program at a hearing, and signaled that administration officials had not succeeded in quieting Democrats' concerns about the intrusiveness of the satellite technology -- which was created primarily for foreign surveillance -- and the novelty of its proposed use by state and local police officials.

Responding to the request for a delay, DHS spokesman Russ Knocke said the department will provide "timely responses . . . and with that information we believe the committee will be satisfied.''

Invoking the controversy over President Bush's warrantless eavesdropping program, which was kept secret from most lawmakers for years after the Sept. 11, 2001, terrorist attacks, Harman contended that the administration gave incomplete or misleading briefings about that program and disregarded laws passed by Congress.

"Since we've been rolled, I intend not to get rolled again," Harman said, although she acknowledged the potential value of the new program.

The hearing was set after news reports in August said that beginning this fall, intelligence officials and DHS will allow broader domestic use of some of the nation's most secret and advanced spying technology.

Administration officials say the program can help domestic authorities deal with a variety of threats, from illegal immigration and terrorism to hurricanes and forest fires, by providing access to high-resolution, real-time satellite photos. Military sensors can peer through clouds and tree canopies, detect underground bunkers and penetrate buildings.

Charles Allen, Homeland Security's chief intelligence officer, told the committee that overhead satellite imagery has been used legally for decades to support domestic, federal, scientific, law enforcement and security uses. It has been used to create maps, monitor volcanoes and scout sports events.

The new program, he said, does not require additional laws or authority, and would relieve the need for other agencies to rely on ad hoc means of accessing powerful data tools. He said that state and local police requests for access would be approved on a case-by-case basis, using rules to be set by homeland and intelligence officials at a future date he did not specify.

Allen also said officials will use only imagery satellites and will not track individuals or use thermal sensors to peer inside buildings. "I assure you and the American people that the appropriate use of these . . . capabilities will make the nation safer while maintaining the privacy and civil liberties of Americans," Allen said.

Oversight of the data's use would be more layered than it is now, Allen said. It would come from officials at DHS and the Office of the Director of National Intelligence, which authorized the program in May following a 2005 study. The program will be managed by a new DHS office and reviewed by agency inspectors general, lawyers, and privacy and civil liberties officers.

Representatives of several civil liberties groups testified against the move. They said the government appears to be crossing a well-established line against the use of military assets in domestic law enforcement. "They say 'trust us,' " said Barry Steinhardt, director of the American Civil Liberties Union's Technology and Liberty Project. Before such technology is directed at Americans, he said, "You need to verify that this technology will not be misused."
http://www.washingtonpost.com/wp-dyn...090601128.html





Digital Video Rocket - Bird’s Eye View at a Down to Earth Price
Nigel Powell

The Digital Video Rocket soars to a majestic 500 feet, all the while recording a VGA video for you to gawp at on landing. Only 12 seconds of footage or 3 still images stored per flight, so you’d better make sure you’re pointing in the right direction. Fortunately the camera is impact resistant, which is probably more than you can say for your neighbour’s greenhouse. $59.95.

This rocket, made by Estes, makers of model rockets for nearly 50 years, provides enthusiasts a view of the rockets liftoff and flight from the rockets point of view thanks to the impact-resistant digital camera in the nose cone. From as high as 500′, the camera can record a 12-second video at 640 x 480 pixel resolution or take up to three pictures per flight (stores 15 pictures). It comes ready to fly, and the camera is oriented toward the earth during flight. The camera connects to a PC with the included USB cable to download the flight video.
http://www.redferret.net/?p=9187





P2P tagging



Tracking the Elusive Shipping ContainerLibraries

The world is a different place beyond the ocean horizon, where thousands of merchant ships ply the all the world's waterways. How do these ships come by their cargos, and in what untamed ports? Along the journey, pry open a container and what will you find? If you're not sure, that spells danger.

The world is a very different place out beyond the horizon. Even as you read this, there are some 40,000 large cargo ships plying the world’s waterways and oceans, not to mention innumerable smaller merchant craft, all pulling in and out of ports, loading, unloading, changing out crews and cargos, and steaming from one location to the next.

In what can be a very murky world of shadowy ship registry offices, lengthy manifests, and dockhands who change out faster than Barbosa’s crew, how all these ships come by their cargo, how that cargo is loaded, by what polyglot seamen and in what untamed ports, can be an amazingly scrambled and trackless story rivaling the Pirates of the Caribbean.

Scenario: A single ship starts out in Singapore with containers filled with electronics, passes through Indonesia where it picks up spices, sails to Calcutta to load cotton, Port Said where it boards an Egyptian crew, Piraeus where it stops for fuel, Tangier where it picks up leathers, Scotland where it packs in woolen sweaters, and finally sets sail for Newark, New Jersey. Eleven million containers packed with such goods reach U.S. ports every year.

At any point in a merchant ship’s journey, pry open a container mid-ocean, and what might you find? When you can’t be sure, that spells danger. The possibility that a single container has gone purposefully astray and might now be packed with explosives, or loaded with a virulent biologic destined for our shores, is not a fictional scenario. (In 1988, it was an Al Qaeda merchant ship that delivered the materials needed to bomb U.S. embassies in Tanzania and Kenya. That same ship was never seen again.)

Given endless time, customs agents could find all contraband. But, in the world of maritime shipping, time is the enemy. Try delaying a delivery, and you may face some rough characters down at the docks (think On the Waterfront). What's more, anything that hinders the swift transit of goods around the world can have a rippling effect on the world’s economy.

MATTS – Homeland Security's Science & Technology Directorate's Marine Asset Tag Tracking System – is a miniature sensor, data logging computer, radio transceiver, and GPS tracking system integrated into a compact and inexpensive black box, about the size of a deck of cards. Affixed to a shipping container, MATTS can use its on-board GPS chip to estimate its location if the GPS signal is lost. And, in the final version of the system, containers outfitted with MATTS tags will be able to transmit through shipboard communications systems, even if they are placed deep below deck. The tag’s signal will “jump” from container to container until it finds a path it can use. Better yet, this black box stores its location history and reports it back when in range (up to 1 km) of an Internet equipped ship, container terminal, or a cell phone tower. At any point in a container’s journey, its history can be examined, and if anything has gone amiss, authorities know instantly to scrutinize that particular container.

Ultimately, MATTS will be integrated with the Advanced Container Security Device, which will send an alert through MATTS when a container has been opened or tampered with on any side, providing even more security.

“MATTS will globally communicate in-transit alerts to Customs and Border Protection, and this capability satisfies a high-priority requirement,” says Bob Knetl, Program Manager for the MATTS research within S&T’s Borders and Maritime Division.

In late April 2007, one hundred MATTS-equipped containers started out in the Port of Yokohama, Japan, and are now making their trans-Pacific crossing to the Port of Los Angeles/Long Beach, where they will then continue by rail to the Rochelle, Illinois, Rail Terminal and be unloaded and trucked to their final destination. This test, ending in August, will demonstrate that the communications can be used internationally (in this case, by Japan’s Ministry of Land, Infrastructure and Transportation) and that transitioning to domestic drayage once portside in Long Beach also runs smoothly.

MATTS was developed under a DHS S&T Small Business Innovation Research (SBIR) contract by iControl Incorporated, a small Santa Clara, CA-based company.

“A serious threat is posed by the cargo that containers may hold,” says Vinny Schaper, S&T's SBIR Program manager. “We have to view the ocean with grave concern, and realize that a maritime attack is not beyond the realm of possibility and if it comes, it will probably involve the use of merchant ships. Eleven million containers a year are brought onto our docks. Interrupt this with a terrorist attack, and the backup would reach around the world.”
http://www.newswise.com/articles/view/533091/?sc=swtn





Chip Implants Linked to Animal Tumors
Todd Lewan

When the U.S. Food and Drug Administration approved implanting microchips in humans, the manufacturer said it would save lives, letting doctors scan the tiny transponders to access patients' medical records almost instantly. The FDA found "reasonable assurance" the device was safe, and a sub-agency even called it one of 2005's top "innovative technologies."

But neither the company nor the regulators publicly mentioned this: A series of veterinary and toxicology studies, dating to the mid-1990s, stated that chip implants had "induced" malignant tumors in some lab mice and rats.

"The transponders were the cause of the tumors," said Keith Johnson, a retired toxicologic pathologist, explaining in a phone interview the findings of a 1996 study he led at the Dow Chemical Co. in Midland, Mich.

Leading cancer specialists reviewed the research for The Associated Press and, while cautioning that animal test results do not necessarily apply to humans, said the findings troubled them. Some said they would not allow family members to receive implants, and all urged further research before the glass-encased transponders are widely implanted in people.

To date, about 2,000 of the so-called radio frequency identification, or RFID, devices have been implanted in humans worldwide, according to VeriChip Corp. The company, which sees a target market of 45 million Americans for its medical monitoring chips, insists the devices are safe, as does its parent company, Applied Digital Solutions, of Delray Beach, Fla.

"We stand by our implantable products which have been approved by the FDA and/or other U.S. regulatory authorities," Scott Silverman, VeriChip Corp. chairman and chief executive officer, said in a written response to AP questions.

The company was "not aware of any studies that have resulted in malignant tumors in laboratory rats, mice and certainly not dogs or cats," but he added that millions of domestic pets have been implanted with microchips, without reports of significant problems.

"In fact, for more than 15 years we have used our encapsulated glass transponders with FDA approved anti-migration caps and received no complaints regarding malignant tumors caused by our product."

The FDA also stands by its approval of the technology.

Did the agency know of the tumor findings before approving the chip implants? The FDA declined repeated AP requests to specify what studies it reviewed.

The FDA is overseen by the Department of Health and Human Services, which, at the time of VeriChip's approval, was headed by Tommy Thompson. Two weeks after the device's approval took effect on Jan. 10, 2005, Thompson left his Cabinet post, and within five months was a board member of VeriChip Corp. and Applied Digital Solutions. He was compensated in cash and stock options.

Thompson, until recently a candidate for the 2008 Republican presidential nomination, says he had no personal relationship with the company as the VeriChip was being evaluated, nor did he play any role in FDA's approval process of the RFID tag.

"I didn't even know VeriChip before I stepped down from the Department of Health and Human Services," he said in a telephone interview.

Also making no mention of the findings on animal tumors was a June report by the ethics committee of the American Medical Association, which touted the benefits of implantable RFID devices.

Had committee members reviewed the literature on cancer in chipped animals?

No, said Dr. Steven Stack, an AMA board member with knowledge of the committee's review.

Was the AMA aware of the studies?

No, he said.

___

Published in veterinary and toxicology journals between 1996 and 2006, the studies found that lab mice and rats injected with microchips sometimes developed subcutaneous "sarcomas" _ malignant tumors, most of them encasing the implants.

_ A 1998 study in Ridgefield, Conn., of 177 mice reported cancer incidence to be slightly higher than 10 percent _ a result the researchers described as "surprising."

_ A 2006 study in France detected tumors in 4.1 percent of 1,260 microchipped mice. This was one of six studies in which the scientists did not set out to find microchip-induced cancer but noticed the growths incidentally. They were testing compounds on behalf of chemical and pharmaceutical companies; but they ruled out the compounds as the tumors' cause. Because researchers only noted the most obvious tumors, the French study said, "These incidences may therefore slightly underestimate the true occurrence" of cancer.

_ In 1997, a study in Germany found cancers in 1 percent of 4,279 chipped mice. The tumors "are clearly due to the implanted microchips," the authors wrote.

Caveats accompanied the findings. "Blind leaps from the detection of tumors to the prediction of human health risk should be avoided," one study cautioned. Also, because none of the studies had a control group of animals that did not get chips, the normal rate of tumors cannot be determined and compared to the rate with chips implanted.

Still, after reviewing the research, specialists at some pre-eminent cancer institutions said the findings raised red flags.

"There's no way in the world, having read this information, that I would have one of those chips implanted in my skin, or in one of my family members," said Dr. Robert Benezra, head of the Cancer Biology Genetics Program at the Memorial Sloan-Kettering Cancer Center in New York.

Before microchips are implanted on a large scale in humans, he said, testing should be done on larger animals, such as dogs or monkeys. "I mean, these are bad diseases. They are life-threatening. And given the preliminary animal data, it looks to me that there's definitely cause for concern."

Dr. George Demetri, director of the Center for Sarcoma and Bone Oncology at the Dana-Farber Cancer Institute in Boston, agreed. Even though the tumor incidences were "reasonably small," in his view, the research underscored "certainly real risks" in RFID implants.

In humans, sarcomas, which strike connective tissues, can range from the highly curable to "tumors that are incredibly aggressive and can kill people in three to six months," he said.

At the Jackson Laboratory in Maine, a leader in mouse genetics research and the initiation of cancer, Dr. Oded Foreman, a forensic pathologist, also reviewed the studies at the AP's request.

At first he was skeptical, suggesting that chemicals administered in some of the studies could have caused the cancers and skewed the results. But he took a different view after seeing that control mice, which received no chemicals, also developed the cancers. "That might be a little hint that something real is happening here," he said. He, too, recommended further study, using mice, dogs or non-human primates.

Dr. Cheryl London, a veterinarian oncologist at Ohio State University, noted: "It's much easier to cause cancer in mice than it is in people. So it may be that what you're seeing in mice represents an exaggerated phenomenon of what may occur in people."

Tens of thousands of dogs have been chipped, she said, and veterinary pathologists haven't reported outbreaks of related sarcomas in the area of the neck, where canine implants are often done. (Published reports detailing malignant tumors in two chipped dogs turned up in AP's four-month examination of research on chips and health. In one dog, the researchers said cancer appeared linked to the presence of the embedded chip; in the other, the cancer's cause was uncertain.)

Nonetheless, London saw a need for a 20-year study of chipped canines "to see if you have a biological effect." Dr. Chand Khanna, a veterinary oncologist at the National Cancer Institute, also backed such a study, saying current evidence "does suggest some reason to be concerned about tumor formations."

Meanwhile, the animal study findings should be disclosed to anyone considering a chip implant, the cancer specialists agreed.

To date, however, that hasn't happened.

___

The product that VeriChip Corp. won approval for use in humans is an electronic capsule the size of two grains of rice. Generally, it is implanted with a syringe into an anesthetized portion of the upper arm.

When prompted by an electromagnetic scanner, the chip transmits a unique code. With the code, hospital staff can go on the Internet and access a patient's medical profile that is maintained in a database by VeriChip Corp. for an annual fee.

VeriChip Corp., whose parent company has been marketing radio tags for animals for more than a decade, sees an initial market of diabetics and people with heart conditions or Alzheimer's disease, according to a Securities and Exchange Commission filing.

The company is spending millions to assemble a national network of hospitals equipped to scan chipped patients.

But in its SEC filings, product labels and press releases, VeriChip Corp. has not mentioned the existence of research linking embedded transponders to tumors in test animals.

When the FDA approved the device, it noted some Verichip risks: The capsules could migrate around the body, making them difficult to extract; they might interfere with defibrillators, or be incompatible with MRI scans, causing burns. While also warning that the chips could cause "adverse tissue reaction," FDA made no reference to malignant growths in animal studies.

Did the agency review literature on microchip implants and animal cancer?

Dr. Katherine Albrecht, a privacy advocate and RFID expert, asked shortly after VeriChip's approval what evidence the agency had reviewed. When FDA declined to provide information, she filed a Freedom of Information Act request. More than a year later, she received a letter stating there were no documents matching her request.

"The public relies on the FDA to evaluate all the data and make sure the devices it approves are safe," she says, "but if they're not doing that, who's covering our backs?"

Late last year, Albrecht unearthed at the Harvard medical library three studies noting cancerous tumors in some chipped mice and rats, plus a reference in another study to a chipped dog with a tumor. She forwarded them to the AP, which subsequently found three additional mice studies with similar findings, plus another report of a chipped dog with a tumor.

Asked if it had taken these studies into account, the FDA said VeriChip documents were being kept confidential to protect trade secrets. After AP filed a FOIA request, the FDA made available for a phone interview Anthony Watson, who was in charge of the VeriChip approval process.

"At the time we reviewed this, I don't remember seeing anything like that," he said of animal studies linking microchips to cancer. A literature search "didn't turn up anything that would be of concern."

In general, Watson said, companies are expected to provide safety-and-effectiveness data during the approval process, "even if it's adverse information."

Watson added: "The few articles from the literature that did discuss adverse tissue reactions similar to those in the articles you provided, describe the responses as foreign body reactions that are typical of other implantable devices. The balance of the data provided in the submission supported approval of the device."

Another implantable device could be a pacemaker, and indeed, tumors have in some cases attached to foreign bodies inside humans. But Dr. Neil Lipman, director of the Research Animal Resource Center at Memorial Sloan-Kettering, said it's not the same. The microchip isn't like a pacemaker that's vital to keeping someone alive, he added, "so at this stage, the payoff doesn't justify the risks."

Silverman, VeriChip Corp.'s chief executive, disagreed. "Each month pet microchips reunite over 8,000 dogs and cats with their owners," he said. "We believe the VeriMed Patient Identification System will provide similar positive benefits for at-risk patients who are unable to communicate for themselves in an emergency."

___

And what of former HHS secretary Thompson?

When asked what role, if any, he played in VeriChip's approval, Thompson replied: "I had nothing to do with it. And if you look back at my record, you will find that there has never been any improprieties whatsoever."

FDA's Watson said: "I have no recollection of him being involved in it at all." VeriChip Corp. declined comment.

Thompson vigorously campaigned for electronic medical records and healthcare technology both as governor of Wisconsin and at HHS. While in President Bush's Cabinet, he formed a "medical innovation" task force that worked to partner FDA with companies developing medical information technologies.

At a "Medical Innovation Summit" on Oct. 20, 2004, Lester Crawford, the FDA's acting commissioner, thanked the secretary for getting the agency "deeply involved in the use of new information technology to help prevent medication error." One notable example he cited: "the implantable chips and scanners of the VeriChip system our agency approved last week."

After leaving the Cabinet and joining the company board, Thompson received options on 166,667 shares of VeriChip Corp. stock, and options on an additional 100,000 shares of stock from its parent company, Applied Digital Solutions, according to SEC records. He also received $40,000 in cash in 2005 and again in 2006, the filings show.

The Project on Government Oversight called Thompson's actions "unacceptable" even though they did not violate what the independent watchdog group calls weak conflict-of-interest laws.

"A decade ago, people would be embarrassed to cash in on their government connections. But now it's like the Wild West," said the group's executive director, Danielle Brian.

Thompson is a partner at Akin Gump Strauss Hauer & Feld LLP, a Washington law firm that was paid $1.2 million for legal services it provided the chip maker in 2005 and 2006, according to SEC filings.

He stepped down as a VeriChip Corp. director in March to seek the GOP presidential nomination, and records show that the company gave his campaign $7,400 before he bowed out of the race in August.

In a TV interview while still on the board, Thompson was explaining the benefits _ and the ease _ of being chipped when an interviewer interrupted:

"I'm sorry, sir. Did you just say you would get one implanted in your arm?"

"Absolutely," Thompson replied. "Without a doubt."

"No concerns at all?"

"No."

But to date, Thompson has yet to be chipped himself.
http://www.washingtonpost.com/wp-dyn...800997_pf.html





U.S. May Invoke 'State Secrets' to Squelch Suit Against Swift
Eric Lichtblau

The Bush administration is signaling that it plans to turn once again to a favorite legal tool known as the "state secrets" privilege to try to shut down a lawsuit brought against a Belgium banking cooperative that secretly supplied millions of private financial records to the U.S. government, court documents show.

The lawsuit against the banking consortium, which is known as Swift, threatens to disrupt the operations of a vital national security program and to reveal "highly classified information" if it is allowed to continue, the Justice Department said in several recent court filings asserting its strong interest in seeing the lawsuit dismissed. A hearing on the future of the lawsuit was scheduled for Friday in federal court in Alexandria, Virginia.

The "state secrets" privilege, allowing the government to shut down public litigation on national security grounds, was once a rarely used tool. But the Bush administration has turned to it dozens of times in terrorism-related cases in seeking to end public discussion of everything from an FBI whistle-blower's claims to the abduction of a German terrorism suspect.

Most notably, the Bush administration has sought to use the state secrets assertion to kill numerous lawsuits against telecommunications carriers over the National Security Agency's domestic eavesdropping program, but a judge in California rejected that claim. The issue is now pending before an appeals court, where judges in a hearing two weeks ago expressed skepticism about the administration's claims.

Asserting the state secrets privilege requires the certification of both the director of national intelligence and the attorney general about the potential harm to national security. If the administration makes good on its intention to invoke the secrets claim in the lawsuit against Swift, it would be one of the most significant cases to test the claim.

Swift is considered the nerve center of the global banking industry, routing trillions of dollars each day between banks, brokerages and other financial institutions. The group's partnership with the U.S. government, first revealed in media reports in June 2006, gave officials at the CIA access to millions of records on international banking transactions in an effort to trace money that investigators believed might be linked to terrorist financing. Swift agreed to turn over large chunks of its database in response to a series of unusually broad subpoenas issued by the Treasury Department beginning months after the attacks of Sept. 11, 2001.

Bush administration officials have defended the banking data program as an important tool in its war on terror, but European regulators and privacy advocates were quick to denounce the program as improper and possibly illegal, and the pressure forced Swift and U.S. officials earlier this year to agree to tighter restrictions on how the data could be used.

Two U.S. banking customers sued Swift on invasion-of-privacy grounds. Many legal and financial analysts expected that the lawsuit would be thrown out because U.S. banking privacy laws are considered much more lax than those in much of Europe. But to the surprise of many, a judge refused to throw out the lawsuit in a ruling in June.
http://iht.com/articles/2007/08/31/america/swift.php





Judge Voids F.B.I. Tool Granted by Patriot Act
Adam Liptak

A federal judge yesterday struck down the parts of the recently revised USA Patriot Act that authorized the Federal Bureau of Investigation to use informal secret demands called national security letters to compel companies to provide customer records.

The law allowed the F.B.I. not only to force communications companies, including telephone and Internet providers, to turn over the records without court authorization, but also to forbid the companies to tell the customers or anyone else what they had done. Under the law, enacted last year, the ability of the courts to review challenges to the ban on disclosures was quite limited.

The judge, Victor Marrero of the Federal District Court in Manhattan, ruled that the measure violated the First Amendment and the separation of powers guarantee.

Judge Marrero said he feared that the law could be the first step in a series of intrusions into the judiciary’s role that would be “the legislative equivalent of breaking and entering, with an ominous free pass to the hijacking of constitutional values.”
According to a report from the Justice Department’s inspector general in March, the F.B.I. issued about 143,000 requests through national security letters from 2003 to 2005. The report found that the bureau had often used the letters improperly and sometimes illegally.

Yesterday’s decision was a sequel to rulings by Judge Marrero in 2004 and a federal judge in Connecticut in 2005, both of which enjoined an earlier version of the law. Congress responded last year by amending the law in reauthorizing it.

The earlier version of the measure barred all recipients of the letters from disclosing them. The amended law changed the ban slightly, now requiring the F.B.I. to certify in each case that disclosure might harm national security, criminal investigations, diplomacy or people’s safety.

The law authorized courts to review those assertions, but under extremely deferential standards. In some cases, judges were required to treat F.B.I. statements “as conclusive unless the court finds that the certification was made in bad faith.”

In yesterday’s decision, Judge Marrero said that the revisions to the law did not go far enough in addressing the flaws identified in the earlier decisions and that in fact they created additional constitutional problems.

Recipients of the letters, he wrote, remain “effectively barred from engaging in any discussion regarding their experiences and opinions related to the government’s use” of the letters. Indeed, the very identity of the Internet service provider that brought this case remains secret.

The judge said the F.B.I. might be entitled to prohibit disclosures for a limited time but afterward “must bear the burden of going to court to suppress the speech.” Putting that burden on recipients of the letters, he said, violates the First Amendment.

The decision found that the secrecy requirement was so intertwined with the rest of the provision concerning national security letters that the entire provision was unconstitutional.

Judge Marrero used his strongest language and evocative historical analogies in criticizing the aspect of the new law that imposed restrictions on the courts’ ability to review the F.B.I.’s determinations.

“When the judiciary lowers its guard on the Constitution, it opens the door to far-reaching invasions of privacy,” Judge Marrero wrote, pointing to discredited Supreme Court decisions endorsing the internment of Japanese-Americans during World War II and racially segregated railroad cars in the 19th century.

“The only thing left of the judiciary’s function for those Americans in that experience,” he wrote, “was a symbolic act: to sing a requiem and lower the flag on the Bill of Rights.”

Lawyers for the American Civil Liberties Union, which represented the Internet company, said Judge Marrero had confirmed a bedrock principle.

“A statute that allows the F.B.I. to silence people without meaningful judicial oversight is unconstitutional,” said Jameel Jaffer, an A.C.L.U. lawyer.

Judge Marrero delayed enforcing his decision pending an appeal by the government. Rebekah Carmichael, a spokeswoman for the United States attorney’s office in Manhattan, said the government had not decided whether to file one.
http://www.nytimes.com/2007/09/07/wa...atriot.html?hp





DHS Ends Criticized Data-Mining Program
Michael J. Sniffen

The Homeland Security Department scrapped an ambitious anti-terrorism data-mining tool after investigators found it was tested with information about real people without required privacy safeguards.

The department has spent $42 million since 2003 developing the software tool known as ADVISE, the Analysis, Dissemination, Visualization, Insight and Semantic Enhancement program, at the Lawrence Livermore and Pacific Northwest national laboratories. It was intended for wide use by DHS components, including immigration, customs, border protection, biological defense and its intelligence office.

Pilot tests of the program were quietly suspended in March after Congress' Government Accountability Office warned that "the ADVISE tool could misidentify or erroneously associate an individual with undesirable activity such as fraud, crime or terrorism."
Since then, Homeland Security's inspector general and the DHS privacy office discovered that tests used live data about real people rather than made-up data for one to two years without meeting privacy requirements. The inspector general also said ADVISE was poorly planned, time-consuming for analysts to use and lacked adequate justifications.

DHS spokesman Russ Knocke told The Associated Press on Wednesday the project was being dropped.

"ADVISE is not expected to be restarted," Knocke said. DHS' Science and Technology directorate "determined that new commercial products now offer similar functionality while costing significantly less to maintain than ADVISE."

Earlier, DHS said testing would resume once appropriate privacy analyses and public notices were completed.

ADVISE was one of the broadest of 12 data-mining projects in the agency.

A DHS research official said in 2004 it would be able to ingest 1 billion pieces per hour of structured information, such as databases of cargo shippers, and 1 million pieces per hour from unstructured text, such as government intelligence reports.

The system was supposed to identify links between bits of information that could otherwise go unnoticed. And it would graphically display results in charts of relationships and links.

A DHS workshop report in 2004 said it hoped to answer queries like: "Identify any suspicious group of individuals that passed through customs at JFK (airport in New York) in January 2004."

The GAO said in March that DHS should notify the public about how an individual's personal information would be verified, used and protected before ADVISE was implemented on live data.

Then, in separate reports released without fanfare in July and August, the DHS inspector general and privacy office concluded that between 2004 and 2007, three pilot tests of ADVISE used personally identifiable information without first issuing required privacy impact assessments. The privacy office said this "created unnecessary privacy risks."

The errors were in pilot programs involving weapons of mass effect, immigration enforcement and the DHS intelligence analysis office, the privacy office said.

This is the second such error at DHS.

The Secure Flight program to screen domestic air travelers was blocked by Congress after it acquired live personal data for testing. That program has since issued a privacy impact assessment, dropped use of commercial data such as personal credit card histories, and will begin tests this fall.

"Data analysis programs hold real promise for protecting America, but they need to be tested using dummy data before being used on real data," said James Dempsey, policy director for the Center for Democracy and Technology, a civil liberties group. "Why this mistake keeps getting made over and over again, I don't understand."

Senate Judiciary Committee chairman Patrick Leahy, D-Vt., database tools "must be closely supervised to prevent abusing the rights and the privacy of ordinary Americans. All too often, the Bush administration has treated safeguards for databases as a disposable afterthought if at all."

Sen. Joseph Lieberman, I-Conn., chairman of the Senate Homeland Security Committee, said DHS "must follow federal privacy laws — in this case the E-Government Act which requires privacy impact assessments before personal information can be used — in order to maintain public support for these new technologies."

Among the data the privacy office found had been plugged into ADVISE pilot projects were:

_The no-fly list of people barred from domestic air travel and the list of people who require special inspections before flying.

_More than 3.6 million shipping records from a commercial data provider with names of cargo shippers and consignees.

_Terrorist Screening Center lists of people who tried to cross the U.S.-Canadian border at a port-of-entry.

_Classified intelligence reports about illicit traffic in weapons of mass effect.

_Lists of foreign exchange students, immigrants under investigation and people from special interest countries.

Although Knocke said ADVISE "was never used in an operational environment" and DHS had assured Congress in 2006 it was not operational, the inspector general found that "on at least one occasion, the data was used to produce classified intelligence information."

At Lawrence Livermore, analysts used the pilot system "to uncover previously unknown connections between organized crime and terrorism," the IG found in a July report quietly made public last month.

The privacy office concluded that although required privacy analyses were ignored, the Privacy Act was not technically violated because the live data were covered by privacy notices issued earlier for other programs that originally gathered the information. Dempsey argued those were too vague to alert citizens how ADVISE would use their data.

___

DHS inspector general report:

http://www.dhs.gov/xoig/assets/mgmtr...7-56_Jun07.pdf

DHS privacy office report:

http://www.dhs.gov/xlibrary/assets/p...rpt_advise.pdf

http://www.guardian.co.uk/uslatest/s...899815,00.html





"Loss Prevention"

Papers Please: Arrested At Circuit City

Today was an eventful day. I drove to Cleveland, reunited with my father’s side of the family and got arrested. More on that arrested part to come.

For the labor day weekend my father decided to host a small family reunion. My sister flew in from California and I drove in from Pittsburgh to visit my father, his wife and my little brother and sister. Shortly after arriving we packed the whole family into my father’s Buick and headed off to the grocery store to buy some ingredients to make monkeybread. (It’s my little sister’s birthday today and that was her cute/bizare birthday request.)

Next to the grocery store was a Circuit City. (The Brooklyn, Ohio Circuit City to be exact.) Having forgotten that it was my sister’s birthday I decided to run in and buy her a last minute gift. I settled on Disney’s “Cars” game for the Nintendo Wii. I also needed to purchase a Power Squid surge protector which I paid for separately with my business credit card. As I headed towards the exit doors I passed a gentleman whose name I would later learn is Santura. As I began to walk towards the doors Santura said, “Sir, I need to examine your receipt.” I responded by continuing to walk past him while saying, “No thank you.”

As I walked through the double doors I heard Santura yelling for his manager behind me. My father and the family had the Buick pulled up waiting for me outside the doors to Circuit City. I opened the door and got into the back seat while Santura and his manager, whose name I have since learned is Joe Atha, came running up to the vehicle. I closed the door and as my father was just about to pull away the manager, Joe, yelled for us to stop. Of course I knew what this was about, but I played dumb and pretended that I didn’t know what the problem was. I wanted to give Joe the chance to explain what all the fuss was for.

I reopened the door to talk with Joe and at this point Joe positioned his body between the open car door and myself. (I was still seated in the Buick.) Joe placed his left hand on the roof of the car and his right hand on the open car door. I asked Joe if there was a problem. The conversation went something like this:

Me: “Is there a problem?”
Joe: “I need to examine your bag and receipt before letting you leave this parking lot.”
Me: “I paid for the contents in this bag. Are you accusing me of stealing?”
Joe: “I’m not accusing you of anything, but I’m allowed by law to look through your bag when you leave.”
Me: “Which law states that? Name the law that gives you the right to examine my bag when I leave a Circuit City.”

Of course Joe wasn’t able to name the law that gives him, a U.S. citizen and Circuit City employee the right to examine anything that I, a U.S. citizen and Circuit City customer am carrying out of the store. I’ve dealt with these scare tactics at other stores in the past including other Circuit Cities, Best Buys and Guitar Centers. I’ve always taken the stance that retail stores shouldn’t treat their loyal customers as criminals and that customers shouldn’t so willingly give up their rights along with their money. Theft sucks and I wish that shoplifters were treated more harshly than they are, but the fact is that I am not a shiplifter shoplifter and shouldn’t have to forfeit my civil rights when leaving a store.

I twice asked Joe to back away from the car so that I could close the door. Joe refused. On three occasions I tried to pull the door closed but Joe pushed back on the door with his hip and hands. I then gave Joe three options:
“Accuse me of shoplifting and call the police. I will gladly wait for them to arrive.”
“Back away from the car so that I can close the door and drive away.”
“If you refuse to let me leave I will be forced to call the police.”

Joe didn’t budge. At this point I pushed my way past Joe and walked onto the sidewalk next to the building. I pulled out my phone and dialed 911.

Two minutes later Brooklyn, Ohio police officer Ernie Arroyo arrived on the scene. As I began to explain the story leading up to Joe Atha preventing my egress from the parking lot, officer Arroyo began to question why I refused to show my receipt in the first place. I explained that I lawfully purchased the contents in the bag and didn’t feel that it was necessary for me to let a Circuit City employee inspect the bag as I left. Officer Arroyo disagreed. He claimed that stores have the right to inspect all receipts and all bags upon leaving their store.

At this point Officer Arroyo asked to see my receipt and driver’s license. I handed over the receipt, and stated that my name is Michael Righi. Again, Officer Arroyo asked to see my driver’s license. The conversation went something like this:

Me: “I’m required by law to state that my name is Michael Righi, but I do not have to provide you with my driver’s license since I am not operating a vehicle.”
Officer Arroyo: “Give me your driver’s license or I will place you under arrest.”
Me: “My name is Michael Righi. I am not willing to provide you with my driver’s license.”
Officer Arroyo: “Turn around and up against the wall.”

At this point I was placed in handcuffs, patted down, had my wallet removed from my back pocket and was placed in the back of Officer Arroyo’s police car. My three siblings sat in the back of the Buick crying their eyes out, which is the only part of today that I regret. I wish my little brother and sisters didn’t have to watch this, but I knew exactly what I was doing and was very careful with my words. Other than putting my family through a little scare I don’t regret anything that happened today.

Officer Arroyo ran my father’s license plate, my driver’s license and inspected my two receipts along with the contents of my bag. He also handed over my Circuit City bag to Joe Atha and allowed him to ensure that in fact I stole nothing from the store.

While being driven down to the station in the back of the police car I struck up a conversation with Officer Arroyo. I asked him if he was surprised that my receipts matched the contents in the bag and in a surprise moment of honesty he admitted that he was. I then asked Officer Arroyo what charges were going to be brought against me. He explained that I had been arrested for failure to produce my driver’s license. I asked him what would happen if I never learned to drive and didn’t have a driver’s license. After all, at the time that he arrested me I was standing on a sidewalk outside a Circuit City. I wasn’t driving a car, and even when I was seated in the Buick I was a back seat passenger. The officer never gave me a satisfactory answer to this question, but promised to explain the law to me after I was booked.

This morning I slept through my alarm clock and was in a hurry to drive to Cleveland. I didn’t have time to iron my shirt, and this is what I regretted while my mugshot was being taken. Listen up kids. Always press your clothes because you never know when you’ll be unlawfully arrested.

Shortly after being booked, fingerprints and all, Officer Arroyo presented me with my charges:

ORD:525.07: Obstructing Official Business (M-2)
(a) No person, without privilege to do so and with purpose to prevent, obstruct or delay the performance by a public official of any authorized act within the public official’s offical capacity shall do any act that hampers or impedes a public official in the performance of the public official’s lawful duties.

Not being able to find the law in the books that states that a citizen must provide a driver’s license while walking through a parking lot, Officer Arroyo had to settle for “obstructing official business.” Keep in mind that the official business that I was supposedly obstructing was business that I initiated by calling the police. I called for help and I got arrested.

My father posted the $300 bail that was needed to get me out of jail and back on my way to Park Avenue Place. (Sorry for the lame Monopoly joke, but it’s my first time being arrested. Cut me some humor slack.) After being released I stuck around the police station for a little while to fill out the necessary paper work to press charges against the Circuit City manager who physically prevented me from leaving the parking lot. I’m most interested in seeing my charges dropped for refusing to present identification, but I view that as a completely separate issue from the store manager interfering with my egress.

I understand that my day would have gone a lot smoother if I had agreed to let loss prevention inspect my bag. I understand that my day would have gone a lot smoother if I had agreed to hand over my driver’s license when asked by Officer Arroyo. However, I am not interested in living my life smoothly. I am interested in living my life on strong principles and standing up for my rights as a consumer, a U.S. citizen and a human being. Allowing stores to inspect our bags at will might seem like a trivial matter, but it creates an atmosphere of obedience which is a dangerous thing. Allowing police officers to see our papers at will might seem like a trivial matter, but it creates a fear-of-authority atmosphere which can be all too easily abused.

I can reluctantly understand having to show a permit to fish, a permit to drive and a permit to carry a weapon. Having to show a permit to exist is a scary idea which I got a strong taste of today.

My hearing is scheduled for September 20th, 2007. I will be contacting the ACLU and the IDP on Tuesday (the next business day), and I plan to fight these charges no matter what it takes. I will provide updates on this page as events unfold.

September 1st, 2007 @ 10:50PM EST Update:The police officer never read me my Miranda rights. I’ve heard differing opinions on how much this really matters and will certainly be bringing this up with my attorney.

September 1st, 2007 @11:34PM EST Update:I found the detail on Ohio’s “stop and identify” law. I encourage you to read it in its entirety, but I will spell out the important part:

2921.29 (C) Nothing in this section requires a person to answer any questions beyond that person’s name, address, or date of birth. Nothing in this section authorizes a law enforcement officer to arrest a person for not providing any information beyond that person’s name, address, or date of birth or for refusing to describe the offense observed.

I stated my name to the police officer, and if he had asked me for my address and date of birth I would have provided that as well. The officer specifically asked for my driver’s license and this is what I was unwilling to provide. If I’m reading this correctly it would appear that Ohio’s law specifically protects citizens from having to hand over driver’s licenses unless they are operating a motor vehicle. This is what I always believed, but it’s nice to see it in writing.

September 2nd, 2007 @10:01AM EST Update: I was speaking to my father this morning about what unfolded yesterday, and he told me something that I was not aware of until this point. While I was speaking to Joe Atha from the back seat of the car, Santura stood in front of my father’s vehicle with his hands out to the side as a way of preventing him from driving forward. My father would not have been able to drive forward because Santura stood in the way, and he would not have been able to drive backwards because the open door would have hit Joe who was leaning into the car.

September 2nd, 2007 @ 4:15PM EST Update

A few people contacted me wanting to know if I was accepting donations for my legal fund. Donations would be greatly appreciated. If more funds are raised than are actually needed I will donate the excess to the ACLU. Donations can be made via PayPal to: paypal@michaelrighi.com.

September 2nd, 2007 @ 5:05PM EST UpdateThank you for those of you who have submitted donations to help me fight these charges. I have been overwhelmed with the response that this story has received in the past twelve hours. A few people contacted me wanting more information about the case before they felt comfortable making a donation. Here are some answers to your questions:

Q: Which police department arrested you?
A: I was a arrested by a police officer working for the City of Brooklyn, Ohio located at 7619 Memphis Avenue Brooklyn, Ohio 44144. This is in Cuyahoga County.

Q: What is your case number?
A: I don’t know if my case number is the same thing as my ticket number, but the officer gave me a summons with the following across the top: “Ticket Number: A10514″

Q: Did you get Officer Ernie Arroyo’s badge number?
A: Yes, his badge number is #49. His surpervisor is Sgt. Knapp, whose badge number is #36.

Q: How do I know this isn’t a scam to raise money?
A: You don’t. However, I urge you to learn about my reputation by reading these articles.

Q: Should I be boycotting Circuit City?
A: At this time I am not recommending a boycott of Circuit City because Circuit City has yet to respond to my complaint. I want to give them a chance to respond to this incident before determining whether or not it makes sense for me to endorse a boycott.
Q: Should I be contacting the Brooklyn, Ohio Police Department?
A: Thank you for expressing an interest in taking this matter up personally, and thank you to those of you who already contacted the Brooklyn, Ohio police department. However, I urge you to please not tie up their emergency services with complaints. If you would like to voice a complaint I think it would be more appropriate to do so with the mayor or city council. Their contact information is available at the Brooklyn, Ohio City Government web site.

Q: What is the best way to reach you?
A: I can be reached by email at michael dot righi at field expert dot com.
http://www.michaelrighi.com/2007/09/...-circuit-city/





Big Brother is Routine-Screening You
Tobin Harshaw

Just as we were trying to decide whether John Edwards’s health care proposal would force us to visit the doctor, Britain’s minority Conservative Party is toying with the opposite idea.

“In a bid to ease spiralling levels of obesity and other health concerns, a Tory panel said certain treatments should be denied to patients who refuse to co-operate with health professionals and live healthier lifestyles,” reports the Evening Standard of London. “And those who do manage to improve their general health by losing weight and quitting smoking, for example, would receive ‘Health Miles’ cards. Points earned could then be used to pay for health-related products such as gym membership and fresh vegetables.”

Blogging lawprof Ann Althouse is, naturally, not impressed:

I’m picturing a whole weird future where we trade in government-granted points. Just tell me what you want me to do to get them and what I can buy with them. The parties could compete. One candidate says we should get points for having sex and writing blog posts and lets us spend them at ecologically correct resorts and restaurants that serve organic food. The other candidate is offering points for abstaining from sex and reading didactic books and lets us spend them on vitamins and memory foam beds. It will be endlessly engrossing, and after a while, you won’t even be able to remember what you actually like or want anymore.
http://opinionator.blogs.nytimes.com...screening-you/





All UK 'Must Be On DNA Database'

Lord Justice Sedley is a senior appeal court judge

The whole population and every UK visitor should be added to the national DNA database, a senior judge has said.

The present database in England and Wales holds details of 4m people who are guilty or cleared of a crime.

Lord Justice Sedley said this was indefensible and biased against ethnic minorities, and it would be fairer to include everyone, guilty or innocent.

Ministers said DNA helped tackle crime, but there were no plans for a voluntary national or compulsory UK database.

A spokesman for Prime Minister Gordon Brown said to expand the database would create "huge logistical and bureaucratic issues" and civil liberty concerns.

'Largest in the world'

Shadow home secretary David Davis called for a Parliamentary debate and described the system for adding people to the database as arbitrary and erratic.

Nick Clegg, Liberal Democrat home affairs spokesman, said there was "no earthly reason" why someone who has committed no crime should be on the database - "yet the government is shoving thousands of innocent people's DNA details on to the database every month".

The DNA database - which is 12 years old - grows by 30,000 samples a month taken from suspects or recovered from crime scenes.

There has already been criticism of the database - the largest in the world - because people who are found innocent usually cannot get their details removed.

In one case, Dyfed-Powys Police stored the DNA of Jeffrey Orchard, 72, from Pembrokeshire, after he was wrongly arrested for criminal damage - and refused to remove it.

But Home Office Minister Tony McNulty said the database had helped police solve as many as 20,000 crimes a year.

Since 2004, the data of everyone arrested for a recordable offence in England and Wales - all but the most minor offences - has remained on the system regardless of their age, the seriousness of their alleged offence, and whether or not they were prosecuted.

It includes some 24,000 samples from young people between 10 and 17 years old, who were arrested but never convicted.

WHO'S ON THE DATABASE?
5.2% of UK population
Nearly 40% of black men
13% of Asian men
9% of white men
Source: Home Office and Census

In Scotland, DNA samples taken when people are arrested must be destroyed if the individual is not charged or convicted.

Lord Justice Sedley, who is one of England's most experienced appeal court judges, said: "We have a situation where if you happen to have been in the hands of the police then your DNA is on permanent record. If you haven't, it isn't.

"It means where there is ethnic profiling going on disproportionate numbers of ethnic minorities get onto the database.

"It also means that a great many people who are walking the streets and whose DNA would show them guilty of crimes, go free."

DNA PROFILING
Deoxyribonucleic acid (DNA) is found in virtually all cells
Only a tiny sample of saliva, blood, semen, etc, is needed for testing
At the molecule's core is a long sequence of chemical units, which is checked for a gender and 10 other 'markers'
Probability of a chance match is less than one in one billion
A match may be with a specific individual or hint at a relative
Profiles can provide indications of ethnic origin
They do not point to genetic disorders or susceptibilities

He said the only option was to expand the database to cover the whole population and all those who visited the UK, even for a weekend.

"Going forwards has very serious but manageable implications," he insisted. It means that everybody, guilty or innocent, should expect their DNA to be on file for the absolutely rigorously restricted purpose of crime detection and prevention."

Figures compiled from Home Office statistics and census data show almost 40% of black men have their DNA profile on the database. That compares with 13% of Asian men and 9% of white men.

Keith Jarrett, president of the Black Police Association, said the current system was "untenable" and backed the call for a universal database.

"You can't have a system where so many black youths who have done nothing wrong are perhaps going to the police station for elimination from a crime and find that their DNA is on the database," he said.

But Professor Stephen Bain, a member of the national DNA database strategy board, warned expansion would be expensive and make mistakes more likely.

"The DNA genie can't be put back in the bottle," he said.

"If the information about you is exposed due to illegal or perhaps even legalised use of the database, in a way that is not currently anticipated, then it's a very difficult situation."

'Ripe for abuse'

Mr McNulty said there were no plans to introduce DNA profiling for everyone in the UK, but "no-one ever says never".

He said Lord Justice Sedley's idea "has logic to it - but I think he's underestimating the practical issues, logistics, civil and ethical issues that surround it."

Mr McNulty denied the current database was unfair but accepted there was room for debate on the workings of the present system, including time limits on the storing of information.

He said any imbalance in the number of black and white youths whose DNA was stored reflected disproportionality in the Criminal Justice System rather than an inherent problem with the database.

But he added that he was glad a debate had begun and a review of how DNA samples were kept and used would be published next February.

Tony Lake, chief constable of Lincolnshire Police and chairman of the DNA board, said the DNA of people convicted or arrested for violent or sex offences should remain on the database for life, but that need not be the case for minor offences.

Shami Chakrabarti, director of human rights organisation Liberty, said a database for every man, woman and child in the country was "a chilling proposal, ripe for indignity, error and abuse".
http://news.bbc.co.uk/go/pr/fr/-/1/hi/uk/6979138.stm





Chinese Military Hacked Into Pentagon
Demetri Sevastopulo and Richard McGregor

The Chinese military hacked into a Pentagon computer network in June in the most successful cyber attack on the US defence department, say American #officials.

The Pentagon acknowledged shutting down part of a computer system serving the office of Robert Gates, defence secretary, but declined to say who it believed was behind the attack.

Current and former officials have told the Financial Times an internal investigation has revealed that the incursion came from the People’s Liberation Army.

One senior US official said the Pentagon had pinpointed the exact origins of the attack. Another person familiar with the event said there was a “very high level of confidence...trending towards total certainty” that the PLA was responsible. The defence ministry in Beijing declined to comment on Monday.

Angela Merkel, Germany’s chancellor, raised reports of Chinese infiltration of German government computers with Wen Jiabao, China’s premier, in a visit to Beijing, after which the Chinese foreign ministry said the government opposed and forbade “any criminal acts undermining computer systems, including hacking”.

“We have explicit laws and regulations in this regard,” said Jiang Yu, from the ministry. “Hacking is a global issue and China is frequently a victim.”

George W. Bush, US president, is due to meet Hu Jintao, China’s president, on Thursday in Australia prior to the Apec summit.

The PLA regularly probes US military networks – and the Pentagon is widely assumed to scan Chinese networks – but US officials said the penetration in June raised concerns to a new level because of fears that China had shown it could disrupt systems at critical times.

“The PLA has demonstrated the ability to conduct attacks that disable our system...and the ability in a conflict situation to re-enter and disrupt on a very large scale,” said a former official, who said the PLA had penetrated the networks of US defence companies and think-tanks.

Hackers from numerous locations in China spent several months probing the Pentagon system before overcoming its defences, according to people familiar with the matter.

The Pentagon took down the network for more than a week while the attacks continued, and is to conduct a comprehensive diagnosis. “These are multiple wake-up calls stirring us to levels of more aggressive vigilance,” said Richard Lawless, the Pentagon’s top Asia official at the time of the attacks.

The Pentagon is still investigating how much data was downloaded, but one person with knowledge of the attack said most of the information was probably “unclassified”. He said the event had forced officials to reconsider the kind of information they send over unsecured e-mail systems.

John Hamre, a Clinton-era deputy defence secretary involved with cyber security, said that while he had no knowledge of the June attack, criminal groups sometimes masked cyber attacks to make it appear they came from government computers in a particular country.

The National Security Council said the White House had created a team of experts to consider whether the administration needed to restrict the use of BlackBerries because of concerns about cyber espionage.
http://www.ft.com/cms/s/0/9dba9ba2-5...0779fd2ac.html





China Denies Cyber Spying Charges
AP

From the German chancellery to the Pentagon, government computer networks have been targeted by cyber spies that media reports say were directed by China's military.

China denies backing such attacks, and foreign governments have declined to openly accuse Beijing. Yet, after the spectacular test of a Chinese anti-satellite weapon this year, the reports are shining a new light on China's pursuit of ways to confront a stronger foe with unconventional strategies.

The reported Pentagon attack was the "most flagrant and brazen to date," said Alex Neill, an expert on the Chinese military at London's Royal United Services Institute. Neill, quoted by the British newspaper The Guardian on Wednesday, said such attacks began at least four years ago.

Critics say motives range from the stealing of secrets or confidential technology, to probing for system weaknesses and placing hidden viruses that could be activated in a conflict.

Experts say responsibility is not conclusive, pointing out that China is home to many insecure computers and networks that hackers in other countries could use to disguise their locations and launch attacks.

However, Chinese military thinkers have long debated such strategies as part of "asymmetric warfare" - the use of attacks on satellites, financial systems and computer networks to strike at a stronger conventional foe.

"In the information age, the influence exerted by a nuclear bomb is perhaps less than the influence exerted by a hacker," a pair of Chinese colonels wrote in a key 1999 work on asymmetrical strategies titled "Unlimited Warfare."

The June cyber attack on the Pentagon forced officials to take down an e-mail system in the office of Defense Secretary Robert Gates for more than a week, according to a report Monday in the Financial Times that quoted unidentified officials. It said the officials identified the People's Liberation Army as being behind the attack.

The Defense Department confirmed on Tuesday that the attack occurred, but it wouldn't identify the country from which it originated.

"It is often difficult to pinpoint the true origin of an intrusion into computer systems and even more difficult to tie the intrusion to a specific nation or government," Pentagon spokesman Bryan Whitman said.

China denied being behind the attack, saying that the allegations were "groundless" and that it opposes cyber crime.

The report marked the third time in two weeks that China's military was accused of hacking into the computers of foreign governments.

The Guardian earlier said Chinese attackers launched online assaults on the network at Britain's Parliament, the Foreign Office and Defense Ministry. Citing unidentified government officials, the newspaper said some of the hackers were believed to be from the Chinese military, although the British government refused to comment on the claim.

Last month, the German weekly Der Spiegel said computers at the chancellery and three ministries had been infected with so-called Trojan horse programs, which allow an attacker to spy on information in a computer.

The report, which appeared on the eve of German Chancellor Angela Merkel's visit to Beijing, said Germany's domestic intelligence agency believed hackers associated with the Chinese army might have been behind the attack.

China also called those accusations groundless, and Chinese experts stood by the government's claims.

"My government has already designated them as fabricated. I can't understand why these foreign media would want to harm their reputations on such a serious issue," said Shen Dingli, director of the Institute of American Studies at Fudan University in Shanghai.

The January anti-satellite test, in which a Chinese missile blew apart a defunct Chinese weather satellite, was seen as a warning to the United States, whose military is heavily dependent on its eyes in the sky to monitor and coordinate military action.

China did not announce the test and delayed confirming it afterward, leading to speculation that political leaders might not have been fully informed in advance.

Whether or not cyber attacks are officially approved, China has become a growing focus of global anti-hacking efforts, partly due to the size of the country's Internet user population, now estimated at 140 million.

In a report earlier this year, security software maker Symantec Corp. listed China as having the world's second largest amount of malicious computer activity, after the United States.

"The country is one of the most recognized international black-hat nations," it said, using the industry's term for destructive or criminal hacking.

Experts say attacks originating in China often employ standard weaponry such as Trojan horses and worms, but in more sophisticated ways. In some cases, hackers slip in after launching viruses to distract monitors, or coordinate multiple attacks for maximum effect.

Officers at the Norfolk, Va.-based Naval Network Warfare Command told reporters earlier this year that attacks coming from China far exceeded those from elsewhere in "volume, proficiency and sophistication," according to Federal Computer Week, a technology trade publication.

The deliberateness and thoroughness of the attacks led officials to believe they must be government supported, an officer said, speaking on background.
http://www.siliconvalley.com/news/ci_6809009





Love It? Check the Label
Alex Williams

UNTIL recently, Bill Allayaud, who works as a director for the Sierra Club in Sacramento, thought people who checked labels on clothing or toys to make sure they were “Made in the U.S.A.” were everything he was not: flag-waving, protectionist, even a little xenophobic.

But lately, he said, he is becoming one of them.

“Everything I buy now, I look at the label,” said Mr. Allayaud, 56, who explained that the “buy American” movement — long popular among blue-collar union workers and lunch-pail conservatives — no longer seemed so jingoistic, and was actually starting to come into vogue for liberals like himself who never before had a philosophical problem with Japanese cars or French wine.

He said the reasons for his change of heart are many: a desire to buy as many “locally made” products as possible to reduce carbon emissions from transporting them; a worry about toxic goods made in the third world; and a concern that the rising tide of imports will damage the economy and hurt everybody.

“Every time you see ‘Made in China,’ ” he said, “you think, ‘wait a minute, something’s not right here.’ ”

“Made in the U.S.A.” used to be a label flaunted primarily by consumers in the Rust Belt and rural regions. Increasingly, it is a status symbol for cosmopolitan bobos, and it is being exploited by the marketers who cater to them.

For many the label represents a heightened concern for workplace and environmental issues, consumer safety and premium quality. “It involves people wanting to have guilt-free affluence,” Alex Steffen, who is the executive editor of www.worldchanging.com, a Web site devoted to sustainability issues, said in an e-mail message. “So you have not only the local food craze but things like American apparel, or Canadian diamonds instead of African ‘blood diamonds,’ or local-crafted toys.”

With so many mass-market goods made off-shore, American-made products, which are often more expensive, have come to connote luxury. New Balance produces less expensive running shoes abroad, but it still makes the top-of-the-line 992 model — which the company says requires 80 manufacturing steps and costs $135 — in Maine. A favorite in college towns from Cambridge, Mass. to Berkeley, Calif., each model 992 features a large, reflective “USA” logo on the heel, and an American flag on the box.

American Apparel, which carries the label “Made in Downtown LA” in every T-shirt and minidress, famously brought sex appeal to clothing basics that are promoted as “sweatshop free.” In the process it won the allegiance of young taste-makers.

Many of the American designers now showing collections at New York Fashion Week, which runs through Sept. 12, will have their goods stitched in foreign factories, a reflection of the battering of American garment manufacturing. From 2001 to 2006, clothing production in the United States declined by 56 percent, the American Apparel & Footwear Association said.

American high-fashion designers who do make clothes domestically tend to be too small, or in the case of Oscar de la Renta and Nicole Miller, willing to pay a premium in labor costs in order to maintain strict quality control.

But these brands have yet to exploit the cachet of “Made in the U.S.A.” in their marketing, in the way that some non-runway labels have seized upon. The designer Steven Alan, for one, while avoiding the Bryant Park tents, makes his distinctive rumpled dress shirts, which sell for $168, in factories in the United States, many in New York City. His “Made in the U.S.A.” labels include an embroidered American flag, which he said helps send a subtle message to his target consumer — downtown, hip, discerning — that his clothes are not just another mass-market knock-off from Asia.

Even though it is not always justified, “there is a perception that because it is made overseas,” he said, clothing is produced to the “lowest common denominator — there is not the attention to detail.”

Any move by the affluent left to conspicuously “Buy American” seems like an inversion of the internationalist sensibility that it always wore as a badge of distinction, said Robert H. Frank, an economics professor at the Johnson school of management at Cornell. These people tended to be ardent free-traders as recently the Clinton years.

“They always think of themselves as more sophisticated,” Professor Frank said. “The farther away something comes from, the presumption, the better it is.”

The evolving image of many American-made products as small-batch, high-craftsmanship products is true in other connoisseur-friendly industries as well. Fender, the guitar maker, builds entry-level electric guitars in Mexico, but it still makes higher-end Stratocasters and Telecasters — including its hand-made Custom Shop models, which sell for several thousand dollars — in California.

In bicycles, too, Schwinn and Huffy have decamped to Asia, leaving high-end specialty companies like Trek and Cannondale alone making bikes in this country, where there is “a greater sense of craft and small scale,” said Matthew Mannelly,the chief executive officer of Cannondale. The company recently started producing its “entry level” bikes, priced $500 to $1,000, in Asia, but says it still makes the bulk of its product line — and its best bikes — in Bedford, Pa.

The new prestige of “Made in America” was not lost on Elizabeth Preston, a cycling advocate in Washington. While Ms. Preston, 33 , said that politically she is as “as far left as you can go,” she nonetheless felt drawn to the Handbuilt in the U.S.A. sticker on the $1,250 Trek road bike she bought for her boyfriend a few weeks ago. Since then, she has been showing off the sticker to friends.

“There’s something about the idea of the workmanship and supporting the United States’s economy,” she said.

Stephanie Sanzone, a graduate student in environmental policy at George Mason University, says she has seen ample evidence that a “buy American” attitude is expanding.

Ms. Sanzone, 47, who lives in Alexandria, Va., started the Web site www.stillmadeinusa.comthree years ago to list and promote American-made products, for environmental and economic reasons, she said.

Unlike many “Buy American” Web sites, which feature images of weeping bald eagles or quotations from Pat Buchanan, Ms. Sanzone, a Democrat, keeps her site nonpartisan. In the last month, she said, traffic has jumped fourfold, with new visitors including vegans, green shoppers, “Free Tibet” activists and visitors from the Web site democraticunderground.com. Many said the recall of Chinese-made toys inspired them to act, but many also told her that they were starting to expand their focus beyond toys.

“I’m getting all these impassioned e-mails saying, ‘I’m never going to buy anything made in China again,’ and it really is from a different crowd,” she said.

The recent recalls of Mattel toys, made in China with lead-based paint, prompted many parents to seek American-made toys. Joan Blades of Berkeley, Calif., president of MomsRising.org, a mothers’ rights advocacy group with 100,000 members, predicts many parents are going to be checking labels and favoring American-made products, even if they are as simple as wooden blocks, as the holiday season approaches. “I think more and more mothers are going to be particularly distrustful of goods made in China,” she said.

Indeed, some domestic companies, such as Stack & Stick, which produces building blocks, or Little Capers, which makes superhero costumes, are working American flags and “Made in the USA” messages into their advertising, as well as marketing themselves as a safe alternative.

Skeptics say there are limits to how far the National Public Radio demographic will go as it flirts with a cause long associated with the Rush Limbaugh crowd. It is hard to imagine, say, that people who tote reusable cotton bags to Whole Foods will ditch their beloved Saabs for an American-made Chevrolet Cobalt.

“People like that don’t even know where the Chevy store is,” said Ernie Boch, president of Boch Automotive in Norwood, Mass., who operates Honda, Subaru and Toyota dealerships in the Northeast. “It’s kind of like people who stay at the Four Seasons. They’ve heard of Motel 6, but they don’t stay there. It’s not part of their vernacular.”

Nonetheless, the new interest from yuppies in seeking out domestically made products is evident to traditionalists like John Ratzenberger, best known as the actor who played Cliff in “Cheers,” who grew up in the factory town of Bridgeport, Conn., and is now the host of “John Ratzenberger’s Made in America,” a Travel Channel show that celebrates craftsmanship at factories.

“When we started doing this show, we were accused of being xenophobic, flag-wavers,” said Mr. Ratzenberger, whose show began five years ago. “The more we did our show, the more people are looking around in their own towns, realizing once these companies close, it’s going to affect the fabric of their communities. Things they took for granted, like sponsors for Little League for example, aren’t there.”

“This,” he said, “goes right across the political spectrum.”
http://www.nytimes.com/2007/09/06/fashion/06made.html
JackSpratts is offline   Reply With Quote
Old 05-09-07, 09:19 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

Prank Starts 25 Years of Security Woes
Anick Jesdanun

What began as a ninth-grade prank, a way to trick already-suspicious friends who had fallen for his earlier practical jokes, has earned Rich Skrenta notoriety as the first person ever to let loose a personal computer virus.

Although over the next 25 years, Skrenta started the online news business Topix, helped launch a collaborative Web directory now owned by Time Warner Inc.'s Netscape and wrote countless other computer programs, he is still remembered most for unleashing the "Elk Cloner" virus on the world.

"It was some dumb little practical joke," Skrenta, now 40, said in an interview. "I guess if you had to pick between being known for this and not being known for anything, I'd rather be known for this. But it's an odd placeholder for (all that) I've done."

"Elk Cloner" _ self-replicating like all other viruses _ bears little resemblance to the malicious programs of today. Yet in retrospect, it was a harbinger of all the security headaches that would only grow as more people got computers _ and connected them with one another over the Internet.

Skrenta's friends were already distrusting him because, in swapping computer games and other software as part of piracy circles common at the time, Skrenta often altered the floppy disks he gave out to launch taunting on-screen messages. Many friends simply started refusing disks from him.

So during a winter break from the Mt. Lebanon Senior High School near Pittsburgh, Skrenta hacked away on his Apple II computer _ the dominant personal computer then _ and figured out how to get the code to launch those messages onto disks automatically.

He developed what is now known as a "boot sector" virus. When it boots, or starts up, an infected disk places a copy of the virus in the computer's memory. Whenever someone inserts a clean disk into the machine and types the command "catalog" for a list of files, a copy gets written onto that disk as well. The newly infected disk is passed on to other people, other machines and other locations.

The prank, though annoying to victims, is relatively harmless compared with the viruses of today. Every 50th time someone booted an infected disk, a poem he wrote would appear, saying in part, "It will get on all your disks; it will infiltrate your chips."

Skrenta started circulating the virus in early 1982 among friends at his school and at a local computer club. Years later, he would continue to hear stories of other victims, including a sailor during the first Gulf War nearly a decade later (Why that sailor was still using an Apple II, Skrenta does not know).

These days, there are hundreds of thousands of viruses _ perhaps more than a million depending on how one counts slight variations.

The first virus to hit computers running Microsoft Corp.'s operating system came in 1986, when two brothers in Pakistan wrote a boot sector program now dubbed "Brain" _ purportedly to punish people who spread pirated software. Although the virus didn't cause serious damage, it displayed the phone number of the brothers' computer shop for repairs.

With the growth of the Internet came a new way to spread viruses: e-mail.

"Melissa" (1999), "Love Bug" (2000) and "SoBig" (2003) were among a slew of fast-moving threats that snarled millions of computers worldwide by tricking people into clicking on e-mail attachments and launching a program that automatically sent copies to other victims.

Although some of the early viruses overwhelmed networks, later ones corrupted documents or had other destructive properties.

Compared with the early threats, "the underlying technology is very similar (but) the things viruses can do once they get hold of the computer has changed dramatically," said Richard Ford, a computer science professor at the Florida Institute of Technology.

Later viruses spread through instant-messaging and file-sharing software, while others circulated faster than ever by exploiting flaws in Windows networking functions.

More recently, viruses have been created to steal personal data such as passwords or to create relay stations for making junk e-mail more difficult to trace.

Suddenly, though, viruses weren't spreading as quickly. Virus writers now motivated by profit rather than notoriety are trying to stay low-key, lest their creations get detected and removed, along with their mechanism for income.

Many of the recent malicious programs technically aren't even viruses, because they don't self-replicate, but users can easily get infected by visiting a rogue Web site that takes advantage of any number of security vulnerabilities in computer software.

Although worldwide outbreaks aren't as common these days, "believe it or not there's exponentially more malware today than there ever was," said Dave Marcus, a research manager for McAfee Inc.'s Avert Labs. "We find 150 to 175 new pieces of malware every single day. Five years ago, it would have been maybe 100 new pieces a week."

Symantec Corp. formed the same year Skrenta unleashed "Elk Cloner," but it dabbled in non-security software before releasing an anti-virus product for Apple's Macintosh in 1989. Today, security-related hardware, software and services represent a $38 billion industry worldwide, a figure IDC projects will reach $67 billion in 2010.

Even as corporations and Internet service providers step up their defenses, though, virus writers look to emerging platforms, including mobile devices and Web-based services like social-networking sites.

"Malware writers can't assume you are on PCs or won't want to limit themselves to that," said Dave Cole, Symantec's director of security response.

That's not to say Skrenta should get the blame anytime someone gets spam sent through a virus-enabled relay or finds a computer slow to boot because of a lingering pest. After all, there no evidence virus writers who followed even knew of Skrenta or his craft.

Fred Cohen, a security expert who wrote his Ph.D. dissertation in 1986 on computer viruses, said the conditions were right, and with more and more homes getting computers, "it was all a matter of time before this happened."

In fact, a number of viruses preceded "Elk Cloner," although they were experimental or limited in scope. Many consider Skrenta's the first true virus because it spread in the wild on the dominant home computers of its day.

"You had other people even at the time saying, `We had this idea, we even coded it up, but we thought it was awful and we never released it,'" said Skrenta, who is now heading Blekko Inc., a month-old startup still working in stealth mode.

And where was his restraint?

Skrenta replied: "I was in the ninth grade."
http://www.washingtonpost.com/wp-dyn...083100968.html





"Storm Worm" Adds Millions of Computers to Botnet
Jacqui Cheng

The authors behind a specific strain of malware are trying every trick in the book to get users to succumb to their ill-meaning plans. You name it, they've used it: weather news, personal greetings, reports that Saddam Hussein is still alive, reports that Fidel Castro is dead, sexy women, YouTube, and even blogs. The group seems hellbent on creating the largest botnet to date, and they just might do it.

The "Zhelatin gang"—named after the trojan it installed—was responsible for what started out as the "storm worm." First spotted earlier this year, the spread of the "storm worm" started via e-mails purporting to provide information on some dangerous storms in Europe at the close of January. Users who fell for it were directed to a web site containing malicious code aimed at turning Windows PCs into spam bots.

It was a success, if you can call it that; Symantec security response director Dave Cole told InformationWeek in late January that the worm had accounted for 8 percent of global virus infections after a single weekend rampage.

Over time, e-mails containing links to the "storm worm" took on many forms, from supposed missile strikes to reports of genocide. Then last month security firm F-secure noted that the Zhelatin team had switched gears and was focusing on greeting-card spam. The e-mails originally directed users to a web site that prompted the download of ecard.exe, but eventually morphed slightly so that the link pointed to a site that claimed the user needed to install "Microsoft Data Access" in order to view the card. Naturally, this download installed a trojan on the user's computer for the purposes of relaying spam.

And that's when the changes began to speed up. Zhelatin changed its game mid-week to suggestive e-mails from lonely females, which prompted end users to click a link to see what they could do if they "get lonely." Days later, however, security firm Sophos noted that the e-mails had changed once again, this time to spam claiming to contain a link to an awesome new video on YouTube. Same tactic, same virus.

The "Blogging" worm

But if promises of Kelly Clarkson's latest music video in e-mail weren't enough, the worm has now switched its focus to blogs. Unlike the typical "comment spam" that many of us have grown used to on our personal blogs, the worm is actually getting into people's Blogspot accounts and creating new blog posts with links to the trojan.

Security software firm Sunbelt Software speculates that the posts are being made through Blogspot's mail-to feature, where users can e-mail their blog entries to specific addresses in order to have them posted to their blogs. This theory seems to make the most sense, as the worm would just need to comb the user's local contact list and send itself out to everyone on the list, including Blogspot. Heise Security notes that not all of the links work: "they appear to be referencing dynamically assigned IP addresses of infected computers and these computers are at the time either offline or have already been assigned a different IP address."

We may never know whether the Zhelatin gang even meant for the worm to spread to blogs, but the group is probably happy that it did. Heise estimates that, as of early August, 1.7 million computers were infected worldwide as part of a massive botnet, and that number has surely escalated since then. Heise warns that this size could prove a very dangerous threat: "[A]lthough the network has so far been primarily used to send spam, it could also be used for DDoS attacks on businesses or even countries."

Just how many computers are part of the botnet is anyone's guess, but estimates from some security firms are reaching as high as 10 million. Just last June the FBI warned that it had discovered more than a million PCs in a botnet. This looks to be just the tip of the iceberg.
http://arstechnica.com/news.ars/post...to-botnet.html





Storm Worm Botnet More Powerful than Top Supercomputers
Sharon Gaudin

The Storm worm botnet has grown so massive and far-reaching that it easily overpowers the world's top supercomputers.

That's the latest word from security researchers who are tracking the burgeoning network of Microsoft Windows machines that have been compromised by the virulent Storm worm, which has pounded the Internet non-stop for the past three months.

Despite the wide ranging estimates as to the size of the botnet, researchers tend to agree that it's one of the largest zombie grids they've ever seen -- one capable of doing great damage.

"In terms of power, the botnet utterly blows the supercomputers away," said Matt Sergeant, chief anti-spam technologist with MessageLabs, in an interview. "If you add up all 500 of the top supercomputers, it blows them all away with just 2 million of its machines. It's very frightening that criminals have access to that much computing power, but there's not much we can do about it."

Sergeant said researchers at MessageLabs see about 2 million different computers in the botnet sending out spam on any given day, and he adds that he estimates the botnet generally is operating at about 10 percent of capacity.

"We've seen spikes where the owner is experimenting with something and those spikes are usually five to 10 times what we normally see," he said, noting he suspects the botnet could be as large as 50 million computers. "That means they can turn on the taps whenever they want to."

No one could provide detailed and specific comparisons between the strength of the botnet and the top supercomputers, mainly because it is hard to know for sure the size of the botnet or the power of each computer that is part of the botnet.

Adam Swidler, a senior manager with security company Postini, told InformationWeek that while he thinks the botnet is in the 1 million to 2 million range, he still thinks it can easily overpower a major supercomputer.

"If you calculate pure theoretical throughput, then I'm sure the botnet has more capacity than IBM's BlueGene. If you sat them down to play chess, the botnet would win."

Since the botnet won't be entered in any supercomputer competition, what does this mean for the IT or security manager trying to protect a company?

It means the cyber criminals who control the botnet have a tremendous amount of destructive power at their fingertips. Early this summer, the Baltic nation of Estonia was pounded in a cyberwar that saw distributed denial-of-service attack primarily targeting the Estonian government, banking, media, and police sites.

To protect its network, the country had to shut down key computer systems, and targeted sites were inaccessible outside the country for extended periods.

Swidler said he has no doubt if the Storm worm bosses focused a denial-of-service (DoS) attack on a company, Internet service provider, or government agency inside the United States, it could do a great deal of damage.

"I think there's no question they could damage any single company, whether through a DoS attack or a spam barrage," he added. "I'd be less worried about a Yahoo or a Bank of America than the thousands of mid-sized banks that aren't as well protected. But undoubtedly, this could do a great deal of damage."

Swidler said there's always the background thought that an enemy of a country could basically rent the botnet and launch a DoS attack, shutting down government agencies, utilities or financial centers.

"It's a lot of computing power that could be focused to do a lot of damage," he added. "It's grid computing gone bad."

Last month, Ren-Isac, a collaboration of higher-education security researchers, sent out a warning that the Storm worm authors had another trick up their sleeves. The botnet actually is attacking computers that are trying to weed it out. It's set up to launch a distributed denial-of-service attack against any computer that is scanning a network for vulnerabilities or malware.

The warning noted that researchers have seen "numerous" Storm-related DoS attacks recently.

MessageLabs' Sergeant said the botnet also has been launching DoS attacks against anti-spam organizations and even individual researchers who have been investigating it.

"If a researcher is repeatedly trying to pull down the malware to examine it the botnet knows you're a researcher and launches an attack against you," he said.

Lawrence Baldwin, chief forensic officer of MyNetWatchman.com, said he doesn't have a handle on how big the overall botnet has become but he's calculated that 5,000 to 6,000 computers are being used just to host the malicious Web sites that the Storm worm spam e-mails are linking users to. And he added that while the now-well-known e-cards and fake news spam is being used to build up the already massive botnet, the authors are using pump-and-dump scams to make money.

"That's pretty scary," he said. "Cumulatively, Storm is sending billions of messages a day. It could be double digits in the billions, easily."

Swidler said that since mid-July, Postini researchers have recorded 1.2 billion e-mails that have been spit out by the botnet. A record was set on Aug. 22 when 57 million virus-infected messages -- 99 percent of them from the Storm worm -- were tracked crossing the Internet.

According to researchers at SecureWorks, the botnet sent out 6,927 e-mails in June to the company's 1,800 customers. In July, that number ballooned to 20,193,134. Since Aug. 8, they've counted 10,218,196.
http://www.itnews.com.au/News/60752,...computers.aspx





419Eater DDoS'd?
Spamnation

We've had a report that the popular scambaiting site 419Eater and the anti-scam site Scamwarners are the latest anti-spam sites to fall victim to a distributed denial of service (DDoS) attack. Both sites are down at this time. Details are hard to come by, but there's apparently been speculation that the attack originated from a Russian spamgang.

The Russians are pretty much the 'usual suspects' for any kind of DDoS attack. There's good reason to believe that the Zhelatin (Storm Worm) gang have been behind a number of other DDoS attacks this year, including an attack against anti-spam sites and download sites operated by a rival spam gang. Zhelatin are known to have spare capacity at the moment. There have been reports that they have built up a botnet containing more than a million computers, not all of which are currently being used for stock and pill spam.

For spam gangs like Zhelatin, a DDoS attack is just another item on the menu. When the firehose of the Zhelatin botnet gets turned on your site, it doesn't mean that it's the gang themselves who have singled you out for attack. It's more likely that the attack has been commissioned by one of their customers. In the same way that a customer can order a stock spam run, they can request a DDoS attack (although it has been claimed that DDoS attacks cost more than regular spam runs, because there is a greater risk that ISPs or law enforcement will react aggressively to shut down the machines involved).

Have the Nigerians paid to have 419Eater taken offline? While the picture we have of 419 scammers suggests that there are many people playing that particular game, there may be a few big fish who would have the money to commission an attack and an interest in seeing their particular enemies targeted. Still, it's unclear how much 419Eater would really have affected the scammers' business. While the site has some educational value and must certainly be an annoyance to some of the less sophisticated 419'ers (who waste time and energy on 'prospects' who turn out to be pranksters), it doesn't interfere directly with the spammer's business in the same way as, say, a blacklist site. Scamwarners, on the other hand, appears to be a more general anti-scam site, whose remit also covers such organized crime favorites as money transfer scams.

Earlier attacks have often seemed to be 'flavored', with several anti-spam sites of the same type hit simultaneously. For example, a Zhelatin attack against spamnation.info earlier this year also targeted other sites focusing on stock spam. Other attacks have targeted blacklists, anti-malware and -spyware sites, and general 'umbrella' sites like Spamhaus. (Although Spamhaus is probably under attack 365 days a year, so it may be hard to distinguish an attack from background noise). The current attack, with its focus on anti-scam sites, seems to fit that pattern.

Update: It seems that the DDoS attack has targeted additional sites. Artists against 419 was also hit recently (according to admins from that site, they had recently had some success in getting scam sites taken down, which apparently didn't go down well with the scammers). Another useful anti-scam site, CastleCops, has also been hit, along with other sites hosting antispam forums. One scam-fighter commented:
It kind of makes me smile though: we have definitely impacted somebody's profits ... Always a good day when that's the case.

It definitely looks as if this attack run was bought and paid for by the fake-check scammers and the phishers.
http://www.spamnation.info/blog/arch...ter_ddosd.html





Seattle Man Accused of Stealing Financial Data Via File-Sharing
Gene Johnson

A Seattle man has been arrested in what the Justice Department described as its first case against someone accused of using file-sharing digital data to commit identity theft.

Gregory Thomas Kopiloff primarily used Limewire's file-sharing program to troll other people's computers for financial information, which he used to open credit cards for an online shopping spree, federal prosecutors said Thursday.

Kopiloff was arrested Wednesday at his government-subsidized apartment a few blocks from the federal courthouse here. According to a four-count indictment, he bought at least $73,000 worth of goods online - including iPods and laptop computers - then resold those items at half-price and kept the proceeds. Investigators said he blew through most of the money supporting a gambling habit.

Authorities said they have identified least 83 victims - most of whom have teenage children and did not know the file-sharing software was on their computer. But investigators also said they believe the number of people affected was in the hundreds - and that in all they lost hundreds of thousands of dollars.

Kopiloff did not enter a plea during an appearance Thursday in U.S. District Court, and his court-appointed lawyer said she had not had time to review the charges. A detention hearing was set for Monday.

Though people have been prosecuted for using networks to illegally share copyrighted music, movies and software, the Justice Department called this the first version of an equally - if not more - troubling matter.

Each day, computer users inadvertently share hundreds of thousands of sensitive files through such programs, from banking statements and medical records to tax returns and legal documents, according to Robert Boback, chief executive of Tiversa Inc., a Pennsylvania firm that monitors file-sharing.

Typically the mistakes occur when a user downloads file-sharing software and accidentally allows it to share all files on a computer, rather than just music files, for example.

"If you are running file-sharing software, you are giving criminals the keys to your computer," said Assistant U.S. Attorney Kathryn Warma. "Criminals are getting access to incredibly valuable information."

When other users might search on Limewire for "Madonna," Kopiloff would search for "federal tax return," or for student financial aid forms or other financial information, Warma said. And instead of getting access to a few hundred files containing "Like a Virgin" or "Papa Don't Preach," he would get a few hundred files containing tax returns.

He would vet his victims before opening accounts in their name, ensuring they earned at least $150,000 a year and had good credit, she said.

Boback conducted a frightening demonstration during a news conference at the U.S. attorney's office. Using his company's technology, he showed - in real time - searches being conducted on peer-to-peer networks. As the searches were entered, they scrolled rapidly along the screen of his laptop. Many clearly concerned music files and pornography, but interspersed were scores looking for files that contained terms such as "password" and "medical billing."

"There are tens of thousands of individuals who make a living doing this," Boback said.

The issue also has national security implications, he noted. In July, the company found more than 200 classified documents available by searching a peer-to-peer network, including one that concerned troop movements in Iraq.

Boback testified before the House Oversight Committee on the issue July 24. He noted that among the files his company found was a confidential document addressed to Rep. Henry Waxman, the committee's chairman, concerning a pharmaceutical company's drug trials.

A Limewire representative could not immediately be reached for comment, but at the same congressional hearing, the chairman of Lime Wire LLC, Mark Gorton, said the company warns its users about the dangers posed by the software and instructs them on how to use it safely.

"We continue to be frustrated that despite our warnings and precautions, a small fraction of users override the safe default setting that comes with the program and end up inadvertently publishing information that they would prefer to keep private," Gorton said.

According to the indictment, Kopiloff began using Limewire and Soulseek - free file-sharing programs available on the Internet - about 2 1/2 years ago to search for people who had inadvertently allowed access to their sensitive files.

Kopiloff also obtained some sensitive information the old-fashioned way, from associates who would steal mail or go "Dumpster diving" for discarded financial records, the indictment said, adding that he would open credit accounts and then go shopping online, having items shipped to a UPS store, hotels or post office boxes.

He was arrested after one of his alleged victims, a Texas resident, told his company's security officer - a former Secret Service agent - about how his bank account had been compromised, with someone in Western Washington passing bad checks on his account. The agent forwarded the information to Secret Service agents and police in Seattle, Warma said. Kopiloff has a lengthy history of theft and drug convictions.

Kopiloff is charged with mail fraud, accessing a protected computer, and two counts of aggravated identity theft.
http://www.theolympian.com/northwest/story/209583.html





Sony Halts Production of Rootkit USB Sticks
Tom Sanders

Sony has ceased production of three Microvault USB memory key models that pose a potential security risk to Windows computers.

The spokesperson said that the elecontronics manufacturer stoped shipments of the product earlier this month. Rather than security concerns, however, the company phased out the product line because of "modest sales".

The company said that it is currently investigating the security issues. Pending the investigation, it is unable to say if it plans to instate a recall.

The three discontinued models are the USM-128C, USM-256F and USM-512FL, each of which comes equipped with an embedded fingerprint reader. Sony couldn't quantify the number of devices that have been distributed, but said that a "limited" number had been sold worldwide over the past few years.

Security vendor cautioned that malware writers could abuse a feature of the software that shipped with the device to hide malicious applications from the user and security software. The software, that is developed by Taiwan's FineArt Technology, operates in a way that resembles a rootkit.

In combination with the FineArt technology, the fingerprint reader controls access to the data stored on the device. The software stores information about authorised fingerprints in away that it is invisible to the end user as well as to some anti-virus software.

Although this helps in safeguarding the integrity of the fingerprint data, the folder also could provide a hiding place to viruses and other malware.

A different division of Sony got caught in a rootkit scandal two years ago. Record label Sony BMG at the time put rootkit technology on some of its music CDs in an effort to prevent illegal file sharing.

F-Secure, together with software developer Mark Russinovich, outed the label for using the technolgoy. Sony initially denied that it posed any security concerns, but was proven wrong the malware started exploiting the rootkit functionality. The scandal lead to a government investigation and several lawsuits, the majority of which has since been settled.
http://www.itnews.com.au/News/60374,...sb-sticks.aspx





Connecticut Revenue Agency Reports Missing Laptop

Data about 106,000 state taxpayers was exposed in the theft of a notebook.
Jaikumar Vijayan

Connecticut Gov. Jodi Rell has ordered the state's IT agency to implement new controls for protecting sensitive data on laptops after a recent theft exposed data on 106,000 taxpayers in the state.

Under her directive, the state's CIO has until Sept. 7 to come up with a Laptop Computer Security Policy and associated guidelines for state employees. The policy will require agencies to monitor and restrict sensitive data on laptops and expand the use of secure data access and transport tools, including VPN technology. The new policy is also expected to spell out data breach notification guidelines under which state agencies would be required to immediately notify Connecticut's Department of Information Technology when a laptop is stolen or goes missing.

Rell also ordered the state's IT group to accelerate the selection and deployment of encryption tools for use by agencies.

The governor acted after the state's Department of Revenue Services (DRS) disclosed earlier this week that a laptop containing personally identifiable data on more than 106,000 taxpayers had gone missing. That marked the third report this week of a laptop containing sensitive data being stolen.

In an official statement, the department offered very little information on what might have happened or when the laptop was stolen. All it said was that the missing laptop was password protected and contained details such as Social Security numbers and taxpayer names.

"The agency has no information to date that any of the data has been accessed. All actions being undertaken by DRS are preventative," the statement said. A statement announcing Rell's measures indicated that DRS waited 11 days after the loss to start notifying affected individuals.

The DRS said it has notified the appropriate law enforcement authorities and is in the process of informing all of those affected by the theft. The department has also set up a Web site that state taxpayers can use to find out whether their names were on the compromised list. In addition, the state has contracted with Debix Identity Protection Network (Debix) to provide credit monitoring services to those affected by the theft.

The department did not offer any information on whether the data on the laptop might have been encrypted. But in the past, analysts have noted that when breached entities do not refer specifically to encryption in their notifications, it's a pretty good bet to assume that they did not use encryption to protect data.

The Connecticut theft is the third such incident to make news this week. AT&T Thursday confirmed that a laptop containing unencrypted personal information on an unspecified number of current and former employees of AT&T Corp. (now owned by SBC) was stolen from the vehicle of a consultant working for the company.

The other incident involved a similarly unprotected laptop at Maryland's Department of the Environment. As with the AT&T compromise, no details were released on how many people might have been affected by that theft, which involved a computer containing personally identifiable information on individuals who had been issued licenses by four separate state agencies.
http://www.washingtonpost.com/wp-dyn...083101138.html





Load and lock

Seagate's New Drives: 250GB Notebook, Hardware Encrypted Desktop
Jon Stokes

Seagate has announced two new drives today: one for the desktop and another for portables. The new desktop drive, the 1TB 7200 rpm Barracuda FDE, is the first drive of its size to contain an embedded encryption processor that encrypts all the data on the drive as it's written. In other words, it does something similar to Microsoft's BitLocker and Apple's FileVault but in hardware at a level beneath the operating system.

The Barracuda FDE's DriveTrust encryption requires the user to enter a password prior to the boot-up stage so that the drive can decrypt the user's data, which has been encrypted by AES. This boot password can be paired with other pre-boot, hardware-based security measures, like biometrics and smartcards. Because the drive is unlocked prior to boot and remains accessible in the clear while the machine is powered on, this technology isn't quite yet suited for portables. The aforementioned BitLocker and FileVault solutions are aimed at portable users who worry about having their laptops stolen, and don't want hackers to have access to their data on waking the machine from sleep.

Seagate says that there's a DriveTrust SDK that software vendors can use "to build DriveTrust Technology-enabled applications such as access controls needed to manage encryption keys, passwords and other forms of authentication for large deployments," but this still doesn't suggest to me that the drive's encryption functionality could be readily integrated with a post-boot, login-based solution like FileVault. It's not a stretch to imagine that another revision of DriveTrust aimed at portables is on its way, however, and that it will feature such functionality.

For my part, I can already envision this drive as the basis for a new generation of consumer NAS devices that have a side-panel keypad for unlocking the device's drives on boot. Infrant, are you listening? Because I worry enough about thieves breaking into my home and walking out with my handily portable ReadyNAS NV+ that I jumped through hoops with OS X and various third-party apps to make sure that my nightly backups over my LAN are secure.

250GB of notebook storage ought to be enough for anybody

At 2.5" and 5400RPM the Momentus 5400.4 packs 250GB of storage into a very small space, but that particular combination of density and storage capacity is by no means a first. All the usual suspects (Wester Digital, Hitachi, Fujitsu, Samsung) have already introduced 2.5" drives this size or larger. But Seagate claims this new drive is the first notebook drive to use perpendicular recording, which cuts down on platter surface area to improve power efficiency and failure rates.

Note that Hitachi actually has a 250GB notebook drive with a similar encryption option as the Seagate 1TB desktop drive described above: the Hitachi Travelstar 7K200. Does anyone know if this thing's encryption functionality works in a MacBook Pro? If it does then I want one. I had problems with FileVault and had to disable it.

The Momentus will ship in the fourth quarter of this year, and the Barracuda FDE will ship in early 2008. There's no word on pricing at this time.
http://arstechnica.com/news.ars/post...d-desktop.html





Romancing the Flat Pack: Ikea, Repurposed
Penelope Green

Winnie Lam was thinking about food when she made her Chocolate Sundae Toppings footstool, fashioned from a few bags of cotton pompoms hot-glued to an Ikea stool. “It came from staring into a bowl of ice cream one day,” said Ms. Lam, 31, who lives in Mountain View, Calif., and is a product manager at Google. “I’m a chocolate lover, but I’d rather look at it than eat it.”

Alex Csiky, a 43-year-old guitar maker in Windsor, Ontario, was focused, as he always is, on blowing a raspberry at the guitar-making industry while at the same time making a great sound when he built his sleek blond electric guitar from an Ikea pine tabletop.

Meanwhile, Christine Domanic, 28, an artist who was living at the time in Philadelphia, found the inspiration for her rolling bench in the sex ads in the back of city magazines. Her endearing Wiener Bench — a wooden bench festooned with fat pink crocheted tubes — was made from an old Ikea side table, the yarn from 60 used sweaters and the stuffing from a sofa left on her street on trash day.

Ms. Lam, Mr. Csiky and Ms. Domanic have never met but they are nonetheless related, connected by a global (and totally unofficial) collective known as the Ikea Hackers. Do-it-yourselfers and technogeeks, tinkerers, artists, crafters and product and furniture designers, the hackers are united only by their perspective, which looks upon an Ikea Billy bookcase or Lack table and sees not a finished object but raw material: a clean palette yearning to be embellished or repurposed. They make a subset of an expanding global D.I.Y. movement, itself a huge tent of philosophies and manifestoes including but not confined to anticonsumerism, antiglobalism, environmentalism and all-purpose iconoclasm.

“I think there is a movement around looking at all the products that are available — this global stream of stuff — and realizing you can tinker with them and rebuild them,” said Michael F. Zbyszynski, 36, the assistant director of music composition and pedagogy at the Center for New Music and Audio Technologies at the University of California, Berkeley, whose own hack is a speaker array made from red plastic Ikea salad bowls, and who has made other musical objects from PVC plastic and coffee cans that “live in the zone of the hack,” he said.

“It’s all about not accepting what’s presented for sale as it is,” Mr. Zbyszynski said, “about not just doing a ‘paint by numbers’ of your life.”

The hackers have lately gained a salonničre in Mei Mei Yap, a 37-year-old Malaysian copywriter who lives in Kuala Lumpur and works for an advertising agency there. Ms. Yap, who calls herself Jules, for the Ikea chair she loves, and who has no affiliation with the mammoth Swedish furniture maker that makes it, is not, she said by phone from her apartment, particularly handy, but with her year-old blog, ikeahacker.blogspot.com, she has created a forum for those who are very handy indeed. With a keen eye and an open heart, Ms. Yap has built an encyclopedia of hacks by trawling craft and design Web sites and by inviting personal submissions.

Ms. Yap said she lives with a family of rapidly reproducing guppies and lots of Ikea furniture, but hardly any hacks. “Well, there are maybe three,” she said, describing a tower of wall cabinets, a side table made into a mobile home office unit, and a bathroom cabinet she added doors to. “But they don’t even qualify for my site.”

She presents hacks that are kitschy-useful, like Sara Madole’s bright green rolling cat litter box (Ikea hackers seem to be overwhelmingly cat people), which Ms. Madole, a 27-year-old law school graduate who lives in Houston, said she built from two Ikea Snack boxes. Ms. Yap also collects hacks that are meta in both concept and design, like the Nata Vintage chair — made by Anatomic Factory, a design collective in Florence, Italy — a Duchampian object that marries a walking cane with an Ikea chair.

“Nata vintage” — meaning, roughly, born vintage — “stems from a reflection on the eternal return of the ‘old’ as a recurrent tendency of the market,” Marco Popolo, one of the object’s designers, explained by e-mail. “Therefore let us make a provocation: what better way to sell a vintage chair than to borrow a walking stick (stereotype of the old) to replace a leg of a classic, stereotyped Ikea chair?”

Mr. Popolo wrote that he has been following Ms. Yap’s blog, which he called a “very interesting big container rich with ingenious and original ideas,” since its inception, drawn to the fact that it’s about “stuff made by common people” — as opposed to designers — who are trying to customize their lives. “This is a very contemporary phenomenon,” he said.

More prosaically, Ms. Yap said: “I think Ikea just makes it easy to D.I.Y. because it already has a system in place of mixing and matching this frame with that cabinet and those knobs. Hacking just takes it a little further, repurposing it to fit your needs. And maybe the geek-nerd in us hackers feels a buzz having outsmarted the Ikea system by creating something of our own.”

Some of the most ingenious hacks are as simple as a $6.99 Ikea desk lamp reimagined as a wall sconce, or stainless steel shelving reworked as a coffee table. The word hack is filched, as Shoshana Berger, editor in chief of ReadyMade magazine put it, from computer parlance, as in, “hacking into the mainframe.”

“The idea is you’re getting in through the backdoor,” Ms. Berger said, “and reinventing what’s there.”

In the 1990s, when Ms. Berger was a “cool hunter” at Y&R, the branding, marketing and advertising agency, “we used to call this ‘post-purchase product alteration, ’ ” she said, noting that Ikea hackers’ predecessors can be found in fashion, with the deconstruction movement fomented by the Belgians in the late ’80s, and in architecture.

“There is a long history of hacking industrial artifacts or found objects and turning them into high design,” she said, drawing a straight line from Buckminster Fuller to Lot-Ek, the Manhattan architectural firm that has played with cargo containers, industrial sinks and truck tanks. “But to my knowledge Ikea is the only company that is appealing to the do-it-yourselfer.”

Why Ikea, the 60-year-old megabrand whose perky Swedish style has homogenized living rooms from Europe to Malaysia (it now has 265 stores in 35 countries), should be so hackable has everything to do with its price point and, perhaps, its benign-seeming blondness.

There are hackers who have upended and truly subverted the happy Ikea message, like Guy Ben-Ner, an Israeli video artist who made a treehouse of Ikea furniture and an instructional video featuring a man who is a combination Robinson Crusoe, Jewish settler and Ikea salesman. The piece, which he showed at the 2005 Venice Biennial, was all about “the illusion of creating” that comes from the sort of D.I.Y. that regular Ikea shoppers practice, along with an attendant illusion of individuality. The Ikea-D.I.Y. promise is that “we shall all have, eventually, the same ‘private’ homes,” Mr. Ben-Ner said.

But most of the hackers Ms. Yap has collected aren’t perpetrating truly subversive acts. They are more focused on the pleasures of reinvention, and on modifying Ikea’s wares to suit their homes and personalities.

Mona Liss, director of public relations for Ikea in the United States, took her first look at Ms. Yap’s blog a few weeks ago, pointed there by this reporter. “I could spend all day looking at this,” she said, and then opined that what compels an Ikea hacker to hack, in addition to what she called Ikea’s clean palette, “is this invisible aura of Ikea, something in our DNA that is inviting and unspoken.”

“Being an Ikea worker,” she continued with animation, “I can tell you we’re a culture that’s asked to challenge conformity, to speak outside the box.”

Or outside the flat pack, as the company’s special packaging is called.

Ikea hacking reminded Ann Mack, 31, director of trend-spotting at JWT, the blue-chip advertising agency once known as J. Walter Thompson, of the way ad campaigns are spoofed on YouTube. “Customization is so huge for a demographic that’s skewing younger and younger,” she said. “They don’t want to be told by ‘the man’ what they should consume and how exactly they should consume it. That’s boring. They can make their own playlist. They can take a product and make it truly their own.”

In any case ReadyMade, Ms. Berger’s magazine, which she started in December 2001 and comes out every other month, was designed for hackers of all stripes. It’s a hybrid, part Martha Stewart, part Mrs. Beeton, for a reader who listens to the Silver Jews, reworks ads to display on YouTube and might turn rubbings of manhole covers into backlighted mandalas or repurpose an Ikea Billy shelf into a bed, following instructions that ran in the magazine in 2005 in an article called “Ikea Your Way.”

The magazine itself was a D.I.Y. project until last fall, when it was bought by the Meredith Corporation. Its success — it now has a circulation of 250,000 — has resulted in large part from the mind-set of a generation that came of age in the late 1980s and early ’90s with self-authoring tools, Ms. Berger said, “like editing their own movies and photos on their computers, blogging, creating their own Web sites.”

“They feel very capable and resourceful,” she said.

The rise of the computer culture, as resourceful as it is, means that “we are no longer a tactile culture,” Ms. Berger continued, “so there is this yearning for things that are hands-on and handmade.”

ReadyMade is part of a universe of D.I.Y. media and forums where Ikea hacks appear and are then found by Ms. Yap, who links her blog to them. It’s a universe that includes Make magazine (more science than design-geeky, for the handmade-robot set) and Web sites like instructables.com, which was created by M.I.T. Media Lab alumni as a forum for its users to share knowledge about how to make or do practically anything, including, as a glance at the home page the other day revealed, a quick banana nut bread and “hacking a toilet for free water.” Mr. Zbyszynski’s speaker array, with its goofy “Lost in Space” aesthetic, first appeared there.

The do-it-yourselfer’s agora is the two-year-old Etsy (etsy.com), run out of a 7,000-square-foot warehouse in Brooklyn by Robert Kalin, 27. He founded the site — an online community of 400,000 members, including crafters, designers and, inevitably, Ikea hackers — as an old-fashioned bazaar to sell handmade objects and promote “human-to-human contact,” as he described it. In July, Mr. Kalin said, Etsy sold its millionth item. “I don’t know if it’s anachronistic or ambitious,” he said, “but I just want to make everything I own.”

Mr. Kalin said that to him and his fellows at Etsy, Ikea is a natural resource. “We don’t look to a forest for wood,” he said. “We don’t want to use ‘new’ wood. We look at a Dumpster or an Ikea store as a place to go harvest ‘raw’ materials. It’s a very urban phenomenon: we have the resources we need and we have become expert at repurposing them, like taking these broken Ikea chairs and making them into a table.”

Mr. Kalin is big on “upcycling,” a process whose name was coined by William McDonough, an architect, and Michael Braungart, a chemist, in their 2002 book, “Cradle to Cradle: Remaking the Way We Make Things.” They used the term to describe the process of taking something that’s essentially waste and moving it up the consumer-goods chain. “I love upcycling,” Mr. Kalin said. “I love this idea of bringing something from lower down and elevating it.”

Etsy held an upcycling contest last spring, inviting its users to make something of value out of materials that would otherwise end up on the trash heap. Christine Domanic’s Wiener Bench won first place. Last month, Ms. Domanic joined the Etsy staff as a marketplace coordinator, helping Mr. Kalin restructure the site. She has donated her bench to the Etsy lab.

“Anyone can come and see it,” she said. “It’s really comfortable and fun to scoot around the floor on.”
http://www.nytimes.com/2007/09/06/garden/06hackers.html





FEC Resolved Two Matters Involving Internet Activity; Applies Media Exemption to Political Blogs
Press Release

WASHINGTON – The Federal Election Commission announced today that it has unanimously resolved two complaints alleging that Internet blog activity is subject to Commission regulation, finding that the activity is exempt from regulation under the media or volunteer exemption.

In Matter Under Review (MUR) 5928, the Commission determined that Kos Media, L.L.C., which operates the website DailyKos, did not violate the Federal Election Campaign Act. The Commission rejected allegations that the site should be regulated as a political committee because it charges a fee to place advertising on its website and it provides “a gift of free advertising and candidate media services” by posting blog entries that support candidates. The Commission determined that the website falls squarely within the media exemption and is therefore not subject to federal regulation under the Act.

Since 1974, media activity has been explicitly exempted from federal campaign finance regulation. In March 2006, the Commission made clear that this exemption extends to online media publications and that “costs incurred in covering or carrying a news story, commentary, or editorial by any broadcasting station. . . , Web site, newspaper, magazine, or other periodical publication, including any Internet or electronic publication,” are not a contribution or expenditure unless the facility is owned by a political party, committee, or candidate. With respect to MUR 5928, the FEC found that Kos Media meets the definition of a media entity and that the activity described in the complaint falls within the media exemption. Thus, activity on the DailyKos website does not constitute a contribution or expenditure that would trigger political committee status. The Commission therefore found no reason to believe Kos Media, DailyKos.com, or Markos Moulitsas Zuniga violated federal campaign finance law.

In MUR 5853, the Commission rejected allegations that Michael L. Grace made unreported expenditures when he leased space on a computer server to create a “blog” which advocated the defeat of Representative Mary Bono in the November 2006 election. The Commission also rejected allegations that Grace coordinated these expenditures with Bono’s opponent in the race, David Roth, and found that no in-kind contributions to Roth’s campaign resulted from Grace’s blogging activity. The Commission also found that the respondent did not fraudulently misrepresent himself in violation of 2U.S.C. § 441h.

The Act exempts from regulation volunteer activity by individuals. In the FEC’s Internet regulations, the Commission clarified that an individual’s use, without compensation, of equipment and personal services for blogging, creating, or hosting a website for the purpose of influencing a Federal election are not expenditures subject to the restrictions of campaign finance law. Even if there were some costs or value associated with Mr. Grace’s blog, these costs are exempt from Commission regulations. The FEC therefore found no reason to believe Mr. Grace or the Roth campaign violated federal campaign finance law.

Additional information regarding MURs can be found on the FEC website at http://www.fec.gov/em/mur.shtml.
http://www.fec.gov/press/press2007/20070904murs.shtml





Bat Boy Collapses in Checkout Lane!
Thomas Vinciguerra

It’s probably safe to say that no other newspaper in the annals of journalism scored as many shocking scoops as The Weekly World News.

Remember the story about Hillary Clinton’s affair with an outer-space alien? The African tribe that worships Barbra Streisand’s nose? Heaven being photographed by the Hubble Space Telescope?

Such was the grist of The News, “The World’s Only Reliable Newspaper,” which at its peak in the 1980s had a circulation of 1.2 million. For 28 years, until its final issue last Monday, no other tabloid was plucked from supermarket checkout lanes with such guffaws, disbelief and glee, though its editors say there were plenty of believers, too.

And no Weekly World News story was more enduring than the saga of Bat Boy, the half-human, half-bat who first appeared in 1992. “Discovered” in a cave in West Virginia and distinguished by his fangs, pointed ears and bulging eyes, Bat Boy became a pop culture icon. He inspired a well-received Off Broadway musical. A Weekly World News anthology published in 2005 was titled “Bat Boy Lives!” When The News folded, a deal was under way to produce Bat Boy action figures.

Why such interest?

Perhaps it was because Bat Boy was preposterous, but not so outrageous as to be completely unbelievable.

“What made a great Weekly World News story is that it’s got to start with verisimilitude,” said Paul Kupperberg, the paper’s last executive editor.

“We’ve all seen weird-looking people in the world,” he said. “I was with my son at Coney Island a few weeks ago and I saw a sideshow guy who looked like a wolf. So it’s possible.”

Stan Sinberg, a former Weekly World News writer, offered a similar analysis.

“I have a Bat Boy T-shirt that I wear around, especially overseas,” he said. “People ask me if it’s real. It’s one of those things that is so ludicrous that it’s grotesquely appealing.”

Bat Boy was also a sympathetic character. Since society didn’t understand him (Was he a mutant? Was he evil?), it feared him. The government repeatedly imprisoned him. Happily, he always managed to escape.

“A lot of the Weekly World News stock in trade was government conspiracies,” Mr. Kupperberg said. “You take a cute, cuddly, I-want-to-be-left-alone character like Bat Boy and sic the government on him, and you have a story.”

In 2004, The News spun him into a comic strip in the paper written and drawn by Peter Bagge. “I had Bat Boy running for president, Bat Boy going to the moon,” Mr. Bagge said.

Alas, for all his powers, Bat Boy could not save the tabloid that made him a household name. Last year, American Media Inc., The News’s parent company, suffered a net loss of $160 million, and the paper’s circulation fell to 83,000, according to filings at the Securities and Exchange Commission. In a media world populated by The Onion, The Daily Show and other cutting-edge satire, Bat Boy’s adventures seemed passé.

Mr. Bagge has another explanation for the decline of The Weekly World News. “What was killing them was advertising,” Mr. Bagge said. “I said to my editor, Garry Messick, ‘Where did all the advertisers go?’ And he said, ‘They’re the same people who spam you all day. Why should they advertise?’ ”

Mr. Sinberg said that when the average number of stories per issue dropped from about 50 to 25, readers simply gave up.

“Even though they’re not the most intelligent audience in the world,” Mr. Sinberg said, “they knew they were getting less for their money.”
http://www.nytimes.com/2007/09/02/we...w/02basic.html





Vanity press

Murdoch Company to Distribute China Book
AP

A travel book published by China's military will be distributed around the world by a publishing arm of Rupert Murdoch's News Corp. in time for the 2008 Beijing Olympics, the People's Liberation Army Daily said.

The official newspaper of the world's largest military said Friday that "Travel Around China" would be distributed in 25 languages by HarperCollins Publishers, a subsidiary of News Corp., in an agreement signed at the Great Hall of the People in Beijing.

The military newspaper said the travel book had been published by the Blue Sky Publishing House belonging to the People's Liberation Army Air Force.

"Selling the copyright to the largest publisher in the world is part of the 'going global' strategy of the Blue Sky Publishing House," the newspaper said.

It quoted unidentified sources as saying HarperCollins would donate 2,000 copies of the English version of the book to the organizers of the Beijing Olympics in the hope it would be designated "an official travel guide for the 2008 Beijing Olympic Games."
A HarperCollins statement posted Friday on its Web site did not mention the travel book, but said the company had signed several cooperative initiatives in China.

It said they include a deal with the People's Literature Publishing House to initially publish "five Chinese classic titles" in English. It did not identify the titles.

Murdoch's pursuit of business in China and perceived willingness to kill projects likely to rankle the government have raised concerns in media and human rights circles about his $5 billion purchase of Dow Jones, the parent company of The Wall Street Journal.

The Journal has won two Pulitzer Prizes over the past seven years for its often-critical coverage of the government's economic and social measures.

A handful of reporters from The Journal's Beijing bureau this year urged Dow Jones in an open letter to reject Murdoch's takeover bid over concerns that he would meddle in the newspaper's China coverage.
http://www.washingtonpost.com/wp-dyn...090100494.html





A Space for Us
Pagan Kennedy

I first ventured onto MySpace this winter. After a few minutes of exploring, I clicked into a profile posted by a girl smashed on vodka. Her photo showed her slumped across her desk, blond hair fanning over her laptop. Here’s the most disturbing part of the story: I had found this kid by searching on my own name. She’d listed one of my novels, “The Exes,” as a favorite book. My God, was this my target audience? And if I set up a profile on MySpace, could I ask a booze-addled 17-year-old to be my friend? Or would I come off as a pedophile?

I’d jumped into the social-networking site after a fellow author told me I absolutely had to use MySpace to promote my forthcoming book. “I’d try it myself, but I feel too old to be on that thing,” she said. So here I was navigating though pages of Hello Kitty wallpaper and frat brothers wearing chicken heads. Supposedly, thousands of writers had migrated onto MySpace, but where were they? Eventually, through trial and error, I discovered the best way to find them: if you type the right word into the site’s search engine — say, “Foucault” or “Kafka” — you will tumble through the rabbit hole into MySpace’s literary scene.

Imagine a version of Studio 54 where Jane Austen, wearing nothing but gold panties, vomits all over Harold Bloom’s shoes while infomercials for debut novels flash on the walls. In literary MySpace, most people are cruising: they’re hoping to find cute nerds, to hype a memoir or to indulge some bookworm fetish. Pranksters pretending to be Oscar Wilde, Gertrude Stein and Ovid rub elbows with authors masquerading as their own characters. Of course, many of the profiles are just glorified advertising pages. And yet, amid all the craziness, readers have formed dozens of groups — for instance, Ladies and Lads of Library Land — to engage in serious bibliophilic conversation.

And, much to my relief, I discovered that the drunken girl was an anomaly. People read my books sober! I spied on dozens of my fans’ pages and found out weirdly intimate data about them: what they eat (vegan peanut-butter-cream-frosted cupcakes), what imaginary businesses they’ve started (a magazine called Stupid American) and what they collect (miter saws, leg warmers, “cartes de visite with good mustaches on them,” tattoos). I even started reading their blogs. One reader reports having a job involving releasing 1,000 white flounder into a river for experimental purposes. Why do these people even bother with my books, when they’ve got stories of their own like that? And so I have become my readers’ reader, and something about the reciprocity of this delights and scares me.

Usually, writers don’t interact much with their readers. Even at bookstore appearances, we may not run into the hard-core fans, who often are suspicious of group activities and would rather just meet on the page. When we write, we’re alone. We stare at the computer screen, picturing our imaginary audience as we type. Mine look like this: a horde of faceless yet well-educated drones sitting in rows of acrylic chairs in an all-white lecture room that resembles one of the sets in the old TV show “Space: 1999.”

In this way, we’re the opposite of musicians, who know their audiences intimately. A drummer in an indie band might gig five nights a week. Afterward, whether he’s in Cleveland or Culpeper, he sticks around in the bar with local friends, then crashes on a sofa supplied by a fan. For bands, social networking started long before the Internet.

But for authors and readers, MySpace offers something entirely new: a forum where we can finally meet and get to know one another — or even collaborate in literary games. For instance, soon after the novelist Matt Haig put up a MySpace profile to promote his book “The Dead Fathers Club,” he received a message that would make any writer’s heart thump. Someone wanted to “friend” him, and that someone was none other than ... William Shakespeare. Shakespeare “sent a message telling me how much he enjoyed my work,” Haig explained to me (via MySpace mail). “I returned the compliment and told him ‘King Lear’ was pretty good, too, and that I’m sure he has a solid career ahead of him.”

Haig said that readers are not always so gentle. A few have told him what they want changed in his novels or what he should write next. “In the old days, the author-reader relationship was the equivalent of someone who couldn’t listen, talking to someone who couldn’t speak,” Haig said. “But MySpace ... places the writer and reader on an equal footing within the same network.”

Neal Pollack, author of the memoir “Alternadad,” agrees that the site shakes up the literary hierarchy. “If nothing else, MySpace will show nonauthors how pathetic and lonely most writers really are. Of course we’ll respond to messages. It’s not like we have more important work. Anything that can lift away the author-as-god veil is all right by me,” Pollack said (again, via MySpace mail). After I got his message, I couldn’t stop thinking, Author as god? Do other authors feel like gods?

Certainly the novelist Laura Zigman does not. She created her first MySpace profile in a bid to win approval from her teenage stepdaughter. Zigman, who describes herself as “desperate to be loved by teenagers,” posted a picture of a Scooby Doo Chia Pet on her page. Nothing came of this. Later, when she returned to MySpace to promote her books, she found herself becoming den mother to her readers, including one girl who had dropped out of college and needed a lot of bucking up.

Meanwhile, Marcy Dermansky, whose most recent novel is “Twins,” went onto the site in a mad dash to recruit new readers from among the millions of profiles. At one point, she spent hours a day on MySpace, searching for people who shared the names of her characters and trying to make them her friends. “I ran searches for the harder ones, the Smitas and Yumikos and Kendras, and then I wrote e-mails,” she said. “A lot of the Yumikos and Smitas and Sues and Lisas and Chloes like to read; they bought my book after I contacted them.” Who knew you could boost sales just by reaching out to Yumikos?

As for me, I’m still grappling with the revelation that my readers are carrying on lives in places like Brooklyn, Oakland and Portland. Somehow I had imagined that they slept in beehive-like pods in a space station just past the moon; they awakened only when I needed them to file into the antiseptic room to hear my story. These readers, however, turn out to be just the opposite of the drones of my imagination. They sell broccoli-themed greeting cards; they carve their own rubber stamps; they are pioneering new methods of fortune-telling that involve Smarties candies. And more than a few of them have ventures of their own to promote. In fact, if you want to buy Shakespeare-themed thong underwear, I know a guy who can hook you up.
http://www.nytimes.com/2007/09/02/bo...tml?ref=review





Are Books Passé? Web Giants Envision the Next Chapter
Brad Stone

Technology evangelists have predicted the emergence of electronic books for as long as they have envisioned flying cars and video phones. It is an idea that has never caught on with mainstream book buyers.

Two new offerings this fall are set to test whether consumers really want to replace a technology that has reliably served humankind for hundreds of years: the paper book.

In October, the online retailer Amazon.com will unveil the Kindle, an electronic book reader that has been the subject of industry speculation for a year, according to several people who have tried the device and are familiar with Amazon’s plans. The Kindle will be priced at $400 to $500 and will wirelessly connect to an e-book store on Amazon’s site.

That is a significant advance over older e-book devices, which must be connected to a computer to download books or articles.

Also this fall, Google plans to start charging users for full online access to the digital copies of some books in its database, according to people with knowledge of its plans. Publishers will set the prices for their own books and share the revenue with Google. So far, Google has made only limited excerpts of copyrighted books available to its users.

Amazon and Google would not comment on their plans, and neither offering is expected to carve out immediately a significant piece of the $35-billion-a-year book business. But these new services, from two Internet heavyweights, may help to answer the question of whether consumers are ready to read books on digital screens instead of on processed wood pulp.

“Books represent a pretty good value for consumers. They can display them and pass them to friends, and they understand the business model,” said Michael Gartenberg, research director at Jupiter Research, who is skeptical that a profitable e-book market will emerge anytime soon.

“We have had dedicated e-book devices on the market for more than a decade, and the payoff always seems to be just a few years away,” he said.

That disappointing history goes back to the late 1990s, when Silicon Valley start-ups created the RocketBook and SoftBook Reader, two bulky, battery-challenged devices that suffered from lackluster sales and a limited selection of material. The best selling e-books at the time, tellingly, were “Star Trek” novels.

Hopes for e-books began to revive last year with the introduction of the widely marketed Sony Reader. Sony’s $300 gadget, the size of a trade paperback, has a six-inch screen, enough memory to hold 80 books and a battery that lasts for 7,500 page turns, according to the company. It uses screen display technology from E Ink, a company based in Cambridge, Mass., that emerged from the Media Lab at the Massachusetts Institute of Technology and creates power-efficient digital screens that uncannily mimic the appearance of paper.

Sony will not say how many it has sold, but the Reader has apparently done well enough that Sony recently increased its advertising for the device in several major American cities.

“Digital readers are not a replacement for a print book; they are a replacement for a stack of print books,” said Ron Hawkins, vice president for portable reader systems at Sony. “That is where we see people, on the go, in the subway and in airports, with our device.”

Book publishers also seem to be preparing for the kind of disruption that hit the music business when Apple introduced the symbiotic combination of the iPod and its iTunes online service. This year, with Sony’s Reader drawing some attention and Amazon’s imminent e-book device on their radar, most major publishers have accelerated the conversion of their titles into electronic formats.

“There has been an awful lot of energy around e-books in the last six to 12 months, and we are now making a lot more titles available,” said Matt Shatz, vice president for digital at Random House, which plans to have around 6,500 e-books available by 2008. It has had about 3,500 available for the last few years.

Amazon has been showing the Kindle to book publishers for the last year and has delayed its introduction several times. Last fall, a photograph of the device, and some of its specifications, leaked onto the Web when the company filed an application with the Federal Communications Commission to get approval for its wireless modem, which will operate over a high-speed EVDO network.

Several people who have seen the Kindle say this is where the device’s central innovation lies — in its ability to download books and periodicals, and browse the Web, without connecting to a computer. They also say Amazon will pack some free offerings onto the device, like reference books, and offer customers a choice of subscriptions to feeds from major newspapers like The New York Times, The Wall Street Journal and the French newspaper Le Monde.

The device also has a keyboard, so its users can take notes when reading or navigate the Web to look something up. A scroll wheel and a progress indicator next to the main screen, will help users navigate Web pages and texts on the device.

People familiar with the Kindle also have a few complaints. The device has a Web browser, but using it is a poor experience, because the Kindle’s screen, also from E Ink, does not display animation or color.

Some also complain about the fact that Amazon is using a proprietary e-book format from Mobipocket, a French company that Amazon bought in 2005, instead of supporting the open e-book standard backed by most major publishers and high-tech companies like Adobe. That means owners of other digital book devices, like the Sony Reader, will not be able to use books purchased on Amazon.com.

Nevertheless, many publishing executives see Amazon’s entrance into the e-book world as a major test for the long-held notion that books and newspapers may one day be consumed on a digital device.

“This is not your grandfather’s e-book,” said one publishing executive who did not want to be named because Amazon makes its partners sign nondisclosure agreements. “If these guys can’t make it work, I see no hope.”

For its part, Google has no plans to introduce an electronic device for reading books. Its new offering will allow users to pay some portion of a book’s cover price to read its text online. For the last two years, as part of the Google Book Search Partner Program, some publishers have been contributing electronic versions of their books to the Google database, with the promise that the future revenue would be shared.

The service could be especially useful to students and researchers who find information they need through a Google search, but it is also likely to include material suited for leisure reading. It will be separate from an effort called the Google Book Search Library Project, which is digitizing the collections of some libraries. That program has angered publishers and led to several pending lawsuits over copyright issues.

Both the programs of Google and Amazon are drawing attention, and some skepticism, from traditional book retailers. Barnes & Noble, the largest bookseller in the United States, once invested in early e-book creator NuvoMedia and sold its RocketBook in stores before getting out of the business in 2003.

Stephen Riggio, chief executive at Barnes & Noble, argues that for most people the value of traditional paper books will never be replicated in digital form. Nevertheless, he plans to compete with Google and Amazon. Mr. Riggio said in an interview that the full texts of many books will become available on the company’s Web site over the next year to 18 months. He also said that Barnes & Noble was considering introducing its own electronic book reader — but only when it can sell one at a low price.

“If an affordable device can come to the market, sure we’d love to bring it to our customers, and we will,” Mr. Riggio said. “But right now we don’t see an affordable device in the immediate future.”
http://www.nytimes.com/2007/09/06/te.../06amazon.html





Starting Over
Jennifer Schuessler

THE WORLD WITHOUT US

By Alan Weisman.

Illustrated. 324 pp. Thomas Dunne Books/St. Martin’s Press. $24.95.

When Rachel Carson’s “Silent Spring” was published in 1963, the chemical giant Monsanto struck back with a parody called “Desolate Spring” that envisioned an America laid waste not by pesticides but by insects: “The bugs were everywhere. Unseen. Unheard. Unbelievably universal. ... On or under every square foot of land, every square yard, every acre, and county, and state and region in the entire sweep of the United States. In every home and barn and apartment house and chicken coop, and in their timbers and foundations and furnishings. Beneath the ground, beneath the waters, on and in limbs and twigs and stalks, under rocks, inside trees and animals and other insects — and yes, inside man.”

To Alan Weisman, this nightmare scenario would be merely a promising start. In his morbidly fascinating nonfiction eco-thriller, “The World Without Us,” Weisman imagines what would happen if the earth’s most invasive species — ourselves — were suddenly and completely wiped out. Writers from Carson to Al Gore have invoked the threat of environmental collapse in an effort to persuade us to change our careless ways. With similar intentions but a more devilish sense of entertainment values, Weisman turns the destruction of our civilization and the subsequent rewilding of the planet into a Hollywood-worthy, slow-motion disaster spectacular and feel-good movie rolled into one.

A journalist and author of three previous books, Weisman travels from Europe’s last remnant of primeval forest to the horse latitudes of the Pacific, interviewing everyone from evolutionary biologists and materials scientists to archaeologists and art conservators in his effort to sketch out the planet’s post-human future. In even the most heavily fortified corners of the settled world, the rot would set in quickly. With no one left to run the pumps, New York’s subway tunnels would fill with water in two days. Within 20 years, Lexington Avenue would be a river. Fire- and wind-ravaged skyscrapers would eventually fall like giant trees. Within weeks of our disappearance, the world’s 441 nuclear plants would melt down into radioactive blobs, while our petrochemical plants, “ticking time bombs” even on a normal day, would become flaming geysers spewing toxins for decades to come. Outside of these hot spots, Weisman depicts a world slowly turning back into wilderness. After about 100,000 years, carbon dioxide would return to prehuman levels. Domesticated species from cattle to carrots would revert back to their wild ancestors. And on every dehabitated continent, forests and grasslands would reclaim our farms and parking lots as animals began a slow parade back to Eden.

A million years from now, a collection of mysterious artifacts would remain to puzzle whatever alien beings might stumble upon them: the flooded tunnel under the English Channel; bank vaults full of mildewed money; obelisks warning of buried atomic waste (as current law requires) in seven long-obsolete human languages, with pictures. The faces on Mount Rushmore might provoke Ozymandian wonder for about 7.2 million more years. (Lincoln would probably fare better on the pre-1982 penny, cast in durable bronze.) But it’s hard to imagine an alien archaeologist finding poetry in the remote Pacific atolls awash in virtually unbiodegradable plastic bottles, bags and Q-tip shafts, or in the quadrillions of nurdles, microscopic plastic bits in the oceans — they currently outweigh all the plankton by a factor of six — that would continue to cycle uncorrupted through the guts of sea creatures until an enterprising microbe evolved to break them down.

As for the creatures who made this mess, the only residue of our own surprisingly negligible biomass — according to the biologist E. O. Wilson, the six billion-plus humans currently wreaking planetary havoc could all be neatly tucked away in one branch of the Grand Canyon — would be the odd fossil, mingling perhaps with the limbs of Barbie dolls.

Weisman knows from the work of environmental historians that humans have been shaping the natural world since long before the industrial age. His inner Deep Ecologist may dream of Earth saying good riddance to us, but he finds some causes for hope amid the general run of man-bites-planet bad news. At Amboseli National Park in Kenya, he takes comfort in the spectacle of Masai herdsmen living in carefully managed harmony with predators and grazers alike. In the 30-kilometer-radius “Zone of Alienation” around the Chernobyl nuclear plant, where some bridges remain too hot to cross 20 years after the 1986 meltdown, he finds eerie peace in the forests full of moose, lynx and radioactive deer. Watching from inside his protective suit as barn swallows buzz around the reactor, Weisman writes: “You want them to fly away, fast and far. At the same time, it’s mesmerizing that they’re here. It seems so normal, as if apocalypse has turned out to be not so bad after all. The worst happens, and life still goes on.”

So could we ourselves really simply fly away, leaving the rest of nature to slowly clean up our mess? Doomsday rhetoric aside, the fact is that nothing is likely to wipe us out completely, at least not without taking a good chunk of the rest of creation with us. (Even a virus with a 99.99 percent kill rate would still leave more than half a million naturally immune survivors who could fully repopulate the earth to current levels in a mere 50,000 years.) Not that some people aren’t trying to take matters into their own hands. Weisman checks in with Les Knight, the founder of the Voluntary Human Extinction Movement, which advocates gradually putting our species to sleep by collective refusal to procreate. After an initial panic, we would look around and see that the world was actually getting better: “With no more resource conflicts, I doubt we’d be wasting each other’s lives in combat,” Knight says. “The last humans could enjoy their final sunsets peacefully, knowing they have returned the planet as close as possible to the Garden of Eden.” (Apparently he never saw “Children of Men.”)

Weisman has his own flirtation with religious language, his occasionally portentous impassivity giving way to the familiar rhetoric of eco-hellfire as he imagines the earth’s most “narcissistic” species cleansed from the earth as punishment for its “overindulged lifestyle.” But Weisman stops short of calling for our full green burial, arguing instead for a universal “one child per human mother” policy. It would take until 2100 to dwindle to a global population of 1.6 billion, a level last seen in the 19th century, before leaping advances in energy, medicine and food production, but well before then we’d experience “the growing joy of watching the world daily become more wonderful.” And the evidence, Weisman writes, “wouldn’t hide in statistics. It would be outside every human’s window, where refreshed air would fill each season with more birdsong.”

Even readers who vaguely agree that there are “too many of us” (or is it too many of them?) may not all share Weisman’s brisk certainty that trading a sibling for more birdsong is a good bargain, just as those who applaud the reintroduction of the North American wolf may not quite buy the claim by Dave Foreman, a founder of Earth First!, that filling the New World’s empty über-predator niche with African lions and cheetahs is our best chance to avoid what Weisman calls “the black hole into which we’re shoving the rest of nature.” In the end, it’s the cold facts and cooler heads that drive Weisman’s cautionary message powerfully home. When it comes to mass extinctions, one expert tells him, “the only real prediction you can make is that life will go on. And that it will be interesting.” Weisman’s gripping fantasy will make most readers hope that at least some of us can stick around long enough to see how it all turns out.
http://www.nytimes.com/2007/09/02/bo...uessler-t.html





‘Bringing the Ocean to the World,’ in High-Tech
William Yardley

Thousands of miles of fiber-optic cables are strung across the world’s oceans, connecting continents like so many tin cans in this age of critical global communication. So the fact that about 800 more miles of fiber-optic cable will soon thread the sea floor off the coast of the Pacific Northwest might not seem particularly revolutionary. Until you meet John R. Delaney, part oceanographer, part oracle.

“This is a mission to Planet Ocean,” said Mr. Delaney, a professor at the University of Washington. “This is a NASA-scale mission to basically enter the Inner Space, and to be there perpetually. What we’re doing is bringing the ocean to the world.”

Under a $331 million program long dreamed of by oceanographers and being financed by the National Science Foundation, Professor Delaney and a team of scientists from several other institutions are leading the new Ocean Observatories Initiative, a multifaceted effort to study the ocean — in the ocean — through a combination of Internet-linked cables, buoys atop submerged data collection devices, robots and high-definition cameras. The first equipment is expected to be in place by 2009.

A central goal, say those involved, is to better understand how oceans affect life on land, including their role in storing carbon and in climate change; the causes of tsunamis; the future of fish populations; and the effect of ocean temperature on growing seasons. Oceanographers also hope to engage other scientists and the public more deeply with ocean issues by making them more immediate. Instead of spending weeks or months on a boat gathering data, then returning to labs to make sense of it, oceanographers say they expect to be able to order up specific requests from their desktops and download the results.

Researchers will be able, for example, to assemble a year’s worth of daily data on deep ocean temperatures in the Atlantic or track changes in currents as a hurricane nears the Gulf of Mexico. And schoolchildren accustomed to dated graphics and grainy shark videos will only have to boot up to dive deep in high definition. “It’ll all go on the Internet and in as real time as possible,” said Alexandra Isern, the program director for ocean technology at the National Science Foundation. “This is really going to transform not only the way scientists do science but also the way the public can be involved.”

The program has three main parts, two of which involve placing a range of sensors in the oceans and one that connects through the Internet all the information gathered, so that the public and scientists can have access to it.

A “coastal/global” program will include stand-alone deep-water data-gathering stations far offshore, mostly in the higher latitudes of the Atlantic and Pacific, where cold, rough conditions have made ship-based oceanography difficult.

In American waters, observation systems are planned on both coasts. In the Pacific, off the Oregon coast, the system will study the upwelling of cold water that has led to repeated “dead zones” of marine life in recent summers. In the East, off Martha’s Vineyard, a coastal observation system is planned along the continental shelf, gathering information at the surface, subsurface and on the sea floor, where warm Gulf Stream currents confront colder water from off the coast of Canada.

“That mixing affects surface productivity, weather, carbon cycling,” said Robert S. Detrick, a senior scientist at Woods Hole Oceanographic Institution.

In August, the Joint Oceanographic Institutions, which is administering the Ocean Observatories Initiative for the National Science Foundation, chose Woods Hole to lead the offshore buoy and coastal program. Woods Hole, which will receive about $98 million of the total cost, will partner with the Scripps Institution of Oceanography at the University of California, San Diego, and Oregon State University’s College of Oceanic and Atmospheric Sciences.

In the Northwest, about $130 million of the initiative’s cost is being dedicated to build a regional observatory, a series of underwater cables that will crisscross the tectonic plate named for the explorer Juan de Fuca. Rather than provide an information superhighway that bypasses the ocean, this new network is being put in place to take its pulse. Professor Delaney, whose specialty is underwater volcanoes that form at the seams between tectonic plates and the surprising life those seams support, is among those who have been pursuing the cable network for more than a decade, overcoming hurdles of money, technology and skepticism.

Some scientists have suggested that the Juan de Fuca is an imperfect laboratory, that it is small and lacks some features, like the most intense El Nińo fluctuations, that might reveal more about how that phenomenon affects conditions at sea and on land. But Professor Delaney says the Juan de Fuca plate is well-suited for the program precisely because it is self-contained, just offshore and rich with seafloor activity, complicated current patterns and abundant fish and marine mammals. The new network shares many similarities with a plan called Neptune that Professor Delaney and others began pushing for in the 1990s. As part of an earlier effort related to that project, Canada is moving forward with its own cabled network off the coast of British Columbia.

“For the first three or four years, people just laughed when I said we’re going to turn Juan de Fuca Plate into a national laboratory,” Professor Delaney said. “Now they’re not laughing.”

Many oceanographers say the program will transform their field. Oscar Schofield, a biological oceanographer at Rutgers University, has spent nearly a decade helping piece together a small-scale coastal observatory in the Atlantic using a combination of radar, remote-controlled underwater gliders and a 15-kilometer underwater cable. The program, called the Coastal Ocean Observation Lab, which he runs with Scott Glenn, also a professor at Rutgers, has a Web site where outsiders can track currents, water temperatures and salinity levels in parts of the Atlantic. They can also follow measuring instruments guided remotely from the New Jersey coast to south of the Chesapeake Bay.

Professor Schofield said that the data gathered already had upended some of what he was taught in graduate school, from the way rivers flow into the ocean to the complexity of surface currents.

“When there’s a hurricane, when all the ships are running for cover, I’m flying my gliders into the hurricane,” using his office computer, Professor Schofield said. “Then I’m sitting at home drinking a beer watching the ocean respond to a hurricane.”

He added: “What’s great about oceanography is we’re still in the phase of just basic exploration. We’ve discovered things off one of the most populated coasts in the United States that we didn’t know yet. O.O.I. will take us one level beyond that, to where any scientist in the world will be able to explore any ocean.”

Several scientists involved in the project cited improved technology — from increased bandwidth to the ability to provide constant power to instruments at sea by underwater cables or solar or wind power — as critical to making the new program possible. They also say that increased concern about global warming, storms and fisheries has brought new attention to their field.

Some experts say they wish the project included more money for, say, placing buoys in the Indian Ocean, where monsoons and other events make for rich ocean activity. But John A. Orcutt, a professor at Scripps who is directing the effort to link the new research to the Internet, said being able to provide constant new data to scientists around the world, or even to teenagers surfing YouTube, will help build support for expanding the project in the future.

“We want to get the oceans and the sea floor in front of the public now,” Professor Orcutt said, “so they can understand the need for more.”
http://www.nytimes.com/2007/09/04/science/04ocea.html





Madeleine L’Engle, Children’s Writer, Is Dead
Douglas Martin

Madeleine L’Engle, who in writing more than 60 books, including childhood fables, religious meditations and science fiction, weaved emotional tapestries transcending genre and generation, died Thursday in Connecticut. She was 88.

Her death, of natural causes, was announced today by her publisher, Farrar, Straus and Giroux.

Ms. L’Engle (pronounced LENG-el) was best known for her children’s classic, “A Wrinkle in Time,” which won the John Newbery Award as the best children’s book of 1963. By 2004, it had sold more than 6 million copies, was in its 67th printing and was still selling 15,000 copies a year.

Her works — poetry, plays, autobiography and books on prayer — were deeply, quixotically personal. But it was in her vivid children’s characters that readers most clearly glimpsed her passionate search for the questions that mattered most. She sometimes spoke of her writing as if she were taking dictation from her subconscious.

“Of course I’m Meg,” Ms. L’Engle said about the beloved protagonist of “A Wrinkle in Time.”

The “St. James Guide to Children’s Writers” called Ms. L’Engle “one of the truly important writers of juvenile fiction in recent decades.” Such accolades did not come from pulling punches: “Wrinkle” is one of the most banned books because of its treatment of the deity.

“It was a dark and stormy night,” it begins, repeating the line of a 19th- century novelist Edward George Bulwer-Lytton, and presaging the immortal sentence that Snoopy, the inspiration-challenged beagle of the Peanuts cartoon, would type again and again. After the opening, “Wrinkle,” quite literally, takes off. Meg Murray, with help from her psychic baby brother, uses time travel and extrasensory perception to rescue her father, a gifted scientist, from a planet controlled by the Dark Thing. She does so through the power of love.

The book used concepts that Ms. L’Engle said she had plucked from Einstein’s theory of relativity and Planck’s quantum theory, almost flaunting her frequent assertion that children’s literature is literature too difficult for adults to understand. She also characterized the book as her refutation of ideas of German theologians.

In the “Dictionary of Literary Biography,” Marygail G. Parker notes “a peculiar splendor” in Ms. L’Engle’s oeuvre, and some of that splendor is sheer literary range. “Wrinkle” is part of her “Time Fantasy” series of children’s books, which includes “A Wind in the Door,” “A Swiftly Tilting Planet,” “Many Waters” and “An Acceptable Time.” The series combines elements of science fiction with insights into love and moral purpose that pervade Ms. L’Engle’s writing.

Ms. L’Engle’s other famous series of books concerned another family. The first installment, “Meet the Austins,” which appeared in 1960, portrayed an affectionate family whose members displayed enough warts to make them interesting. (Perhaps not enough for The Times Literary Supplement in London, though; it called the Austins “too good to be real.”)

By the fourth of the five Austin books, “A Ring of Endless Light,” any hint of Pollyanna was gone. Named a Newbery Honor Book in 1981, it told of a 16-year-old girl’s first experience with death. Telepathic communication with dolphins eventually helps the girl, Vicky, achieve a new understanding of things.

“The cosmic battle between light and darkness, good and evil, love and indifference, personified in the mythic fantasies of the ‘Wrinkle in Time’ series, here is waged compellingly in its rightful place: within ourselves,” Carol Van Strum wrote in The Washington Post in 1980.

Madeleine L’Engle Camp was born in Manhattan on the snowy night of Nov. 29, 1918. The only child of Madeleine Hall Barnett and Charles Wadsworth Camp, she was named for her great-grandmother, who was also named Madeleine L’Engle.

Young Madeleine’s mother came from Jacksonville, Fla., society and was a fine pianist; her father was a World War I veteran who worked as a foreign correspondent and later as drama and music critic for The New York Sun. He also knocked out potboiler novels.

The family lived on the Upper East Side of Manhattan; her parents had artistic friends, Madeleine an English nanny. She felt unpopular at school. She recalled that an elementary school teacher – Miss Pepper or Miss Salt, she couldn’t remember which — treated her as if she were stupid.

She had written her first story at 5 and retreated into writing. When she won a poetry contest in the fifth grade, her teacher accused her of plagiarizing. Her mother intervened to prove her innocence, lugging a stack of her stories from home.

When she was 12, she was sent to a boarding school in Switzerland, Chatelard, and at 15 to Ashley Hall, a boarding school in Charleston, S.C. She graduated from Smith College with honors in English. (She took no science, often a surprise to readers impressed with her science fiction.)

Returning to New York, Ms. L’Engle began to get small acting parts. She wrote her first novel, “The Small Rain,” in 1945 and had several plays she wrote produced.

She met the actor Hugh Franklin when both were appearing in a production of Chekhov’s “The Cherry Orchard.” They married in 1946, and their daughter Josephine was born the next year. In 1951, when Ms. L’Engle became pregnant again, they moved to the small town of Goshen, Conn., where they bought and ran a general store. Their son, Bion, was born in 1952, and in 1956 they adopted another daughter, Maria.

Mr. Franklin died in 1986 and Bion in 1999. Ms. L’Engle is survived by her daughters, Josephine F. Jones and Maria Rooney; five grandchildren; and five great-grandchildren.

Ms. L’Engle’s writing career was going so badly in her 30s that she claimed she almost quit writing at 40. But then “Meet the Austins” was published in 1960, and she was already deeply into “Wrinkle.” The inspiration came to her during a 10-week family camping trip.

That was just the start. She once described herself as a French peasant cook who drops a carrot in one pot, a piece of potato in another and an onion and a piece of meat in another.

“At dinnertime, you look and see which pot smells best and pull it forward,” she was quoted as saying in a 2001 book, “Madeleine L’Engle (Herself): Reflections on a Writing Life,” compiled by Carole F. Chase.

“The same is true with writing,” she continued. “There are several pots on my backburners.”

Her deeper thoughts on writing were deliciously mysterious. She believed that experience and knowledge are subservient to the subconscious and perhaps larger, spiritual influences.

“I think that fantasy must possess the author and simply use him,” she said in an interview with Horn Book magazine in 1983. “I know that is true of ‘A Wrinkle in Time.’ I cannot possibly tell you how I came to write it. It was simply a book I had to write. I had no choice.

“It was only after it was written that I realized what some of it meant.”

What turned out to be her masterpiece was rejected by 26 publishers. Editors at Farrar, Straus and Giroux loved it enough to publish it, but told her that she should not be disappointed if it failed.

The family moved back to New York, where Hugh Franklin won fame as Dr. Charles Taylor on the popular soap opera “All My Children.” For more than three decades, starting in 1966, Ms. L’Engle served as librarian and writer-in-residence at the Cathedral Church of St. John the Divine. One or two of her dogs often accompanied her to the cathedral library.

Much of her later work was autobiographical, although sometimes a bit idealized; she often said that her real truths were in her fiction. Indeed, she discussed her made-up stories the way a newspaper reporter might discuss his latest article about a crime.

When her son, then 10, protested the death of Joshua in “The Arms of the Starfish” (1965), she insisted that she could not change the tale, which was still unpublished at the time.

“I didn’t want Joshua to die, either,” Ms. L’Engle said in 1987 in a speech accepting the Margaret Edwards Award from the American Library Association for lifetime achievement in writing young adult literature, one of scores of awards she received.

“But that’s what happened. If I tried to change it, I’d be deviating from the truth of the story.”

Her characters continued living their lives even if she hadn’t mentioned them for decades. She had gotten word that Polly O’Keefe, who appeared in three books of the “Time Fantasy” series, was in medical school, she said a few months before the library speech.

A woman wrote her to say that she herself was a first-year medical student at Yale and that she would love to have Polly in her class. Ms. L’Engle said fine, and the student went to the registrar’s office to sign up Polly as an “official” Yale medical student.

“Why does anybody tell a story?” Ms. L’Engle once asked, even though she knew the answer.

“It does indeed have something to do with faith,” she said, “faith that the universe has meaning, that our little human lives are not irrelevant, that what we choose or say or do matters, matters cosmically.”
http://www.nytimes.com/2007/09/08/bo...nd-lengle.html





Before Models Can Turn Around, Knockoffs Fly
Eric Wilson

Buyers from the nation’s leading department stores will sift through the work of hundreds of designers as another Fashion Week begins today in New York, seeking the looks that shoppers will want to wear next spring. Seema Anand will be looking for the ones they want right now.

Ms. Anand, who will be following the catwalk shows through photographs posted instantly on the Web, is a designer few would recognize, even though she has dressed more people than most of the famous designers exhibiting a few blocks from her garment district studio, under the tents in Bryant Park.

“If I see something on Style.com, all I have to do is e-mail the picture to my factory and say, ‘I want something similar, or a silhouette made just like this,’ ” Ms. Anand said. The factory, in Jaipur, India, can deliver stores a knockoff months before the designer version.

Ms. Anand compared a gold sequined tunic she created with a nearly identical one by the designer Tory Burch. Bloomingdale’s had asked her to make several hundred of the dresses for its private label Aqua, she said.

The Tory Burch dress sells for $750; Ms. Anand’s is $260.

Ms. Anand’s company, Simonia Fashions, is one of hundreds that make less expensive clothes inspired by other designers’ runway looks, for trendy stores like Forever 21 and retail behemoths like Macy’s and Bloomingdale’s.

A debate is raging in the American fashion industry over such designs. Copying, which has always existed in fashion, has become so pervasive in the Internet era it is now the No. 1 priority of the Council of Fashion Designers of America, which is lobbying Congress to extend copyright protection to clothing. Nine senators introduced a bill last month to support the designers. An expert working with the designers’ trade group estimates that knockoffs represent a minimum of 5 percent of the $181 billion American apparel market.

Outlawing them is certainly an uphill battle, since many shoppers see nothing wrong with knockoffs, especially as prices for designer goods skyrocket. Critics of the designers’ group even argue that copies are good for fashion because they encourage designers to continuously invent new wares to stay ahead.

Designers say that is pre-Internet thinking.

“For me, this is not simply about copying,” said Anna Sui, one of more than 20 designers who have filed lawsuits against Forever 21, one of the country’s fastest-growing clothing chains, for selling what they claim are copies of their apparel. “The issue is also timing. These copies are hitting the market before the original versions do.”

The designers seek to outlaw clothing that looks very similar to their originals but is sold under someone else’s label. They want to extend laws that already ban counterfeit handbags and sunglasses with designer logos, which reportedly account for as much as $12 billion of sales. A reliable estimate of knockoffs cannot be determined because designers and retailers disagree on which clothes are copies and which are merely “inspired” by a trend, a normal part of the fashion food chain.

Ms. Anand agreed to offer a rare look at a side of fashion that exists parallel to Seventh Avenue’s celebrity designers, though all but unknown to the public. Interviews with executives at a number of companies that specialize in designing for the private labels of department stores and other chains reveal a highly competitive network of factories, which use the latest technology to reproduce designer looks with the impunity and speed of Robin Hood. Their copies do not violate existing law.

“This is the requirement of the market,” Ms. Anand said. “If a buyer tells us, ‘This is what I need,’ we’ll make it for them. This is our business.”

Her mother, Shashi Anand, founded their company, Simonia Fashions, in 1980, five years after she moved to New York from New Delhi. Shashi Anand has won awards for her success as an Asian businesswoman, including one presented in 1998 by Bill and Hillary Clinton, whose pictures are framed on her office wall.

The company, with 10 employees in the showroom, has sales of $20 million, about 80 percent of which is for clothes sold under the private labels of stores like Bloomingdale’s and Macy’s, and for specialty chains like Forever 21, Rampage and Urban Outfitters. They also design their own line, Blue Plate.

Most of their designs are original, or partly inspired by market trends, the women said; but some look like direct copies, and some of those are made at the specific request of retailers.

At the factory in Jaipur the company contracts with 2,000 workers who specialize in pattern making, design and tailoring, and are equipped with computer programs that approximate the design of a garment from a Web image without the need to pull apart the seams.

The factory can return finished samples within 14 days. Sometimes the results are awful, “and sometimes it looks so great you’re just shocked,” Ms. Anand said. “They’ve done a better job than the designer.”

The spring collections shown this week will not arrive in stores until February, typical of the decades-old industry cycle developed when Fashion Week was a trade event. But now that the news media and the Internet disseminate runway looks instantly, fashion followers are primed to seek them out earlier. Ms. Anand’s factory can deliver her version of runway styles to stores four to six weeks after an order.

Ms. Burch, who will show her collection on Sept. 11, said she was aware that her designs had been singled out by copiers. In March, she filed a lawsuit against several stores, including the Strawberry chain, for selling ballerina flats with an insignia she thought was too close to hers. As for the sequined dress Ms. Anand made for Bloomingdale’s, similar to one of Ms. Burch’s, Frank Doroff, a senior executive vice president of the store, said he was unaware of the order.

“It is our policy not to knock off existing resources,” he said, noting that Bloomingdale’s carries the Tory Burch collection. “Does it happen sometimes? I assume it does, but that is not the way we like to do business.”

The cut or details of a garment cannot be copyrighted under existing law, although logos and original prints can be protected. Anna Sui’s suit against Forever 21, which has 400 stores and sales estimated at more than $1 billion, claims it has infringed against her prints on 26 occasions.

“It seems to be their business model to find things that are popular in the marketplace by other designers and copy them,” said Marya Lenn Yee, a lawyer for Ms. Sui.

A spokeswoman for Forever 21, Meghan Bryan, had no comment on the lawsuit. “In working with our enormous vendor base, regularly buying items from hundreds of vendors, it is extremely difficult to be certain of the origin of each item, on each and every occasion,” she said in an e-mail message.

Of several shoppers polled outside a Forever 21 branch in Herald Square in Manhattan recently, none said that knowing a design was copied would stop them from buying it.

“Some people don’t want to spend $300 on a pair of jeans just because of the name,” said Siovhan McGearey, 16, from London. “They may look nice, but why pay $300 when you can go down the street to Forever 21 and get jeans that are $30 that look exactly the same?”

Designers counter that if the knockoffs continue unabated, their businesses will be in jeopardy.

Ms. Anand maintained that her reproductions of designer styles have been changed enough that they do not violate a designer’s intellectual property. “We don’t copy anything,” she said. “We tweak it. We get inspired before we create it.”

She sees her work meeting the needs of the vast majority of consumers who cannot afford designer prices. “Especially the younger girls do not have so much money,” Ms. Anand said, “but they want to wear fashionable clothes.”

“They want to look fabulous,” she said. “It’s their right to look fabulous.”

Paula Schwartz contributed reporting.
http://www.nytimes.com/2007/09/04/us/04fashion.html





Catching the Bouquet, in a Dress You Bought Online
Elizabeth Olson

IS that polyester lavender number still hanging way in the back of the closet? Or the lumpy pink chiffon? Or the fussy flowered frock that cost a small fortune?

Fortunately, the cringe-inducing bridesmaid dress — unwearable in the real world — is being supplanted by chic, even snazzy, garb that doesn’t evoke pity when women walk down the aisle ahead of the bride.

The Internet is helping to drive the shift to fashionable bridal attendant wear. Web sites of companies like Ann Taylor, J. Crew, Target and Disney are offering a broad choice of styles and fabrics, ease of purchase and, when necessary, returns. Most online vendors also offer accessories, including shoes, clutches and sashes.

“You can do gown research online, take a group vote, then order from home,” said Kathleen A. Murray, deputy editor of TheKnot.com, a wedding site.

Two-thirds of bridal and bridesmaids dresses are still custom-ordered in a local bridal salon, according to research by Condé Nast Bridal Group. And a majority of attendants still wear identical outfits — a custom that began in medieval times, said Millie Martini Bratten, editor in chief of Condé Nast Brides magazine. “Those closest to the bride dressed up identically to confuse evil spirits and protect the bride,” she said.

But more brides are taking their cues from the latest on Hollywood’s red carpet, and bridesmaids are becoming more fashion-conscious, too.

“Dresses are more fashion-forward,” said Theresa DiMasi, editor in chief of brides.com, another wedding site. “It’s not the one-size-fits-all cookie-cutter wedding anymore.”

Many clothing retailers have posted lower sales this summer, but one segment is bucking the trend: weddings. At Ann Taylor, whose overall sales dipped in the second quarter this year, it is full speed ahead in the bridal area.

“It’s been double-digit growth,” said Maria Sceppaguercio, a company spokeswoman.

The company, which had $2.3 billion in overall sales in the fiscal year ended in February, does not release numbers for online or bridal sales, she said.

Trish Donnelly, head of direct merchandising at J. Crew, said the company responded to customer demand by introducing four bridesmaid styles online in February 2004.

“We found there was a great void out there for a classic timeless dress,” she said. “And it just took off.”

The company now offers bridal and bridesmaid collections in the spring and fall, and updates both online and by catalog. The company can keep prices relatively low, she said, because it contracts directly for the gowns to be made in Asia.

In April, the Disney Company unveiled wedding apparel inspired by characters including Cinderella, Snow White and Ariel. In November, it will begin selling its fairy-tale bridesmaid dresses on disneybridal.com, with 23 offerings priced from $200 to $450, said Sherri A. Lombra, vice president for finance at Disney Consumer Products.

Three months ago, Target joined the fray, introducing a Web-only bridal line — its first — designed by Isaac Mizrahi, who has been creating clothing for the retailer since 2003.

He is offering three designs, including a figure-hugging silk cowl dress, for $89.99 to $159.99, aimed at brides who want a good look but don’t want to break the bank. The same idea goes for the bridesmaids, who can select from dozens of dresses, at prices that start at $39.99 — plus the accessories.

The average bridal gown now costs $800, and bridesmaids — a typical number per wedding these days is five — spend about $140 each, according to Condé Nast figures.

While more designers are zipping bridesmaids as well as brides into more fashionable looks, many couples are also looking to cut costs for their attendants.

“I couldn’t justify asking my girls, who are all in different life stages — single, married, kids — but who are all watching their wallets for good reason, to cough up $275 for a bridesmaid dress they will wear once, primarily for my amusement,” said Megan Ferington, 27, who works for a Cleveland greeting card company and plans to marry in November.

“Ultimately, price was the deciding factor for me,” she said. “Our wedding isn’t about putting anyone in debt, except maybe us.”

Her first choice, she said, was J. Crew, which offers many options for $165 to $425. To save money, she canvassed the site’s clearance section at the end of last season to find less expensive dresses.

But even with help from J. Crew phone consultants, she couldn’t find four of the $100 dresses she wanted. So Ms. Ferington checked Ann Taylor, whose Celebrations collection had knee-length dresses in an espresso color to match her autumn-themed nuptials. With a coupon for 20 percent off, the price was $150 each.

But price isn’t the only consideration in shopping online, said Ms. Ferington, who is doing almost all her wedding planning on the Internet. Another factor is the ease and convenience of being able to clip dress images and send them to her far-flung attendants in California, upstate New York and Manhattan to get their opinions on the silhouette, neckline, length and fabric, she said.

Michelle R. Colbert, a magazine editor in Austin, Tex., had a similar experience. She e-mailed images of dresses she liked to her six bridesmaids.

“We did instant-messaging, and, lickety-split, the decision was made,” she said. That was easier than trying to convene her friends, near and far, for an afternoon at a local bridal salon.

For her March 2008 wedding, she decided to go with J. Crew because she found the prices to be reasonable, and because “they offer a timeless, classic cut” that was different, she said, from the “big, taffeta, it’s-1986-all-over-again look I was seeing” at various brick-and- mortar stores.

Online purchases do come with a downside: there are no alterations; those are the buyer’s responsibility. But J. Crew and Ann Taylor executives note that anyone can go into their stores and try on a dress for size.

Ease of return is also important, said Ms. Ferington, noting that one of her chosen bridesmaids had to bow out because of a family problem: “She returned the dress without any penalty — which is different from a salon where things are custom-ordered and there are no returns.”

Above all, shopping online helps the bridesmaids avoid what can sometimes be an arduous and disappointing experience.

“I tried on 30 dresses for my sister’s wedding in February,” said Erin Ryder, 27, who will also be a bridesmaid for Ms. Ferington. “But for Megan’s, she showed us what she wanted online. I bought it, it arrived on my doorstep and it fits close to perfectly.”

“Because it’s such a great color, I can wear it again to some other weddings this fall,” said Ms. Ryder, a television producer based in Los Angeles. “It won’t be sitting in my closet like the others I’ve accumulated.”
http://www.nytimes.com/2007/09/02/bu...02dresses.html





Getting The Picture
Matt Mendelsohn

When he was a photo-journalist, "wedding photographer" sounded like the punch line of a joke. Then he went soft and discovered that taking photographs of the most important moment in people's lives actually is funny. Also moving, sad, scary and profound.

IT WAS 10:15 P.M., AND THE BAND WAS HALFWAY THROUGH GLORIA GAYNOR'S "I WILL SURVIVE," a song I've heard so many hundreds of times in the past nine years that I think I should start earning some sort of secret ASCAP royalty, when the tiny phone in my pocket began to vibrate.

My cellphone, like any good wedding photographer will tell you, is always on vibrate, even when I'm not at a wedding. Just one of those silly things, really, but I don't take any chances. I never trust traffic on the Beltway, even on a weekend. I don't eat strange foods on Friday, lest I become sick on Saturday. And I absolutely cringe at the thought of my phone going off during a wedding.

I cringe because it's my job as the photographer to document the nuptial events unfolding in front of me -- from the hushed nave of St. Matthew's Cathedral downtown to the Potomac overlook at George Washington's River Farm -- not become part of them. I'm hired, of course, to chronicle, but after nine years and some 400 weddings -- think Bill Murray in "Groundhog Day," but with a lot more salmon -- one can't help just plain observing. And so, here is observation Number One: On average these days, one and a half guests will receive a phone call during a wedding, often smack during the vows, the inevitable tinny strains of Beethoven's Ninth emanating, just as I'm sure Beethoven himself would have wanted, from the circuit board of a Motorola RAZR.

One and a half guests. Welcome to my world. This is what I've become after all these years, a deranged comic book character: mild-mannered wedding photographer by night, captive observer of the human condition by day. Who could pretend not to notice, after all, when a mother's very first words upon seeing her daughter in a wedding dress are: "Your earring is crooked." And who could look the other way when a priest tosses the couple he's married only three minutes earlier out of a warm and dry church and into the pouring rain because he has a confessional schedule to maintain? (Though not Christian myself, I've heard Paul's letter to the Corinthians about charity -- the one with the noisy gongs and clanging cymbals -- enough to appreciate the rich irony.) Or when an orthopedic surgeon, minutes away from his own marriage, takes time to treat the leg of one of the waitstaff who, while setting up tables, has slipped on a wet floor and happens to speak not a word of English.

I witness acts of incredible tenderness -- a bride quietly pinning a photo of her mother who died of breast cancer into her dress; acts of incredible joy -- just about any father dancing with his daughter; and acts of questionable sanity -- a group of adult groomsmen allowing an 8-year-old to pilot a golf cart into a lake comes to mind. And each Sunday morning around 2 o'clock, as I collapse into bed after another wedding, I'm convinced that I must be part of some kind of clinical trial, with no end date in sight.

And so, on this particular June night, it wasn't until a few more songs had whizzed by -- I can't be sure if it was "Mustang Sally," "Shout" and then "Love Shack" or, more likely, "Love Shack," "Shout" and, finally, "Mustang Sally" -- that I had a chance to look at the flashing display on my phone, a strange number with a strange area code. I put down my cameras, walked outside to the patio of Vienna's Meadowlark Botanical Gardens and dialed in the dark.

"Hi, this is Matt Mendelsohn. Did someone call this number?"

Wedding photographer.

What is it about those two words together that seems to evoke so much pity? No one thinks twice if you say that you're an architectural photographer, or a photographer who shoots nudes, or a globe-trotting photojournalist. Friends will feign interest, at least, on the architectural front; be really excited about the nudes; and ask you again and again if you've ever been shot at as a news photographer. In fact, for years when I was a photojournalist, I went to parties where I was the only non-attorney out of 30 guests -- attorneys making a jillion dollars a year more than I -- only to be told that I had the coolest job. You've shot Michael Jordan?!?!

What was Nicole Kidman like?

How long were you in the Gulf War? Have you ever been shot at?

Wedding photographers, needless to say, have never inspired such levels of envy. Instead, they reside in a category usually reserved for car salesmen and stamp enthusiasts, a little bit of Willy Loman with a pinch of Charlie Brown. Adam Sandler already made the movie about the wedding singer. Is there any doubt that the movie about the wedding photographer would star anyone but Albert Brooks? It's the reason that, even today, when the guy sitting next to me on the Delta Shuttle asks what kind of photography I do, I have a tendency to say, "Well, I worked for USA Today for 10 years, and now I have my own business." Move along; nothing to see here.

Then again, maybe I'm just missing something. In the past few years, a whole new breed of wedding photographers has emerged, particularly on the West Coast, determined to give the musty reputation a makeover. They share ideas on message boards ("Show us your cake pictures!!"), pat one another on the back ("You're a rock star of photography!!") and spend much of their time hawking seminars as if they're selling Herbalife products. They also conveniently sidestep the fact that shooting a wedding is a bit like taking an SAT in which you've been given all the answers in advance. I feel certain James Nachtwey, the legendary war photographer, would find life much easier if he knew where the bad guys were going to start shooting week in and week out.

This is why none of this was supposed to happen. Like all good young photojournalists, I was raised to mock wedding photography and all that it represented. I wanted to be a photojournalist, not some dork schmoozing up Aunt Alice. "I don't shoot weddings," the standard response of any self-respecting White House news photographer, was always more mantra than simple statement of fact. And in the late 1980s, when I was establishing myself here in Washington as a photographer, first at United Press International, with its constant going-out-of-business sales ("No, Pat Robertson was last week's buyer; this week it's the Saudis"), and then at USA Today, it was a badge of honor not to shoot weddings, and, by golly, I wasn't about to let the side down.

All of this was understood those many years ago. My photographic dreams lay in the desert, as in Kuwait, not in dessert, as in chocolate-covered strawberries. And I was well on my way to fulfilling them. I was five feet from Rodney King when he stammered, "Can't we all get along?"; 150 feet from President Bill Clinton as Yasser Arafat and Yitzhak Rabin shook hands; and 27,000 feet above Earth, lying on my belly in a flying gas tank, photographing one stealth fighter after another as they refueled en route to the Persian Gulf. I was shooting cool things and loving every minute of it.

By the mid-'90s, I had crawled around newly discovered tombs in Egypt, photographed huge celebrities in tiny hotel rooms and been splattered with blood -- curiously, something that is a badge of honor in photojournalistic circles -- while covering boxing title fights in Las Vegas. Everything seemed to be going according to plan, though as the years went by, little by little, I began to feel pangs of ambivalence.

Where you once asked a band for permission to photograph a concert, now you navigated a phalanx of lawyers. A one-on-one shoot with Jennifer Aniston in a hotel room had become a one-on-eight shoot, if I were to include all the publicists, with their little black dresses and walkie-talkies, breathing down my neck (and repeating the words "Three minutes, three minutes!" within the first 33 seconds). And, lastly, and perhaps most important, I began to grow tired of chasing people.

Chasing people is a staple of a news photographer's diet -- you can't claim conscientious objector status and elect to shoot the pet of the week instead. I spent a lot time chasing people (though "chase" is a misnomer because the actual act involves mostly walking backward, throwing elbows and focusing at the same time) at courthouses around the country: U.S. District Court (Marion Barry, Ollie North); the U.S. Supreme Court (pick an abortion case); Simi Valley (the LAPD/Rodney King trial); Los Angeles (O.J. Simpson); and, though she had no court to call her own, the chase of all chases, Monica Lewinsky.

For weeks and weeks in 1998, as that scandal broke, I chased Lewinsky for USA Today, with limited success, if one can even use that word. Though tame by Hollywood paparazzi standards, my Lewinsky chases became increasingly fraught with doubt and regret. Then, one Sunday morning, while walking with my wife and my dog in Georgetown, I found myself, sans camera, holding the door for Lewinsky at Starbucks on M Street -- like a hunter accidentally bumping into the stag he's been stalking for days. As she brushed by me, balancing a couple of lattes, she smiled and said, "Thanks so much!" and I said, "Soy-tinly!" -- for some odd reason playfully playing up my New York accent. And I thought to myself, What am I doing chasing this poor woman?

Perhaps it was coincidence, or maybe kismet, but the more the journalism ennui began to set in, the more it seemed people were asking me to shoot their weddings. Like a parent who is asked by his 9-year-old "Are we there yet?" 900 times, I couldn't seem to shake this damn question. And none of these people were looking for a dork in a tux: They wanted me to cover their weddings no differently than if I were covering a White House event or a rally on the Mall. With each wedding I photographed, I realized that there actually existed events in which people wanted you to take their pictures, where there was no yellow police tape and where the only lawyers present were the ones getting married.

And that's when I did it. There came a day several years back when, with reckless abandon, I decided to leave the noble pursuit of journalism, with its Page One budget meetings filled with smart people discussing Saddam Hussein or the latest North Korean standoff, not to mention the not-so-noble pursuit of, well, pursuits. I was ready to throw myself down a most unusual rabbit hole, reemerging into the bizarro world of Weddings, where family relationships can often be broken into the in-laws and the outlaws, where self-absorption can be raised to an art form, where a Jewish guy can recite the entire Catholic Mass by heart, as well as reel off, like an idiot savant, the date of every Saturday for the next year and a half.

"MATT, IT'S MISSY LANGERT, YOUR NEIGHBOR JOEL'S DAUGHTER, CALLING FROM DALLAS. Mom's had a massive heart attack while attending a wedding here, and Dad is home all alone. He didn't come out for the wedding. Is there any way you can go over and sit with him? He's all by himself."

Taken by surprise, I tried to process all of this information in a room filled with happy people having a wonderful time. She was at a wedding in Texas. I was at a wedding in Virginia. And Joel was all by himself.

My 85-year-old neighbor Joel Langert is one of my favorite people, a curmudgeon's curmudgeon with a soft spot he guards fiercely. One minute he's grumbling about how movies used to be two for a nickel, and the next he's leaving a beautiful orchid -- a phalaenopsis or perhaps a paphiopedilum, a lady-slipper, grown lovingly in his backyard greenhouse -- on my kitchen counter. He just walks in, puts down the flower and berates me later for leaving the front door of my house unlocked. Without asking, he once planted a fig tree on my front lawn, a tree that now yields succulent fruit by the hundreds and a tree that I adore. And he'll often ask me to buy him packs -- he doesn't drive anymore -- of his favorite Dutch cigarillos, Schimmelpenninck, even though he knows he shouldn't be smoking them. When I took him to his first Nationals game, Joel didn't stop complaining about the noise -- the constant stream of musical snippets aimed at inciting the crowd -- for the first eight innings (we didn't make it to the ninth). I asked him when was the last time he was at a baseball game, and he replied, "Lou Gehrig was playing at Yankee Stadium."

Joel and his wife, Eileen, had been married for 55 years, 11 longer than I've been alive, and enjoyed a beautiful relationship. "It was love at first sight," he remembered of their meeting at the Gertz department store on Long Island where they both worked. "I wrote up a petition that she should marry me, and I took it to everyone in the store to sign." After their wedding in New York, on January 29, 1950 -- "I remember the church was candlelit" -- the newlyweds drove with another couple down to Fort Lauderdale. Joel laughed as he recalled the two songs that played on the car radio nonstop that trip: "Ghost Riders in the Sky," a cowboy's lament, and "Sixteen Tons," a depressing number about the perils of coal mining. Not exactly the most romantic driving music. (I laughed, of course, because Gloria Gaynor was only 4 months old at the time, and it could have been much worse.)

But it was a fitting start, as driving and travel would play a huge part in their lives, on trips over the years from Finland to Singapore, and in cars such as their 1956 pink T-Bird, the 1957 Jaguar Mark VII Saloon ("It looked like a Bentley," Joel says), the 1972 E-Type Jaguar ("Eileen was never into the shifting thing") and, finally, the S-Type he bought Eileen for Christmas in 2002, parked in the driveway with a big red bow tied to the front.

After decades in advertising with the Hecht Co., Joel now spends much of his retirement tending to his beloved plants. Eileen, on the other hand, was always abuzz with activity, always off, it seemed, on one of the many trips for senior citizens she organized and chaperoned for Arlington County. When a mutual neighbor on our block gave birth to triplets, several of us chipped in for a night nurse for a couple of evenings. We felt rather proud of our gift, not realizing that, for months and months, Eileen was baking the family fully prepared dinners with no fanfare.

Despite Joel's faux crankiness, his most endearing trait, it was easy to see how much he loved Eileen, and how proud he was of her. I asked him recently what made his love for Eileen so special, and without even a second to ponder, he replied, "She was two-thirds of me." Two-thirds of me. I tried to soak that one up. "We never once said no to each other," and then, reverting back to prime Joel form, "except the time I wanted to pull up the grass and replace it with those small paving pebbles."

So now, as I stood in the darkness, the band's music coming through the windows in that muffled way, where you only hear the bass, I knew I had to act quickly. I collected my cameras, two Canon EOS1 Mark IIs, my bag filled with lenses and my very sweaty suit coat, and headed for the parking lot. I would have left in half an hour anyway, and I had already taken more than 1,500 images that day, starting with the "getting ready," as it's referred to in wedding speak -- the ceremony, the family pictures, the dancing, the cake-cutting. I tucked my little pouch filled with identical, neatly stacked 2-gigabyte memory cards -- memory cards, how apt, I always think -- into the bag and headed back to Arlington.

MY OWN BEST MAN DIDN'T SHOW UP FOR MY WEDDING.

Nine years ago, my younger brother, Eric, was directing his best friend and unknown actress, Edie Falco, in a tiny independent film he wrote specifically for her. Filming was scheduled for the day of my wedding, and Eric bowed out. I was devastated, having shared a room with him for 16 years while growing up on Long

Island. My older brother Daniel, an esteemed critic and classics scholar, came to the rescue, with a lengthy toast about the differences between ancient Greek -- my wife, Maya, is Greek -- and ancient Jewish traditions. Given that I had rarely been inside a synagogue, except for weddings, since I was 13 and am decidedly non-religious, the toast struck me as wonderfully intellectual and, not surprisingly, impersonal.

Eric went on to win best director at Sundance the next year, and Edie went on to become the most famous mob wife in television history as Carmela Soprano, and all was long forgotten years ago. Truth be told, we don't really discuss it very much, and that seems to work pretty well. We all serve some kind of penance, and maybe mine is having to listen to touching best man speeches every week of my life. Ironically, it would be Daniel, with whom I was never close growing up -- he, spending much of our childhood reading about pharaohs and Greek gods; me, worrying how the Mets could possibly survive without Tom Seaver -- with whom I would, years later, travel all over the world, tracking down Holocaust survivors for a memoir he was writing. The Week in Review is edited and published by Jack Spratts. The emptiness that I felt during his stand-in toast -- I kept hoping for some funny little anecdote about me, until I realized that my own brother didn't know me well enough to have any funny little anecdotes -- would be replaced by the camaraderie of many, many long trips together, from Australia to Ukraine, just me and Daniel on very long plane rides.

This is why we all love weddings so much -- decades of family history rushing to the surface, like a submarine after nine months under the ocean. Of course, it's usually just minutes after that spectacular arrival that you want to run for cover yelling, "Dive! Dive! Dive!" A tug of war between a bride and her mom over something as simple as where to place the headpiece can get to Defcon 1 remarkably quickly, as this exchange I recall hearing at a Georgetown church illustrates:

"Mom, it should go here."

"Well, I just think it should be back a bit."

"Mom, please let the hairdresser do her job. She knows best."

"I know. It's just that I think it should it go back a little."

"Mom, please! You're making me really stressed out. Please don't say another word, and let the hairdresser do her job!"

(Dead silence in the room. Now, count to 10.)

"Fine. It's just that I thought it should go back a little."

These are the things I witness weekly. No catastrophes, no disasters, just little glimpses into family life, 2007. Without a doubt, the question I'm asked most often is, "What's the worst thing that ever happened at a wedding?" It's also the one that always makes me laugh, because it precludes the obvious converse, that is, what's the best thing that's ever happened at a wedding? In all these years, no one ever has asked me that one, despite the fact that, last I checked, and with the possible exception of a handful of dour church ladies I've come across, weddings are tremendously happy events. But let's face it: We watch NASCAR for the crashes, despite our protestations to the contrary, and we follow celebrity romances so that we can get to the celebrity breakups.

And, of course, it would be overly simplistic to single out mothers and daughters as the source of all wedding drama, my favorite fake Freud quotation notwithstanding: "If it's not one thing, it's your mother." More often than not, the drama that we all expect to see played out at weddings is just a byproduct of the bridal-industrial complex, a perfectly evocative moniker bequeathed to me by a bride many years ago.

Weddings long ago migrated from traditional daytime affairs -- where the men looked dashing in their morning coats, the women had dresses with (gasp!) straps, and the nonstop giggling of flower girls could be heard wafting though the air -- into lavish evening extravaganzas, where children are not even invited. They've gone from the simplicity (and, to be fair, dullness) of the "chicken or the beef?" into menus that boast medallions of veal with a port peppercorn reduction. Today's weddings have price tags the size of a small mortgage (something for which I clearly share responsibility), time schedules that would make a railroad proud, golf outings, spa retreats and 19-seat minibuses taking bridal parties on magical mystery tours around Washington. Things have gotten so bloated that I was actually taken aback when a bride once said to me, "I'm so excited to be marrying Derek today."

Between the countless reality shows with names such as "The Real Wedding Crashers" and "Bridezillas," (Episode 10: When Kristina's sisters show up late for a nail appointment, the bride is furious!), it's no wonder people focus on the negative -- or bizarre, or just irritating -- aspects of weddings. The myriad wedding magazines on the newsstands, and the thousands of wedding blogs, don't help much. Consider this easy-to-follow advice from aboutWeddings.com: "Transition of color in the wedding is 'hot.' The color and theme of a wedding is first seen with the save-the-date card. At the ceremony, the colors are different than what was seen in the save-the-date card/invitation. At the cocktail reception, the colors are different from the ceremony. At the dinner reception, the colors are a combination of all colors previously seen. More than just two colors and no matchy-matchy!"

See? Simple.

Luckily, that kind of silliness isn't ever enough to trump the genuine moments of love and the celebrations of great happiness I'm often privileged to witness: I cried like a baby when a 5-year-old flower girl, blinded by the brain tumor growing inside her head, was led down the aisle by the little ring bearer at St. Aloysius years ago. But I must admit that the moment is annoyingly linked in my memory with the posting, around that same time, on theknot.com, a wedding message board ("Driving Brides Crazy Since 1996!"), by a bride who sought advice on what to do about one of her bridesmaids who, as a result of a worsening muscular disease, was now in a wheelchair, something that would potentially ruin her wedding photos.

(The Knot can be a great source of amusement. My sister, Jennifer, a "Knottie" herself, once related to me an e-mail exchange she had with a woman who had been told, as a Jew, not to use Mendelssohn's "Wedding March," because the composer had famously converted from Judaism. She had instead settled on Bach's "Jesu, Joy of Man's Desiring." When Jennifer, with tongue in cheek, suggested that perhaps -- just perhaps -- that one wasn't exactly kosher either, the woman responded, "Why? It's about Jesu, not Jesus!")

At first I was afraid I was petrified/

Kept thinkin' I could never live without

you by my side.

As I sat across from Joel on that June night, I realized the song I had come to hate so much, the song that, perhaps more than any other, constantly reminds me that I have become a wedding photographer, shooting the same thing week in and week out, was now racing through my groggy brain. This time, though, it was reminding me of why I am a wedding photographer. My years of downplaying what I did for a living seemed silly as I sat on Joel's sofa. How bad could it be to be around people who are desperately in love, all the while surrounded by friends and family who love them desperately. Yeah, big deal, they all go crazy when "I Will Survive" or "YMCA" starts playing, but they haven't heard those songs thousands of times; I have. And when I think that I could be tallying billable hours, or working in a cubicle in E Ring, or selling widgets, I think my life is pretty darn okay.

Just the other day, I received an e-mail from a photographer looking for an internship. His short note almost brought me to tears: "I come from Sarajevo, Bosnia, and my life has put me though many challenges. I am saying this because I have had the chance to see the worst in humans and was lucky enough to survive it. Since then, I have made it my goal to help people record their happiest moments, because those moments are rare and precious, and one never has too many of them."

I kept Joel company for hours, long into the next morning, information coming in very slowly, and me, still in my sweaty wedding clothes, nodding off occasionally. Around 4:30 a.m., the phone rang, and I could hear the voice through the receiver telling my neighbor and friend that the woman he had been married to for 55 years didn't make it.

I felt so out of place, so not the person who should have been there at that terrible moment. But looking back, two years later, it almost seems as if Eileen was just being her usual giving self, not just allowing me to see how much she was adored, but allowing me to see marriage in its barest and most naked form. For nine hours that day -- nine years, really -- I had watched a marriage begin, and, now, for nine hours, I would watch one end. I wanted to turn away as Joel shook uncontrollably. I tried so hard to soothe him, but I knew there was nothing I could really say. Though I was in the presence of profound loss, all I could feel was love. This wasn't about linens and party favors, or caviar stations and big bands. There were no toasts and no blessings, no Bible readings, no clanging gongs or blaring trumpets. At long last, I was seeing the embodiment of marriage itself, the very reason man and woman have been wed from the beginning of time. True love.

Something else floated through my brain, this time decidedly more literary than Gloria Gaynor. In my days as an English major, some 20 years ago, the book that had the most profound effect on me was Thomas Wolfe's Look Homeward, Angel, a tattered paperback edition of which is never far from my grasp. Now I could hear my favorite line, the book's second sentence, coming through: "Each of us is all the sums he has not counted. Subtract us into nakedness and night again, and you shall see begin in Crete four thousand years ago the love that ended yesterday in Texas."

It was 8 a.m. when the little cellphone in my pocket began to vibrate. My wife was calling, and I told her the news. I gave Joel a hug, grabbed my jacket and my cameras, and walked across the street and into my house, where, unable to sleep, I went downstairs and began to download, with newfound respect, memory cards from the previous night's wedding.
http://www.washingtonpost.com/wp-dyn...082902031.html





Wistful Over Lost Dreams at Summer of Love Fest
Adam Tanner

Some of the biggest musical stars of the 1960s counterculture gathered in San Francisco on Sunday for a concert to celebrate the 40th anniversary of the Summer of Love, yet backstage many voiced disappointment about the era's unfulfilled ideals.

The Summer of Love of 1967 made San Francisco a magnet for youth who wanted to experiment with sex, drugs, rock and roll and an alternative hippie lifestyle.

"We thought, this is it, we're going to change the world, actually we're going to become the Christian world of love," Ray Manzarek, 68, keyboardist for The Doors, told Reuters. "Of course, it didn't happen. Here we are 40 years later and we are still at war."

"It was a great disappointment," said Manzarek, who attended the famed San Francisco January 1967 "Human Be-In," credited with drawing young people to the city, with Doors singer Jim Morrison and other bandmates.

The '60s lived again as Manzarek, Jefferson Starship and other legends performed, thousands of fans donned tie-die shirts and bell bottom pants and the smell of marijuana wafted through the air. Two women wandered through the crowd in Golden Gate Park offering free hugs.

In keeping with the spirit of those times, the concert was free.

'I Feel Betrayed'

In the 1960s, many in the counterculture felt they could change the world by removing societal constraints and ending the Vietnam War.

Fito De La Parra, drummer for the band Canned Heat, said his generation never lived up to its ideals.

"On the whole, I feel betrayed," he said backstage after playing before what organizers estimated was 40,000 fans. "I feel that a lot of the ideals that we held valuable in the 1960s were betrayed by their own people, by their own hippies. Many of them betrayed themselves because they went for the buck, and they became rich yuppies and Republicans."

Barry Melton, best known by his nickname "The Fish" and his partnership with Country Joe McDonald, said the 1960s social movements deserve credit for advancing issues such as women's and gay rights and environmental consciousness, but the youth of the day went overboard with drugs.

"There are things I cringe about," said Melton, now a public defender criminal lawyer. "For one thing we had an absolute benign attitude about drugs that was pretty naive. We made some significant mistakes."

Manzarek said unrestrained use of drugs proved a disaster.

"Excessive was Jim Morrison dying of alcohol poisoning, Jimi Hendrix dying in his own vomit," he said.

The inability to achieve unending love and friendship was evidenced by the many bands long since broken up, often acrimoniously.

James Gurley, 67, played with Big Brother and the Holding Company, whose lead singer Janis Joplin died of a drug overdose. For the past decade Gurley said he had not spoken with his fellow band guitarist after a falling out.

"I expected we'd all be friends later," he said. "My disappointment is in myself. My assessments were off base; I mis-assessed human nature."
http://www.reuters.com/article/domes...27235420070903





What They Did This Summer
Jack



Using 1000s of post-its, Illegal Art put up "To Do" signs all over town. This one is on East Street in Manhattan.

Click for slide-show.





Whiting Out the Ads, But at What Cost?
Noam Cohen

MORE white space.

I sent an e-mail message to a friend telling him about Adblock Plus, an easy-to-use free addition to the Firefox Internet browser that deletes advertisements from Web sites. That subject line of his reply summed it up quite nicely.

What happens when the advertisements are wiped clean from a Web site? There is a contented feeling similar to what happens when you watch a recorded half-hour network TV show on DVD in 22 minutes, or when a blizzard hits Times Square and for a few hours, the streets are quiet and unhurried, until the plows come to clear away all that white space.

But when a blizzard hits Times Square, the news reports will focus on the millions of dollars of business lost, not the cross-country skiing opportunities gained.

Likewise, in the larger scheme of things, Adblock Plus — while still a niche product for a niche browser — is potentially a huge development in the online world, and not because it simplifies Web sites cluttered with advertisements.

The larger importance of Adblock is its potential for extreme menace to the online-advertising business model. After an installation that takes but a minute or two, Adblock usually makes all commercial communication disappear. No flashing whack-a-mole banners. No Google ads based on the search terms you have entered.

From that perspective, the program is an unwelcome arrival after years of worry that there might never be an online advertising business model to support the expense of creating entertainment programming or journalism, or sophisticated search engines, for that matter.

For now, however, the big players have decided to ignore the phenomenon. Neither Google nor CNN.com, for example, would comment on ad-blocking programs, which can also be added to Microsoft’s Internet Explorer 7. (The Internet Explorer add-ons are not necessarily free and do not necessarily work as seamlessly as Adblock Plus working with the open-source Firefox browser.)

Wladimir Palant, developer of the open-source Adblock Plus project, wrote in an e-mail message that he had not heard anything from large companies like Google, because, he suspects, the program “isn’t popular enough yet. Attacking it would be a waste of time for these companies.” He estimated there were 2.5 million users of Adblock Plus around the world.

“The numbers are rising steadily,” he wrote, adding that his figures do not “show exponential growth any more (luckily, the server has limited traffic), but there are still 300,000 to 400,000 new users each month.”

Mr. Palant, a 27-year-old programmer in Cologne, Germany, is not an ideological opponent of online advertising. For example, he counts himself a fan of the ads that show up with a Google search, saying they are useful and unobtrusive. That does not mean Adblock will not block Google’s ads, however. It means Mr. Palant has to customize his own version of the program to allow them in.

But if enough people rally to Adblock and similar services, they could be considered the TiVo for the computer, but without any expensive equipment or service charges. And perhaps most critically, as an open-source project, Adblock is the hands of anyone who wants to contribute. So no one can decide to make a deal with prominent Web sites to change the way the program operates. (As things turned out, TiVo and a rival, ReplayTV, opted not to include an automatic service to skip ads after vociferous objections by the television industry.)

For now, the opposition to Adblock Plus has been led by small Web sites who want all Firefox users blocked from Internet sites in retaliation. One such advocacy site, whyfirefoxisblocked.com, taunts a Firefox user with the headline, “You’ve reached this page because the site you were trying to visit now blocks the Firefox browser.”

The page includes the following argument: “While blanket ad blocking in general is still theft, the real problem is Adblock Plus’s unwillingness to allow individual site owners the freedom to block people using their plug-in. Blocking Firefox is the only alternative.”

Mr. Palant, writing on a blog related to the project (adblockplus.org/blog/), lashed out at those kinds of arguments.

“There is only one reliable way to make sure your ads aren’t blocked — make sure the users don’t want to block them,” he wrote. “Don’t forget about the users. Use ads in a way that doesn’t degrade their experience.”

For now, these issues will be debated on the fringes of the Internet. The first stage of a corporate response would be technological, not legal, said Randal C. Picker, a law professor at the University of Chicago who has studied the copyright issues related to TiVo. Television networks could not change their signals to thwart TiVo the way Web sites can use technology to complicate the process of filtering out ads, he said.

One response by Web sites would be for them “to serve ads from their own servers,” Mr. Palant wrote in an e-mail message. “For them, this has the advantage that they will probably escape common filter rules, which are usually targeted at large advertising servers.”

He said, however, that “the most annoying ads usually find their way to popular filter lists.”

The only large player willing to comment was Microsoft, which is in an interesting position: it produces the dominant browser that is being challenged by Firefox, but it is also in the online ad business through its MSN portal and search functions.

In a statement, Microsoft spoke of its success in permitting third-party developers to “add value to the browser experience through the creation of add-ons.” The statement continues: “The range of add-ons available does include ad blocking software. It would not be appropriate for Microsoft to comment on the merits or demerits of a specific add-on, or group of add-ons. Provided they have not been designed with malicious intent and do not compromise a user’s privacy or security, Microsoft is pleased to see new add-ons that add to the range of options that users have for customizing their browsing experience.”

It’s nice of Microsoft to recognize that there will always be people who delight in the white space. Given the decentralized nature of the Internet, the user’s experience has to come first — for now.
http://www.nytimes.com/2007/09/03/te...gy/03link.html





1,300 Unopened Rebate Applications Found In Dumpster
Dean Takahashi

I know that Shu Wong of San Jose hasn't received the $3.50 mail-in rebate for a Vastech computer networking USB hub purchased at a Fry's Electronics in May. Richard Louie of Austin, Olivia Sattaypiwat of Saratoga and Buu Duong of San Jose haven't received their rebates, either.

I know this because they told me so, and because I am staring at more than 1,300 rebate requests sent to Vastech on Bonaventura Drive in San Jose. The envelopes were tossed - unopened - into a garbage dumpster near Vastech. I have two boxes of envelopes that were thrown out without being processed. In all of my years of reporting, I have never encountered such outrageous behavior against consumers.

An employee of nearby Dominion Enterprises found the letters, along with hundreds of others addressed to Vastech, at his company's dumpster. He turned them over to his boss, Joel Schwartz, who gave them to me. All of the letters were addressed to UR-04 Rebate or some variation of the product name at the Vastech address.

Vastech is a small computer accessories company owned by Weizhen Tan, who goes by William. I didn't get a response when I sent e-mails as directed by Vastech's Web site. And the company's voice mail was always full. But he was there at the small office at 63 Bonaventura Drive in San Jose when I came calling, letters in hand.

`Bad employee'

In his cramped office, Tan acknowledged that his 4-year-old company was behind on processing rebates that it had offered to consumers from February to May. He said he wanted to apologize to his customers.

When I asked why rebate letters were tossed out, he initially said it was due to a "bad employee." Later, he said that it was probably done by a friend of the family who was not a formal employee but was supposed to be helping out. That person, he said, probably threw the letters out because of "laziness." He said the person no longer does any work for the company.

Tan acknowledged receiving a lot of complaints, some filtered through Fry's Electronics, which he said was the only chain that offered the Vastech products with rebates. He promised to respond quickly to complaints lodged at the company's voice mail at (408) 786-7699, or its e-mail address at support@vastechinc.com.

"If we do rebates in the future, we will put in place a better system for tracking them," he said, promising that his company would be caught up on rebate processing this month. "It's unfortunate this happened. We will take responsibility for them and handle it better."

At best, you can chalk this up to a small company getting stretched too thin when it offered a good rebate deal that consumers couldn't pass up. But there is a bigger problem: The whole rebate system.

"They don't make it easy for you," said Vastech customer Richard Louie. "It's a lot of work. When it's a small amount of money, I don't keep track of it. For the bigger ones, I do keep track and sometimes I have to call them to complain."

This is why current rebate practices should end. Fry's Electronics, which has 34 superstores in nine states, and other reputable chains like Best Buy and Circuit City, should have nothing to do with them.

From the start, the deck is stacked against consumers to discourage them from ever redeeming the rebates. Depending on the rebate's value, anywhere from 5 percent to 80 percent of customers apply for them. Rebates are often used to get consumers into stores by touting a low price like "$39 after rebate." Manufacturers use them to cut prices after a product is in the market and to get a better idea of who their customers are.

Manuel Valerio, a spokesman for Fry's in San Jose, confirmed that Fry's had received complaints about Vastech's rebates and that Fry's had assisted some customers in getting paid. He said the store didn't know rebate letters had been dumped, adding that Fry's would likely not sell products from companies that engaged in such practices.

But Fry's has no plans to ban rebates.

"We certainly know there are many people who are no fans of rebates, and we are not the greatest fans of rebates as well, but the reality is they are out there," he said. "So long as manufacturers and other retailers offer them, Fry's will continue to do so because we don't want to be at a disadvantage vis-a-vis other competitors in the retail industry."

False advertising

The Federal Trade Commission has taken action for false advertising against a number of companies that have abused the rebate system, said Matthew Gold, a staff attorney for the FTC in San Francisco. The companies must pay the consumers. Retailers can be held liable if the manufacturers don't pay as promised. In some cases, states have brought criminal fraud actions against companies.

The Better Business Bureau of Silicon Valley reports that it has processed 51 complaints about Vastech since February 2006. Of those, 49 went unanswered by the company in the past year. The BBB considers that an unsatisfactory record.

"We tried contacting Vastech a few times with no success," said BBB spokesman Zach Vander Meeden.

This is a ridiculous system that invites abuse. All the discarded letters I looked at were postmarked around May and were found in the garbage just days after being sent. It makes you wonder how often this happens.

I certainly don't trust Vastech at this point, even though Tan offered to sign rebate checks in front of me and requested the unprocessed rebate forms, which I plan to return to him. And I think Fry's Electronics should take care of their customers if Vastech doesn't. Imagine the surprise that Shu Wong got when I called and said he wasn't likely to get his rebate check. "It's only $3.50," he said. "But that's wrong."
http://www.mercurynews.com/ci_6814729?nclick_check=1





DivX Requests Federal Court Affirmation of DMCA Protection for Stage6
Press release

DivX, Inc. DIVX announced today that it has filed a lawsuit in Federal District Court to protect its Stage6 online video hosting service from unreasonable threats and demands made by Universal Music Group ("UMG"). DivX seeks the court's affirmation that UMG's claims of copyright infringement are without merit and that DivX is in full compliance with the requirements of the Digital Millennium Copyright Act ("DMCA"). The DMCA was enacted in 1998 to update U.S. copyright law for the digital age and offers, among other things, a safe harbor from such claims for services such as Stage6.

"We are taking this legal step to protect Stage6 from groundless claims and unreasonable threats brought by UMG. UMG's pattern of attacking innovative online service providers is discouraging and will ultimately hinder innovation and the development of new technologies," said David Richter, Executive Vice President, Corporate Development and Legal.
http://news.moneycentral.msn.com/pro...906&ID=7431951





UMG Carries Out Threat To Sue Veoh For Copyright Violations
David Kaplan

As expected, Universal Music Group has thoroughly ignored video site Veoh‘s attempts to prevent the record label from suing it and has filed a complaint in federal court accusing the Michael Eisner-backed company of copyright infringement, according to Bloomberg.

In its suit, filed in U.S. District Court for California’s Northern District in San Jose, UMG said Veoh is following in the “ignominious footsteps of other recent mass infringers such as Napster” and that the only way to stop its alleged violations is to hold the individuals who run the site financially responsible.

As we noted early last month, UMG informed Veoh that it was considering a suit because of the “massive” copyright infringement taking place by the site’s users. UMG did not specifically refer to any unauthorized material.

In response, Bloomberg added, Veoh asked the same federal court to block any forthcoming UMG suit, saying it was preventing illegal activity by barring access or taking down copyrighted content. Veoh also claimed that because of its policing efforts, federal law protects internet service providers from infringement charges.

Aside from its battle with UMG, Veoh is due back in federal court on Friday to face similar infringement charges from adult content purveyor IO Group, which sued the video site last year.
http://www.forbes.com/technology/200...idcontent.html





Colorado Police Link Rise in Violence to Music
Dan Frosch

The D.J. puts on the popular song “No Problem” by Lil Scrappy, and a sea of young men and women rush the dance floor.

As the party anthem bursts through the speakers and Lil Scrappy drawls, “But you don’t want no problem, problem,” the crowd swerves in a sweaty, liquor-soaked rhythm. The scene, heavy with the sweet smoke of cigarillos and exploding with hip-hop’s unmistakable pounding bass, could be almost anywhere: New York, Chicago, Memphis, Oakland, Calif.

The only sign that this is Colorado Springs is that two churches sit adjacent to the club, La Zona Roja, in an empty strip mall.

The club is part of a thriving hip-hop community that has grown as Colorado Springs, known for its military installations and evangelical groups, has grown. But not everyone is happy that hip-hop has taken root here.

After a spate of shootings, and with a rising murder rate, the police here are saying gangsta rap is contributing to the violence, luring gang members and criminal activity to nightclubs. The police publicly condemned the music in a news release after a killing in July and are warning nightclub owners that their places might not be safe if they play gangsta rap.

“We don’t want to broad-brush hip-hop music altogether,” said Lt. Skip Arms, a police spokesman, “but we’re looking at a subcomponent that typically glorifies, promotes criminal behavior and demeans women.”

The actions of the police have angered the hip-hop community here, mostly blacks and Latinos, many of whom live in this city because of ties to the Army and Air Force bases here.

“If we were talking about a rock bar or a country bar here, none of this would be happening,” said James Baldrick, who runs a local hip-hop promotions company, Dirty Limelight.

“This city wants to shut down hip-hop,” said Mike Cross, 26, who was outside Eden Nite Club, a popular downtown venue that plays hip-hop, with a group of friends on a recent night. “They don’t want it to survive.”

Calling the police’s approach ignorant, a group of club promoters and rappers in Colorado Springs organized a night of hip-hop performances and music at La Zona Roja last month, seeking to prove that such events could occur without incident.

“When two cowboys got into an argument at a saloon, went outside and had a draw, nobody blamed the music that was playing at the saloon,” said a local rapper known as B. Serious, who performed at the event.

But with 19 homicides already this year, compared with 15 in 2006, the police insist on a correlation between gangsta rap and violence, and point to three recent shootings.

On April 17, a stray bullet killed a taxi driver during a fight between two groups who had left Eden Nite Club. After a fight at a concert at a local park on Memorial Day, a man was shot to death in a nearby liquor store parking lot. On July 9, a former high school football star, Diontea Jackson-Forrest, was shot and killed. The authorities said the suspect was involved in an altercation at Eden before the shooting.

Two days after Mr. Jackson-Forrest’s death, the police issued a news release blaming the violence on gangsta rap. The release mentioned an event planned at Eden, called a “Pimp, Thug and Ho Party,” as the “type of behavior that causes concern.” The club’s owners called off the party.

Mr. Baldrick noted that the shooting after the Memorial Day concert, which his company sponsored, occurred two hours after the event, yet the police linked the two. He said that since the authorities began speaking out against gangsta rap, there had been a drop in attendance at events promoted by Dirty Limelight, down to 200 from about 700 per event.

But Lt. Thomas Harris, who leads a unit that deals with gangs, drugs and guns, insisted there was a link between the violence and the music.

“When you have music that says it’s basically O.K. to treat women poorly, to steal things and to confront and shoot police officers,” said Lt. Harris, “you’ll attract a small percentage of the population that wants to lead the thug life.”

Others here say the police are focusing on hip-hop instead of addressing the growing pains of this largely white, conservative city, home to the evangelical groups Focus on the Family and New Life Church.

Since 1990, the metropolitan area of Colorado Springs, which sits south of Denver, has swollen to nearly half a million from 397,000. Though outright racial tensions, which led to marches here in the 1970s and ’80s, are largely of the past, there remains a sense of benign neglect toward minorities, said Dr. José J. Barrera, former director of ethnic studies at the University of Colorado at Colorado Springs. That neglect has translated into a chasm between the city and its minority youth, Dr. Barrera said.
“If you examine the history of ethnic and race relations in this community, you will detect a pattern of ignorance of minority cultures and problems,” Dr. Barrera said. “No serious observer believes that current manifestations of youth culture and pop culture actually fuel criminal activity.”

At the recent hip-hop showcase at La Zona Roja, the genre’s positive side eclipsed all else.

After the show, the crowd tumbled out of the club. Young men politely chatted up a group of women. A couple tried to coordinate a ride home. Two men exchanged solemn stories of prison.

The only sign of trouble was a flat tire on someone’s customized sedan.
http://www.nytimes.com/2007/09/03/us/03hiphop.html





From the Poor Product Naming Department: 'i.Beat Blaxx'
pixie

German company TrekStor had a bit of an "oops" moment last week when they released the next generation of their i.Beat MP3 player, a sleek, slim, black model that was titled, well, i.Beat blaxx.

The best part is, initial comments on the announcement page mostly focus on how it looks like an iPod Nano, rather than the fact that it has a ridiculously, hilariously racist name.

Surely not as flashy as the gilded i.Beat organix seen at last year's CeBIT, TrekStor's i.Beat blaxx still looks mighty fine in its own right. Debuting at IFA, this diminutive player weighs in at just 26-grams and features a 1.3-inch 160 x 128 resolution display, MP3 / WMA / OGG / WAV / SMV file support, a built-in FM tuner, line-in port, a rechargeable Li-ion, and USB connectivity. The units arrive in both 2GB and 4GB flavors and come bundled with a set of Sennheiser headphones, and while the least capacious iteration will ring up at €119.99 ($162), you can double the storage space for just €30 ($41) more.

When writing this up, they forgot something: it's called i.Beat Blaxx!! And some people might just think"gee, that sounds kind of awkward and possibly racist...." even if they know damned well that was not remotely the intent.

Since the unveiling of the new player, I guess someone at TrekStor got the memo that the new name was a bit "off," and they have since simply changed it to TrekStor blaxx, dropping the "i.Beat" part.

The company sent the following press release out after realizing people [like me] are kind of jerks and laugh at things like a product named "i.Beat blaxx."


Dear Gizmodo,

TrekStor is shocked by the way our new MP3 player's name "TrekStor i.Beat blaxx" is perceived. Of course the word "Beat" is not meant as a verb, but refers to the beats of the music you are listening to. More than 4 years ago, TrekStor introduced the i.Beat MP3 player series that today consists of more than 25 different players - all named individually. "blaxx" was chosen, because the player is designed with an elegant black piano finish. As a reaction to the bad connotation of the name, TrekStor decided to rename the product "TrekStor blaxx" - effective immediately. We sincerely apologize to everybody whom we offended by the initial name of this product and want to emphasize that TrekStor condemns violence and any form of racism.

Mit freundlichen Grüßen,
Best regards,
Gil Szmigiel Vice President / CTO

I'm actually bummed about the name change, if only because if the player had kept its original name and on the off chance a race war started and someone beat up a black guy using it as a weapon, or if someone was trying to buy one in a store where the clerk was hard of hearing [ever been to a Radio Shak? This is entirely possible] and had to keep saying, progressively louder, the name of the player they wanted. " I'd like an i.Beat blaxx, please."

"Wha? Sonny?"

"i.Beat blaxx!

"Speak up, young man..."

"i.Beat BLAXX! i.Beat BLAXX"

You know eventually, that would end hilariously [for us] and poorly [for the guy trying to buy the player.]

Anyway, all we're trying to figure out is when they re-named they player they didn't go for something like, I don't know... the i.Beat Toby or something. It's just catchier.
http://www.shoutmouth.com/index.php/news/26201





Wacky Jacky Subpoenas George W. Bush
Stephany

Jack Thompson has filed documents with a federal court in Florida requesting to subpoena President George W. Bush for a deposition to retain Thompson’s license to practice law. Thompson, the bane of gamers everywhere, is in the midst of two ethic complaints which were filed by the Florida Bar and will face a court appointed mediator on November 26th. Wacky Jacky is currently suing the mediator, Judge Dava Tunis, along with the Florida Supreme Court and the Florida Bar.

Thompson’s reasons for subpoenaing The President are a bit esoteric and would make great fodder for an X-Files episode or anything else in the realm of conspiracy theories and Science Fiction. This bit of paranoia stems from the “nefarious” Blank Rome law firm, which represents the defendants in the Strickland vs. Sony lawsuit where an 18-year old in Alabama was allegedly under the influence of Grand Theft Auto when he murdered two police officers and a police dispatcher in 2004. Apparently, the “evil” Blank Rome firm are lobbyists as well as Republican donors and Thompson believes that the law firm was the main culprit in having him thrown off the case by an Alabama Circuit Court judge in November, 2005.

The Bar complaints filed by Judge Tunis are in relation to this case and Thompson’s conduct when he failed to have Bully declared a public nuisance last October.

In the document filed yesterday with the U.S. District Court, Thompson stated:

“I have already sent the George and Jeb Bush subpoenas to Referee Tunis for her signature. She may run on this, but she can’t hide. She must sign the subpoenas, as her filing [of the Thompson Bar complaints] with the federal court has made the testimony I seek in the depositions of both men highly relevant to my Bar defense. If the President’s position is that I do not get to depose him while he is in office, then I would note that Paula Jones’ lawyers were able to convince a federal judge otherwise. If President Bush is successful is convincing the court that I must wait until he leaves office, that’s something I am prepared to do.”

If indeed Thompson has to wait until President Bush leaves office in January 2009, Thompson would be able to get a dig in at the Florida Bar by making them wait to voice their complaints. But, does he actually think that President Bush would actually appear? In his own demented fantasy world, he may actually think this, but it is not very likely. Thompson is also seeking a subpoena for President Bush’s brother Jeb, the former governor of Florida - who’s next? Bush’s dogs Barney and Miss Beazley?
http://news.filefront.com/wacky-jack...george-w-bush/





Microsoft Blames WGA Meltdown on Human Error
Gregg Keizer

Microsoft Corp. last week blamed “human error” on the part of its IT staff for a server problem that caused the company’s Windows Genuine Advantage (WGA) validation service to incorrectly tag legitimate users of Windows XP and Windows Vista as software pirates.

The software vendor also promised that internal changes are being made to avoid a repeat of the glitch, which affected users for nearly 20 hours on Aug. 24 and 25. Users whose copies of Windows erroneously failed WGA’s antipiracy tests were prevented from downloading most software from Microsoft’s Web site. And those with Vista were unable to use some of the operating system’s features.

Alex Kochis, Microsoft’s senior WGA product manager, wrote in a blog posting that the troubles began after “preproduction code” was installed on live servers.

Those systems had yet to be upgraded with another code change designed to enable stronger encryption and decryption of product keys, Kochis added. As a result, “the production servers declined activation and validation requests that should have passed,” he wrote.

A quick code rollback fixed the problem on the product-activation servers within 30 minutes, according to Kochis. But it didn’t reset the validation servers, which handle legitimacy checks on downloads and other transactions.

“We now realize that we didn’t have the right monitoring in place to be sure the fixes had the intended effect,” Kochis wrote. He also said that Microsoft is taking steps “such as increasing the speed of escalations and adding checkpoints before changes can be made to production servers.”

Earlier last week, Microsoft said that fewer than 12,000 systems were affected worldwide. But users lit up the company’s support forums with more than 450 messages about the snafu.

“A system that’s not totally reliable really should not be so punitive,” said Gartner Inc. analyst Michael Silver.

Michael Cherry, an analyst at Directions on Microsoft in Kirkland, Wash., said he was surprised that it was even possible to accidentally load the wrong code onto live servers. “It just begs the question of, what other things have they not done?” Cherry said.
http://www.computerworld.com/action/...&intsrc=kc_top





First Impressions: Opera 9.5 Alpha a Worthy Contender
Jeremy Reimer

Opera has always defied conventional wisdom: in the past, the company was able to survive by selling web browsers when Microsoft and Netscape were giving them away. More recently, the company shifted to giving away its desktop browser, pulling revenue from sales in the mobile arena and affiliate deals integrated into the browser. The company has proven to be rugged and focused on quality.
Opera releases 9.2 browser, adds "Speed Dial"
Feature Wiiview: The Opera Browser

Now, the company has released alpha builds of the latest version of their desktop product, Opera 9.5 (code-named Kestrel). While it doesn't quite add enough features to justify a full version number bump, it is a welcome update for any Opera fan and may well get users of more popular browsers to take a second look. Despite being an "alpha" release, we've found a solid improvement to an already very strong browser.

Opera 9.5's Speed Dials.

Opera claims that the latest version is faster than ever before, and our experience bears this out. When running various JavaScript speed tests, Opera 9.5 scored slightly higher (281ms) than the previous released version, 9.23 (546ms). And Opera 9.x, let it be known, smacks silly the likes of Firefox and Internet Explorer, which tend to have results in the 900-1500ms range on this test machine (a 1.8 GHz Core 2 Duo with 2GB RAM). Opera was 50 percent faster on average than Firefox, and 100 percent faster than IE7 on Windows Vista, for instance. (In all versions, the speed of the test depends on how many tabs are open, so your results may vary. In our experience, Opera always came out on top.)

Opera also claims that the user interface itself also received significant optimizations for speed, and while it's tough to accurately benchmark this, the new alpha does feel slightly "snappier" than its predecessor. While this is still an alpha and there are undoubtedly still bugs present, Kestrel on Windows XP was stable and did not crash once during testing. The Macintosh version, unfortunately, had some serious UI display problems running under Panther on my PPC iBook, likely due to the new skinning code that is in this version.

Performance enhancements aren't limited to browsing speed, either. The integrated BitTorrent client (first introduced in 9.0) has been reworked, and support for Peer Exchange should make torrent downloads faster. While still not as full-featured as a standalone BitTorrent client, being able to download torrents with a single click on a web page is an extremely useful feature and is one that I use all the time.

Speed isn't the only thing that Opera has addressed with 9.5. Plenty of refinements have been added to make things more convenient. For example, the Zoom mode in previous versions was a great way to magnify not just text but entire web pages. Kestrel makes the magnification control immediately available in the bottom-right corner of the status bar, along with a toggle to view/hide images. Like most controls in the Opera user interface, these can be removed or repositioned if desired.

One of the neatest new features is My Opera Synchronization. For those of us who are often surfing from multiple computers or mobile devices while on the go, the synchronization feature lets you instantly import your bookmarks and Speed Dial sites. You create an account (mercifully, this does not require going to any web site but is integrated directly into the Synchronization dialog box in Opera) and then you can log in from any other platform and synchronize. I tried this on my aging iBook, and after only a couple of seconds, it had imported all my bookmarks and Speed Dial settings, although unfortunately not any other custom GUI configurations. This feature will be invaluable for mobile users.

Another nifty addition is that when you start typing in a URL or search term, Opera will not only auto-fill a dropdown list of previously visited pages starting with the letters you have typed, but it also searches the contents of web pages in your history and displays those matching results as well. So you can just type, say, "apple" in the URL and it will pick up not only www.apple.com but any recently visited web pages mentioning that particular fruit.

Overall, the new Opera raises the bar yet again for web surfing, and it remains my browser of choice. While many will still prefer Firefox for its plethora of third-party extensions, Opera remains a light and fast browser that still manages to cram in more features than clowns in a Volkswagen and is just as much fun to use.
http://arstechnica.com/news.ars/post...9-5-alpha.html





BCG: How 100 Top Companies from Rapidly Developing Economies are Changing the World
Cem Basman

New Twist In The Globalizing Economy’s Competitive Landscape: Emerging Global Companies Home-Grown In China, India And Other Rapidly Developing Economies (RDE’S): Boston Consulting Group (BCG) Research Identifies Hundreds of Companies Based in RDE’s With Clear Advantages not Only in their Fast-Expanding Home Markets, but also in Global Competition and Markets Around the World; Cutting Teeth in Tough Economies Breeds Smarts, Nimbleness and Extreme Cost and Labor Advantages, According to New BCG Report, Which Identifies and Tracks 100 RDE-Based “Global Challengers”.

Established multinational companies are, at various levels of effectiveness, sourcing, manufacturing and selling in rapidly developing economies (RDEs) like China and India in their fight to stay competitive in the globalizing economy. But are they coming to terms with an increasingly important, but less apparent, competitive threat: emerging global competitors based in RDEs? A new report from The Boston Consulting Group (BCG) delineates the new challenge for established companies and analyzes the advantages, strategies and impact of 100 of the many hundreds of RDE-based companies whose role in global competition is increasing quickly.

“Until recently, only a dozen or so companies based in rapidly developing countries could be described as emerging global challengers. Today there are hundreds, which is in line with the expectation that by 2050 China and India will be two of the world’s three largest superpowers,” said David Michael, BCG senior vice president and co-author of The New Global Challengers: How 100 Top Companies from Rapidly Developing Economies are Changing the World .

“Established companies must quickly become comfortable with, and envision their priorities in an environment inhabited by RDE-based challengers. The new competitors have low costs, ambitious leaders, appealing products and modern facilities. Incumbents will need to learn how to compete head on, partner and/or create their own ‘challenger’ via a subsidiary,” Michael said.

For the report, BCG used a screening process to select 100 companies –dubbed the RDE 100 – that exemplify the crop of global competitors now emerging from RDEs. The RDE 100 have $715 billion in combined revenue and are growing at rate of 24% a year. They currently derive 28% of revenue from international (non home-country) operations, and that portion will probably jump to 40% by 2010, according to the report.

Companies in the RDE 100 are in nearly all sectors: industrial goods (auto equipment, basic materials, engineered products); consumer durables (household appliances and consumer electronics); resource extraction; technology and business services. Seventy are from Asia (44 from China and 21 from India ), and 18 are from Latin America . The rest are from such countries as Russia and Turkey . Some examples are:

• BYD (China ), world’s largest manufacturer of nickel-cadmium batteries; has 23% share of mobile-handset battery market
• Bharat Forge (India ), the world’s second largest forging company
• Embraer (Brazil ), surpassed Bombardier as market leader in regional jets
• Chunlan Group Corp. (China ), has a 25% share of Italy ’s air-conditioner market
• Johnson Electric (China ), the world’s leading manufacturer of small electric motors
• Wipro (India ), the world’s largest third-party engineering services company
• Pearl River Piano Group (China ), the global volume leader in Piano manufacturing
• Ranbaxy Pharmaceuticals (India ), among the world’s top-10 generic pharmaceutical players

The RDE 100 are growing 10 times faster than the U.S. ’s GDP, 24 times faster than Japan ’s and 34 times faster than Germany ’s. They earned $145 billion in operating profits, equivalent to a 20% margin over sales. That compares with 16% for U.S. S&P 500 companies, 10% for Japanese Nikkei companies and 9% for German DAX companies.

The RDE 100’s total shareholder return (TSR) from January 2000 to March 2006 increased more than 150%, while the TSR of S&P 500 companies declined. RDE 100 companies’ portfolios contain $520 billion in fixed assets, and, in 2004, they employed 4.6 million people and had a payroll of $20 billion. They purchase $200 billion a year in raw materials and energy, $50 billion in parts and components and $40 billion in services.

RDE 100: Why They’re Going Global and Why They’re Good at it
Emerging global companies from RDE’s are going global because they’re focused on organic growth but find that their home markets either don’t have the scale or the resources to allow them to deliver the levels of shareholder value and competitive advantage they want to achieve, according to the report.

They aim globally to tap into new profit pools or gain long-term access to raw materials. Eighty-eight of the RDE 100 are seeking the former, 12 the latter. For instance, Baosteel, China’s biggest steel maker ($19.5 billion), is focused solely on the China market and has operating margins well above the industry average; its international expansion is designed to secure stable iron-ore supplies. Hence its purchase of part of CVRD’s Auga Limpa complex in Brazil .

Emerging companies from RDEs are good at international expansion in part because of the discipline they attained succeeding in their difficult home markets, according to the report. They learned to sell profitably to low-income customers; deal with immature logistics and distribution environments; navigate ambiguous legal situations; handle rapid external change and manage despite shortages of management talent. They also learned from foreign-based multinationals operating in their markets. “A company that has addressed these challenges in their home market will have the advantage when seeking to grow in similar markets abroad,” said Hal Sirkin, BCG senior vice president and co-author of the report.

RDE-Based Companies’ Hidden Advantages

While established players may have competitive advantages in terms of traditions of innovation, brand, intellectual property and distribution channels, RDE-based global players have a leg up in other, sustainable ways. “The RDE challengers are cash rich, and they’re aware of their advantages and know how to use them,” said Sirkin.

RDE player advantages include:

Low-cost resources: RDE-based labor is 10 to 20 times less than in highly developed markets, translating to up to 40% savings in the cost of end products; setting up a manufacturing site costs 60% of the price of a comparable facility in a developed country; equipment costs are up to 60% less
Making and selling products that appeal to price-conscious consumers: The market for low-cost products is the fastest-expanding one in the global marketplace
Modern and efficient plants and equipment, i.e., strong operating platforms: The average age of assets for Chinese companies is 7.2 years, compared with 16.9 for U.S. companies; production systems in RDEs are often more efficient and flexible because they often use labor instead of machinery
Access to huge talent pools: By 2010, China will graduate 800,000 engineers, mathematicians, technicians and scientists, and India will graduate 600,000. Together, this is 12 times the output of the U.S. university system
Home-market environment advantages: RDE companies’ home markets are huge and among the fastest-growing: In China, for instance, steel consumption is 2.3 times that of the U.S. RDE players have more know-how and connections in these environments, and thus greater potential to lead.
Further, government incentives and other variables lower their cost of capital

How RDE Challengers Will Grow

The RDE 100 has achieved 80% of its total growth organically, through exporting products to new markets and/or setting up international operations. The rest of the growth has been through small acquisitions –many of them international– with narrowly focused objectives. “The organic emphasis will continue, but we will see more acquisitions, as these emerging challengers’ desire to grow will exceed their ability to develop the necessary capabilities in house,” said Arindam Bhattacharya, BCG vice president and co-author of the report.
http://basman.wordpress.com/2006/06/...ing-the-world/





Software Via the Internet: Microsoft in ‘Cloud’ Computing
John Markoff

In 1995, Microsoft added a free Web browser to its operating system in an attempt to fend off new rivals, an effort ultimately blocked by the courts.

This week, it plans to turn that strategy upside down, making available free software that connects its Windows operating system to software services delivered on the Internet, a practice increasingly referred to as “cloud” computing. The initiative is part of an effort to connect Windows more seamlessly to a growing array of Internet services.

The strategy is a major departure for Microsoft, which primarily sells packaged software for personal computers. With this new approach, Microsoft hopes to shield its hundreds of millions of software customers from competitors like Google and Salesforce.com, which already offer software applications through the Internet.

Microsoft’s new Windows Live software suite includes an updated electronic mail program, a photo-sharing application and a writing tool designed for people who keep Web logs.

The new service is an indication that Microsoft plans to compete head-on against archrival Google and others, and not only in the search-engine business where it is at a significant disadvantage. Instead, Microsoft will try to outmaneuver its challengers by becoming the dominant digital curator of all a user’s information, whether it is stored on a PC, a mobile device or on the Internet, industry executives and analysts said.

Millions of PC users already rely on Web applications that either provide a service or store data. For instance, Yahoo and Google do their own forms of cloud computing, offering popular e-mail programs and photo-sharing sites that are accessible through a Web browser. The photos or the e-mail messages are stored on those companies’ servers. The data is accessible from any PC anywhere.

Hundreds of companies in Silicon Valley are offering every imaginable service, from writing tools to elaborate dating and social networking systems, all of which require only a Web browser and each potentially undermining Microsoft’s desktop monopoly.

Google, the most visible example, took cloud computing a step further last October and directly challenged Microsoft by offering a suite of free word-processing and spreadsheet software over a browser.

“To the extent that the industry is moving toward an on-demand business model, it poses a threat to Microsoft,” said Kenneth Wasch, president of the Software and Information Industry Association and a longtime Microsoft adversary.

Microsoft is a late entrant to a set of businesses that are largely defined as Web 2.0, but the company is counting on its ability to exploit its vast installed base of more than one billion Windows-based personal computers. It plans to give away some of its services, like photo-sharing and disk storage, while charging for others like its computer security service and a series of business-oriented services aimed at small and medium-size organizations.

“I think Microsoft is going beyond search to a more sophisticated set of services,” said Shane Robison, executive vice president and chief strategy and technology officer at Hewlett-Packard. “It will be a race, and who knows who will get there first?”

Brian Hall, general manager for Microsoft’s Windows Live services, said, “We’re taking the communications and sharing components and creating a set of services that become what we believe is the one suite of services and applications for personal and community use across the PC, the Web and the phone.”

He said the software would be the first full release of Windows Live that is intended to produce a “relatively seamless” experience between the different services and applications.

The Windows Live service — which will be found at www.live.com — includes new versions of the company’s Hotmail and Messenger communications services as well as Internet storage components. Microsoft executives said there were roughly 300 million active users each on the Hotmail and Messenger services, with some overlap.

The software release will offer PC users the option of downloading a set of the services with a single Unified Installer program, or as separate components. The individual services are Windows Live Photo Gallery, Windows Live Mail, Windows Live Messenger 8.5 and Windows Live OneCare Family Safety, a computer security program.

The release, though it includes the Windows Live Writer blogging application, carefully avoids cannibalizing two of Microsoft’s mainstays, the Word and Excel programs.

Windows Live services also underscore Microsoft’s desire to become the manager for a user’s data wherever it is located. Although they will not be included in the initial test release, the company’s recently announced SkyDrive online data storage service and its FolderShare service are being folded into Windows Live. SkyDrive currently gives test users 500 megabytes of free Internet storage, while FolderShare makes it possible to synchronize between multiple computers — including Apple’s Macintosh computers.

“When you think storage, think Windows Live,” Bill Gates said in an interview this summer. Microsoft is moving to create an experience that will divorce a user’s information from the particular device the person is working with at any moment, he said.

Microsoft’s new approach is in many ways a mirror image of the strategy used during the 1990s in defeating Netscape Communications when the start-up threatened Microsoft’s desktop dominance. Microsoft tried to tie the Internet to Windows by bundling its Internet Explorer Web browser as an integral part of its desktop operating system. The company lost an antitrust lawsuit in 2000 brought by the Justice Department in response to this bundling strategy.

Today, that strategy has been flipped with the growing array of Web services that are connected to Windows. But the new approach, which the company refers to as “software plus services,” is once again beginning to draw industry charges of unfair competition from competitors.

To head off that challenge, Microsoft has been participating in various international organizations that are setting standards over a wide range of services: from those aimed at consumers, like blog-editing and photo-sharing applications, to automated business processes like Web-based customer relationship management systems for sales staff and automatic ordering and logistics applications.

Last week, for example, Microsoft executives were put on the defensive after the company’s efforts to gain international adoption for a Microsoft-designed document format known as Open Office XML, led to charges of vote-buying in an international standards vote in Sweden.

After the charges received international publicity during the week, the Swedish Standards Institute reversed its position and decided to abstain on the issue, and a Microsoft executive apologized publicly for the gaffe.

On Wednesday, Jason Matusow, Microsoft’s senior director for intellectual property and interoperability, wrote on his Web site: “I understand the concern raised by this error in judgment by an MS employee. The only thing I can say is that the right things were done as the issue was identified. The process and vote at S.I.S. were not affected.” Microsoft did not specify what actually had transpired.

While the industry dispute over document formats was visible last week, several Microsoft competitors were quietly pointing to another standards issue that may prove to be a significant advantage for software giant in the future.

A set of Web services standards that have emerged from the World Wide Web Consortium might give Microsoft a performance advantage, according to industry executives at three companies, who declined to be identified because they are Microsoft business partners.

Microsoft’s standards efforts have angered its competitors because four years ago the software publisher argued publicly against adding compression features that are designed to improve performance to industry Web services standards. Now, however, Microsoft has developed its own compression standards that will potentially make its versions of Web services perform better than those of their competitors.

“They’re playing the game right,” said a rival. “The idea is to offer a solution that works better in an all-Microsoft environment.”

On Friday, a spokesman for Microsoft said that services that take advantage of the Web standards effort like Silverlight, a new system for displaying multimedia content via a Web browser that competes with Adobe’s Flash media player, would not be included in the first release of Windows Live, but would be added in the future.
http://www.nytimes.com/2007/09/03/te...y/03cloud.html





Entire City of Vista Users Can't Access the Internet

There's a kind of hush

PEOPLE in the city of Lund in Sweden that use the Microsoft Vista OS can't connect to the Internet.

According to this local newspaper, the reason is because Lund is a Linux city which has a a Linux server that doesn't like Vista.

Lundis Energi blamed Microsoft because Vista has got a bug and it isn't going to change the configuration of the server just to cope with the flaw.

A local Microsoft rep said it could probably fix the problem if Lundis Energi got in touch with it.
http://www.theinquirer.net/?article=42043





NZ Rejects Microsoft OOXML, Sweden Confused
Tom Espiner

New Zealand last week voted to reject Microsoft OOXML as an international standard while the Swedish Standards Institute invalidated its own vote after discovering irregularities.

New Zealand has voted "no" to OOXML being fast-tracked for ISO certification at present.

Grant Thomas, chief operating officer, Standards New Zealand, said in a statement: "Stakeholders raised several philosophical concerns, and identified technical omissions, errors and inconsistencies within the draft Standard. We believe that voting 'no' with comments allows these issues to be addressed."

The Swedish Standards Institute (SIS) declared its vote invalid after it revealed on Thursday that a participant voted more than once. The move follows criticism of SIS's earlier decision to vote "yes" to Office Open XML (OOXML) by the Free Software Foundation Europe, which accused Microsoft of ballot rigging.

"The SIS has information that indicates that one of the participants in the workgroup participated in the ballot with more than a vote," said the SIS in a statement. "Such a procedure is not compatible with the SIS's rules, which state that each [member] only has one vote."

The decision means that the SIS will take the decision not to vote if it is unable to take a new ballot before 2 September, when the global balloting process ends, according to Lars Flink, SIS chief executive.

Microsoft has admitted encouraging partners to join the national bodies deciding whether to recommend OOXML for fast-track ISO (International Organization for Standardization) certification.

If OOXML receives ISO certification, it could pave the way for OOXML to be accepted by governments as a document standard. The Free Software Foundation has argued that OOXML contains proprietary components.
http://www.builderau.com.au/news/soa...9281682,00.htm





Brazil Votes Against Open XML
Luiza Dalmazo, Tais Fuoco and Camila Fusco

The Brazilian organization in charge of technical standards has decided to vote "no, with conditions" to Microsoft Corp.'s Office Open XML document format during an International Organization for Standardization (ISO) meeting on Sunday.

The Brazilian Technical Standards Association, or ABNT in Portuguese, voted unanimously against Open XML, pointing out 63 issues related to the document format during a final meeting last week prior to the ISO session.

The ABNT position was also supported by local government organizations, ministries, commissions and advisory boards. The vote was taken after a clarifying speech made by ABNT Director Eugenio Guilherme Tolstoy De Simone.

Among the issues cited are lack of compatibility with the Gregorian calendar, lack of support for languages such as Chinese, Japanese and Korean, and security issues including the possibility of password breaches and vulnerability to viruses.

The decision of "no, with conditions" means Brazil can change its vote if these issues are solved. Those involved in the process consider that unlikely.

"Microsoft Brazil believes the technical agreement effectively represents an opportunity of evolution in the standard," the company said in a statement responding to the decision. The company pledged to "interact with society, private companies, corporate associations, universities and federal local government in order to develop Open XML."

IBM Corp. also weighed in on the matter. "Our impression is Open XML is a standard done in a hurry", said Cezar Taurion, new technologies manager at IBM Brazil. "Open XML is not mature enough and we think it is worth to be outlined again, since we already have an ISO standard which does not exclude any technology."

Open XML, which is the default format in the Office 2007 suite, competes with the OpenDocument Format for XML, or ODF, which is an ISO standard.

Besides Brazil, a technical committee in India last week unanimously voted to reject the format ahead of the ISO meeting. Although the U.S. representative organization to the upcoming meeting had said that it would vote no as well, it since has signaled an intention to vote "yes, with comments."

The executive board of the International Committee for Information Technology Standards (INCITS), based in Washington, D.C., is scheduled to meet again on Wednesday and take up the proposal one more time before submitting its final vote to the ISO.
http://www.itworldcanada.com/a/News/...26ca1b1d4.html





French Blow for Microsoft's Office Open XML

France says no to standard, Australia abstains
Peter Sayer

France has voted against the adoption of Microsoft's document format Office Open XML as an international standard, while Australia has decided to abstain.

Microsoft offered its OOXML specification to standards body ECMA last year, paving the way for the file format to be fast-tracked through the International Organization for Standardization's approvals process.

If enough other national standards bodies have voted the same way as those of France, India and Brazil, and OOXML is not approved as an international standard, Microsoft could miss out on revenue from the lucrative government market.

A number of governments, worried that the need for access to electronic archives in proprietary formats leaves them hostage to their software vendor, have mandated the use of document formats that comply with open international standards.

Others are considering such a move, which could put Microsoft at a double disadvantage to open-source products such as OpenOffice.org, which not only store files in the standardised Open Document Format, but are free.

The French Association for Standardization, Afnor, announced on Monday that it had informed the International Organization for Standardization of its 'no' vote on the proposal to make Microsoft's OOXML format an ISO standard.

ISO had asked national standards bodies around the world to give their verdict on OOXML by September 2, and is in the process of counting the votes submitted. It will announce the result by Wednesday, officials say. Afnor had declined to announce its decision until ISO had received all votes.

Standards Australia, the Australian national standards body, announced on Monday that it had abstained from the vote, after its members failed to reach a consensus.

The Swedish body last week annulled its vote in favour of adoption of the standard when it transpired that a Microsoft employee had pressured partners of the company to vote to support it. The US standards body INCITS, however, has voted in favour of adopting OOXML as a standard.
http://www.pcadvisor.co.uk/news/index.cfm?newsid=10605





Microsoft Favored to Win Open Document Vote
Kevin J. O’Brien

Amid intense lobbying, Microsoft is expected to squeak out a victory this week to have its open document format, Office Open XML, recognized as an international standard, people tracking the vote said Monday.

The move would help Microsoft, the world’s largest software maker, maintain its competitive advantage in the expanding field of open document formats.

“After what basically has amounted to unprecedented lobbying, I think that Microsoft’s standard is going to get the necessary amount of support,” said Pieter Hintjens, president of Foundation for a Free Information Infrastructure, a Brussels group that led the opposition.

The underlying code of an “open” document is public, allowing developers to improve and derive new products without having to pay royalties. The first open format to become an international standard, in May 2006, was OpenDocument Format, developed by a group led by International Business Machines.

Microsoft sought a similar status for Office Open XML so it could also sell software with open characteristics, which are increasingly being demanded by national and local governments in Belgium, France, Germany, the Netherlands and Brazil, as well as by Massachusetts in the United States.

Member countries in two global standards bodies, the International Organization for Standardization, known as I.S.O., and the International Electrotechnical Commission, or I.E.C., both based in Geneva, have been casting votes since April on whether to designate Office Open XML as a global standard.

The issue has split the groups, with some members asserting that the I.S.O. and I.E.C. should not be endorsing the commercial product of a single company.

Others say a standards designation would reflect reality, because more than 90 percent of electronic documents are in Microsoft format.

Electronic voting closed Sunday. Roger Frost, an I.S.O. spokesman in Geneva, said his organization was tallying the votes and expected to announce the results on Tuesday or Wednesday.

The European Computer Manufacturers Association, known as E.C.M.A., a standards group based in Geneva, endorsed Office Open XML as a European standard last December.

According to Mr. Hintjens, whose group has been tallying the votes of participants, countries including Japan, Canada, India, China, Brazil, France and Britain voted against Microsoft’s proposal. France and Britain made their votes conditional, meaning they could later change them to yes, should Microsoft alter its 6,500-page standard to allay technical and liability concerns.

Switzerland, the United States, Portugal and Germany supported Microsoft’s bid, Mr. Hintjens said, as did some smaller countries like Trinidad and Tobago, Kenya and Ivory Coast, some of whom became active late in the voting at Microsoft’s urging.

To win passage, Microsoft’s standard must gain support from at least two-thirds of 37 countries on an information technology panel of the I.S.O. and I.E.C. called the Joint Technical Committee 1, and cannot be opposed by more than 25 percent of all countries casting ballots.
http://www.nytimes.com/2007/09/04/te...gy/04soft.html





Microsoft Loses Key U.S. OpenXML Vote

INCITS' executive committee was one vote shy of approving Microsoft's OpenXML as a standard, dealing a setback to the company's efforts to compete with ODF
Robert McMillan

Microsoft has lost a key vote in its quest to develop an alternative to the Open Document Format standard, backed by the open-source community.

The executive committee of the International Committee for Information Technology Standards (INCITS) fell one vote shy of the nine required to approve Microsoft's Open XML standard. It voted 8 to 7 in favor of approval with one abstention, the group announced Thursday.

The vote is a setback in a long-running battle between Microsoft and those who are seeking to dislodge Microsoft's monopoly hold on the desktop with internationally approved standards for office documents. The battle has pitted Microsoft against open-source backers like Sun and IBM, whose rival ODF (Open Document Format for XML) has gained some support among government users.

Open XML is the default file format used by Microsoft's Office 2007.

ODF was approved as an ISO (International Organization for Standardization) standard last year, a sign that it could gain traction with organizations that give preference to standards-based technology.

But recently, Microsoft has been pushing to get Open XML blessed by the ISO -- seeking to have it approved by the Joint Technical Committee 1 (JTC-1), which sets technical standards for both the ISO and the International Electrotechnical Commission. Standards groups like INCITS, which is examining the question in the U.S., have been debating whether or not to back this effort.

"This is going on all over the world right now in a very bitterly contested country-by-country battle," said Andrew Updegrove, an open-source advocate and attorney with Gesmer Updegrove in Boston. Microsoft's public relations agency did not return calls seeking comment Friday.

INCITS has until Sept. 2 to decide whether it will support Open XML within the JTC-1, but this week's vote shows that this will not happen unless Microsoft can swing some voters.

Committee representatives from Microsoft, Apple, Intel, Sony, EMC, Hewlett-Packard, the U.S. Department of Homeland Security, and the Electronic Industries Alliance supported Microsoft's standard. Against it were IBM, Oracle, Lexmark, the U.S. Department of Defense, the National Institute of Standards and Technology, GS1 U.S., and Farance. The Institute of Electrical and Electronics Engineers (IEEE) abstained due to "the divergent viewpoints of key IEEE members."
http://www.infoworld.com/article/07/...ML-vote_1.html





Blindsided by science

OUP Wants Me to Pay for My Own Open Access Article

I have been dismayed (previous post: “Open Access”) at the lack of commitment to OA by mainstream (primarily toll-access (TA)) publishers and have described this as a “systemic failure” of the industry. Here is another unacceptable lack of clarity and commitment from an Open Access journal from a major publisher. I had been investigating OUP’s site for another reason (PRISM: Open Letter to Oxford University Press) and since I had published with them thought I would have a look at papers I had written (”I” and “my” include co-authors). This is what I found (screenshot):

The electronic article is accompanied by a sidebar with “request permissions”. I followed this and the result is shown above. The journal wishes to charge me 48 USD to:

• USE MY OWN ARTICLE
• ON WHICH I HOLD COPYRIGHT
• FOR NON-COMMERCIAL PURPOSES (TEACHING)

The journal is therefore

• SELLING MY INTELLECTUAL PROPERTY
• WITHOUT MY PERMISSION
• AGAINST THE TERMS OF THE LICENCE (NO COMMERCIAL USE)

I am lost for words…

… the only charitable conclusion I can draw is that the publisher ritually attaches the awful Rightslink page to every article automatically and that this is a genuine mistake. I have found such “genuine mistakes” with other publishers in their hybrid journals (i.e. where only some of the papers are OA, the majority being toll-access TA). But this is a fully OA journal - all papers are OA - I assume CC-NC. There is no excuse for including the Rightslink page on ANY OA paper, let alone every one on a journal.

If this is - as I desperately hope - a genuine mistake then my criticism might seem harsh. But it is actually part of the systemic failure of the industry to promote Open Access. And I hope that OUP can and will clarify and rectify the position. If, however, it is deliberate and that the publisher actually intends to charge readers and users for Open Access articles I shall reserve comment.

This is not a trivial point. The normal reader of a journal who wishes to re-use material has to navigate copyright constraints and restrictions on an all-too-frequent basis. Such a reader, especially if they were relatively unaware of Open Access could easily pay the journal for “permission to use an Open Access article for teaching”. (Note that other charges are higher - to include my own article in a book I write would cost nearly 350 USD).

It is all indicative of an industry that simply isn’t trying hard enough.

RECOMMENDATION:

OPEN ACCESS ARTICLES ON PUBLISHERS’ WEB PAGES SHOULD NEVER BE ACCOMPANIED BY RIGHTSLINK OR OTHER PERMISSION MATERIAL. INSTEAD THE PUBLISHER SHOULD PRO-ACTIVELY POINT OUT THE NATURE OF OA AND ENSURE THAT THE READER AND RE-USER IS FULLY AWARE OF THEIR RIGHTS.

After all, the author has paid for this…
http://wwmm.ch.cam.ac.uk/blogs/murrayrust/?p=529





Code to Unlock iPhone Cracked

A group of anonymous software developers said they will soon start selling a program that will allow iPhone owners to use the hugely popular device on cell phone systems around the world and not just with AT&T.

Apple's iPhone, released in the United States two months ago, was engineered to operate for the first two years only on the AT&T system through an exclusive arrangement between Apple and AT&T. It has not yet been sold outside of the U.S.

Los Angeles software consultant Brett Schulte, who is not affiliated with the developers, demonstrated the software for CNN Friday evening.

An iPhone that had the new software appeared to work on the T-Mobile system just seconds after Schulte replaced the AT&T SIM card with a T-Mobile SIM card.

"It's completely software hacked," Schulte said. "There's no case opening required. It's not required to do any kind of disassembly." It took Schulte about two minutes to unlock the iPhone.

The developers would not give CNN their last names, saying "We don't want to be hounded."

The said they would start selling the software, which they haven't yet priced, as soon as their online payment and customer service systems are ready. They're also waiting for more information from their lawyers.

Apple spokeswoman Jennifer Bowcock told CNN her company has no comment.

AT&T spokesman Mark Siegel said he couldn't speculate on the legality of unlocking the phone, but he added, "When you sign up, you're signing a two-year contract. You're obligated to pay the bill."

"When people buy the iPhone it's clear from our materials it's designed to operate exclusively on AT&T," Siegel said.

Schulte, however, said it is possible to buy an iPhone without being contractually obligated to AT&T.

The developers recently created a Web site -- iPhoneSIMfree.com -- but there is very little information on it and no direct way for anyone to purchase the software. Internet records showed they bought the domain name less than two weeks ago.

Two members of the group, who identified themselves only as "John" and "Liu," told CNN in a phone interview that a core group of six people on three continents worked to unlock the iPhone as a hobby.

They said they are fans of Apple products who thought the iPhone should be made accessible to people who cannot use AT&T.

"I'm not in America and I can't use it," said Liu, who would not reveal the country in which he lives. "It's not fair."

Asked if he thought modifying the iPhone was legal, he said "That's a very good question. I truly believe it is."

John and Liu said they have not been contacted by either Apple or AT&T, but said that could change the moment their software goes on sale.

Earlier this month, a teenager figured out a way to unlock the iPhone, but his method required disassembly of the unit.
http://www.cnn.com/2007/TECH/09/01/a...one/index.html





Cell Phones Can Trigger Medical Equipment Failure, Problem Could Get Worse
John Timmer

As people become increasingly comfortable with the use of cellphones, they're beginning to chafe at the remaining restrictions on their use (as anyone who has boarded an airplane recently can attest). The tension over wireless limitations is even more complex in the medical world, where not only do patients and their families want to stay in touch, but wireless connectivity can enable better patient care. A Open Access study that was released today points out yet another complication: wireless technology is a moving target, and what's safe today may not remain so.

The work follows up on an earlier study that suggested that not all cellular technology might be equal when it comes to interference with medical equipment. GSM networks can handle data from two generations of transmission technology: UMTS, and the higher-powered GPRS. The original study suggested that, although UMTS devices were generally safe to have around medical equipment, GPRS-based phones had the potential to interfere with their function.

The new study focuses on what could be considered "worst case" interference. Instead of using typical operating power, the authors reasoned that a hospital environment, which is often deep within a building and subject to a variety of sources of interference, is likely to force phones to operate at their maximal power limits (in the case of GPRS devices, 2 watts). So, they set up both GPRS and UMTS antennae 500cm away from medical devices, and gradually moved them closer while checking the device's function. Problems were classified as light when they simply interfered with monitoring the device, significant when they required intervention, and hazardous when they created a health risk for the patient. Devices included various pumps, monitoring equipment, defibrillators, and pacemakers.

All told, the authors witnessed 48 events, affecting 26 of the 61 medical devices tested. The good news is that cellular devices typically had to be on top of equipment before causing a problem; the mean distance at which signs of trouble appeared was only 3cm. Still, at least one hazardous event occurred out at 300cm (nearly 10 feet), and five happened at 25cm. The key result, however, is the clear relationship between signal power and problems. The UMTS signal, which operates at 10 percent of the power of GPRS devices, caused only 17 percent of the trouble. A low-frequency GPRS signal produced 31 percent of the incidents, while a high frequency version caused about half of the problems. The severity of the problems broke down along similar lines.

The authors note that the existing safety standards of the Netherlands, where the studfy took place, limits cell phones to a distance of over a meter from medical devices, and they suggest this standard is reasonable. But the more notable message is one the authors didn't mention: those standards are clearly going to need to be reevaluated as wireless devices evolve in the future.
http://arstechnica.com/news.ars/post...t-failure.html





Gadget Maker or Service Provider? Firms Start to Overlap
Eric Pfanner

Nokia used to be just a cellphone maker. Google used to be just an Internet company.

Now Nokia wants to be an Internet company and Google, according to rampant speculation among bloggers and technology analysts, may be about to enter the mobile phone fray.

“Devices alone are not enough anymore,” Olli-Pekka Kallasvuo, chief executive of Nokia, said last week in London as the company announced plans for a digital music store, a game service, social networking links and other mobile Internet initiatives, grouped under a new brand, Ovi. “People want more; they want the complete experience.”

Meanwhile, a Google spokesman declined to comment on reports that a “Google phone,” or “G-phone,” was imminent. Such a device would take the Internet company into a business that has long been dominated by Nokia, but that has been shaken up by the recent introduction of a high-profile newcomer, Apple’s iPhone.

Apple is also expected to make news this week, having scheduled a product announcement for Wednesday with the teasing line, “the beat goes on.”

Analysts say Apple may introduce anything from upgraded iPod music players to a deal to sell Beatles music on the iTunes digital music store.

As the likes of Apple, Nokia and, perhaps, Google move to give mobile users “the complete experience,” they are bound to overlap more and more not just with each other, but with others in the mobile business.

“This is the downside of convergence,” said Paul Jackson, an analyst at Forrester Research. “All of these players want a bit of everyone else’s market — device makers, network operators, content owners.

“They can’t dictate to a consumer when they should consume a content product,” Mr. Jackson said. “But if they control more of the end-to-end experience, they can benefit from these decisions.”

The eagerness of all these companies to increase their involvement in mobile media may seem surprising, given that it remains a relatively small market. Music sold directly to wireless devices, rather than downloaded first to a PC, accounted for about $1 billion in revenue last year, according to the International Federation of the Phonographic Industry, but much of that was concentrated in a few Asian markets. And ring tones, rather than full-track song downloads, still make up a substantial portion of those sales.

Still, analysts see potential for rapid growth as mobile content gains traction in other areas.

EMarketer, a research firm, says mobile advertising in Europe will grow to nearly $3 billion in 2011 from less than $400 million in 2006.

That helps explain the interest of Google, whose online business is based on advertising. Google already has partnerships with a number of mobile operators to provide cellular access to its search portal, map service and other features. But by making a phone, Google could make it even easier for users to get to these services, analysts say, enhancing its ability to sell mobile advertising.

Nokia’s decision to start a mobile music store could increase pressure on Apple to follow suit, analysts say.

When asked about plans for a wireless iTunes, Apple said only that it was “looking forward to bringing iPhone to Europe later this year.”

Microsoft’s Zune music player already allows wireless sharing of songs, at least those without digital copy protection between devices. How long, some analysts ask, before the company also decides to produce a Zunephone?

Another phone maker, Sony Ericsson, is planning a series of announcements in the coming months related to the “user experience,” said Merran Wrigley, a spokeswoman.

In other words, Sony Ericsson is looking beyond the devices themselves to the software and services that could make mobile content more appealing. Many wireless operators continue to refine their own mobile portals and content services, even if these have generally had only limited success.

So even as everyone talks about simplicity, user experiences and end-to-end offerings, it seems that the options are about to proliferate.

“I pity the poor consumer,” said Mark Newman, chief research officer at Informa Telecoms & Media. “From a consumer perspective, it’s very confusing to figure out where to go.”
http://www.nytimes.com/2007/09/03/te...y/03Nokia.html





The Hunt for Gotta-Have-It Gadgets
Peter Wayner

JON WESTFALL remembers well the time he wired $1,000 to a man in Dubai whom he had never met. His contact had an iMate, a small hybrid of a cellphone and a P.D.A., that was not available in the United States.

“He told me, ‘There’s no reason for you to trust me, but if you really want one, Western Union me $1,000 and I’ll send you one.’ ” Mr. Westfall, a contributing editor for PocketPCTHoughts.com who lives in Marblehead, Ohio, had to have one. “It was the first model they ever released. This one was just the Cadillac of PocketPCs,” he said. “I don’t know what I was thinking, but about three or four weeks later he was able to get me one because they were pretty scarce, even over there.”

Anyone who has ever wanted the smallest, quickest, slickest or simply the newest gadget knows the feeling. The solution had been to search the world, wade into the riskiest online bazaars, grapple with manuals written in foreign languages, and live with the lack of manufacturer’s support.

This is still true today, but the first adopters willing to pay a premium for the exotic notebook computers, cellphones and tech toys can turn to any number of businesses that specialize in finding objects that are not sold in the big-box store near their home.

“We love to have the newest thing that no one else has,” said Eric Ralls, the president of RedOrbit.com, a space exploration Web site that sells electronics from around the world.

His products are found by Dynamism.com, another importer of the unavailable. One of the pioneers in the segment, Dynamism has agents in Japan, South Korea and Europe who watch the stores for new products from the local manufacturers, large and small, that are not being exported to the United States.

Douglas Krone, Dynamism’s chief executive, said the company not only imported the products, but also customized them by translating manuals and installing local versions of the software if it existed. If there are problems, Dynamism offers a “rescue warranty” that pays for unlimited support and overnight shipping for repairs.

The manufacturers, for a variety of reasons, decide a product is not worth shipping overseas. It may be that its size or sensibility is not quite right for foreigners. (American consumers tend to favor ever-larger laptops, while Japanese are fascinated with the smallest ones.) “Sony is a Japanese company, and Japan comes first for them,” Mr. Ralls said.

The product may be a limited edition, made in numbers too small to justify export, or perhaps all the bugs have not been worked out. Often, companies simply conclude that there is not a mass market for the product in the United States.

EBay continues to be a popular source of the hard-to-get products. Mr. Westfall, for instance, said he had his eye on the HTC Kaiser, a new smartphone with a hidden keyboard and the ability to connect to almost every major wireless network using Wi-Fi. He hoped to find one on eBay.

“You look for someone who’s traveling in Europe who’s looking to make some money on eBay,” Mr. Westfall said. “You can go to some of these Web sites that are based over in Europe, but it’s a crapshoot to whether they’ll actually ship to you or if they have the capacity to do the custom forms.”

There are risks, as there are with many things you buy on the big auction site. “You can buy from eBay for cheaper than you buy it from us, but if it breaks you may have a very difficult time getting service,” Mr. Krone said.

Frequent travelers are good sources for phones and information about them because they are often forced to become experts in the various worldwide standards. Jonathan Zuck, a lobbyist who travels monthly to Brussels, said he needed a phone that can work in both the United States and Europe. On trips, he swaps out the small SIM card inside his cellphone with one he buys there in order to have a local number and pay local — and much cheaper — rates.

Mr. Zuck picked up his latest phone, an HTC Touch, in Europe. In the past, he has tried to order products only to find that customs forms can often be daunting for some foreign retailers even when items are shipped. “I often just buy the stuff overseas and bring it home,” he said.

He has his eye on the TZ90, a slim 2.26-pound laptop from Sony — “Bordeaux colored” — that Dynamism is importing.

The risk in this business — for the customer and the vendor alike — is that the overseas manufacturer may decide that the coveted product is indeed worthy of export, destroying its exclusivity. For instance, Sony recently introduced a line of the TZ-model notebooks, all with dual-core processors, at prices that range from $2,200 to $3,000. Now Mr. Zuck is torn whether to buy what anyone can get here or go for the model Dynamism sells. He said he might make his decision based upon the service.

Opinions vary on whether the gadget gap between America and the rest of the world is closing, but Mr. Krone said that Dynamism’s window of opportunity was always small. “Most of the products we’re selling do get mass-marketed here, and we discontinue them,” he said.

While much of the focus is on computers and cellphones, the Web sites also offer a wide variety of other gadgets. Ty Liotta, a senior merchandiser for the online emporium ThinkGeek.com, said his site tried to be highly inclusive by importing goods from Britain, India, China, Japan and elsewhere. “We’ve got a section called Japan Fan, which is all Japanese things,” he said. “We have this radio-controlled R2-D2 action figure.”

The section also includes a Godzilla Marble Blaster and radio-controlled sumo wrestlers.

Dynamism also stocks a few imported gimmicks like a small laser pointer that projects the time, and the Nabaztag/tag, a plastic bunny with ears that move that is networked over the Internet to other bunnies. “That Japanese cute sensibility, that’s the focus of a lot of our gadgets,” Mr. Krone said.
http://www.nytimes.com/2007/09/06/te...sics.html?8dpc





Googzilla

Japan to Fight Google Search Dominance
Mariko Sanchanta and Richard Waters

Tokyo, alarmed by the global dominance of Google and other foreign internet services, is spearheading a project to try to seize the lead in new search technologies for electronic devices.

The push has been sparked by concerns in Japan that the country’s pre-eminence in consumer electronics has faded and value in the technology industry is moving away from hardware.

As South Korean and Taiwanese electronics companies churn out products nearly identical to those of the Japanese majors, there are fears in Tokyo that the country’s manufacturers are falling behind in innovation.

“The question is how Japanese companies like Sharp and Matsushita can be encouraged to provide services. They clearly have the know-how to build things,” says Toshihide Yahiro, director of the information service industry division at the ministry of trade. “The key to Japan’s competitiveness has been our core technology but we need to create a new value-added service that is personalised.”

The shift of focus away from hardware echoes attempts by some of the biggest personal technology companies to become stronger in software and services. In one of the most prominent examples, Nokia last week outlined plans for an online music store and other services.

Tokyo hopes to use Japan’s strength in developing devices, such as mobile phones and car navigation systems, to create proprietary search and information retrieval functions. But some question whether a state-led project is capable of overhauling Google.
The Japanese project is comprised of 10 partnerships, each tasked with a specific next-generation search function. For example, the government has matched NTT Data with Toyota InfoTechnology Center and Toyota Mapmaster to create an interactive, personalised car navigation system. Other partnerships involve NEC, Hitachi and Sony Computer Science Laboratories. The ministry of trade has allocated Y14bn-Y15bn (€89m-€95m) to the project.

“Seventy per cent of car navigation systems are made in Japan. There is scope for more personalization,” says Mr Yahiro. “There is a need for car navigation systems that are capable of searching for which bathrooms are equipped with baby-changing stations and other necessities.”

Some blame Japan’s copyright laws for holding back the development of web services. Services such as Google hold copies of other companies’ web pages on their servers. Because Japanese law forbids the duplication of copyrighted works without the rights holders’ permission, Yahoo Japan, Google Japan and other search engines offered in Japan operate from US-based servers.

The specific focus on search reflects the prominence that this service has achieved since the rise of Google, while also reflecting broader international concerns about US dominance of an important information business.

France and Germany launched a plan of their own to seed development of a “next generation” European search engine nearly two years ago, though Germany pulled out of the plan.
http://www.ft.com/cms/s/0/b3046d5c-5...0779fd2ac.html





House Passes Patent Overhaul Bill
Grant Gross

The U.S. House of Representatives on Friday passed a bill to overhaul the nation's patent system, overcoming objections by many Republicans, small inventors and some labor unions.

The Patent Reform Act, supported by several large tech vendors including Microsoft Corp. and IBM Corp., would allow courts to change they way they assess damages in patent infringement cases. Currently, courts generally consider the value of the entire product when a small piece of the product infringes a patent; the bill would allow, but not require, courts to base damages only on the value of the infringing piece.

The bill would also allow a new way to challenge patents within one year after they've been granted.

The House passed the Patent Reform Act by a vote of 225-175. The Senate has not yet acted on a similar piece of legislation.

However, the White House Office of Management and Budget (OMB) issued a statement on Thursday saying it opposes the bill. It said that the changes in assessment of damages would "introduce new complications and risks reducing incentives to innovate." The OMB objections raise the possibility that President George Bush could veto the legislation.

Large tech vendors have been pushing for patent reform for close to five years. The Software & Information Industry Association (SIIA), the Business Software Alliance, and the Computing Technology Industry Association, all praised the House for passing the bill.

House passage is a "significant step toward improving our patent system," said Mark Bohannon, SIIA's senior vice president of public policy.

Asked about the OMB's opposition to the bill, Bohannon said recent changes have addressed many concerns. Apportionment of damages, one of the OMB's major concerns, needs to change, he added. "If we don't address the problem, we're not going to improve the system," he said.

Many Democrats and some Republicans argued the bill is needed because patent infringement lawsuits have gotten out of hand. It's too easy for patent holders to sue and collect huge damage awards when a small piece of a tech product is found to infringe, supporters argued.

The patent system "is getting near broken," said Representative Howard Berman, a California Democrat and primary sponsor of the bill. "Doing nothing is not a good answer for a Congress that wants the economy strong."

Opponents argued the bill favors tech giants at the expense of small inventors. "The legislation ... helps a small group of powerful people," said Representative Dana Rohrabacher, a California Republican.

Representative Marcy Kaptur, an Ohio Democrat, noted that between 1993 and 2005, four major tech vendors supporting the bill paid out US$3.5 billion in patent infringement settlements. But those same unnamed tech vendors had revenues of $1.4 trillion during that time period, she said.

Tech vendors want to reduce patent infringement costs "not by changing their obviously unfair and often illegal business practices, but by persuading Congress and the Supreme Court to weaken U.S. patent protections," she said. "We ought to stand up for American inventors."

The bill also sets into motion a change in the way patents are awarded, from the first-to-invent system unique to the U.S. to the first-to-file system used by the rest of the world.
http://www.itworld.com/Man/2687/070907patent/index.html





Breakthrough Revolutionises Microchip Patterning

US research engineers claim to have developed a low-cost technique for patterning microchips.

The Princeton University boffins said that the new process allows them to create ultra-small grooves on microchips as easily as "making a sandwich".

The "simple, low-cost" technique results in the self-formation of periodic lines, or gratings, separated by as little as 60nm, or less than one ten-thousandth of a millimetre.

Features of this size have many uses in optical, biological and electronic devices, including the alignment of liquid crystals in displays.

The new 'fracture-induced structuring' process starts when a thin polymer film is painted onto a rigid plate, such as a silicon wafer.

A second plate is then placed on top, creating a polymer 'sandwich' that is heated to ensure adhesion. Finally, the two plates are prised apart.

As the film fractures, it automatically breaks into two complementary sets of nanoscale gratings, one on each plate. The distance between the lines, called the period, is four times the film thickness.

"It is like magic," said electrical engineer Stephen Chou, the Joseph C. Elgin Professor of Engineering at Princeton. "This is a fundamentally different way of making nano-patterns."

The ease of creating the lines is in marked contrast to traditional fabrication methods, which typically use a beam of electrons, ions or a mechanical tip to 'draw' the lines into a surface.

The fracture-induced structuring technique is not only simple and fast, but enables patterning over a much larger area.

The researchers have already created gratings over several square centimetres, and the patterning of much large areas should be possible with further optimisation of the technique.

"It is remarkable, and counterintuitive, that fracturing creates these regular patterns," said William Russel, a chemical engineering professor and dean of Princeton's graduate school.

Russel and graduate student Leonard Pease III teamed with Chou and graduate students Paru Deshpande and Ying Wang to develop the technique.

A patent application has been filed on the process, which the researchers say is economically feasible for large-scale use in industry.

The researchers will publish their findings in the online version of Nature Nanotechnology.
http://www.itnews.com.au/News/60477,...atterning.aspx





Sharp Announces New System LCD with Embedded Optical Sensors; Provides Input Capabilities Including Touch Screen and Scanner Functions
Press Release

Sharp Corporation has successfully developed a new System LCD equipped with touch screen and scanner functions. An optical sensor is built into each pixel of the LCD panel, eliminating the need to bond a film to the panel for touch screen functions, and providing beautiful images without losing display image quality.

Today, touch screen functions are becoming indispensable on displays for mobile devices such as smartphones, digital cameras, PDAs[1], and UMPCs[2]. However, conventional methods to provide such functions mainly involve laminating or bonding a film on top of the LCD panel, leading to problems with reduced display image quality and increased thickness for the display section.

In this light, Sharp developed its proprietary System LCD technology to successfully embed an optical sensor used in devices like scanners in each pixel of the LCD panel. This technology eliminates the need for films, resulting in a thinner, beautifully clear screen display compared to conventional touch screens. In addition, tactile recognition based on simultaneously touching multiple points on the screen is now possible, a feature previously difficult to implement. For example, users can easily tap the screen with two fingers to enlarge or reduce a displayed map. Also, the scanner function can be used to scan in a business card placed on top of the screen, and further improvements to this function are expected to enable fingerprint authentication in the future.

Sample shipments will begin in September of this year, with volume production slated to start next spring.
http://www.japancorp.net/Article.Asp?Art_ID=15247





What's Wrong With Lithium-Ion Batteries?

The announcement last month that 46 million Nokia-branded lithium-ion (Li-ion) batteries made by Matsushita Battery Industrial could potentially short circuit and overheat was just the latest in a spate of product advisories and recalls of the technology over the past two years.

But it’s not as if Li-ion batteries are at the early point in their life cycle when you would expect these sorts of problems to crop up. Sony invented the technology back in 1990. So why is it failing now?

The theories behind the technology’s recent spotty performance are complex and varied, which makes fixing the problem a perplexing engineering challenge.

A Constantly Evolving Technology

“You can’t really say that for the first ten years the battery makers got it right and now they’re screwing it up,” says Jim Miller, Manager of Argonne National Lab’s Electrochemical Technology Program. Funded by the U.S. Department of Energy, his group’s research is directed at developing new materials for Li-ion batteries and addressing some of the major issues in scaling up the technology.

Miller points out that Li-ion battery technology is not just a single design or composition, but rather it’s an entire family of chemistries that is constantly evolving. “When Sony invented it in 1990, it was lithium cobalt oxide. But cobalt is expensive and so engineers started replacing it with nickel, which costs less. And then as time went on engineers found that they could substitute cheaper nickel manganese alloys for the nickel.”

Cost reduction isn’t the only driving force behind the evolutionary march of Li-ion batteries. The desire to extend battery life, achieve higher energy densities and faster charging times, and improve reliability has led to a constant tinkering of the technology. Energy densities are double what they were five years ago, for example, and new surface coatings are being applied to make the batteries more stable and reduce their reactivity rates.

Ever-Increasing Demands, More Trade-offs

The trade-offs inherent in these often mutually exclusive goals make for a diabolical design challenge: You can make a Li-ion battery that has high performance, for example, but the trade-off is a shorter life. And as every design engineer knows, making the right trade-offs and getting everything right takes time, experience, and a bit of finesse.

“A problem doesn’t necessarily pop up during the first generation of cells,” says Miller. “Things may look fine in the lab and then when you go to production you find that the technology behaves in a slightly different way, which means things can and do go wrong.”

Something certainly went wrong at Sony last year, resulting in the recall of millions of its Li-ion laptop batteries. As for what exactly led to the short-circuiting problem that posed a risk of fire and in one case caused a Dell notebook to burst into flames, Sony Spokesperson Rick Clancy says that there were different conclusions at different levels.

“When you produce lithium ion batteries, the objective is to either have zero metal contaminants or at least as few of them as possible and surround them by a protective shell or layer so that they cannot penetrate the separator,” explains Clancy. The separator in a Li-ion battery keeps the anodes and cathodes from touching each other and causing a short circuit.

Clancy says that Sony engineers discovered that there was a greater frequency of these metal particles escaping from one part of the cell and entering the other part. They’ve addressed the issue at a product level by designing in a stronger lining, he notes.

But there were other findings at a systems level, specifically relating to variances in configurations and specifications for battery packs from the PC makers, says Clancy. “They are doing the most they can to optimize their products and make them as competitive as possible, which is putting more demands on the power supply as it relates to the battery.”

He adds that some manufacturers’ charging systems are more aggressive than others, which could have had the effect of either vibrating or shaking the batteries more aggressively, a phenomenon that may have played a role in the short circuiting problem. He says engineering teams from Sony and the PC manufacturers are working closely together to better understand and more effectively manage these systems issues.

A representative of Matsushita Battery Industrial (MBI), the company that manufactured the 46 million Li-ion batteries named in the recent Nokia product advisory told Electronics Weekly in a phone interview that the company is still investigating the cause of 100 incidences of batteries overheating.

But he too pointed to the ever-increasing demands on Li-ion batteries. “Generally speaking the batteries are getting smaller and smaller, and at the same time they are being required to deliver more power and capacity. The engineering challenge for us is to maintain the same degree of reliability throughout,” he says.

Although he ruled out any possibility of process-related problems, the manufacturing landscape has widened since the Japanese developed the technology in the 1990s.

The cells for the batteries implicated in the Nokia advisory, for example, were manufactured by MBI in Japan and shipped to a factory in China where they were assembled into battery packs.

The batteries involved in the Sony recall carried labels marked “Made in Japan,” “Made in China,” or “Battery Cell Made in Japan Assembled in China.” Sony produces Li-ion cells in plants in Japan and China, assembles some battery packs at a Sony plant in China, and in some cases sells Li-ion cells to third party makers of battery packs. Sony says that off-shoring was not a factor in last year’s recall.

But Don Sadoway, a professor of Materials Chemistry at MIT who is an expert in advanced battery technologies, worries about off-shoring of a chemistry he asserts “needs to be treated with respect.”

“I have 100% confidence in the Japanese battery manufacturers,” he says. “And my guess is that they never had the problems they’re seeing now when the same batteries were manufactured from start to finish in Japan.”

He notes that one of the challenges with Li-ion batteries in particular is that it is very difficult to verify that the manufacturing and assembly is being performed according to specifications. That’s because once it’s assembled into a battery pack, the device cannot be inspected from the outside nor can it be easily tested.

Sadoway points to the separator material between the electrodes as an example. Acting like a kind of fuse, it is designed to soften and collapse at a specific temperature, causing the battery to essentially go into an open circuit condition and die.

In fact, he wonders why that didn’t happen in the case of the Dell laptop that burst into flames last year.

“You could think you are specifying a porous polypropylene material for the separator, but once the thing is packaged up you would have no way of knowing what you actually got. Even under the best of circumstances, you can get screwed by your own job shop. What if the workers took a short cut and substituted the original material with cardboard?”

In at least one case, it’s suspected that battery manufacturers were supplied with counterfeit raw materials.

Argonne’s Miller agrees that is very difficult and expensive to test and verify Li-ion batteries, adding to the cost that manufacturers presumably hoped to reduce by off-shoring assembly in the first place. But he says that quality assurance can be engineered into the battery design, and that he believes suppliers of cell phones and laptops are tightening up the process. “They are getting more precise in the materials they are using and in their cell designs,” he says.

Still, Sadowy believes that much more rigorous oversight and stringent quality assurance is required, especially as Li-ion batteries scale up. The technology is expected to hit the road in the next few years in electric vehicles under development such as the GM Volt.

“If your MP3 player fries, it’s not a big deal, you don’t get to listen to your favourite tunes,” says Sadoway. “I have real worries when we try to build a large format Li-ion battery with 100X the capacity and put it out there on the highway.”
http://www.electronicsweekly.com/blo...mion-ba-1.html





Conversion Central: 101 Tools to Convert Video, Music, Images, PDF and More
Yoav Ezer

Few things are more irritating than having to deal with a format that is incompatible with what you need it to do. It doesn’t matter if it’s a media file, document, or shoe size; it’s just plain frustrating. To make your life easier, check out this list of 101 tools that will allow you to convert just about anything.
http://www.cogniview.com/convert-pdf...-pdf-and-more/





Schools Roll Out Hosted Online Storage 'Lockers'

Reduces need for portable storage; opens server space for students, teachers
Brian Fonseca

Monte Cassino School's decision to give its seventh and eighth grade students a new Tablet PC forced Nancy Stutsman, director of technology, to quickly tackle two issues -- tight server space and the lack of an easy way to store and retrieve files when away from the Tulsa, Okla.-based school's campus.

Stutsman selected the School Web Lockers hosted online storage system from San Diego-based Networld Solutions Inc. to provide each of the students with 100MB of storage. The service will also be used to provide Monte Cassino faculty members with and school administrators with 1GB of storage, Stutsman said. She estimated the cost of the service at $1 per user per year.

"We have server storage problems all the time, so we wanted an alternative place to [store] and back up files," said Stutsman. In the past, she said, students were only allotted 10MB of server space on the school's network.

"We knew this year [students] would be creating movies and doing other things, [so] they needed a lot more space," she said. The hosted offering "resonated with me as easy to manage," Stutsman said, adding that "we had problems with kids' files disappearing a lot last year. [The new system] would relieve a lot of that."

School Web Lockers also includes chat, calendaring and collaboration capabilities, she noted. In addition, the hosted system lets school administrators monitor and track all files uploaded to the system and enables them to lock out individuals for misuse.
The system also includes password access that students must share with their parents, she said. The system also scans all files uploaded to School Web Lockers servers for potential viruses using Sophos PLC's security software and default controls, said Kelly Agrelius, marketing associate for School Web Lockers.

Agrelius said that all School Web Lockers disk drives are mirrored and that backup tapes are filled every 24 hours or so. Currently, the online storage system is used by 25 school districts with 159 schools and over 125,000 end users.

This week, Ernie Nevares, director of instructional technology at Santee School District in Santee, Calif., plans to begin implementing the hosted service through the district's nine member schools.

Nevares said students have often voiced frustration at the district's lack of storage capacity, which forced them to finish tasks in one sitting or risk losing data.

The school system ran a pilot program using the service last year, which convinced school officials that hosted storage could be a boon for the organization. Just during the test phase, Nevares said, "it virtually eliminated the need for flash drives, disks, all of those things, which also helps security-wise to help keep bad things out of our system"

The next version of the hosted service, due by the end of this year, will add a new "markup" feature, Agrelius said, which will allow teachers to open assignments in Microsoft Word and send them back to students with any changes or comments applied.

Later, she said, the service will add more fine-tuned restrictions for access to specific areas of the online system and a "Parent Portal" that will grant parents personal identification numbers so a password can't be inadvertently or willingly changed by students.
http://www.computerworld.com/action/...&intsrc=kc_top






A Facebook for the Few
Ruth La Ferla

If more proof were needed that the rich are different, it could be found on aSmallWorld.net, an invitation-only social networking site.

“I need to rent 20 very luxury sports cars for an event in Switzerland on the 6th September,” a member wrote recently on the Forum, aSmallWorld’s popular nucleus. “The cars should be: Maserati — Ferrari — Lamborghini — Aston Martin ONLY!”

Another announced: “If anyone is looking for a private island, I now have one available for purchase in Fiji.”

Founded four years ago, the site, promoted as a Facebook for the social elite, has grown from about 500 members to about 150,000 registered users. At a time when Christina Aguilera has 466,550 MySpace friends, aSmallWorld has attempted to create an Internet niche by cultivating an air of exclusivity.

The site functions much like an inscrutable co-op board: its members, who pay no fee, induct newcomers on the basis of education, profession and most important, their network of personal contacts. Sleeker than MySpace or Facebook, aSmallWorld.net is not the type of site where one is likely to come across videos of amateur motorcycle stunts or girls in bikinis.

Users are mostly young — 32 on average. Many have graduate degrees and a taste for living extravagantly on more than one continent. Sixty-five percent are from Europe, 20 percent from the United States and the rest scattered around the globe.

“We have put together a platform where a definitive group of people are separated by only three degrees,” Erik Wachtmeister, aSmallWorld’s founder, says often and loudly.

Advertisers were scarce at first. But in the last six months, luxury brands have come on board after a push from investors, including the movie mogul Harvey Weinstein.

The site drew a flurry of media attention last year, when Mr. Weinstein purchased a minority stake through the Weinstein Company, projecting that aSmallWorld’s membership could grow to a million within a year or two. SmallWorld is his sole investment in an Internet property.

Mr. Weinstein, who is diversifying beyond the film industry and recently acquired the fashion house Halston, would not say how much he paid, but he is the largest single investor in aSmallWorld. (Other minority investors include the film director Renny Harlin, the media executive Robert W. Pittman, and Alexander Von Furstenberg, an entrepreneur and the son of the designer Diane Von Furstenberg, an early advertiser on the site.)

The draw, Mr. Weinstein said without a shred of irony, is “direct access to some of the world’s most influential tastemakers,” a community he sees as early adopters and a natural market for his films, books and fashions.

“We’re dealing with a group of people that moves in social migration around the planet,” said Joe Robinson, the new chief executive. “From the point of view of a Mercedes-Benz or a Piaget, that makes this an enormous marketing opportunity.”

The Weinstein Company introduced Mr. Robinson, a former advertising executive with Fox Interactive Media, the owner of MySpace, to court advertisers like Lufthansa, Land Rover, Credit Suisse, Moët & Chandon and Burberry. Olivier Stip, the vice president of marketing for Cartier North America, said that an advertisement placed in June generated lively traffic for the jeweler’s Love collection.

Advertising rates are competitive with those of Forbes.com and Style.com, Mr. Robinson said. On average, clients spend $20,000 to $50,000 a month, he said. The company also arranges dinners and tastings where members can sample advertisers’ products. For one recent gathering, Rémy Martin supplied 4,000 bottles of its premium Cognac, valued at $200 each.

But the presence of advertisers raises questions about just whom they are reaching and whether this business model works.

Mr. Robinson said 35 percent of aSmallWorld members log in every day. But Andrew Lipsman, a senior analyst at comScore Network, a company that rates online usage, said that it is hard to track the number of unique visitors because the site is relatively small. “If there are a couple of hundred thousand registered users,” he said, “probably only a fraction are visiting the site regularly.” Compare that with Facebook, which in July had 30.6 million unique visitors, a number that has doubled since last year, Mr. Lipsman said.

Charlene Li, an analyst at Forrester Research in Foster City, Calif., said that for advertisers trying to concentrate on a group of influential people, a special-interest publication makes sense. “I liken advertising on aSmallWorld to advertising in the Harvard Business School alumni report,” she said. “For luxury advertisers, the online options are fairly limited.”

Skeptics are not sure just who is getting the message. “For truly wealthy consumers, time is the ultimate luxury,” said Pam Danziger of Unity Marketing, which researches luxury brands. “These people are not going to waste it hanging about on a social networking site.”

Those who do hang about often use the site to billboard themselves, advertising unabashedly pretentious tastes. A journalist in Vienna shared the news that her favorite Champagne was Henri Giraud — “I particularly like the 95 Grand Cru,” she wrote on the Forum. Another member recommended Eclipse, a bar on Walton Street in London, for its watermelon martini, “a tour de force.”

In reply to a query from a comely young woman searching for a hairdresser in Singapore, a Procter & Gamble executive there responded with a thinly veiled proposition: “I have two bottles of Nice n’ Easy in the cupboard. I’ll do it for free.”

The company does not publish members’ income or net worth, so their actual spending power is difficult to gauge. Hollywood strivers, fashion models, financiers and minor European royalty have been admitted inside its virtual velvet rope. But users also include publicists and party promoters who use the site as a personal database. In theory, they are just a few clicks away from Mr. Weinstein, a member, or boldface names like Naomi Campbell, Quentin Tarantino and Frédéric Fekkai. (Sycophants beware: members who engage in cyber-social climbing may find themselves exiled to the chilly Siberia of a Big World, aSmallWorld’s less-exclusive sister site.)

The site has drawn enough notice to breed its share of copycats. Milton Pedraza of the Luxury Institute, a New York research group, plans to introduce Luxury Ratings.com early next year as an advertising-free, gated online community; members will pay an annual subscribers’ fee of $250. He says members will each have a net worth in the millions or tens of millions. “They are not only resilient,” he said, “they are nearly immune to a housing or stock market downturn.”

Small World loyalists seem content. Laura Rubin, a brand consultant and fashion publicist in New York, uses her personal network of about 170 members to build her business. “It’s like a Rolodex,” she said. Last month she combed that base for guests to attend a fashion party in the glass-enclosed penthouse of Hotel on Rivington on the Lower East Side.

Etienne Deyans, a party promoter from Zaire, mines his network of contacts to toss together weekly galas with international themes in the cavelike basement of Amalia, a restaurant in Midtown. “It’s a civilized way to have people meet,” Mr. Deyans said. “Here, I tell myself, there will be no rudeness at the door.”


Kibum Kim contributed reporting.
http://www.nytimes.com/2007/09/06/fa...mallworld.html





Like Many Before It, Drive-In Near Buffalo Reaches ‘The End’
Ken Belson


Samantha Boyd, 6, waited to see “The
Simpsons Movie” on Thursday at the
Buffalo Drive-In.


Steve Valentine, owner of the Buffalo Drive-In, has seen them come and go over the years: The legions of kids in pajamas buying candy; the teenagers sneaking in inside car trunks; the young lovers he had to remind to leave after the last movie; and once, “the machete man,” who menaced customers with a long blade during one of the “Rocky” films.

“Everything has its time, and now it’s time to draw the final curtain,” said Mr. Valentine, who will shut the 58-year-old theater after tonight’s closing credits. “It’s a fun business, but it’s very difficult, because you have a six-month business and 12 months of expenses.”

Closings are nothing new around Buffalo, where steel mills were shuttered years ago and the streets are pockmarked with boarded-up churches and shops. But the last picture show at Buffalo’s last drive-in is notably bittersweet because the weather-beaten theater evokes a much happier and prosperous time before the city became known as a symbol of urban decay.

There were once about a dozen drive-ins in and around Buffalo, back when the city had twice its current population of 290,000 and roller derby and hula hoops were the rage.

In the days before cable television, Netflix and home theaters, families regularly piled into station wagons to catch a double feature and munch on Twizzlers and Milk Duds, and drive-ins were where people of all ages went on dates.

Sometimes, those worlds collided, as when Don Spasiano, now 57, took his “hot date” to a drive-in decades ago. As they got comfortable under a sandy beach blanket with their cold drinks, Mr. Spasiano saw a familiar car out the side window. In it was his grandfather, but not with his grandmother.

“Being the good Catholic that I am, I went to confession the next day,” said Mr. Spasiano, who also vividly recalls seeing “Cleopatra” starring Elizabeth Taylor, “although to this day, I’m not quite sure why I went to confession. I wasn’t the one cheating.”

Drive-ins have been disappearing for decades, declining to about 400 today from a peak of more than 4,000 in 1958, largely because of rising property prices and changing movie-going habits. After today, there will be 30 or so scattered across New York State, two in Connecticut, and just one, the Delsea in Vineland, in all of New Jersey, the state where drive-ins were born in 1933.

That first drive-in theater, opened in Pennsauken, near Camden, was the brainchild of Richard Hollingshead, who was inspired by drive-in restaurants, where waitresses served customers in their cars. The second theater, Shankweilers, near Allentown, Pa., opened in 1934 and is now the oldest drive-in.

In the decades after World War II, thousands more drive-ins opened as car ownership jumped and new highways made it easier to get to theaters, many of which were built on farmland. Technology improved as well, with car speakers replacing loudspeakers.

By the 1970s, however, theaters were being enveloped by the suburbs. Many owners sold to developers who coveted the theaters’ vast parking lots for shopping malls and housing divisions.

“The land bought back in the 1950s and 1960s all of a sudden became an ideal spot for a Wal-Mart and Home Depot in the 1970s and 1980s,” said Jennifer Sherer Janisch, the chief executive of Drive-Ins.com, which tracks the industry. “As land prices skyrocketed, the feasibility of operating just at night didn’t make sense.”

Here in Cheektowaga, a suburb about 10 miles east of the Peace Bridge between Buffalo and Canada, the 18-acre Buffalo Drive-In is also located on a former farm.

Late last year, Mr. Valentine sold the property to a developer, who plans a complex of five medical office buildings, which will abut several cemeteries and a neighborhood of low-slung homes.

Mr. Valentine, whose family has owned the drive-in since 1964, said that contrary to the image of the theaters as places to see a “naughty nurse movie,” most of them play family-oriented films. This final weekend, his three screens are filled with triple features that include “Shrek the Third,” “The Simpsons Movie” and “Transformers.”

The drive-in has been running special promotions this summer, including “carload night” (the winner stuffed 17 people into a Volvo station wagon) and $2 tickets on Tuesdays (the regular price was $7.50).

Customers listen to the movie’s audio track by tuning into an FM channel on their car radios. Some people who sit on lawn chairs next to their cars use boom boxes so as not to drain the car battery. (Over the years, Mr. Valentine has given many drivers jump starts.)

Thursday night, the sparse crowd included longtime customers Jeffrey and Kellie Boyd, who brought their children, Devon, 12, and Samantha, 6, for one last ride down memory lane.

Their sport utility vehicle was packed with the essentials: A cooler full of drinks, chips and popcorn, sleeping bags, a bunch of pillows and Samantha’s Bart Simpson doll.

“When I first got my license, it was the first place I came to,” said Mr. Boyd, 45, a few minutes before “The Simpsons Movie” began. “It was the place to be.”

Generations of moviegoers, the Boyds included, loved the drive-in because it was casual and the prices were modest. And since the kids could sleep in the back seat, there was no need to call a baby sitter. They could sit in lawn chairs, stretch their legs, and smoke and drink without being bothered. Some customers even ordered pizza to be delivered to their cars.

Costumes appeared for some pictures. Several girls came dressed as pirates when Johnny Depp’s latest “Pirates of the Caribbean” was playing.

Mr. Valentine’s drive-in has also attracted its fair share of eccentrics. One man arrived every spring in a hearse, while another creepy customer drove a van with the license plate “vampire.” And the police took away the machete man.

Tim Isch, a jack-of-all trades at the theater for 13 years, caught kids hiding in trunks and jumping over fences.

It was Mr. Isch’s voice that people heard when they called to find out what was playing and when.

“Last night, I did the last one, and I got a little choked up,” he said. “I’m going to miss this place.”
http://www.nytimes.com/2007/09/02/ny...rivein.html?hp

















Until next week,

- js.



















Current Week In Review





Recent WiRs -

September 1st, August 25th, August 18th, August 11th, August 4th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles and press releases in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. Questions or comments? Call (617) 939-2340, country code U.S.. The right to publish all remarks is reserved.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM
Peer-To-Peer News - The Week In Review - June 24th, ’06 JackSpratts Peer to Peer 1 22-06-06 12:02 PM






All times are GMT -6. The time now is 07:47 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)