P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 18-03-04, 10:11 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default Peer-To-Peer News - The Week In Review - March 20th, '04

Quotes Of The Week

"One of the biggest subjects I think is not written about very much--but it is so obvious and it is going to be the story in a year or two-- are the trends around storage. The fact that right now we carry around, you know, 20-, 30-, 40-, 60- gigabyte hard disks. In two to three years, it is going to be 100-terabyte hard disks." – Ray Ozzie, Groove Networks.

"Creators need to maintain the freedom to distribute their ideas any way they want. They shouldn't be bogged down by 20-year copyrights and other old restrictions that bottle up good ideas." - Lawrence Lessig

"We're saying the FCC action went beyond its jurisdiction, we don't think there was enough basis to support the [anti-piracy] ruling." - Fred von Lohmann









Well Done, Not Rare

That it doesn’t happen often anymore is evidence of the growing sophistication of U.S. courts, but just because it doesn’t happen often here doesn’t mean it’s rare elsewhere. Indeed, between the anti democratic actions in Australia, the equally draconian laws recently passed by the European Union and the latest news from Switzerland, it may be argued that the situation is getting worse, not better. I’m talking about attacks against purveyors of information.

In last weeks WiR it was reported the popular and well regarded Sharereactor site had been down for a few days and nobody seemed to know why. Rumors of the always present P2P bogyman, the “DNS attack,” abounded throughout the trading communities, particularly after a cryptic announcement appeared suggesting just such an attack had occurred, but the announcement made clear it was a guess, not a certainty. Later on however a more pessimistic note was posted from the “SR crew” stating Shareactor was down, and “maybe forever.” But again, the info was sketchy, and the posters admitted they “didn't know what happened,” which left at least a little hope in the air. Things stood that way for a few days until this week when a story moved in the Swiss press, reporting Shareactor was shut down by Swiss authorities “due to the suspicion of breach of copyright and trademark laws.” So there it was, another site closed that did not provide copyrighted material, but distributed only links. Sort of a “3 Degrees Of Separation” legal opinion that casts a very wide net, at least in Switzerland. First Degree being someone who sells a copy without authorization, Second Degree being the “swap meet” where such a sale takes place - as well as other legal sales of course, and now the Third Degree being the directions to the swap meet. At the moment all are against Swiss law in what will come to seen as a profoundly shortsighted opinion.

This ruling would seem to make newspapers illegal, or any publication that in the course of its affairs reports information that if utilized could contribute to law breaking. Performance reviews for automobiles leap to mind when anyone using the information breaks the speed limit. Hardware store notices could force newspapers to close if vandals using the advertised items cause mischief. Since in most countries legal rulings provide precedence for later cases this one will in time come back to haunt the Swiss, and if the past is any guide it will happen sooner than later. One can only marvel at the myopia of the decision and hope that a people with as long a history as the Swiss will see the error before too much damage is done. The bad decision has already had it’s second negative effect on the free flow of non-copyrighted information when another site sacrificed itself this week, voluntarily closing in a final act of self censorship. One hopes this misguided ruling will quickly collapse on appeal.

Fortunately other countries have sensed that such decisions allow media companies license to trample the rights of the citizenry, and are beginning to take steps to protect them. In Norway this week a high court threw out a similar lower court judgment against a student. Frank Bruvik appealed his 100,000 Crown fine for providing links on his website napster.no., pointing out the obvious - he didn’t distribute copyrighted material. The court agreed, ruling any potential violations that may occur must be the result of the actual distribution of copyrighted content, not the distribution of content-free links. Well done Norway! They’ve taken the first big step. Whenever a state recognizes the basic human right to freely share information we all benefit.












Enjoy,

Jack.











P2P Firms Face New Legal Threat
Declan McCullagh, John Borland and Stefanie Olsen

Peer-to-peer companies are facing new and unwelcome scrutiny from state prosecutors, in a recent development that powerful Hollywood lobbyists are backing.

A 25 February draft letter that appears to have been edited for California Attorney General Bill Lockyer's office places the controversial networks in the centre of a set of legal crosshairs. It demands that peer-to-peer companies do a better job of protecting customers from numerous "known risks" of their products and warns them against developing features that would hinder police from pursuing criminals such as copyright infringers.

Lockyer spokesman Tom Dresslar did not directly confirm or deny the authorship of the document, which was apparently leaked to file-swapping companies last week. Lockyer and other state attorneys general are gathering in Washington, D.C., this week for their spring meeting.

But Dresslar acknowledged that his boss is investigating peer-to-peer networks. "The attorney general has several concerns related to peer-to-peer file sharing, including exposure of kids to pornography, identity theft, viruses and copyright infringement. He's asked for ideas and suggestions on how to address those concerns and is working with his colleagues in other states to address the concerns."

The Motion Picture Association of America (MPAA) said it had discussed the matter with Lockyer's office and agreed with the views of the letter. MPAA spokesman Rich Taylor said, "they did approach us, and we provided some background."

Included in the "metadata," or electronic history, of the Microsoft Word draft letter was a reference to Vans Stevenson, the MPAA's vice president for state legislative affairs.

Stevenson said in an interview on Monday that it should "come as no surprise to anybody that we talked to attorneys general, particularly the chief law enforcement officer in California, because of the impact that illegal file copying and stealing has on motion pictures and sound-recording industries, the lifeblood of California."

File-swapping companies have come under increasing pressure from federal lawmakers to implement filters and other measures blocking copyright infringement and access to pornographic material, even as they continue to fight in courts for their legal right to exist. The creation of new state legislative or legal fronts would make this battle even more difficult.

Stevenson would not say how many other states he had contacted. But he added that "you would expect us at one time or another to try to get to every one of them."

Lockyer's office would not elaborate on what the attorney general might be planning in terms of legislative or legal pressure.

The draft letter is deeply critical of companies for failing to warn consumers of the legal dangers of sharing copyrighted works using the software or of the widespread availability of pornography. Those omissions could trigger state legal action, the letter warns. "A failure to prominently and adequately warn consumers, particularly when you advertise and sell paid versions of your software, could constitute, at the very least, a deceptive trade practice," according to the letter.

Fred von Lohman, a staff attorney at the Electronic Frontier Foundation, said the draft letter suggests a questionable interpretation of product liability law akin to requiring car manufacturers to provide warnings on new vehicles instructing drivers that they could face jail time, if they use the car for holding up a bank.

Others said they believe that peer-to-peer companies could face legal headaches from states, if they aren't careful. "There's potential liability, if peer-to-peer providers have not adequately disclosed to users the operations of their systems," said Chris Kelly, an attorney who represents technology companies.

The P2P United group, which represents companies such as StreamCast Networks, Grokster and eDonkey, on Monday replied with its own letter to Lockyer, asking for a meeting with the attorney general, if he planned to take action against peer-to-peer companies.

"The letter contains... many factual errors concerning peer-to-peer technology and the allegedly disproportionate 'danger' that it poses to the public," the group told Lockyer. "We... respectfully request that you defer circulating or sending your letter until such a meeting can be arranged and our input and materials deliberately considered."

Microsoft Word document metadata has exposed other private internal dialogs in recent weeks.

Earlier this month, CNET News.com discovered that the SCO Group, a company that has filed several high-profile lawsuits alleging that part of the Linux operating system infringes on its copyrights, had planned to sue the Bank of America before ultimately settling on DaimlerChrysler instead. Evidence of the last-minute change of target was exposed by metadata in a Word version of the SCO Group lawsuit.
http://news.zdnet.co.uk/business/leg...9149312,00.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Consumers Challenge FCC Antipiracy Rules
John Borland

A lawsuit challenging new digital television antipiracy rules is moving ahead, with consumer groups fighting communications regulators' foray into the copyright realm.

A coalition of groups, including the American Library Association, the Consumers Union and the Electronic Frontier Foundation, is suing the Federal Communications Commission over rules adopted last year aimed at blocking digital TV piracy. Last week, they filed the first documents with the U.S. Court of Appeals in Washington, D.C., outlining their case.

In its decision, the FCC said any devices capable of receiving digital television signals must include support for a "broadcast flag," or digital marker, within a broadcast that would prevent copies from being made without some kind of copy protection being added. The consumer groups say the FCC has overstepped its mandate by getting into the copyright protection arena.

"We're saying the FCC action went beyond its jurisdiction," said Fred von Lohmann, an attorney with the Electronic Frontier Foundation. "We don't think there was enough basis to support the ruling."

The broadcast flag controversy, while far less visible than the debates over peer-to-peer networks, is one of the key issues in the passage of traditional entertainment companies into the digital world.

The Motion Picture Association of America, along with television companies, have argued that moving their content to digital television would be impossible, if people could easily make perfect digital copies of movies and other programming, and swap them online.

The broadcast flag is viewed by regulators as a way to stop online distribution of over-the-air transmissions. Cable TV and satellite customers already receive encrypted signals that are difficult to copy.

Under the rules passed last November, support for the flag must be built into all digital TV devices by July 2005. That wouldn't stop all copies from being made. Analog copies, as to a VCR, would not be blocked, and digital copies made to "approved" devices that include some level of copy protection would also be allowed. The aim is not to stop personal copying but to prevent those copies from finding their way into mass distribution, regulators said.

The consumer and civil liberties groups say this would infringe protected use of content and would disable features people have come to expect in their own property, however.

The court case may be put temporarily on hold while the FCC itself hears other objections to the ruling, a typical process for controversial issues, an FCC representative said.
http://news.com.com/2100-1025-5172171.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Apple Faces Claim In France For Royalties Levy On iPod


PARIS (AP) - A French group representing recorded music rights holders threatened Wednesday to take Apple Computer Inc. to court in a dispute over lost music royalties due
to sales of its iPod player.

The argument centers on a fee levied in France on sales of blank CDs, tapes, disks and other hardware that can be used to copy music. The proceeds go to musicians and other rights holders who lose money to piracy.

The Society of Music Creators, Composers and Publishers, or Sacem, accuses Apple of consistently refusing to pay the levy on sales of the iPod, which contains a hard disk drive.

In an e-mailed statement, Sacem said that unless Apple settles its growing account, the agency that collects the payments ``will have no other option than to go immediately to court to make sure that the rights of artists, composers and producers are respected.''

Contacted through its French public relations agency, Apple declined to comment Wednesday. The dispute comes as Apple is in talks with record labels over the planned launch of its iTunes online music platform in Europe. The paid-for download service is already up and running in the United States.

The pocket-sized iPod can download and store up to 10,000 music tracks from a home computer and play them back from its hard disk through headphones or an amplifier and speakers.

The French royalties levy was first introduced in 1985 and was extended in July 2002 to cover hard disks built into music players, which incur levies in proportion to their memory capacity.

For example, the charge on a top-of-the-range iPod, which retails at 550 euros ($677) at French department store FNAC, would come to 20 euros ($24.63). Sacem estimates that Apple sold 20,000 iPods in France last year, with disk capacities ranging from 10 to 40 gigabytes.

Last year, the society collected some 150 million euros ($185 million) in levies on hard disks and blank media sales on behalf of artists and other rights holders.
http://www.siliconvalley.com/mld/sil...al/8151728.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Files Show Utah Had Key Role In MATRIX
Kirsten Stewart

Whether they know it or not, at least 33 states have released government and commercial records on residents to the controversial MATRIX antiterrorism network, reputed to be a pilot project involving just 13 states.
And more than a willing partner, Utah was a driving force behind the project.
These and other revelations about MATRIX and Utah's pivotal role are disclosed in Public Safety Department documents obtained by The Salt Lake Tribune under the state Government Records Access Management Act.
New details about MATRIX have government watchdogs and lawmakers suspecting a cover-up by the executive branch. Some have called upon Gov. Olene Walker to demand the return of Utah's information, which is known to include law enforcement files such as prison data, driver licenses and criminal histories but could extend to credit records, phone numbers and home addresses of law-abiding residents.
"We don't want our information floating out there when we don't know what's on the database or who has access to it," said Sen. Ron Allen, D-Stansbury Park.
Said Senate Majority Leader Mike Waddoups: "I'd like to know our motivation for getting involved. There does seem to be some deception."
Walker said through a spokeswoman Wednesday that she is waiting for recommendations from an oversight committee before taking further action on MATRIX.
The Republican governor suspended Utah's participation in MATRIX on Jan. 29, saying neither she nor legislative leaders had been briefed on the program authorized by former Gov. Mike Leavitt, who has repeatedly refused to comment on the matter.
Public safety officials tout MATRIX -- the Multistate Anti-Terrorism Information Exchange -- as an important crime-fighting tool. They say the information provided is already available to state and federal law enforcement officials, but the difference with MATRIX is the speed with which it can be accessed.
But the program also matches law enforcement files with private databases containing billions of public and commercial records from a wide variety of sources. And this has civil libertarians and those opposed to big government fearing it violates privacy rights. Similar concerns have prompted six of the original 13 participating states to drop out.
"When you start collecting information on people who have done nothing wrong, it's the first step toward treating every American like they could be a criminal," said Chris Calbrese, a New York City-based attorney for the American Civil Liberties Union (ACLU).

Billions of records: The trouble with MATRIX, said Calbrese, is the volume of data it contains, much of which was purchased unbeknown to states by Seisint Inc. Seisint is the Florida information-technology company that developed the idea for MATRIX and landed a $1.6 million contract with that state's Department of Law Enforcement to pilot it.
"We've always known the database contained billions of records," Calbrese said, "but we weren't aware of the breadth" until the new release of Utah records highlighting Seisint's data inventory. That data include four states' criminal histories, 33 states' correctional data, sexual-offender lists from 27 states, driver licenses from 15 states and motor-vehicle registrations from 13.
"We're probably talking about 90 percent of the country," said Calbrese.
Verdi White, Utah's deputy commissioner of public safety and MATRIX point man, downplays the threat to citizens' privacy, noting most of Seisint's data are public. "A lot of that stuff was purchased on the open market," White said.
Documents obtained from White's office, however, show Utah officials have been less than forthcoming about MATRIX and may have a lot to lose should the program be permanently unplugged.
"These papers show, contrary to what's been reported in the past, Utah was deeply involved and taking something of a leadership role in the development of this whole consortium of states," said Steve Erickson, a governmental watchdog with the Citizens Education Project who also obtained copies under GRAMA.

MATRIX pioneers? According to the records, almost a year prior to Utah's official participation, the state was connected to the information-sharing backbone that would evolve into MATRIX.
White's staff and state information technology officials acted as consultants to the project in its formative stage, even offering up Utah's award-winning Web site as a prototype interface to connect users to the backbone. White confirmed that the $22 million in "seed" money that funded Utah's participation was payment for this Web interface. He couldn't say whether Utah expected a cut of future MATRIX profits.
Utah's involvement doesn't stop there. The state's former top law enforcement official, one-time Public Safety Director Doug Bodrero, administers federal funding for MATRIX through his Florida company, Institute for Intergovernmental Research.
Leavitt teamed up with Florida Gov. Jeb Bush -- President Bush's brother -- to pitch MATRIX to other states. The two briefed other governors on the project during a conference call referred to in Feb. 6, 2003, MATRIX board minutes.
Erickson said such documents show Utah officials have not been consistent about the timing of Utah's involvement. They also prove that Leavitt and others moved forward with MATRIX, despite privacy and security concerns raised in September 2003 when the Associated Press reported that the founder of Seisint had once been implicated in a Bahamian drug-smuggling scheme.
In January, Walker released a memo showing that Leavitt authorized Utah's participation in December 2003. But White's records show he signed another agreement in November 2002.
"It's odd that when I asked the governor's office for this information, they came up blank," said Erickson.
"What happened to the governor's records?"
Leavitt, now head of the Environmental Protection Agency, reiterated Wednesday via an EPA spokesperson his refusal to discuss any Utah policy and political matters, including MATRIX.
http://www.sltrib.com/2004/Mar/03112004/utah/146669.asp



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Two More States Withdraw From Controversial Database Program
AP

New York and Wisconsin have joined the list of states that have pulled out of an anti-crime database program that civil libertarians say endangers citizens'
privacy rights.

Just five states now remain involved in Matrix out of more than a dozen that had signed up to share criminal, prison and vehicle information with one another and cross- reference the data with privately held databases.

Questions over federal funding and the waning potential for benefit to law enforcement ultimately prompted New York's withdrawal, said Lynn Rasic, a spokeswoman for the New York State Office of Public Security.

In a letter earlier this week, New York State Police Lt. Col. Steven Cumoletti noted that as more states withdraw, Matrix's usefulness diminishes.

The administrator of the Wisconsin Division of Criminal Investigation, meanwhile, cited cost, privacy and potential abuses of such a large database.

``When you added it all up, there were more negatives than positives,'' said the administrator, Jim Warren. He said the state signed up for Matrix about a month ago, but withdrew this week without having put any money into it or trained anyone.

Known formally as Multistate Anti-Terrorism Information Exchange, Matrix links government records with up to 20 billion records in databases held by Seisint Inc., a private company based in Boca Raton, Fla.

The Seisint records include details on property, boats and Internet domain names that people own, their address history, utility connections, bankruptcies, liens and business filings, according to an August report by the Georgia state Office of Homeland Security.

Officials with Seisint and the U.S. Department of Justice did not immediately return calls seeking comment.

The American Civil Liberties Union has complained that Matrix could be used by state and federal investigators to compile dossiers on people who have never been suspected of a crime. Seisint officials have said safeguards are built into the system to prevent such abuses.

``We're pleased New York has finally seen the light and opted out of this data-mining program that would allow the government to troll billions of private, personal records for information they have no business getting,'' said Donna Lieberman, director of the New York Civil Liberties Union.

New York started questioning Matrix when several other states dropped out because of privacy or cost concerns, Rasic said. Alabama, California, Colorado, Georgia, Louisiana, Kentucky, Oregon, South Carolina, Texas, Utah and West Virginia have all left or declined to join after actively considering it.

``It was going to end up costing a lot for something we already had,'' Tela Mange, Texas Department of Public Safety spokeswoman, said Thursday.

Matrix, short for the Multistate Anti-Terrorism Information Exchange, began in 2002 in Florida. Connecticut, Michigan, Ohio and Pennsylvania also remain participants in the program, which was helped by $12 million in initial funding from the federal government.

Julie Norris, spokeswoman for Ohio Attorney General Jim Petro, said the state plans to stick with Matrix, considering it ``a powerful investigation tool'' that uses information already available through public records.

``It allows for an intelligent search that is quick, fast and efficient,'' she said.

The Michigan State Police use Matrix on a limited basis and continue to support it, said spokeswoman Shanon Akans.
http://www.siliconvalley.com/mld/sil...al/8161155.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Privacy Fears Erode Support for a Network to Fight Crime
John Schwartz

Matrix, a controversial multistate program that hoped to find criminals or terrorists by sifting through databases of public and private information, has lost more than two-thirds of its member states and appears to be withering under its critics' attacks.

The Matrix program - the name is derived from Multistate Anti-Terrorism Information Exchange - was originally developed for the state of Florida by Seisint, a Florida company, in response to the Sept. 11 terrorist attacks. At its peak, 16 states were members, and the program received pledges of $12 million from the federal Department of Homeland Security and the Department of Justice.

Supporters of Matrix envisioned it as a powerful computer-driven program that could integrate information from disparate sources - like vehicle registrations, driver's license data, criminal history and real estate records - and analyze it for patterns of activity that could help law enforcement investigations. Promotional materials for the company put it this way: "When enough seemingly insignificant data is analyzed against billions of data elements, the invisible becomes visible."

This kind of system has long been the stuff of dreams for high-technology companies, which saw in it both a valuable service to society and a chance to recapture profits after a long technology downturn. But it also drew strong opposition from civil liberties organizations, which found Orwellian overtones in the collection and analysis of database information that would include people who have committed no crime. The American Civil Liberties Union filed Freedom of Information Act requests to uncover the inner workings of the system, and other high-tech policy groups, including the Electronic Privacy Information Center and the Electronic Frontier Foundation, have voiced concerns.

The announcements made last week by New York and Wisconsin that they were withdrawing from Matrix means that only five states remain actively involved- Florida, Michigan, Pennsylvania, Connecticut and Ohio.

Utah has suspended its participation, and in January Gov. Olene S. Walker appointed an oversight committee to evaluate security and privacy issues.

Supporters of Matrix, including the Florida officials who have worked with it from the beginning, say that it merely gives law enforcement agencies quicker access to data that they already have the legal authority to see. "It's an extremely valuable tool," said Mark Zadra, the chief of investigations for the Florida Department of Law Enforcement.

States provide information like arrests and convictions, Social Security numbers, driver's license data and birth and marriage records. Seisint, the company that created Matrix, then adds what the company has described as "in excess of 7 billion public records from thousands of locations on U.S. individuals and businesses, including information about neighbors, relatives and associates."

Matrix officials have declined to describe all the data that goes into the system, but they insist that nothing goes into Matrix that police would need a subpoena or other judicial order to obtain, like full credit reports or library lending records.

Officials in Florida point to success stories like a hit-and-run accident involving a white, 2000-2002 Chevrolet Avalanche that left the scene. The system was able to provide a list of all the vehicles fitting that description within a 10-mile radius of the accident. Investigators were able to find the Chevrolet, according to Florida officials.

But opponents of the program say the ability of computer networks to combine and sift mountains of data greatly amplifies police surveillance power, putting innocent people at greater risk of being entangled in data dragnets. The problem is compounded, they say, in a world where many aspects of daily life leave online traces.

In a recent report on the program, the A.C.L.U. called Matrix "a body blow to the core American principle that the government will leave people alone unless it has good reason to suspect them of wrongdoing."

The same critics have called Matrix a state-run version of Total Information Awareness, a program that was being developed in the Pentagon to search an even broader array of databases for patterns of terrorist activity. Congress froze financing for that program last year in response to a public outcry over the privacy implications of the system.

Opponents of the Pentagon program regarded the development of Matrix as a sign that the bubble was simply moving under the wallpaper: with the federal program blocked, some surveillance functions were being shifted to the states. And as Matrix started to draw attention, member states began to drop out.

"When these programs get exposed to the light of day, they get shut down," said Barry Steinhardt, director of the technology and liberty program at the A.C.L.U.

Mr. Steinhardt said that his organization was worried that other, similar programs might be operating more stealthily. "While we're gratified by the demise of T.I.A. and the continuing collapse of Matrix, there's a much larger phenomenon of widespread surveillance that still occurs out there," he said. "What we're not sure about is what's still operating underground."

In leaving the program, New York said the network's shrinking size was a deciding factor. A March 9 letter from Steven F. Cumoletti, the assistant deputy superintendent of the New York State Police, to Commissioner Guy Tunnell of the Florida Department of Law Enforcement and chairman of the Matrix executive committee, said, "Unfortunately, instead of increasing the number of participating states over time to improve the potential benefits of the pilot, to date nearly two-thirds of the initial states have opted out of the project."

James W. McMahon, director of the New York State Office of Public Security, said in an interview that the program "seemed to be going backwards instead of going forward." New York, he said, had never provided information on its own citizens to the program.

Matrix has been especially controversial because its technology was developed by Seisint, a private company in Florida whose founder, Hank Asher, was involved in the 1980's with a group of cocaine smugglers, according to court records. He was not charged, and became an informant. Mr. Asher resigned from the company last year.

Most of the states have cited tight budgets in their withdrawal from the program. "Money is always an issue, regardless of who you deal with, even in the most noble of causes," said Clay Jester, the Matrix coordinator for the Institute for Intergovernmental Research, the nonprofit organization that administers the program.

"If you see there's a significant investment you're going to have to make down the road, you may choose not to see the potential benefits," he said. "When it comes down to new cars or this great new database application, it's easier to show somebody a car."

But Liz Krueger, a New York state senator from Manhattan, who opposed Matrix, said that the real issue was privacy. "Even in a time of increased security, we have to be perhaps even more vigilant to make sure that fundamental rights to privacy are protected," said Ms. Krueger, a Democrat. "The more people knew about it and thought about it, the more dangerous they thought this exercise was."

Mr. Zadra, the Florida investigator, said that the program was intended for fighting crime, not surveillance, and that its creators had included privacy safeguards. "We've gone overboard to put in security, and put in privacy controls," he said. He acknowledged that the system could be abused by some law enforcement officers, but said that every profession had bad actors. Matrix, he said, was too valuable to abandon because of such concerns.

He said that the program was "not quite as effective" if states do not provide their data, but said that there was enough information to be gleaned from other publicly available databases to make the powerful search capabilities of Matrix valuable. He said, for example, that even if a state refused to provide driver's license information to Matrix, that information is often available from private databases.

"If there was no other state data but Florida's, we would want to be continuing the project with no other data but Florida's," he said.

Mr. Zadra said proponents of the program were "moving forward, and meeting with other states that have expressed interest." But he acknowledged that no announcements of new states coming into the program were imminent.

Mr. McMahon, the New York law enforcement official, said the importance of a program like Matrix could best be shown in the case of a child's kidnapping, when "you've got minutes instead of hours" to prevent a tragedy.

"You might be able to save somebody's life in producing the information you need," he suggested, as in, for instance, quickly finding the names of convicted sex offenders who own a specific model of car.

Mr. Zadra also used kidnapping as an example of database use, citing the possibility of a law enforcement official's having to tell the parents of a kidnapped child that " 'we did have a tool, but we can't use that tool any more, and I can't find your daughter.' How sad would that be?"

Others can worry about hypothetical threats to privacy, he said. "Meanwhile, I'm going to go ahead and I'm going to solve crimes with the best technology available."

Ultimately, he said, "It really comes down to trust. Do you trust law enforcement to do what is right?"
http://www.nytimes.com/2004/03/15/te.../15matrix.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Prestige 2000W

VoIP Wi-Fi Phone
Press Release

The Prestige 2000W VoIP Wi-Fi phone, compatible with IEEE 802.11b wireless standard, is a perfect solution for Voice over IP applications. It allows users to make or receive phone calls as long as they are in the coverage of IEEE 802.11b or 11g wireless Access Points. By using the Prestige 2000W, users no longer have to pay expensive communication fees and can enjoy the convenience of wireless mobility.

The brand new application is developed to support open standard SIP (Session Initiation Protocol), which interoperates with major SIP-based call servers, IP-PBXs and various VoIP client devices. It is not only an ideal alternative for ITSPs (IP Telephony Service Providers) to deploy their VoIP services; it can also be the wireless handset, which is applied in corporate IP-PBX centric VoIP environment.

The Prestige 2000W is very easy to use and configure. It allows users to configure with LCD screen menu or web browser. Meanwhile, with the smart auto-provisioning mechanism, ITSPs can easily deploy and manage the VoIP services. Easy-to-use and convenient, the Prestige 2000W delivers high quality voice functionality in a cost-effective way.
http://www.zyxel.com/product/P2000W.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Click here to increase download speed, (but first ask your banker)

BT Puts Faith On Broadband Extras
BBC

Broadband users in Britain will be able to temporarily boost their speed under plans put forward by BT.

It is to try out a "flexible broadband" scheme which would allow surfing speeds to quadruple at the click of a mouse.

The trial is part of four broadband schemes announced by BT, which it hopes will help it reach its target of five million high speed connections by 2006.

The telecoms giant is facing strong competition from other internet providers such as Tiscali and Telewest.

With BT's flexible bandwidth service, customers will be able to increase the speed of their connection from 512Kbps to 2Mbps whenever they need a faster downloading speed.

These new products and services provide broadband that is flexible and powerful enough to meet the customer's every need

Though the price is yet to be finalised, it is expected to cost one to two pounds per gigabyte downloaded.

The trials are due to start next month and the service due to be officially launched in the autumn.

BT is also strengthening its ties with Yahoo, with a new product that will allow people to make phone calls over Yahoo's instant messenger software.

Called Yahoo Messenger with BT Communicator, it is to be launched later this year using the voice over internet protocol technology.

It is designed to make it easy for people to switch from exchanging instant messages to a telephone conversion. Calls will be charged at normal rates and appear on the phone bill.

Tough arena

Among BT's other plans are a new service deal using intelligent net routers in a customer's home and a "rich media" digital rights scheme to manage and distribute content.

BT has signed a deal to show episodes of ITV drama The Bill on a pay-per-view basis and is also promising more DVD-like quality content.

"These new products and services provide broadband that is flexible and powerful enough to meet the customer's every need," said Pierre Danon, chief executive of BT Retail.

"They demonstrate clearly that there is far more to broadband than speed, as there has to be if we are to realise mass adoption far beyond the current two million mark."

BT dominates the broadband retail market in the UK. But its rivals are snapping at its heels, competing on both price and range of services.

"Broadband is key to BT," said Michael Philpott, an analyst with the telecoms research firm Ovum.

"They will have to be successful on the wholesale and retail level if the company is going to succeed in the future. But they are in a worrying state at the moment."
http://news.bbc.co.uk/1/hi/technology/3502742.stm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Sing a New Song

The recording industry continues to move toward digital distribution. Yet the Internet has also given unheard musicians a platform for getting noticed, while technology has made home recording affordable. If change is in the air, why is the indie movement left gasping for it? Rick Munarriz ponders the possibilities.

It's been three months since Vivendi (NYSE: V) unplugged its MP3.com site and handed the domain name over to CNET (Nasdaq: CNET). For the more than 250,000 artists that had made the music site their hub to be heard, they better not be sticking around this long in the dimming hopes of an encore.

MP3.com isn't coming back. Well, at least not literally. Vivendi wiped its servers clean. While CNET plans on launching a new site for musicians later this month, it will be doing so on its music.download.com subdomain. It has earmarked MP3.com to serve as an informational site the way it has groomed news.com into a news haven for technophiles.

That doesn't mean that Vivendi has rid itself of the strolling musicians. Complaints fill the CNET-manned forum it has set up until MP3.com's transformation is complete. Many artists and listeners who paid Vivendi for CDs just before the site went down are still waiting for their music. Thousands of artists who paid Vivendi nearly $100 for a year of premium services and were promised a pro-rated refund back in November have also been left with empty pockets.

Poor CNET is the one stuck with the rants because the previous tenant ran away without much in terms of a legal forwarding address. Yet CNET's waiting game may ultimately be the best way to distance itself from the resentment toward Vivendi.

Where's the beat?
Digital distribution has become a tantalizing notion now that companies like Apple (Nasdaq: AAPL) and to a lesser extent Roxio (Nasdaq: ROXI) are showing the major labels that it can work.

The overprotective, pirate-weary purveyors of pre-recorded music hamstrung their initial efforts to make a difference in the digital space by putting out a product that was less desirable than what was being swapped at peer-to-peer file-sharing networks. How do you compete with free? How do you compete when your product is inferior? The five major labels, under the guise of the Recording Industry Association of America, went after the MP3 traders.

With tens of millions of home-based pirates swearing off rich rock stars and their greedy labels, illogically or not, this should be the era of crowning achievements for independent artists. So why does the headpiece feel like it's layered with cubic zirconium?

As the uncola to commercial pop swill, this should be the golden age of garage bands. Instead, it has been as stifling as carbon monoxide. Home-recording software like Apple's new iLife '04 has made quality digital recording affordable and accessible. Satellite radio upstarts Sirius (Nasdaq: SIRI) and XM (Nasdaq: XMSR) have broadened the radio dial, including stations playing unsigned artists around the clock. The Internet should be arming clever marketers with ways to drape cyberspace with lawn chairs to enforce their grassroots efforts. Well?

Bought for a song
The playing field has never been this level. Yes, music sites have an uphill battle. Mark Cuban was a genius for cashing out his Broadcast.com puppy to Yahoo! (Nasdaq: YHOO) for billions because the chunky broadband required to deliver song files doesn't come cheap.

Text-based content sites can carve a cozy living offsetting free access with advertising and enhanced services, but the dynamics aren't as compelling for music sites. Even at $0.99 a track, Apple isn't exactly rolling in the iTunes money from the downloads themselves. After paying the content providers and dealing with the micropayment transaction charges, there just isn't much left for Apple. That's fine. Taking a 180-degree spin on the razor and blades model, Apple's making the money on the razor instead of the blades as it sold nearly as many iPods as it did iMacs this past quarter.

Others like Roxio and RealNetworks (Nasdaq: RNWK) have software to move. That's the key. If you don't own the content, the feasible distributors will be the ones willing to take a hit for the sake of improvement elsewhere.

That's why the original MP3.com never stood much of a chance. Where was the razor? Where were the blades? It could have subsidized the site by promoting Vivendi's own catalog of Universal content, but it lacked conviction in doing so. It could have made an effort to acquire a stake in its most promising resident artists, but it never stopped to consider the merits of vertical integration.

So long, CD
The entire pre-recorded music industry can afford to get leaner because the CD is dead. I mean, beyond it serving as a flawed disposable medium for portable mix tapes, what's the point? While it has been a noble effort to pack CDs with enhanced features and DVD footage to make the physical purchase more practical and worthwhile -- something that should have been done en masse years ago as a proactive move to deter file sharing rather than as a late reactive move today -- it's played. The savings in an inventory-free digitally distributed future are huge, and third-party outlets for distribution like Apple's iTunes store are more motivated in making it work than the layered labels themselves ever were.

Which may make it surprising to note that Apple never made a play for Vivendi's MP3.com site and has not taken an active role in recruiting unsigned artists.

Everything that has happened in the music industry over the past few years points to a fragmented sector that will ultimately reward smaller sums to a greater number of artists. Even a niche will have a niche to serve as the experience is further specialized and personalized.

So, yes, these are exciting times in music. If you don't hear it, you're just not listening hard enough.
http://www.fool.com/news/commentary/...y040312RAM.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Starbucks Readies Music Download Service
Tony Smith

When Apple CEO Steve Jobs launched the company's iTunes Music Store, he compared each song's 99c price tag with the cost of a latte. The coffee analogy has proved oddly prescient, since Apple may soon be serving up song downloads to Starbucks customers.

Next Tuesday, the coffee shop chain will announce its intention to launch an in-store music download service, BusinessWeek reports today. Starbucks calls the service "a completely new retail experience" and "represents a breakthrough for music consumers, providing them with enhanced music customization, greater convenience and new ways to discover emerging artists".

Its partner is HP, which will be providing a stack of tablet PCs punters can use to select songs, play them and even burn them to CD. It's also providing server infrastructure and printers for label art, apparently.

Presumably all this will happen over the store's wireless network, courtesy of Starbucks' deal with T-Mobile.

The Apple connection is provided by HP, which will this summer launch branded iPods and an online music store that is basically ITMS with an HP-branded front end. None of the companies concerned have commented on the relationship, but it's certainly tempting to view the new service as a tri-partite program.

The first Starbucks site to offer the download service will apparently be located in Santa Monica. The service will be rolled out across 2500 further sites over the next two years, the company said. Prices will match those at ITMS, though there's a minimum purchase of five songs. Five songs cost $6.99, while albums will cost $12.95.

Starbucks is essentially pitching itself against high street record retailers. Why buy CDs in Virgin or Tower when you can create your own compilations while you're enjoying your coffee? it asks. Certainly Starbucks' weekly customer count of around 30 million individuals provides a far greater walk-through than any record store gets.

The potential downside is that the stores are being branded as HearMusic, the small record shop chain Starbucks acquired five years ago. The chain currently has five HearMusic music shops running, including the one offering the download service.
http://www.theregister.co.uk/content/6/36196.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Next-Generation File Sharing with Social Networks
Robert Kaye

Editor's note: At the recent O'Reilly Emerging Technology Conference in San Diego, CA, Robert Kaye lead a talk on Next Generation File Sharing with Social Software. For those who were able to attend, this essay builds upon that session. And if you missed the talk all together, you can now get up to speed.

Open file sharing systems like Kazaa welcome everyone on the net and enjoy a broad selection of content. The selection is so vast that Cory Doctorow calls it "The largest library ever created." (Personally, I'd call it the "largest and messiest library ever created," but that is another essay entirely.) However, this vast selection comes with a significant risk attached -- outsider attackers who want to stop you from sharing files and would like to throw you in jail or pilfer your college fund.

The natural reaction is to run away and hide from the bad guys and play in your own sandbox that the bad guys cannot even see. Due to the recent massive lawsuit waves from the bad guys, there is more talk than ever about Darknets, which are networks that hide themselves and their members from public view.

Combining file sharing applications with social networks enables people to create a trusted network of their friends to keep out the bad guys. The definition of bad guys is up to the user to determine -- in a lot of cases, the bad guys would be the lovely folks slinging lawsuits. But these networks can easily be used for legitimate non-infringing uses, such as sharing personal information with a network of friends while keeping it out of reach of marketers and identity thieves.

Social networks designed for file sharing should focus on three goals: share your files with others in your network, discover new files from other members, and protect the network from outside attackers. To achieve these goals, the social network needs to be founded on a well-defined social model.

Social Models

To find social models that can be employed for these next generation networks, we can look toward human evolution. Jared Diamond's perspective on human evolution, as told in Guns, Germs and Steel, points out that humans first formed hunter-gatherer tribes in order to share the burden of food production. As tribes grew in size, they combined to create chiefdoms, and from there they created states like those in which we live now.

To apply this concept, the network starts with a group of trusted people forming a tribe of people. Starting a tribe as a friendnet, where each connection is backed up by a meatspace connection, is an excellent starting point. However, sharing files inside of a small tribe is only interesting for a short while because it presents a limited search horizon. If tribes connect with other tribes to form chiefdoms, the search horizon expands with each new connection in the chiefdom. Finally, connect chiefdoms to other chiefdoms to form states, and the search horizon may start to look similar to the search horizons in open file-trading systems.

Each tribe should carefully select tribal elders who will set the tone of the network and determine social policies for the network. The elders should be aware of the tribal members and their strengths and weaknesses in order to set policies that are effective for the group. The elders should focus the tribe on its primary goals and continually evaluate the state of the tribe to ensure that its members are well educated on the tribal policies.

Tribal elders must be aware that outside attackers can use social attacks on the network. For instance, if a number of members of a movie-swapping tribe are hanging out at their local coffee shop, they should be aware that attackers may appear as smooth-talkers with lots of knowledge about movies and claims of having a large collection of relevant movies. If one tribal member falls for the attack and invites the attacker into the network, the entire network is at risk. We'll go into the risks from attacks in more detail later, but tribal elders need to understand these risks and educate their tribe to act accordingly.

The tribal elders are the guardians of the network who should use their awareness of the network and its members to continually reevaluate the relationships between members and other tribes. These elders should select or design the appropriate social policies for their tribes and oversee privileges of their members as members establish (or destroy) their reputations.

Social Policies

Social policies dictate who can be invited to the network; how must the reputation of a potential member be verified, if at all? What other tribes can this tribe link to and trade with? Is it OK for the tribe to end their questions in prepositions? What structure is appropriate for the tribe? A loose collaboration or a rank-and-file hierarchy?

All of these questions will influence the social policies of the network, and unlike open file-trading systems, care must be exercised when creating and expanding networks that are designed to keep out attackers. The social policies of these networks have a direct impact on the security of the network. A loose network with few rules and lax reputation verification is more susceptible to compromise. A tight network with many access controls will be more secure, but it will have more restricted search horizons. The key for the tribal elders is to pick a set of policies that balances security with the utility of the network.

The social policies also determine what sort of social network will be created. Loose connection policies will yield more chaotic systems that look like Friendster, and more refined policies will yield systems that resemble systems like LinkedIn. Social policies will need to address the most pressing social issues before they arise. For instance, Friendster should have anticipated Fakester accounts and set a policy for these accounts before it ever opened its doors. Changing terms of service and social policies radically after a network has been formed only serves to alienate its users.

Search Horizons

One of the drawbacks to using a social network to enable file sharing is that the search horizons will be more limited in comparison to Kazaa/Napster/et al. There will be fewer people in the network and you will not have terabytes upon terabytes of data. Is having the world's largest, messiest and duplicated library going to help you discover new items of interest?

Not likely -- I think that file sharing through social networks enables users to explore their strong and weak ties. Random connections in P2P networks are not even weak ties -- they are random ties. Exploring the weak ties in your network is likely to give you access to more relevant information/content than a random tie. People tend to associate with friends with whom they share some common bond, and this common bond is likely going to result in some shared tastes.

Perhaps these social networks can influence some change and shift users away from a "I'm looking for this track!" mentality to a "What are my friends listening to?" mentality. Napster exemplified this focus on quantity; it is time to consider quality above quantity and use the network for discovery as well as sharing.

Architecture: Central Server

At the heart of this system lies a central server that implements the social network features. This server would implement a generic social network system via web services that could be used to create open social networks like Friendster, or Darknet applications like underground apple-pie recipe trading. This central server would be used for identification, authentication, availability, and network relationships of users. The server should not know what the social network is being used for -- a legitimate application should look exactly the same as an infringing application to the outside world.

P2P advocates will be quick to point out that a central server is a weak link in the system -- both from a technical and an outside attacker perspective. Granted, the server is a central point of failure, but so far, algorithms that implement a distributed web-of-trust have not come of age. As far as I can see, there isn't a solid solution for implementing a distributed social network that is resistant to outside attacks -- yet.

From a legal attackers perspective, the central server presents no useful information. Should a server be compromised, the legal attacker would find no proof that any illegal activities were happening. In fact, the central server should contain no incriminating or otherwise useful information about the social network. The most useful thing gleaned from the central server would be the IP addresses of other members of the network -- that's all.

This approach has two other benefits: legal attackers cannot use direct or vicarious infringement attacks on the server, since the server cannot know if the networks are used for infringing uses. Also, the central server solves the pesky P2P bootstrapping problem of finding the network to join. Here the central server will be able to give clients the IP addresses of other members who are currently online.

Architecture: P2P Client

To build a P2P client for this network, an existing client could be employed or a new one could be developed. All of the learning from P2P research in the last few years could be applied to creating a high-tech client that uses best-of-class software like BitTorrent and Kademlia. Given how many good P2P systems are floating about the world today, it is clear that this is not a difficult problem.

The P2P client could employ a Gnutella-like query-routing protocol or use external identifiers like Bitzi's Bitprints, MusicBrainz identifiers, or IMDB identifiers, coupled with a distributed hash table like Kademlia.

The system should undoubtedly use a system that automatically creates the BitTorrent trackers to maximize the bandwidth utilization of the file sharing clients.

No rocket science here, move along.

Invitations and Detection Avoidance

To join a social file-sharing network, you will need an invitation from an existing member. Invitations are simply small XML files that contain the right keys for joining the network. The invitations may also specify the right parameters for finding the network, since Darknets do their best to not operate out in the open.

First off, all traffic flowing through the social network, including file transfers, should be tunneled via SSH, so that someone sniffing your network connection cannot tell the difference between a legitimate VPN connection or an infringing trade of the hottest apple-pie recipe.

Second, the applications that form the social network should attempt to blend into the landscape and either be invisible or indistinguishable from normal network infrastructure, such as an SSH server. The easiest form of this is to operate on the same port as the SSH server itself. A more complicated approach of Port Knocking was recently proposed on Slashdot -- it requires a series of predetermined failed connection attempts to the server before the server opens the real port for the client.

Another approach is port changing, where the server and the client frequently switch ports on which they listen to for connections. The invitation could include the parameters needed to calculate which port a server would be listening on for any given time.

Regardless of which technique is employed, the goal is the same: outside attackers see nothing but SSH connections.

Security

The applications that make up the social network should employ standard off-the-shelf tools like SSH, PGP and BitTorrent. After all, these tools specialize in their respective areas, and it is not wise to reinvent the wheel -- especially when it comes to security. Any network connection made by the file-sharing software should be tunneled via an SSH connection.

The baseline security model of this software should be to revert back to the same security of an open system in the case of a system compromise. If the system is busted wide open for some reason, only the IP addresses of the participants should be exposed. In today's legal climate, having solely an IP address forces the attackers to file anonymous John Doe lawsuits. This is exactly the same procedure reserved for people who use open systems like Kazaa.

This fact gives users of social software file-sharing applications a leg up on file sharers using Kazaa. Mounting an attack on Kazaa users requires freely available and easy- to-use network tools. Mounting an attack on a network fortified with SSH requires vastly different tools and a brute-force attack is out of the question. Thus, the attackers are more likely to stick to pursuing the users of open file-trading applications.

The most vulnerable part of a social network is the users themselves. As security experts have been saying for a long time, most successful attacks are not technical attacks, but attacks that exploit the weaknesses of the users. Passwords jotted down in insecure locations, or smooth-talking attackers convincing users of their benign nature, present far greater weakness than the SSH protocol.

Ultimately, the security of the network lies in the hands of the users. This is why the social policies set by the tribal elders are so important -- the policies affect the mindset of the user, which in turn affects their behavior. Social policies that permit promiscuous behavior can lead to security breaches.

Attack Model

Analyzing the possible attacks on a social file-sharing network gives us three possible attacks:

Server attack: The central server gets hacked, raided by legal attackers, or otherwise compromised. Since the server operates blindly with respect to what the clients are doing, the server contains no incriminating evidence. The attacker cannot tell a recipe-trading network from a movie-trading network. At worst, the IP addresses of the members can be exposed and those must be pursued with a John Doe lawsuit.
Client attack: A client gets hacked, raided by legal attackers, or otherwise compromised. The compromised client could potentially continue operating and collect the IP addresses of everyone in the network. Incriminating behavior could be observed.
Social client attack: An attacker gets invited to the network and starts participating in the network. Over time, the attacker can collect all of the IP addresses of the members and possibly observe incriminating behavior.

At worst, the server attack yields IP addresses that may not have committed any infringement. Client attacks expose the IP addresses and possibly allow the attacker to observe infringing activities. While this model may seem catastrophic, it's better than the open P2P system model that Kazaa uses. Given that attackers are likely to attack the easy targets first, using a social network to share files presents an increased level of security -- for now.

File Sharing goes Social by Clay Shirky

Should a time come when all open systems have been eradicated, this system will need extra fortification. As the much discussed web-of-trust algorithms and anonymization algorithms come of age, these algorithms should be adapted for use with social file sharing to continually improve the attack resistance of these networks.

Conclusion

Over the past few years, we've learned a number of legal and technical lessons that allow us to build more secure and effective file- sharing systems today. Using detection-avoidance schemes and common security tools like SSH and PGP forces the attackers to take a different track when attacking next-generation file-sharing systems. Attackers must now employ social attacks to take down file-sharing systems, and social attacks don't scale as well as online attacks that can be assisted with computer tools.

The security model presented here is only sufficient for a limited time -- over time, more advanced web-of-trust algorithms should be used to further mitigate the damage of a compromised network.

Finally, it should be stressed again that the security of a social network grows out of the social policies set for the network. Tribal elders and members of the network need to be continually vigilant to keep the network safe from outside attackers.
http://www.openp2p.com/pub/a/p2p/200...ile_share.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Covering Net Tracks Has A Cost
David Canton

Protecting one's personal information from probing eyes when surfing the Internet has spurred reactions and counter-reactions toward anonymity time and time again. This struggle to defend each party's interests has perpetuated another overarching problem, which is often lost in the shuffle. This dilemma involves the legal and moral disconnect experienced on both sides.

The struggle between owners of material trying to control its use and turn it into revenue and users trying to make use of it, legitimate or otherwise, is a long-standing theme for intangible property, such as literary works, computer programs, music and movies.

Each party tends to rely on its moral and logical compass to decide what use should occur. The problem is each side's compass points in a slightly different direction.

The law to guide them is probably somewhere in the middle -- and may be unclear, especially where new technology is involved.

An example of this detached state occurs when individuals try to copy materials off the Internet they perhaps ought to be paying or getting permission for. This, in turn, triggers the owners of this same material to use tools that clamp down on the use more than is reasonably necessary.

As more organizations join forces to bring lawsuits against individual file- swappers, peer-to-peer software developers respond by attempting to develop new ways to hide their customers' tracks.

To protect privacy, programs are being created that claim to shield the identity of individuals passing files between computers. The idea is to hide the source of downloads.

Users should beware, because the results of improving privacy have been anything but perfect.

Most peer-to-peer systems require some amount of openness to work. To download a program or a song from another computer online, your computer must make some kind of connection -- and this automatically leaves a digital record that can be traced back.

Many Internet Service Providers (ISP) keep logs of what sites your Internet Protocol (IP) address visits on the Internet. The IP address is the identification given to your machine each time you log on the Internet. It's not very difficult for a website owner to match your IP address to the ISP you use.

Many file-swapping keeners use some kind of encryption to scramble the files and provide protection from unwanted eyes. This alone will not protect the privacy of the individual, because most monitoring services simply pretend to be an ordinary file-swapper.

There has been a move toward Internet "proxies" as a way to mask identities. By using this technique, the connection between the uploaders and the downloaders is interrupted by a digital middleman. The downloaded file is actually handed off to another web server or passed through another set of computers before it finds its way to the intended target.

A more extreme version of this proxy idea has every computer on the file- swapping network become a middleman. This method causes quite a backlog in the transferring of information.

There is a cost for the extra protection on anonymity. It can lead to longer download times.
http://www.canoe.ca/NewsStand/London...13/380271.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DJ's Remix Charts Legal 'Grey' Area
Greg Kot

The most buzzed-about album of the year isn't on the Billboard charts, and it can't be found in record stores. But even as DJ Danger Mouse's The Grey Album has restoked the decades-old debate about sampling, it further demonstrates that record companies and copyright law are being left in the dust by Internet- savvy musical innovators and the technology that stokes them.

The Grey Album conflates two revered albums: The Beatles' self-titled 1968 double album, better known as the White Album, and Jay-Z's 2003 swan song, The Black Album. But it's more than a simple "mash-up," in which a disc jockey syncs up the beats of two vastly different pop songs to create a hybrid track for playing at dance clubs.

Danger Mouse, aka Los Angeles DJ Brian Burton, spent countless hours splicing musical bars and looping beats off the Beatles masterwork, then laying them underneath an a cappella version of Jay-Z's chart-topping disc. The result is, if not greater than the sum of the two parts, certainly an ear-expanding reinterpretation, a recontextualization so spirited that it will drive listeners back to both original works with fresh ears.

Danger Mouse circulated 3,000 copies of The Grey Album last month, giving most of them away. Some of the records turned up in record stores, others were being sold on eBay, and MP3 files began circulating on peer-to-peer file-sharing sites such as Kazaa and Soulseek. That's when EMI, which owns the publishing rights to the White Album, jumped in and sent cease-and-desist letters to Danger Mouse, Web sites and stores, demanding that the record be destroyed. In response, more than 150 Web sites staged "a day of coordinated civil disobedience" Feb. 24 and offered the album for download.

Lawyers and the record industry saw the "Grey Tuesday" protest as copyright infringement run amok, a low blow directed against one of the pillars of the recording industry. The Web sites and Danger Mouse, arguing that they weren't profiting from the downloads, saw the cease-and- desist orders as an affront to creativity and new technology, an attempt by the multinational corporations that dominate the music business to maintain complete control over the creative process at any cost.

At the heart of the current debate is the long-running battle over sampling. In 1991, rapper Biz Markie was sued by Gilbert Sullivan for using an unauthorized sample of Sullivan's 1972 hit, Alone Again (Naturally), on Markie's album I Need a Haircut, and a judge ruled in the singer's favor. I Need a Haircut was pulled from stores and quickly went out of print. Ever since, record labels have been more diligent about clearing permission for using copyrighted material, sometimes paying copyright holders tens of thousands of dollars to use even a four-bar snippet of a recording.

Danger Mouse didn't seek EMI's or Jay-Z's permission to sample the Beatles, asserting that his request would have been denied anyway because he didn't have the financial means or major- label connections. Instead, he refers to the album as an experiment and has declined to make money off it. There is little doubt he also has created a significant work of new electronic art.

Even a cursory listen to The Grey Album should be enough to persuade any open-minded listener that it's clearly a creative work that doesn't just capitalize on its source material but casts it in an entirely new light.

Purists contend that music can be created only on "real" instruments and look askance at the mixing desks, turntables, samplers and computers that are the remixers' tools. But remixers are paid hundreds of thousands of dollars to do what an entire orchestra can sometimes not do: turn a song into a hit record, often by replacing all the backing instruments with countless bytes of electronic data culled from original and pre-recorded sources.

The Grey Album succeeds in making the Beatles sound funky, turning the stately piano chords of While My Guitar Gently Weeps and the harpsichord in Piggies into break beats on What More Can I Say and Change Clothes, respectively. The intensity of Jay-Z's angry riposte to his critics, 99 Problems, is ratcheted up considerably by the roller-coaster guitar riffs from the Beatles' Helter Skelter, punctuated by Paul McCartney's exultant "Yeah!"

One wishes that EMI's response to Danger Mouse's remix had been as creative as the work itself. Why not license the tracks against future royalties or, better yet, sign Danger Mouse and build a marketing campaign around the album?

In this scenario, everyone wins: The sales of Jay-Z's and the Beatles' catalogs would be boosted by renewed interest in their work, the record labels and Danger Mouse would be financially rewarded for their efforts, and consumers wouldn't have to scrounge to find an instant-classic remix album that is still more heard about than actually heard.
http://www.dfw.com/mld/dfw/living/8168991.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Rash Of Remixes In U.S
Kester Alleyne-Morris

Illegal and hugely popular remixes of hip hop legend Jay-Z's work have put the genre at the centre of a murky battle over U.S. copyright law, experts say.

In recent months, last year's "The Black Album" by Jay-Z has prompted a slew of unauthorised remixes, meshing the rap with the music of the Beatles, Metallica and Kenny G.

The remixes, described by their creators as "experiments" and acts of "civil disobedience," have drawn the ire of the music industry who say their copyright's have been infringed.

At the centre of the battle between the established music business and deejays using authorised "samples" of music to create their work is "The Grey Album" -- an innovative mix of Jay-Z's "Black Album" with the fab four's "White Album."

The mix prompted EMI to secure a cease and desist order against the man behind "The Grey Album," a little-known deejay called Danger Mouse.

But if EMI was hoping to squash distribution of the few thousand copies of "The Grey Album" in circulation, its actions instead made the recording the surprise hit of the year.

Owners of myriad file sharing sites recently held "Grey Tuesday," when more than 100,000 people downloaded the illegal album.

"To the extent that these (remixes) are recognisable songs or music, it is unquestionably copyright infringement," said Randy Lipsitz, a partner and intellectual property lawyer at New York-based law firm Kramer Levin, on Friday.

But with many of the remixes featuring tiny snippets and heavily reworked samples from other albums, it's hard to link the music to its forbearers.

Sampling advocates maintain they should be allowed use clips of music to make new art because the law allows for use of copyrighted material for criticism, parody and certain other uses like education -- called "fair use."

But not everybody agrees.

"The 'fair use' expression has been thrown around a great deal to justify behaviour that courts have frowned on," said Judith Saffer, vice-president of the American Intellectual Property Law Association.

Producer Brian Burton, aka Danger Mouse, said, "every lick and snare and drum" backing Jay-Z's lyrics on his remix album was drawn from the Beatles but many listeners would hardly be able to tell where Jay-Z begins and the Beatles end.

"If it's not recognisable, who cares," said Lipsitz.
http://www.reuters.co.uk/newsPackage...7&section=news


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Uploaders Key To Court Case
CP

TORONTO -- Internet service providers shouldn't be used as the music industry's private investigators to smoke out the names and address of 29 so-called uploaders, lawyers argued yesterday in Federal Court. The case is to determine whether the record industry should be granted a court order forcing high-speed Internet providers to release the names of people who allegedly shared hundreds of songs with others using programs such as KaZaA last November and December.

Without the names, the Canadian Recording Industry Association can't begin filing lawsuits.

"This is a complicated and imperfect process at best," said Joel Watson, a lawyer representing Telus Corp.

"It will never identify who was using the PC at the time."

Last month, the association moved to begin civil litigation against individuals who store songs on their hard drives to share with others through file-sharing software.

It filed motions against 29 John and Jane Does who it alleges are high-volume music traders.

They're identifiable only through a numeric Internet protocol address and user handles such as Jordana(at)KaZaA who, according to court documents, allegedly uploaded songs by Jay Z, Mariah Carey and Jennifer Lopez.

Telus and Shaw Communications say linking actual names with the handles and IP addresses is hard.

It requires the companies to analyse data and use deductive reasoning to make accusations against their customers.
http://www.canoe.ca/NewsStand/Calgar...13/380636.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Music Uploading Case Back In Court Friday; New Ways To Hide From Law
Angela Pacienza

The recording industry's motion asking that Internet service providers be forced to reveal the names and addresses of song uploaders will resume Friday in federal court.

And given the possibility of lawsuits against people who swap the latest Outkast or Hot Hot Heat singles, there's a flurry of activity among music fans who've come to rely on the Internet for a steady diet of MP3s - how to hide from the recording industry?

"It's a critical case because it lies at the intersection of so many interesting online issues, both copyright and privacy and the right to anonymity and responsibility of intermediaries, namely the ISPs," said Michael Geist, a professor at the University of Ottawa specializing in Internet and e- commerce law and technology counsel with the law firm Osler, Hoskin and Harcourt.

"All are issues that on their own are significant. This is almost the perfect storm where you bring together all of those issues into a single case."

Since the case will no doubt spread beyond the 29 people the Canadian Recording Industry Association, or CRIA, is trying to currently smoke out, parties with a vested interest are coming out of the woodwork.

Instructions on how to destroy hard drives or employ routers to hide the identity of KaZaA-using computers have been flowing rampant on the Net.

"The best way to destroy hard drives is to take them apart, break the platters inside into many pieces, and then throw them into the fireplace," wrote one unidentified visitor to CanFLI.org, a Windsor, Ont.- based file-sharing information network that sprang up after CRIA demanded ISPs hand over names and addresses of alleged criminals last month.

But even more telling of the lengths people will go to for free music is new software that makes it harder to ID song-swappers.

You may have never heard of Mute-Net or Blubster but the services could soon become as notorious as KaZaA and its predecessor Napster.

"The technology is getting better and better," says Nicholas Reville, co-owner of the Massachusetts- based Downhill Battle, www.downhillbattle.org, a group set up to boycott record labels and fight the U.S. recording association lawsuits.

"If they try to stomp it out in one place, it's going to pop up somewhere else. The record companies are trying to fight technology and that tends to be a losing strategy."

Mute-Net and Blubster are third generation file sharing software that purport to hide the identity of those sharing music by hiding people behind a network of randomly generated virtual IP addresses so an outsider can't tell the original source of a new U2 song or who downloaded it.

It was only a matter of time before someone was going to create a new method of hiding from authorities, says Geist.

"Essentially they read the court's decision in Napster and then architected a system that put it outside of the specific Napster issues," he said. "Many people have expected, given the current litigation strategy, we will see yet a third generation of file sharing services that seek to combat attempts to identify who the file sharers are."

CRIA, which represents music labels including BMG, EMI and Sony, wants Bell Canada, Rogers Cable, Videotron, Telus and Shaw Communications to identify 29 subscribers who are allegedly pirating music. If a judge gives permission, the plan is to sue those people in order to recoup some of the losses from file-sharing networks, including over $400 million in retail sales of CDs since 1999.

The case has been causing quite a stir, attracting a wide range of interested parties. Two advocacy groups - the Canadian Internet Policy and Public Interest Clinic (CIPPIC), a group of law professors from the University of Ottawa, and Electronic Frontier Canada, a Kitchener, Ont.-based organization - came on board last week to intervene on behalf of the public's interest.

Many experts don't expect the judge to render his verdict Friday. But even if Justice Konrad von Finckenstein did rule and he ordered ISPs to hand over the information, it wouldn't necessarily mean the recording industry will have successful lawsuits.

"Even if the information is released to the recording industry, it's not clear how much legal clout they'll have in civil court," said Teresa Scassa, an intellectual property professor at Dalhousie University's law school. "It's not entirely certain that that will be sufficient to establish the link between the activity the recording industry has identified and particular individuals."

The problem, explained Scassa, is that if the owner of one IP address turns out to be John Smith and he has three teenage children who frequently have friends over to use the computer it's going to be nearly impossible to prove who actually did the upload.

"It may mean that if they bring a lawsuit against John Smith he might be able to successfully defend himself by saying 'You simply can't prove that I did this,' " she said. "There's always the possibility that people are going to argue that someone has spoofed their IP address or done something that means the information from the ISP doesn't lead to who it's supposed to lead to."
http://www.canada.com/technology/sto...F-956B87F2A2B8


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DVD-Copying Sales Ban Reinstated
c|net

A New York federal judge on Monday reinstated a ban on sales of 321 Studios' DVD copying software. U.S. District Court Judge Richard Owen had previously decided the program violated federal copyright laws and told the company to stop selling it, but had temporarily put his own order on hold.

Owen's set of rulings have had little actual effect on the market, since a California judge's ruling barring sales of the DVD copying software remains in effect. 321 Studios is appealing both orders.
http://news.com.com/2009-1014_3-5103813.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

More evidence emerging

Microsoft Said to Encourage Big Investment in SCO Group
Steve Lohr

More evidence emerged yesterday about Microsoft's role in encouraging the anti-Linux campaign being waged by the SCO Group, a small Utah company.

BayStar Capital, a private investment firm, said Microsoft suggested that it invest in SCO, which is engaged in a legal campaign against Linux, a rival to Microsoft's Windows.

BayStar took Microsoft's suggestion to heart and invested $50 million in SCO last October. But a spokesman for BayStar, Robert McGrath, said, "Microsoft didn't put money in the transaction and Microsoft is not an investor in BayStar." He added that Microsoft executives were not investors as individuals in the investment firm, which is based in San Francisco.

Mr. McGrath said the suggestion came from unidentified "senior Microsoft executives" but not Bill Gates, the Microsoft chairman, or Steven A. Ballmer, the chief executive.

Microsoft, Mr. McGrath said, is not indemnifying the investment firm against risk or otherwise indirectly supporting BayStar's move. "The issue for BayStar," he said, "is whether there is a good return on its investment in SCO."

Microsoft, Sun Microsystems and a few other companies have struck deals with SCO to license its technology. SCO owns the rights to Unix, an operating system initially developed at Bell Labs. SCO contends that Linux, a variant of Unix, violates its contract rights.

SCO's legal campaign began last year when it sued I.B.M., a leading corporate supporter of Linux, and recently stepped up its legal attack by filing suit against two companies that use Linux, DaimlerChrysler and AutoZone.

The defendants are fighting the lawsuits, saying they have done nothing wrong and challenging SCO's claim that its rights are as broad as the company contends.

Microsoft stands to gain most from any slowing of the advance of Linux, which is maintained and debugged by a network of programmers who share code freely. That model of building software is called open source development.

It is not particularly surprising that Microsoft, given its interests, played the go-between for an investment in SCO. "But this shows is that there is a lot more than meets the eye in SCO's litigation strategy," said Jeffrey D. Neuburger, a technology and intellectual property expert at the law firm of Brown Raysman Millstein Felder & Steiner. "SCO has an agenda, and Microsoft clearly has an agenda, and it's doing whatever it can to further its cause."

The extent of Microsoft's behind-the-scenes role in SCO's legal effort has prompted questions and speculation for months. Last week, a leaked e-mail message from an adviser to SCO to the company added to the controversy in the industry. In the memorandum, sent to two SCO executives, Mike Anderer of S2 Strategic Consulting discussed a role in financing SCO, writing that "Microsoft will have brought in $86 million for us including BayStar."

SCO acknowledged that the e-mail message, obtained by the Open Source Initiative and posted on the open-source advocacy group's Web site, was authentic.

But SCO added that it was a "misunderstanding of the facts by an outside consultant" who was not working on the BayStar financing. SCO added that Microsoft did "not orchestrate or participate in the BayStar transaction."

A SCO spokesman, Blake Stowell, said yesterday, "We stand by that."
http://www.nytimes.com/2004/03/12/te...OteTQuNa1R+oww


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPod 'Murder-Horror' Hoax
Macworld staff

A diverting yet disturbing slice of iPod-related satire appeared online this morning – a seemingly hoax news report describing death by iPod.

The report is appearing on a series of blogger sites, and states the case of 'Arleen Mathers, 23', who was arrested yesterday morning after killing her boyfriend with a series of blows to the head with a blunt instrument – an iPod.

"Police said no motive has been confirmed, although evidence suggested the murder was the result of a domestic dispute after the victim erased the contents of Mathers' iPod."

The (hopefully) satirical report grows worse: "Mathers was hysterical when police arrived and told them she killed her boyfriend after he accused her of illegally downloading music and erased about 2,000 of her MP3s."

The source of the story appears to be the LiquidGeneration website. To give this report extra credibility, the site designers built it into a page that reflects the appearance of a CNN Web-site story.
http://www.macworld.co.uk/news/main_...fm?NewsID=8138


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Lost E-Votes Could Flip Napa Race
Kim Zetter

Napa County in Northern California said on Friday that electronic voting machines used in the March presidential primary failed to record votes on some of its paper ballots, which will force the county to re-scan over 11,000 ballots and possibly change the outcome of some close local races.

The glitch is the latest in a string of problems with the new generation of electronic voting machines being rolled out across the United States. Critics of the machines say they are inaccurate or susceptible to tampering, and can't be trusted in this year's presidential elections.
http://www.wired.com/news/politics/0,1283,62655,00.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

US govt buys world's biggest RAM disk

2.5TB In Solid State Memory - But What's It For?
Chris Mellor

The US government has just bought the world's biggest ever solid state disk from Texas Memory Systems.

The 2.5TB system is "the largest SSD installation in the world by far, without question", the executive VP for TMS, Woody Hutsell, told Techworld. The previous biggest one was under 500GB, he told us. At 2.5TB, it is roughly 10,000 times the size of the RAM in your PC.

The list price of the system, which is made up from 40 RamSan 320 units, reviewed here, is $4.7million, although the US government received a discount. It was installed by TMS' OEM Dynamic Solutions International.

So where is it and what's it to be used for? Well, the installation site is in Washington DC and the application involves hosting metadata for large file systems, several databases including Oracle and the acceleration of other storage-based applications by holding, for example, journal files in the SSD.

What that means in simple English is that the US government has just bought the world's biggest RAM drive in order to speed up cross-checking across several vast databases. The way databases work, a query will tend to scan an entire table if it thinks that anything more than a small percentage of the table's contents are relevant.

However, when you are talking about vast databases, that process requires a huge amount of memory to store all the details. Unless you can store all that information temporarily (say in RAM), the query has to read from disks and that is a far, far slower process. The problem is compounded hugely when you are running a query across multiple databases. So, if you want to get at the information as fast as possible you need a monster RAM memory to temporarily store the details while it is sifting through.

We do know that several of the servers using the SSD storage are running Solaris and that altogether the site has about 100TB of storage, but the specific government department and applications involved have not been revealed.

However, not that many departments could possibly want to run such vast queries regularly. It would also be extremely difficult to justify a $4.7 million investment unless that work was seen as vital and speed was a main consideration in that work. It is also peculiar that such a large purchase could be approved at a time of tightening belts.

Now, we're not saying that the Department of Homeland Security is behind the purchase. Or that it is using the technology to search the various databases of people that it, the government, the NSA and the Pentagon possess. But all of them are based in Washington DC and there are of course some issues about Islamic terrorists already living in the States.

A RamSan 320 unit holds up to 64GB of RAM in a 3U rack unit. The US government order is housed in three full height rack units. There are over 320 2Gbit/s Fibre Channel ports and the aggregate I/O rate is 36Gbit/s. That is some serious hardware.

Hutsell tells us that "the customer has been happy so far". He expects there may be additional purchasing later this year.
http://www.techworld.com/news/index....ws&NewsID=1176


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Uncle Sam wants to wiretap you (and charge you for it too!)

FBI Adds To Wiretap Wish List
Declan McCullagh, Ben Charny

A far-reaching proposal from the FBI, made public Friday, would require all broadband Internet providers, including cable modem and DSL companies, to rewire their networks to support easy wiretapping by police.

The FBI's request to the Federal Communications Commission aims to give police ready access to any form of Internet- based communications. If approved as drafted, the proposal could dramatically expand the scope of the agency's wiretap powers, raise costs for cable broadband companies and complicate Internet product development.

Legal experts said the 85-page filing includes language that could be interpreted as forcing companies to build back doors into everything from instant messaging and voice over Internet Protocol (VoIP) programs to Microsoft's Xbox Live game service. The introduction of new services that did not support a back door for police would be outlawed, and companies would be given 15 months to make sure that existing services comply.

"The importance and the urgency of this task cannot be overstated," says the proposal, which is also backed by the U.S. Department of Justice and the Drug Enforcement Administration. "The ability of federal, state and local law enforcement to carry out critical electronic surveillance is being compromised today."

Because the eavesdropping scheme has the support of the Bush administration, the FCC is expected to take it very seriously. Last month, FCC Chairman Michael Powell stressed that "law enforcement access to IP-enabled communications is essential" and that police must have "access to communications infrastructure they need to protect our nation."

The request from federal police comes almost a year after representatives from the FBI's Electronic Surveillance Technology Section approached the FCC and asked that broadband providers be required to provide more efficient, standardized surveillance facilities. Such new rules were necessary, the FBI argued, because terrorists could otherwise frustrate legitimate wiretaps by placing phone calls over the Internet.

"It is a very big deal and will be very costly for the Internet and the deployment of new technologies," said Stewart Baker, who represents Internet providers as a partner at law firm Steptoe & Johnson. "Law enforcement is very serious about it. There is a lot of emotion behind this. They have stories that they're very convinced about in which they have not achieved access to communications and in which wiretaps have failed."

Broadband providers say the FBI's request would, for the first time, force cable providers that sell broadband to come under the jurisdiction of 1994's Communications Assistance for Law Enforcement Act (CALEA), which further defined the already existing statutory obligations of telecommunications carriers to help police conduct electronic surveillance. Telephone companies that use their networks to sell broadband have already been following CALEA rules.

"For cable companies, it's all new," said Bill McCloskey, a BellSouth spokesman.

Several cable providers, including Comcast, Time Warner Cable and Cablevision Systems, had no immediate comment on the FBI's request.

The FBI proposal would also force Vonage, 8x8, AT&T and other prominent providers of broadband telephone services to comply with CALEA. Executives from these companies have said in the past that they all intend to comply with any request law enforcement makes, if technically possible.

Broadband phone service providers say they are already creating a code of conduct to cover some of the same issues the FBI is addressing--but on a voluntary basis, according to Jeff Pulver, founder of Free World Dialup. "We have our chance right now to prove to law enforcement that we can do this on a voluntary basis," Pulver said. "If we mandate and make rules, it will just complicate things."

Under CALEA, police must still follow legal procedures when wiretapping Internet communications. Depending on the situation, such wiretaps do not always require court approval, in part because of expanded wiretapping powers put in place by the USA Patriot Act.

A Verizon representative said Friday that the company has already complied with at least one law enforcement request to tap a DSL line.

This week's proposal surprised privacy advocates by reaching beyond broadband providers to target companies that offer communications applications such as instant- messaging clients.

"I don't think it's a reasonable claim," said Marc Rotenberg, director of the Electronic Privacy Information Center. "The FCC should seriously consider where the FBI believes its authority...to regulate new technologies would end. What about Bluetooth and USB?"

Baker agrees that the FBI's proposal means that IP-based services such as chat programs and videoconferencing "that are 'switched' in any fashion would be treated as telephony." If the FCC agrees, Baker said, "you would have to vet your designs with law enforcement before providing your service. There will be a queue. There will be politics involved. It would completely change the way services are introduced on the Internet."

As encryption becomes glued into more and more VoIP and instant-messaging systems like PSST, X-IM and CryptIM, eavesdropping methods like the FBI's Carnivore system (also called DCS1000) become less useful. Both Free World Dialup's Pulver, and Niklas Zennstrom, founder of Skype, said last month that their services currently offer no easy wiretap route for police, because VoIP calls travel along the Internet in tens of thousands of packets, each sometimes taking completely different routes.

Skype has become a hot button in the debate by automatically encrypting all calls that take place through the peer-to-peer voice application.

The origins of this debate date back to when the FBI persuaded Congress to enact the controversial CALEA. Louis Freeh, FBI director at the time, testified in 1994 that emerging technologies such as call forwarding, call waiting and cellular phones had frustrated surveillance efforts.

Congress responded to the FBI's concern by requiring that telecommunications services rewire their networks to provide police with guaranteed access for wiretaps. Legislators also granted the FCC substantial leeway in defining what types of companies must comply. So far, the FCC has interpreted CALEA's wiretap-ready requirements to cover only traditional analog and wireless telephone service, leaving broadband and Internet applications in a regulatory gray area.

Under the FBI's proposal, Internet companies would bear "sole financial responsibility for development and implementation of CALEA solutions" but would be authorized to raise prices to cover their costs.
http://news.com.com/2100-1028-5172948.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cable Taps Into Wiretap Law
Ben Charny

At least one cable operator is starting to comply with a federal law that has long required telecommunications carriers to help police conduct electronic surveillance, according to a source familiar with the company's plans.

Time Warner Cable is the first cable company to begin trying to adhere to the Communications Assistance For Law Enforcement Act, the source said. Cable companies are not yet required to comply with the 1994 wiretap law, but they see the writing on the wall.

Vernon Irvin, executive vice president at security vendor VeriSign, said during a recent interview that his company had signed a deal with a "major cable operator" in the United States to help it follow CALEA. He did not identify the provider, but the source tagged Time Warner as the company. A Time Warner representative did not have an immediate comment.

Irvin, however, did assert that other cable companies are sure to follow. That's because the FBI has made public a far- reaching proposal to require all broadband Internet providers--including cable modem and digital subscriber line (DSL) companies--to restructure their networks to support easy wiretapping by police.

"The cable guys aren’t waiting," Irvin said.

The FBI's proposal would, for the first time, force cable providers that sell broadband to come under the jurisdiction of 1994's CALEA, which further defined the already-existing statutory obligations of telecom carriers to help police conduct electronic surveillance. Telephone companies that use their networks to sell broadband have already been following CALEA rules.

Because the eavesdropping proposal has the support of the Bush administration, the Federal Communications Commission is expected to take it very seriously. Last month, FCC Chairman Michael Powell stressed that "law enforcement access to IP-enabled communications is essential" and that police must have "access to communications infrastructure they need to protect our nation."

Irvin said that details of the VeriSign deal will be announced next week.
http://news.com.com/2100-1034-5173320.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Sharereactor down, and now out.

Internet-Site vom Netz genommen
Ernst Vogelsanger

FRAUENFELD (kapo) Wegen Verdachts von Widerhandlungen gegen das Urheberrechts- und das Markenschutzgesetz hat das Kantonale Untersuchungsrichteramt Thurgau eine Internet-Site abgeschaltet, die als Link-Plattform für Angebote von Tauschbörsen diente. Gegen den 25-jährigen Betreiber aus Frauenfeld läuft ein Verfahren.

Die Internet-Site mit Serverstandort Frauenfeld war rund 30 Monate online und verzeichnete zuletzt durchschnittlich rund 220'000 Zugriffe pro Tag, bevor sie vor einigen Tagen von den Thurgauer Behörden vom Netz genommen wurde. Die in Suchmaschinen toprangierte Site funktionierte als Drehscheibe für Links zum Download vorwiegend von urheber- und markenrechtlich geschützten Computerspielen und Filmen, die auf Angebote von Peer-to-Peer-Tauschbörsen führten.

Nach einer entsprechenden Anzeige diverser Grossfirmen, vertreten durch die Schweizerische Vereinigung zur Bekämpfung der Piraterie, eröffnete das Kantonale Untersuchungsrichteramt Thurgau eine Untersuchung, beschlagnahmte die Server in Frauenfeld und liess die Site abschalten.

Der verantwortliche Betreiber, ein 25-jähriger Schweizer, zeigte sich in den ersten Einvernahmen zur Erhebung der Sachlage sehr kooperativ. Die Ermittlungen dauern an und werden einige Zeit in Anspruch nehmen.
http://ww3.tg.ch/default.cfm?TreeID=...TOKEN=75096023

Translation from slyck

Internet-Site Taken Offline
Ernst Vogelsanger

FRAUENFELD (kapo) Due to the suspicion of breach of copyright and trademark laws the cantonal judicial Inquiry department of Thurgau has taken down an Internet-Site that served as a link platform for filesharing offerings. A process concerning these matters against the 25 year old owner from Frauenfeld is underway.

The Internet-Site located in Frauenfeld was online for about 30 months and last had over 220.000 hits per day bevor it was taken offline by the Thurgau officials. The in search engines toprated site worked as a anchorpoint for links to downloads of copyright and trademark protectet games and movies that were offered on the filesharing network.

After a complaint from several large corporations, represented by the swiss association against piracy, the cantonal judicial inquiry department of Thurgau initiated an investigation, seized the servers in Frauenfeld and had the site taken offline.

The responsible owner, a 25 year old swiss proved to be very cooperative in explaining matters at hand. The inquiries continue and will take some time.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

California AG Wins Role In New Hollywood Spooker, "P2P: The Reckoning"
John Paczkowski

California Attorney General Bill Lockyer's close ties to the entertainment industry have never been more evident and more troubling than in a letter circulated last week by Lockyer's office. In that letter, Lockyer condemns peer-to-peer software and calls upon the companies who develop it to warn their customers about the "legal and personal risks" they face while using it. "It is widely recognized that P2P file-sharing software currently is used almost exclusively to disseminate pornography and to illegally trade copyrighted music, movies, software and video games," the letter states. "File- sharing software also is increasingly becoming a means to disseminate computer worms and viruses. Nevertheless, your company still does little to warn consumers about the legal and personal risks they face when they use your software to 'share' copyrighted music, movies and computer software. A failure to prominently and adequately warn consumers, particularly when you advertise and sell paid versions of your software, could constitute, at the very least, a deceptive trade practice." The letter is troubling for a number of reasons and sadly its questionable interpretation of product liability law is the least of them. Wired News reports that it was edited and perhaps even drafted by Vans Stevenson, senior vice president for state legislative affairs for the Motion Picture Association of America.

I'll have a grande CD of the Brazilian-Caribbean blend to go ... oh, and some coffee: Beginning today, coffee beans won't be the only thing Starbucks burns. Patrons of the ubiquitous coffee chain's Hear Music Coffeehouse in Santa Monica can now listen to MP3s from 20,000 albums at one of the cafe's 70 PC listening-station tables and even burn them to their own personalized CDs for a fee. It's an interesting, albeit unproven, model, but one Starbucks is confident in. The company plans to expand the service to 10 Starbucks stores in Seattle next month and roll it out to 2,500 stores over the next two years. "It would be sad if the only way to discover music was home, alone in your room, on your PC," Don MacKinnon, Starbucks vice president of music and entertainment, told USA Today. "The traditional model is walking into the store and knowing what you want. We're trying to turn that model on its head by helping people discover new music."

It took them more time than it should have, but Hollywood marketers have finally realized that online trailers and Flash-heavy sites aren't the only ways to promote films on the Web. Case in point: Warner Bros.' latest thriller, "Taking Lives." The film doesn't premiere in theaters until March 19th, but anyone who's interested can watch its first nine minutes and eight seconds online at Yahoo Movies. A savvy move, this. Give us 10 minutes of a film, just enough to suck us into the action, and then leave us hanging. "The Internet is a terrific way of sampling the product," Nancy Utley, president of marketing for Fox Searchlight, told the L.A. Times. "Trailers are powerful tools, but moviegoers recognize they are heavily edited. They feel it's clever marketing but not really representative of the product. It's hard to argue with that. What Universal is doing is pushing this idea further, and I think it's very smart."
http://www.siliconvalley.com/mld/sil...sv/8199961.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Repercussions.

Site announcement, Jigle.com:

Sorry, this service is closed until further notice.

Reason: The ShareReactor has been shut down due to legal issues (if you speak german read here) and it is unclear whether and when it will return. I'm not aware that anything is going on against my person, but I do not want to cause further costs to SimonMoon and therefore have decided to shut my services down.

So long and thanks to all the people that helped me through the previous two years with this project,

Melange.


http://www.jigle.com/
JackSpratts is offline   Reply With Quote
Old 18-03-04, 10:12 PM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

Readin n ritin n file sharin

MSU To Offer Short Course On Peer-To-Peer File Sharing

Michigan State University’s Department of Telecommunication, Information Studies and Media is offering a unique class this spring on peer-to-peer file sharing.

Titled “Peer-to-Peer (P2P) Filesharing: From Download Nation to Collaborative Technology,” the class will meet on Friday and Saturday, March 19 and 20, from 9 a.m. to 4 p.m. Topics covered in the course include the technology, policy, economics, management and user behavior associated with P2P systems. Fifty-five students have enrolled in this first-of-its-kind course.

A peer-to-peer system refers to a computer network where people can exchange individual files on their computer directly with each other, without having to upload them to a mediating server. Peer-to-peer software, such as the original Napster program and the now widely used KaZaa, makes it easy to share these files by indexing and enabling searches of all the files in all connected users' shared directories.

"Most of the attention given peer-to-peer systems has emphasized their use in the illegal trading of copyrighted digital information, particularly music file sharing through software such as KaZaa,” said Charles Steinfield, a professor of telecommunication, information studies and media at MSU. “In this course, we take a broader view, examining the underlying technology, the economic foundations and the policy implications of decentralized systems for file sharing.”

TISM faculty presenting in the class include Steve Wildman, Johannes Bauer, Tom Muth, Robert LaRose, Gary Reid, Dan Kim and Steinfield. A number of other MSU faculty and administrative staff will provide guest lectures, including David Gift, the vice provost for Computing, Libraries and Technology; Rich Wiggins of the MSU Computer Lab; Lorrie Hudson of the Office of Intellectual Property; and Peter Yu from the MSU-DCL College of Law.

The course will culminate with a symposium on April 15 on the future of P2P systems, featuring John King, dean of the School of Information at the University of Michigan; James Hilton, associate provost for Academic, Information and Instructional Technology at the U-M; and MSU’s Gift.
http://www.newsroom.msu.edu/site/ind...17/content.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Legit P2P on Road to Reality
Brian Garrity

NEW YORK (Billboard) - The race is on to legitimize peer-to-peer technology.

Music business sources predict that commercial P2P services are coming by 2005 -- both as startup ventures and cleaned-up versions of existing networks.

John Frankenheimer, co-chairman of Loeb & Loeb, gave the boldest public P2P prediction to date at the recent Billboard Music & Money Symposium, when he said that he expects legitimate P2P services to be a reality within the next year.

Others in the industry are quietly seconding the forecast.

"It's within the realm of possibility," one major-label technology expert says of the timetable. "I think you'll see both happen."

Details are limited on which companies have an eye on the legitimate market. Nor is it clear what the business model of a legal P2P offering would be.

This much is known: The key to every commercial P2P distribution scenario is the inclusion of content-filtering technology.

Filtering will play an integral role, says Vance Ikezoye, CEO of Los Gatos, Calif.-based Audible Magic, a specialist in the field.

Filtering technologies are intended to keep unlicensed files out of P2P environments, track content consumption on the network and facilitate transactions.

The buzz surrounding filtering centers on two companies: Audible Magic and Snocap, a San Francisco startup from Napster creator Shawn Fanning.

Sony Music chairman/CEO Andrew Lack cited both in a February speech at the National Academy of Recording Arts and Sciences' Entertainment Law Initiative luncheon in Los Angeles.

Audible Magic has been making the rounds on Capitol Hill with the Recording Industry Assn. of America (RIAA), showcasing a technology designed to identify and block the distribution of files that run afoul of label copyrights.

Snocap has yet to launch, but the company is quietly demonstrating a similar solution to the major labels and others.

Snocap officials did not return calls for comment.

Sources familiar with Snocap say it also has a transaction engine. That indicates that Snocap would block illegal content on a P2P network but give users an opportunity to acquire the content legally.

Ikezoye says Audible Magic is also exploring transaction capabilities.

"You can easily envision to sell consumers legitimate content or other services," he says.

Different Strokes

Commercial P2P ideas under consideration range from free, sponsored services to more traditional pay-per-download and subscription models, label sources say.

But before the labels sign on for any commercial P2P concept, P2P network operators need to agree to rid their systems of unlicensed content.

Major-label sources say they are not interested in allowing their content to be sold through P2P networks unless the operators enforce filtering of unlicensed content and flood their services with commercial files.

P2P operators -- embroiled in copyright-infringement lawsuits with the recording industry -- long have held that they cannot control the flow of content through their networks. The argument is a key component in their defense.

P2P operators are also balking at suggestions that they build filtering technologies into their systems. The operators are concerned that such moves are the precursor to a legislative push by the entertainment industry to require P2P networks to use filtering technologies.

Adam Eisgrau, executive director of P2P United, the Washington, D.C.-based public relations/lobbying group representing Morpheus, Blubster and four other services, sent letters on March 10 to the heads of all five major labels, RIAA chairman Mitch Bainwol and Audible Magic's Ikezoye calling for independent testing of Audible Magic technology.

The labels and Audible Magic are adamant that filtering can work in a P2P environment.

"Legitimate peer-to-peer systems are possible today," Sony Music Entertainment chief technology officer Phil Wiser says. "It really just comes down to whether these services are truly interested in going legitimate and are willing to implement a solution that does that."
http://www.reuters.com/newsArticle.j...toryID=4610246


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Putting Road Workers In The Groove
Martin LaMonica

After billions of dollars invested in PC "productivity applications" and a marketplace dominated by Microsoft, does the world need more software for so-called knowledge workers?

Ray Ozzie thinks so and, he says, macroeconomic forces are on his side.

The founder of Groove Networks argues that organizations are becoming increasingly decentralized. Instead of being tightly bound to corporate centers, workers are being unleashed, laptop in hand, to work in different locations or out of their homes. A globally connected economy allows corporations to outsource tasks from manufacturing to software programming. Independent contractors who work for several companies at once are on the rise as well.

For Ozzie, a collaboration software guru, those trends are placing demands on technology that aren't being addressed effectively today. Small groups of people need to team up on projects that can span different organizations and locations. He contends that Web applications have their limitations, as do other products, such as Lotus Notes, which Ozzie created in the mid-1980s.

As Groove prepares to beta test the third release of its software, which Ozzie calls an "inflection point" for the company, Ozzie sat down with CNET News.com to talk about how technology needs to adjust to changing work dynamics. In addition, the technology visionary talked about peer-to-peer computing and the company's close relationship with industry giant (and Groove investor) Microsoft.

Q: In your most recent Web log entry, you talked about how decentralization and peer- to-peer technology are having an impact on your government customers and on society. What has fundamentally changed since, say, your days at Lotus?
A: What collaboration software--and technology in general--is all about is reducing the cost of coordination in one way or another between entities who need to work with one another, whether those entities are individuals or organizations. When I started working on
The bleeding-edge customers using Notes were trying to use it with companies outside.
Notes back in 1982, and when we finally shipped in, like, 1989, I guess I had the changing nature of the organization on my mind. In the enterprise at that point in time--it is hard to imagine going back that far- -the concept of re-engineering a corporation had become a trend.

BPR (business process re-engineering), right?
Exactly, and the whole notion was the changing nature of the organization internally. Departments were supposed to work with one another as opposed to working in a "siloed" fashion internally. And that really drove the nature of what Notes was all about. And Notes worked very well for these big global enterprises in that zone. When we founded Groove in 1997, it was based on some things I saw happening in customers in the 1995- 1996 time frame. The bleeding-edge customers using Notes were trying to use it with companies outside. They were working with groups outside their corporate boundaries. And these were big companies--channel masters--and they were trying to force Notes out there, and in some cases, it worked. But it was tough.

Groove was really founded based on the changing nature of business in general--the fact that business would become more decentralized. What we saw happening in a limited form was going to happen more and more. Companies would be--I do not think that at the time I would have referred to it as outsourcing--partnering more and more with smaller companies. Supply chains would become important. Firewalls would be a big constraint. I think that we pretty much were right in reading that trend. It has happened more in some industries than others.

So what's changed since Groove launched in 2000?
What we have noticed during the last 18 or so months is that its focus has gone well beyond the changing nature of business--to the changing nature of work in general. It is not just how businesses are interacting with one another in a very decentralized fashion. It is how individuals and small groups of people--very small companies--are assembling into teams and doing things very dynamically in a very mobile and geographically dispersed fashion.

I never could have imagined when we started Groove that by this point in time, according to various statistics, more than half of what we in Groove refer to as information workers--people who use Microsoft Office--work from multiple locations. I am not saying that they do not have a job in a cube. They work from home significantly in addition to working in the office. They work on a client site. So Groove's latest release really tries to focus on are the things that really cater to the individual in this mode of having the need for a "virtual office." You know, to put what they would do in their physical office into their PCs so that by virtual means, they can essentially--and in a secure fashion--join a meeting with various people, and organize and file documents.

Wasn't the Web browser supposed to give people access to information everywhere?
The browser does indeed give people access to information. It is the ultimate access tool, but the browser is at odds with another trend. Leave Groove aside for a moment. One of the biggest subjects I think is not written about very much--but it is so obvious and it is going to be the story in a year or two-- are the trends around storage. The fact that right now we carry around, you know, 20-, 30-, 40-, 60- gigabyte hard disks. In two to three years, it is going to be 100-terabyte hard disks.

If you look at Apple Computer's iPod and look at digital video recorders, we are wrapping computers around hard disks now, and we want to carry more and more and more stuff around with us. No matter how pervasive networking becomes, there are security issues with respect to putting all your information on a server that can be attacked by a lot of people from the outside. There are big administrative burdens for corporations making all the information that is available inside the firewall available through the browser securely to subsets of people.

Isn't there the advantage of easier administration with centralized information and browser-based delivery?
Well, we believe that information technology organizations do need to manage things. But I think that is a separate question from whether they are managing something on a desktop or on a server. They need management capabilities, but it's just--this is a bit weird--software. You can build software that allows a central administrator to manage stuff on decentralized clients or on their servers.

With regard to doing things on a Web server versus doing things on a client, most really dynamic applications that involve teams of people use some mix of both centralized and decentralized systems. Most major organizations are not going to use Groove in a completely cutting-edge fashion, and most organizations realize that they cannot offer everything through a portal. They have to have some kind of mobility solution. Big vendors acknowledge that they need to embrace the rich client more in conjunction with Microsoft's SharePoint Portal. In IBM's case, they are asking, "How can we reinvigorate a rich client around our WebSphere Portal offering?" So, I just think it is ultimately a mix of finding the right mix for an enterprise of what you put in the center versus what you arm people at the edge.

The other thing is that there are constraints on the richness of what you can do in a browser. In most major enterprises, people might use browser-based e-mail occasionally through a browser when they are traveling, but browser-based e-mail is usually more of a consumer and educational thing. Most people use Outlook or Outlook Express or some other client software-- there is a reason people like it.

With so much focus on return on investment and demonstrating hard benefits, is selling software that improves productivity tougher than in previous years?
We do not really sell general productivity. I do not think there is a market for that right now and, arguably, I do not even know that there ever was a real market for general productivity, even though the industry might have thought a bit that way. An individual buys something, because it helps her do something in the context of her job or what she is dealing with. If you're a sales rep, you'll try to find software that helps you sell better or make your quota more effectively. It is not general productivity, per se; it is very specifically applied productivity to a task.

Your company has close ties to Microsoft, which is pinning a lot on Longhorn, the next version of Windows. Do you think that Microsoft has made the business case for Longhorn?
I do not think it has, and I would not really expect that it should have at this point. It should not be hurting the sales of what they have to sell right now. Currently, Longhorn is at the phase in which Microsoft needs to get developers signed up. It is a big challenge for any software vendor to essentially communicate its things in a way that it is relevant to customers from a business value standpoint. And in terms of an operating system, it is hard to really justify the massive cost of an upgrade unless you really can make that case. I look forward to hearing what that case will be, but I have not heard it.

Is there any concern that some features Microsoft is introducing with Longhorn might overlap with and therefore diminish the value of Groove?
They will overlap, and I am not concerned, because the focus that we have on this particular domain is so intense. Our experience is so intense in this domain that what they put in there will be useful, but we are more connected to the business value of it. Microsoft is very focused on what an enterprise does within its own boundaries, and I think that what you will see--if I could project based on what I know--will be really interesting things you can do with the desktop or across communication lines, if you have things configured a certain way.

It is not obvious to me that what Microsoft has done or is proposing to do will be designed to work seamlessly across regular firewall boundaries, enterprise boundaries, operating system boundaries and infrastructure boundaries. And that is what we are focused on: real-world collaboration needs. Am I aware of Microsoft's plans, and do I track it? Absolutely, but I am not concerned.

Do you think that the adoption of peer computing and more decentralized computing systems is speeding up?
I think decentralization in general is shaking things up in many sectors. It has shaken things up in the entertainment industry. Through Napster and MP3s in general, that industry has been rocked by it. It is about to shake up the movie industry in a big way. And the telecommunications industry--have you ever played with Sykpe?

The voice over Internet Protocol service?
That's right. It is very interesting, because the telecom industry historically is very centralized; the whole circuit-switching model is passed here. Skype will give you access to that switch. VoIP in general represents an inflection point, a slight disruptor for the incumbents, but Skype takes it all the way to the extreme and simply says, "No, if you have an Internet connection out there, you do not need to pay anything to anybody to do phone calls." So true decentralized rich-client software for telecom is really a disrupter, and we represent essentially what someone can do a productivity and communication stance--a collaborative productivity realm in decentralization.

When Groove launched in 2000, it was known as a peer-to-peer computing company, but you don't hear that from the company as much these days. Is that a deliberate shift?
I think that, oddly enough, what you will see over this year is that we will be talking about ourselves again a little bit more in that dimension. That term was used just more from a factual standpoint to help people understand. We felt a backlash for using it at a certain point, as IT managers were shutting down their networks in a very blanket fashion to P2P networks, because they were afraid of lawsuits.

Now, because of the telecom thing, in particular, it is kind of coming back in the conversation in terms of "Wait, you can really save money by using a peer-to-peer architecture for doing this, that and the others." We are not going to be out there, trying to create another peer-to-peer wave, but when somebody does understand that a peer-to-peer architecture can save the money, it is relevant.
http://zdnet.com.com/2100-1104-5173378.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Groove Gets Into File-Sharing

Updated collaboration program enhances security, adds alerts, and provides new tools.
Liane Cassavoy

Groove Networks is updating its collaboration software this week, releasing a beta version of Groove 3.0. It is available to licensed users of Groove version 2.0 and higher, and the final version is expected to roll out in early summer.

Groove's software, which was first released in 2000, uses a peer-to-peer networking model to connect users. Groove Workspaces serve as virtual offices, where geographically dispersed coworkers can store files and folders, save threaded discussions, share calendars, track project information and timelines, meet online, share a whiteboard, and communicate through chat and instant messenger.

New in version 3.0 are secure file- and folder-sharing capabilities; a Groove LaunchPad for easier organization and navigation; and expanded user alerts. A new forms-building tool lets users easily create applications for capturing, tracking, and sharing information among users.

Groove's software, currently available in version 2.5, costs $69 per user for the Standard edition; $149 per user for the Professional edition, which adds a server capability; and $199 for the Project edition, which features project management tools from a Groove partner. As of July 1, 2004, the Professional edition will cost $179 per user and the Project edition will cost $229 per user. The price for the Standard edition will remain at $69.

File-Sharing Debuts

The new file-sharing feature in version 3.0 turns Windows Explorer into somewhat of a Groove Workspace. When Groove is installed on your desktop, you simply open a Windows folder that you have created to store files. The folder will display a Groove icon, showing that you can share that folder with a Groove contact. You give them access by entering their e-mail address. Groove sends a message offering access and when they accept, Groove creates a duplicate folder on their PC and sends them their own copies of all of the files yours contains.

Folders can be synchronized with any number of Groove users, and the contents are updated on each desktop when any user makes changes. Groove transfers files with 192-bit encryption for security, and the data can travel through firewalls.

When the final version of 3.0 is released, it will add a chat feature to this folder-sharing capability, according to Groove developers. This will let users chat with others within their desktop folders.

The file-sharing feature allows single users to run Groove, which has often involved a server and workgroup configuration. A $69 Standard version one-user license allows you to install Groove software on all of your PCs. This enables you to automatically synchronize common files and folders across PCs at, say, the office and at home. It can save you from repeatedly e-mailing files to yourself, or transferring data via a USB thumb drive.

If users are offline when changes are made, the updates are delivered as soon as they log on. Or, Groove can alert users as changes are made, or when they peruse Groove Workspaces. The Alerts feature, added in version 2.0, is much richer in version 3.0, says Andrew Mahon, director of strategic marketing for Groove Networks. You can choose to be notified when a certain user enters a Workspace and opens a certain item. What's more, the alert offers a link that will take you to that same Workspace and item, where you can chat with that fellow user.

Other New Features

Also new in version 3.0 is the LaunchPad, which gives users one starting place from which to view all of their Groove information. You can view workspaces and contacts, send messages, and create new Workspaces from the LaunchPad.

Groove version 3.0's added forms builder enables users--even those without developer skills--to create a custom business process application. A small-business user could, for example, create a customer-tracking application by dragging and dropping fields onto the form, Mahon says. Then, the user can share the forms with other Groove users.

In addition, version 3.0 provides Workspace templates for designing Groove Workspaces. Its enhanced performance will enable it to start up faster and require less bandwidth, Mahon says.
http://www.pcworld.com/news/article/0,aid,115184,00.asp


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

VoIP Market Hotting Up As Skype Gathers More Funding
Matt Whipp

Skype has banked nearly $19mn of venture capital funding in round two.

The peer-to-peer IP telephony startup gathered in $18.8mn in second round funding led by venture capital firms Draper Fisher Jurveston and Index Ventures.

Skype will use the funds to expand its global reach and add new functions to the service. Skype's CEO and co-founder Niklas Zennström said: 'While Skype will remain committed to a simple to use yet feature rich free offering, we will introduce an array of premium services at our first commercial launch later this year.'

Over and above free voice calls to other Skype users, the service already offers conference calling, a global directory, instant messaging and ring tones, the company is looking at paid-for services such as terminating Skype calls to fixed- line and mobile phones. After all, venture capital funding is a speculation to profit.

And the VoIP market is hotting up, with BT Yahoo! announcing it is to implement a new range of services including offering voice calls through its instant messenger service that can be routed to fixed lines at standard BT rates.

Yet Skype in its beta form is already approaching 9 million downloads.

Tim Draper of Draper Fisher Jurveston said: 'The Skype team boasts some of the world's great corporate innovators, and is the hottest viral marketing phenomenon since Hotmail.'

Indeed, although Zennström is best known as one of the founders of the popular KaZaA peer-to-peer file sharing system, he predicts that KaZaA will revolutionise communications industry with the same impact as email. Zennström said: 'Anyone using the Internet is a potential Skype user... Over the next few years, I expect to see something similar to the effect email had over fax. People used to fax things all the time, but now they generally use email instead.'
http://www.pcpro.co.uk/?http://www.p...y.php?id=54996


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Linksys Speeds Up 802.11g Lineup
Peggy Wat

Linksys Group has released a line of 802.11g products aimed at small business and home users. The products are designed to give users more power for their wireless LANs.

The Wireless-G with SpeedBooster product line is backward compatible with existing 802.11b and 802.11g products, according to Linksys. The new line adds more security options, including parental control features for home users. Linksys claims its SpeedBooster technology can enhance network performance by up to 35 percent.

The SpeedBooster line, now available, includes a Wireless-G Router (model WRT54GS) priced at US$130; the PC Card (model WPC54GS), US$100; and PCI Adapter (model WMP54GS), also US$100.

The speed enhancement technology, SpeedBooster, is built on Broadcom's Afterburner technology, according to Linksys.

The company says it can increase by as much as 70 percent the aggregate throughput performance of a mixed wireless network that involves both 802.11b and 802.11g products, so the overall performance is enhanced no matter what wireless device is running. The boost comes partly because SpeedBooster products minimize overhead communication between data transmissions, Linksys representatives say.

Home networks typically don't hit the maximum throughput that most wireless networks are capable of. For example, 802.11g can connect wireless devices at up to 54 megabits per second; but most users see about 20 mbps to 25 mbps depending on the layout of their home or the materials used in the walls and floors.

In tests conducted by the company and by independent organizations, a wireless network using the new router and new plug-in cards was able to handle a bandwidth of about 34 mbps, says Mike Wagner, Linksys director of marketing. The company saw an increase in performance of about 20 percent if only one of the new products was used on a wireless network, he adds.

Linksys also emphasizes that the Broadcom technology follows a "good neighbor" approach designed to limit interference with other wireless networks nearby. The products stay within 20 MHz (on channel 6) of the 2.4-GHz frequency band to help limit potential interference with other devices in that band. Linksys notes that several countries restrict use of wireless products that exceed the 20 MHz rule.
http://www.pcworld.idg.com.au/index....10&fp=2&fpid=1


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The Corporation As ‘Psychopath’ To Be Debated At Theseus Alumni Conference

Documentary Co-Creator Joel Bakan to be Event Keynote
Press Release

Sophia Antipolis, FRANCE - The recently released and critically acclaimed documentary film ‘The Corporation’ will serve as the focal point of the annual Theseus International Management Institute Alumni (TIMIA) Conference on 2nd April 2004 at Theseus Institute, Sophia Antipolis, near Nice, in the south of France. Billed by critics as “the next ‘Bowling for Columbine,’” ‘The Corporation’ invites players, pawns and pundits on a graphic and engaging quest to reveal the corporation’s inner workings, curious history, controversial impact, and possible future.

Theseus Institute is the first business school to organize a conference around the film, which has been scooping up awards at major film festivals in Sundance, Amsterdam, Toronto, Calgary and Vancouver since its premier screening in September 2003.

The feature documentary takes a look at the very nature of the corporation. The filmmakers view the corporation in the way that it is considered under the law, as a “person.” The question is then asked, “What kind of person is this?” The conclusion is that the corporation meets all the diagnostic criteria of a psychopath. ‘The Corporation’ questions the sanity of granting so much power to such a person, this institution with the legal obligation to serve the bottom line and no need to account for “human” values. The film uses dramatic case studies to explore the impacts the corporation has on our environment, our children, our health, our media, our democracy and even our genes – and what people are doing in response.

Following the screening of the film at the TIMIA Conference, University of British Columbia law professor and ‘The Corporation’ co-creator and writer Joel Bakan who is also author of the book upon which it is based “The Corporation: The Pathological Pursuit of Profit and Power,” will lead conference delegates in a panel discussion about the film and its conclusions. As a TIMIA speaker, Bakan will join a select group of business academics including Theseus Institute’s Director General, Professor Ahmet Aykaç, CEOs, senior commentators from international business press and others taking part in the dialogue as ‘concerned citizens.’

Run as a learning workshop, the discussions will focus on questions raised by the film’s creators: Is there a cure for this pathological pursuit of profit-at-any-cost? Or can we only apply restraints? Will people regain control over the corporation? The conclusions of the discussions will be published following the conference.

While the Canadian documentary has yet to be released outside of North America, it is already having an impact on management education. Several reputable business schools in North America have approached the film’s creators about using its thesis, the concept of the corporation as “psychopath,” as the basis for new management courses. Theseus Professor Aykaç echoes this concern, “It is not at all obvious why corporations should have ‘rights’ and what this actually means and what its limits are – in particular if the ‘rights’ of these ‘moral persons’ start trampling on those of ‘physical persons’ and society at large. There have been revolutions based on the unacceptability of ‘taxation without representation’; yet corporations routinely make decisions that put burdens on the rest of society with no representation.”
http://www.categorynet.com/fr/cp/details.php?id=43156


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Heavy Turntable

And at £48,000.00, expensive too.

And DJ’s think the 1200 is weighty.

http://www.bluepearlaudio.co.uk/Default.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hackers Embrace P2P Concept

Experts Fear 'Phatbot' Trojan Could Lead to New Wave of Spam or Denial-of-Service Attacks
Brian Krebs

Computer security experts in the private sector and U.S. government are monitoring the emergence of a new, highly sophisticated hacker tool that uses the same peer-to-peer (P2P) networking abilities that power controversial file-sharing networks like Kazaa and BearShare.

By some estimates, hundreds of thousands of computers running Microsoft's Windows operating system have already been infected worldwide. The tool, a program that security researchers have dubbed "Phatbot," allows its authors to gain control over computers and link them into P2P networks that can be used to send large amounts of spam e-mail messages or to flood Web sites with data in an attempt to knock them offline.

The new hacker threat caught the attention of cyber-security officials at the U.S. Department of Homeland Security, prompting the agency to send an alert last week to a select group of computer security experts. In the alert, the agency warned that Phatbot snoops for passwords on infected computers and tries to disable firewall and antivirus software.

A copy of the DHS alert was made available to washingtonpost.com by two sources at different companies who asked that their identities not be used because they did not want to risk losing access to future government alerts. Officials at the department and US-CERT -- a government-funded cyber-security monitoring agency -- confirmed that the message was genuine.

Phatbot is "a virtual Swiss Army knife of attack software," said Vincent Weafer, senior director of security response at Cupertino, Calif.- based Symantec Corp.

Joe Stewart, a researcher at the Chicago-based security firm Lurhq, has catalogued Phatbot's many capabilities in an online posting. Those capabilities include: the "ability to polymorph on install in an attempt to evade antivirus signatures as it spreads from system to system"; "steal AOL account logins and passwords"; "harvest emails from the web for spam purposes" and "sniff [Internet] network traffic for Paypal cookies."

Phatbot is a kind of "Trojan horse," a type of program named after the legendary stealth attack because it let hackers take quiet control of unsecured computers. Security firms have catalogued hundreds if not thousands of Trojan horse programs in recent years, but Phatbot has raised substantial concern because it represents a leap-forward in its sophistication and is proving much harder for law enforcement authorities and antivirus companies to eliminate.

Like traditional Trojan horse programs, Phatbot infects a computer through one of several routes, such as through security flaws in Microsoft's Windows operating system or through "backdoors" installed on machines by the recent "Mydoom" and "Bagle" Internet worms.

But because Phatbot links infected computers into a larger network, hackers can issue orders to the infected machines through many routes, and cyber-security officials can only effectively shut down a Phatbot attack if they track down every infected computer.

"The concern here is that the peer-to-peer like characteristics of these 'bot networks may make them more resilient and more difficult to shut down," said a cyber-security official at the Department of Homeland Security who asked not be identified because the agency is still considering whether to issue a more public alert about Phatbot.

"With these P2P Trojan networks, even if you take down half of the affected machines, the rest of the network continues to work just fine," said Mikko Hypponen, director of F-Secure, an antivirus software company based in Finland.

Most major antivirus products detect Phatbot, but as soon as the Trojan infects computers it disables many antivirus and firewall software tools.

Roger Lawson, director of computing and information technology at the University of Vermont in Burlington, said he quarantined more than 200 computers -- more than 5 percent of the machines on the school's network -- because of Phatbot infestations. None of the school's antivirus programs detected the Trojan, and attempts to delete it caused Phatbot to recreate and restart itself, he said.

Phatbot's ability to disable computer security software means that the estimated number of infected computers could rise to as high as "several hundred thousand," said F- Secure's Hypponen.

A few computer experts said the rate of infection is much higher.

Igor Ybema, a network administrator at the University of Twente in Enschede in The Netherlands, put the number between 1 million and 2 million computers. His conclusion was based on a Phatbot command that forces infected computers to test their Internet connection speed by sending a file to one of 22 specifically selected Web servers around the world -- one of them at Twente.

He said Twente began monitoring traffic from computers running the tests in mid-February, about the time that rival hacker gangs began an online turf war that resulted in a volley of new worms like Bagle and "Netsky." By early last week, Ybema said he was tracking an average of 200,000 to 300,000 Internet addresses running the speed test every day. Ybema believes such traffic indicates that attackers who have previously relied on less advanced remote-access Trojans are now using Phatbot.

The majority of the infections appeared to come from home user broadband connections and from colleges and universities in the United States and the Asia-Pacific region, he said.

Earlier this month, computer network engineers at University of California, Santa Cruz monitored the same type of speed testing traffic as Twente's Ybema observed. Mark Boolootian, the network engineer who discovered the activity, said one reason infected computers may be conducting the speed tests is to give Phatbot authors an idea of which infected computers would be the fastest in sending out large amounts of spam or data aimed at overwhelming a major Web site.

Security experts are divided on whether a full-force phatbot attack will result in ruin or simply a ruinous headache.

"If there are indeed hundreds of thousands of computers infected with Phatbot, U.S. e-commerce is in serious threat of being massively attacked by whoever owns these networks," said Russ Cooper, a chief scientist at Herndon, Va.-based TruSecure Corp.

There are several incidents in the past several years that show how hackers used multiple ensnared computers to cause damage. In February 2000, a Canadian juvenile commandeered high-speed computers at University of California, Santa Barbara to knock Amazon, eBay, CNN.com, and a host of other Web sites off-line for hours. In October 2002, hackers used an army of commandeered computers to assault the 13 root servers that serve as the roadmap for Internet traffic.

But Lurhq's Stewart said his analysis of Phatbot indicates that the Trojan is designed to link computers into groups no larger than 50 computers, which would significantly limit the Trojan's effectiveness as a denial-of-service tool.

As a result, he said, Phatbot-infected PCs will more likely be used as highly effective spamming machines.
http://www.washingtonpost.com/wp-dyn...2004Mar17.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Man Sues Distributor Of Kazaa File-Sharing Software Over Program Rights
Alex Veiga

A native of Romania who claims to have written the source code to the popular file-sharing software Kazaa is suing the program's distributor over the rights to the software and asking for $25 million in compensation.

Kazaa Media Desktop, which enables users to connect online over a so-called peer-to-peer network, is used by millions to swap music, movies, software and other files. The practice has drawn the ire of Hollywood film studios, recording companies and other copyright holders.

In the federal lawsuit, Fabian Toader, who now lives in Redmond, Wa., claims he wrote the computer code for the Kazaa program in 2000 while working in Romania on a freelance basis for Kazaa B.V., which sold the rights to the software in 2002 to Sharman Networks Ltd.

Toader claims he never signed a contract with Kazaa B.V. and asserts that, under copyright laws in the United States and Romania, he is the copyright owner of the program, and not Sharman Networks.

Toader, now a programmer for Microsoft, seeks a judgment confirming his rights to the program and $25 million in damages.

"Sharman has made millions using my software," Toader said in a statement Tuesday. "My code has made KMD one of the most popular programs ever. I just want to be fairly compensated for my contribution."

The latest version of Kazaa has been downloaded more than 335 million times from Download.com since it was uploaded to the site on Nov. 19, and was ranked Monday as the top download on the Web site.

A spokesman for Sydney, Australia-based Sharman disputed Toader's assertion that he owns the rights to the program.

"The work done by Fabian Toader on early versions of the Kazaa Media Desktop software was done under a work for hire agreement that expressly states that Kazaa B.V. owned all rights to any work related to the development of the software," said Rich Chernela, a Sharman spokesman.

The lawsuit, which was filed March 4 in Los Angeles, is only the latest volley of litigation between Toader and Sharman in recent months.

In August, Sharman sued Toader in Washington State Superior Court, alleging he tried to blackmail the company. The court granted Sharman an injunction against him, Chernela said.

"Sharman regards this recently filed Los Angeles law suit as nothing more than Mr. Toader's most recent shakedown effort," Chernela said.

Toader countersued later that month in federal court in Seattle, then opted to dismiss the case without prejudice in February and refiled it in Los Angeles, said attorney Marc Fenster.

Sharman has been the target of lawsuits and from entertainment companies bent on shutting down its operation, and file-sharing in general, which they say has resulted in millions in lost sales.

A federal case brought by the entertainment firms against Sharman in Los Angeles is pending the outcome of a decision by the 9th U.S. Circuit Court of Appeals on a ruling that cleared two other companies of liability for the unauthorized sharing of files by users of their software.

In February, investigators with the Australian recording industry raided the company's offices in Sydney and two executives' homes looking for evidence to support a copyright infringement case.

In December, the Dutch Supreme Court ruled that Kazaa's Netherlands division cannot be held liable for copyright infringement of music or movies swapped using its free software.
http://www.miami.com/mld/miamiherald...al/8202798.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ILN News Letter

Norwegian Court Acquits Napster.no Owner

A Norwegian appellate court has acquitted the proprietor of Napster.no. The court ruled that the site merely provided links to music and that the copyright infringement occurred by the uploading of the music, not through the provision of links. Norwegian coverage at http://www.digi.no/php/art.php?id=100878&utskrift=1

Site synopsis: A student (Frank Bruvik) who had run the website www.napster.no and who had earlier been ordered to pay 100.000 Norwegian crowns in a lower court was released in a higher court where he had taken the case. Mr. Bruvik is very glad over the result. (thanks to tankgirl for the translation – jack.)

Canadian Senate Committee Removes Copyright Extension Provision

As expected, a Canadian Senate committee considering Bill 8 - once described as the Lucy Maud Montgomery Copyright Term Extension Act for its effect on the term of copyright accorded to certain unpublished works, has removed the copyright term extension provisions. The works came into the public domain on January 1, 2004. Report at <http://www.parl.gc.ca/37/3/parlbus/c...p03mar04-e.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Telus, Shaw blast CRIA Over Song-Theft Fight
Keith Damsell

Toronto — Telus Corp. and Shaw Communications Inc. have attacked the music industry's bid to identify people it claims illegally distributed music via the Internet, arguing there's limited technical know-how and no evidence to support the pursuit of the alleged song swappers.

"This is a complicated and imperfect process at best," Telus lawyer Joel Watson told the Federal Court of Canada yesterday. "They want the identity of the user ..... the technology doesn't permit that."

The Canadian Recording Industry Association wants the court to order Telus and Shaw, along with BCE Inc., Rogers Communications Inc. and Vidéotron Ltéeto hand over the identities of 29 so-called uploaders, Internet users who they allege posted hundreds of songs illegally on the Web. The industry claims song theft via the Internet is responsible for the sector's woes, including retail sales losses in Canada of more than $425-million since 1999.

The music industry claims three Telus customers infringed copyright laws when, under user names sweetydee11, fighting scurvy and jd, they posted thousands of songs on popular music sharing service Kazaa. Each user name is linked to a specific Internet protocol number that provides an on- ramp to the Internet. IP numbers are assigned to specific Internet service providers.

But tying an IP address to a computer user is near impossible, Mr. Watson said. IP addresses are dynamic and float from customer to customer as on-line sessions begin and end, he said.

"We don't have the key to the user," Mr. Watson told the court. "The information is not in a filing cabinet in Vancouver or Edmonton ..... what they're asking for we can't give."

But lawyers representing CRIA said it is possible to track down a user via an IP address. BCE has found all seven of its alleged uploading customers CRIA is targeting while Rogers has successfully contacted seven of nine accused song swappers.

"ISPs are the only practical source of the information," said CRIA lawyer Bruce Stratton. "It's not a technical impossibility, it's a case of looking at what they have."

Charles Scott, a lawyer representing Calgary-based Shaw, said CRIA's allegations rest on "crucial" evidence supplied by MediaSentry Inc. The New York-based Internet watchdog tracked Kazaa's traffic and provided hundreds of pages of data to CRIA. The evidence is filed under the name of Gary Millin, president of MediaSentry.

In earlier cross examination, Mr. Millin disclosed that the research was done by operational staff and he had no direct knowledge of the song files themselves, Mr. Scott said.

Mr. Millin "never listened to any of the files. That was somebody else's job. We don't even know where this information came from," Mr. Scott said, concluding that MediaSentry's data rests on "a number of frailties" and should be dismissed.

Mr. Scott alleged CRIA's case was a "fishing expedition" aimed at pursuing high-profile settlements and raising the profile of the song-theft issue.

MediaSentry's research is "direct evidence, reliable evidence" that supports the music industry's case, said CRIA's Mr. Stratton. He added that the act of putting a music file in a shared on-line directory "sanctions, permits and encourages" unlawful distribution and copyright infringement.
http://www.theglobeandmail.com/servl...tory/Business/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Arguments Wrap Up In Music File-Sharing Case

TORONTO — The record industry's attempts to sue people who share music with others online threaten to change the widely held expectation that everyone's anonymous when surfing the Internet, lawyers representing the public interest argued Monday.

A ruling in favour of the Canadian Recording Industry Association would mean the loss of anonymity of anything shared using peer-to- peer software, including photos and text, for the 29 people named in the civil action, said Alex Cameron.

Cameron is representing the Canadian Internet Policy and Public Interest Clinic in the Federal Court case pitting the recording-industry association against high- speed Internet service providers.

"(The) effect of the order would be to strip away anonymity," said Cameron. "Those documents were shared on the assumption the sharing was done anonymously ...(if order is granted) people will perceive that online activities are no longer anonymous."

The recording industry took its first step towards lawsuits against so-called uploaders in early February. It filed a statement of claim against 29 unnamed people who allegedly shared songs with others using programs like KaZaA and iMesh.

But before it can recoup cash from the alleged copyright infringers, the association has to figure out the identities of the 29 people, currently known only by pseudonyms used online such as barracuda_ben, geekboy and sweetydee11.

It's hoped the courts will force Internet service providers Bell Canada, Shaw Communications, Rogers Communications, Videotron and Telus Corp. to translate those nicknames into real names and addresses.

Lawyers for the association have argued that contract agreements between individuals and their Internet service providers spell out instances where personal information may be disclosed.

But Howard Knopf, also of the Public Interest Clinic, accused the association of engaging in a "war against file sharing" searching for the "equivalent of weapons of mass distribution."

He said teenagers and parents without large sums of money to battle a team of lawyers will be forced to settle with the record industry out of monetary fears and limitations.

"These folks are civilians, not commercial pirates," said Knopf. "All defendants will have no practical choice but to settle with CRIA."

Knopf also argued that file sharing doesn't mean an individual is uploading songs with the intention of mass distribution. He continued to say programs like KaZaA allow people to download from each other, and since the Copyright Board has deemed downloading legal in Canada, there is little evidence the 29 John and Jane Does did anything wrong.

Arguments finished Monday. Justice Konrad von Finckenstein is expected to rule by week's end.
http://www.ctv.ca/servlet/ArticleNew...=Entertainment


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Indies Head to Texas To-Do
Katie Dean

The annual South by Southwest Music Conference and Festival begins on Wednesday, bringing thousands of music lovers and independent musicians to Austin, Texas, for five days of live music. It's also the biggest confab of artists who aren't afraid of the Web or new technologies and are eager to meet the fans who support them.

There are dozens of music festivals around the country, like the New Orleans Jazz Fest, Chicago Blues Festival and the Strictly Bluegrass Concert in San Francisco. But South by Southwest, or SXSW, has a special following among artists and fans who are interested in shaping the future of the media industry. The bands and artists who appear at SXSW don't have Britney's marketing budget, so they turn to the Net to attract attention and find new fans. In essence, these artists and fans are vanguards.

The festival hosts 1,280 acts on 60 stages in downtown Austin. Over 7,000 musicians, managers, industry and media professionals register for South by Southwest and another 14,000 people buy tickets. A new band takes the stage nearly every hour from 8 p.m. to 2 a.m. for five days. Bands come from all ends of the musical spectrum, from alt country to bluegrass, electronic, metal, punk, rock and more.

"Indies used to harangue about their inability for independent labels to get on radio," said Andy Flynn, a panel coordinator for SXSW. "It was perceived as a bigger roadblock than it is these days. Now they can use the Web to reach their listeners."

"I think (file sharing) is absolutely wonderful. It's free publicity," said Keith Shepard, lead guitarist for Pilot Radio, a band out of Katy, Texas, that is returning to SXSW for the second time. "It's done more for the music industry than it has taken away."

Pilot Radio sells most of its CDs at its concerts. Internet sales, however, beat out sales from brick-and-mortar shops, Shepard said. The group is also selling tracks through BuyMusic.com and Audio Lunchbox.

Of course, musicians and fans are more apt to whoop it up than discuss business models.

"It's like a really big party, and I always see bands I've never heard of," said Mark Eitzel, a songwriter and singer for American Music Club, which recently re-formed after a 10-year break and is playing at this year's SXSW. "It's fucking great. There are 20 bands to see at one moment. It's like a candy store. I just want to survive with my liver intact."

Internet CD sales have helped American Music Club partially finance an upcoming album, which will likely be released in August. Though he loves creating and playing music, AMC's Eitzel has mixed feelings about how file sharing is affecting the music industry.

"We're back to the day now where musicians were in the 1920s, where they would never get credit for it and they'll never get paid for it," he said.

The industry is a far cry from the 1960s, Eitzel said, when artists could release four albums in one year and get paid, and when "what musicians said mattered."

"Now, (the music industry) is not about trusting artists or taking risks. I don't see a lot of people buying music to raise consciousness," Eitzel said. "I see people buying Celine Dion and 50 Cent records. People react more to marketing and mediocrity."

But others wholeheartedly embrace technology.

"It's mostly record companies who are frightened, not musicians," said Jamie Cullum, a musician from London who will perform at SXSW. "It makes us work harder and look after our fan base to inspire loyalty." He said real fans would support their favorite artists by buying albums, attending concerts and buying T-shirts. "I don't think there's anything wrong with sharing files."

In addition to music, the festival will host panel discussions on topics like the death of the record store and how to run successful independent record labels.
http://www.wired.com/news/digiwood/0,1412,62694,00.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

`Netizens' Go Too Far in Denouncing Impeachment
Byun Duk-kun

The National Election Commission (NEC) and the police on Tuesday vowed to punish Internet users going too far in slandering opposition party lawmakers for voting for the impeachment motion against President Roh Moo- hyun.

``We have secured a number of articles among those posted on the Internet to denounce the impeachment motion that may have violated the election law,’’ a police official was quoted as saying.

The NEC and the police are now trying to trace the original authors of the slanderous articles, according to the official.

The NEC based their decision on the premise that many Internet articles protesting the opposition-led impeachment of the president, such as the list of 193 opposition lawmakers who voted to oust President Roh, may be violating the election law, which prohibits pre- electioneering more than 17 days before an election day.

Still, the election commission and the police are having trouble locating the original writers of such articles, because a large number of Internet users simply copy the original article and then post it elsewhere.

The police said such an act of `reposting’ a slanderous article may also be subject to punishment according to the election law.

The only problem is that there are just too many.

Tens of thousands of people, online and offline, protested the National Assembly’s passage of the nation’s first impeachment motion filed against the president by the main opposition Grand National Party (GNP) and the minor opposition Millennium Democratic Party (MDP).

Opposition lawmakers have been subject to excessive slandering and even death threats by angry citizens and pro-Roh supporters.

Thousands of articles also filled major Internet sites such as Daum, Naver and Yahoo to denounce the opposition party lawmakers and their passage of the impeachment.

The NEC said such articles may also constitute a violation of the election law, as well as the criminal law, because they may be viewed as a blackballing movement against specific lawmakers and candidates in the April 15 National Assembly elections.

Writers of such articles may also be subject to libel suits, because their articles include slanderous accusations against the lawmakers without any proof, according to the police official.

The police also urged the people to use their computers more maturely and wisely.

One of the widespread articles against the opposition lawmakers on the Internet denounces the opposition lawmakers by depicting them as auction items, while providing the complete list of all 193 opposition lawmakers who voted to oust President Roh.

Some of the articles posted on some of the Internet cafes were mired in abusive language, while others were filled with more foul language and threats to ``kill’’ the opposition lawmakers and their leaders.

The entire or part of Internet homepages of opposition party leaders and lawmakers, including those of GNP chairman Choe Byung-yul, GNP floor leader Hong Sa-duk and the MDP chairman Chough Soon-hyung, were shut down shortly after the National Assembly endorsed the motion to impeach the president last Friday, and still remain closed due to thousands of angry netizens posting threat notes and protesting articles.
http://times.hankooki.com/lpage/nati...9080411990.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Sony To Deliver Personalized Radio Service To Mobile Phones
AP

Sony Corp. announced what it called the first "personalized radio" service for mobile phones.

Under the still-unnamed music streaming service, subscribers would not own any of the songs but could create a
customized channel to listen to the music they want, storing favorite tunes in personal playlists. Users would also be able to listen to music from a collection of predefined channels.

A "smart personalization" feature could also keep track of the subscriber's music preferences and make song suggestions.

Some mobile phone operators already offer music streaming services, but Sony said it is the first to let consumers tailor the music to their own tastes.

The service, introduced at the CeBIT electronics trade show in Hanover, Germany, will be first available in the second quarter in Finland for TeliaSonera mobile phone customers. Sony said the service will later expand across Europe with other mobile operators.

Sony officials were not immediately available to discuss whether the service would eventually be introduced in the United States or elsewhere.

Prices for the service were not disclosed.
http://www.alwayson-network.com/comm...d=3333_0_7_0_C

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

MP3 Phone Patent Dispute Deepens
Kim Tae-gyu

The copyright row over MP3 phones is showing no signs of letting up as cell phone makers and the music industry continue to debate the legality of playing music files through handsets.

LG Electronics, the world's fifth-largest cell phone maker, last week started selling its LP3000 model, an MP3 phone that can save 16 music files at a time.

The local music industry, which has suffered setbacks of late due to piracy mainly in the form of song swapping over the Internet, responded by expressing strong concerns at free music files being played on the phones.

The Korea Association of Phonogram Producers (KAPP) claimed the rollout is against copyright law and said it will seek to block sales of the LP3000.

The organization of the music producers also stopped providing any phonograms to the LG-made MP3 phones starting March 12.

LG Electronics countered that it has incorporated digital rights management (DRM), solutions devised to prevent illegal play of music files, into the LP3000 phones.

However, the KAPP claimed that already back-door programs enabling free play of music files via the LP3000 are available on the Internet.

``It is LG's strategy to help its sister company LG Telecom, the smallest mobile operator, to gain ground in the local market,'' a KAPP official said.

The government stepped in to settle the dispute but mediation efforts headed by related ministers fell apart without tangible outcomes on March 12.

The Ministry of Information and Communication brought together cell phone makers and music industry officials again on Wednesday along with the Ministry of Culture and Tourism.

However, LG and the music industry failed to find middle ground regarding the already-sold phones, and disputes are likely to expand as other MP3 phones hit the market.

Following LG, the world's third-biggest cell phone maker Samsung Electronics also plans to release a similar phone within this month.
http://times.hankooki.com/lpage/tech...9131911810.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

EU Plans Safer Net For Children
BBC

European Union officials are proposing to spend more than £30m to try to make the internet safer for children.

The four-year plan has been put forward by the European Commission.

The program, which needs to be approved by the EU governments comes at a time of growing concern over the potential dangers to children online.

"Children should have the right to use the internet freely, to chat, to learn or to play games," said Information Society Commissioner Erkki Liikanen.

"But to move freely online, children must be protected from risks of being exploited or cheated by adults."

United front

The commission said there was a disturbing gap between what children did online and what their parents thought they were doing.

It said that several surveys had shown that European parents were seriously underestimating their children's daily exposure to harmful content and dangerous situations online.

A recent study by Cyberspace Research Unit at the University of Central Lancashire found that children were still arranging face-to-face meetings with people they talk to online despite warnings about the dangers of internet chatrooms.

And the study showed that 60% of children did not know that people they chat to online might not be who they say they are.

To counter the problem, the commission urged EU states to join forces and raise awareness about harmful content online.

It proposed to fund development of effective net filters and promote their use among parents to prevent pornographic material reaching children.

The commission also suggested the EU pay for telephone hotlines so that people could report suspect sites targeted at children.

The 50m euro Safer Internet plus programme would launch next year and run until 2008.
http://news.bbc.co.uk/2/hi/technology/3506478.stm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Apple's iTunes Sales Hit 50 Million
Ina Fried

Apple Computer said Monday that it has sold 50 million songs through its iTunes Music Store, with about 2.5 million songs being downloaded each week.

Apple said the sales figure excludes the number of songs downloaded through a promotion with Pepsi, in which 100 million songs are being given away. It has been reported that the specially marked Pepsi bottles that contain iTunes codes have been slow to reach store shelves in some areas. Customers have also found a way to determine which bottles are winners, by tilting the bottles at a particular angle.

Apple CEO Steve Jobs announced a goal of distributing 100 million songs by April--including those given away in the Pepsi promotion--when the company expanded the iTunes store in October to work with Windows-based computers. Apple reiterated the goal in December, when it announced that it had sold 25 million songs by that point.

In its announcement Monday, Apple did note that iTunes users are now downloading 2.5 million songs per week, which means that the company is now selling songs at a rate of 130 million per year.

"With over 50 million songs already downloaded and an additional 2.5 million songs being downloaded every week, it's increasingly difficult to imagine others ever catching up with iTunes," Jobs said in a statement.

In an interview Monday, Apple Vice President Rob Schoeben focused on the fact that Apple continues to hold a substantial lead in the music download market, despite the increased competition.

"People were predicting we were going to be in a horse race against all these scary competitors," Schoeben said. "This doesn't feel like a horse race. From our perspective, we are the dominant leader in that market."

Apple also noted that the rate of sales is increasing, now at about 2.5 million songs per week, up from a rate of 1.5 million downloads per week in December. The company was selling about 500,000 songs per week in September, when the service was still Mac-only.

As for the goal, Schoeben said it was hard for Apple to know the pace at which the market would develop and that the company has had to learn through experience about how quickly (and how many) songs would be redeemed through a promotion like the one with Pepsi. He declined to say how many songs have been redeemed from the promotion.

Despite being the leader in online music stores, Apple does face increasing competition from existing stores such as Roxio's Napster and MusicMatch, as well as a host of others looking to join the fray, including Microsoft and Virgin.

Meanwhile, Roxio said Monday that strong demand for Napster was leading the company to raise its sales forecast. The company said it now expects revenue for its Napster division to increase to about $5.5 million for the three months ending March 31. That compares with $3.6 million in the preceding quarter.

In February, Roxio said it had sold 5 million downloads, a fraction of Apple's tally.

Schoeben noted that Napster is finding a profitable niche in selling music subscriptions but that it's not grabbing a significant share of the download market.

"Subscriptions are a place they can hide and get a comfortable niche," he said. "Their ability to sell music has not borne out."
http://news.com.com/2100-1027-5173115.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

European Regulators Back Proposed Microsoft Ruling
Paul Meller

European antitrust regulators are united behind Mario Monti, their top antitrust official, on his proposed finding that Microsoft has abused its dominant position in the software market, the European Commission said Monday.

Barring an 11th-hour settlement, the commission, the year-round administrative arm of the European Union, will rule as soon as March 24 that Microsoft is an abusive monopolist and will order the company to change the way it sells its software in its 15 member nations.

The essential elements of the proposal, though officially secret, have been widely leaked in the last two weeks. The commission is expected to demand that Microsoft sell two versions of its Windows operating system to personal computer makers, one with the Media Player function embedded as it is now and the other with Media Player stripped out.

It is also expected to order the company to disclose enough Windows code to rivals so they can design software that works smoothly with Windows. That provision is intended to restore competition in the market for server software. Servers link personal computers into networks.

Competition lawyers in Brussels speculate that Microsoft may agree to settle only the part of the case that concerns interoperability, while choosing to appeal a ruling against the bundling of Media Player to the European courts.
http://www.nytimes.com/2004/03/16/bu...ss/16soft.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Controversy over Project Gutenberg 2
posted by Jonathan

David Rothman writes in TeleRead of a new web venture called Project Gutenberg 2, offering access to ebooks in Adobe format on a paid membership basis. Some Gutenberg volunteers are concerned about the use of the PG name in such a context. "Over the weekend a Project Gutenberg volunteer list was buzzing with all kinds of questions for PG founder Michael Hart, who personally owns the Project Gutenberg trademark." For Rothman and others, the news raises questions about PG's ongoing commitment to the ideals of free distribution and nonproprietary formats.
http://www.lisnews.com/article.pl?sid=04/03/16/1018212


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Lessig: IP Protection A Business, Not Cultural, Battleground
Chris Preimesberger

Stanford University law professor, author, and Creative Commons chairman Lawrence Lessig Tuesday sharpened the definition of the ongoing legal struggle to satisfy both proprietary and open source advocates through equitable intellectual property regulations. "Contrary to what many people see as a cultural war between conservative business types and liberal independents, this is not a 'commerce versus anything' conflict. It's about powerful (business) interests and if they can stop new innovators," Lessig said.

Lessig, one of the most outspoken and articulate scholars in the legalities of open source and intellectual property, was the keynote speaker on the opening day of the Genus Group's first Open Source Business Conference at the Westin St. Francis on Union Square. The conference, which concludes Wednesday and was organized by Novell's Matt Asay, is well attended and stocked with some of the most knowledgeable experts in the business of open source software.

Lessig, who spoke on "The Creator's Dilemma: Open Source, Open Society, Open Innovation," noted that U.S. intellectual property and copyright laws were first recorded in the 19th century, and that even rules written in the late 20th century are already out of step with the needs of today's connected business world. "These laws require permission up front to use others' ideas for inspiration. Opportunities are being threatened by the mix and remix of culture," Lessig said.

Technology finds that it must fit itself to conform to last century's laws, rather than the laws fitting themselves to the technology, he said.

"These laws have become an insane and unintended burden on creators, because nobody had conceived of the Internet at the time, which has changed everything," he said. "Nobody had any idea of the new business opportunities and new businesses that were to be created by the Internet. This is why we need real reform now in intellectual property protection. Unfortunately, I don't see anybody taking the lead in Washington to do anything about this."
http://trends.newsforge.com/trends/0...id=137&tid=147


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Toyota Joins Japan's Robot Technology Race With Trumpet-Playing Humanoid



AFP Photo


TOKYO (AFP) - Japan's top carmaker Toyota unveiled a trumpet-playing robot -- its first humanoid machine -- in a bid to catch up with robot technology frontrunners such as Honda and Sony.

Toyota Motor Corp. (news - web sites) showed off its walking and rolling virtuoso robots to the media at a Tokyo hotel as it announced the outline of its robot development project.

The 120-centimeter (48-inch) tall robot played "When you wish upon a star" with a trumpet as a presenter held a microphone up to the instrument, swaying naturally to the rhythm of the famous song from the Disney cartoon film Pinocchio.

The robot, with what appeared to be an artificial green leaf stuck behind its left 'ear', bowed to the audience and waved its arms to respond to applause following the brief performance.

The 35 kilogram (77 pound) as yet unnamed robot has artificial lips which can alter their position as subtly as human lips as air is forced through them, enabling it to play a trumpet as it presses the stops with its hands.

"We are determined to drive forward the Toyota Partner Robot project by putting together what we have cultivated in automotive development and production," Toyota president Fujio Cho told the news conference.

"I'm confident that this will be a symbol of Toyota Group's technology," Cho said.

Toyota plans to form a "robot band" to play music at the 2005 World Exposition at the carmaker's base in Aichi, central Japan, the president said.

Among its partners in the project are Japanese computer giant NEC Corp. and micro-motor maker Yasukawa Electric Corp., a Toyota official said, adding the company has no concrete plans to commercialise the project.

Toyota started humanoid robot development two and a half years ago, Cho said without mentioning costs.

The robot development race is highly competitive in Japan, the world's leader in the technology.

In 2000, its rival Honda Motor Co. (news - web sites) Ltd. unveiled ASIMO, the world's first two-legged walking robot, and Sony Corp (NYSE:SNE - news) (news - web sites). revealed its QRIO, the world's first jogging robot, in December.

Earlier this week QRIO appeared for a photo opportunity conducting the Tokyo Phiharmonic Orchestra as it performed part of Beethoven's Fifth Symphony.
http://news.yahoo.com/news?tmpl=stor...5417&printer=1


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Disposable Computer
W. David Gardner

A disposable paperboard computer has been developed and is already in use in Sweden. Developed by Cypak AB, the paperboard computer can collect, process, and exchange several pages of encrypted data, the company says.

“Initially, it will be used in industrial-specific applications as an enhanced and secure RFID device,” said Cypak marketing director Strina Ehrensvard in an email. “Today, in pharmaceutical and courier packaging as a data-collection device; tomorrow maybe for interactive books, lotteries, passports, and voting cards.”

With just 32 Kbytes of memory, the paperboard computer's functionality is somewhat limited at present, but the firm believes its future will be broad. Cypak has entered into an agreement in the U.S. with MeadWestvaco Healthcare Packaging, which has marketing rights to the product and technology in the Americas.

Ehrensvard said the device is currently in use in a trial sponsored by a Swedish university involving compliance monitoring of pharmaceutical packaging. The trial tracks when a medicine tablet has been taken out of a package; it is then placed on a Cypak scanner connected to a PC on which the information can be viewed and stored. Ehrensvard said the paperboard computer is being considered in another healthcare application, as well: doctors would use it to help authenticate the administration of pharmaceuticals.

The Cypak product utilizes RFID technology that is based on printable sensors and electronic modules. The components are integrated on a variety of products, ranging from packaging and plastic cards to adhesives. In healthcare applications, Cypak says the paperboard computer time-stamps medicine dosages, which can be integrated with a patient's electronic diary. It can deliver sound reminders, too.

Cypak has also developed a companion device--a smart card with an integrated numerical keypad. The firm expects this to be used initially in applications demanding high security. By entering a unique PIN on a card, a user can connect to the Internet and exchange data. Cypak says the card's encryption can't be copied or broken, enabling it to deliver “military-class security.”

“The paperboard computer concept and the PIN-on-Card are the same core technology--components integrated in different products,” Ehrensvard said. “They exchange information to a PC with the same reader.”

Cypak offers the components on an OEM basis for about $1 each. The firm added that OEM components for its readers are available for approximately the same price in large volumes.

The firm has developed a tamper-proof package technology with the Swedish Postal Service. Called SecurePak, the packaging technology stores sender and receiver relevant data and alerts receivers of any possible package tampering before the package is opened.

Cypak will demo the products at the CeBIT 2004 exposition, in Hannover, Germany, later this month.
http://www.quickdesigns.nl/cgi-bin/p...B20040304S0005


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tempest in a trojan

Experts Downplay Phatbot Danger
Paul Roberts

Security experts downplayed the danger of a Trojan horse program named Phatbot that uses peer to peer (P-to-P) technology to create a network of infected zombies for carrying out attacks or spreading malicious code.

Antivirus experts at two security companies said that Phatbot was a low level threat, one day after a Washington Post report warned of hundreds of thousands of infections from the program and cited an alert issued by the U.S. Department of Homeland Security (DHS).

"I think there are a lot of people getting very excited about something that's not very important," said Graham Cluley, senior technology consultant at Sophos PLC.

The DHS did not respond to a request for comment on Phatbot.

Trojan horse is a term used to describe malicious computer programs that hide inside other, benign software or run surreptitiously on a computer. Trojans can give remote attackers access to the machines on which they run or receive and respond to remotely issued commands.

Phatbot spreads by infecting computers running vulnerable versions of Microsoft Corp.'s Windows operating system. Phatbot can spot machines with a number of high profile Windows holes, including the DCOM (Distributed Component Object Model) vulnerability that spawned the Blaster worm. It can also find and infect machines that have an open "back door" created by the MyDoom worm, according to managed security services company Lurhq Corp.

When installed on infected machines, the Phatbot Trojan joins a P-to-P network similar to Kazaa or Gnutella. The network uses a specially developed communications protocol that allows infected computers to identify and communicate with each other, transmit commands and share infected files, said Joe Stewart, a senior security researcher at Lurhq.

The Phatbot software supports a long list of commands that can be used by remote attackers to cause infected machines to launch a denial of service attack, scan the Internet for vulnerable Windows computers to infect or update their Phatbot software. Phatbot-infected systems find each other using the same servers that clients running the Gnutella P-to-P software use, but use a different communications protocol and listen on a different communications port, which keeps them separate from the Gnutella clients, he said.

The remote control aspect of Phatbot makes it very similar to so-called "IRC bots," that use Internet Relay Chat software and servers to communicate, he said. However, unlike IRC bots, the Phatbot software does not rely on IRC servers to communicate with each other and coordinate their efforts, Stewart said.

"It gives [the Phatbot authors] the ability to be a little bit more discreet, because they don't have to connect to an IRC server where an administrator could notice and shut down their channel," he said.

In fact, Phatbot is just the latest generation of a long line of IRC bots known as "Agobot," or "Gaobot," Sophos and Lurhq said. "We've seen hundreds of versions of [Agobot] over the past few weeks," Cluley said, noting that Sophos, which assigns a letter to each new variant, recently identified Agobot "FG."

"That means we've been around the alphabet five times!" he said.

The Trojans, including P-to-P Trojans like Phatbot, are a nuisance and a threat to users running vulnerable versions of Windows, but are not a new threat, Cluley and Stewart agreed.

Contrary to reports of hundreds of thousands of infected hosts, Sophos has received only two or three reports from customers about Phatbot infections. Stewart said that he has joined the Phatbot network using an infected host and saw "around 1,000" infected hosts on the network in one hour. "It really wasn't a big deal. I'm surprised there's been so much attention to it," he said.

Regular operating system patching, antivirus updates and firewall software will prevent infections from Phatbot and similar threats, Cluley and Stewart said.
http://www.computerworld.com/securit...,91365,00.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Oink!!

Keyboards 'Dirtier Than Toilets'
AFP

Keyboards, computer mice and telephone dials are more infested with microbes than toilet seats, according to United States researchers.

The University of Arizona study recommends that office workstations be regularly disinfected since they can on average contain 400 times as many germs as a toilet seat.

The study by Charles Gerba, a University of Arizona microbiologist, found that telephones harboured up to 3,894 germs per square centimetre, keyboards 511 and computer mice 260.

The average office contains 3,249 germs per square centimetre.

"Desks are really bacteria cafeterias," he said.

"They are breakfast bars, lunch tables and everything else, as we spend more hours at the office.

"When someone is infected with a cold or flu bug, the surfaces they touch during the day become germ transfer points because some cold and flu viruses can survive on surfaces for up to 72 hours - an office can become an incubator."

US health officials last month warned about the dissemination of germs during the flu season.

Officials reminded Americans to cover their nose and mouth while sneezing, wash their hands regularly and use disinfectant swabs to clean their office desks.
http://www.abc.net.au/cgi-bin/common...s/s1064322.htm
















Until next week,

- js.














~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Current Week In Review





Recent WiRs -

March 13th, March 6th, February 28th, February 21st, February 14th

Jack Spratt's Week In Review is published every Friday. Please submit letters, articles, and press releases in plain text English to jackspratts (at) lycos (dot) com. Include contact info. Submission deadlines are Wednesdays @ 1700 UTC.
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 12:03 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)