P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 09-02-06, 03:01 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default Peer-To-Peer News - The Week In Review - February 11th, ’06



































"This demonstrates that he either doesn't have a clue what he's talking about, or that he's simply inventing evidence and switching to Limewire after we totally destroyed him on the Kazaa stuff." – Zi Mei


"Frankly, we'll probably be wrong 99 percent of the time." – James W. Pennebaker


"In a technical sense he's calibrating his servos, but we like to call it stretching." – Caleb Chung


"This most recent decision is consistent with the definitive decision of the French Appellate Court of Montpellier. It is an important stepping stone in our fight to legalize P2P." – Jean-Baptiste Soufron


"It was the first time I ever smelled pot and I knew I wanted to be a musician." – Sheryl Crow





































February 11th, ’06





Say sea bone!

French Judge Authorizes Downloading And Uploading Of Copyrighted Content On The Internet
Aziz Ridouan

Paris, France – An Internet user defended by the Association of Audionautes (ADA) was released free of charges by the District Court of Paris after downloading and uploading music and movies on the Internet.

The decision, dated December 8, 2005 and made public this week, is available online at: http://www.audionautes.net/pages/PDF...estgiparis.pdf [fr]

Several Internet users defended by the ADA have already been released free of charges for having downloaded copyrighted content on Internet on the basis of the "private copying" doctrine:

- Rodez Tribunal Correctionnel, October 13, 2004: Absolved of charges
- Châteauroux Tribunal de Grande Instance, December 15, 2004: No damages
- Montpellier Cour d'Appel, March 10, 2005: Absolved of charges
- Meaux Tribunal Correctionnel, April 21, 2005: Downloading qualified as private copying, 70 cents / title for uploading
- Le Havre Tribunal Grande Instance, September 20, 2005: Same as above, but 20 cents / title for uploading
- Créteil Tribunal de Grande Instance, November 2, 2005: Absolved of charges for downloading as well as uploading using eMule

But this decision is the first one to authorize both the downloading and uploading of P2P content for Internet users. On September 21, 2004, the prosecutor's office found 1875 MP3 and DIVX files on the defendant's hard drive. Based on this discovery, a French record producer association known as the SCPP (Société Civile des Producteurs Phonographiques) sued him for downloading and uploading 1212 music tracks.

The District Court of Paris, however, refused to agree with the SCPP's argument. Following the line of reasoning utilized by the ADA for nearly two years, the Judges decided that these acts of downloading and uploading qualified as “private copying.”

While the case has been appealed to a higher court, Aziz Ridouan, President of the ADA approves of the current verdict and is confident that it will be affirmed. According to Jean-Baptiste Soufron, Legal Counsel of the ADA, "This most recent decision is consistent with the definitive decision of the French Appellate Court of Montpellier. It is an important stepping stone in our fight to legalize P2P." France was the first country in the world to propose the legalization of P2P downloading to Parliament.
http://www.audionautes.net/blog/inde...n-the-internet





P2P File Sharing Is On The Rise
p2pnet

The desperate Big Four Organized Music Goliaths say their p2p file scaring tactics are either significantly reducing the numbers of people using the p2p networks, or the numbers are static.

Depends on if you're talking to the RIAA (Recording Industry Association of America - Down) or IFPI (International Federation of the Phonographic Industries - Static), both owned by the Big Four, Warner Music, Vivendi Universal, EMI and Sony BMG.

However, the real story is: the numbers of file sharers in the US and around the world continues to rise, says p2p research firm Big Champagne.
http://www.p2pnet.net/story/7851





Inquiry Set For French File-Sharing Plan

The French government is moving ahead with plans for a controversial law that would legalize file-sharing of music and films, a move that could undo years of antipiracy work by the entertainment industry.

France's Culture Minister Renaud Donnedieu de Vabres is set to be questioned about the draft on Wednesday by the parliamentary commission for cultural affairs and the commission for economic affairs.

The project has worried the music, film and television industries because it would make France the first country to allow unlimited peer-to-peer downloading for a flat fee of several euros a month.

File-sharing lets consumers swap songs and movies without paying for them. Some legalized versions of peer-to-peer networks are starting to crop up, including one expected to be launched soon in Germany by Warner Bros.

"We are concerned and monitoring the situation closely," Francine Cunningham, a spokeswoman for the International Federation of the Phonographic Industry music trade group said on Friday. "But it has a long way to go before it becomes law."

The draft law, which originally aimed to tackle online piracy, is backed by consumer groups in France but heavily opposed by such companies as Vivendi Universal, which owns Universal Music, the world's biggest record company, and a stake in film and TV company NBC Universal.

French cinema and music trading associations together with rock stars such as Johnny Hallyday have spoken out against the law, arguing it would kill their work.

In December, the French government put forward a measure that aimed to clamp down on users sharing pirated material over the Internet by introducing stiffer punishments such as fines of up to 300,000 euros ($362,200) and prison sentences of up to three years.

But deputies, both from the ruling conservatives and the opposition Socialists, threw the planned law off course at the end of December by adding amendments that would legalize file-sharing in exchange for a fee to cover a licensing charge.

"Everything we're hearing from the government is that it won't happen," said Geraldine Moloney, a spokeswoman for the Motion Picture Association in Europe.

"If it did, it would have an impact on the film community worldwide, but the whole industry is mobilized against it," she added.

Some legal experts have said the amended draft law, which calls for a "compulsory license" or "global license" could violate European Union intellectual property laws.

"The 'compulsory license' would replace the fast-growing legitimate online market in France by an 'average' payment which would by no means remunerate the creation of music and investments made by the recording industry," the International Federation of the Phonographic Industry said.
http://news.com.com/2100-1025_3-6034897.html





Songbird, the "Open Source iTunes Killer," Flies Today

A team led by ex-Winamp-er Rob Lord today released a preview edition of Songbird, a desktop media player that offers an open source alternative to services like Apple's iTunes and the Windows Media Player. Instead of connecting to one locked store full of DRMmed goods, it can connect to any and all available music (and video) on the internet.

Code brains behind the project include people who helped build Winamp, Muse, Yahoo's "Y! Music Engine" media player, and developers from Mozilla Foundation. Initial release is for Windows only, with editions for other OSes to follow in the coming weeks.

Built on the same platform as Firefox, Songbird acts like a specialized web browser for music. It sees the online world through MP3-colored glasses -- it looks at an archive of public domain sound files or a music store's catalog, and displays available media for you.

I spoke with Rob Lord earlier today by phone about the preview release. Screenshots and interview after the jump.

BB: So why did you guys build this?
RL: People should have more choice about music and video formats, and where they get their music. Imagine what your experience of the web wold be like if IE connected only to microsoft.com. That's what digital networked media players are like today. Fairplay [Ed. Note: Apple's proprietary DRM] is the 8-track of our generation, and those formats may become obsolete a lot sooner than people using those services realize. Songbird can connect to any a la carte media store -- downloadable music, radio, video, P2P networks, and classes of services that haven't been created yet. Services like iTunes -- where everybody has to shop from the same store -- are like walled garden online services back in the early days. AOL, Prodigy. That's how we connected to the 'net then. Songbird is to iTunes what the Firefox browser is to those old, limiting online services. It opens up the whole internet to you as a music browsing experience.

BB: Should the RIAA be worried about you?
RL: As we say in our FAQ, "We don't steal music and you shouldn't either. We support DigitalConsumer.org's Bill of Rights as the best means to a burgeoning, diverse and lawful digital media market."

BB: Who funded the project, and how will you make money in the future?
RL: I provided the funding. I think we're going to put a "donate" button on the site. And we're going to sell t-shirts, and maybe some songbird-shaped fuzzy holders for digital music players.

BB: Apart from the ability to connect to lots of different sources, what will Songbird do differently?
RL: The opportunity to innovate is stymied by architecture. All of the popular media players out there have pretty much the same feature set on the desktop -- when you leave aside what's possible when you connect to the internet, they all do pretty much the same thing these days. Rip, mix, burn, play, organize playlists. But plug them in to the internet, and there's so much more they could be doing. The possibilities for networked services are totally untapped. For instance, [Winamp co-creator] Justin Frankel created a collaborative jamming service, and you can't do that inside any commercial media player now. You'll be able to do those kinds of things inside Songbird.

BB: Why does the ability to obtain music from multiple stores or sources online matter?
RL: Why wouldn't you buy your bluegrass in one place and your trance music in another? Why shouldn't there be music communities like lastfm and others that focus on specific niches? Even if you could buy all your music in one place, like Wal-Mart, would you want to? Maybe the experience would be better if you could connect to lots of different places, and communities, and social networks.

BB: What's in it for those providers?
RL: It's an open format, so they can do deep integration into our player, and reach new audiences. We built Songbird on the Mozilla Foundation's XULRunner platform, which is also used by Firefox and the Thunderbird email client. Firefox is very widely used now, there are 400 extensions, everybody knows it's as much of a movement as a piece of software. The difference between the Firefox and Internet Explorer browsers is substantial, but it's nothing like the difference between iTunes or Windows Music and Songbird.

BB: Songbird's logo is a cute, rotund, whistling birdie -- but what's up with that puff of gas coming out of his posterior? Is your mascot farting?
RL: Sorry, bad reception (SSSHHCSRRGRRR CRACKLE)
http://www.boingboing.net/2006/02/08...e_open_so.html





Sloppy RIAA 'Investigation' Attacked
p2pnet

Did RIAA spokesman Jonathon Whitehead switch the names of two completely different p2p applications in a deliberate bid to fool a court hearing a p2p file sharing case?

The question is raised in an affidavit presented in the latest stage of Atlantic Recording v John Does 1-25.

The RIAA (Recording Industry Association of America) still claims the existence of metadata in shared folders is enough to prove copyright infringement took place, but the assertion has again been roundly attacked by programming expert Zi Mei.

"Whitehead shot himself in the foot with his latest declaration," Mei told p2pnet. "He asserts that all Does are Gnutella users, directly contradicting earlier testimony, which included pages of Kazaa screenshots.

"This demonstrates that he either doesn't have a clue what he's talking about, or that he's simply inventing evidence and switching to Limewire after we totally destroyed him on the Kazaa stuff, hoping no one would notice.

"It's obvious that Mr. Whitehead doesn't know Kazaa from a kazoo either, or he's simply pretending he doesn't. The RIAA's 'investigative' techniques are sloppy and harmful, to say the least."

After weeks of non-stop, principally voluntary, work to meet the February 7 deadline, Mei today submitted his second affidavit, revealing telling holes in RIAA spokesman Jonathon Whitehead's second set of assertions in Atlantic v. John Does 1-25, and also, "pointing out its inconsistencies with the first declaration, as well as its inconsistency with the way computers work, and with the way the internet works," says Recording Industry vs The People.

Zi recently appealed to p2pnet readers for help and he told us he was grateful for the input he subsequently received.

In his affidiavit, Mei wonders if Whitehead deliberately and knowingly switched the names of Kazaa and Limewire p2p, "in an attempt to mislead the Court and reconcile flaws in his earlier testimony".

If that was the case, says the programmer, "it casts clear doubt as to his integrity".

Whitehead, "betrays either confusion or ignorance of how decentralized P2P networks like FastTrack (Kazaa) and Gnutella (Limewire) actually work," he states.

"Moreover," he goes on later in the paper, "Mr. Whitehead still has not even attempted to explain the process through which the plaintiffs allegedly obtained the IP addresses allegedly associated with defendants."

Go here for a .pdf scan of Mei's paper. We'll try and bring you a text version in the near future.

Meanwhile, definitely stay tuned. When it concludes, this case will further damage the Big Four's steadily eroding credibility and have an enormous impact on future sue 'em all suits.
http://p2pnet.net/story/7850





Marie Lindor to Move for Summary Judgment
Ray Beckerman

Marie Lindor, a home health aide who has never bought, used, or even turned on a computer in her life, but was nevertheless sued by the RIAA in Brooklyn federal court for using an "online distribution system" to "download, distribute, and/or make available for distribution" plaintiff's music files, has requested a pre-motion conference in anticipation of making a summary judgment motion dismissing the complaint and awarding her attorneys fees under the Copyright Act.
http://recordingindustryvspeople.blo...r-summary.html





Torvalds Versus GPLv3 DRM Restrictions
Joe Barr

Linus Torvalds, father of the Linux kernel, has fleshed out his unhappiness with GPLv3 in three recent posts on the Linux Kernel Mailing List (LKML).

Torvalds previously stated that the kernel will remain under the licensing terms of GPLv2.

Yesterday, Tovalds offered his opinion as to where the battle over DRM should take place:
I would suggest that anybody who wants to fight DRM practices seriously look at the equivalent angle. If you create interesting content, you can forbid that _content_ to ever be encrypted or limited.

In other words, I personally think that the anti-DRM clause is much more sensible in the context of the Creative Commons licenses, than in software licenses. If you create valuable and useful content that other people want to be able to use (catchy tunes, funny animation, good icons), I would suggest you protect that _content_ by saying that it cannot be used in any content-protection schemes.

Afaik, all the Creative Commons licenses already require that you can't use technological measures to restrict the rights you give with the CC licenses. The "Share Alike" license in particular requires all work based on it to also be shared alike, ie it has the "GPL feel" to it.

If enough interesting content is licensed that way, DRM eventually becomes marginalized. Yes, it takes decades, but that's really no different at all from how the GPL works. The GPL has taken decades, and it hasn't "marginalized" commercial proprietary software yet, but it's gotten to the point where fewer people at least _worry_ about it.

As long as you expect Disney to feed your brain and just sit there on your couch, Disney & co will always be able to control the content you see. DRM is the smallest part of it - the crap we see and hear every day (regardless of any protection) is a much bigger issue.

The GPL already requires source code (ie non-protected content). So the GPL already _does_ have an anti-DRM clause as far as the _software_ is concerned. If you want to fight DRM on non-software fronts, you need to create non-software content, and fight it _there_.

I realize that programmers are bad at content creation. So many programmers feel that they can't fight DRM that way. Tough. Spread the word instead. Don't try to fight DRM the wrong way.

In a later post, Tovalds replied to Pierre Ossman, who suggested the GPL can currently be thwarted by DRM measures:
> The point is not only getting access to the source code, but also being able
> to change it. Being able to freely study the code is only half of the beauty
> of the GPL. The other half, being able to change it, can be very effectively
> stopped using DRM.

No it cannot.

Sure, DRM may mean that you can not _install_ or _run_ your changes on somebody else's hardware. But it in no way changes the fact that you got all the source code, and you can make changes (and use their changes) to it. That requirement has always been there, even with plain GPLv2. You have the source.

The difference? The hardware may only run signed kernels. The fact that the hardware is closed is a _hardware_ license issue. Not a software license issue. I'd suggest you take it up with your hardware vendor, and quite possibly just decide to not buy the hardware. Vote with your feet. Join the OpenCores groups. Make your own FPGA's.

And it's important to realize that signed kernels that you can't run in modified form under certain circumstances is not at all a bad idea in many cases.

For example, distributions signing the kernel modules (that are distributed under the GPL) that _they_ have compiled, and having their kernels either refuse to load them entirely (under a "secure policy") or marking the resulting kernel as "Tainted" (under a "less secure" policy) is a GOOD THING.

Notice how the current GPLv3 draft pretty clearly says that Red Hat would have to distribute their private keys so that anybody sign their own versions of the modules they recompile, in order to re-create their own versions of the signed binaries that Red Hat creates. That's INSANE.

Btw, what about signed RPM archives? How well do you think a secure auto-updater would work if it cannot trust digital signatures?

I think a lot of people may find that the GPLv3 "anti-DRM" measures aren't all that wonderful after all.

Because digital signatures and cryptography aren't just "bad DRM". They very much are "good security" too.

Babies and bathwater..

And finally, in yet another response to Ossman and others on the LKML, he wrote:
> So taking open software and closed hardware and combining it into something
> that I cannot modify is ok by you?

But you CAN modify the software part of it. You can run it on other hardware.

It boils down to this: we wrote the software. That's the only part _I_ care about, and perhaps (at least to me) more importantly, because it's the only part we created, it's the only part that I feel we have a moral right to control.

I _literally_ feel that we do not - as software developers - have the moral right to enforce our rules on hardware manufacturers. We are not crusaders, trying to force people to bow to our superior God. We are trying to show others that co-operation and openness works better.

That's my standpoint, at least. Always has been. It's the reason I chose the GPL in the first place (and it's the exact same reason that I wrote the original Linux copyright license). I do _software_, and I license _software_.

And I realize that others don't always agree with me. That's fine. You don't have to. But I licensed my project under a license _I_ agreed with, which is the GPLv2. Others who feel differently can license under their own licenses. Including, very much, the GPLv3.

I'm not arguing against the GPLv3.

I'm arguing that the GPLv3 is wrong for _me_, and it's not the license I ever chose.
http://trends.newsforge.com/article..../02/02/1636216





Pants on fire

DRM Is A Complete Lie

It has never protected a single thing
Charlie Demerjian

DRM IS A LIE. When an agenda driven DRM infection peddler gets on a soapbox and blathers about how it is necessary to protect the BMW payments of a producer who leeches off the talented, rest assured, they are lying to you. DRM has absolutely nothing to do with protecting content, it is about protecting the wallets of major corporations. The funny thing is they aren't protecting it from you, they are protecting it from each other.

Let's look at the shattering success of every DRM solution to date. Every single one has failed. The score card is hundreds if not thousands against, zero for. Name me one song, movie or software title that is DRM infected that has not found it's way to the net within a week of release, usually long before release. There are none. To protect content, DRM is an abject and total failure, and will continue to be.

It also hurts the user - there is no DRM infection that in any way benefits the consumer. It costs more to develop, costs to license, makes hardware more expensive and complex, and screws the user under legitimate uses. It has a negative value to the consumer.

So, it makes content less attractive, less playable, and is legally dubious, so why is the industry hell bent on infecting everything from your prophylactics to your computers? Simple, they want a bigger slice of the pie, and DRM is the way to get it. No, not bigger profit margins, the greedy bastards already do that with each format change, DRM infections are about edging each other out.

Here is the problem, every DRM infection is unique, patented, copyrighted, copywronged, and DMCAd ad nauseum, They protect their code in every way possible, and make it so you have to get their approval to use it. This is all done under the guise of protecting content, but that is a lie. If you are going to steal content, do you think violating another copyright on the DRM mechanism will make you lose more sleep? Not a chance.

If you are a rival company though, you can't really violate such things and get away with it for long, Sony, MS and most people swiping GPLd code are proof of that. So, you have to license it to play ball, or at least play music and movies. That is the true nature of DRM infections, to keep other big greedy companies out.

So, say you are a big immoral record company that see walking wallets, aka customers, as not giving you enough of their hard earned money, some have the gall to buy from other big greedy immoral companies. Bastards! What do you do? Make sure they have a hard time playing things from the other guys.

Let's take a good example of this, the first few generations of Sony's DRM infected failures of an almost MP3 player. Sony decided that its proprietary ATRAC format was better than MP3, and technically it could be, but that is irrelevant. They didn't support MP3s out of the box, but would do a one way conversion if you wanted to put your MP3s on the Walkman. Taking them off was a bit curious though.

Also, if you wanted to buy music, you could go to the wonderful (sarcasm people, sarcasm) Sony connect store, and buy almost anything that Sony licensed artists made. If you wanted a song by a Warner artist, well, tough. Stepping into the land of make believe for a minute, imagine that Time-Warner made digital music players, and lets pretend they have an encoding system and DRM infection called HURT-SCAM. You can buy a TW player and download any HURT-SCAM song, curiously this meant only titles from a Warner artist. If you have a Sony player, it doesn't support HURT-SCAM, and TW players don't support ATRAC.

Now, if this hypothetical TW player wanted to play ATRAC, they could reverse engineer it, and get bitten by the same DMCA laws they bought so many Congresspeople to implement, and the same is true for Sony wanting to implement HURT-SCAM. (Please note, I am not intoning that these companies buy government, remember this is make believe. The US governmental system is immune to such things, just ask them.). Basically, both sides have to license their bitter rivals before they can interoperate.

Now, lets step back into the land of reality. You have ATRAC, FairPlay (har har), Real, WMA, and a host of other DRM infections, and none can play any of the others. If you have a player that can do one, chances are that it can't do any of the others, almost like the license terms preclude it, but it would take someone much more cynical than I to say that. You have enough walled gardens to last a lifetime, and each one is filled with greedy execs trying to wrap their mind around how much money this will bring them. The stakes are high, they each want it all, and want all the others to go away, there is no middle ground.

The enforcement mechanism is quite simply the DRM infection Without DRM, the other guys could invade their garden and do thing that might benefit the user, I mean take away the profits they feel are rightfully theirs. In the mean time every piece of media thus 'protected' is available for download. DRM has done, is doing and will do nothing to stop piracy.

Basically, you and I are the innocent bystanders in this drive by shooting called DRM. The big companies are at war, and we are the casualties. So, they have to send their flying monkeys to sue single moms, 12 year olds and octogenarians to make it appear that they are doing what they say. Bull, they are lying. The sad part is that the public, and worse yet, the governments are listening to them.

The misinformation campaign seems to have sunk in, people don't even question that DRM is about protecting content any more, even though it has never done so. It hurts the users, and hurts the companies making it, but they have their eyes on the big prize. DRM infections are the only way to keep their rivals at bay, lobbing a few bullets at the users is a low price to pay for that.
http://www.theinquirer.net/?article=29161





Libraries Fear Digital Lockdown
Ian Youngs

Libraries have warned that the rise of digital publishing may make it harder or even impossible to access items in their collections in the future.

Many publishers put restrictions on how digital books and journals can be used.

Such digital rights management (DRM) controls may block some legitimate uses, the British Library has said.

And there are fears that restricted works may not be safe for future generations if people can no longer unlock them when technology evolves.

The British Library spends £2m of its £16m annual acquisitions budget on digital material, mainly reference books and journals.

But by 2020, 90% of newly published work will be available digitally - twice the amount that is printed - according to British Library predictions published last year.

Libraries are allowed to give access to, copy and distribute items through "fair dealing" and "library privilege" clauses in copyright law.

But as publishers attempt to stop the public illegally sharing books and articles, the DRM they employ may not cater for libraries' legal uses.

"We have genuinely tried to maintain that balance between the public interest and respecting rights holders," Dr Clive Field, the British Library's director of scholarships and collections told the BBC News website.

"We are genuinely concerned that technology inadvertently may be disturbing that balance, and that would be unhelpful ultimately to the national interest."

The All Party Parliamentary Internet Group is conducting an inquiry into DRM.

In written evidence, the Libraries and Archives Copyright Alliance (Laca) said there were "widespread concerns in the library, archive and information community" about the potentially harmful effects of DRMs.

"We have grave concerns about the potential use of DRMs by rightholders to override existing copyright exceptions," its statement said.

In the long term, the restrictions would not expire when a work went out of copyright, it said, and it may be impossible to trace the rights holders by that time.

"It is probable that no key would still exist to unlock the DRMs," Laca said. "For libraries this is serious.

'Threaten'

"As custodians of human memory, a number would keep digital works in perpetuity and may need to be able to transfer them to other formats in order to preserve them and make the content fully accessible and usable once out of copyright."

In its written submission to the group, the British Library said DRM must not "exert excessive control on access to information".

"This will fundamentally threaten the longstanding and accepted concepts of fair dealing and library privilege and undermine, or even prevent, legitimate public good access."

Fair dealing and library privilege must be "re-interpreted and sustained for the digital age", it added.

Dr Field said: "This is going to be one of the significant challenges for us over the next few years."
http://news.bbc.co.uk/go/pr/fr/-/1/h...gy/4675280.stm





Spyware Tunnels In On Winamp Flaw
Joris Evers

A security bug in Winamp is being exploited by miscreants to install spyware on machines running the media player software, experts have warned.

Earlier this week, security companies warned that attack code for exploiting the flaw was circulating on the Internet. Last week, Sunbelt Software said it had found a Web site hosting a malicious Winamp playlist file. Opening the file loads spyware onto an unwitting user's PC, it said.

"After surfing to a malicious Web site on our test machines, the file 'x.pls' begins to download," Sunbelt's Adam Thomas wrote in a posting on the anti-spyware software maker's corporate blog. "Almost immediately, Winamp starts to execute the play list and remote code execution begins."

The flaw was disclosed on Monday, when Winamp maker Nullsoft, a division of America Online, released an update to fix it. The company posted version 5.13 of Winamp, while Secunia and other security companies issued alerts about the problem. Secunia rated the issue "extremely critical," its highest rating.

"Not following the recommendation from Nullsoft to upgrade to version 5.13 could result in the extremely nasty CWS Looking-For.Home Search Assistant infection as well as an installation of our good friend SpySheriff," Thomas wrote. Antivirus software is not yet detecting this exploit, he wrote.

Home Search Assistant might monitor a user's activity and send out confidential information to its creator, according to Sunbelt's threat database. SpySheriff will display a false warning that the computer is infected with spyware. It then tries to persuade the user to buy a SpySheriff product, according to Sunbelt.

Distributors of adware and spyware often exploit security vulnerabilities in programs to get their applications onto PCs. Makers of such software often pay distributors per installation of the adware or spyware.

The Winamp problem affects version 5.12 of the media player. Earlier versions may also be affected. Late last week, the malicious Web site referred to by Sunbelt, 008k.com, appeared to be offline. The site displayed a message: "Site is closed for abuses."
http://www.zdnetasia.com/news/securi...9310016,00.htm





Apple's In The Eye Of Flaw Finders
SecurityFocus

At the recent ShmooCon hacking conference, one security researcher found out the hard way that such venues can be hostile, when an unknown hacker took control of the researcher's computer, disabling the firewall and starting up a file server.

While such compromises have become common in the Windows world, this time the computer was am Apple PowerBook running the latest version of Mac OS X. The victim, a security researcher who asked to remain anonymous, had locked down the system prior to the conference and believes that a previously unknown exploit caused the compromise. However, in the following weeks, forensics performed on the system did not reveal any clues as to how the PowerBook had been compromised.

"The machine was as hardened as best practices could suggest for anyone," the researcher said. The person who breached the PowerBook used information gathered from the computer to contact a friend of the researcher and bragged about the compromise. "This was not a subtle hack," the researcher stressed.

The compromise underscores a number of trends that has already caused a shift in focus among flaw finders and could result in more attacks on Mac OS X (http://www.securityfocus.com/news/11321). Security researchers themselves have moved over to Apple computers in the past few years and have learned the ins and outs of the operating system. The company's move to Intel-based hardware for its next-generation of Macs also gives flaw finders familiar territory in which to look for bugs. Finally, as Apple continues to garner more market share, the lure of a larger set of targets will make attacks more likely, say security researchers.

"This is almost certainly the year of the OS X exploit," said Jay Beale, a senior security consultant for Intelguardians and an expert in hardening Linux and Mac OS X systems. "The OS X platform may be based on a Unix platform, but Apple seems to be making mistakes that Unix made, and corrected, long ago."

Apple also has been widely criticised for not talking (http://news.com.com/2100-1002_3-5225115.html) about the details of its vulnerability-response process or how it manages security incidents. While Microsoft has the lion's share of security problems - and the Mac OS X hardly any - the Redmond, Wash, based software giant has received high marks (http://www.securityfocus.com/news/11371) from security researchers for its responsiveness, while Apple has often been the focus of complaints (http://www.securityfocus.com/columnists/256).

"On a good day, Apple doesn't even make it to Microsoft's level of security awareness," Beale said.

The company has generally refused to discuss the security of its Mac OS X operating system with the media and declined to comment for this article. The security researcher whose PowerBook was compromised has discussed the issue with Apple but without any conclusions being reached.

Apple has made good decisions regarding the Mac OS X architecture and has had far fewer security problems as a result, said Adam Shostack, chief technology officer for security firm Reflective.

"There are some things that make the Mac more secure," Shostack said. "There is a user model that does not rely on a user running programs in administrator mode. There is no ActiveX in Safari and there is no ActiveX equivalent. That makes it harder to go to a web page and have your Mac compromised."

Yet, the platform is garnering more attention from the experts who search for vulnerabilities. Driven by the cool look of the Mac OS X and the ability to run most Unix and Linux security tools on the system, Apple's operating system has become popular among security researchers.

That popularity could be the reason that the number of vulnerabilities logged in Apple's Mac OS X surpassed the number of vulnerabilities found in Microsoft's Windows XP in 2004 and 2005, according to data from theNational Vulnerability Database (NVD) (http://nvd.nist.gov/). Apple had to contend with 88 vulnerabilities (29 high severity ones) in the Mac OS X in 2005, up from 54 in the prior year, while Microsoft patched 61 vulnerabilities (38 deemed of high severity) in Windows XP in 2005, up from 44 the prior year, according to the NVD. The data does show that fewer of the flaws in Mac OS X were considered severe.

Such numbers always have to be taken with a grain of salt. Differing ways of reporting flaws, different editorial policies on the part of the vulnerability database staff, and differences between what software components are considered part of the operating system all combine to make vulnerability statistics less than authoritative (http://www.securityfocus.com/news/11367).

However, some security researchers speculate that the number of flaws found in the future will increase. Apple's change to the Intel platform will put many security researchers in their comfort zone in dealing with the architecture. While the change will not mean much for application-level vulnerabilities, flaws in the memory architecture or in processor-specific functions could be found more easily, Reflective's Shostack said.

"OS X running on x86 means that the skills that people have developed and a lot of the tools people have created for finding problems, analysing problems, and writing the code to take advantage of them, will work," he said. "They no longer need to learn a different assembler or a different memory architecture."

Finally, the old adage about market share still holds, said Dan Kaminsky, an independent consultant for Doxpara Research. As Macs become more popular, attackers will tend to target the platform more often, he said.

"There just aren't that many Mac users right now," Kaminsky said. "As it gets put on more and more desk tops, it becomes a pretty high-profile target in terms of what is your return on investment for committing an attack against the group."

Ironically, Apple's lack of experience with major attacks might also cause problems for the company and its users, Kaminsky said.

"The reality is that security work does comes from a trial by fire," he said. "And Apple really has not had that experience. It had not had the experience from some 20 years that Unix had and that Linux has absorbed. It has not had the experience that Microsoft had with its summer of worms."

Yet, it's almost certain the experience will come, he said.
http://www.theregister.co.uk/2006/02...vulnerability/





Millionaire on Hacking Charge
Sophie Kirkham

MATTHEW MELLON, heir to a £6.6 billion banking and oil fortune, will appear in court next month in connection with an investigation into an alleged phone-tapping and computer hacking gang.

The former husband of Tamara Mellon, who runs the Jimmy Choo shoe empire, will appear alongside 17 other defendants accused of involvement in the operation, which allegedly provided clients with confidential information about wealthy people and businesses.

Following a tip-off from BT, Scotland Yard has conducted a long investigation into a private detective agency run by a former policeman which it believed was bugging phone calls.

It is now alleged the group was also hacking into NHS computers to access confidential medical files to blackmail people, spying on police and bugging their phone calls to get information. There are also several charges of falsifying invoices.

One of the group is said to have taken BT overalls, a reflective jacket and tools, along with a BT works barrier and stool, and a shirt from NTL, another other telecoms company.

A regular on the London social scene and close friends with Elizabeth Hurley and Hugh Grant, Mellon, 41, inherited a £14m trust fund at the age of 21. He now has a fortune put by The Sunday Times Rich List at £50m. His family is held in the same regard in America as the Rockefellers, Vanderbilts and Astors.

He met Tamara Yeardye in 1998. The couple’s marriage in 2000 at Blenheim Palace took up eight pages in American Vogue and the bride wore a Valentino wedding dress encrusted with diamonds. More than half the guests were said to be wearing Jimmy Choos.

The Mellons spent several years as a golden couple of London society often appearing in magazine pages and at charity functions. In 2002 they had a daughter, Araminta. But the marriage fell apart amid revelations of Mellon’s cocaine habit, which he is said to have battled in the 1990s, and the couple went through an acrimonious divorce last year.

After the marriage ended Tamara, who is now worth £60m in her own right, began seeing Oscar Humphries, the son of Barry, creator of Dame Edna Everage. Mellon has recently said he was planning a change in career from working as chief designer for Harry’s, an upmarket men’s shoe company he launched five years ago — he has tried his hand at film producing in the past.

He remains a colourful figure on the social scene — his hobbies are said to include nude jet skiing — and he has had a string of celebrity girlfriends since his marriage break-up. He is currently seeing Noelle Reno, a 24-year-old actress.

Mellon, who lives in Belgravia, London, is charged with conspiracy to cause unauthorised modification of computer material.

Also in the dock at Bow Street magistrates’ court in February will be another wealthy businessman, Adrian Kirby, who made his money from waste disposal units. Kirby, 47, of Haslemere, Surrey, has a fortune put at £65m by the Rich List.

He is charged with conspiracy to intercept communications unlawfully, unauthorised modification of computer material and perverting the course of justice.

Former Essex police officer Scott Gelsthorpe, 31, of Kettering, Northamptonshire, is facing 15 charges.

The suspects, 17 men and one woman, come from southern England, Lincolnshire and France and are said to have committed the offences between July and September 2004. They will appear before magistrates on February 23.
http://www.timesonline.co.uk/newspap...015469,00.html





A Detective to the Stars Is Accused of Wiretaps
David M. Halbfinger and Allison Hope Weiner

Anthony Pellicano, the deposed detective to the stars, masterminded a sprawling wiretapping ring that helped his clients gain an advantage in disputes with opponents including actors, reporters and talent managers, federal prosecutors said on Monday.

Prosecutors said that among the people who had been illegally wiretapped or subjected to criminal background checks were the actors Sylvester Stallone, Keith Carradine, Garry Shandling and Kevin Nealon; a Hollywood reporter for The New York Times; and managers of the Creative Artists talent agency.

On Monday, prosecutors unsealed a 110-count indictment that accused Mr. Pellicano, along with a former phone company worker, a former Los Angeles police officer and four others with crimes that include racketeering and conspiracy, wiretapping, identity theft, witness tampering and destruction of evidence. The charges are the latest in what are expected to be continuing waves of charges stemming from the three-year investigation.

Not named in the indictment were any of the top Hollywood lawyers who frequently retained Mr. Pellicano as an investigator, and whose entanglement in a criminal case could send shock waves throughout the entertainment industry.

But the government indictment strongly suggested that those who retained Mr. Pellicano were not entirely unaware of his actions. Mr. Pellicano was hired, the indictment said, "for the purpose of implementing illegal wiretaps," and gave his clients the contents of recorded conversations, which they used for several purposes "including securing a tactical advantage in litigation by learning their opponents' plans, strategies, perceived strengths and weaknesses, settlement positions and other confidential information."

Indeed, prosecutors said at a news conference that the investigation was continuing, and indicated that the indictment, which was returned last Wednesday, had been timed to coincide with the end of Mr. Pellicano's prison sentence on firearms and explosives charges. He was to have been freed on Saturday.

According to the prosecutors, Mr. Pellicano, now 61, ran a well-oiled and highly lucrative operation for digging up dirt on adversaries. Beginning in 1995, they say, he paid a computer programmer, Kevin Kachikian, 41, to develop software he called "Telesleuth" to convert audio into digital signals that could be recorded on a computer. They say he also paid two Pacific Bell workers, Rayford Earl Turner, 49, and Teresa Wright, to provide the telephone records of his targets and to help him secretly install wiretaps on their phone lines.

And beginning in 1997, prosecutors said, he bribed a Los Angeles police officer, Mark Arneson, 52, and a Beverly Hills police officer, Craig Stevens, 45, to check confidential law enforcement databases for criminal histories and driving records. Mr. Stevens and Ms. Wright previously pleaded guilty in the case; the others were charged Monday.

Three clients of Mr. Pellicano's were also named in Monday's indictment. Robert Pfeifer, 50, the former head of Hollywood Records, was accused of hiring the detective to investigate and wiretap a former girlfriend, Erin Finn. And two brothers, Abner Nicherie, 42, and Daniel Nicherie, 45, both of Las Vegas, were accused of paying him to wiretap a wealthy entrepreneur, Ami Shafrir, who had accused them of looting his family's assets in an elaborate business fraud. Mr. Pfeifer was arrested on Friday; Abner Nicherie was arrested Monday at his home, and Daniel Nicherie was already in federal custody on separate charges of defrauding Mr. Shafrir.

In addition to the criminal charges, the government is seeking forfeiture of at least $1.9 million that Mr. Pellicano and his cohort were paid for their work.

The case against Mr. Pellicano arose when a reporter, Anita Busch, was threatened in 2002 while pursuing an article for The Los Angeles Times about the actor Steven Seagal and his relationship with a mob figure. A tip from an informer led the F.B.I. to a convicted felon, Alexander Proctor, who was recorded saying he had been hired by Mr. Pellicano to stop Ms. Busch's reporting.

That November, after Ms. Busch discovered that her phone had been tapped, investigators raided Mr. Pellicano's office, seizing computer files with nearly two billion pages of notes and transcripts of wiretaps.

In a contentious bail hearing Monday, Daniel A. Saunders, the lead prosecutor, charged that Mr. Pellicano was a flight risk. He said Mr. Pellicano had met with his girlfriend, Sandra Will Carradine, as recently as January and asked her to flee with him should he be let out on bail.

Mr. Pellicano's lawyer, Steven F. Gruel, argued that the prosecution was merely trying to pressure Mr. Pellicano to become a government witness. But Magistrate Judge Stephen J. Hillman ordered Mr. Pellicano detained without bail.

Ms. Carradine, who pleaded guilty to perjury last month, is now a cooperating witness. She is also the ex-wife of Keith Carradine, the actor, and she had hired Mr. Pellicano in connection with their divorce. Both Mr. Carradine and his girlfriend, Hayley DuMond, were among the people whom Mr. Pellicano had run through government databases, prosecutors say.

The list of those victims, in fact, may provide something of a road map to the continuing investigation. Among the Los Angeles area lawyers who used Mr. Pellicano in cases in which the government has said he committed crimes are Bert Fields, the late Edward L. Masry and Daniel Davis.

Mr. Fields represented Brad Grey, the former talent manager and current chairman of Paramount Pictures, in litigation against Mr. Shandling and also against Bo Zenga, a screenwriter. Mr. Zenga was wiretapped, and he, his wife, his brother, his lawyer, a witness in the case and her girlfriend, and another witness were all subjected to criminal checks, prosecutors said.

Mr. Zenga's lawyer, Greg Dovel, said he had been shown transcripts of his own conversations with Mr. Zenga by F.B.I. agents. "It's like somebody was writing down the important parts of the conversation and highlighting them," he said. "It's like a summary you would pass to a lawyer working on the case."

Mr. Fields also represented Kenneth Starr, a business manager who is not related to the former special prosecutor and who was sued by his former client, Sylvester Stallone, on Feb. 14, 2002. That month, prosecutors say, Mr. Pellicano wiretapped Mr. Stallone.

Mr. Fields also represented a New York hedge fund manager involved in litigation against Aaron Russo, a Hollywood producer, who was wiretapped and whose family was run through criminal databases. Another alleged victim of Mr. Pellicano, Jude Green, was involved in a bitter divorce case in which Mr. Fields's firm represented her husband.

Several others who are said to have been victims of Mr. Pellicano were involved in adversarial relationships with Michael S. Ovitz, the former head of Creative Artists Agency and president of Disney, who later formed Artists Management Group. Mr. Ovitz's heirs at Creative Artists took his re-entry into the business as a betrayal and refused to share clients, and Mr. Ovitz was forced to sell Artists Management. During that dispute, Bryan Lourd and Kevin Huvane of Creative Artists were run through criminal databases, prosecutors say.

At the time, Bernard Weinraub, a New York Times reporter, and Ms. Busch, then a freelance writer, were collaborating on stories about Mr. Ovitz's troubles at Artists Management. On May 16, 2002, prosecutors say, Mr. Pellicano had his police informants run both Mr. Weinraub's and Ms. Busch's names through criminal databases.

Also in May 2002, Mr. Pellicano ran criminal checks on Arthur Bernier, a former Artists Management executive who had sued the firm a month before; and James Casey, who sued Artists Management in March of that year to collect a finder's fee for a Boston Celtics star and client of the firm, Paul Pierce.

A former Artists Management counsel, James Ellis, said that Mr. Pellicano was one of several investigators recommended by an outside lawyer to investigate Mr. Bernier and Mr. Casey, but that the company knew nothing of his activities.

"This is the first we've heard that he actually did this," Mr. Ellis said. As for the checks on Mr. Weinraub and Ms. Busch, Mr. Ellis said, "That wasn't done at our direction."

The late Mr. Masry was tied to the case, prosecutors said, by Kissandra Cohen, a former employee who sued him for sexual harassment, and who was wiretapped by Mr. Pellicano; and by Bilal Baroody, a onetime client who later sued Mr. Masry for malpractice after losing $400,000, and who was checked out by Mr. Pellicano's police informants.

Mr. Davis, a criminal lawyer, represented a man accused of manslaughter in the death of Sandra Rodriguez in May 2001. Mr. Pellicano is suspected of having run checks on Ms. Rodriguez in August 2001. Mr. Davis also represented an accused rapist, and Mr. Pellicano illegally ordered up criminal checks on five of the accusers, prosecutors say.
http://www.nytimes.com/2006/02/07/bu...pellicano.html





15 Million Malicious Websites
Jimmy Daniels

Okay, here’s notice that the problems in the internet are not getting better, they are getting worse, Websense announced in a press release that their database of websites that contain malicious code, peer to peer file sharing, spyware, phishing, and 80 some other categories of “bad stuff” has increased to over 15 million. 15 million websites our children could easily surf into, or we could surf into, that would try to take advantage of us somehow. This contradicts the study from Washington University I posted about here, but, that study was just a sample that grabbed data from some websites, it was not a massive undertaking like this one.

The Websense Master Database is the most accurate, up-to-date database in the industry. Recent increases to the Master Database reflect the continual growth of the internet as an attack vector by today’s cyber-criminals. The Websense database reached 10 million sites in May 2005 and quickly grew to 15 million sites within approximately eight months. Today, the database includes more than 90 categories, such as spyware, phishing and peer-to-peer (P2P) file sharing, which organizations can use to protect employees against malicious internet sites as well as set flexible filtering policies for employee web usage.

“Websense has more than 10 years of specialized internet mining expertise, and the growth that we have seen over the past year in malicious content has been astonishing,” said Patrick Swisher, director, database operations for Websense, Inc. “As our knowledge of the internet continues to increase, so does our ability to create more sophisticated processes to classify these types of high-risk sites and provide our customers with greater protection. Our award- winning software has the ability to proactively discover and immediately protect our customers against the most ominous web- based threats such as spyware, bots, phishing attacks, viruses and crimeware.”

During 2005, software vulnerabilities were increasingly exploited by malicious websites hosting malcode, and the Websense Master Database’s security-related categories reflect this growth. For example, since February 2005, spyware-related websites have increased from approximately 48,000 sites to more than 130,000 today — a 170 percent upsurge. In addition, during the same time period, phishing and other fraudulent websites have grown approximately 271 percent from 7,270 to more than 27,000 sites.

To maintain database accuracy, Websense purges dead website links from the database on a daily basis, and to date has removed nearly four million dead links. This is of particular importance for internet categories that represent web security risks, such as phishing or fraud-based websites, which have a short life span. Phishing websites are currently online for an average of less than six days and the underlying IP addresses associated with those websites change frequently. Source: PRWeb.


Some highlights, Malicious websites grew more than 3,900 percent, P2P websites had a 50 percent increase, and Keyloggers more than doubled in growth.

We Say: This is a lot more accurate than the Washington study as that one was just a sample, in that study they only crawled 18 million url’s, while this one analyzes more than 75 million sites a day for malicious code. They also have a global honey pot, meaning, unprotected computers that are there just to be taken advantage of, exploited, etc, like a normal users computer and to discover MMC(Mobile malicious code), new Trojan horses, keyloggers and blended threats. They have also removed over 4 million websites from the list, because lots of these websites don’t stay live very long, they move from url to url, trying to infect us.

As Sergeant Phil Esterhaus from Hill Street Blues used to say, Hey, let’s be careful out there.
http://www.realtechnews.com/posts/2648





Internet Draws Ire Of New York Consumers

The Internet has passed credit and banking as the biggest source of consumer complaints in New York state, Attorney General Eliot Spitzer said Wednesday.

Spitzer's office received 7,723 complaints about the Internet last year, up 28 percent from 2004, he said.

Complaints about the Internet accounted for about 15 percent of the more than 51,000 written complaints the office received last year.

Typical Web-related complaints involved computer spyware and spam, nondelivery of goods, and incorrect charges for shipped goods, Spitzer said.

Credit and banking complaints, involving such things as credit cards, identity theft, debt collection and credit reporting, generated 6,164 complaints in 2005, while automobile-related complaints totaled 5,514.

In 2004, credit and banking generated 6,724 complaints, followed by 6,255 related to automobiles and 6,013 related to the Internet, Spitzer said. There were nearly 55,000 reported complaints overall.

Spitzer is a 2006 Democratic gubernatorial candidate in New York. He announced the statistics as part of National Consumer Protection Week.
http://news.com.com/Internet+draws+i...3-6036741.html





MP3 Inventor Fraunhofer Makes Tool To Fight Music Piracy

Using digital watermarking technology
John Blau

The Fraunhofer Institute has developed prototype technology to help curb the sharp rise in online music piracy, which ironically has been enabled through another invention of the renowned German research group: MP3 audio compression.

Researchers at the Fraunhofer Integrated Publication and Information Systems Institute have successfully tested a software system, based on the group's own digital watermarking technology, for tracking pirated audio files in P2P (peer-to-peer) filesharing networks, said Michael Kip, a spokesman for the institute.

Kip referred to the Fraunhofer approach as an alternative to DRM (digital rights management) systems, which he said require special players and are prone to hacking.

While watermarking technology isn't new per se, this is the first time it has been used in a system to automatically track pirating in P2P networks, according to Kip.

The system lets content providers, such as music studios, embed a watermark in their downloadable MP3 files. Watermark technology makes slight changes to data in sound and image files. For instance, the change could be a higher volume intensity in a tiny part of a song or a brighter colour in a minuscule part of a picture. Even the best-trained human eyes and ears, according to Kip, can't detect the change.

The digital media watermark used in the Fraunhofer system also contains a 'hash value', which creates a link between the content provider and registered purchaser. "The hash value is like a fingerprint; it contains unique information about the user," Kip said. "The software we've developed can automatically search for fingerprints."

The Fraunhofer approach differs from others in that it doesn't monitor the individuals who illegally download music but rather scans for content that has been illegally uploaded.

"If, for instance, you purchase and download a CD, burn a copy and give it to a friend and that person puts it on a filesharing network, our system will trace that music back to you and, depending on the legal system of the country you're in, you could be [hit] with an expensive fine," Kip said. "This could certainly help deter online music piracy."

Fraunhofer envisions the prototype software as an application that content providers can install on their own servers for automatically monitoring P2P networks around the clock.

The institute will demonstrate the technology next month at the CeBit trade show in Germany.

Asked if widely used MP3 technology isn't partly to blame for online music piracy, he said: "Yes and no. You can use a knife to cut bread or kill someone. It's a tool that can be misused."

Research on compression of music files was conducted in the 1980s by a team of scientists at the Fraunhofer Institute for Integrated Circuits. Their development, the Mpeg1 Layer 3 algorithm, was first shortened to Mpeg Layer 3 and later to MP3.
http://www.pcadvisor.co.uk/news/index.cfm?newsid=5671





China Swoops On 'Unhealthy' Sites
Correspondents in Beijing

CHINESE regulators closed down more than 2,000 websites last year because they had too much sex, violence or politics, state media reported.

The crackdown was part of a nationwide campaign to eradicate the distribution of pornography and other illegal activities, the Beijing Morning Post said.

The paper referred to the websites as "unhealthy," a word describing a broad range of illegal content including pornography, excessive violence and sensitive political or religious issues.

China has stepped up its policing on the internet in recent months in a bid to stem what it sees as an unhealthy influence on the young.

The General Administration of Press and Publication said in November it had already issued warnings to 53 websites that provide downloads for pornographic games.

In September, the Chinese government announced revised internet rules that required internet operators to re-register their news sites and police them for content that could "endanger state security" and "social order".

Any content that "harms national security, reveals state secrets, subverts political power, (and) undermines national unity" is also banned.

The regulations further prohibit posts that "instigate illegal gatherings, formation of associations, marches, demonstrations or disturb social order".
http://australianit.news.com.au/arti...-15319,00.html





Internet Lions Turn Paper Tiger in China
Tom Zeller Jr.

LET'S play "What if?"

What if the Chinese authorities didn't simply force Google to exclude sites like hrw.org (the Human Rights Watch Web site) and lesbian.com from the Chinese version of its search engine results, or insist that Yahoo hop to whenever the government fancied the identity of one of its e-mail users, as the authorities have done?

What if they also stipulated that the chief executive of any Internet company doing business in China had to have "Mao Zedong — Luv U 4 Eva" tattooed across his back? Would the companies leave China?

The scary thing is, one might reasonably chew on that question longer than this one: What if Chinese law required Internet companies to reveal the identities of all users who forwarded really bad e-mail jokes, lame chain letters or any messages containing the terms "free speech," "Tiananmen Square" or "Super Freak," because such activities carried a 10-year prison term?

"With all due respect to the memory of Rick James, the king of funk," an executive might say, "we must abide by the laws of the countries in which we operate."

And what if — as a mark of good faith for being permitted to do business in what any rational observer has to admit is now the most tantalizing Internet and technology market on the planet — an executive from each company were required to assist, mano a mano, in the beating of an imprisoned blogger?

Nothing too strenuous, but you would have to make like you meant it.

What if no one had to know? They never would, right?

Yes, it's an all too easy and not entirely fair game to play. The issues on the ground in China are complex, and there are plenty of people who believe that Bill Gates is right when he says, as he did last week when discussing the matter at a Microsoft-sponsored conference in Lisbon, that "the ability to really withhold information no longer exists."

That is to say, Microsoft or Google may agree to censor this or filter that, but in the end, censorship is no match for human ingenuity and the endless ways for the Internet to provide workarounds. "You may be able to take a very visible Web site and say that something shouldn't be there," Mr. Gates said, "but if there is a desire by the population to know something, it is going to get out."

But even if that's true, Western technology companies have only themselves to blame if users in the free world quickly ask when Shi Tao, the journalist whose name Yahoo gave to Chinese authorities and who subsequently was sentenced to a 10-year prison term, will be released. Or that people use what-ifs to ponder the moral limits of saying that local law is local law.

That's partly because it is only recently that any of the players have made any genuine efforts at transparency in their dealings with China.

Two weeks ago, Google took the bold step of plainly admitting that it was entering the Chinese market with a censored search product, tweaked according to government specifications. Then last week, Microsoft announced new policies that would enable it to honor a government's demand to shut down a citizen's blog (as happened five weeks ago with a popular MSN blogger in Beijing) while still keeping the blog visible outside of China.

But these are small victories, said Julien Pain of the group Reporters Without Borders, which tracks Internet censorship in China, not least because the companies "seem now to accept censorship as a given, and have simply decided to be transparent about it."

Still, to many, it signaled progress.

And yet all four American companies with P.R. baggage in China — Cisco, Yahoo, Microsoft and now Google — were no-shows at a hearing last Wednesday of the Congressional Human Rights Caucus. At least three of the companies submitted written statements defending their activities in China, but their absence only added to their image problem, as headlines like "Tech Firms Snub Feds" and "Google Stiffs Congressional Caucus" bounced around the blogosphere.

And thus, the months of what came off as appeasing Beijing and engaging in mealy-mouthed image management at home seem to have taken a toll — most recently, and perhaps most pointedly, on Google.

It is telling, to say the least, that the darling of so many technophiles — which promised to "do no evil" — is now on the receiving end of spontaneous boycotts, with disillusioned search-lovers looking for alternatives. These signs of lost innocence also show that the race for China may soon offer a selling point to companies that don't cooperate with repressive regimes.

"Today, I know you don't deserve me," wrote one visitor to NoLuv4Google.org, a site where users can "break up" with Google and officially boycott the search giant on Valentine's Day, Feb. 14. "You betrayed my love and trust. I have been with you for so many years. Now, we are through! FOREVER. I am gonna hook up with IceRocket."

IceRocket is one of several search alternatives listed at NoLuv4Google.org, which is run by a group called Students for a Free Tibet. Clusty.com, a search site developed by several Carnegie Mellon computer scientists, is another. Clusty proudly states that it "never censors search results" or excludes material "that would be objectionable to governments or would be unlawful in unelected, nondemocratic regimes."

In an e-mail message, Mark Cuban, IceRocket's founder, put it more bluntly: "IceRocket doesn't and won't censor. We index more than one million Chinese-language blogs. No chance we censor or block anything in this lifetime."

Even David Pinto, who owns the popular — and wholly apolitical — site BaseballMusings.com, has ceased taking income from Google ads. "I was no longer comfortable taking money from them," he said. That's the sort of apple-pie protest that American companies can't ignore.

On Feb. 15, the House subcommittee on Global Human Rights will hold hearings on the whole topic, and all four companies — Cisco, Yahoo, Google and Microsoft — are expected to attend, given that the committee, unlike the caucus, could muster subpoenas if it wanted. The companies will presumably explain that they can't be dogmatic on censorship when doing business in China, and that if American Internet companies don't do business in China, change will never come there.

These are hard arguments to dismiss, but so, too, are the what-ifs. One that ought to be on the mind of the companies as they come before Congress might be this: What if, years from now, the Great Firewall of China comes tumbling down and the full extent of your arrangements with the Chinese regime becomes known?

"One day, people in China may be able to see the records of conversations between multinational tech companies and the Chinese authorities," wrote Rebecca MacKinnon, a research fellow at the Berkman Center for Internet and Society at Harvard Law School, in her blog at Rconversation.com.

"What were the exact terms of the deals? Who made them? In what context did these conversations take place?" Ms. MacKinnon wrote. "I expect the revelations won't be too flattering for the companies concerned."
http://www.nytimes.com/2006/02/06/te...gy/06link.html





Yahoo Is Accused of Aiding China in Case of Jailed Dissident
Mark Magnier

BEIJING — In a development expected to put more pressure on foreign high-tech companies operating in China, a free-speech group Wednesday accused Yahoo of providing information to the Chinese government that helped it arrest and imprison a cyber-dissident in 2003.

The report by Paris-based Reporters Without Borders said Chinese court documents showed that Yahoo helped authorities identify Li Zhi through his e-mail address and user name.

The former civil servant from Dazhou in southwestern China was sentenced in December 2003 to an eight-year term for "inciting subversion" after posting essays detailing local corruption.

Yahoo officials were not immediately available for comment. The company has acknowledged handing over such information in the past, saying it must obey the laws of the countries in which it operates.

In September, Reporters Without Borders accused Yahoo of providing information that led to last year's 10-year prison term for Chinese journalist Shi Tao.

The group called on Yahoo to release a list of all cyber- dissidents about whom it had given information to Chinese authorities. "How many more cases are we going to find?" the group said in a statement.

Yahoo, Microsoft, Google and Cisco are under growing pressure over their business practices in China.

The four companies have been asked to appear at a congressional hearing next week to address the ethical responsibilities of Internet firms.

Critics say the companies are cozying up to a police state in their headlong quest for profits. The companies say they are only complying with the law.

Microsoft has shut down a popular blog in China, and Google and Yahoo have filtered their Chinese search results in accordance with Chinese government policy.

Cisco has provided equipment used to filter information.

Free-speech groups predicted that more disclosures detailing cooperation with government censors were likely to surface.

"This will add to the pressure on these companies to be more transparent," said Abi Wright, Asia program coordinator with the New York-based Committee to Protect Journalists, which gave Shi an award last year. "User trust is such an important part of their business, and this goes to the very heart of that trust issue."

Companies are under shareholder pressure to enter the China market, which has 100 million Internet users, second only to the United States.

But their compliance with tough Chinese restrictions has threatened to alienate some of their core U.S. and European users, who see this as a break with basic free-speech principles.

"All companies are coming to realize that doing business in China brings benefits but some pretty heavy baggage and costs," said Michael Geist, a professor of Internet and e-commerce law at Canada's University of Ottawa.

"This is very troubling to a lot of people," he said.

Reporters Without Borders reported that 49 cyber-dissidents and 32 journalists were in prison in China for posting articles and criticism of authorities on the Internet.
http://www.latimes.com/technology/la...ck=1&cset=true





FAQ: When Google Is Not Your Friend
Declan McCullagh

Google's recent legal spat with the U.S. Department of Justice highlights not only what information search engines record about us but also the shortcomings in a federal law that's supposed to protect online privacy.

It's only a matter of time before other attorneys realize that a person's entire search history is available for the asking, and the subpoenas begin to fly. This could happen in civil lawsuits or criminal prosecutions.

That type of fishing expedition is not legally permitted for Web mail providers. But because search engines are not fully shielded by the 1986 Electronic Communications Privacy Act--concocted back in the era of CompuServe and bulletin board systems--their users don't enjoy the same level of privacy.

"Back then, providers were very different animals than they are now," says Paul Ohm, a former Justice Department attorney who teaches computer crime law at the University of Colorado at Boulder.

Two solutions are simple to describe, but not likely to happen. First, search engines could voluntarily--or be required by law to--delete search histories after a few months unless the customer objects. Second, federal law could be amended to make it clear that search engines, which serve as a window to the Internet, are fully protected.

CNET News.com has surveyed Google, Microsoft, Yahoo and AOL to find out their privacy practices, and assembled these answers to frequently asked questions.

Q: Does Google collect and record people's search terms whether they're logged in or not?
Yes. Google confirmed this week that it keeps and collates these results, which means the company can be forced to divulge them under court order. Whether Google does anything else with them is another issue.

Given the Department of Justice's recent subpoena to Google, it's likely the police or even lawyers in civil cases--divorce attorneys, employers in severance disputes--eventually will demand that Google, Microsoft, Yahoo, AOL, and other search engines cough up users' search histories.

Q: Has this happened before?
Almost. A North Carolina man was found guilty of murder in November in part because he Googled the words "neck," "snap," "break" and "hold" before his wife was killed. But those search terms were found on Robert Petrick's computer, not obtained from Google directly.

Also, attorneys have already begun introducing searches conducted on Google, Yahoo and AltaVista as evidence.

Q: When I use search engines, I type in a lot of search terms I consider private. What does this mean?
We go into all the details below. But the short answer is that when private companies collect reams of data all the time on nearly every American, and the government and curious attorneys can get to that with few obstacles, this becomes a problem. Search engines provide a look into people's personal lives, and privacy awareness has not kept pace.

Q: Aren't there any privacy laws that protect us?
Not really. There is a federal law called the Electronic Communications Privacy Act. But it was enacted in 1986, long before politicians knew about the Internet, and the wording doesn't prevent police and attorneys from targeting search engines.

Politicians wrote that law in a way that is technology-specific--one key part revolves around the meaning of the pre-Internet term "processing services"--instead of adopting a more flexible approach that would grow with technology. Some states may have laws that are more applicable.

Q: Why does Google store that information about me, anyway?
No law requires Google to delete it, and there are some business justifications for keeping it.

For instance, keeping detailed records can help in identifying click fraud (faking clicks on Web ads to drive up a rival's cost), and in optimizing search results for different geographic areas. Compiling a user profile can aid in tailoring search results in products like Google Personalized Search. Also, disk storage is cheap, and engineers tend to prefer to keep data rather than delete it.But it's hardly clear that a compelling reason exists for keeping older records--beyond a few months--unless a customer voluntarily chooses options like personalization.

Q: Does that mean Google has the technical ability to link a person's searches together and divulge them when legally required?
Yes. Google says in its FAQ that it records Internet address, date, time, browser type, operating system and a cookie ID.

Author and entrepreneur John Battelle received word from Google this week that the company can perform two important types of matches. (We confirmed this with Google and followed up with additional questions.)

First, given a number of search terms, Google can produce a list of people (identified by Internet address or cookie) who searched for a given term. Second, given a collection of Internet addresses, Google can produce a list of the terms searched by the user of a given address. That effectively creates an electronic dossier of an individual.

Q: What about other search engines?
We surveyed AOL, Microsoft and Yahoo as well. Microsoft and Yahoo gave us the same response as Google did.

AOL's was a little different. Spokesman Andrew Weinstein said AOL could provide a list of search terms typed in by a user. But AOL does not have a system in place to perform the opposite mapping, which would find out what users typed in which search terms. Weinstein also said that AOL deletes personally identifiable search data after 30 days, which makes it unique among the quartet we surveyed.

Q: What about links people click on from search engine results? Can that information be turned over too?
Yes. Through a process known as redirection, Yahoo and AOL record what links people click. Unless the companies discard these records, they would be fair game for a subpoena.

Q: Let's say the Bush administration wanted to obtain a list of the names or Internet addresses of anyone who typed "how to grow marijuana" or "how to cheat on income taxes" into Google. Could that be done?
Probably. If the Electronic Communications Privacy Act does not apply, all that's required is a subpoena from a prosecutor, and no prior approval from a judge is necessary. One Harvard law professor calls the subpoena power "akin to a blank check."

"The threshold rule is relevance," says Paul Ohm, the University of Colorado law professor. "Relevance has been quite broadly construed. As long as you can show that something's relevant to a case or criminal investigation, I think the litigant would have a pretty good argument."

Using the examples of finding out who did searches like "how to make meth" or "how to kill the president," Ohm says prosecutors "would have a very good argument that it's relevant to an investigation."

Q: How can I protect my privacy from search engines?
First, to protect your privacy if your computer is stolen, you can clear your browser's history (sometimes called "private data"). In Firefox, select that option from the Tools menu and delete your browsing history and saved form information. Apple Computer's Safari has a similar option under the History menu. Encrypting your hard drive through OS X's FileVault or PGP's Whole Disk Encryption may be a good idea.

Second, you can clear the cookies that are set by search engines. In Firefox, go to Preferences and select Privacy. You have the option to delete cookies and even prevent certain sites from ever setting them again. Be warned, though, that adding Google.com to the list may prevent using options like personalization or Gmail.

Third, if you're really worried, go to Anonymizer.com and sign up for one of its anonymous browsing options (they're primarily for Windows users). Tor is another option.

Danny Sullivan has posted a more extensive list of recommendations at SearchEngineWatch.com.

Q: Is Congress going to do anything?
Rep. Ed Markey, a Massachusetts Democrat, has pledged to introduce legislation to prevent storing search terms "beyond a reasonable period of time."

There are some political and practical problems with this approach. First, Markey is a liberal Democrat in a town controlled by Republicans, so his proposal isn't going anywhere. Second, any such law could be wildly disruptive--it could mean class-action lawyers would get rich suing tech companies on charges that their data-retention duration is not "reasonable."

Finally, it's hardly clear that the Bush administration will embrace such a proposal--search terms could prove useful in criminal prosecutions, and the Justice Department seems to like the ability to demand them from search engines.

Q: How are Internet addresses handed out? Do people always have the same one?
It depends. Many DSL and cable modem providers allocate Internet addresses only when they're in use (the methods are called DHCP and PPPoe). Those IP addresses can change frequently.

Other IP addresses tend to be fixed. Faculty and staff members at universities, and employees of corporations, are more likely to have fixed Internet addresses.

Q: If Google knows I'm connecting from a dynamically assigned Internet address of 192.1.1.1 one day, and 192.2.2.2 the next day and 192.3.3.3 the third, how can it link my queries together to create that dossier?
This is where "cookies" come in. A cookie is simply a device for a Web site to recognize people the next time they return. Google, Yahoo, AOL and Microsoft all set cookies by default. (Microsoft's expire in 2016; Yahoo's in 2010; Google's in 2038. AOL sets a third-party cookie that expires in 2011.)

In the above example, Google.com would set a cookie for whoever's connecting from Internet address 192.1.1.1 the first day, and then figure out that the same Web browser is connecting from 192.2.2.2 and 192.3.3.3 the next two days. If people are logged in to their Google account, this makes the process even easier, of course.

Q: Even if a search engine company knows my Internet address is 192.1.1.1, and links my previous searches together, how can they--or the government--get my name, home address or other information?
If you have a Google account for products like Gmail, Google Groups, Personalized Search or Google Alerts, Google knows your e-mail address and other personal information, which it can be forced to disclose. If a Web publisher signs up for Google AdSense for advertising revenue, Google will have the publisher's real name, mailing address and Social Security Number.

If a person doesn't use any other Google services, all the company can divulge in response to a subpoena is that person's Internet address. Then whoever's asking about the person will send a second subpoena to the person's Internet service provider to find out billing information. This is a relatively straightforward procedure used by the Recording Industry Association of America (RIAA) in thousands of file-swapping lawsuits.

Q: Has anyone ever sent search engines a subpoena or other kind of legal request for someone's search terms?
We don't know. Google and Yahoo refused to answer the question, though there is no law prohibiting them from doing so.

AOL said only that the Electronic Communications Privacy Act would apply. Microsoft was by far the most forthcoming. With the exception of the Justice Department subpoena for search terms (without user identities) last year, Microsoft said it has "not received either criminal or civil requests related to MSN Search data."

Microsoft also said it "has never received either criminal or civil requests" to produce the lists of people who typed in a search term. Oddly, the other companies were not nearly as open.

Q: How long do companies keep records of my search terms?
Microsoft, Google and Yahoo all said they keep data as long as it's necessary, which could mean forever. Microsoft did add that the company is "looking at ways" to provide users with the option to delete their search histories, and Yahoo made a similar statement.

AOL, on the other hand, says it deletes personally identifiable data after 30 days.

CNET News.com's Elinor Mills contributed to this report.
http://news.zdnet.com/2100-9588_22-6034666.html





Rumours Mount Over Google's Internet Plan
Benjamin Cohen

Google is working on a project to create its own global internet protocol (IP) network, a private alternative to the internet controlled by the search giant, according to sources who are in commercial negotiation with the company.

Last month, Google placed job advertisements in America and the British national press for "Strategic Negotiator candidates with experience in...identification, selection, and negotiation of dark fibre contracts both in metropolitan areas and over long distances as part of development of a global backbone network".

Dark fibre is the remnants of late 1990s internet boom where American web companies laid down fibre optic cables in preparation for high speed internet delivery. Following the downturn in the technology sector during the early 2000s, the installation process for many of these networks was left incomplete. This has resulted in a usable network of cables spread across the United States that have never been switched on. By purchasing the dark fibre, Google would in effect be able to acquire a ready made internet network that they could control.

Late last year, Google purchased a 270,000sq ft telecom interconnection facilities in New York. It is believed that from here, Google plans to link up and power the dark fibre system and turn it into a working internet network of its own.

It was also reported in November that Google was buying shipping containers and building data centres within them, possibly with the aim of using them at significant nodes within the worldwide cable network. "Google hired a pair of very bright industrial designers to figure out how to cram the greatest number of CPUs, the most storage, memory and power support into a 20- or 40-foot box<" Robert Cringely wrote. "The idea is to plant one of these puppies anywhere Google owns access to fiber, basically turning the entire Internet into a giant processing and storage grid."

Google has long been rumoured to be planning to launch a PC to retail for less than $100. The Google computers are likely to be low-grade machines that require a connection to Google to be able to perform functions such as word processing and spreadsheet manipulations. While using the computers, it is understood that consumers will be shown personalised advertising from the company's AdWords network.

The various reports prompted analysts Bear Stearns to note last year: "We think Google could be experimenting with new hardware endeavours that could significantly change potential future applications by Google, creating another advantage for Google over its competitors. Investors may currently under appreciate Google as a potential hardware company."

The technology industry has also been alive with talk that the Google $100 machines will be less like a standard home PC and more like a television: in effect, one of the first convergent devices betweem the internet and television. While offering the standard PC applications, the "Google Cube" will also offer interactive content from a variety of sources while retaining Google branding and displaying Google advertising.

A leading content provider, who did not wish to be named, told Times Online: "We are in discussions with Google to provide content for their alternative internet service, to be distributed through their Google Cube product. As far as I'm aware they have been conducting negotiations with a number of other players in our marketplace to provide quality content to their users."

However, industry insiders fear that the development of a network of Google Cubes powered over a Google-owned internet network will greatly increase the power that Google wields over online publishers and internet users.

Should Google successfully launch an alternative network, it is is theoretically possible for them to block out competitor websites and only allow users to access websites that have paid Google to be shown to their users.

However, the moves towards providing equipment for as little as £60 will prove popular with home users and even governments, who will welcome the spread of the internet to homes that could not previously afford the intital costs of purchasing PCs.

Contacted by Times Online today, a spokesperson for Google denied that it had any such plans, before adding its customary rider: "It's Google's policy not to comment on speculation concerning products before they are launched."
http://business.timesonline.co.uk/ar...023600,00.html





Google, Skype In Startup To Link Hotspots
Peter Svensson

Google Inc. and eBay Inc.'s Skype are investing in a startup that plans to help hotspot owners charge for Wi-Fi access, a plan that could face significant opposition from Internet service providers.

The Internet heavyweights were joined by venture capital firms Index Ventures and Sequoia Capital in making a $22 million investment in FON, the Spanish startup. In its announcement Sunday, FON did not say how much each investor was contributing.

FON's idea, floated just three months ago in a Web posting by founder Martin Varsavsky, is to sign up people who have Wi-Fi hotspots in one of two ways.

"Linus" members, named after Linus Torvalds, who created the freely distributed Linux software, will share their hotspot with other Linus members for free.

"Bill" members, named after Microsoft Corp. founder Bill Gates, will charge for access to their hotspot. FON will get some of that revenue, and share it with Internet service providers, or ISPs.

The network has gained 3,000 Linus members since going live in November. There is no software yet for Bill members, but Varsavsky expects it to be ready within four months. Linus software is so far only available for Wi-Fi routers from Linksys, a division of Cisco Systems Inc.

FON faces a hurdle in that most ISPs prohibit subscribers from sharing internet access with people outside their household. Many broadband subscribers share their access now for free, though, and it's hard for Internet service providers to stop them.

Traffic from a FON-connected hotspot would be easy for an ISP to identify, said Glen Fleishman, editor of the Wi-Fi Networking News site, because users have to authenticate themselves at a FON server.

Varsavsky wants to partner with ISPs to get them to allow their subscribers to set up FON hotspots. It has signed up a Swedish ISP, Glocalnet, and is in discussions with U.S. companies.

To win over the ISPs, Varsavsky points out that Linus members need Internet service to be Linus members.

"So in fact, FON is an incentive to become a customer of an ISP," he said.

Mark Harrad, a spokesman at Time Warner Cable, said the company was not aware of FON's plans. Its terms of service prohibit its 4.8 million residential broadband subscribers from sharing their connection outside the household.

Representatives at Google did not return messages seeking comment on the search engine's investment in FON.

Skype's Internet telephone service works over wireless connections, and a cell-phone-like device is in the works to take advantage of that fact.

"FON has a great idea to help people share Wi-Fi with one another to build a global unified broadband network, and were happy to lend support," Skype Chief Executive Niklas Zennstrom said in a statement.

FON's idea is not entirely novel - in fact, several companies and associations have tried to tie together free Wi-Fi hotspots into networks, but none has succeeded on a large scale.

"The problem with all these free projects is that they fail because everybody wants to be a freeloader and nobody wants to provide Wi-Fi," said Varsavsky. FON, on the other hand, demands reciprocal sharing from its Linus users.

There are also commercial Wi-Fi networks built by T-Mobile USA and Boingo Wireless Inc. with hotspots in more than 50,000 locations. Varsavsky hopes to have a much larger network by the end of the year because FON doesn't have to create the hotspots by itself.

Fleishman said FON has a chance to reach a critical mass of users, but it will be competing with free or low-cost municipal Wi-Fi networks in several cities. Google has itself offered to build a free Wi-Fi network to cover San Francisco.
http://seattlepi.nwsource.com/busine...i_Network.html





Court Overturns Temporary Restraining Order Against Wikimedia Deutschland

In the lawsuit between the registered association Wikimedia Deutschland and the father of the hacker Tron the local court in the Berlin district of Charlottenburg has now proclaimed its verdict: The application of the plaintiff has been dismissed. Wikimedia Deutschland is once again legally entitled to redirect visitors to the domain wikipedia.de to the international domain de.wikipedia.org, the lawyer of the association Thorsten Feldmann reported today.

The lawsuit centers on the question of whether Wikipedia is entitled in an article to reveal the real name of the hacker who died in 1998. As early as December 2005 the father of the dead hacker had obtained a temporary restraining order against the Wikimedia Foundation in Florida. However, the foundation does not seem to have been served the order yet. That move on the part of the father was followed in January by a temporary restraining order against the registered association Wikimedia Deutschland, which has now been overturned.

The verdict had been delayed several times. Thus the lawyer of Tron's father Friedrich Kurz had last week doubted that the lawyer of Wikimedia Deutschland had a proper mandate and had dismissed the motions against the temporary restraining order submitted by the association's lawyer as irrelevant. After the court rejected the notion that Tron's right to privacy was being violated postmortem, Mr. Kurz argued that as the only living person to bear this particular surname the appearance of his client's surname in the free online encyclopedia violated the latter's right to privacy. The court apparently did not endorse this reasoning.

An appeal against the verdict is possible. Last week Mr. Kurz had already proclaimed that he would be taking further legal action to prevent the real name of the hacker from being made public on the Internet.
http://www.heise.de/english/newsticker/news/69391




BitTorrent End to End Encryption and Bandwidth Throttling - Part I
Thomas Mennecke

No one will ever take away the enormous contribution Bram Cohen has given to the file-sharing community. Much like the revolution of file-sharing under Napster in 1999, BitTorrent has redefined the way people share and search for information. Initially, BitTorrent evolved largely under the direction of its creator. More recently however, this protocol is shifting further away from the direction of Bram Cohen and more towards independent developers.

One of the key focuses currently facing members of the BitTorrent community is traffic shaping (or bandwidth throttling.) Since its inception, BitTorrent has become the unquestioned consumer of bandwidth, as CacheLogic reports over 60% of all Internet traffic is attributable to this protocol. Some ISPs have simply reinvested in their networks and allowed BitTorrent to flourish, while others report that Shaw Cable and Rogers Cable in Canada have made their BitTorrent experience excessively slow and intolerable.

In response, BitTorrent developers have introduced “end to end” encryption in an effort to counter these policies. By fooling traffic shaping software, this has become very welcomed news from those who experience bandwidth throttling. Interestingly enough, Bram Cohen, the founder of BitTorrent, has not supported this direction. Yet as the course of BitTorrent evolution changes, the needs of the populace are instead being addressed by community oriented developers.

In today's interview, Slyck speaks with the developer of µTorrent, Ludvig Strigeus, with additional information provided by the administrator of daily operations, "Firon."

Slyck.com: First and foremost, how effective has this feature proven to be?

µTorrent: I don't really know how effective this option is yet, it's only been tested in a limited environment. We haven't been able to do any significant tests with users of ISPs that shape. But so far, it seems to be helping shaped users in swarms that have PE-enabled clients.

Slyck.com: What is your motivation and philosophy behind this feature? Why are you working on it and what do you hope the benefit for the BitTorrent community will be?

µTorrent: I'd like all users to be able to use BitTorrent and be able to upload and download. After all, BT is being used in many legal things, including distribution of public domain content, patches for games, and so on. An ISP shouldn't be able to block a legitimate protocol.

Slyck.com: Could you spend a moment to explain how end to end encryption works?

µTorrent: The encryption uses a shared secret (the torrent info hash), which is different for each torrent, in combination with Diffie-Hellman keys that are generated when the connection is set up. The Diffie-Hellman helps minimizing the risk of passive listeners, and the shared secret helps avoiding man-in-the-middle attacks.

Slyck.com: Recently, Bram Cohen brought up several arguments against end to end encryption. What is your reaction to these arguments, and how valid do you believe they are? Do you think perhaps they are being made to further his effort to make BitTorrent more legitimate?

µTorrent: I don't really agree with his arguments. He seems to be a bit out of touch with the reality of the situation. There's a significant number of severely throttled users (or that have BT blocked outright)out there, and ISPs need to realize that the internet is not port 80, 443 and e-mail. Very, very few ISPs cache BT, even less so than those that shape, so that's a fairly lousy argument to counter encryption.

His argument to let the tracker handle which peers are PE-enabled isn't very good either, since it's trivial for an ISP to block or alter the tracker request/response to achieve their desired effect of saving bandwidth because they can't cope with non-HTTP traffic. And one of the main problems with ISPs that shape is that they don't shape reasonably (say to maintain network quality and not interfere with VoIP or some such), but always throttle it down to a grinding halt. This is unfair, and users should be able to use the bandwidth they paid for.

Slyck.com: How dynamic is your approach to end to end encryption? For example, will you be able to maintain a likely technological arms race with ISPs?

µTorrent: If some severe flaw were discovered with PE, it would be significantly easier for us to update the clients with a fix than it would be for an ISP to update their hardware/software to detect any such changes we make.

Slyck.com: Bram Cohen stated "Most ISPs don't do such shaping", yet the reaction from Shaw and Rogers broadband customers reflects differently. How many other ISPs do you know of shape traffic, and do you believe that the number will increase in months and years to come?

µTorrent: I think he's wrong, a significant number of Canadian users seem to be shaped, and there's various ISPs in Singapore doing similarly.

There's ISPs in the US, Israel, and Australia, Belgium, and many others (some are listed on Azureus'wiki). It seems to be a growing trend, since the list of ISPs that users report are shaping seems to be growing.

Slyck.com: Is the encryption static or is it dynamic (does it change according to some parameters)?

µTorrent: The parameter that changes per-connection is the Diffie-Hellman key. The info hash also influences the encryption, but it's not different for each connection (obviously).

Slyck.com: What has been the feedback from end users? For example, are people complaining the decryption of Diffie-Hellman is resource hungry?

µTorrent: We have not had any feedback yet. The amount of resources for Diffie-Hellman is quite small, we're talking much less than a percent of CPU time for normal users. The data stream is encrypted with RC4.

My Pentium 4 can encrypt at 300MB/s (with optimized assembly code), so even if you download at a very fast speed, the RC4 encryption would just use a percent or two of CPU time, which is much less than the time required to compute SHA hashes of all downloaded pieces.

Slyck.com: Encryption is a tool better known for securing the transfer of private information. Are there any benefits of securing the transfer of information that is being offered publicly, or is the encryption soley to circumvent ISP throttling?

µTorrent: The major goal of the protocol was to circumvent throttling, however it was designed with the idea in mind, that it should be hard for a passive listener to detect what traffic is transmitted.

Slyck.com: By encrypting the data, is there a risk BitTorrent will lose some of its acceptance, hence encouraging more ISPs to throttle?

µTorrent: I don't know, did HTTP lose acceptance when HTTPS was invented? I don't think so.

Like the eDoneky2000 network, BitTorrent’s control and direction is slowly morphing towards the open source community. MetaMachine, the original creative force behind eDonkey2000 has seen the direction of this network forever replaced by eMule. This evolution of events is nearly impossible for original talents to reverse, and the future of BitTorrent is little different.
http://www.slyck.com/news.php?story=1083





Encrypting Bittorrent to Take Out Traffic Shapers

Over the past months more Bittorrent users noticed that their ISP is killing all Bittorrent traffic . ISP’s like Rogers are using bit-shaping applications to throttle the traffic that is generated by Bittorrent.

But, at the same time two of the most popular Bittorrent clients are working together to implement header and message stream encryption in order to take out these traffic shapers.

Currently both Azureus and µTorrent included this new form of encryption (specs) in their latest Beta’s. The fact that these two clients are actively working together to implement this new feature is promising and will make this form of encryption the new standard since the users of these two clients cover the majority of all Bittorrent users.

There are two “encryption modes” available.

The 2 different payload encryption methods plaintext transmission and RC4 provide a different degree of protocol obfuscation, security and speed. Where the plaintext mode only provides basic anti-shaping obscurity, no security and low CPU usage the RC4 encryption obfuscates the entire stream and not only the header and adds some cryptographic security at the price of spent CPU cycles.

The question now is.. Does it work? and how effective is it? If it works it will definitely offer a great solution to all Bittorrent users who suffer from traffic shaping ISP’s.

Bram Cohen, the creator of the Bittorrent protocol reacted quite negatively on these new developments. He questions the need for encryption since only a few ISP’s are actively shaping traffic. Among other things he also fears incompatibility between clients and increased cpu usage. Although these arguments can be countered quite easily, developers should keep them in mind.

But the fact is, if this new encryption method is launched successfully it will be a huge step forward for the Bittorrent community.
http://torrentfreak.com/encrypting-b...affic-shapers/





Labels? We don’t need no stinkin labels!

TuneCore
From the site

Get Your Own Music on iTunes
You keep all your rights.
You own your recordings.
You get all the money.
No contracts.

What is TuneCore?

TuneCore is a music delivery and distribution service that gets music you created (even cover versions) up for sale on iTunes and Rhapsody without asking for your rights or taking any money from the sale or use of your music.
What Are You Paid?

You get 100% of what iTunes and Rhapsody pay. We take nothing, all the money goes to you. You keep ALL the rights and ownership of your music and master recordings. TuneCore is non-exclusive, so you're never locked in.
Where Can I Put My Music Up For Sale?

iTunes U.S. is always included. Choose as many of these additional stores/services as you want:
iTunes Canada
iTunes Japan
iTunes U.K./Europe
iTunes Australia
Rhapsody Service

...many more coming soon!
How Does It Work?

TuneCore has arrangements with iTunes and Rhapsody that let us place your music in their online stores and subscription services. You get 100% of the money that iTunes and/or Rhapsody pays.

Upload your music via our Website, or mail your CD to us.

Use our online art tool to design your own album cover, or upload your own.

Got questions? See our FAQ

Got seven or more albums you'd like delivered? Ask Jeff about volume discounts.

Who are we? Meet the founders.

Get your music to the world!
http://www.tunecore.com/





Indie Labels Take a Risk, and Win, with Musicals
Jeff Lunden

In the best original cast recording category for the upcoming Grammy Awards, three out of the five albums nominated were released by Ghostlight Records. The New York-based label isn't a household name, but it is one of a handful of independents that are keeping the cast album alive.

That a big Broadway hit would wind up on a small independent label says a lot about changes in the economics of the recording industry. For years, cast albums were pretty big business. Shows such as Hello Dolly! and Man of La Mancha could make the Billboard charts, right next to the Beatles.

But in the past decade or so, the major labels have released fewer and fewer original cast albums, says Brian Drutman, senior director for Decca Broadway. "The average Broadway cast recording costs about $400,000," Drutman says. "It's not inexpensive... even selling tremendously well, [an album] can take upwards of a year to recoup its initial investment."

The original cast album of Wicked has beat the odds for Decca Broadway. Since its release in December 2003, it has sold almost 700,000 copies. But while Decca and the other majors are looking for the next blockbuster, labels like Ghostlight Records have been picking up the slack.

Ghostlight owners Sherie Rene Scott and Kurt Deutsch began the business in their second bedroom, selling albums over the Internet. Now, they've recorded Broadway hits such as The 25th Annual Putnam County Spelling Bee. Deutsch says he convinced Broadway producers to record on his label by changing the standard business model. While companies like Decca Broadway finance and own their recordings, Deutsch convinced producers to pay for the discs themselves.

Another source of show recordings is PS Classics. Philip Chaffin and Tommy Krasker run that label out of their house in Bronxville, N.Y. After the success of its Grammy-nominated Nine in 2003, Krasker says opportunities to record cast albums began to flow. PS Classics' current bestseller is a revival of Fiddler on the Roof. Chaffin and Krasker have also forged an alliance with the leading composer of the American musical stage, Stephen Sondheim. The Tony Award-winning revival of Sondheim's Assassins earned PS Classics a second Grammy nomination for its recording.
http://www.google.com/url?sa=X&oi=ne...ryId%3D5187068





Can Usernames Violate Trademark Law?
submitted by welvis

We got a legal threat this morning from FamilyPants.com because a user on one of our forums chose 'FamilyPants' as their username. They're upset because Google (and only Google) puts the user's profile on the first page of results for "familypants". I would think this is considered fair use.
http://www.digg.com/technology/Can_u...trademark_law_





Can DSL Handle Success?
Marguerite Reardon

After getting piles of mail from Verizon Communications about its new $14.95 DSL service, Barbara Cerney finally decided to ditch dial-up. But when she called Verizon to sign on, she got an unpleasant surprise.

Though her neighbors were using Verizon DSL, the company said the service was oversubscribed and she'd have to wait at least a month. Her only immediate broadband option was to subscribe to Comcast's more-expensive cable modem service. And the Annapolis, Md., resident, having made up her mind about slow Internet speeds, did just that.

The situation illustrates a potential catch-22 for Verizon as it looks to prevail over cable competitors in the broadband market. The company, and fellow DSL provider AT&T, have enjoyed significant success over the past year in using price cuts to convince customers that it's time to make the jump to broadband. But those same promotions could backfire if the companies can't accommodate the increased volume of speed-hungry customers.

"They may end up being a victim of their own success," said Jim Penhune, an analyst with Strategies Analytics. "It may be a good short-term problem to have too many people interested in your service, but it's not something you want as a sustained problem."

Last June, AT&T (then SBC Communications) was the first of the two large phone companies to dramatically reduce its DSL pricing--to $14.95 for the first year of service. In August, Verizon followed suit, offering its new tier of service, which includes 768kbps downloads, for $14.95 per month. And last week, AT&T answered back, with a $12.99 price tag for the first year. Since AT&'s prices are promotional, after the first year the price of the service jumps to the company's regular pricing model, which is $29.99 per month.

Since Verizon floated its $14.95 offer, the company has quickly grabbed new broadband subscribers. Last week it reported that the fourth quarter of 2005 had been its best ever for broadband, with 613,000 new subscribers signing on, a 14 percent quarter-over-quarter increase.

The company now has a total of 5.1 million broadband subscribers, a figure that includes all tiers of DSL customers, as well as subscribers to its fiber-to-the-home service, Fios, an ultra-high-speed package.

AT&T has also seen subscriber numbers jump. In the third quarter of 2005--the quarter immediately following its initial $14.95 promotion--the company increased broadband subscribers by 528,000. That number tailed off a bit in the fourth quarter, when AT&T added 425,000 new DSL subscribers. The company has a total of 6.9 million broadband subscribers.

"The price cuts on DSL by the phone companies have definitely helped them add new subscribers," Penhune said. "I doubt AT&T and Verizon would be reporting the quarter-on-quarter subscriber growth they have the last two quarters if they hadn't cut prices the way they did."

The phone companies' strategy is simple: They hope that by giving customers a taste of broadband at a low price, they'll eventually wring more profits out of subscribers by selling them higher-speed services or other, more-advanced services such as Internet Protocol TV.

Verizon has already started selling its television service over Fios in several states, including Texas, Florida and Virginia. AT&T is testing its TV service in Texas, and it expects to offer it more widely later this year.

Incapacitated?
But it's a tricky business. The low-priced DSL services have certainly struck a chord with price-sensitive customers--but even without the price cuts, experts say, the growth in the broadband market is still healthy as people drop dial-up for broadband and more-experienced Internet surfers upgrade to faster speeds.

That seems to be borne out by the fact that cable operators, who have marketed their services by emphasizing faster download and upload speeds, have also been adding new subscribers.

Comcast, the largest high-speed Internet provider in the country, reported last week that it added 378,000 new broadband subscribers in the fourth quarter of 2005. In total, it added 1.5 million subscribers in 2005, ending the year with 8.5 million high-speed customers.

That's in spite of the fact that Comcast's services are pricier than its rivals' DSL offerings. Cerney, for example, nabbed an introductory rate of $19.99 a month--but that price lasts for only three months, after which the cost jumps to $42.95.

Comcast and other cable operators say they'd rather compete on the value of their service than strictly on the price. As a result, they tend to bundle multiple services, such as high-speed Internet access, telephony service and TV, all in one package. Plus, Comcast's 6mbps service is much faster than Verizon's 768kbps service.

The bundling strategy has worked well for Comcast. For example, it claims that 98 percent of its new digital voice customers subscribe to a second service with the company.

"What we are finding is that our customers are choosing our service and recommending it to friends and family," said Jeanne Russo, a spokeswoman for Comcast. "We offer a better service than our competition. And we're able to service everyone in our footprint and provide the speeds we promise."

All this could spell trouble for Verizon as it looks to meet demand.

A spokeswoman said the company has been forced to stop taking orders in some parts of the country. Equipment shortages from one of Verizon's key suppliers, which the company has chosen not to name, is part of the problem, she said--coupled with increased demand for Verizon DSL services.

"If we reach capacity at a central office, we have no choice but to stop selling for awhile until we get in additional equipment to serve more customers or until more lines free up," said spokeswoman Bobbi Henson. "The extreme popularity of our new 768K service, in combination with equipment shortages we've had from our vendor, have resulted in some of our offices now reaching capacity."

Henson said the equipment supply issue should be cleared up soon, and that after that, the company shouldn't have problems servicing new customers.

AT&T said it hasn't had any trouble keeping up with demand, hence the recent price cut to $12.99.

Despite any inconveniences or delays, Cerney, the disappointed prospective Verizon customer, said she still hopes to take advantage of the Verizon deal.

"I was just so tired of dial-up, and $14.95 is a great deal," she said. "I really don't want to have to pay $45 a month for Internet, so I'll probably try to switch to Verizon when the Comcast promotion ends."
http://news.com.com/Can+DSL+handle+s...3-6035271.html





Wireless ISPs Limiting P2P Speeds
Liam Getreu

Wireless ISPs in Australia have admitted to throttling peer-to-peer (P2P) traffic on their networks.

Eric Hamilton, Unwired's chief technical officer, told The Australian that its policy, which has been in force for a number of months already, was aimed at giving normal users priority speeds over those who would otherwise bog down the network.

Some users on Unwired have recently reported speed and congestion issues in peak times, which could have led Unwired to this decision. But Unwired claims it has capacity for 70,000 customers on its network, but has less than 40,000 currently connected. Unwired chairman Steve Cosser said last year that "wireless broadband today is a viable alternative to ADSL and cable", but very few ADSL providers limit speeds on P2P applications.

iBurst provider Independent Service Providers also de-prioritises P2P traffic, with chief technical officer Mark Russell stating that "voice, DNS and web get the highest" priority, while peer-to-peer traffic is "at the lowest."

But how does this affect ISPs that buy Unwired bandwidth wholesale? Internode MD Simon Hackett told Whirlpool that although "the service Internode sells has no port/service type based prioritisation in it", he couldn't be sure "where the reported prioritisation of traffic occurs in the Unwired network." "So it's possible that Unwired apply prioritisation to all customer traffic", he said.

Hackett isn't against the idea of de-prioritisation of P2P, however. "Surely its sensible to ensure that 'real time' traffic such as web page access, VoIP, SSH etc does receive priority over bulk file transfer if the network has underlying resource limitations that need to be addressed."
http://whirlpool.net.au/article.cfm/1593





Robotic Toys Take Stage At DEMO Conference
Matthew Fordahl

Sony Corp. may have put its Aibo robotic dogs to sleep, but the inventor of the popular Furby toy said on Tuesday the market for toy animatrons is anything but extinct.

Caleb Chung unveiled a lifelike toy dinosaur named Pleo that senses its surroundings, reacts to touch, walks about on its four legs and shows emotion.

The robot, about the size of a toy poodle, expresses sadness and disappointment by gently lowering its head and tail when it's ignored. Rub its rubbery back or poke its feet, and the 3.5-pound dinosaur springs back to life just like something made of flesh and blood.

Pleo made its debut on the first day of the 16th annual DEMO conference, which is taking place in Phoenix this week. The show gives about 70 startups and established companies about six minutes each to showcase what they hope will be the next big thing in technology.

Ugobe Inc., which Chung co-founded, hopes Pleo will be the must-have present for Christmas 2006. The diminutive dino is expected to be available later this year for about $200 each.

"By using breakthrough materials, an array of sensors and programmed intelligence, Ugobe has created a unique animated form that challenges the relationship between human beings and nonliving creatures," noted Chris Shipley, DEMO's executive producer.

Unlike Furby's single motor and microprocessor, Pleo has eight processors that control 14 motors and receive signals from 38 sensors. It also can learn from its experiences - in effect writing its own code as it goes.

"What we're trying to do is recreate life in order to get to an emotional bonding," Chung said.

At DEMO, the robot initially made a cautious debut as it sensed its environment, a small table on a large stage. After a few seconds, its movements began to resemble a living object waking up.

"In a technical sense he's calibrating his servos, but we like to call it stretching," Chung said.

The Pleo eventually took a few cautious steps. When it reached the edge of the table, it stopped and peeked over. When Chung stopped playing with it, it appeared to get depressed.

Still, it's not likely to get as depressed as owners of Sony's Aibo robotic dogs. The company discontinued them last month to cut costs, calling the toys a niche product.

Other companies also showcased products that also mix fun and high tech:

- Blurb Inc.'s BookSmart lets anyone create professional-looking books from a PC or Macintosh. Unlike current do-it-yourself publishing tools, BookSmart offers layout flexibility. It also can "slurp" Web log content into a book and allows multiple people to contribute to a book over the Internet.

Each book, which costs about $30 for up to 40 pages, can be created within 30 minutes, said Eileen Gittins, the company's founder and chief executive. It is expected to be commercially available next month.

- Bones in Motion Inc.'s BiM Active turns nearly any cell phone into an automatic journal of outdoor activities. Walkers, runners and cyclists can record their routes in real time, using their phones' built-in satellite tracking capabilities. It also tracks speed, distance, calories burned and elevation.

All the information also can be accessed and shared via the Web. It also allows routes to be searched, ranked and displayed using Google Inc.'s mapping system. Bones in Motion also announced Sprint will start offering the service this week for $9.99 a month.

- MooBella LLC's Ice Cream System uses a combination of fresh ingredients and the Linux operating system to automatically scoop up tasty desserts. The vending machine, designed for cafeterias, convenience stores and other public places, lets customers choose from more than 90 combinations of flavors and mix-ins using a friendly touch screen display.

Within a minute, the ingredients are aerated, flavored, mixed and flash frozen. The machines also keep track of inventories and sales over a wireless Internet connection.

"Every MooBella consumer can become a Ben or Jerry," said Bruce Ginsberg, the company's president. "Our unique technology is as rich as our all-natural ice cream is smooth and creamy."

MooBella machines are expected to start appearing first in the Boston area in 2006. The price of each machine was not announced.
http://hosted.ap.org/dynamic/stories...MPLATE=DEFAULT





Who Ya Gonna Call With Email Trouble From the Tour Bus?

Rock Stars Take Along Techs As Sidekicks of a Sort; 'Give Hope to Every Geek'
Amy Chozick

Computer technician Joshua Kapellen doesn't look like a rock 'n' roll roadie. He's cleanshaven, wears starched, white button-down shirts and a clip-on tie. But to megaband U2, Mr. Kapellen is just as important as all its husky stage hands.

Last March, lead singer Bono needed his Xbox connected while the band rehearsed in Canada. Mr. Kapellen got a call. He hooked up the contraption and a few minutes later was playing videogames with Bono. "It was one of the coolest things that has ever happened to me," says Mr. Kapellen.

Mr. Kapellen, 28 years old, put his life in Minneapolis on hold in 2004 when Best Buy Co.'s Geek Squad of computer repair people asked him to accompany the Irish band and provide tech support to the 120 people traveling with the "Vertigo" world tour. He has been on the road in North America and Europe ever since.

"We're just ordinary guys," Mr. Kapellen says of computer repairmen. "But somehow we get ourselves into these extraordinary situations."

In the rock world, a measure of fame has rubbed off on personal assistants, groupies and even bouncers. But as the music industry becomes increasingly dependent on technology, the guy who gives tech support to the stars has become an essential, if overlooked, member of the entourage.

While on tour, pop stars Mary J. Blige, Beyoncé Knowles and Alicia Keys all have requested help from the Geek Squad, according to Best Buy, the big chain of electronics stores. Snoop Dogg, who does commercials for the T-Mobile Sidekick multipurpose gadget, occasionally needs a tech's assistance, his publicist confirms. Prince, who is religious about reading fans' reactions immediately after a show, also employs technicians to hook up high-speed Internet in his dressing room.

"Prince only uses the finest techies in the country," says the artist's lawyer, L. Londell McMillan.

Younger musicians, especially hip-hop stars, get loads of free gadgets from companies hoping they'll promote their wares, but that doesn't mean they know how to use them.

"I'm so computer illiterate, it's like crazy," says rapper Ludacris. The 28-year-old Atlanta-born star says his manager, Chaka Zulu, took classes in computer science so he could help him with everything from the Internet to receiving short, emailed bits of music he can incorporate into new songs. Technology is "my whole world," Ludacris says. "I need my people to help me out."

David Lemmink, a computer engineer for Nocturne Productions in DeKalb, Ill., travels with Bon Jovi's "Have a Nice Day" world tour. His duties include getting Jon Bon Jovi and his crew high-speed wireless Internet while on the tour bus and in arenas and making sure the onstage video screens are working properly.

"Backstage used to be a party, but now it's a business," says Mr. Lemmink, who has also helped Paul McCartney, Don Henley and Stevie Nicks with their technology needs.

The Paris Hilton Effect

A turning point for computer wonks came last February when socialite Paris Hilton's Sidekick was stolen and its contents -- ranging from nude photos to friends' personal information -- were posted online. Celebrities started to realize that a good tech guy could have installed passwords and security programs to prevent that information from getting out, says Robert Stephens, who founded Geek Squad in Minneapolis in 1994. He says the squad has received calls from Madonna, Ozzy Osborne and Kiss to help with technology, including security and privacy consulting.

Geek Squad, which was sold to Best Buy in 2002, now has nearly 12,000 employees. Technicians like Mr. Kapellen are paid about $32,000 a year, the industry average for computer technicians, according to the Association of Support Professionals.

"Let's face it, computer repairmen are at the bottom of the food chain," Mr. Stephens says, but these glamorous job opportunities "give hope to every geek out there."

During a U2 concert at Madison Square Garden in 2001, Larry Mullen Jr., the group's drummer, accidentally sat on his 10-year-old Casio organizer, which contained all his contacts, Mr. Stephens says. As Mr. Mullen's assistant scurried to give him his backup organizer, it fell and shattered. One of the band's guitar technicians called Mr. Stephens for help.

"He said, 'I'll give you anything if you can get this thing fixed,' " recalls Mr. Stephens, who found a similar model on eBay and was able to use parts from that one to pull data off Mr. Mullen's antiquated organizer.

Technology may seem mundane, says Tim McWilliams, a production coordinator with the Rolling Stones, but in the past five years it has become "the cornerstone of any successful rock tour."

Last August, Cory MacDonald left his girlfriend, his apartment and his car in Boston to travel with the Rolling Stones "Bigger Bang" world tour. Many nights he just waits in his hotel room. If Mick Jagger has a problem with his laptop, Mr. MacDonald gets a call, says Mr. McWilliams.

After the band's San Francisco show last November, Mr. MacDonald, 22, and the rest of the crew were treated to a blowout party at SBC Park, where the Giants play. "There was free alcohol and free food. We were all over the place," Mr. MacDonald says, "I could get used to being a roving rock-star tech guy."

Luke Steiner was called away from his typical tech jobs in Minneapolis to help Ms. Keys and her crew with computer problems in 2003. Mr. Steiner, 24, says he doesn't get many dates on the weekend, so just meeting Ms. Keys and helping with her "tiny Internet problems" made him "feel like a rock star for a brief moment."

Mick Jagger: 'You're So Cool'

Technology can be particularly baffling for older musicians. During the Rolling Stones' 1997 "Bridges to Babylon" concert, Geek Squad's Mr. Stephens helped 62-year-old Mr. Jagger connect to the Internet after he had had trouble dialing-up. "All I did was add a 9 in front of the number and he was like 'wow, man, you're so cool,' " Mr. Stephens recalls, imitating a British accent. As for Keith Richards, also 62, Mr. Stephens says, "I seriously think he'd never operated a computer before."

Technology consultant Billy Field used to be a "taper" at Grateful Dead concerts, making amateur recordings of the band's music. Now, he helps Dead-style jam band Widespread Panic with all its tech needs. Mr. Field, 35, has also worked for the Allman Brothers, R.E.M. and 10,000 Maniacs. He says that with some rockers, "it's just a matter of getting them comfortable enough with technology until the little light bulb goes off above their head."

Widespread Panic's lead singer, John "J.B." Bell, says he'll probably never trade in his pad and pen for a Palm organizer. "We're old school, man," the 43-year-old Mr. Bell says. That makes him even more dependent on tech guys when he needs to get online. "It might be a computer nerd thing, but when you're forlorn in a crisis, that's your hero," Mr. Bell says.
http://online.wsj.com/article/SB113902321348065131.html
JackSpratts is offline   Reply With Quote
Old 09-02-06, 03:03 PM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,013
Default

Surveillance

Republican Who Oversees N.S.A. Calls for Wiretap Inquiry
Eric Lichtblau

A House Republican whose subcommittee oversees the National Security Agency broke ranks with the White House on Tuesday and called for a full Congressional inquiry into the Bush administration's domestic eavesdropping program.

The lawmaker, Representative Heather A. Wilson of New Mexico, chairwoman of the House Intelligence Subcommittee on Technical and Tactical Intelligence, said in an interview that she had "serious concerns" about the surveillance program. By withholding information about its operations from many lawmakers, she said, the administration has deepened her apprehension about whom the agency is monitoring and why.

Ms. Wilson, who was a National Security Council aide in the administration of President Bush's father, is the first Republican on either the House's Intelligence Committee or the Senate's to call for a full Congressional investigation into the program, in which the N.S.A. has been eavesdropping without warrants on the international communications of people inside the United States believed to have links with terrorists.

The congresswoman's discomfort with the operation appears to reflect deepening fissures among Republicans over the program's legal basis and political liabilities. Many Republicans have strongly backed President Bush's power to use every tool at his disposal to fight terrorism, but 4 of the 10 Republicans on the Senate Judiciary Committee voiced concerns about the program at a hearing where Attorney General Alberto R. Gonzales testified on Monday.

A growing number of Republicans have called in recent days for Congress to consider amending federal wiretap law to address the constitutional issues raised by the N.S.A. operation.

Senator Lindsey Graham of South Carolina, for one, said he considered some of the administration's legal justifications for the program "dangerous" in their implications, and he told Mr. Gonzales that he wanted to work on new legislation that would help those tracking terrorism "know what they can and can't do."

But the administration has said repeatedly since the program was disclosed in December that it considers further legislation unnecessary, believing that the president already has the legal authority to authorize the operation.

Vice President Dick Cheney reasserted that position Tuesday in an interview on "The NewsHour With Jim Lehrer."

Members of Congress "have the right and the responsibility to suggest whatever they want to suggest" about changing wiretap law, Mr. Cheney said. But "we have all the legal authority we need" already, he said, and a public debate over changes in the law could alert Al Qaeda to tactics used by American intelligence officials.

"It's important for us, if we're going to proceed legislatively, to keep in mind there's a price to be paid for that, and it might well in fact do irreparable damage to our capacity to collect information," Mr. Cheney said.

The administration, backed by Republican leaders in both houses, has also resisted calls for inquiries by either Congress or an independent investigator.

As for the politics, some Republicans say they are concerned that prolonged public scrutiny of the surveillance program could prove a distraction in this year's midterm Congressional elections, and the administration has worked to contain any damage by aggressively defending the legality of the operation. It has also limited its Congressional briefings on the program's operational details to the so-called Gang of Eight — each party's leaders in the Senate and the House and on the two intelligence committees — and has agreed to full committee briefings only on the legal justifications for the operation, without discussing in detail how the N.S.A. conducts it.

Ms. Wilson said in the interview Tuesday that she considered the limited Congressional briefings to be "increasingly untenable" because they left most lawmakers knowing little about the program. She said the House Intelligence Committee needed to conduct a "painstaking" review, including not only classified briefings but also access to internal documents and staff interviews with N.S.A. aides and intelligence officials.

Ms. Wilson, a former Air Force officer who is the only female veteran currently in Congress, has butted up against the administration previously over controversial policy issues, including Medicare and troop strength in Iraq. She said she realized that publicizing her concerns over the surveillance program could harm her relations with the administration. "The president has his duty to do, but I have mine too, and I feel strongly about that," she said.

Asked whether the White House was concerned about support for the program among Republicans, Dana Perino, a presidential spokeswoman, said: "The terrorist surveillance program is critical to the safety and protection of all Americans, and we will continue to work with Congress. The attorney general testified at length yesterday, and he will return to Capitol Hill twice more before the week ends."

Aides to Representative Peter Hoekstra of Michigan, who as chairman of the full House Intelligence Committee is one of the eight lawmakers briefed on the operations of the program, said he could not be reached for comment on whether he would be open to a full inquiry.

Mr. Hoekstra has been a strong defender of the program and has expressed no intention thus far to initiate a full review. In two recent letters to the Congressional Research Service, he criticized reports by the agency that raised questions about the legal foundations of the N.S.A. program and the limited briefings given to Congress. He said in one letter that it was "unwise at best and reckless at worst" for the agency to prepare a report on classified matters that it knew little about.

But two leading Democratic members of the intelligence committees, Representative Jane Harman and Senator Dianne Feinstein, both of California, wrote a letter of their own Tuesday defending the nonpartisan research service's reports on the surveillance program and other issues, saying its work had been "very helpful" in view of what they deemed the minimal information provided by the administration.
http://www.nytimes.com/2006/02/08/po... ner=homepage





US Plans Massive Data Sweep

Little-known data-collection system could troll news, blogs, and e-mails
Mark Clayton

The US government is developing a massive computer system that can collect huge amounts of data and, by linking far-flung information from blogs and e-mail to government records and intelligence reports, search for patterns of terrorist activity.

The system - parts of which are operational, parts of which are still under development - is already credited with helping to foil some plots. It is the federal government's latest attempt to use broad data-collection and powerful analysis in the fight against terrorism. But by delving deeply into the digital minutiae of American life, the program is also raising concerns that the government is intruding too deeply into citizens' privacy.

"We don't realize that, as we live our lives and make little choices, like buying groceries, buying on Amazon, Googling, we're leaving traces everywhere," says Lee Tien, a staff attorney with the Electronic Frontier Foundation. "We have an attitude that no one will connect all those dots. But these programs are about connecting those dots - analyzing and aggregating them - in a way that we haven't thought about. It's one of the underlying fundamental issues we have yet to come to grips with."

The core of this effort is a little-known system called Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement (ADVISE). Only a few public documents mention it. ADVISE is a research and development program within the Department of Homeland Security (DHS), part of its three-year-old "Threat and Vulnerability, Testing and Assessment" portfolio. The TVTA received nearly $50 million in federal funding this year.

DHS officials are circumspect when talking about ADVISE. "I've heard of it," says Peter Sand, director of privacy technology. "I don't know the actual status right now. But if it's a system that's been discussed, then it's something we're involved in at some level."
Data-mining is a key technology

A major part of ADVISE involves data-mining - or "dataveillance," as some call it. It means sifting through data to look for patterns. If a supermarket finds that customers who buy cider also tend to buy fresh-baked bread, it might group the two together. To prevent fraud, credit-card issuers use data-mining to look for patterns of suspicious activity.

What sets ADVISE apart is its scope. It would collect a vast array of corporate and public online information - from financial records to CNN news stories - and cross-reference it against US intelligence and law-enforcement records. The system would then store it as "entities" - linked data about people, places, things, organizations, and events, according to a report summarizing a 2004 DHS conference in Alexandria, Va. The storage requirements alone are huge - enough to retain information about 1 quadrillion entities, the report estimated. If each entity were a penny, they would collectively form a cube a half-mile high - roughly double the height of the Empire State Building.

But ADVISE and related DHS technologies aim to do much more, according to Joseph Kielman, manager of the TVTA portfolio. The key is not merely to identify terrorists, or sift for key words, but to identify critical patterns in data that illumine their motives and intentions, he wrote in a presentation at a November conference in Richland, Wash.

For example: Is a burst of Internet traffic between a few people the plotting of terrorists, or just bloggers arguing? ADVISE algorithms would try to determine that before flagging the data pattern for a human analyst's review.

At least a few pieces of ADVISE are already operational. Consider Starlight, which along with other "visualization" software tools can give human analysts a graphical view of data. Viewing data in this way could reveal patterns not obvious in text or number form. Understanding the relationships among people, organizations, places, and things - using social-behavior analysis and other techniques - is essential to going beyond mere data-mining to comprehensive "knowledge discovery in databases," Dr. Kielman wrote in his November report. He declined to be interviewed for this article.
One data program has foiled terrorists

Starlight has already helped foil some terror plots, says Jim Thomas, one of its developers and director of the government's new National Visualization Analytics Center in Richland, Wash. He can't elaborate because the cases are classified, he adds. But "there's no question that the technology we've invented here at the lab has been used to protect our freedoms - and that's pretty cool."

As envisioned, ADVISE and its analytical tools would be used by other agencies to look for terrorists. "All federal, state, local and private-sector security entities will be able to share and collaborate in real time with distributed data warehouses that will provide full support for analysis and action" for the ADVISE system, says the 2004 workshop report.
A program in the shadows

Yet the scope of ADVISE - its stage of development, cost, and most other details - is so obscure that critics say it poses a major privacy challenge.

"We just don't know enough about this technology, how it works, or what it is used for," says Marcia Hofmann of the Electronic Privacy Information Center in Washington. "It matters to a lot of people that these programs and software exist. We don't really know to what extent the government is mining personal data."

Even congressmen with direct oversight of DHS, who favor data mining, say they don't know enough about the program.

"I am not fully briefed on ADVISE," wrote Rep. Curt Weldon (R) of Pennsylvania, vice chairman of the House Homeland Security Committee, in an e-mail. "I'll get briefed this week."

Privacy concerns have torpedoed federal data-mining efforts in the past. In 2002, news reports revealed that the Defense Department was working on Total Information Awareness, a project aimed at collecting and sifting vast amounts of personal and government data for clues to terrorism. An uproar caused Congress to cancel the TIA program a year later.
Echoes of a past controversial plan

ADVISE "looks very much like TIA," Mr. Tien of the Electronic Frontier Foundation writes in an e-mail. "There's the same emphasis on broad collection and pattern analysis."

But Mr. Sand, the DHS official, emphasizes that privacy protection would be built-in. "Before a system leaves the department there's been a privacy review.... That's our focus."

Some computer scientists support the concepts behind ADVISE.

"This sort of technology does protect against a real threat," says Jeffrey Ullman, professor emeritus of computer science at Stanford University. "If a computer suspects me of being a terrorist, but just says maybe an analyst should look at it ... well, that's no big deal. This is the type of thing we need to be willing to do, to give up a certain amount of privacy."

Others are less sure.

"It isn't a bad idea, but you have to do it in a way that demonstrates its utility - and with provable privacy protection," says Latanya Sweeney, founder of the Data Privacy Laboratory at Carnegie Mellon University. But since speaking on privacy at the 2004 DHS workshop, she now doubts the department is building privacy into ADVISE. "At this point, ADVISE has no funding for privacy technology."

She cites a recent request for proposal by the Office of Naval Research on behalf of DHS. Although it doesn't mention ADVISE by name, the proposal outlines data-technology research that meshes closely with technology cited in ADVISE documents.

Neither the proposal - nor any other she has seen - provides any funding for provable privacy technology, she adds.
Some in Congress push for more oversight of federal data-mining

Amid the furor over electronic eavesdropping by the National Security Agency, Congress may be poised to expand its scrutiny of government efforts to "mine" public data for hints of terrorist activity.

"One element of the NSA's domestic spying program that has gotten too little attention is the government's reportedly widespread use of data-mining technology to analyze the communications of ordinary Americans," said Sen. Russell Feingold (D) of Wisconsin in a Jan. 23 statement.

Senator Feingold is among a handful of congressmen who have in the past sponsored legislation - unsuccessfully - to require federal agencies to report on data-mining programs and how they maintain privacy.

Without oversight and accountability, critics say, even well-intentioned counterterrorism programs could experience mission creep, having their purview expanded to include non- terrorists - or even political opponents or groups. "The development of this type of data-mining technology has serious implications for the future of personal privacy," says Steven Aftergood of the Federation of American Scientists.

Even congressional supporters of the effort want more information about data-mining efforts.

"There has to be more and better congressional oversight," says Rep. Curt Weldon (R) of Pennsylvania and vice chairman of the House committee overseeing the Department of Homeland Security. "But there can't be oversight till Congress understands what data-mining is. There needs to be a broad look at this because they [intelligence agencies] are obviously seeing the value of this."

Data-mining - the systematic, often automated gleaning of insights from databases - is seen "increasingly as a useful tool" to help detect terrorist threats, the General Accountability Office reported in 2004. Of the nearly 200 federal data-mining efforts the GAO counted, at least 14 were acknowledged to focus on counterterrorism.

While privacy laws do place some restriction on government use of private data - such as medical records - they don't prevent intelligence agencies from buying information from commercial data collectors. Congress has done little so far to regulate the practice or even require basic notification from agencies, privacy experts say.

Indeed, even data that look anonymous aren't necessarily so. For example: With name and Social Security number stripped from their files, 87 percent of Americans can be identified simply by knowing their date of birth, gender, and five-digit Zip code, according to research by Latanya Sweeney, a data-privacy researcher at Carnegie Mellon University.

In a separate 2004 report to Congress, the GAO cited eight issues that need to be addressed to provide adequate privacy barriers amid federal data-mining. Top among them was establishing oversight boards for such programs.
Some antiterror efforts die - others just change names

Defense Department

November 2002 - The New York Times identifies a counterterrorism program called Total Information Awareness.

September 2003 - After terminating TIA on privacy grounds, Congress shuts down its successor, Terrorism Information Awareness, for the same reasons.

Department of Homeland Security

February 2003 - The department's Transportation Security Administration (TSA) announces it's replacing its 1990s-era Computer-Assisted Passenger Prescreening System (CAPPS I).

July 2004 - TSA cancels CAPPS II because of privacy concerns.

August 2004 - TSA says it will begin testing a similar system - Secure Flight - with built-in privacy features.

July 2005 - Government auditors charge that Secure Flight is violating privacy laws by holding information on 43,000 people not suspected of terrorism.
http://www.csmonitor.com/2006/0209/p...spo.html?s=hns





Some Companies Helped The NSA, But Which?
Declan McCullagh

This is the first in a two-part series. Coming Tuesday, part two: A glimpse at the technical details of how the National Security Agency's electronic surveillance system seems to work.

Even after the recent scrutiny of the National Security Agency's domestic surveillance project approved by President Bush, an intriguing question remains unanswered: Which corporations cooperated with the spy agency?

Some reports have identified executives at "major telecommunications companies" who chose to open their networks to the NSA. Because it may be illegal to divulge customer communications, though, not one has chosen to make its cooperation public.

Under federal law, any person or company who helps someone "intercept any wire, oral, or electronic communication"--unless specifically authorized by law--could face criminal charges. Even if cooperation is found to be legal, however, it could be embarrassing to acknowledge opening up customers' communications to a spy agency.

A survey by CNET News.com has identified 15 large telecommunications and Internet companies that are willing to say that they have not participated in the NSA program, which intercepts e-mail and telephone calls without a judge's approval.

Twelve other companies that were contacted and asked identical questions chose not to reply, in some cases citing "national security" as the reason.

Those results come amid a push on Capitol Hill for more information about the NSA's wiretapping practices. On Monday, Attorney General Alberto Gonzales is expected to testify at a Senate Judiciary Committee hearing, and President Bush and his closest allies have been stepping up their defense of the program in preparation for it.

To be sure, there are a number of possible explanations for the companies' silence. In some cases, a company's media department could have been overworked. Another possibility is the company's lawyers were unavailable or chose not to reply for unknown reasons.

Also, some survey recipients, such as NTT Communications, responded with a general statement expressing compliance "with law enforcement requests as permitted and required by law" rather than addressing the question of NSA surveillance.
Who's helping the NSA?

CNET News.com asked telecommunications and Internet companies about cooperation with the Bush administration's domestic eavesdropping scheme. We asked them: "Have you turned over information or opened up your networks to the NSA without being compelled by law?"

Company Response
Adelphia Communications Declined comment
AOL Time Warner No [1]
AT&T Declined comment
BellSouth Communications No
Cable & Wireless* No response
Cablevision Systems No
CenturyTel No
Charter Communications No [1]
Cingular Wireless No [2]
Citizens Communications No response
Cogent Communications* No [1]
Comcast No
Cox Communications No
EarthLink No
Global Crossing* Inconclusive
Google Declined comment
Level 3* No response
Microsoft No [3]
NTT Communications* Inconclusive [4]
Qwest Communications No [2]
SAVVIS Communications* No response
Sprint Nextel No [2]
T-Mobile USA No [2]
United Online No response
Verizon Communications Inconclusive [5]
XO Communications* No [1]
Yahoo Declined comment

* = Not a company contacted by Rep. John Conyers.
[1] The answer did not explicitly address NSA but said that compliance happens only if required by law.
[2] Provided by a source with knowledge of what this company is telling Conyers. In the case of Sprint Nextel, the source was familiar with Nextel's operations.
[3] As part of an answer to a closely related question for a different survey.
[4] The response was "NTT Communications respects the privacy rights of our customers and complies fully with law enforcement requests as permitted and required by law."
[5] The response was "Verizon complies with applicable laws and does not comment on law enforcement or national security matters."


A lawsuit that could yield more details about industry cooperation is winding its way through the federal courts. Last week, the Electronic Frontier Foundation, a civil liberties group based in San Francisco, sued AT&T after a report that the company had shared its customer records database--though not its network--with the NSA.

AT&T would not respond when asked whether it participated. An AT&T spokesman, Dave Pacholczyk, said: "We don't comment on matters of national security."

The News.com survey, started Jan. 25, found that wireless providers and cable companies were the most likely to distance themselves from the NSA. Cingular Wireless, Comcast, Cox Communications, Sprint Nextel and T-Mobile said they had not turned over information or opened their networks to the NSA without being required by law.

Companies that are backbone providers, or which operate undersea cables spanning the ocean, were among the least likely to respond. AT&T, Cable & Wireless, Global Crossing, Level 3, NTT Communications, SAVVIS Communications and Verizon Communications chose not to answer the questions posed to them.

The New York Times reported on Dec. 24 that the NSA has gained access to switches that act as gateways at the borders between the United States' communications networks and international networks. But "the identities of the corporations involved could not be determined," the newspaper added.

At the water's edge
Analysts and historians who follow the intelligence community have long said the companies that operate submarine cables--armored sheaths wrapped around bundles of fiber optic lines--surreptitiously provide access to the NSA.

"You go to Global Crossing and say...once your cable comes up for air in New Jersey or on the coast of Virginia, wherever it goes up, we want to put a little splice in, thank you very much, which NSA can do," said Matthew Aid, who recently completed the first volume in a multiple-volume history of the NSA. "The technology of getting access to that stuff is fairly straightforward."

Aid was citing Global Crossing as an example, not singling it out. Global Crossing describes itself as an Internet backbone network that shuttles traffic for about 700 telecommunications carriers, mobile operators and Internet service providers. According to the International Cable Protection Committee, the company has full or partial ownership of several trans-Atlantic and trans-Pacific cables. Global Crossing spokesman Tom Topalian said "99 percent of wiretapping is done at a local phone company level" instead of at backbone providers. Topalian declined to answer questions about NSA access, and added: "All U.S. carriers have to comply with the CALEA act, and Global Crossing complies with CALEA." (CALEA is a 1994 federal law requiring certain telecommunications providers to make their networks wiretap-friendly for domestic law enforcement, not intelligence agencies.)

Rep. John Conyers, D-Mich., last month sent a letter (click for PDF) to companies including Google, Yahoo, EarthLink, Verizon and T-Mobile asking them if they cooperated with the NSA. News.com asked similar questions, but expanded the number of companies to include backbone and submarine cable providers.

Among the companies that responded, some offered far more detail than others. Les Seagraves, EarthLink's chief privacy officer, said: "We've never even been asked to give information without the benefit of a subpoena or a court order behind it. And our policy is to require a subpoena or court order, basically to require a court of law behind the inquiry."

"We're very interested in protecting our customers' privacy and balancing that with our duties to comply with the law," Seagraves added. "Our way to balance that is to definitely make sure we have a valid legal request before we release any information."

Comcast spokesman Tim Fitzpatrick said the company "will only provide customer information pursuant to a valid court order and only if Comcast's records contain information sufficient to identify the customer account on the (date or dates) listed in the court order."

A representative of Cox Communications, David Grabert, said: "Cox has never received a request for information or a wiretap that was not accompanied by a warrant."

NSA's history of industry deals
Louis Tordella, the longest-serving deputy director of the NSA, acknowledged to overseeing a similar project to intercept telegrams as recently as the 1970s. It relied on the major telegraph companies including Western Union secretly turning over copies of all messages sent to or from the United States.

"All of the big international carriers were involved, but none of 'em ever got a nickel for what they did," Tordella said before his death in 1996, according to a history written by L. Britt Snider, a Senate aide who became the CIA's inspector general.

The telegraph interception operation was called Project Shamrock. It involved a courier making daily trips from the NSA's headquarters in Fort Meade, Md., to New York to retrieve digital copies of the telegrams on magnetic tape.

Like today's eavesdropping system authorized by Bush, Project Shamrock had a "watch list" of people in the U.S. whose conversations would be identified and plucked out of the ether by NSA computers. It was intended to be used for foreign intelligence purposes.

Then-President Richard Nixon, plagued by anti-Vietnam protests and worried about foreign influence, ordered that Project Shamrock's electronic ear be turned inward to eavesdrop on American citizens. In 1969, Nixon met with the heads of the NSA, CIA and FBI and authorized a program to intercept "the communications of U.S. citizens using international facilities," meaning international calls, according to James Bamford's 2001 book titled "Body of Secrets."

Nixon later withdrew the formal authorization, but informally, police and intelligence agencies kept adding names to the watch list. At its peak, 600 American citizens appeared on the list, including singer Joan Baez, pediatrician Benjamin Spock, actress Jane Fonda and the Rev. Martin Luther King Jr.

Details about Project Shamrock became public as part of a Senate investigation of the NSA. Telegraph companies participating in the program initially balked when questioned by Senate investigators. But documents turned over by the NSA "cast doubt on the veracity of the companies' claims that they could find no documentation pertaining to Shamrock," wrote Snider. "After all, this had concerned the highest levels of their corporate management for at least four years."

Another apparent example of NSA and industry cooperation became public in 1995. The Baltimore Sun reported that for decades NSA had rigged the encryption products of Crypto AG, a Swiss firm, so U.S. eavesdroppers could easily break their codes.

The six-part story, based on interviews with former employees and company documents, said Crypto AG sold its compromised security products to some 120 countries, including prime U.S. intelligence targets such as Iran, Iraq, Libya and Yugoslavia. (Crypto AG disputed the allegations.)

"Only a very few top executives"
The extent of the NSA's surveillance project in operation today remains unclear. Attorney General Gonzales has stressed that the program intercepts e-mail and phone conversations only when "one party to the communication is outside the United States."

In his book titled "State of War," New York Times reporter James Risen wrote: "The NSA has extremely close relationships with both the telecommunications and computer industries, according to several government officials. Only a very few top executives in each corporation are aware of such relationships."

Tapping into undersea copper and fiber-optic cables where they make landfall would be one way to create a virtual web of surveillance that can snare Internet packets or voice communications when they traverse U.S. borders. One benefit for the government is that one participant in the conversation is likely to be overseas--permitting Gonzales and the NSA to stress the interception's international nature.

Another method would be to seek the cooperation of backbone providers with networks entirely within the United States. That could be done with a tap hooked up to the switches at a telephone company or backbone provider, said Phill Shade, a network engineer for WildPackets who is the company's director of international support services. WildPackets sells network analysis software.

"The tap essentially splits off a copy of the traffic--it would literally take a copy of all the traffic as it moves through the wire," Shade said. "Picture a capital letter 'Y' in your head...One copy goes back out the regular wire on the right side of the wire, and the copy you're interested in splitting goes off the left side of the Y to you. These are very common networking devices, used in networks all over the world."

The tap's exact location may matter. Sen. Arlen Specter, a Pennsylvania Republican who is convening Monday's hearing, has asked Gonzales to respond to a series of questions about the legality of the program. One question Specter is posing: If intercepted calls are "routed through switches which were physically located on U.S. soil, would that constitute a violation of law or regulation restricting NSA from conducting surveillance inside the United States?"
http://news.com.com/Some+companies+h...3-6035305.html





More Surveillance Puts Strain on Carriers

Third parties help telecom, Internet firms fill law enforcement's increasing data requests
Christopher Rhoads

After the 2001 terrorist attacks, retired Federal Bureau of Investigation agent Michael Warren saw that many phone and Internet companies would need help meeting an expected jump in law-enforcement requests for customer calling and email information.

His prediction proved correct. Mr. Warren formed a company that won business from telecom, cable and Internet-service providers around the U.S. Last year, he sold the business for an undisclosed amount.

"There's been a significant increase in demand and pressure on companies for providing records, tracing calls and wiretapping," said Mr. Warren, now a vice president for fiduciary services at NeuStar Inc. of Sterling, Va., which bought his company. "That's led to a great deal of strain on carriers."

Often overlooked amid the controversy over the legality of the Bush administration's eavesdropping without warrants is a huge increase in recent years in the number of wiretaps conducted with court approval. Smaller telecom companies in particular have sought help from outsiders in order to comply with the court-ordered subpoenas, touching off a scramble among third parties to meet the demand for assistance.

VeriSign Inc., the communications company in Mountain View, Calif., that manages the Internet's .com and .net domain-name suffixes, entered the assistance business after the Sept. 11, 2001, terrorist attacks. SS8 Networks Inc., a San Jose, Calif.-based company, in 2001 morphed its business into one that helps others deal with law-enforcement requests, after starting as an Internet-phone-equipment company a couple of years earlier.

The number of telephone wiretaps from 2000 to 2004 authorized by state and federal judges increased by 44% to 1,710, according to the latest annual report from the Administrative Office of the U.S. Courts. The vast bulk of the wiretaps related to drug and racketeering investigations, according to the report. But terrorism and other national-security investigations also helped drive the increase, according to security experts and service providers.

CenturyTel Inc., a fixed-line phone company and Internet-service provider based in Monroe, La., serving 2.5 million customers, received about 1,500 subpoenas and court orders for customer data last year, said Stacey Goff, CenturyTel's chief legal counsel.

Almost 20% of those related to national-security matters, about double the percentage of such requests from a year earlier, he said. The overall number of requests from law enforcement for customer information has nearly doubled from about five years ago, Mr. Goff added.

"A few years ago it was drugs and divorces, that was it," said Mr. Goff. "Now, we're getting requests on more-sensitive matters."

Companies assisting carriers handling the increased law-enforcement demands typically sell software that simplifies the process of reviewing tens of thousands of phone-call records. Some third parties also provide assistance by setting up in-house compliance procedures, interacting with law-enforcement agencies and providing access to networks for wiretaps.

Smaller telecom, cable and Internet companies generally haven't received requests from the National Security Agency, the super-sensitive U.S. intelligence-gathering arm, for customer data without warrants, officials at smaller companies say. Such NSA requests -- which are at the core of the domestic eavesdropping debate -- have been aimed at large international telecom companies, which tend to handle government and law-enforcement matters in-house.

Big telecom companies in the U.S. were required under the 1994 Communications Assistance for Law Enforcement Act to install equipment to help law enforcement keep up with advances in technology, such as the rise of cellular, the switch to digital technology from analog and new features such as call forwarding.

Now, Internet providers must also comply with the act. The Patriot Act, passed after the 2001 terrorist attacks, took matters a step further, giving law-enforcement agencies powers to monitor individuals and all the ways they communicate, rather than being limited to a specific communication device.

Government surveillance has intensified even more heavily overseas, particularly in Europe. Some countries, such as Italy, as well as government and law-enforcement agencies, are able to remotely monitor communications traffic without having to go through the individual service providers.

To make it easier for authorities to monitor traffic, some also require registering with identification before buying telephone calling cards or using cybercafes.
http://online.wsj.com/public/article...html?mod=blogs





Israeli Startup Develops Faster DSP for Multichannel Video Compression
Joel Bainerman

The Israeli startup Lenslet has developed a revolutionary electro-optic processor that hits the unprecedented speed of 8 tera calculation operations/second — one thousand times faster than any known digital signal processor.

The company struck a strategic co-operation agreement with Paltek Corp. of Japan for its Enlight processor in the Japanese market, in November 2003. The company was also included on the Silicon60 list of emerging companies in April and October 2004.

The EnLight processor, will be used for intelligence, analysis of intelligence, weather forecasting, airport security, and for multimedia, cellular and video compression applications. The EnLight256 — the first in a line of ultrafast DSPs — can be used for voice analysis, face recognition, image processing and other applications. The device will improve detection and extraction of image and audio features, as well as such parameters as behavioral analysis. Moreover, it will allow reliable automated screening of a massive amount of data to help identify potential threats.

"This quantum leap in computation performance, enabled by optical processing, opens the door to new capabilities in the battlefield of the future, creating strategic implications,” said Major-General Isaac Ben-Israel, former head of the R&D Directorate of the Israeli Ministry of Defense. “It could revolutionize the nature of warfare with an effect similar to that caused by the appearance of the tank or the airplane."

Some potential benefits include enhanced communications in noisy channels, multichannel interference cancellation, multiprotocol receiver (SDR), improved resolution and image for SAR radars, digital beam-forming, enhanced signal detection in EW/RWR systems, and multichannel video compression and processing at high image resolutions (H.264 compression for multi HDTV channels).

In homeland security, applications include improved throughput and detection accuracy for baggage scanning, as well as multisensor threat analysis.
http://www.digitaltvdesignline.com/n...CKH0CJUMEKJVNb





Holograms Help Protect Super Bowl
Greg Sandoval

The U.S. government will deploy a new "Star Wars-like" hologram technology to help safeguard the Super Bowl on Sunday.

As agents for Homeland Security monitor the dozens of security cameras mounted in Detroit's Ford Field, they'll see the images in three dimensions, according to James Fischbach, CEO of Intrepid Defense & Security Systems, the company that developed the LifeVision3D system.

Holograms help authorities see images more clearly, Fischbach said.

LifeVision will be used to search sidewalks, monitor faces in the enormous Super Bowl crowd and peer under vehicles.

Holograms are favorites of science-fiction filmmakers. Perhaps the best known is the hologram of Princess Leia that the android R2-D2 projected in the film "Star Wars." Today, simple holograms are internal, and are used on credit cards and children's stickers, in numerous industrial applications and sometimes even in the fine arts.

But LifeVision's images are of the more complex "Star Wars" variety, said Fischbach, who founded his company at the request of the Department of Defense. Before moving into holograms, Fischbach was behind the launch of fiber-optics company Intrepid World Communications, in 1992.

LifeVision uses streams from two cameras, which act as the left and right eyes, to project 3D images onto a 20-inch screen. The monitors used are equipped with a depth tube that presents images that appear to rise 30 inches from the screen and sink another 30 inches into the screen, Fischbach said. Real-world volumes and distances are displayed accurately.

No special goggles or glasses are needed.

"For the military, it can offer much better facial recognition," Fischbach said. "Instead of looking at a two-dimensional photo, you're looking at an entire head."

Fischbach says LifeVision can help surgeons peer into the human body with much more accuracy. He's helped hone the talents of Nascar drivers by creating racing simulations and is in talks with an entertainment company to present a hologram of a rock concert inside a department store.

So how long before the public can send holograms like the one sent by Princess Leia?

"If George Lucas had four cameras on her when he shot it, I could take them and present a real-world image of her right now," Fischbach said.
http://news.com.com/Holograms+help+p...3-6035042.html





Increasingly, Internet's Data Trail Leads to Court
Saul Hansell

Who is sending threatening e-mail to a teenager? Who is saying disparaging things about a company on an Internet message board? Who is communicating online with a suspected drug dealer?

These questions, and many more like them, are asked every day of the companies that provide Internet service and run Web sites. And even though these companies promise to protect the privacy of their users, they routinely hand over the most intimate information in response to legal demands from criminal investigators and lawyers fighting civil cases.

Such data led directly to a suspect in a school bombing threat; it has also been used by the authorities to track child pornographers and computer intruders, and has become a tool in civil cases on matters from trade secrets to music piracy. In St. Louis, records of a suspect's online searches for maps proved his undoing in a serial-killing case that had gone unsolved for a decade.

In short, just as technology is prompting Internet companies to collect more information and keep it longer than before, prosecutors and civil lawyers are more readily using that information.

When it comes to e-mail and Internet service records, "the average citizen would be shocked to find out how adept your average law enforcement officer is at finding information," said Paul Ohm, who recently left the Justice Department's computer crime and intellectual property section.

The issue has come to the fore because of a Justice Department request to four major Internet companies for data about their users' search queries. While America Online, Yahoo and Microsoft complied with the request, Google is resisting it. That case does not involve information that can be linked to individuals, but it has cast new light on what privacy, if any, Internet users can expect for the data trail they leave online.

The answer, in many cases, is clouded by ambiguities in the law that governs electronic communication like telephone calls and e-mail. In many cases, the law requires law enforcement officials to meet a higher standard to read a person's e-mail than to get copies of his financial or medical records.

Requests for information have become so common that most big Internet companies, as well as telephone companies, have a formal process for what is often called subpoena management. Most of the information sought about users is basic, but very personal: their names, where they live, when they were last online — and, if a court issues a search warrant, what they are writing and reading in their e-mail. (Not surprisingly, the interpretation of voluminous computer records can be error-prone, and instances of mistaken identity have also come to light.)

AOL, for example, has more than a dozen people, including several former prosecutors, handling the nearly 1,000 requests it receives each month for information in criminal and civil cases. The most common requests in criminal cases relate to children — threats, abductions and pornography. Next come cases of identity theft, then computer hacking. But with more than 20 million customers, AOL has been called on to help in nearly every sort of legal action.

In recent years, "we found ourselves involved in every imaginable classification of traditional crimes, from murder to the whole scope of criminal behavior, because AOL was used to communicate or there is some trace evidence," said Christopher Bubb, assistant general counsel at AOL.

Investigators have found new ways to identify people who visit Web sites anonymously or use a false identity. Many Web sites keep a log of all user activity, and they record the Internet Protocol address of each user. I.P. addresses are assigned in blocks to Internet service providers, who use them to route information to the computers of their users. If an investigator determines the I.P. address used by a suspect, he can subpoena the Internet provider for the identity of the user associated with that address at a particular date and time.

For example, in investigating a bomb threat at a Canadian high school in 2002, Mr. Ohm approached the operator of a message board in California on which the threats were placed. He asked to review the log monitoring each user's activities, which showed the Internet Protocol address of the person who left the threatening message. Mr. Ohm used that address in turn to determine the suspect's Internet service provider, who identified a teenager who had posted the message. (As a minor, he was not prosecuted.)

While Internet evidence has been used to solve some crimes, there have also been examples of mistakes in the process. Last year, Manchester Technologies, a company in Hauppauge, N.Y., sued Ronald Kuhlman Jr. and Kim Loviglio, claiming they had posted messages on a Web site that defamed its chief executive.

Manchester had identified Mr. Kuhlman and Ms. Loviglio based on information provided by Cablevision, their Internet provider, which incorrectly associated their account with the Internet Protocol address used to make the postings. Manchester dropped its suit against Mr. Kuhlman and Ms. Loviglio, who in turn sued Cablevision. That case was settled for undisclosed terms, their lawyer, Mark Murray, said.

The 1996 law that governs privacy for telephones, Internet use and faxes — the Electronic Communications Privacy Act — provides varying degrees of protection for online information. It generally requires a court order for investigators to read e-mail, although the law is inconsistent on this, treating unopened items differently from those previously read. The standard to compel an Internet service provider to provide identifying information about an Internet user is lower — in general, an investigator needs a subpoena, which can be signed by a prosecutor, not a judge. (And the USA Patriot Act allows some of these procedures to be waived when lives are at risk.) By comparison, domestic first-class mail requires a search warrant to be opened.

In cases in which investigators want to intercept Internet communication as it occurs, they must get the same authorization needed for a telephone wiretap, which requires continuing court monitoring. In 2004, there were 49 cases of computer or fax transmissions being monitored under these procedures, according to federal statistics (which exclude national security cases).

Mr. Ohm, now an associate professor at the University of Colorado Law School, said those statistics undercounted the instances of such monitoring, especially cases in which an Internet company was tracing attacks on its own system.

"The Wiretap Act has enough loopholes built into it that you can often do a wiretap without having to get a court order," he said.

The law for civil cases, like divorces or employment disputes, is also a bit unclear. Litigants can generally subpoena the identifying information of a user behind an e-mail account or an I.P. address.

AOL says that only 30 of the 1,000 monthly requests it receives are for civil cases, and that it initially rejects about 90 percent of those, arguing that they are overly broad or that the litigants lack proper jurisdiction. About half of those rejected are resubmitted, on narrower grounds. Generally, AOL gives its members notice when their information is sought in civil cases. If the member objects, the issue is referred back to the court. (In criminal cases, there is often no notice, or notice is given after the information has been given to investigators.)

"Subpoenas come in all the time that ask for everything," said Kelly Skoloda, an AOL lawyer. "We engage in an active dialogue to determine what they want and what we can give in compliance with our privacy policies."

AOL and most other Internet providers take the view that the content of e-mail messages cannot be turned over to lawyers in civil suits. The most significant exception is that e-mail can be turned over with the consent of the account owner, and litigants often persuade judges to order their opponents to authorize the disclosure of e-mail.

A gray area that has recently gained prominence involves the pages that users read online and the terms of their searches.

Yahoo, Google and the new free AOL.com site, for example, maintain records of user surfing behavior. Google also keeps a log file that associates every search made on its site with the I.P. address of the searcher. And Yahoo uses similar information to sell advertising; car companies, for example, place display advertising shown only to people who have entered auto-related terms in Yahoo's search engine.

It is unclear what standard is required to force Internet companies to turn over this search information to criminal investigators and perhaps civil litigants.

"The big story is the privacy law that protects your e-mail does not protect your Google search terms," said Orin S. Kerr, a professor at the George Washington University Law School and a former lawyer in the computer crime section of the Justice Department.

Other lawyers argue that the law that provides protection for e-mail content, or even the Fourth Amendment protection against unreasonable searches, could be applied to data about Web searching, but the issue has not been tested in court.

The break in the St. Louis murders came in 2002, when a reporter received an anonymous letter with a map generated by Microsoft's MSN service — marked with the location where a body could be found.

The F.B.I. subpoenaed Microsoft for records of anyone who had searched for maps of that area in the days before the letter was sent. Microsoft discovered that only one user had searched for precisely that area and provided the user's Internet Protocol address. That address, in turn was provided by a unit of WorldCom, which identified the user as Maury Troy Travis, a 36-year-old waiter. (Mr. Travis was arrested and hanged himself in jail without ever admitting guilt.)

While requests for search data have been few, computer experts expect them to increase.

"It is rare that those links will be a slam-dunk that will make a case," said John Curran, a former cybercrime investigator for the F.B.I. "But when you are putting together a larger case, you are trying to connect the dots, and it is the little things that actually help."
http://www.nytimes.com/2006/02/04/te...04privacy.html





Surveillance Prompts a Suit: Police v. Police
Jim Dwyer

The demonstrators arrived angry, departed furious. The police had herded them into pens. Stopped them from handing out fliers. Threatened them with arrest for standing on public sidewalks. Made notes on which politicians they cheered and which ones they razzed.

Meanwhile, officers from a special unit videotaped their faces, evoking for one demonstrator the unblinking eye of George Orwell's "1984."

"That's Big Brother watching you," the demonstrator, Walter Liddy, said in a deposition.

Mr. Liddy's complaint about police tactics, while hardly novel from a big-city protester, stands out because of his job: He is a New York City police officer. The rallies he attended were organized in the summer of 2004 by his union, the Patrolmen's Benevolent Association, to protest the pace of contract talks with the city.

Now the officers, through their union, are suing the city, charging that the police procedures at their demonstrations — many of them routinely used at war protests, antipoverty marches and mass bike rides — were so heavy-handed and intimidating that their First Amendment rights were violated.

A lawyer for the city said the police union members were treated no differently than hundreds of thousands of people at other gatherings, with public safety and free speech both protected. The department observes all constitutional requirements, the city maintains.

The lawsuit by the police union brings a distinctive voice to the charged debate over how the city has monitored political protest since Sept. 11. The off-duty officers faced a "constant threat of arrest," Officer Liddy testified, all but echoing the complaint by activists for other causes that the city has effectively "criminalized dissent."

The lawsuit is one of three recent legal actions in which the city has been accused of abuses of power that the plaintiffs say crimped free expression, a charge that officials say is belied by the reality of noisy sidewalks and streets, crammed year-round with parades and rallies.

At the core of all three cases are questions about the expanded powers the police were granted after the 2001 attacks, and how much the department needs to know about the politics of people who are expressing their views.

In 2003, a federal judge eased longstanding and strict limits on surveillance of political activity at the request of lawyers from the city's corporation counsel office, who argued that the Police Department needed broader authority to use such tactics to fight terrorism.

Since then, police officers in disguise have taken part in demonstrations, an approach the Police Department says it used before receiving the expanded powers; other officers have made hundreds of hours of videotapes of people involved in protests and rallies, very few of whom were charged with breaking any law. Neither form of surveillance, the city argues, violates the Constitution.

The three pending cases — two of them brought by civil liberties lawyers and the third by the police union — are the first to demand judicial scrutiny of those tactics.

Among those three, the police union was the earliest to challenge the city, and its case has the most striking dynamic: the very people asked to fight terrorism are claiming that the city's new antiterrorism tools have been bluntly and illegally applied to the exercise of their own civil rights.

"It puts the whole issue into stark relief," said Elizabeth McNamara, a lawyer who represents the P.B.A. and other unions in the suit.

In July and August 2004, a few dozen off-duty officers — joined at times by firefighters — popped up at places where Mayor Michael R. Bloomberg was scheduled to appear, chanting and handing out leaflets about labor negotiations.

The unions maintain that their demonstrations, in the weeks before the 2004 Republican National Convention opened in New York, embarrassed the mayor just as the national press corps was turning its attention to the city, and that the Police Department responded by cracking down. They are seeking a court declaration that their rights have been violated, as well as damages.

Lawyers for the city say that police union members pestered truck drivers making deliveries, obstructed sidewalks near the mayor's home, and taunted the mayor's press secretary by saying they knew where he lived. The Police Department, the city lawyers say, is neutral about political messages and used barricades and other crowd control methods only to protect the rights of the public and to keep order.

However, the police union said it had uncovered evidence that the department took a keen interest in what the demonstrators were saying, not just how they said it.

During a deposition of the chief of department, Joseph Esposito, who is the department's top uniformed official, Ms. McNamara read parts of a report prepared by the department's Internal Affairs Bureau, which noted that the protesters included members of the Police and Fire Department unions.

"In Paragraph 4, it says that members of both departments called out to the mayor for pay raises," Ms. McNamara said, according to the court transcript, "In Paragraph 5, it notes that the protesters clapped and cheered when former Mayor Koch appeared."

She asked, "What would be the basis for them recording the content of the protesters' demonstrations?"

Chief Esposito responded, "Just to record what they observed."

At a hearing in Federal District Court in Manhattan, Ms. McNamara said the videotaping was punitive. "There was no basis whatsoever for employing the Internal Affairs Division to videotape the police officers except as a means of political harassment," she said. "There wasn't suspicion of criminal activity."

Mark Muschenheim, a lawyer for the city, said that Police Commissioner Raymond W. Kelly ordered the videotaping for legitimate reasons. "There were threats made to the mayor's press secretary during these demonstrations," Mr. Muschenheim said. "That was a decision made by the police commissioner because the demonstrations were getting out of hand."

At Chief Esposito's deposition, Ms. McNamara asked, "Would there be any reason, to your knowledge, for them to be taping the protest to zoom in and individually photograph each officer at the protest?"

"I don't know," he replied.

"Do you know any legitimate reason for such documentation of individuals at the protest?" Ms. McNamara asked.

The chief replied, "Document presence for further identification in the event there was misconduct."

No criminal activity or misconduct was observed at the union demonstrations, Charles Campisi, the chief of the Internal Affairs Bureau, testified, but the videotapes will remain on file. "The purpose of keeping records is to document the observations, what you've done," he said.

In 2003, a federal judge found that the Police Department had scrutinized the beliefs of antiwar protesters without legitimate reason. After antiwar rallies in February and March 2003, 12 people who were arrested said they were questioned on their political thinking by detectives.

Police officials said basic information was needed for a database that would identify centers of protest organization to help deploy officers at future demonstrations. When the practice was made public, Commissioner Kelly said that while he did not know about it, there was nothing unconstitutional about the questioning. Nevertheless, he said the information was not needed.

The dozen people who submitted affidavits said the interrogations went far beyond basics. Among the questions, they said, was whether the country would be better off if Al Gore had been elected, whether they hated President Bush, whether they belonged to other antiwar groups, what schools they attended, and whether they were politically active. The police denied asking those questions.

The judge, Charles S. Haight of Federal District Court in Manhattan, noting that all the protesters gave roughly the same version of events, said he believed that they were telling the truth, even if Commissioner Kelly and his deputy for intelligence, David Cohen, were not aware of the practice.

In the P.B.A.'s lawsuit, now in pretrial proceedings, Ms. McNamara tried to show that it was unusual for the Internal Affairs Bureau to keep an eye on off-duty police officers. If a group of police officers were going to have "a baseball game, would I.A.B. be called in to monitor to see whether they might engage in illegal activity?" Ms. McNamara asked Chief Esposito.

"Generally speaking, no," he replied.

Asked if Internal Affairs officers with video cameras might intimidate an officer, Chief Esposito said, "I don't think so."

However, Joseph Alejandro, a police officer and union official, testified about the videotaping, "It sends a chill down a police officer's back to think that Internal Affairs would be taping something."

Although city lawyers have not yet addressed the claims in the union's lawsuit at any length, they argued in a related case that the police should be allowed to make and keep videotapes of political gatherings. A group of civil rights lawyers charged that such videotaping violated a standing court order that settled a class action lawsuit, known as Handschu, that put limits on police surveillance. Many of those limits were eased in 2003. The city says that nothing in the United States Constitution forbids police videotaping of people in a public place.

"Even if the N.Y.P.D. were to identify the person whose images were captured on videotape, or disseminated the photographs to other police agencies, a constitutional violation has not occurred," wrote Gail Donoghue, a senior city lawyer.
http://www.nytimes.com/2006/02/03/ny.../03police.html





Surveillance Net Yields Few Suspects

NSA's Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared
Barton Gellman, Dafna Linzer and Carol D. Leonnig

Intelligence officers who eavesdropped on thousands of Americans in overseas calls under authority from President Bush have dismissed nearly all of them as potential suspects after hearing nothing pertinent to a terrorist threat, according to accounts from current and former government officials and private-sector sources with knowledge of the technologies in use.

Bush has recently described the warrantless operation as "terrorist surveillance" and summed it up by declaring that "if you're talking to a member of al Qaeda, we want to know why." But officials conversant with the program said a far more common question for eavesdroppers is whether, not why, a terrorist plotter is on either end of the call. The answer, they said, is usually no.

Fewer than 10 U.S. citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.

The Bush administration refuses to say -- in public or in closed session of Congress -- how many Americans in the past four years have had their conversations recorded or their e-mails read by intelligence analysts without court authority. Two knowledgeable sources placed that number in the thousands; one of them, more specific, said about 5,000.

The program has touched many more Americans than that. Surveillance takes place in several stages, officials said, the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, e-mails and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears.

Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, "wash out" most of the leads within days or weeks.

The scale of warrantless surveillance, and the high proportion of bystanders swept in, sheds new light on Bush's circumvention of the courts. National security lawyers, in and out of government, said the washout rate raised fresh doubts about the program's lawfulness under the Fourth Amendment, because a search cannot be judged "reasonable" if it is based on evidence that experience shows to be unreliable. Other officials said the disclosures might shift the terms of public debate, altering perceptions about the balance between privacy lost and security gained.

Air Force Gen. Michael V. Hayden, the nation's second-ranking intelligence officer, acknowledged in a news briefing last month that eavesdroppers "have to go down some blind alleys to find the tips that pay off." Other officials, nearly all of whom spoke on the condition of anonymity because they are not permitted to discuss the program, said the prevalence of false leads is especially pronounced when U.S. citizens or residents are surveilled. No intelligence agency, they said, believes that "terrorist . . . operatives inside our country," as Bush described the surveillance targets, number anywhere near the thousands who have been subject to eavesdropping.

The Bush administration declined to address the washout rate or answer any other question for this article about the policies and operations of its warrantless eavesdropping.

Vice President Cheney has made the administration's strongest claim about the program's intelligence value, telling CNN in December that eavesdropping without warrants "has saved thousands of lives." Asked about that Thursday, Hayden told senators he "cannot personally estimate" such a figure but that the program supplied information "that would not otherwise have been available." FBI Director Robert S. Mueller III said at the same hearing that the information helped identify "individuals who were providing material support to terrorists."

Supporters speaking unofficially said the program is designed to warn of unexpected threats, and they argued that success cannot be measured by the number of suspects it confirms. Even unwitting Americans, they said, can take part in communications -- arranging a car rental, for example, without knowing its purpose -- that supply "indications and warnings" of an attack. Contributors to the technology said it is a triumph for artificial intelligence if a fraction of 1 percent of the computer-flagged conversations guide human analysts to meaningful leads.

Those arguments point to a conflict between the program's operational aims and the legal and political limits described by the president and his advisers. For purposes of threat detection, officials said, the analysis of a telephone call is indifferent to whether an American is on the line. Since Sept. 11, 2001, a former CIA official said, "there is a lot of discussion" among analysts "that we shouldn't be dividing Americans and foreigners, but terrorists and non-terrorists." But under the Constitution, and in the Bush administration's portrait of its warrantless eavesdropping, the distinction is fundamental.

Valuable information remains valuable even if it comes from one in a thousand intercepts. But government officials and lawyers said the ratio of success to failure matters greatly when eavesdropping subjects are Americans or U.S. visitors with constitutional protection. The minimum legal definition of probable cause, said a government official who has studied the program closely, is that evidence used to support eavesdropping ought to turn out to be "right for one out of every two guys at least." Those who devised the surveillance plan, the official said, "knew they could never meet that standard -- that's why they didn't go through" the court that supervises the Foreign Intelligence Surveillance Act, or FISA.

Michael J. Woods, who was chief of the FBI's national security law unit until 2002, said in an e-mail interview that even using the lesser standard of a "reasonable basis" requires evidence "that would lead a prudent, appropriately experienced person" to believe the American is a terrorist agent. If a factor returned "a large number of false positives, I would have to conclude that the factor is not a sufficiently reliable indicator and thus would carry less (or no) weight."

Bush has said his program covers only overseas calls to or from the United States and stated categorically that "we will not listen inside this country" without a warrant. Hayden said the government goes to the intelligence court when an eavesdropping subject becomes important enough to "drill down," as he put it, "to the degree that we need all communications."

Yet a special channel set up for just that purpose four years ago has gone largely unused, according to an authoritative account. Since early 2002, when the presiding judge of the federal intelligence court first learned of Bush's program, he agreed to a system in which prosecutors may apply for a domestic warrant after warrantless eavesdropping on the same person's overseas communications. The annual number of such applications, a source said, has been in the single digits.

Many features of the surveillance program remain unknown, including what becomes of the non-threatening U.S. e-mails and conversations that the NSA intercepts. Participants, according to a national security lawyer who represents one of them privately, are growing "uncomfortable with the mountain of data they have now begun to accumulate." Spokesmen for the Bush administration declined to say whether any are discarded.

New Imperatives

Recent interviews have described the program's origins after Sept. 11 in what Hayden has called a three-way collision of "operational, technical and legal imperatives."

Intelligence agencies had an urgent mission to find hidden plotters before they could strike again.

About the same time, advances in technology -- involving acoustic engineering, statistical theory and efficient use of computing power to apply them -- offered new hope
of plucking valuable messages from the vast flow of global voice and data traffic. And rapidly changing commercial trends, which had worked against the NSA in the 1990s as traffic shifted from satellites to fiber-optic cable, now presented the eavesdroppers with a gift. Market forces were steering as much as a third of global communications traffic on routes that passed through the United States.

The Bush administration had incentive and capabilities for a new kind of espionage, but 23 years of law and White House policy stood in the way.

FISA, passed in 1978, was ambiguous about some of the president's plans, according to current and retired government national security lawyers. But other features of the eavesdropping program fell outside its boundaries.

One thing the NSA wanted was access to the growing fraction of global telecommunications that passed through junctions on U.S. territory. According to former senator Bob Graham (D-Fla.), who chaired the Intelligence Committee at the time, briefers told him in Cheney's office in October 2002 that Bush had authorized the agency to tap into those junctions. That decision, Graham said in an interview first reported in The Washington Post on Dec. 18, allowed the NSA to intercept "conversations that . . . went through a transit facility inside the United States."

According to surveys by TeleGeography Inc., nearly all voice and data traffic to and from the United States now travels by fiber-optic cable. About one-third of that volume is in transit from one foreign country to another, traversing U.S. networks along its route. The traffic passes through cable landing stations, where undersea communications lines meet the East and West coasts; warehouse-size gateways where competing international carriers join their networks; and major Internet hubs known as metropolitan area ethernets.

Until Bush secretly changed the rules, the government could not tap into access points on U.S. soil without a warrant to collect the "contents" of any communication "to or from a person in the United States." But the FISA law was silent on calls and e-mails that began and ended abroad.

Even for U.S. communications, the law was less than clear about whether the NSA could harvest information about that communication that was not part of its "contents."

"We debated a lot of issues involving the 'metadata,' " one government lawyer said. Valuable for analyzing calling patterns, the metadata for telephone calls identify their origin, destination, duration and time. E-mail headers carry much the same information, along with the numeric address of each network switch through which a message has passed.

Intelligence lawyers said FISA plainly requires a warrant if the government wants real-time access to that information for any one person at a time. But the FISA court, as some lawyers saw it, had no explicit jurisdiction over wholesale collection of records that do not include the content of communications. One high-ranking intelligence official who argued for a more cautious approach said he found himself pushed aside. Awkward silences began to intrude on meetings that discussed the evolving rules.

"I became aware at some point of things I was not being told about," the intelligence official said.

'Subtly Softer Trigger'

Hayden has described a "subtly softer trigger" for eavesdropping, based on a powerful "line of logic," but no Bush administration official has acknowledged explicitly that automated filters play a role in selecting American targets. But Sen. Arlen Specter (R-Pa.), who chairs the Judiciary Committee, referred in a recent letter to "mechanical surveillance" that is taking place before U.S. citizens and residents are "subject to human surveillance."

Machine selection would be simple if the typical U.S. eavesdropping subject took part in direct calls to or from the "phone numbers of known al Qaeda" terrorists, the only criterion Bush has mentioned.

That is unusual. The NSA more commonly looks for less-obvious clues in the "terabytes of speech, text, and image data" that its global operations collect each day, according to an unclassified report by the National Science Foundation soliciting research on behalf of U.S. intelligence.

NSA Inspector General Joel F. Brenner said in 2004 that the agency's intelligence officers have no choice but to rely on "electronic filtering, sorting and dissemination systems of amazing sophistication but that are imperfect."

One method in use, the NSF report said, is "link analysis." It takes an established starting point -- such as a terrorist just captured or killed -- and looks for associated people, places, things and events. Those links can be far more tenuous than they initially appear.

In an unclassified report for the Pentagon's since-abandoned Total Information Awareness program, consultant Mary DeRosa showed how "degrees of separation" among the Sept. 11 conspirators concealed the significance of clues that linked them.

Khalid Almihdhar, one of the hijackers, was on a government watch list for terrorists and thus a known suspect. Mohamed Atta, another hijacker, was linked to Almihdhar by one degree of separation because he used the same contact address when booking his flight. Wail M. Alshehri, another hijacker, was linked by two degrees of separation because he shared a telephone number with Atta. Satam M.A. Al Suqami, still another hijacker, shared a post office box with Alshehri and, therefore, had three degrees of separation from the original suspect.

'Look for Patterns'

Those links were not obvious before the identity of the hijackers became known. A major problem for analysts is that a given suspect may have hundreds of links to others with one degree of separation, including high school classmates and former neighbors in a high-rise building who never knew his name. Most people are linked to thousands or tens of thousands of people by two degrees of separation, and hundreds of thousands or millions by three degrees.

Published government reports say the NSA and other data miners use mathematical techniques to form hypotheses about which of the countless theoretical ties are likeliest to represent a real-world relationship.

A more fundamental problem, according to a high-ranking former official with firsthand knowledge, is that "the number of identifiable terrorist entities is decreasing." There are fewer starting points, he said, for link analysis.

"At that point, your only recourse is to look for patterns," the official said.

Pattern analysis, also described in the NSF and DeRosa reports, does not depend on ties to a known suspect. It begins with places terrorists go, such as the Pakistani province of Waziristan, and things they do, such as using disposable cell phones and changing them frequently, which U.S. officials have publicly cited as a challenge for counterterrorism.

"These people don't want to be on the phone too long," said Russell Tice, a former NSA analyst, offering another example.

Analysts build a model of hypothetical terrorist behavior, and computers look for people who fit the model. Among the drawbacks of this method is that nearly all its selection criteria are innocent on their own. There is little precedent, lawyers said, for using such a model as probable cause to get a court-issued warrant for electronic surveillance.

Jeff Jonas, now chief scientist at IBM Entity Analytics, invented a data-mining technology used widely in the private sector and by the government. He sympathizes, he said, with an analyst facing an unknown threat who gathers enormous volumes of data "and says, 'There must be a secret in there.' "

But pattern matching, he argued, will not find it. Techniques that "look at people's behavior to predict terrorist intent," he said, "are so far from reaching the level of accuracy that's necessary that I see them as nothing but civil liberty infringement engines."

'A Lot Better Than Chance'

Even with 38,000 employees, the NSA is incapable of translating, transcribing and analyzing more than a fraction of the conversations it intercepts. For years, including in public testimony by Hayden, the agency has acknowledged use of automated equipment to analyze the contents and guide analysts to the most important ones.

According to one knowledgeable source, the warrantless program also uses those methods. That is significant to the public debate because this kind of filtering intrudes into content, and machines "listen" to more Americans than humans do. NSA rules since the late 1970s, when machine filtering was far less capable, have said "acquisition" of content does not take place until a conversation is intercepted and processed "into an intelligible form intended for human inspection."

The agency's filters are capable of comparing spoken language to a "dictionary" of key words, but Roger W. Cressey, a senior White House counterterrorism official until late 2002, said terrorists and other surveillance subjects make frequent changes in their code words. He said, " 'Wedding' was martyrdom day and the 'bride' and 'groom' were the martyrs." But al Qaeda has stopped using those codes.

An alternative approach, in which a knowledgeable source said the NSA's work parallels academic and commercial counterparts, relies on "decomposing an audio signal" to find qualities useful to pattern analysis. Among the fields involved are acoustic engineering, behavioral psychology and computational linguistics.

A published report for the Defense Advanced Research Projects Agency said machines can easily determine the sex, approximate age and social class of a speaker. They are also learning to look for clues to deceptive intent in the words and "paralinguistic" features of a conversation, such as pitch, tone, cadence and latency.

This kind of analysis can predict with results "a hell of a lot better than chance" the likelihood that the speakers are trying to conceal their true meaning, according to James W. Pennebaker, who chairs the psychology department at the University of Texas at Austin.

"Frankly, we'll probably be wrong 99 percent of the time," he said, "but 1 percent is far better than 1 in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions."
http://www.washingtonpost.com/wp-dyn...401373_pf.html





Phones of Greek, U.S., Officals Tapped
Nicholas Paphitis

ATHENS, Greece -- Mobile phones belonging to top Greek military and government officials - including the prime minister - and the U.S. embassy were tapped for nearly a year beginning in the weeks before the 2004 Olympic games, the government said Thursday.

It was not known who was responsible for the taps, which numbered about 100 and included Greek Prime Minister Costas Caramanlis and his wife, and the ministers of foreign affairs, defense, public order and justice. Most of Greece's top military and police officers were also targeted, as were foreign ministry officials and a U.S. embassy number. Also tapped were some journalists and human rights activists.

The phone tapping "started before the 2004 Olympic Games and probably continued until March 2005, when it was discovered," government spokesman Theodoros Roussopoulos said at a news conference.

Roussopoulos said it had not been possible to identify who was behind the tapping.

"It was an unknown individual, or individuals, who used high technology," he said.

Roussopoulos said the surveillance was carried out through spy software installed in the central system of Vodafone, the mobile telephony provider that served the targets.

Calls were then diverted to mobile phones using pay-as-you-go services, which are difficult to trace.

An investigation showed that these mobiles had been used in a central Athens area where many foreign embassies are located, though Roussopoulos refused to speculate on whether foreign agencies might be involved.

"I estimate that no harm was caused to our national issues," Roussopoulos said. "The prime minister does not just use one mobile phone."

He said the government first heard of the tapping in March 2005, when it was tipped off by Vodafone Greece CEO Giorgos Koronias.

Vodafone - one of the country's four mobile telephony providers - discovered the tapping after receiving complaints from customers over problems operating their phones.

Koronias issued a statement saying the company removed the spyware immediately after it was located, and informed the competent state authorities.

The identities of the complainants were not immediately known.

The main opposition PASOK party accused the governing conservatives of delaying its response, and called for a full investigation.

"The government knew how serious the case was but failed to inform ... the people who were under observation," party spokesman Nikos Athanassakis said.

A socialist former defense minister was on the list of targets.

Athens prosecutor Dimitris Papangelopoulos brought misdemeanor charges of breaching the privacy of phone calls against "unknown persons" earlier Thursday, the justice minister said.

The prosecutor will also investigate whether there are grounds for bringing criminal charges of espionage, the minister said.

The government pledged the inquiry would be full and fair.

"The executive branch will not interfere in any way with the due process that has been followed by the judiciary from the first moment," said Panos Livadas, general secretary at the ministry of state. "Due process has been and will be followed."

---

Associated Press reporter Fanis Karabatsakis contributed to this story.
http://seattlepi.nwsource.com/nation...veillance.html





Using Cell Phones To Track Employees

Advances in mobile phone tracking technology are turning British firms into cyber sleuths as they keep a virtual eye on their staff, vehicles and stock.

In the past few years, companies that offer tracking services have seen an explosion in interest from businesses keen to take advantage of technological developments in the name of operational efficiency.

The gains, say the converted, are many, ranging from knowing whether workers have been "held up" in the pub rather than in a traffic jam, to being able to quickly locate staff and reroute them if necessary.

Not everybody is happy about being monitored, however, and civil rights group Liberty says the growth of tracking raises data privacy concerns.

Kevin Brown, operations director of tracking firm Followus, said there was nothing covert about tracking, thanks to strict regulations.

"An employee has to consent to having their mobile tracked. A company can't request to track a phone without the user knowing," he said. "Under government rules we send random alerts to each phone we track, informing the user they are being monitored."

All that is needed to trace a mobile phone is a computer with an Internet connection. Once a phone is activated for tracking, it becomes a mobile electronic tag and its approximate position can be followed using the service provider's Web site.

Although there was a flurry of interest when the service was launched in 2003 from private individuals suspicious about whether their partners really were working late at the office, the would-be sleuths were quickly disappointed.

"You can forget about borrowing your partner's phone and 'consenting' to being tracked because the random alerts will blow that ruse," said Brown.

As well as wanting to make sure staff are working when and where they are supposed to, many firms say they are increasingly concerned about employee safety.

"Some businesses want to keep an eye on their staff. Some feel they have an obligation to know where staff are in case of emergencies," said Brown. He said Followus, launched in 2003, now has 50,000 subscribers and the number was growing by 5,000 a month.

It tracks cell phone SIM cards with accuracy that varies depending on the saturation of SIM masts--in city centers the technology can pinpoint a phone to within a hundred meters, while in rural locations it might be several miles.

The most obvious application of the technology is for freight and delivery firms, but there has also been interest among small businesses that have tradesmen or sales staff on the road.

Andrew Overton at Verilocation said many of his company's 60,000 subscribers, mostly small businesses, wanted to know where their workers were for security reasons and for better asset management.

"There is increasing awareness about the importance of knowing where your staff are in case of incidents like the July London bombings. Knowing where your nearest employee is to a customer is also important. It allows a company to improve efficiency."

Overton said tracking also allowed bosses to check whether workers were taking the quickest route to a job or whether the expenses they submitted matched the miles they had driven.

Civil rights concerns
Not everyone is so enthusiastic about the growth of tracking.

Civil rights group Liberty said there could be privacy and human rights issues surrounding the use of tracking particularly given the unequal relationship between employee and employer.

"There could well be worries that staff feel coerced into agreeing to be monitored. The technology is neutral, it's the way it is used that is the problem," said Liberty's Jen Corlew.

She said the development of tracking was worrying because it was being driven by the marketplace and not by workers' rights.

"We are already seeing an ebbing away of employee rights and we at Liberty will be keeping a close eye on this area to see if companies who do monitor their staff are complying with the regulations," she said.

Logistics expert Richard Wildings said keeping track of staff and equipment could produce significant cost benefits to companies if they used the information effectively.

"There are benefits in service enhancements--providing a better service to customers and all the attendant advantages that can bring, and also operational gains from managing people and assets better," said Wildings, a professor of supply chain risk management.

According to Wildings, a company that knows where its staff are and can work out whether they will make appointment dates and then communicate with customers will win out over those that do not.

"Giving customers transparency of where their delivery or tradesman is in the supply chain enhances the value of what a company can offer customers," said Wildings from Britain's Cranfield University, a post-graduate institution that specializes in business and logistics.

Transparency builds trust which, in turn, saves cost.

"Customers who don't trust their suppliers can over-order, or hold extra inventory, or shop around for alternatives."

Operationally, companies that use tracking can gain by optimizing their staff.

"If you know where vehicle or employee is and a customer calls you, you have the opportunity to reroute."

Wildings said large-scale truckers have been using similar techniques for years, but using expensive satellite navigation equipment.

"Mobile phone tracking is far cheaper and produces similar business benefits," he said.
http://news.zdnet.com/2100-1035_22-6035317.html





Hitachi Advances Paper-Thin RFID Chip
Yoshiko Hara

Targeting radio-frequency identification, Hitachi Ltd. has developed what it says is the smallest and thinnest IC in the world for those applications.

Hitachi was due to present details of the 0.15-millimeter by 0.15-millimeter, 7.5-micron-thick chip on Sunday (Feb. 5) at the IEEE International Solid-State Circuits Conference (ISSCC) in San Francisco.

Paper is typically 80 microns to 100 microns thick, and the chip substrate has been made small and thinned to 7.5 micron to ease application in paper, where it could be used as an intelligent watermark.

Hitachi has been pursuing such “embedded” applications for its “Mu-chip” for years. The company integrated an antenna on an earlier version of the chip in September 2003. In the latest version, the company has reduced the plan dimensions and the thickness of the chip.

"The smallness is one [important] function for an RF IC chip," said Mitsuo Usami, senior chief researcher of Hitachi's Central Research Laboratory, who invented Hitachi's mu-chip initiative. “We fabricated the prototype using technology widely used for volume production."

This time around, the R&D team used silicon on insulator (SOI) technology to create an even smaller version. "When I presented a 0.3-millimeter by 0.3-millimeter chip at ISSCC in 2003, I was thinking about the use of SOI wafers as the next step," said Usami. The 0.3-mm by 0.3-mm chip was 60 microns thick. Using an SOI wafer, which has a thin silicon layer on top of an insulator layer, the Hitachi team fabricated the four-metal-layer CMOS on the SOI wafer and etched from backside to remove the silicon substrate. Etching stops at the insulator layer, leaving the 7.5-micron-thick chip. If a chip were to be made thin by grinding a wafer from the backside, precise control would be required, and it would be impossible to grind a wafer precisely 7.5 microns thick, said Usami. Even though the chip is thinner, it has increased robustness, he said.

In conventional Mu-chip design, a doped guard ring structure was necessary to separate high-frequency elements in the RF IC chip and to prevent interference, but the elements on the SOI wafer can be separated in dedicated wells bounded at the bottom and on the sides by silicon dioxide, which allowed further size reduction.

"I believe that Mu-chip is about two generations in advance of other prototypes," said Usami. Hitachi started offering a 0.4-mm by 0.4-mm Mu-chip in October 2001. It receives 2.45-GHz microwaves with an external antenna for applications in Japan and transmits back a 128-bit ID number. The ID is written into the chip's read-only memory during fabrication. The newly developed 0.15-mm by 0.15-mm chip has the same function and has been shown to work.

Hitachi's first Mu-chip was used for the admission ticket for the 2005 World Exposition, in Aichi, Japan. Compared with that chip, the latest version is nearly one-fifteenth the size. The prototype used a 180-nm process. But when it reaches volume production, the process will shrink along with the industry's road map, Usami said.
http://www.eetimes.com/showArticle.j...leID=179100286





The New Chip-erati
Susan Kuchinskas

Artists and hackers have begun implanting RFID chips under their skin. It's a cool way to play with technology. Will it lead to a system of universal implanted ID?

Facial piercings and full-body tattoos used to be signifiers for those who saw themselves as social outlaws. Now, bank tellers and high school kids have pierced lips and inked skin. Today a few cutting-edge nerds sport chips under their skin, a melding of technological experimentation and body modification. Will the mainstream follow them?

Annalee Newitz got "chipped" as research for an article she's writing for "Wired" magazine about RFID security. And Jonathan Westhues hacked and copied its code.

Newitz had an RFID tag made by VeriChip implanted under her skin. The chip emits a unique string of numbers when it comes near an RFID reader. RFID chips are used in industry to track pallets and cases of goods, as well as for opening security gates and doors.

Westhues was able to read and copy her chip in around two hours, using a simple reader about the size of an MP3 player, with an antenna about five inches long. Once Westhues cloned the chip, he'd be able to use it for anything Newitz used it for. If she were using the chip to unlock her front door -- or the door to the biohazard lab -- Westhues, if he was a bad guy instead of a hardware and software designer, would be able to do some damage.

Westhues' quick cloning of Newitz's chip gives the lie to sunny views of RFID security.

"What I wanted to do was show that while VeriChip claims that their chips can't be counterfeited, indeed they can be counterfeited as easily as any other chip, particularly ones that have no security at all, which this one doesn't," she said.

The RFID industry points out that the random digits emitted by RFID tags are meaningless unless they're matched to information stored in the encrypted database that's part of industrial systems.

But Liz McIntyre, an anti-RFID activist believes that VeriChip is only an initial step toward universal chipping. In "Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID," McIntyre and co-author Katherine Albrecht lay out a scenario in which RFID information from retail systems could be merged with that from identification systems including electronic passports to create a very complete picture of a citizen's habits.

The Department of Homeland Security began a live test of e-passports at San Francisco International Airport on January 15. There were two earlier tests, at Los Angeles International Airport and Sydney Airport.

The Electronic Privacy Information Clearinghouse recommended a ban on chipping people, and, along with the American Civil Liberties Union and other consumer advocacy groups, has urged the U.S. government to halt the development of passports with RFID chips.

But industry is moving faster along a parallel track.

In October 2004, VeriChip got clearance from the FDA for implanting its chip in human beings. VeriChip is a subsidiary of Applied Digital (Quote, Chart). It registered for an initial public offering in December 2005.

Applied Digital spokesman John Proctor said that VeriChip is focusing on medical applications. Some 68 hospitals in the United States have signed onto the VeriMed service, which combines chips, readers and a database. Most still are developing emergency room protocols in which staff scan for chips, but Hackensack University Hospital has the system up and running.

In the VeriMed system, if someone cloned a chip in order to access that individual's medical history, he'd have to get access to the emergency room scanner and be supplied with a password for the system.

"There are similar security measures to those of online banking," Proctor said.

But slamming down the Chivas at Baja Beach Club on somebody else's tab would be a snap.

"[Westhues] had to actually touch my arm in order to do the read," Newitz said. "But the company mandates that the chips will be implanted in exactly the same place, on the back of your right upper arm. Anyone who knows that can easily bump into you in an elevator and get the read. It's as easy as picking someone's pocket: It requires the same amount of proximity for the same amount of time."

Proctor said there are approximately 2,000 people worldwide with implanted VeriChips; in the United States, 68 people have VeriMed chips. In February, internetnews.com interviewed Joseph Krull, a security executive with Virtual Corporation who let VeriChip tag him as a demonstration.

Other high-profile human implants include the attorney general of Mexico Rafael Macedo de la Concha (along with 16 Mexican security officials), and John Halamka, the CIO of Harvard Medical School.

That leaves a lot of people buying mojitos by waving their arms near an RFID reader.

Some experts think there may be an RFID privacy gap developing, as market penetration moves faster than policy.

Newitz said that people in the technology underground have begun implanting themselves in order to appropriate the technology.

" This is one way people can say, 'No you're not going to do this to me, I'll do it for myself and figure out what it does and seize more control over it.'"

While do-it-yourself chippers would probably be the last ones to submit to government-mandated implantation, McIntyre said, they act as a sort of cadre of cool.

"What they're doing is moving that [government] agenda forward in a way," she said. "They're removing the mental barrier of having something foreign implanted in your body that's emitting a unique number. It has this cool factor, especially since they're being installed in tattoo parlors."

Today, a hip chip. Tomorrow, the Mark of the Beast?
http://www.internetnews.com/security...le.php/3582971





RFID-Zapper
Public Wiki

What is the RFID-Zapper?

The RFID-Zapper is a gadget to deactivate (i.e. destroy) passive RFID-Tags permanently.
The development-team presently consists of two people (MiniMe and Mahajivana), who had some help from a friend (thank's for that).
Goals are a proof-of-concept and the construction of at least one functioning and appealing prototype, as well as a documentation of the project, so that everyone can build an own RFID-Zapper. Since the project found so much positive resonance, we probably are going to work on some other realizations of the concept, e.g. building an RFID-Zapper from scratch, without a single-use-camera.

Why should I need such a thing?

We have to expect to be surrounded by RFID-Tags almost everywhere within the near future, and they will serve many different purposes. The benefits and risks of this technology and it's use are already being discussed. However, there will be atempts to use RFID-Tags to establish constant surveiliance and to further threaten and compromise the privacy of customers (and citizens and even non-citizens, when gouvernments start to use RFID-Tags like the german gouvernment already did).
To defend yourself against such measures, you might want a small, simple and relatively appealing gadget to permanently deactivate RFID-Tags around you, e.g., to deactivate RFID-Tags in recently bought clothes or books without damaging those.

How does the RFID-Zapper work?

Passive RFID tags have no internal power supply. The minute electrical current induced in the antenna by the incoming radio frequency signal provides just enough power for the CMOS integrated circuit (IC) in the tag to power up and transmit a response.
(Quote from Wikipedia)

There are several ways to deactivate RFID-Tags. One that might be offered by the industries are RFID-deactivators, which will send the RFID-Tag to sleep. A problem with this method is, that it is not permanent, the RFID-Tag can be reactivated (probably without your knowledge). Several ways of permanently deactivating RFID-Tags are know, e.g., cutting off the antenna from the actual microchip or overloading and literally frying the RFID-Tag in a common microwave-oven, which needs to be turned on only for a short period of time. Unfortunately both methods aren't suitable for the destruction of RFID-Tags in clothes: cutting off the antenna would require to damage the piece of cloth, while frying the chips is likely to cause a small but potent flame, which would damage most textiles or even set them on fire.

One of our cameras, 2for1 only 7 € in some drugstores

The RFID-Zapper solves this dilemma. Basically it copies the microwave-oven-method, but in a much smaller scale. It generates a strong electromagnetic field with a coil, which should be placed as near to the target RFID-Tag as possible. The RFID-Tag then will receive a strong shock of energy comparable with an EMP and some part of it will blow, thus deactivating the chip forever.
To keep the costs of the RFID-Zapper as low as possible, we decided to modify the electric component of a singe-use-camera with flash, as can be found almost everywhere. The coil is made from coated copper wire and placed inside the camera exactly where the film has been. Then one end of the coil is soldered to the camera's capacitor, from which we earlier disconnected the flash. The other end of the coil is soldered to a switch, which itself is connected to the capacitor's other terminal. Once everything is tested, the camera can be closed again and henceforth will serve as a RFID-Zapper, destroying RFID-Tags with the power of ordinary batteries.

State of the project

A bit of paper might help

The original project was finished successfully and introduced at 22C3. Several RFID-Zappers were built at 22C3 in a workshop.
Modification of a single-use-camera with flash has proven to be relatively easy, the capacitor is able to supply enough electrical current.
An old, slightly damaged Camera could also be modified into a RFID-Zapper during the workhop at 22C3.
As far as we know, about 20 working RFID-Zappers were built so far. In only one case we encountered serious problems, the capacitor seemed to be broken.
By the way: It is possible to carefully (don't expose it to any light) extract the photographic film from the camera for further use. (Most films from single-use-camera's seem to have no DX encoding, so they might be useful for push processing or even pull processing ;-) But don't expect to much from such films, single-use-cameras usually don't come with a high-quality film.

Proof-of-Concept

Before we first tried to modify a single-use-camera, we tested the concept on a passive 13,56-MHz-RFID-Tag:
We took an old external flash apart, which had a guide number of 24. The capacitor of the flash had 330 μF and 300 V. selfwound coil, measures 4,5 x 8 cm, coated copper wire, 1mm thick, 5 windings
We then de-soldered the actual flash from the capacitor and then soldered the coil to it, but placed a switch between one of the capacitor's terminals and the coil, which later would close the curcuit. The capacitor now could be loaded like before and even made the usual high-pitched sound.
To see wether the RFID-Tag was functioning or not, we had a RFID-Finder, a gadget to find RFID-Tags.
Then we ran several tests, each time loading the capacitor to a higher level, before closing the curcuit.
When loaded to about 100 V, the RFID-Zapper was able to destroy the RFID-Tags placed right next to it. No visible damage was done to the paper, in which the tag was wrapped. Since the strength of the electrical field decreases with the square of the distance, the final RFID-Zapper will definetly need a capacitor that can supply more than 100 V. Since we didn't have enough RFID-Tags we couldn't test the range of the RFID-Zapper with more current, e.g. 200 V or even 300 V.

Further Plans

* We are completing the documentation on our project these days. This documentation will contain a construction-manual for the RFID-Zapper and will be published both in german and english. You should be able to find it on this wiki within the next two weeks, we will also place it on several other homepages, including mahajivana's, which hopefully will go online soon and will contain more about this project.
Until now we only had access to 13,56-MHz-RFID-Tags, but there are other tags running on different frequencies. We hope to be able to test the RFID-Zapper on such tags soon. If you can help us getting our hands on such tags, please contact us, we will be forever thankful.
If we have enough 13,56-MHz-RFID-Tags, we will further test the range of the RFID-Zapper.


Caution

(This part of this article probably will be longer than the equivalent part in the german article, since english-speaking peoble seem to be more concerned with safety matters and less careful with electric devices ;-)

Ø Poldi kindly informed us, that having a RFID-Zapper with you when checking in to a plane might cause trouble or even get you arrested (he almost was). RFID-Zappers are basically some kind of pocket-EMP. Although we doubt that it has the capacity to cause any trouble aboard an airplane, we seriously recommend against testing it, for reasons of your own health as well as that of others.

Ø RFID-Zappers don't comply with the FCC-rules.

Ø Modifying a single-use-camera into a RFID-Zapper isn't completely free of risks. If the capacitor is still charged fully or partly, you might catch yourself an electric shock. If you are a healthy, young person, this is probably only going to hurt a lot, but if you should have any kind of problems with your heart and/or circulation, you definetly want to properly decharge the capacitor first. If you use a bigger capacitor, the risk increases.

Ø Soldering irons are known to be unpleasantly hot at the tip.

Ø We also recommend against using the RFID-Zapper on RFID-Tags found within electrical devices, for these are likely to suffer damage too. You also shouldn't use RFID-Zappers too near to electric devices, especially if they are expensive. You also shouldn't use it near any magnetic data storage, like floppy disc, MCs, hard discs, credit cards, streamer-cartridges and so on. And don't try it near your grandpa's pacemaker or other sensitive medical equipment either!

Ø We don't think that the RFID-Zapper is a strong source of what is known in Germany as Elektrosmog, which means some kind of smog caused by electromagnetic fields. But if you are concerned about it, you might want to be careful. Unfortunately we can't tell you wether wearing a hat of aluminium helps or not.

Ø The RFID-Zapper might cause you to feel armed against companies or governments trying to compromise your privacy. You might even experience euphoria, especially when destroying RFID-Tags. This could lead to dangerous behavior, like speaking your mind, using freedom of speech, fighting for your rights, all of which are bound to ultimately lead to the communist world revolution ;-)

Ø In America the RFID-Zapper could be considered a "burglar tool" since it could be used to disable RFID tags being used by merchants to prevent theft. Merely having it in your possession could lead to your arrest.
http://events.ccc.de/congress/2005/wiki/RFID-Zapper(EN)





Study: 80 Percent Of Voters To Be Using E-Voting Equipment In 2006

Fewer voters will cast their ballots by punching a card or pulling a lever in this November's elections as the country continues to turn to newer, electronic machines, according to a study released Monday.

While the study says old systems that were prone to error are on their way out, experts also note that means many Americans will be voting on unfamiliar equipment this fall.

At least four out of five registered voters will use the newer generation of machines -- either ATM-style touchscreen machines or ones that ask voters to fill in the blanks, a vast change from the contested 2000 presidential election that spurred states and Congress to push for improved equipment.

Back in 2000, just over half the voters had access to the latest technology.

By this fall, however, only one out of 33 voters will be asked to use the system that raised the most objections in Florida -- punch cards -- and just one in 10 will use a lever machine, according to a survey by Election Data Services, a political consulting firm that tracks election equipment. Six years ago, one in six voters used punch cards and one in five used levers.

The changes are bound to create their own glitches as voters and administrators learn how to use equipment they haven't voted on before, said Kimball Brace, president of Election Data. Just over 30 million voters will be casting ballots on unfamiliar equipment, he said.

``You throw that many people in on something new, you're always bound to see something go wrong,'' he said.

The changes have created new controversies, especially with accusations that touchscreen-style machines are vulnerable to manipulation. In response, 25 states have passed laws requiring election administrators to use machines that allow voters to verify their vote has been accurately counted, and that create paper receipts for a recount.

Those paper trails -- called voter-verified paper audit trails -- are creating their own challenges, as manufacturers try to respond to lawmakers' demands for the equipment, Brace said.

Some of the survey results may change by the time the fall election arrives, the study said, because some states are still trying to change over from older equipment as encouraged by the federal Help America Vote Act, which was passed after the contested 2000 election.

The widespread push to modernize means that, in the six years between November 2000 and this fall's elections, nearly 82 million people in a nation of 170 million registered voters will have cast ballots on new equipment, the study concludes.
http://www.siliconvalley.com/mld/sil...l/13806202.htm





Diebold Chief Says Fate Of e-Voting Unit Under Review
AP

Diebold Inc.'s new chief executive, determined to cut $100 million in costs over three years, said he is reviewing whether the company should continue investing in its embattled electronic voting business.

CEO Thomas Swidarski insisted in an Associated Press interview that he feels good about the performance of the e-voting operations, even as some shareholders and computer experts complain that Diebold touch-screen voting machines have had a history of hardware and software woes.

``There's pieces and aspects of each of our businesses that I'm going to be looking at with a very critical eye in terms of what the future holds for us,'' Swidarski said in his first media interview since taking over in December the company best known for its automatic teller machines and security systems.

Risk within any of Diebold's businesses will be weighed against profit potential, Swidarski said. ``If any of the pieces don't fit or any of the pieces don't add the value we think is associated with that risk, then we'll make appropriate decisions at that point,'' he said.

Diebold's former chairman and CEO, Walden O'Dell, resigned Dec. 12 after several years of controversy surrounding Diebold's touch-screen voting machines and O'Dell's financial contributions to President Bush's campaign.

O'Dell gained notoriety in 2003 when he invited people to a fundraiser for Bush with a letter stating he planned to help ``Ohio deliver its electoral votes to the president.''

Within two days of O'Dell's departure, investors sued Diebold, claiming it made misleading comments about its e-voting business.

Swidarski said Diebold Election Systems, the company's smallest business segment, now offers machines and computer software he feels confident will satisfy certification demands.

``The thing I look at is what customers say,'' he said. ``I can't comment on any kind of lawsuit that's pending, but I'm very confident in terms of the capabilities we have actually delivered.''

Swidarski said he has no political connections, and the company has a policy in place for its high-level executives and the Diebold Election Systems subsidiary concerning political contributions.

``Any painful experience you learn from,'' Swidarski said. ``It's not always about technology. There are other aspects of this business.

``I'm very confident that the states that have run this (electronic voting) the longest and have been involved with it the most are the most satisfied,'' he said. ``Much like bank customers have to make decisions, elections officials make decisions. Those folks have a very difficult job, with big responsibilities.''

A study on voting systems nationally released Monday by Washington-based Electronic Data Services Inc. said that in this year's November election 66.6 million voters are expected to cast ballots using electronic equipment, or about 39 percent of all the votes cast.

Kimball Brace, president of Electronic Data Services, said that by November about 25 states could have some degree of electronic voting.

Diebold has sold its touch-screen machines to Georgia, Maryland, Utah, Mississippi and portions of Ohio, California, Alaska, Colorado and Florida. Brace said

the company is the biggest vendor of electronic voting machines, and Election Systems & Software and Sequoia Voting Systems are its primary competition.

Diebold tapped into the congressional funding for voting updates after the disputed 2000 presidential election, when punch-card ballots in Florida were still being examined weeks after Election Day.

But Diebold touch-screen voting machines became subject to scrutiny, when questions arose as to the security of the software and whether results could be manipulated. There were also several widely reported glitches, especially in some of California's elections.

The company a week ago reported its earnings slumped 76 percent to $14.6 million in the quarter ended Dec. 31 even as sales rose 15 percent. The earnings dropped mainly because of companywide restructuring and other charges.

Diebold shares rose 9 cents to $39.26 in trading Tuesday on the New York Stock Exchange. The shares have traded within a 52-week range of $33.10 and $57.81.
http://www.siliconvalley.com/mld/sil...l/13814703.htm





Local news

Teens Reveal Too Much Online

NEW HAVEN, Connecticut -- On websites such as MySpace, teenagers can find people around the world who share their love of sports, their passion for photography or their crush on the latest Hollywood star. But authorities say teens are increasingly finding trouble in an online environment where millions of people can, in seconds, find out where they go to school, learn their interests, download their pictures and instantly send them messages.

Police in the central Connecticut city of Middletown suspect that as many as seven girls were recently assaulted by men they met on MySpace. The FBI says it regularly receives calls from police trying to figure out how to stay ahead of popular technology that puts children a mouse click away from millions of strangers.

MySpace, one of several popular social networking sites, is a free service that allows people to create websites that can be personalized with information, pictures and movies. Searching for someone is as easy as typing the name of a high school and the photographic results are instantaneous.

"They're licking their lips and arching their back for the camera because they can, and they have no idea of the consequences," said Parry Aftab, an attorney and child advocate who runs WiredSafety, a site that helps inform parents and site managers about online predators.

MySpace said in a statement that it includes safety tips and prohibits children under 14 from using the site. Aftab said MySpace, a subsidiary of News Corp., has a great reputation for trying to keep the site safe.

Some teens keep their personal profiles scant, aimed only at their friends. Others describe their likes and dislikes, from the mundane to the profane, and encourage people to send them messages.

"That is a perpetrator's dream come true," said Middletown Police Sgt. Bill McKenna.

McKenna said several Middletown girls, between 12 and 16, told police they met men on the MySpace who claimed to be teenagers. When they met in person, he said, the girls were fondled or had consensual sex with men who turned out to be older than they claimed.

In at least one case, McKenna believes the assault happened at the girl's home while her parents were there.

Last month, 14-year-old Judy Cajuste was found strangled and naked in a Newark, New Jersey, garbage bin and 15-year-old Kayla Reed was found dead in a canal not far from her Livermore, California, home. Both deaths remain unsolved and the use of MySpace.com has surfaced in both investigations.

As recently as a few years ago, Aftab said the profile of an online victim was a young woman who felt alone, didn't have many friends and craved attention.

Then, in 2002, 13-year-old Christina Long of Danbury was strangled in a Danbury mall parking lot by a 26-year-old man she met on the internet. Long was a popular cheerleader, a good student and an altar girl. The profile went out the window.

Now, Aftab said, it's no surprise that a wealthy state such as Connecticut is seeing a spate of problems. "This is a rich and upper-middle- class problem," Aftab said. "They have too much time, too much technology and their parents aren't around to keep an eye on them."

Connecticut's FBI office was the first in New England to launch an online, undercover program to catch sexual predators. Timothy Egan, the squad's supervisor, said parents often don't know their children are using these websites or what information is being released. The FBI hopes to train more local officers about these sites in coming months.

Chief State's Attorney Christopher Morano, who has strictly limited the information his 10- and 12-year-old children put on the internet, said he was surprised to learn that they had been contacted by strangers they believed were pedophiles. His kids ignored it, Morano said, but parents need to closely monitor internet activity.

"You wouldn't leave your kid on the side of the highway without supervision," Morano said. "You shouldn't put them on the internet highway without the same type of supervision."
http://www.wired.com/news/wireservice/0,70163-0.html





The iPod Ecosystem
Damon Darlin

In the weeks leading up to last month's Macworld conference, few people knew what the notoriously secretive Steven P. Jobs was going to announce.

Gavin Downey, the director of product management at the Belkin Corporation, listened to all the rumors leading up to the everything-Apple conference in San Francisco, from the outlandish to the logical. He had to. His job is making sure there are cases, rechargers and other accessories that add features to all the variations of iPods that Apple Computer makes. Any change in direction by Apple means his company has to scramble.

Last September, for instance, on the eve of an Apple announcement, Belkin's lead designer was dispatched to China. There he waited for word of the rumored replacement to the iPod Mini, which turned out to be the slim Nano.

Despite the radical redesign, different from any previous iPod, the Belkin designer was able to mock up prototype cases within two weeks. Models were in the stores well before Christmas. "There is no room in this industry for lack of execution," Mr. Downey said.

Not when making add-ons for the iPod is a $1 billion business. Does that sound like hyperbole? Consider this. Last year, Apple sold 32 million iPods, or one every second. But for every $3 spent on an iPod, at least $1 is spent on an accessory, estimates Steve Baker, an analyst for the NPD Group, a research firm. That works out to three or four additional purchases per iPod.

That obviously makes accessory makers happy. It thrills retailers, whose profit margin on the accessories is much higher than on an iPod. And it delights Apple because the racks of add-ons made just for the iPod — 2,000 different items at last count — send a strong statement to consumers that the Apple player is far cooler than a Creative or Toshiba player, for which there are few accessories.

Sales of all those cases, car rechargers and docking stations totaled $850 million last year, Mr. Baker said, and that is not even counting Internet sales. Sales will easily soar well beyond $1 billion this year.

"Most of us were caught a little bit by surprise by the growth trajectory," admitted Rob Humphrey, director of marketing for Kensington, a maker of computer peripherals and now one of the biggest makers of iPod accessories. The accessories now account for about 20 percent of Kensington's total sales.

An entire ecosystem has emerged around the music player, introduced by Apple in October 2001. Other manufacturers had produced MP3 players earlier. But the simple design of the iPod, plus Apple's iTunes store, quickly helped Apple to dominate the market. And that simple design — some might even call it bland — encouraged people to personalize the machine.

There are now more than twice as many iPod accessories as there were just last summer, according to Apple. And that number does not include the docking stations that will be available in 40 percent of cars sold in the United States this year.

About 28 percent of all accessories are cases. You can find microfiber sleeves or neoprene iPod cases made by dozens of start-ups for $10 or $20 or a $200 python- skin case made by Coach, the maker of stylish leather handbags. About 30 percent of sales are for car chargers or transmitters and the remainder are speakers and docking stations.

But the forest of products includes a baby stroller from Kolcraft with a slot for an iPod, and a belt called the TuneBuckle with an iPod holder as the buckle. For sheer extravagance, Hammacher Schlemmer lives up to its reputation for selling the ridiculously expensive in its catalogs with the $4,000 Triode-Tube iPod speakers with old- fashioned vacuum tubes that glow through see-through panels. The Sharper Image catalog has a $700 iJoy massage chair with an iPod holder in the armrest.

The iBoom is a white boom box that Digital Lifestyle Outfitters is selling for $150. At the Consumer Electronics Show in January in Las Vegas, a company showed a prototype of a black and yellow boom box, the size of a work site gasoline-powered generator, for the tiny iPod.

Apple could not be happier about this exploding iPod economy. "For us it's great because the decision to buy an iPod is reinforced when consumers see all the accessories," said Greg Joswiak, Apple's vice president for worldwide iPod marketing.

Mr. Humphrey of Kensington, which makes about a dozen iPod accessories, called the accessory market "a real phenomenon," adding, "I've never seen anything like it in my career."

Few have. Rarely does one product foster such a sizable industry around it. Many of the iPod accessory makers, like Belkin, Kensington or Logitech, cut their teeth making accessories for personal computers. But no one product, not even the Macintosh, created the kind of accessory mania that the iPod has.

Some creations, like Mickey Mouse for Disney or Barbie dolls for Mattel, created an enormous market for accessories, but most of those items, like the Mickey Mouse watch or the Barbie Dream House, were licensed or made by the same company that created the original product. In contrast, Apple has encouraged a free-for-all, and its own share of the accessories market remains small.

That will change. Apple is aware of the power of this market and is getting more active. Indeed, at the recent Macworld conference, Apple demonstrated that it wanted more of this lucrative field. It made a splash with an attachment, the $50 Radio Remote, that plays FM radio through the iPod. Meanwhile, Kensington, with a new device that transmitted music from an iPod to an FM radio and also received FM broadcasts, was overshadowed.

Until recently, Apple's add-ons have been low-impact items like colorful cloth sleeves, which it calls socks, for the iPods. "We've chosen to participate in the market, not overwhelm it," Mr. Joswiak said.

By standardizing the 30-pin electronic connection on all of its models, Apple allows companies that stick with its standards the right to use an official "Made for iPod" logo. In return, Apple gets a royalty for the logo's use.

However, Apple, always tight-lipped, does not give much else to the accessory makers. "We may get a day's notice even with our strong relationship with Apple," Mr. Humphrey said. "In a meeting you might get a hint that something is gong to happen, but you don't know what. You occasionally get a, 'I don't think you want to go in that direction,' but you never know why they say that."

It could be because Apple will introduce a new size, as it did with the Nano, or because it is moving its connector from the top of the unit to the bottom, or because Apple has plans to introduce a competing product.

Undaunted, the big makers like Logitech, Griffin, Targus and Xtreme Accessories keep working on electronics that add functions and battery power to the iPod. Devices that turn the iPod into a home media center, allowing consumers to shuttle music from one room to another wirelessly, have become popular.

One big reason for the size of the iPod economy is that retailers love the accessories business. "Retailers have a love-hate relationship with iPod," Mr. Humphrey said. They must compete against Apple's own retail outlets for sales and the gross profit margins are slim, less than 15 percent.

Retailers' margins for the iPod accessories are much higher. Mr. Baker of NPD estimates that margins for the electronics are around 25 percent, while cases offer 50 percent margins. "They make money on that and they make no money on the iPod," he said.

While there is shelf-space competition among the hundreds of vendors, there has not been a lot of price competition, so profit margins hold. The iPod economy is also wide because the accessories are not limited to retailers like Best Buy or Circuit City as they were with personal computers. IPod accessories are showing up in Urban Outfitters stores and auto dealerships.

If at times the iPod economy seems packed with iThis and iThat, it is because manufacturers have recognized the selling power of the iPod. Take clock radios, which have been a sleepy category for more than a decade. SDI Technologies turned that around by creating the iHome clock radio, which Apple says was the strongest selling accessory last year. (You dock the iPod in the machine.) The speaker maker JBL has jumped in with the $300 JBL On Time clock radio/iPod dock.

"You throw an iPod in there and you have a growth category again," said Mr. Baker of NPD. Likewise, the headphone and earphone business also took off last year, growing about 25 percent in volume and 10 percent in average price, said Robert Heiblim, senior vice president for sales and marketing at Altec Lansing, a speaker maker.

No one is predicting that the iPod economy will be slowing soon. Mr. Baker said: "We've barely scratched the surface with the video iPod."
http://www.nytimes.com/2006/02/03/te...=1&oref=slogin





Networks' iTunes Gamble Paying Off
The Hollywood Reporter

Television networks took a leap into the unknown when they started selling their shows on Apple Computer's iTunes online store, but even in these early days, it's starting to look as if that faith in digital downloads was well-placed.

Apple CEO Steve Jobs welcomed Walt Disney and Pixar Animation Studios content to the service in October. Now there are 40 different series, each episode of which costs a standardized $1.99 to purchase, and more are on the way.

Nobody will disclose numbers for these television downloads. It's easy, however, to keep an eye on the iTunes download chart, which usually shows NBC's "The Office" as the top full-length program, followed by ABC's "Lost" and Comedy Central's "South Park."

Ben Silverman, an executive producer of "The Office," whose ratings have not quite matched the critical acclaim, praised NBC for its willingness to "dive into the iTunes relationship quickly." He credited the download capability with boosting broadcast viewership.

Silverman noted that "The Office," which went into reruns just before the video iPod's first Christmas, was boosted by people who discovered the show when they were browsing to find something to put on their new device.

"That confluence brought us a sampling of a new audience, which also is not an audience that watches TV by sitting down at the time the broadcaster wants to show it," he said.

Then NBC moved the show to Thursday nights. "That's like the network telling people it's important to them and part of the whole history of comedy," Silverman said.

He was confident that the downloads were not eroding audience or invading any of the existing windows, due primarily to their portable and on-demand nature.

"The DVD potentially will get affected, but the revenue as it relates to the studio is higher because of the cost being so much lower and the price points being the same while you're getting a larger percentage of the revenue," Silverman said.

NBC on Jan. 10 added more programs to iTunes, making a total of 13 NBC Universal-produced shows available, including NBC's "Law & Order," USA Network's "Monk" and Sci-Fi Channel's "Battlestar Galactica."

MTV Networks disclosed its iTunes slate Jan. 26, with 14 shows from MTV, MTV2, Comedy Central, Nickelodeon and the N, including "Punk'd," "South Park," "Dora the Explorer," "SpongeBob SquarePants," and "Laguna Beach."

Jason Hirschhorn, chief digital officer at MTV Networks, said the preliminary numbers looked good but that the final numbers weren't in yet.

"The nets are doing as well as they've ever done, and the Web sites are upping traffic," he said. "We believe this is additive--the best way to watch long form is on your couch."

Hirschhorn also was working on models for sharing these new potential benefits with the cable affiliates.

On Jan. 26, ESPN and ABC Sports added programming from their Winter X Games 10 coverage, along with shows like the "SportsCentury" biography series.

iTunes users previously could purchase condensed versions of ABC Sports' Bowl Championship Series college football games, the first sports content on iTunes.

Other programs from the Disney companies include ABC's "Lost," "Desperate Housewives" and "Commander in Chief"; ABC Family's "Wildfire"; and Disney Channel's "That's So Raven" and "Kim Possible."

"Overall, we've seen our ratings increase for the shows we have on iTunes, and it continues to pick up momentum," said Albert Cheng, executive vice president of digital media at Disney-ABC Television Group.

He said "Lost" was doing "extraordinarily well" on iTunes, a fact he attributed primarily to the overlap in demographics between the broadcast viewers and iPod users.

"We wanted to put our best shows on the platform, but you never really know what you're going to get," Cheng said. "Video has surpassed everyone's expectations, but I do believe iPod is basically a music device, and video is an additional benefit to having one."
http://news.com.com/Networks+iTunes+...3-6035376.html





Those Cables Behind the Television May Become Obsolete
John Markoff

A team of I.B.M. researchers plans to report this week that they have used standard chip-making materials to develop a high-speed wireless technology that could do away with the bulky cables that now connect electronic devices in the living room.

In the past, high-frequency wireless technology has generally required exotic semiconductor materials like gallium arsenide that are costly to work with and difficult to miniaturize.

On Tuesday, at an annual semiconductor industry design meeting here, the researchers are expected to describe a design that is capable of transmitting more than 10 times the data of today's Wi-Fi using lower-cost silicon germanium material.

The researchers said the new technology would be ideal for moving HDTV video signals around the home wirelessly in the unlicensed 60-gigahertz portion of the radio frequency spectrum.

This is referred to as the "millimeter wave band," and it has long held out the promise of carrying far more data than other portions of the spectrum.

Moreover, because the high-frequency portion of the radio spectrum generally does not penetrate walls, it may be more palatable to Hollywood and the cable and D.S.L. telecommunications firms, which have been concerned about the risks of piracy posed by some wireless technologies, said Richard Doherty, a computer industry consultant at Envisioneering Inc., based in Seaford, N.Y.

"It might appease Hollywood, but Monster Cable would lose out," he said.

The use of silicon germanium is significant because it exploits standard equipment that is readily available in I.B.M. chip-making plants, according to Modest Oprysko, a manager in communication technology at I.B.M.'s Yorktown Heights research laboratories.

That means that there is potentially a relatively quick path from research to commercialization.

"This is Bluetooth on steroids," he said, referring to the current industry standard that has been used as a wireless cable replacement.

The I.B.M. researchers said that despite the fact that the millimeter wave technology would have a short range in the home, it might have significant applications as a low-cost alternative in point-to-point communications systems that are popular as data links on corporate campuses.

One of the advantages of the shorter wavelength systems is that the antenna can be assembled as part of the chipset, further lowering the cost of the technology.
http://www.nytimes.com/2006/02/06/te...gy/06chip.html





Makeover of the Year


The Reclusive One at Wednesday’s Grammys



Sly Stone Surprises Grammys
Jake Coyle

Wednesday night in Los Angeles, the reclusive pioneer of a hugely influential soul-rock-funk fusion made his first major public appearance since Jan. 12, 1993, when he was inducted into the Rock and Roll Hall of Fame.

Sporting a giant blond Mohawk, dark shades and a silver, purple-lined robe, Stone took the stage after a five-song medley tribute that included John Legend, Joss Stone, Maroon 5, Will.i.am from The Black Eyed Peas and Steven Tyler of Aerosmith.

Stone played "I Want to Take You Higher" behind a set of keyboards with his old band, the Family Stone, appearing uncertain and unaccustomed to the bright lights of the big event. He kept his head bowed, declining to address the audience or acknowledge the occasion.

He departed after just a few verses _ leaving befuddlement in his wake. Perhaps Dave Chappelle, who introduced Stone, had an inkling of the task facing the legend.

"The only thing harder than leaving show business is coming back," said Chappelle, who famously abandoned his hit Comedy Central show.

Though the Sly and the Family Stone tribute had been planned for weeks, Stone's presence had been a giant question mark in the days leading up to the show. Even Grammy producers _ speaking hopefully but cautiously in the days before the Grammys _ seemed uncertain he would be there.

The 61-year-old Stone, whose real name is Sylvester Stewart, hadn't performed live since 1987. He did, however, make a cameo appearance last year at a concert with his sister, Vaetta, who plays in a Family Stone tribute band. He has reportedly renamed Vaetta's band "The Family Stone," and is writing and producing for them.

But in the late '60s and early '70s, Stone was ubiquitous, an icon of the Woodstock era. His performance with the Family Stone on the second day of that fabled festival was one of its most acclaimed.

Stone's band began in 1967 with its debut, "Whole New Thing." It then delved deeper into exuberant funk on the album "Dance to the Music," which featured the title track. Its third album, "Life," followed just months later.

But the band's 1969 release, "Stand!" was its masterpiece. Songs like "I Want to Take You Higher," "Everyday People" and "Stand!" were instant classics that rewrote pop music, mixing Motown with pop melodies and `60s hopefulness.

By 1971, Stone had grown more disenchanted, releasing "There's a Riot Goin' On." 1973's "Fresh" continued that trend, but still had funk gems like "If You Want Me to Stay."

By '75, the Family Stone was no more, breaking up largely because of Stone's increasing drug problems, which led to canceled concerts. Stone would later release several solo albums of little note and poor sales. He was arrested several times in the `80s for cocaine possession.

He collaborated with Funkadelic in 1981, but increasingly shunned the spotlight _ though the spotlight also shied away from Stone.

His brother Freddie told Spin magazine in the early `80s that Stone "didn't want to be out in front anymore. The glamour didn't mean anything anymore. He wanted to be normal."

As the years went by, Stone's absence from the public eye became a thing of legend, leading to a documentary, currently in the works, titled, "On the Sly: In Search of the Family Stone."

His appearance Wednesday, bizarre as it was, was still defended by some _ including Adam Levine of Maroon 5.

"Can you really argue with an unbelievable looking mohawk and a silver jacket?"
http://www.washingtonpost.com/wp-dyn...020802510.html





Springsteen, Sting Honor James Taylor
Beth Harris

From Bruce Springsteen's mournful harmonica on "Millworker" to Sting's acoustic guitar on "Close Your Eyes," a generation of singer-songwriters influenced by James Taylor paid tribute to him with their versions of his hits.

Stories abounded when a powerhouse lineup of Sheryl Crow, Bonnie Raitt, Paul Simon, Jackson Browne, David Crosby, the Dixie Chicks, Dr. John and Taj Mahal kicked off Grammy week by honoring the 57-year-old Taylor as MusiCares Person of the Year on Monday night.

Crow was 12 when she saw Taylor at her first concert.

"It was the first time ever I heard 16,000 people sing in unison," she told 2,200 people at the Los Angeles Convention Center. "It was the first time I ever smelled pot and I knew I wanted to be a musician. This is for you, James. You changed my life."

Then she, Browne and Crosby launched into "Mexico," highlighted by a standout horn section.

Sting first saw Taylor as a 19-year-old in Newcastle, England, in 1971.

"I'm a budding songwriter. At least I think I am," the former Police frontman recalled. "I want to see what all the fuss is about. Within four bars, I realize he's a virtuoso of the guitar. He starts to sing in this soft, rich baritone. I think, `I have to change my career. I'll become a bass player in a punk band.'"

Springsteen walked out with no introduction, hailing the North Carolina-raised Taylor as "an authentic Southern voice."

India.Arie showed off her fondness for Taylor by carrying onstage a purse with his black-and-white picture on it. Alison Krauss sang "Carolina in My Mind," the Dixie Chicks harmonized on "Shower the People," and Simon opened the show with an acoustic version of "Sweet Baby James."

Raitt recalled being a college student in Massachusetts and playing shows with Taylor.

"He used to let me open for him and he tuned my guitar," she said before singing "Rainy Day Man."

With companion Nicole Kidman keeping time in the audience, Keith Urban played a driving guitar version of "Country Road."

"Everyone has been telling these great James Taylor stories, and nothing for me says it better than this song," Carole King said, launching into "You've Got a Friend."

Taylor joined her at the piano and they dueted on the final chorus of the song that was an individual hit for both of them.

"I can't thank you enough for showing up. It's not the same without you," Taylor said. "It's strange to be at an event like this and still be alive. It's very moving, very terrifying and very wonderful to hear these songs done live."

It was a working evening for Taylor, who joined his band for "Copperline" and "Shed a Little Light."

Taylor's brother, Livingston, sang backup on "How Sweet It Is (To Be Loved By You)" while Taylor's twin 4-year-old sons, Rufus and Henry, jumped up and down to the music and the crowd clapped along.

Taylor returned for an encore of his classic "Fire and Rain."
http://hosted.ap.org/dynamic/stories...MPLATE=DEFAULT





The Science of Hit Songs
Bjorn Carey

When Ashlee Simpson tops the charts while a critically acclaimed ex-Beatle's album fails to crack the top 200, eyebrows go up in the marketing world.

So what makes a hit?

A new study reveals that we make our music purchases based partly on our perceived preferences of others.

Popularity contest

Researchers created an artificial "music market" of 14,341 participants drawn from a teen-interest Web site. Upon entering the study's Internet market, the participants were randomly, and unknowingly, assigned to either an "independent" group or a "social influence" group.

Participants could then browse through a collection of unknown songs by unknown bands.

In the independent condition, participants chose which songs to listen to based solely on the names of the bands and their songs. While listening to the song, they were asked to rate it from one star ("I hate it") to five stars ("I love it"). They were also given the option of downloading the song for keeps.

"This condition measured the quality of the songs and allowed us to see what outcome would result in the absence of social influence," said study co-author Matthew Salganik, a sociologist at Columbia University.

In the social influence group, participants were provided with the same song list, but could also see how many times each song had been downloaded.

Researchers found that popular songs were popular and unpopular songs were unpopular, regardless of their quality established by the other group. They also found that as a particular songs' popularity increased, participants selected it more often.

The upshot for markerters: social influence affects decision-making in a market.

This research is detailed in the Feb. 10 issue of the journal Science.

The Britney effect

The social-influence group was further divided into eight separate, non-interactive "worlds." Members of each world could not see the decisions of the other seven. The idea behind this was to observe multiple outcomes for the same songs and bands.

"If you look at Britney Spears, some people say she is really good. Others say she isn't good, she's just lucky," Salganik told LiveScience. "But by having just one argument, it's impossible to distinguish. However, if you have 10 worlds, and she's popular in all 10, then you can say she's actually good. But if she's only good in one, then you could say it was due to luck."

Although different songs were hits in each world, popularity was still the deciding factor, although the "best" songs never did very badly and the "worst" songs never did very well.

So what drives participants to choose low-quality songs over high-quality ones?

"People are faced with too many options, in this case 48 songs. Since you can't listen to all of them, a natural shortcut is to listen to what other people are listening to," Salganik said. "I think that's what happens in the real world where there's a tremendous overload of songs."

Alternatively, Salganik said, a desire for compatibility with others could drive the choice, since much of the pleasure from listening to music and reading books stems from discussing them with friends.

"If everybody is talking about 'Harry Potter,' you want to read it too," Salganik said.
http://www.livescience.com/forcesofn...ing_dunes.html





A Vivid Potpourri With Carnage at Its Core
Ken Johnson

Love it, hate it or grudgingly respect it, Thomas Hirschhorn's politically punishing horror show, "Superficial Engagement," at Gladstone Gallery in Chelsea is hands down the most disturbing and provocative art exhibition in town right now.

Mr. Hirschhorn is a Swiss artist based in Paris who has lately been much in demand by ambitious museum curators and international art expo organizers. He is known for sprawling, messy, aggressively didactic installations made from great quantities of cardboard, tape, aluminum foil, photocopies and found objects. For his last show at Gladstone, he created within the gallery a transporting network of cardboard caves. It included a lot of photocopied political literature, but visitors could ignore the social studies and just enjoy the funhouse-like experience and the fantasy of an underground counterculture.

With this show Mr. Hirschhorn evidently decided to take off the gloves. He has crammed into the gallery a series of sculptural tableaus that resemble parade floats constructed by a gang of neo-punk high school anarchists. With mannequins studded with screws like African fetishes, fake coffins, video monitors, photocopied newspaper headlines and articles, Oriental carpets, hand-painted banners and photocopies of geometric artworks, the installation is almost overwhelmingly congested.

But one element stands out clearly: thrusting at you from every direction are images copied from the Internet and other international news sources showing human bodies mangled, burned and dismembered by bombs in Iraq, Afghanistan and other theaters of war and terror.

Another dimension runs parallel to the atrocity photographs: throughout the show Mr. Hirschhorn has placed blurry and washed-out photocopies of drawings by Emma Kunz, the Swiss artist and mystic who created beautiful mandala-like compositions, which she used in her practice as a healer. Taped to cardboard and plywood panels of various sizes, many of which are suspended and angled toward the viewer, the drawings set up a tension between creative transcendentalism and earthbound carnage.

But the poor-quality photocopies of the Kunz drawings do little to mitigate the general feeling of chaos. In this context, they look more like kitschy designs than spiritually resonant artworks. The question remains: to what end has Mr. Hirschhorn orchestrated this assaultive mix of horrifying imagery, ugly materials and crude agitprop? Is he being sincerely expressive or, considering a dark and possibly nihilistic comedic strand running through the show, might he be mocking a kind of sophomoric populist politics? Or is he just trying to make the sort of people who visit Chelsea art galleries feel bad about their comfort and privilege?

For people who get their news only from American sources, which rarely show such grisly documents, the show may be an eye-opener. And that would be consistent with the purposes expressed by the title "Superficial Engagement" and by the artist's own written statement about the show.

Mr. Hirschhorn thinks we need to pay more attention to the surfaces of things. "Superficial engagement is not nonengagement!" he writes. "Let's keep things on the surface, let's take the surface seriously!" It is a persuasive argument. All too often, ideologies, metaphysics and religions that find truths above, below or beyond observable surface realities cause trouble and pain because they so easily justify bad behavior toward nonbelievers and other inconvenient populations.

But what about the high-low tension between the ethereal Kunz drawings and the horrifying photographs? The juxtaposition does not seem to stick to surface realities, and it is not clear what Mr. Hirschhorn means by it. Is he saying we need more beneficent transcendentalism to heal ourselves and our world? Or does he think that rationalism is useless in the face of real-world violence? And doesn't the sight of mangled corpses tend to inflame cycles of revenge, rather than put people off violence?

For all its brutal obviousness and faux-populism, there is something deeply confused and confusing about Mr. Hirschhorn's project. You may suspect that he is unconsciously masking a deeper sense of uncertainty and helplessness by putting on such a vigorously distracting show.

This is the third major exhibition this season by a male artist throwing everything but the kitchen sink into the gallery without regard for aesthetic niceties. Mike Kelley recently filled Gagosian Gallery with a similarly immersive, albeit conceptually obscure series of theatrical tableaus imitating high school theater productions. And at P.S. 1, John Kessler presented an entertaining, enveloping installation of motorized contraptions and videos focused on protesting the United States involvement in Iraq.

All three shows seem at least partly animated by desperation, as though the artists had been driven into arm-waving frenzies of impotent rage by the inability of traditional art forms to address adequately the terrible and infuriating things that are going on in the world.

Mr. Kelley and Mr. Kessler, at least, appear to have had some fun. In Mr. Hirschhorn's show, a puritanical fervor rules out fun and pleasure. He bullies the viewer and induces a vague, free-floating guilt; he's the art world's Lars von Trier. Few artists have taken so seriously Theodor Adorno's famous admonition that creating poetry should be impossible after the Holocaust. It is scary to think what Mr. Hirschhorn might do next.

Thomas Hirschhorn's "Superficial Engagement" continues through Saturday at Gladstone Gallery, 515 West 24th Street, Chelsea; (212) 206-9300.
http://www.nytimes.com/2006/02/07/ar...han.html?8hpib





Singing Sand Dunes: The Mystery of Desert Music
Michael Schirber

If you've never heard a sand dune rumble, listen up. Marco Polo in the 13th Century said the singing sands -- which he ascribed to evil desert spirits -- "at times fill the air with the sounds of all kinds of musical instruments, and also of drums and the clash of arms."

Yes, certain sand dunes will occasionally let out a loud, low-pitch rumble that lasts up to 15 minutes and can be heard up to 6 miles (10 kilometers) away. Some dunes are known to do it regularly, even daily. But why?

To try and uncover the underlying nature of these mysterious sounds, Bruno Andreotti from the University of Paris-7 took equipment out to the Atlantic Sahara in Morocco, one of only 35 known places where the mysterious natural music can be heard.

"Singing dunes constitute one of the most puzzling and impressive natural phenomenon I have ever encountered," Andreotti said.

Setting the stage

Andreotti and his team studied one of the large crescent-shaped dunes, or barchans, which spontaneously sings all year long – sometimes two or three times an afternoon, if windy enough.

Wind forces sand to accumulate at the top of the dune until the angle of the slope reaches a tipping point of about 35 degrees. The eventual avalanche of sand produces the bellowing noise. The sand must be sufficiently dry for the singing to occur. For smaller barchans, the sand must also be hot and the wind still.

"A small dune sings only the few days in which there is no wind and no clouds so that the Sun can dry efficiently the slip face," Andreotti told LiveScience.

Although sand avalanches were known to be the cause of the singing, the exact mechanism was still unclear. Not wanting to wait for a spontaneous episode, Andreotti and his team induced avalanches in the field by sliding down the dunes.

Nature's boom box

By measuring vibrations in the sand and air, Andreotti was able to detect surface waves on the sand that emanated from the avalanche at a relatively slow speed of about 130 feet per second (40 meters per second). In this way, the face of the dune acts like a huge loudspeaker – with the waves on the surface producing the sound in the air.

Andreotti explained these sand waves as resulting from collisions that occur between grains at about 100 times per second, as measured in the lab. In a kind of feedback loop, the waves synchronize the collisions, so they are all on basically the same beat.

This model explains the low pitch – between 95 and 105 Hertz – of the sand song, which, according to Andreotti, resembles a drum or a low-flying propeller aircraft.

The feedback mechanism, as outlined by the researchers in the Dec. 1 issue of Physical Review Letters, also correctly predicts the maximum loudness of the singing to be 105 decibels, at which point the sand grains vibrate off the surface. This level of sound is comparable to a snow blower or a Walkman at full volume.

The mystery is not completely solved. Recent research has centered on a seemingly magical musical property of the singing grains. It is not known, for instance, why the sliding of glass beads is silent, while some rougher sand grains belt out a tune.
http://www.livescience.com/forcesofn...ing_dunes.html





Yakety yak

Peer-to-Peer Service Selects Voiceover Talent

Wurld Media, the developers of a peer-to-peer, digital entertainment network called Peer Impact, has named Randi Miller to be the voice of the service.

Miller is also the voice of the Washington Metropolitan Area Transit Authority.

Washington Metro selected Miller from 1,259 official entries its "Doors Closing Voice 2006" contest, said Wurld Media, which had been following the contest closely. Miller is a leasing specialist at a Virginia Lexus dealership.

"Peer Impact has been looking for their unique signature voice as well and we believe we have found it in Randi Miller," said Gregory Kerber, Wurld Media chairman and CEO. "After hearing Randi's distinctive voice, we knew that we had to offer her this unique opportunity."

Taunia Kipp, Wurld Media vice president of business strategy, said Miller's voice will be used to walk online users through Wurld Media's tutorial segments and as well as provide sound bite prompts.

As Peer Impact continues to roll out new content offerings, features and capabilities, Miller will cheerfully and warmly introduce those services, the Saratoga Springs company said.
http://albany.bizjournals.com/albany...ml?jst=b_ln_hl





When Intel Calls, Skype Listens
Tom Krazit

The latest version of Skype's Internet-calling software can host up to 10 users on a conference call, but only if your PC has a dual- core processor from Intel, Skype and Intel announced Wednesday.

Intel's Core Duo and Pentium D processors have been designated the mass conference-calling processor of choice for Skype 2.0, launched last month. The limit will remain at five callers for PCs using single-core chips and Advanced Micro Devices' dual-core Athlon 64 chip, which some tests have shown outperforms Intel's dual-core chip.

Skype's software allows PC users to make free voice calls to other Skype users over the Internet and to call cell phones and landlines for a fee.

Dual-core processors are basically two processing engines crammed onto a single piece of silicon. The individual processor cores tend to run slower than the clock speeds achieved by single-core chips, but a dual-core chip excels when confronted with two demanding tasks at once, such as scanning a PC for viruses while decoding a video stream.

Despite both AMD and Intel releasing dual-core chips to the market last May, Skype 2.0 software will allow 10-way conference calls only if it detects code specific to Intel's chips when the PC boots, said Rob Crooke, vice president of Intel's Business Client Group.

Intel approached Skype with its plan to optimize code on its chips for Skype's software so users would have a good experience while hosting a multiperson conference call, Crooke said. In recent years, Intel has increasingly touted its software development resources as a competitive advantage over AMD, which also trails Intel in the marketing budget category.

Other processors based on the x86 instruction set, such as AMD's chips or Via's, obviously will not come with the same optimized code found on Intel's chips. Intel and Skype announced a partnership at the Fall Intel Developer Forum last August to make sure Skype's products would run well on Intel's chips.

VoIP (voice over Internet Protocol) conference calls are a compute-intensive undertaking. Skype's minimum system requirement of a 400MHz processor applies only to a single person-to-person VoIP call. Adding multiple users to that connection requires the PC to simultaneously host multiple sessions with those new users, which strains the processor, a Skype representative said.

By choosing to work exclusively with Intel, Skype is excluding technology that is arguably more powerful than Intel's. A series of benchmark tests conducted last year by Tom's Hardware gave an overall performance edge to AMD's dual-core chips but rated Intel's dual-core chips better in some multitasking situations.

AMD is gaining some market share at Intel's expense. Intel still dominates the market for desktop and notebook processors, but AMD took several points of market share from Intel in the fourth quarter, according to Mercury Research and Current Analysis.

Skype did extensive performance testing before releasing this feature for Intel's chips, said Henry Gomez, general manager of Skype's North American operations. He declined to comment on whether the company tested Intel's dual-core chips against AMD's dual-core chips, but said Skype was very satisfied with the performance of the Intel chips.

The 10-way calling feature will be exclusive to Intel's chips for a limited time, Gomez said. Skype is not releasing the time frame for the expiration of the exclusive agreement, he said.

An AMD representative did not immediately return a call seeking comment.
http://news.com.com/When+Intel+calls...3-6036896.html





Sony Sets Price For Blu-Ray Discs
Thomas K. Arnold

Sony Pictures on Tuesday became the first major studio to put a price tag on Blu-ray discs when they become available in U.S. stores this year.

At the same time, the studio unveiled what many observers believe will be a key component of the next-generation, high-definition optical disc's marketing strategy: bundling various formats together to give consumers more flexibility and mobility.

Catalog Blu-ray disc titles will wholesale for $17.95, about the same as DVDs when that format hit the market in 1997. New-release Blu-ray discs will wholesale for $23.45, a premium of 15%-20% over what suppliers were charging for new theatrical DVDs.

The higher pricing structure for new releases is meant to accommodate the sell-through and rental markets, said Benjamin Feingold, president of Sony Pictures Home Entertainment. He noted that in at the dawn of DVD in 1997, most movies initially were released on rental-priced videocassettes.

"The premium is for a way better format and to remind retailers that at the time we launched DVD, VHS was selling for $55 wholesale in the first window," Feingold said.

He added that Sony will not attach any suggested list prices to its Blu-ray discs, at least not at this time.

"From the retail perspective, this is going to be a hot product, and retailers will no doubt determine their own margin structure," he said. "We believe in a free market."

Blu-ray discs likely will start showing up in stores by early summer, sources say. In advance of that, Sony is bowing a bundling concept to DVD and the Universal Media Disc (UMD) that it may migrate to Blu-ray.

Starting March 28, consumers can buy DVD-UMD combo packs of "The Grudge," "Resident Evil," "Underworld," "Crouching Tiger, Hidden Dragon" and MGM's "The Terminator" for just pennies more than Sony typically charges for a new DVD.

A second batch of DVD-UMD combos -- "Ghostbusters," "Mad Max," "The Fifth Element" and "Snatch" -- arrives April 25, with a third wave is slated to come on the market in May.

Each combo is priced at $28.95. Sony typically charges $24.96-$26.96 for new DVD releases, while titles new to UMD generally list for $19.95.

Feingold said that is a taste of what consumers can expect when Blu-ray discs appear in stores.

"With the launch of Blu-ray, we're going to try to introduce the managed-copy concept, where if you buy Blu-ray you'll be able to get additional versions (of the same title) to use in your home," Feingold said. "Ultimately, we might even get to the point where we'll offer consumers the ability to have different versions of the same movie on different devices in the home -- that's something we're working on."

For now, Feingold said, "we're experimenting with UMD," the tiny optical-disc format playable only on Sony's handheld PlayStation Portable (PSP).

"A lot of people have DVD players and also have PSPs, and this way for one price they can get one movie and play it back on both formats," Feingold said.

Feingold would not specify whether future Blu-ray bundling would be electronic or physical, as is the case with the DVD-UMD combo packs.
http://today.reuters.com/news/newsAr...S&srch=blu-ray





I.B.M. Unveils Server Line That Uses Game Chips
Steve Lohr

I.B.M. is betting on video game technology to bring supercomputer-caliber visualization tools to its mainstream corporate market and to reduce the computing costs of daunting tasks like hunting for oil, discovering new drugs and exploring the human body.

I.B.M. announced server computers powered by microprocessors yesterday, using an innovative design called Cell, which was created first for video games.

A Cell chip is the processing engine for Sony's new PlayStation 3 video game console, expected to go on sale later this year. I.B.M., Sony and Toshiba jointly developed the Cell technology.

The move by I.B.M. is an example of a reversal of the traditional trend of technology adoption. In the past, advanced technology was used first by large corporations and the Pentagon. Today, the consumer market often leads as the cost of computing continues to drop sharply.

The I.B.M. Cell server, analysts say, will probably be used first to reduce the cost of applications that now require processing huge amounts of data and presenting the results visually on a screen.

Those applications include converting seismic data into simulated underground images to help petroleum companies look for oil and gas deposits, biological simulations to aid in understanding disease and suggest therapies, and fluid dynamics simulations to improve the aerodynamic design and reduce fuel consumption of jetliners.

The Cell technology, at least initially, is mostly suited for a fairly tailored set of tasks, unlike the broadly general-purpose microprocessors that power personal computers. The Cell chip will be best at what might be thought of as "multimedia physics," computing chores that depend on processing huge volumes of mathematical calculations, known as floating point operations, at lightning speed.

I.B.M. demonstrated two such applications at a gathering in New York yesterday. One was to blend satellite photographs with geological data on landscape contours and elevation data. The result was a simulated flyover of Mount Rainier in Washington State, shifting the perspective by moving a joystick.

Another was to assemble multiple scans inside the body. Three-dimensional images that would have taken minutes or longer to render, even at the most advanced medical centers today, were presented almost instantly.

Analysts said the Cell systems open the door to real-time imaging technology during patient consultations or surgery.

The Cell-based server computers will be available this summer. The machines will be priced at $25,000 to $35,000, an I.B.M. official said, while full-fledged supercomputers can cost millions of dollars.

The Cell servers will run mostly on the Linux operating system, which is popular in high-performance computing.

I.B.M. plans to make the Cell technology widely available to universities and software companies interested in developing applications that will run on Cell chips.

"We want to see how far we can take Cell technology beyond games, and the biggest challenge to making that work is the software tools for building new applications," said William M. Zeitler, senior vice president for I.B.M.'s systems and technology group.


Visualization can provide a picture of a gigantic amount of information, often enabling a human user to absorb and understand more information rapidly.

That is the practical reason for applications from medical imaging for physicians to terrain mapping for fighter pilots.

Video games work on much the same principle. More and more of computing, according to I.B.M. researchers, may be presented visually to users in the future.

"We're hoping that this gaming stuff will get us to the next level of user interfaces," said James A. Kahle, the chief technologist for Cell systems and an I.B.M. research fellow.

That may be only a hope today, but industry analysts say the Cell approach looks promising.

"If you see the future of computing as 'give me the answer now,' it favors something like Cell, a computer platform designed for photorealistic modeling," said Richard Doherty, president of Envisioneering, a technology research firm.
http://www.nytimes.com/2006/02/09/te...gy/09blue.html





U.K. Tackles 'Trivial Patents' Issue
Ingrid Marson

The U.K. Patent Office is seeking public comment as part of its examination of how well the current system works and whether too many trivial patents are being granted.

One of the main criteria of patentability under U.K. law is that inventions must "not be obvious to someone with a good knowledge and experience of the subject," according to the U.K. agency. But now it wants to find out whether this requirement meets the needs of inventors, the public at large and the U.K. economy. So late last week, the office launched its request for public comment.

"Are too many 'trivial patents' being granted? Or are innovation and competitiveness best served by easy patenting with low hurdles?" asks the patent agency.

Ron Marchant, chief executive of the U.K. Patent Office, said it is important to strike the right balance with the criterion of inventiveness.

"An inventive step requirement which is too difficult for applicants to achieve could result in inventions that might deserve a patent not receiving protection, thus hindering the applicant in research and investment. Alternatively, the danger of an inventive step which is too easy to meet is that patents could be obtained for small changes or improvements that hamper the legitimate activities of third parties. It is important that they help us to find the best solution," he said in a statement.

Over the last few years, there has been increasing criticism of patent offices around the world for granting trivial patents. Last year, a study found that a quarter of U.S. patent holders thought the quality of patents was "somewhat worse" than three years ago, with the quality of patents granted in the technology industry thought to be worse than in any other major sector.

The Foundation for a Free Information Infrastructure, an intellectual property campaign group based in Munich, Germany, provides information on a number of software patents granted by the European Patent Office that it considers trivial, including a patent for a progress bar and a menu tab.

In an interview last year, a software manager at a small technology company told ZDNet UK that large companies tend to swamp patent offices with well-worded patent applications for trivial technologies with the knowledge that a certain proportion of them will be passed.

The U.K. Patent Office is accepting public comment until May 31.
http://news.com.com/U.K.+tackles+tri...3-6035997.html





TorrentSpy's Quest for Legitimacy
Thomas Mennecke

The transition or implementation of authorized file-sharing networks is not a new concept. Altnet was among the first, as it helped distribute authorized content along side the FastTrack network. PeerImpact followed suit as it released its fully secure P2P network to the public in 2005. iMesh transitioned from a free P2P network to a pay community last year. While authorized P2P models are fairly common, is the world quite ready for an authorized BitTorrent indexer?

That's the question TorrentSpy is ready to confront head on. Throughout TorrentSpy's history, it has frequently adhered to the many cease and desist notices provided by content owners. However in an effort to confront the constant barrage of take down notices, TorrentSpy is attempting a novel approach. Already indexing a limited number of authorized content, TorrentSpy is looking to take this perspective to the next level. Justin, the owner and administrator of TorrentSpy, discusses with Slyck.com his quest for legitimacy.

Slyck.com: What exactly and specifically is TorrentSpy trying to do?

TorrentSpy: Our primary goal is to be the most comprehensive file search website on the Internet. Torrents will remain our area of focus but we want to expand to include files such as: game patches, mods, shareware, trialware, driver updates, etc.

The secondary goal is get involved in the distribution of authorized, licensed content such as music, television, and video.

Slyck.com: What is your motivation for providing authorized content?

TorrentSpy: Our goal is help bring TV and Movie distribution into the 21st century.

Surprisingly enough, they are still running around with physical film reels! I want to allow people to download an individual TV show or movie and pay a reasonable price. It is no different than as Tivo & other DVRs, but it is done over the Internet instead. That would be very cool and I want to help make that happen.

Slyck.com: What is your philosophy on the proliferation of copyrighted material and how does that tie into your business model?

TorrentSpy: I believe that rights holders should be able to make money on their work. That is why we respond to DMCA takedown requests. I have a family, a car payment, etc. So if I make something I deserve the right to make money from it and TorrentSpy supports others doing the same.

Slyck.com: Let' say TorrentSpy reaches an agreement with a movie studio. What will that mean to the end user? How much will their current experience change?

TorrentSpy: The plan is for the user experience to remain the same - there will simply be authorized downloads in the search results. So far the studios have been resistant to this idea...which is unfortunate. However, they resisted the VHS tape if you remember and that has been a massive success for them. Heck, they even resisted the DVD too if I recall. Eventually they will realize the huge opportunity they are missing out on and hopefully we will be there to make great things happen.

Slyck.com: In response to legal threats, TorrentSpy has been filtering results for nearly a year now. How has this affected your daily traffic?

TorrentSpy: Actually we have always filtered by following the procedures of the DMCA. We may not have grown as fast as some of the sites that don't filter, but that is OK with me.

Slyck.com: Is it the duty of torrent search site owners to police the torrents their search engine finds?

TorrentSpy: It is not the responsibility of a search engine to monitor content indexed and I am not sure how such a thing would be possible in the first place. The system simply searches the web and lists the torrent files it finds. We make it pretty easy for rights holders to remove torrents of their content and many companies (such as Microsoft) use it all the time.

Slyck.com: Is there a danger legitimate content, such as parodies and spoofs of copyright woks, could get caught up in a filter?

TorrentSpy: No filter is perfect and most are very, very far from it. Napster was never able to develop a good filter and I don't believe anyone else has either. Here is a good example of the danger with inadequate filtering: At one time AOL tried to filter websites for parental controls or something. A girl knew someone had breast cancer so she tried to learn more about it on the web.

Unfortunately AOL said naughty, naughty, "breast" is porn so you cannot learn about this horrible disease your friend has. These examples happen all the time, and while parental controls can error on the side of being too restrictive, the Internet at large cannot subject itself to inaccuracies of this nature.

Then there are things like "Star Wars: Revelations" which is a fan film that is allowed by Lucas. What is the automated filter to keep that in but other stuff out? I have no idea and neither do my developers. It is a giant mess that nobody has figured out how to do well yet.

Slyck.com: Is the plan to filter out all unauthorized copyright material over night, or is this going to be a gradual process?

TorrentSpy: We have had a filtering policy in place since the site began and it seems to be working well for both rights holders and our users, so we have no plans to change it.

Slyck.com: Have you begun talks with content owners/providers yet? How receptive have owners/providers been? What types of media will you index, music, movies, and games?

Our goal is to index all media types, movies, music, games, and software. We have talked with a number of movie companies, music labels, and individuals to figure out something that can work for everyone. The reactions range from "get out now" to "love it! I want your baby" so there is still a lot of work to be done. We believe what we want to accomplish will benefit everyone so remain hopeful it will all come together.

Slyck.com: TorrentSpy has aggravated users by including adware in "free" screensavers. Is this any way for an internet business to behave? For example, sites like iTunes or CinemaNow would never be caught distributing ad/spyware. It is a very "warez" thing to do. Can you be taken seriously with this history?

TorrentSpy: Haha, well that is not exactly a fair comparison since iTunes and CinemaNow charge for their downloads.

Those screensavers were a giant pain since we had to license all the pics - The company wanted money, then the girls wanted money, then the photographers wanted money. So how do you pay for that? Besides, we were careful to pick a product that allowed an easy uninstall. Don't like it? Fine, uninstall it with a few clicks. I guess I don't see what everyone is so upset about when it is that easy. Of course I am sure to get flamed for that opinion :-D

Slyck.com: If you could look into the crystal ball for a moment, when do you foresee the first authorized content appearing on Torrent Spy?

TorrentSpy: There already is authorized content on TorrentSpy. Some people have uploaded torrents of their own stuff to get it distributed. We do intend to include additional material as well though. As for movie and recorded music content, I hope we'll have something up in the next 30 days.

Slyck.com: What are your thoughts on DRM and how will such technology play a role on the future Torrent Spy?

TorrentSpy: Right or wrong, people are used to the concept that buying something means they own it and can do whatever they want with it. DRM gets in the way of that perception so people don't like it very much.

The thing I hate about DRM is that if you upgrade your computer, have a hard drive crash, get your MP3 player stolen, etc. all the purchased DRM protected media you have is gone with it. I don't know about you, but that kind of stuff happens to me all the time so losing all my DRM content is not good.

So DRM has both technical and social barriers to adoption and has a long way to go before people accept it, especially with the restrictions the media companies want to implement with it.

Slyck.com: Given the low cost of bandwidth compared to the cost of downloads, how can P2P play a serious role in the distribution of video content? If people want to go through the hassle of getting to grips with P2P, would they not just pirate the content?

TorrentSpy: iTunes has shown that people are willing to pay a reasonable price for music and now TV. They have done hundreds of millions of downloads. Music has been easily obtainable on p2p networks for years and if everyone was obsessed with piracy, iTunes would not be the success it is today.

There are some compelling reasons for authorized content. The first is download speed. BT is great, but it is still slower than a direct download. Another is assurance that the media is not some sort of virus or trojan (that recent Microsoft exploit with image files was scary!) Another is to support the artist who made the work. There are a few more, but those are the big ones.

Slyck.com: Any other thoughts, comments, observations?

TorrentSpy: I believe the efforts of the MPAA and especially RIAA to date have been shortsighted and that fanatical filtering (and lawsuits) of everything in sight has not been a success for them in the 6+ years they have been doing it (and I don't see that it ever will). They are blinding themselves to the larger opportunity of providing viable alternatives to illegal downloading by end users. We can help if they will only allow us the opportunity.

-- As TorrentSpy moves forward with its plans, it will try to force the reconciliation of two ideals. One, content owners must accept that the Internet, for all its short comings, will be the distribution medium of the future. Second, those who have refused to accept the viability of paid content must now find a way to live along side it.
http://www.slyck.com/news.php?story=1086





How to Get Your Missed TV Shows with Azureus and Bittorrent
WhoopJack

I'll start by saying that I am a paying cable subscriber. Often times there are multiple shows on at the same time that I would like to watch and I wanted a way to be able to watch those other shows.

I have a 37 inch Dell LCD TV and enjoy watching as much HD content on it as I can. Hooked up to it via one of the HDMI ports I have a PC which I am using as a media center. It currently has two hard drives in it, a 120GB and a 250GB along with an ATI Theater 550 TV card. I use the TV card to record shows that are not generally in HD content or we don't care that they are in SD, like soaps for my wife. The rest of the shows that we'd like to watch in HD or missed recording we download from the internet using a Bittorrent client as I'll describe now.

My client of choice is Azureus, simply for its ease of use plus I like all the features it has along with the plugins available for it. I also have done quite a bit of Java development in the past which steers me more towards this client since I know I could write my own plugins or make modifications to it if I wanted.

The client alone will get you the ability to download torrents either by clicking on the torrent link in a browser or by copying a torrent download link and opening it within Azureus. My goal was to get an automated package set up where I don't need to manually go and download the shows we enjoy. To do this I took advantage of some plugins for the Azureus client.

The first plugin I got was the RSSFeed plugin. This plugin will watch a set of user defined RSS feeds, from the torrent sites that make them available, and download files based on user defined filters. The filters can be specified as regular expressions. For the basic user that may not understand regular expressions it is probably easiest to first find the RSS feeds you want and then after setting up the feed you can right-click on a torrent in the feed listing and choose "Create Filter" to create a filter based on that torrent. The plugin does a pretty good job at coming up with a regular expression that should pick up future occurrences of that show. Another nice feature of the plugin is the "Smart History" option which will help to keep duplicate episodes from being downloaded. You can also specify season and episode ranges for a filter. A good place to start for a torrent site RSS feeed is www.tvtorrent.info. This is the first step in automating your TV show capturing experience.

I found the easiest way to look for shows to download is to just browse the data returned from your RSS feeds for the first week or so and create filters when you find something you like. Another step I took, so as not to miss new shows, was to set up a filter that will download all first season, first episodes of a any show. This way we can watch a new show when it comes out and decide if we want to get future episodes if we liked it.

I have my filters setup to download to the same directory that my TV shows are recorded to via my TV card. This makes it easier on my wife when she wants to look for something to watch. As a side note, I am using GB-PVR as our media center software. I am also using a task bar tray icon plugin with it which makes it easier for my wife to get to all the shows. It also displays what is currently recording or is scheduled to record without opening the full blown interface. I found the full blown interface to still be a bit buggy in parts which is why I like the little icon better.

My next dilemma came from the fact that I don't use the media center PC as my main workstation. I found that I sometimes would be surfing the web on my laptop, which is in a different level and room of our house, and I would come across a torrent that I wanted to download, but not on my laptop. To solve this problem I am making use of another Azureus plugin, the HTML Web UI plugin. I should note that my house is wired with a network connection in every room, so every system in my home is connected to each other and the internet. With the web ui plugin you can upload torrent links to Azureus through a web page served up by the plugin. This also works great for checking the status of Azureus through a browser on any system in my house. I submitted torrent urls via this interface a few times when I came across torrents while on my laptop. It works, but I'm lazy and thought there were still too many steps to get a torrent download link from a page to Azureus through the web ui.

I noticed that the upload form in the web UI is quite simple, only consisting of two fields that need to be sent to the plugin for it to accept a download request. This is the link itself and an action parameter. What I really wanted was to be able to right click a torrent download link in my browser on my laptop, which is Mozilla Firefox, and have an option to send the link to my Azureus client on my media center PC. After some testing with different Mozilla extensions I finally found the one that works easiest. I installed the ConQuery extension. This extension allows you to submit different data found on the currently viewed web page to another page. It was mainly created for selecting terms on a page and submitting those terms to a search engine like Google. I had a different plan in mind. I am using it to right-click a torrent download link and submit it to my media center PC to begin downloading the file. To do this I created a simple search plugin file that you place into your "\Mozilla Firefox\searchplugins" directory. Here is the code for that file. Simply copy and paste the code and save to the previously specified directory in a file called something like Azureus.cqr, making sure to replace the [azureuspc] with the name or IP of your PC that is running Azureus with the HTML web UI plugin installed:


# Status: Working Full
# ConQuery plugin
# by WhoopJack
#
# Language: en
#
# Created: Feb 8, 2006
# Last updated: Feb 8, 2006
#
# Known issues:
# works from 0.8 and higher

<SEARCH
name="Send to Azureus"
description="Send a torrent link to an Azureus server"
action="http://[azureuspc]:6886/index.tmpl"
category="net services"
method="GET"
>

<input name="d" value="u" label="Upload">
<input name="upurl" value="[:linkurl]" label="Torrent URL">

</search>


Now after restarting Firefox you should be able to go to a page that contains a torrent download link and right-click the link and choose "Query to..." --> "Send to Azureus".

Ah, I love being lazy

http://ipbs.blogspot.com/2006/02/how...hows-with.html















Until next week,

- js.


















Current Week In Review





Recent WiRs -

February 4th, January 28th, January 21st, January 14th

Jack Spratts' Week In Review is published every Friday. Please submit letters, articles, and press releases in plain text English to jackspratts (at) lycos (dot) com. Include contact info. Submission deadlines are Wednesdays @ 1700 UTC.


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 06:56 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)