Humans 'affect global rainfall'

Found on BBC News on Sunday, 22 July 2007
Browse Nature

Human-induced climate change has affected global rainfall patterns over the 20th Century, a study suggests.

Researchers said changes to the climate had led to an increase in annual average rainfall in the mid-latitudes of the Northern Hemisphere.

Climate models have, for a number of years, suggested that human activity has led to changes to the distribution of rain and snow across the globe.

"We show that anthropogenic forcing has had a detectable influence on observed changes in average precipitation within latitudinal bands," the researchers wrote in the paper.

Now I can agree on that. It's raining right now.

US Government Checking Up On Vista Users?

Found on Slashdot on Saturday, 21 July 2007
Browse Internet

This article at Whitedust displays some very interesting logs from Vista showing connections to the DoD Information Networking Center, United Nations Development program and the Halliburton Company; for no reason other than the machine was running Vista. From the article 'After running Vista for only a few days — with a complete love for the new platform the first sign of trouble erupted. I began noticing latency on my home network connection — so I booted my port sniffing software and networking tools to see what was happening. What I found was foundation shaking. The two images below show graphical depictions of what has and IS trying to connect to my computer even in an idle state'.

First of all: I'm not posting this because I take that article serious. In fact, I'm posting because it obviously shows what happens when people without much knowledge try to act smart. First, you don't "boot" port sniffing software; you boot an OS and launch an application. And the graphical proof? Screenshots of PeerGuardian. Sorry, but that's not a port sniffing software. Furthermore, the setup of the systems involved is nowhere described. Typically, PeerGuardian is run by filesharers, so I assume he downloads via Bittorrent. At this point one should ask exactly what is the reason for those packets. Vista or the P2P software? There can be many reasons: spoofed IPs, infected hosts, P2P sharers inside the DoD and so on. Oh, and the entry in the lists can be simply wrong. To sum it up: it's an article which doesn't need to be read at all; it won't even make a conspiracy theorist nod in agreement.

Prisoners try to copyright their escape plan

Found on Telegraph on Friday, 20 July 2007
Browse Legal-Issues

Four enterprising prison inmates have been accused of trying to blackmail their way out of jail after they copyrighted their names and then demanded millions of dollars from jail officials for using them without permission.

Russell Dean Landers, Clayton Heath Albers, Carl Ervin Batts and Barry Dean Bischof allegedly sent demand notices for payment to the warden of the El Reno federal prison in Oklahoma City and filed claims against his property.

Believing the warden's property had been seized, the inmates allegedly said they would not return it unless they were released from prison, according to the indictment.

The four and another man, who allegedly assisted in their scheme, have been charged with conspiring to impede the duties of federal prison officials and with mailing threatening communications with the intent to extort.

If convicted, they each face up to 16 more years in prison and a £250,000 fine.

Creative. Very creative.

We're All Terrorists!

Found on Wired on Thursday, 19 July 2007
Browse Various

They may never know it, but U.S. air travelers and others set off silent terrorist warning alarms nearly 20,000 times in 2006 when their names matched against the government's centralized terrorist watch list, according to a statistic buried in a Department of Justice document.

The number represents a 27 percent jump over 2005, and points to the growth in the federal Terrorist Screening Center, a joint FBI and DHS operation that controls the government's master list of suspected terrorists. Agencies from the FBI to the NSA nominate names to the database and assign threat level codes to each name. The criteria for inclusion is considered classified.

27 percent more matches mean 27 percent more terrorists? I doubt so. This list is just not really effective if it causes so many false postitives. Otherwise, officials would have praised the list and boasted with its success, telling everybody how many terrorists have been arrested just because of that.

MPAA to FCC

Found on Ars Technica on Wednesday, 18 July 2007
Browse Internet

The MPAA is concerned that network neutrality rules might bring an end to such beloved technologies as digital watermarking, deep packet inspection, acoustic fingerprinting, and content filtering of all kinds.

The MPAA's concern is not with winning any sort of broad ideological ground in the debate over how the Internet should work, but to make sure that ISPs can "manage their networks to protect intellectual property in order to best serve the interests of content creators and the content-consuming public."

Going beyond the specific technologies listed above, the MPAA believes that ISPs need to have the right to control traffic shaping, quality of service guarantees, latency, and bandwidth hogging—all of special concern when it comes to regulating P2P traffic.

ISP's should not be allowed to meddle with the data running through the lines. They provide the access, nothing more, nothing less. When they advertise their service as unlimited it means I can make unlimited use of it. Bandwith shaping, filtering and similar activities clearly decrease the service I've paid for. If an ISP want to block P2P or free SMTP connections, it should say so; and not just in vague words in the fineprint on page 324 of the TOS. Then the customer can decide if he's ok with that or if he prefers to sign up with another, better ISP.

Book-leak mole is hunted

Found on The Sun on Tuesday, 17 July 2007
Browse Various

A massive hunt was under way last night to find the mole who leaked the new Harry Potter online.

American publishers Scholastic went to court to identify the person who revealed details of the novel five days before its official release date.

The mole breached the tightest security operation in publishing history to put the first two-thirds of the US version of the book on a website.

English publishers at Bloomsbury are said to be "spitting blood".

A source in America said last night: "Heads are sure to roll over this." Bloomsbury recently told how it spent £10million on a massive security operation to ensure no secrets leaked.

Its furious American counterparts at Scholastic launched a court order claiming infringement of copyright to track down the culprit.

Honestly, I had to laugh. "The tightest security operation in publishing history" wasn't so tight at all. Still, it might be some clever PR stunt to draw attention to the release. According to rumors, almost everybody dies and the surviving rest, Ron, Hermione, Harry and Ginny, marries. In five days, the fans will know if that's a fake, or the real release. Still, there's no reason to get as angry as the publishers did: sure, it leaked. However, the fans will still buy it, even if the cat is out of the bag. JKR will make millions again and nobody cares about the 5 people who actually read the 608 pages on the computer.

RIAA's final tab for Capitol v. Foster: $68,685.23

Found on Ars Technica on Monday, 16 July 2007
Browse Legal-Issues

Debbie Foster's battle with the RIAA appears to be finally over. Today, a federal judge in Oklahoma closed the book on Capitol v. Foster by awarding her $68,685.23 in attorneys' fees, a ruling first reported by Ray Beckerman's blog.

Foster was sued by the RIAA in November 2004 for copyright infringement. She denied infringement and began a legal fight against the music industry. In July 2005, the labels added her adult daughter Amanda Foster to the suit.

Judge West decided that $68,685.23 was adequate to compensate Barringer-Thompson and her legal staff for the time spent litigating the case. He also rejected the RIAA's argument that Foster was not entitled to fees incurred after "some point when she allegedly 'could have avoided [fees] altogether but chose not to do so,'" reiterating that she was fully entitled to fight the RIAA's charges and as a result, eligible for an award of attorneys' fees.

What a hilarious argumentation. Of couse she could have avoided the lawsuit if she would have paid up as the industry planned it. This argument applies to pretty much every extortion and robbery: the victims always can avoid a lawsuit if they just hand over the cash.

RIAA spends thousands to obtain $300 judgment

Found on Ars Technica on Sunday, 15 July 2007
Browse Legal-Issues

What's the cost of file-sharing? For Terri Frye of Hickory, NC, it was $300. That's the amount she'll have to pay the RIAA after agreeing to a judgment in a file-sharing case. Frye is a single mother living in state-supported housing who received one of the RIAA's settlement letters in November 2005.

Despite contacting Frye in late 2005, the RIAA did not actually file suit until March of this year. In the intervening period, Frye repeatedly informed the RIAA that they had the wrong person.

The end result is that the RIAA likely spent thousands of dollars to obtain a $300 judgment. And although Frye agrees to be enjoined against future copyright infringement, she does not admit to any wrongdoing.

MediaSentry flagged 706 songs on the computer that became the basis for the lawsuit, and at $750 per song, that works out to a total of $529,500. The RIAA settled for a minuscule fraction of that number, one curiously close to the 70¢-per-track figure a record industry attorney said is close to the labels' share of each track sold.

Thick-headed as they are, they will probably try to extort the losses from others and run from politician to politician whining about the unfair life.

Indiana Allows BP To Pollute Lake Michigan

Found on Slashdot on Saturday, 14 July 2007
Browse Nature

Indiana regulators exempted BP from state environmental laws to clear the way for a $3.8 billion expansion that will allow the company to refine heavier Canadian crude oil. They justified the move in part by noting the project will create 80 new jobs. The company will now be allowed to dump an average of 1,584 pounds of ammonia and 4,925 pounds of sludge into Lake Michigan every day.

Yes, let's all protect the nature as good as we can Oh, and no direct link because the Chicago Tribune thinks you have to sign up to read their news.

Zune DRM Stripper

Found on Zune Scene on Saturday, 14 July 2007
Browse Software

These days it's hard to keep digital media locked up in any format. Our Zune ears recently heard tell of a program that strips DRM off of tracks purchased from the Zune Marketplace, or traded via Wi-Fi. What makes this more significant is the optional Zune subscription which allows users to download almost all the Zune Marketplace.

We decided to download and test the Zune DRM stripper for ourselves to see if it actually works. In fact, it was so effective that we have decided not to publish any links to it. Of course these things will get out regardless.

Another proof that DRM is designed to fail. It should be very easy to get your hands on the software, considering that one of the screenshots shows FairUse4Wm and mirakagi.exe; the additional hint that this binary does the decryption should make it clear what to search for. Plus, the three (looks like search engine spammers haven't picked that one up yet) returned results are not too confusing, considering that one of those leads to Doom9, where the files are mirrored at several sharing sites.