The Pirate Bay: Here to Stay?

Found on Wired on Sunday, 12 March 2006
Browse Filesharing

Last month, the Motion Picture Association of America announced one of its boldest sorties yet against online piracy: a barrage of seven federal lawsuits against some of the highest-profile BitTorrent sites, Usenet hosts and peer-to-peer services. Among the targets: isoHunt, TorrentSpy and eDonkey.

But, as always, one prominent site is missing from the movie industry's announcement (.pdf), and it happens to be the simplest and best-known source of traded movies -- along with pirated video games, music, software, audio books, television broadcasts and nearly any other form of media imaginable. The site is called The Pirate Bay, and it's operated by a crew of intrepid Swedes who revel in tormenting the content industries.

To international observers, The Pirate Bay's defiant immunity from copyright lawyers is somewhat baffling. But in Sweden, the site is more than just an electronic speak-easy: It's the flagship of a national file-sharing movement that's generating an intense national debate, and has even spawned a pro-piracy political party making a credible bid for seats in the Swedish parliament.

Viborg said that no one has successfully indicted The Pirate Bay or sued its operators in Swedish courts. Attorneys for DreamWorks and Warner Bros., two companies among those that have issued take-down demands to the site, did not return calls for comment.

The site's Stockholm-based servers provide only torrent files, which by themselves contain no copyright data -- merely pointers to sources of the content. That makes The Pirate Bay's activities perfectly legal under Swedish statutory and case law, Viborg claims.

MPAA spokeswoman Kori Bernards insists The Pirate Bay violates copyright laws around the world. "Copyright laws are being enforced and upheld in countries all over the world and when you facilitate the illegal file swapping of millions of people around the world, you are subject to those laws," said Bernards.

Antipiratbyrån's efforts to halt file sharing have prompted Sweden's outspoken pirates to run for office as the Pirate Party.

It may sound like a joke, but Sjöman said the Pirate Party has 1,500 members, and has gathered enough signatures to participate in the Swedish general election in September. He said the government estimates that there are 1.2 million file sharers over the age of 18 in Sweden, and the Pirate Party needs only four percent, 225,000 votes, to get seats in the country's parliament.

If elected, the Pirate Party promises to strengthen Swedish privacy protections, weaken copyright laws, abolish the EU Data Retention Directive and roll back government surveillance legislation, said Sjöman. The party plans to hold its first convention in April, aboard a pirate ship.

Arrrrr, go vote! If I'd live in Sweden, the Pirate Party would get my vote for sure; there is need for someone to stand up against the industry and its greed and bully tactics. This time it's even amusing to hear the MPAA whine. Although they claim Piratebay is illegal, they haven't sued them yet. Quite surprising. Don't forget to read the three pages at Wired; it's a great article.

McAfee update exterminates Excel

Found on CNet News on Sunday, 12 March 2006
Browse Software

For a brief period on Friday, McAfee's security tools killed more than viruses.

An error in McAfee's virus definition file released Friday morning caused the company's consumer and enterprise antivirus products to flag Microsoft's Excel, as well as other applications on users' PCs, as a virus called W95/CTX, Joe Telafici, director of operations at McAfee's Avert labs, told CNET News.com.

McAfee's antivirus software detected Excel.exe and Graph.exe, two Microsoft Office components, as well as other software, including AdobeUpdateManager.exe, an application installed alongside Adobe products that deals with software updates, Telafici said.

Can you say "whoops"?

Internet blows CIA agents' cover

Found on BBC on Saturday, 11 March 2006
Browse Internet

The Chicago Tribune says it has compiled a list of 2,653 CIA employees, just by searching the internet.

The newspaper said it gathered the information from online services that compile public data, that any fee-paying subscriber can access.

It did not publish the names, at the CIA's request. Many of the agents are believed to be covert. The paper also located two dozen "secret" facilities.

The paper also identified facilities in Chicago, northern Virginia, Florida, Ohio, Pennsylvania, Utah and Washington state. It said some were heavily guarded, but others appeared outwardly to be private residences.

Asked how so many personal details of CIA employees had found their way into the public domain, a senior US intelligence official told the Tribune "I don't have a great explanation, quite frankly".

Asked about fears that the details might be accessed by terrorist groups, he replied: "I don't know whether al-Qaeda could do this, but the Chinese could."

Obviously some people aren't aware of the power of search engines. Besides, it is not wise to underestimate an enemy; you might end up dead. If you aren't sure, at least give him the benefit of doubt and overestimate him.

Ex-employee faces suit over file deletion

Found on ZDnet on Friday, 10 March 2006
Browse Legal-Issues

Jacob Citrin was once employed by International Airport Centers and given a laptop to use in his company's real estate related business. The work consisted of identifying "potential acquisition targets."

At some point, Citrin quit IAC and decided to continue in the same business for himself, a choice that IAC claims violated his employment contract.

Normally that would have been a routine business dispute. But the twist came when Citrin dutifully returned his work laptop--and IAC tried to undelete files on it to prove he did something wrong.

IAC couldn't. It turned out that (again according to IAC) Citrin had used a "secure delete" program to make sure that the files were not just deleted, but overwritten and unrecoverable.

Inevitably, perhaps, IAC sued. The relevance for Police Blotter readers is that the company claimed that Citrin's alleged secure deletion violated a federal computer crime law called the Computer Fraud and Abuse Act.

The 7th Circuit made two remarkable leaps. First, the judges said that deleting files from a laptop counts as "damage." Second, they ruled that Citrin's implicit "authorization" evaporated when he (again, allegedly) chose to go into business for himself and violate his employment contract.

The implications of this decision are broad. It effectively says that employees better not use OS X's Secure Empty Trash feature, or any similar utility, because they could face civil and criminal charges after they leave their job.

I bet if your laptop gets stolen and you never deleted files, they can sue you because you kept inside business information on your laptop.

IBM Builds Super Fast File System

Found on Betanews on Thursday, 09 March 2006
Browse Computer

IBM on Thursday announced that it had scored a breakthrough in file system technology that increases the speed of data access by seven times. Researchers were able to attain a 102-gigabyte per second transfer rate on the ASC Purple supercomputer at Lawrence Livermore National Laboratory in a recent test.

The file system was an astonishing 1.6 petabytes in size, the largest ever in the world, and performance was maintained even as 1,000 clients pushed workloads into the file. The project used 104 Power-based eServer p575 nodes and 416 storage controllers, IBM said in a statement.

Called the General Parallel File System (GPFS), the technology allows for high-speed access to files across multiple nodes of a Linux or AIX cluster. The file system could be used in a variety of fields, including engineering design, digital media and entertainment, data mining, financial analysis, seismic data processing and scientific research.

IBM will push GPFS on several fronts, including an effort to even promote its use on non-IBM hardware. The source code behind the file system will be released to eligible clients who can develop upon the technology and share their work with others.

There already is new filesystem around which is perhaps not as fast as GPFS, but still better. IBM aimed at speed, but the creators of ZFS had also safety in mind: transactional file writing and checksums for data blocks to detect errors. The limit of ZFS are 256 quadrillion zettabytes (IBM's 1.6 petabytes are 1,638 terabytes, but 1 zettabyte is equal to 1,073,741,824 terabytes).

Internet tops TV as most popular pastime

Found on Daily Mail on Wednesday, 08 March 2006
Browse Internet

Surfing the Internet is now more popular than watching television, according to new figures.

It is believed to be the first time that using the Internet has overtaken what was traditionally seen as the nation's favourite pastime.

And experts claim that future computer-literate generations will see an increase in the amount of time spent online. Analysts from TNS surveyed more than 1,000 adults aged 16 to 64 for the Internet search engine Google. They found that, on average, we spend 164 minutes online every day compared to 148 minutes watching television. One reason for the increase is thought to be that many people can access the Internet at work.

With all that useless junk on TV that's not really surprising.

Google outspooks the spooks

Found on The Register on Tuesday, 07 March 2006
Browse Internet

Google wants to mirror and index every byte of your hard drive, relegating your PC to a "cache", notes on a company PowerPoint presentation reveal.

The file accompanied part of Google's analyst day last week. Google has since withdrawn the file, telling the BBC that the information was not intended for publication.

The justification for this enormous data grab is that Google would be able to restore your data after a catastrophic system failure.

Perhaps it's Google's gift to the US government. In August 2003, Admiral John M Poindexter was forced to resign after his 'Total Information Awareness' data mining program was revealed to be indexing "everyday transactions as credit card purchases, travel reservations and e-mail."

Sure, every person and company will happily transfer all their data to Google. Even if they plan to protect the data by encrypting it, there could be still a backdoor.

Windows Live Search goes Live

Found on Slashdot on Tuesday, 07 March 2006
Browse Software

"Microsoft has launched the Windows Live Search. Among the reports, Microsoft Search Senior Product Manager, Justin Osmer says that "The beta, and a revision expected in a few months, will challenge market leader Google."" I like the more dynamic image searching tool. It seems really slow- I'm not sure if that's the dynamicness (is that a word?) or just standard launch lag.

It's not like I like to run MS down... but when I first tried to test it, I got a "Server busy" message only. Obviously Live got slashdotted pretty fast (the article was still on top). About 6 hours later, I gave it another try; it turns out you need Javascript and Cookies. But even with all that, it did not return any results, just the same site over and over (and all that was tested in IE5.5). Not to mention it's slow and sometimes just returned a blank page. Surprisingly, Live works in Firefox. I got quite a different layout than in IE and finally had the chance to test it. A quick search for "miserable failure" brings up rather different top hits; Live returns the homepage of Michael Moore, but Google lists Dubya's biography as number 1. Are those unaltered results? Only MS knows. To sum it up: I can challenge Google, you can challenge Google, MS can challenge Google; the success is the same.

Financial responsibility can lead to terrorism

Found on Capitol Hill Blue on Monday, 06 March 2006
Browse Various

Walter Soehnge is a retired Texas schoolteacher who traveled north with his wife, Deana, saw summer change to fall in Rhode Island and decided this was a place to stay for a while.

They paid down some debt. The balance on their JCPenney Platinum MasterCard had gotten to an unhealthy level. So they sent in a large payment, a check for $6,522.

After sending in the check, they checked online to see if their account had been duly credited. They learned that the check had arrived, but the amount available for credit on their account hadn't changed.

They were told, as they moved up the managerial ladder at the call center, that the amount they had sent in was much larger than their normal monthly payment. And if the increase hits a certain percentage higher than that normal payment, Homeland Security has to be notified. And the money doesn't move until the threat alert is lifted.

Eventually, his and his wife's money was freed up. The Soehnges were apparently found not to be promoting global terrorism under the guise of paying a credit-card bill. They never did learn how a large credit card payment can pose a security threat.

Thanks to some minor changes to the Bank Privacy Act, money transfers aren't that secret anymore.

AIM Now (Mostly) Open To Developers

Found on Slashdot on Sunday, 05 March 2006
Browse Software

Today is a historic day at AOL as we announced a software development kit for AOL Instant Messenger. Open AIM will empower you, as the developer, to write custom clients and plugins. For now, lets concentrate on the Open AIM SDK and get into what it can do for you.

We now have a solution to provide all AIM users and consumers to build their own IM clients and to extend the features of Triton via plugins. Of course all of this is free of charge.

Free as in totally limited. If you read their FAQ, you will find for example this: "Developers are not permitted to build Custom Clients that are multi-headed or interoperable with other IM networks". The user license adds more limitations: "Your Plugin shall not block, disable, or otherwise affect any advertising, advertisement banner window", "You may only offer your Plugin for download by users from a fixed HTML website located at a publicly available fixed URL address which you identify" or "You may not deploy or distribute your Plugin to any third party.". And because your development key is used during the connection, they can block your plugin at any time. All this really isn't free.