Les anglonautes

About | Search | Vocapedia | Learning | Podcasts | Videos | History | Arts | Science | Translate

 Previous Home Up Next

 

History > 2006 > USA > Internet (I)

 

 

 

David G. Klein

This Time, the Revolution Will Be Televised

NYT

22.1.2006

http://www.nytimes.com/2006/01/22/business/yourmoney/22frenzy.html

 

 

 

 

 

 

 

 

 

 

 

 

 

 

U.S. asks Internet firms to save data

 

Posted 5/31/2006 11:09 PM ET
USA Today
By Jon Swartz and Kevin Johnson

 

Top law enforcement officials have asked leading Internet companies to keep histories of the activities of Web users for up to two years to assist in criminal investigations of child pornography and terrorism, the Justice Department said Wednesday.

Attorney General Alberto Gonzales and FBI Director Robert Mueller outlined their request to executives from Google, Microsoft, AOL, Comcast, Verizon and others Friday in a private meeting at the Justice Department. The department has scheduled more discussions as early as Friday. Last week's meeting was first reported by CNET, an online news service.

The meetings reflect a new approach by law enforcement in anti-terrorism efforts. Previously, the Justice Department had invoked the need for data retention only to battle child pornography. Since the Sept. 11 attacks, Internet traffic has become increasingly critical to terrorism investigations, too.

Justice is not asking the companies to keep the content of e-mails, spokesman Brian Roehrkasse said. It wants records such as lists of e-mail traffic and Web searches, he said.

Roehrkasse said the government is required to seek proper legal authority, such as a subpoena, before obtaining the records. He said any change in the retention period would not alter that requirement. Law enforcement officials have seen investigations derailed "time and time again" because of a lack of data, Roehrkasse said.

The government's request forces the companies to strike a balance between satisfying law enforcement demands and honoring the privacy of millions of customers.

"The issue for us is not whether we retain data, but we want to see it done right," says Dave McClure, president of the U.S. Internet Industry Association, which represents 150 companies, primarily Internet service providers. "Our concerns are who pays for it, what data is retained, and if it is retained legally without violating federal laws and subscriber agreements."

Lee Tien, a lawyer for the privacy advocacy group Electronic Frontier Foundation, said he was concerned.

"I think that the request raises some really, really major privacy problems," he said. The Justice Department is "asking ISPs (Internet service providers) to really become an arm of the government."

The request creates a logistical challenge: Most Internet providers store data such as Web searches for 30 to 90 days. Storing such information significantly longer is more expensive, McClure and others say.

"We strongly support Gonzales' interest in assuring that the Internet is safe for everyone," Phil Reitinger, Microsoft's senior security strategist, said in a statement Wednesday that acknowledged the company's participation in the meeting at Justice. "But data retention is a complicated issue."

"We believe (data retention and preservation) proposals deserve careful review and must consider the legitimate interests of individual users, law enforcement agencies, and Internet companies," Google spokesman Steve Langdon said Wednesday.

Gonzales broached the issue of record retention in April during a speech at the National Center for Missing & Exploited Children in Alexandria, Va.

Gonzales, who has made fighting child exploitation a prominent part of the national law enforcement agenda, said the pursuit of child predators depends on the availability of evidence often in the hands of ISPs.

This isn't the first time Gonzales has gone to Internet companies with a request related to their records. In March, a federal judge ordered Google to hand over Web search records requested by Justice as part of its efforts to shield children from sexually explicit material online. Google balked at an earlier request, saying it would expose trade secrets. AOL, Yahoo and Microsoft cooperated with the government, but they said their assistance was limited and users' privacy was not violated.

Contributing: William M. Welch

    U.S. asks Internet firms to save data, UT, 31.5.2006, http://www.usatoday.com/tech/news/internetprivacy/2006-05-31-internet-records_x.htm

 

 

 

 

 

Technology leaves teens speechless

 

Posted 5/29/2006 8:30 PM ET
USA Today
By Olivia Barker

 

To be sure, the monthly bills — as high as $300 — were a problem.

But there were other, audible consequences of the fact that Alexandra Smith would pound out more than 1,000 text messages from her Razr cellphone a month: She was chatting — constantly, exhaustively — but she wasn't talking. It got so that Smith's parents were begging her to put the phone to her lips instead of her fingertips.

So these days Smith, 18, is practicing something that came oh-so-naturally to tides of teens before her: the art of vocal gab. Instead of holing up at home and punching out digital dialogue, Smith is making an effort to actually meet up with her three best friends and flex her larynx muscles.

"I figured I should probably go over and learn how to talk to somebody," says the Eugene, Ore., high school senior. "I didn't want to be the dork at college who texts all the time."

She needn't worry. College suitemates, even roommates, pick up their phones to ping each other. Otherwise, they're communicating via instant messaging or the social networking sites MySpace and Facebook.

With their mouths largely shut but their laptops and flip phones open, teenagers' bedrooms are beginning to sound like the library.

So is the dinner table. On her show May 10, Ellen DeGeneres ribbed guest Lindsay Lohan: "Every time I've seen you, you're out with eight or nine girls, having dinner. You're all sitting around the table on your BlackBerries." Lohan matter-of-factly explained that she had "like 1,000" messages to answer.

Not long ago, prattling away on the phone was as much a teenage rite as hanging out at the mall. Flopped on the bed, you yakked into your pink or football-shaped receiver until your parents hollered at you to get off.

Now, Sidekicks and iBooks are as prized as Mom's Princess phone, and conversations, the oral kind, are as uncomfortable as braces. Which makes employers and communications experts anxious: This generation may be technologically savvier than their bosses, but will they be able to have a professional discussion?

"We are losing very natural, human, instinctive skills that we used to be really good at," says Sonya Hamlin, author of How to Talk So People Listen: Connecting in Today's Workplace.

A couple of years ago, Hamlin was asked to teach a class of "very bright" California high school seniors about the college admissions interview. Their mock answers were "extremely short and not informational. Nothing came out, really, because it's such an unused skill."

Part of the reason, Hamlin says, is because "they're not listening. With IM, you can reread six times before deciding how to answer." There's no improvisation, she says, none of the spontaneity of phone banter or a face-to-face chat. "Talk is a euphemism. We do it now in quotes," Hamlin says.

And when face-to-face chats do occur, there are other verbal kinks. Stefani Beser, a freshman at Villa Julie College near Baltimore, texts so much — 20-40 times a day "if there's a lot going on" — that the shorthand creeps into her live conversation. "You'll be talking and all of sudden you'll say, 'Oh, LOL,' " text-speak for "laughing out loud."

Back home, Beser would e-mail her mom a stairwell away to ask when dinner was ready. Her boyfriend courted her through Facebook and then IM. With roommates, "we could literally lean our computer chairs back and talk to each other, but we IM and text."

A 2005 report for Achieve, a non-profit organization that helps states raise academic standards, found that 34% of employers were dissatisfied with the oral communication skills of high school graduates; 45% of college students and 46% of high school graduates who entered the workforce instead of college said they struggled with their public speaking abilities.

Among teens who go online daily and own a cellphone, 53% most often communicate with friends via written messages, according to a 2005 report by the Pew Internet & American Life Project, and 61% of the time they're chatting via IM. Texting wasn't prevalent enough when the study was conducted to figure prominently in the data, but it likely would now, says project research specialist Mary Madden.

In 2004, 22% of North American cellphone subscribers were active texters, according to Nokia's Bill Plummer. Last year, it was 36%. In 2005, more than 500 billion text messages were sent and received worldwide, as reported by Verizon Wireless. By 2010, it is projected to be more than 2.3 trillion.

In the meanwhile, phone companies are tapping into teens' tapping tendencies. Virgin Mobile is unveiling Switch_Back, a kind of junior BlackBerry with a qwerty keyboard and AOL IM built in. "We really think that text is the new talk," the company's Howard Handler says. A quarter of Virgin Mobile's teen customers use their phones for texting more than talking. "We are living in a 160-character nation," the maximum text message length, Handler declares.

Erica Beal's slide into text-based talk reads like the plunge any addict takes: From age 12, her ear was attached to her cellphone. "I'd call my friends, who I had just seen, all day, and talk to them all night." At 15, she got hooked on texting. At 17, it was MySpace. Now, the 18-year-old Manhattan high school senior texts 10 to 15 times a day "at least" and checks Facebook as soon as she gets home.

Four years ago, Carol Weston did "the nice-mom thing" of getting her older daughter, Lizzi, then 14, her own landline. It lasted two years. "I realized we were paying for nothing, really," says Weston, author of Girltalk: All the Stuff your Sister Never Told You. (IM had become Lizzi's medium of choice.)

Nowadays, the family phone doesn't ring very much, either. "On the one hand it's nice and peaceful at home," says Weston, who lives in Manhattan. "On the other hand, it's hard to figure out which boys are calling." Hence another consequence of a text-centric household: "Mom and Dad just can't eavesdrop as much as they used to."

So some of them are adjusting. When Brett Dicker's son spent his junior year in London, "we probably spoke to him less than half a dozen times the whole year, yet we were literally daily IMing." Now that Matt, 22, is back at the University of Southern California, he and his mom text "all the time," says the fiftysomething Dicker, who works in marketing and lives in Woodland Hills, Calif.

The primacy of the keyboard has been, well, a lifeline to the kind of guys who, a generation ago, grasped the family room receiver with a sweaty palm and a pounding heart. IM "makes life easier, absolutely," says Nick Kacher, 17, a junior from Waltham, Mass. "I'm not a big sit-around-and-chat-on-the-phone kind of person." Friends, and girlfriends, would needle him about his phone phobia. Now, with IM, "I definitely do chat."

But even for a texting and IM fiend like Heather Hogan, who's known to slide her Sidekick under the table and punch away at family events, there are limits. Last month she met a guy while out with her friends. They swapped numbers, but he never called. He texted Hogan, 18, four or five times a day. It got "kind of annoying," she says. Without any verbal cues, gauging his interest level became tough. So Hogan stopped texting him.

In the past three years alone, the standards have become "so different," says Hogan, a Nassau Community College freshman from Bellmore, N.Y. "No one talks, really, unless you're with people."

But experts aren't necessarily worried about what this signals for the future of interpersonal relationships. "Girls get the nourishment that comes with female bonding," Weston says, whether "electronically, telephonically or in person." Guys, on the other hand, "if they're lucky, learn to have tκte-ΰ-tκttes, or real talk in real time, but they don't come by it as naturally."

Smith does call one person regularly: an ex-boyfriend who lives three hours away. At first, it was only for five minutes a chat. Now she has reached a marathon 40-45 minutes. "It was hard for me to talk on the phone. It was a big change."

Contributing: Mary Pilon

 

 

WRITING BECOMES WAY OF LIFE

Today's teens may not be talking, but they're writing regularly and eloquently.

Amy Goldwasser, a Manhattan-based freelance editor and writer who's about to submit to publishers a collection of essays by teenage girls from across the USA, says the 1,500 submissions she has received about "life and death and God" are fluid, articulate and intimate.

"If you're a teenager today, you live your life in words," tapped out into text and instant messages and onto blogs and MySpace pages. There's "no more precious divide between how they live their lives and writing as a formal, school-assignment kind of thing."

Educators also see the benefits of an extracurricular life lived largely online. "In the long term, it will be very good for kids," says Carol Jago, co-director of the California Reading and Literature Project and a spokeswoman for the National Council of Teachers of English. "It builds fluency in their writing."

By conversing with their peers in the blogosphere, "they're getting more authentic feedback than teachers writing 'awk' or 'frag' in red," Jago says. "School is an artificial construct for many students, and now they're writing for real at a very young age. That's tremendously powerful."

In her original call for submissions, Goldwasser included her phone number. She got only about a dozen calls including a few stammering voices asking for her e-mail address.

Technology leaves teens speechless, NYT, 29.5.2006, http://www.usatoday.com/tech/news/techinnovations/2006-05-29-teen-texting_x.htm

 

 

 

 

 

First Amendment Applies to Internet,

Appeals Court Rules

 

May 27, 2006
The New York Times
By LAURIE J. FLYNN

 

SAN FRANCISCO, May 26 — A California appeals court ruled Friday that online reporters are protected by the same confidentiality laws that protect traditional journalists, striking a blow to efforts by Apple Computer to identify people who leaked confidential company data.

The three-judge panel in San Jose overturned a trial court's ruling last year that to protect its trade secrets, Apple was entitled to know the source of leaked data published online. The appeals court also ruled that a subpoena issued by Apple to obtain electronic communications and materials from an Internet service provider was unenforceable.

In its ruling, the appeals court said online and offline journalists are equally protected under the First Amendment. "We can think of no workable test or principle that would distinguish 'legitimate' from 'illegitimate' news," the opinion states. "Any attempt by courts to draw such a distinction would imperil a fundamental purpose of the First Amendment."

The ruling states that Web sites are covered by California's shield law protecting the confidentiality of journalists' sources.

Apple had argued that Web sites publishing reports about Apple were not engaged in legitimate news gathering but rather were misappropriating trade secrets and violating copyrights. But in its ruling on Friday, the panel disagreed.

"Beyond casting aspersions on the legitimacy of petitioners' enterprise, Apple offers no cogent reason to conclude that they fall outside the shield law's protection," the ruling states.

If upheld, the ruling could have far-reaching impact in California courts on other writers who publish electronically, including bloggers who regularly publish news and opinion online without the backing of a mainstream news operation.

"This ruling will probably prove instructive to other online writers," said Kurt Opsahl, a lawyer with the Electronic Frontier Foundation, a civil liberties organization, who argued the case in front of the appeals court last month. "It says that what makes a journalist is not the format but the function."

Apple declined to comment Friday on the ruling or on a possible appeal.

Apple's close guarding of company secrets, particularly unannounced products, is legendary. Friday's ruling arose from a suit filed in December 2004 against the unknown individuals who Apple said had leaked information about unannounced Apple products to two sites devoted to news of the company, AppleInsider and PowerPage.org.

Both sites published reports in November 2004 describing secret Apple projects, including one known at Apple by the code name Asteroid.

Apple did not sue the sites directly but sought to subpoena their e-mail records. As part of the investigation, Apple subpoenaed the e-mail records of Nfox, the company that provided Internet service to Jason D. O'Grady, the publisher of PowerPage.

About the same time, Apple filed a trade-secret suit against Think Secret, another online news site that the company accused of publishing confidential data about its future products. That case is pending.

Friday's ruling is also significant because it addresses whether private e-mail is protected from subpoenas. "The court correctly found that under federal law, civil litigants can't subpoena your stored e-mail from your service," said Kevin Bankston, a lawyer for the Electronic Frontier Foundation.

    First Amendment Applies to Internet, Appeals Court Rules, NYT, 27.5.2006, http://www.nytimes.com/2006/05/27/technology/27apple.html

 

 

 

 

 

What's Online

Publicly Debating Privacy

 

May 27, 2006
The New York Times
DAN MITCHELL

 

WIRED NEWS shook the blogosphere (though not the mainstream media) this week by publishing documents that appear to support accusations by a former AT&T employee that the company has helped the government monitor huge amounts of private Internet traffic (wired.com).

Mark Klein, a former AT&T technician, had earlier submitted the documents as part of a lawsuit against AT&T by the Electronic Frontier Foundation. The United States District Court judge in the case had ordered the documents sealed while he considered contentions by the government and by AT&T that making them public could compromise national security.

Wired News decided to publish them because "we believe the public's right to know the full facts in this case outweighs AT&T's claims to secrecy," wrote Evan Hansen, the site's editor. Ryan Singel, a reporter, obtained the documents from "an anonymous source close to the litigation," he added.

The documents are highly technical, detailing the methodology behind the AT&T program. But they also describe how the company set up a "secret room" for the operation in a San Francisco switching center. In an introductory note for the documents, Mr. Klein wrote he was "presenting this information to facilitate the dismantling of this dangerous Orwellian project."

The information has been described in previous media accounts, but releasing all 30 pages, along with some photos of the secret room, allows people to assess Mr. Klein's assertions for themselves.

And so they are. The denizens of Slashdot, a site dominated by network managers and programmers, have for the most part decided that Mr. Klein's accusations are true.

There is some disagreement, though, as to what it means. For instance, while Slashdotters are largely appalled at the notion of the National Security Agency's reading their e-mail messages, one anonymous poster called them "hypocrites" and pointed out that their own network policies were often similar. "It's everywhere; what's bothersome is knowing you are being monitored. If you are doing something illegal/immoral/nasty/dumb/stupid maybe the N.S.A.'s monitoring system will make you think twice about doing it."

Contested Space Hollywood WireTap, a gossip site, revealed this week that several famous pornography stars are promoting themselves on MySpace, a community site that's popular among people of all ages — but especially teenagers.

As a result, Hollywood WireTap reported, Weight Watchers has withdrawn its advertisements and T-Mobile is talking to MySpace, which is owned by the News Corporation, about the situation. Both companies told the site that their contracts with MySpace, which takes in a reported $156 million in annual ad revenue, are intended to prevent their ads from appearing on pages that promote pornographic material.

The pages of sex-film stars like Jenna Jameson and Tera Patrick show they have thousands of "friends" — other MySpace users who ask for full access to a user's page. Those pages, in turn, link to the stars' own homepages, which are often replete with pornographic images.

Their MySpace pages are "popular with the kids who are MySpace's mainstay," according to Hollywood WireTap. Some of the stars' "friends" are as young as 14. "Obviously parents, already concerned about the site's alleged pedophiles, won't be happy with this newest twist," the gossip site concludes.

The Wrong Guy In retrospect, it seems inevitable that Guy Goma — the man accidentally interviewed by the BBC last week in a case of mistaken identity — would become an Internet celebrity. The BBC hauled Mr. Goma onto its soundstage and started asking him about downloading music. He had no idea what was going on, but he answered well enough. The interviewer thought he was Guy Kewney, a technology journalist, but he was just a guy who was there looking for a job.

The video has been passed around the Internet, and is featured on a new site, guygoma.com, dedicated to the incident and to Mr. Goma's job search.

    Publicly Debating Privacy, NYT, 27.5.2006, http://www.nytimes.com/2006/05/27/technology/27online.html

 

 

 

 

 

Your Money

Timing the Electronics Market

for the Best Deal on a New PC

 

May 27, 2006
The New York Times
By DAMON DARLIN

 

Lower prices are part of the natural order in the world of electronics. Sometimes, though, the slow but relentless drop in price turns into a torrent. That's happening now in personal computers.

Prices are falling fast on notebook computers, as much as 18.5 percent so far this year, according to statistics compiled by Current Analysis, a market research firm. The bulk of notebooks now sell for less than $1,000.

The lower-priced notebooks are pushing desktop prices down, too. "I would expect even more intense price competition," said Charles Smulders, an analyst with Gartner, another market research firm.

The pace of price cuts has accelerated because a price war has broken out that offers great benefits to anyone in the market for a PC. And that could be a pretty large market. Forrester Research estimates that 70 percent of PC's in use are more than two years old and 90 percent of second, third and fourth computers are even older. The wars started quietly a year ago this week when Acer, a PC maker in Taiwan, re-entered the American market. The strategy was to get into the top tier of PC vendors as quickly as possible, which meant it would grab market share by keeping prices low.

Acer and other makers took business from Dell, which began to look less like the growth company that its investors were accustomed to. Dell's response came earlier this year as it cut prices.

Intel, meanwhile, was losing a significant portion of the microprocessor market to Advanced Micro Devices. Intel's share dropped to 77.9 percent from 81.5 percent in the first quarter of this year, according to Gartner, while A.M.D.'s market share grew to 20.4 percent from 16.6 percent two years ago. Intel is fighting to win back share, which means PC makers use the rivalry to get a price break.

Apple switched its processor to an Intel chip. Apple also makes running Windows applications on a Mac very easy. Owners of iPods are beginning to notice that Apple does more than sell music.

At the same time, Microsoft has pushed back the release of Vista, its new operating system, from before Christmas to early next year. Normally that would slow PC sales. But Microsoft is considering whether to offer incentives for consumers to buy PC's before Vista's release.

Some analysts had expected coming into the year that prices would actually go up slightly. Instead, the average price of a notebook computer dropped to $963 in April, an 18.5 percent decrease from a year ago, according to Current Analysis, which is based in Sterling, Va.

When an electronic device breaks through the $1,000 psychological barrier, sales take off. Samir Bhavnani, director for research at Current Analysis, said 37 percent more notebooks have been sold so far this year. About 60 percent of all notebook computers sold last month were priced below $1,000. He credits Dell, saying, "They love getting down in the mud."

Dell is running a promotion, which it bills as a celebration of its 22nd anniversary, with a $400 discount on PC's, plus a free monitor and free shipping.

Another statistic will tell you just how good consumers have it. While the number of notebooks sold is up 37 percent, revenue growth in the period is up only 15.5 percent, Mr. Bhavnani said. Companies are making less money on each notebook. Desktop computers are literally being given away. Retailers sold 14.8 percent more of them in the first five months of the year, but revenue declined 4 percent, Mr. Bhavnani said. Half of the computers sold for less than $500.

Consider the Hewlett-Packard Compaq Presario desktop offered this week at Office Depot. For $300 you get a PC with 512 megabytes of RAM and a 100-gigabyte hard drive. Office Depot tossed in a 17-inch CRT monitor and a printer.

"The material cost, before the printer, was around $400," estimated Mark Hill, Acer's vice president for sales in the United States. "It's crazy." Not that he's complaining. Acer has gained one point of market share this year by artful pricing.

So how does a consumer play this? As always with electronics, it is worth waiting. Expect even better deals around the Christmas season. But if you need to get one now, you certainly won't suffer. Deals will abound during the back-to-school season, which starts in June just as the school year ends.

Many consumers will end up waiting for Vista, Microsoft's new operating system. Some analysts expect that to keep computer sales from flagging during the year-end holidays, manufacturers will pressure Microsoft to offer a free upgrade to Vista to anyone buying a new PC.

Decide on the particular features you want on the computer. A notebook with one gigabyte of random access memory and an 80-gigabyte hard drive is recommended. Don't worry about the processor. Unless you are using the computer for designing nuclear power plants or playing video games professionally, any one of them on the market will serve you well.

Why a notebook, rather than a desktop? Convenience, mostly. Desktop models are becoming a relic of a bygone era as the artificial price difference between notebooks and desktops collapse. Notebooks now outsell desktops in stores. IDC estimates that by the middle of next year, more than half of all PC's sold will be notebooks.

Decide on a size. The computers that weigh less than four pounds are considered ultra portables, the kind you take on business trips. Anything heavier is a desktop replacement, perfect for moving from room to room or on a jaunt to the coffee shop. Go to a store to test the heft.

Reflect on how much style you want. As this category matures, manufacturers differentiate their products by making some notebooks look prettier than others. They charge more for anything on the color wheel besides gray and anything that glows.

Then watch the prices at retailers and at the manufacturers' Web sites. The last time you bought a PC, the best deals were probably online. That's not necessarily true anymore. The best deals can be inside the stores because those retailers are using PC's and notebooks in particular as loss leaders to drive traffic.

Here is another business trend that is helping consumers. As the prices of PC's drop, even if retailers sell more units their year-on-year revenue comparisons may drop. Investors closely watch that figure. So stores need to bolster revenue by selling even more of them. They do that by offering even better deals on notebooks because notebook buyers tend to buy other gear like bags and home networking equipment.

The brand you pick will depend on which one gives you the most computer for the price. Current Analysis compiles a "competitive value index" that measures the price of PC's against the features offered. When it looks at computers sold in all channels, the top berths go to Acer, Gateway, Dell and Hewlett-Packard.

Columns providing advice on buying a computer usually have a paragraph or two where the writer pauses and briefly genuflects at Apple. Great computer, they'll say, but — there is always that but — they carry a premium of 20 percent to 30 percent over a similarly configured computer running Windows.

Here comes those paragraphs. However, that required "but" may soon be retired. Gene Munster, a senior research analyst with Piper Jaffray in Minneapolis, compared Mac notebooks with similarly equipped notebook computers running Windows and discovered that the premium for a Mac is now only about 10 percent. "I don't think consumers go through this exercise," he said. The premium shrank, not because Apple cut its prices, Mr. Munster said, but because Apple, in switching to an Intel processor, increased the performance of its Macs, and then didn't raise prices.

A few more consumers may notice. Apple's market share, which climbed as high as 2.5 percent last year before the switch to Intel, has grown from 1.8 percent. Macs compete at the high end of the PC market, where the machines costing more than $1,500 are loaded with multimedia features like TV tuners and bigger hard drives to store photos, videos and music. Some have special chips designed to enhance the performance of video games. Price cuts have not been as deep up there, which is one reason Mr. Munster thinks the premium won't go back to 30 percent.

He said that the media viewing and editing software that comes with the Mac compensates for much of the remaining premium. "Apples are always going to be at a premium," he said.

    Timing the Electronics Market for the Best Deal on a New PC, NYT, 27.5.2006, http://www.nytimes.com/2006/05/27/technology/27money.html

 

 

 

 

 

Advertising

Yahoo Makes Deal on Ads With eBay

 

May 26, 2006
The New York Times
By SAUL HANSELL

 

EBay and Yahoo, two top Internet companies that have been losing ground to Google, said yesterday that they would work together in several areas, including advertising and online payments.

The deal will expand Yahoo's share of Internet advertising, a market where it lost leadership to Google. Investors have been worried that eBay's highly profitable shopping site is being undercut as consumers increasingly find products through search engines or through free listing services like Craigslist. Google and Yahoo have introduced similar free services.

At the same time, eBay is spending $260 million a year to advertise its auctions on search engines, with 60 percent of that on Google, according to estimates by Jordan Rohan, an analyst with RBC Capital Markets.

The deal announced yesterday gives eBay some new ways to make money from its large audience, but it does not directly address the concerns about competition. Yahoo will continue to offer its auctions and other online shopping services that compete directly with eBay.

For Yahoo, however, the deal represents a potentially significant expansion of its advertising business. EBay agreed to place on its site text advertisements sold by Yahoo. That gives Yahoo a major new partner just as the MSN service of Microsoft, which was the largest outlet for Yahoo's text ads, has switched to selling its own advertising.

Small text ads that automatically appear next to related material on Web pages have proved hugely profitable, but eBay has long been wary of placing them on its site because they are likely to refer people to sites that compete with its marketplace.

"EBay is selling a little bit of its soul by doing this deal," Mr. Rohan said. "The idea of eBay as a destination site is marginalized by a deal that drives traffic outside of eBay."

Margaret C. Whitman, eBay's chief executive, said the company was starting to change its policy because "we have to embrace some of the things that are happening on the Web." Still, she said, the company will test the impact of the text ads to make sure they do not hurt revenue.

Ms. Whitman added that the text ads would be restricted so they did not offer products that competed directly with eBay's sellers. They will be for "complementary products" like cases for digital cameras, she said, and they will also appear when a user searches for a product that is not available on eBay.

EBay also agreed to have Yahoo sell graphical display advertising on its site, the first time Yahoo has sold graphic ads for another company.

"EBay brings the best of quality inventory and a huge community," said Terry S. Semel, Yahoo's chief executive. "It gives us the opportunity to do a big job."

Yahoo and eBay said the revenue from the deal would be small this year, and they declined to characterize its financial impact for next year. Mr. Rohan said that if eBay placed text ads on 25 percent of its pages, the revenue could be about $130 million a year, and about 80 percent of that would go to eBay.

Mr. Rohan said the deal might help establish Yahoo as an advertising network that is an alternative to Google. "Yahoo was clearly able to play the fear-of-Google card," he said.

Microsoft, too, has been trying to establish its own advertising network and is reported to have bid for eBay's business.

Google, which is by far the leader in selling text ads for other Web sites, has been moving to sell graphic ads as well, and said this week that it would start selling video advertisements for other sites.

Google's approach is to create an automated auction in which marketers enter their own advertisements and bid for placement. Yahoo, which uses such an auction for text ads, will sell graphic ads on eBay through its traditional sales force, which negotiates rates with major marketers.

EBay will also offer its customers a new version of its browser toolbar that will encourage people to use Yahoo search and other services. Yahoo agreed to offer eBay's PayPal payment service as an option for customers buying goods and services through Yahoo's site.

The companies said they would explore developing features that would let people click on ads on either of their sites and be connected with the advertiser through either eBay's Skype voice chat service or the voice calling feature of Yahoo Messenger.

EBay's shares rose to $33.88, up $3.68. Yahoo rose $1.13 to $32.92

Ms. Whitman said the deal did not mean eBay would cut back its huge spending on Google advertisements. Search and other advertising brings in about 40 percent of eBay's traffic.

She said she did not see the competition from search engines and free classified sites as undercutting eBay's position with consumers.

"There is a lot more to running a marketplace than getting a lot of listings," she said. "There is trust and safety, and payments and reputation. That stands eBay in good stead."

    Yahoo Makes Deal on Ads With eBay, NYT, 26.5.2006, http://www.nytimes.com/2006/05/26/business/media/26adco.html

 

 

 

 

 

Google Reaches Agreement to Have Its Software Installed on New Dell Computers

 

May 26, 2006
The New York Times
By LAURIE J. FLYNN

 

SAN FRANCISCO, May 25 — Google and Dell have reached an agreement to install Google software on millions of new Dell computers over the next few years, Google's chief executive said on Thursday.

The executive, Eric E. Schmidt, said the arrangement meant that Google's search toolbar would appear on the screens of new Dell systems, and that Dell users would be directed to a Web page branded by the two companies.

Mr. Schmidt, speaking at a Goldman Sachs Internet conference in Las Vegas, said the companies would share revenue from the deal.

While financial terms were not disclosed, many analysts assumed that Google would pay Dell a fee for the arrangement. If that is the case, said Safa Rashtchy, an analyst with Piper Jaffray, this will be the beginning of a era in which Google pays for alliances in order to maintain its growth rate.

Spokesmen for both companies declined to comment.

Mr. Schmidt said that this would be first of several agreements with Dell. The time period of the deal was not disclosed.

The software, Dell said, would be put only on machines sold to consumers and to small and medium-size businesses. While the consumer market accounted for roughly 14 percent of Dell's revenue last quarter, the deal would nonetheless involve millions of new computers over time.

Google could receive a significant boost in its intense competition with Microsoft for search advertising revenue. By ensuring prime real estate on Dell computers, Google will gain exposure to millions of consumers who might otherwise have used Microsoft's search technology.

The agreement comes only two weeks after the Justice Department found that the design of Microsoft's new Web browser did not pose a threat to competition in the Internet search market. Google had expressed concern to antitrust officials that Microsoft's browser routinely steered users to its search service, MSN, giving it an unfair advantage.

"This is very important for Google, particularly if you look at how Microsoft is going to be pushing its search technology by embedding it in Internet Explorer," Mr. Rashtchy said. "Most people are going to stay with the default search technology that comes with their machine."

Google announced the deal at the close of regular trading. Shares of Google rose $1.74, to $382.99, and were roughly unchanged in after-hours trading. Dell shares increased 12 cents, to $24.30, then rose another 8 cents in after-hours trading.

The prospect of additional revenue from the deal would be a welcome lift for Dell, which has been struggling to hold onto its market share and maintain the heady growth rates it once enjoyed. Dell's profit declined 18 percent in the first quarter, though revenue grew 6 percent, mainly from growth overseas.

"It's a slight positive for Dell," said Cindy Shaw, vice president for research at Moors & Cabot. "But it will not solve Dell's larger issues. It's not going to be what gets people to buy a Dell."

    Google Reaches Agreement to Have Its Software Installed on New Dell Computers, NYT, 26.5.2006, http://www.nytimes.com/2006/05/26/technology/26google.html

 

 

 

 

 

Financial firms attack child porn

 

Updated 5/26/2006 1:22 AM ET
USA Today
By Wendy Koch

 

The nation's leading banks and credit card companies will soon team with law enforcement in a groundbreaking coalition to catch people who sell child pornography online.

The financial institutions will report child porn sites they discover on the Web to a central tip line, slated to expand next month to receive the information. The companies will block transactions for online child porn or, if law enforcement opens an investigation, help track sellers and buyers.

The Financial Coalition Against Child Pornography represents a new phase in the war against what has become a multibillion-dollar, international business. Internet service providers, including AOL, already report child porn sites they find.

"The scope of the problem is much greater than we ever thought. It's mind-boggling," says Ernie Allen of the National Center for Missing & Exploited Children, a private group that runs the tip line. Allen says one website can attract tens of thousands of customers, mostly men, who use credit cards to buy $29 monthly subscriptions. "People are getting into this because they see children as a commodity. There's no question organized crime is involved."

Eager to take profitability out of online child porn, Allen and Sen. Richard Shelby, R-Ala., brought together the companies.

"This is the broadest, most comprehensive coalition we've been involved in," says Joshua Peirez, a MasterCard executive. "This is not a competitiveness issue. This is about protecting children," he says.

"I haven't seen anything like it," adds Drew Oosterbaan, chief of the Justice Department's child exploitation section. "We're here to support the effort."

Participants include Visa, MasterCard, American Express and Discover, which cover most of the U.S. credit card market. Also involved are Bank of America, Chase, Citigroup and PayPal. Visa, MasterCard and American Express say they will identify sites accepting their cards to sell child porn but won't reveal customers unless subpoenaed.

    Financial firms attack child porn, UT, 26.5.2006, http://www.usatoday.com/tech/news/2006-05-25-firms-fight-online_x.htm

 

 

 

 

 

Marketing fraud investigation yields 565 arrests, 2.8 million victims

 

Updated 5/24/2006 1:49 AM ET
AP
USA Today

 

WASHINGTON (AP) — More than 2.8 million people in the U.S. paid to obtain credit cards, claim sweepstakes winnings and get in on lucrative investments that turned out to be too good to be true, officials said Tuesday as they announced hundreds of arrests in an international investigation.

Authorities in five countries have arrested 565 people in fraud schemes that netted more than $1 billion. Many of those arrested are west Africans who were attempting variations of the notorious Nigerian Internet scam, the Justice Department said.

Many of the victims were elderly or immigrants. One scam consisted of telephone calls to Spanish-speaking U.S. residents who were seeking to establish credit and were promised credit cards in return for a couple of hundred dollars. The cards didn't exist, said Federal Trade Commission Chairwoman Deborah Platt Majoras.

"Those that prey on consumers know their vulnerabilities," Majoras said at a Justice Department news conference with Attorney General Alberto Gonzales. "They zero in on those who will actually believe them."

The scams were carried out through telemarketing, mass mailings and the Internet and included bogus lottery, prize and sweepstakes offerings, invitations to pour money into non-existent investments and supposedly legal enticements to avoid paying taxes, officials said.

In the Nigerian scam, criminals send junk e-mail to thousands of unsuspecting people offering them a share in a large fortune in exchange for a smaller amount of money up front. The con artist takes the money and then disappears.

Gonzales called the 14-month investigation, dubbed Operation Global Con, "the largest enforcement operation of its kind." It has so far resulted in 139 arrests and 61 convictions in the United States and another 426 arrests in Canada, Costa Rica, the Netherlands and Spain.

Last week, Costa Rican and U.S. authorities made arrests in a telephone-based scam in which prospective victims received offers of up to $4.5 million from the Sweepstakes Security Commission and other fictitious organizations.

The winners first had to pay "insurance fees." Some victims were contacted again, this time by people pretending to be customs officials who demanded additional payments, the department said.

    Marketing fraud investigation yields 565 arrests, 2.8 million victims, UT, 24.5.2006, http://www.usatoday.com/money/2006-05-23-marketing-fraud-arrests_x.htm

 

 

 

 

 

Google users promised artificial intelligence

 

Tuesday May 23, 2006
Guardian
Richard Wray


A search engine that knows exactly what you are looking for, that can understand the question you are asking even better than you do, and find exactly the right information for you, instantly - that was the future predicted by Google yesterday.

Speaking at a conference for Google's European partners, entitled Zeitgeist '06, on the outskirts of London last night Google chief executive Eric Schmidt and co-founder Larry Page gave an insight into perhaps the most ambitious project the Californian business is undertaking - artificial intelligence (AI).

"The ultimate search engine would understand everything in the world. It would understand everything that you asked it and give you back the exact right thing instantly," Mr Page told an audience of the digerati representing firms from Warner Music and AOL to BSkyB and the BBC. "You could ask 'what should I ask Larry?' and it would tell you."

Speaking after what was tabled an end of day 'fireside chat', Mr Page said one thing that he had learned since Google launched eight years ago was that technology can change faster than expected, and that AI could be a reality within a few years.

Certainly in that short period of time, Google has gone from a start-up in Mountain View to one of the most recognised brands in the world. As evidence of its meteoric rise, the Hertfordshire hotel in which the conference took place was also home to the England football team. The post-conference press roundtable was briefly interrupted by assistant manager Steve McLaren who had evidently got the wrong room.

Google's executives were also forced to defend their tactics. While suggesting the business could one day capture a 20% share of the $800bn (£424bn) global advertising market, Mr Schmidt explained that the apparently scatter-gun approach to research that lets engineers spend a fifth of their time working on pet projects, also allows the company to innovate faster than any rival.

While this has created some products (such as shopping service Froogle) that have not been a great success, it also led to the Gmail email service which despite still being only in test form is rapidly catching up with market leaders such as Hotmail.

But Mr Schmidt admitted that the company is spending more energy than perhaps it has in the past on integrating some of these seemingly random ventures back into its core revenue-generating search tool, something that could be seen as a sea change within the business, though Google executives maintain it is not going through a major consolidation phase.

But the lack of a visible pipeline of development from Google - which never gives a clear indication of what it is working on until it is released - infuriates some of its stockholders, who would rather it concentrated on a few lucrative services.

"We are very clear and I want to be clear and on the record," said Mr Schmidt. "We run the company for the benefit of our end-users globally."

Looking at the current court case in Houston where Kenneth Lay and Jeffrey Skilling, former executives of collapsed energy giant Enron, await the outcome of their trial for fraud, he added: "Speaking as an American company chief executive, when the management team starts focusing on the stock price rather than focusing on its business and customers you get a really bad outcome. We are focused on doing the right thing for the long-term"

Mr Schmidt also attacked suggestions from some major US cable companies that providers of capacity-hungry internet services - such as video and TV - should be charged to run their services over the web. This presents a challenge to what is generally seen as the internet's neutrality, that everyone should be able to get on to it.

"We believe this violates one of the founding principles that built the internet today and it could stifle the next wave of innovation," he said.

In fact Google is currently working on its own video tool. While adamant that the company is not looking to get into the provision of content itself, it is looking to produce a video tool that will allow broadband TV viewers to find the shows they want from the hundreds that are available across the world. It is looking for media partners interested in using such a tool.

Mr Schmidt also had a few consoling words for the traditional media business which sees its profitability being utterly eroded by online rivals. He said usage of traditional media placed online is rising rapidly, but circulations - the revenue generator - are declining. "You don't have a lack of audience problem, you have a business model problem," he said.

    Google users promised artificial intelligence, G, 23.5.2006, http://technology.guardian.co.uk/news/story/0,,1781121,00.html

 

 

 

 

 

Advertising

Google Moves to Sell Space for Video Spots on Network of Web Sites

 

May 23, 2006
The New York Times
By SAUL HANSELL

 

GOOGLE is taking its first steps to go after the huge market for television advertising this week with a new service that will place video commercials on the many Web sites where it sells advertising.

For now, Google isn't placing video advertising on Google.com or the other sites it runs, but it says it is considering doing so in the future.

Advertisers have been eager to buy the relatively limited supply of spaces for online commercials at prices that equal and sometimes exceed the rates charged by major networks, as measured by cost per thousand viewers.

Google's move expands the online advertising space to the network it has established for text and graphical ads — a group of sites whose number it will not disclose, though it is estimated to be in the hundreds of thousands.

Google's announcement came a week after AOL said that it had acquired Lighteningcast, a company that sells video advertisements on about 150 sites, including Space.com and Nascar.com. Lighteningcast will be merged with AOL's own Advertising.com unit, which mainly sells banner advertisements on other sites but is also getting into sales of video advertising.

Lighteningcast and other video advertising networks are focused on inserting commercials into video programming. The video ads that Google is placing, by contrast, will appear on conventional Web pages; users will see a single image, and the video will play only if they click a button.

Matt Wasserlauf, the chief executive of Broadband Enterprises, which sells video advertisements on 500 sites, said that major marketers prefer their commercials to be part of a stream of programming rather than be on Web pages.

"No one will click to watch a Pampers ad," he said. For example, he said, Procter & Gamble would rather "put Pampers on relevant or entertaining content."

Google says its system would bring video advertising into reach for small businesses.

"A large percentage of video ads will come from small advertisers," said Gokul Rajaram, a director of product management at Google. "A small resort owner in Maui probably already has video of their great beachfront property. Now they can put it in an ad and reach a qualified set of users."

Mr. Rajaram also suggested that large advertisers will be able to use the system to test different treatments for commercials they hope to run on television.

"You can upload a video tonight and have it run tomorrow," Mr. Rajaram said. "You can really afford to experiment and figure out what works."

Google has become a powerhouse in advertising largely by selling short text advertising closely associated with topics people are researching or reading about on the Web. But it is increasingly looking to place more elaborate advertisements that are more attractive to marketers promoting product brands. Last year, it started allowing advertisers to bid to place advertisements using graphics and animation on sites it represents.

Sites have the option to reject the graphic advertisements and will be able to opt out of the video ads as well — for instance, because they are already selling such ads themselves. But Google said most of the sites in its network had agreed to display the video advertising.

And Google is also working to branch out to other media. It has experimented with running auctions for advertisements in magazines. And in January, it bought DMark Broadcasting, a company that sells radio advertising. Google has said for some time that it hopes to begin placing video advertising not only on the Web but also on television.

Until now, most sites and networks that sell video advertising have largely negotiated prices one on one with advertisers. Google, by contrast, wants to bring its highly automated auction system to video advertising. Indeed, it will run a single auction for text, graphical and video ads. Advertisers, moreover, can bid either as a price for each time a user clicks on the ad to visit their site or a fixed fee to show the ad to 1,000 users.

Google's computers will evaluate all of the bids and decide which one will end up making the most money. At the advertiser's discretion, ads can be placed on pages with content relating to specific keywords, or on sites of their choice.

Mr. Rajaram said Google estimated that advertisers would generally need to bid "in the single digit dollars to low double digits" to display their video ads to 1,000 people using Google's network. That is less than the $20 or more that other video sites are charging.

David Card, an analyst with Jupiter Research, said this auction approach might not represent the way that many marketers approach television commercials.

"The people who buy search words are not the people who buy video ads," he said. "The people who buy TV advertising want to do big deals with the CNN's of the world."

    Google Moves to Sell Space for Video Spots on Network of Web Sites, NYT, 23.5.2006, http://www.nytimes.com/2006/05/23/business/media/23adco.html

 

 

 

 

 

An Internet Phone Pioneer, Poised to Go Public, Has Rivals at Its Heels

 

May 23, 2006
The New York Times
By KEN BELSON and MATT RICHTEL

 

Thanks to its relentless marketing and low prices, Vonage has quickly become synonymous with phone service over the Internet. But when Brandon Sehlke and his wife, Jennifer, moved into a new home in San Antonio two weeks ago, they chose a new Internet phone service from Time Warner Cable, not Vonage or AT&T, his old provider.

The deal Time Warner offered was just too good: phone service with a television package and a broadband connection for a promotional price of $89.95 a month.

"Getting all three services was better than anything else we could find," said Mr. Sehlke, a 24-year-old dental student in San Antonio. "I briefly looked into Vonage. But paying $90 for all that was hard to pass up."

As more people make similar choices, Vonage's run as the industry leader is likely to end. While Vonage is still the largest Internet phone company, with 1.6 million subscribers, Time Warner, Cablevision, Cox and others are rapidly catching up, using their marketing heft and their ability to offer bundles of services.

The change comes at an inauspicious time for Vonage and its founder and chairman, Jeffrey Citron. The company is expected to go public this week in a roughly $500 million offering that, had it occurred a year ago, might have been hailed as a victory for a plucky upstart that outfoxed the traditional phone companies.

Instead, industry analysts are asking whether Vonage can compete — not just against giants like Time Warner, but against even feistier companies like Skype, which lets customers make free calls.

"Vonage is not the company people are going to identify with voice-over-Internet phones six months from now," said Jeff Halpern, a telecommunications analyst at Sanford C. Bernstein & Company.

Mr. Halpern said that the company "could be getting in under the wire" by going public now. "Vonage is going to be in a position where it is a single-product company and other companies are offering multiple services," he added.

Brooke Schulz, a Vonage spokeswoman, said she could not comment, citing regulations prohibiting companies from discussing their business before a public offering. People briefed on the company's plans, however, said that Vonage would probably issue new shares on Wednesday.

For now, Vonage remains a success story. It is one of a handful of Internet companies that rose out of the ashes of the telecommunications bubble of the 1990's. While many start-ups ran through millions of dollars and attracted few customers, Vonage took a rather obscure technology and created not only a familiar brand but also a sizable business.

Vonage added 878,000 new subscribers in the last year, including 328,000 in this year's first quarter. Vonage accounted for 29 percent of new subscribers to domestic Internet phone services in 2005; at year's end, it had 31 percent of the market, according to Sanford C. Bernstein estimates.

Customers are moving to Vonage because of its price — $24.99 for unlimited local and long-distance calls in North America and some European countries. The service is so cheap because unlike traditional phone companies that maintain expensive copper networks, Vonage and its competitors turn calls into data and send them over the Internet.

Vonage also offers conveniences like call forwarding, voice mail through a Web site and a portable modem that can be used with any broadband connection, so customers can make "local" calls even if they are overseas.

Vonage has also struck deals with Best Buy, Target, Wal-Mart and RadioShack to sell its equipment and services in their stores, and it is working with an array of manufacturers to develop handsets and other products.

But Vonage's share of the market for Internet calling, also known as voice-over-Internet protocol or VoIP, has slipped from 34 percent in 2004 because cable companies are grabbing a greater percentage of new customers. Time Warner had 1.4 million customers at the end of the first quarter, while Cablevision had 900,000 subscribers.

The Internet calling market, which also includes independents like Primus, SunRocket and Packet8, is still just a sliver of the overall phone business. But it is growing at the expense of Bell phone providers like Verizon and AT&T, which have introduced their own Internet phone services to keep customers from defecting. The Bells are also developing television services to win over cable customers.

As the big phone and cable companies lock horns, analysts say, one-product companies like Vonage risk being lost in the shuffle.

In some ways, Vonage may be a victim of its own success. The company helped popularize a product that most ordinary consumers did not think they needed a few years ago. Then imitators rushed into the market.

"Vonage is analogous to TiVo," said Renee Shaening, an analyst at Kagan Research, referring to the company whose name has become synonymous with its digital video recorders. "TiVo was on the forefront of offering time-shifted video service, but now the cable companies have their own."

Customers have also found that not all Internet phone services are the same. Vonage calls are connected by a variety of companies that route voice data over their networks. Some customers complain that calls can sound tinny.

Cable companies, by contrast, use their own networks to connect most calls, which can mean more reliable connections. They also have workers who can visit customers' homes, not just operators at call centers. And with deeper pockets, they can offer more discounts and new services.

Last week, for instance, Cablevision introduced a flat-rate plan that includes 500 minutes of calls to any foreign country for $19.95 a month.

Significantly, cable companies can also pitch their phone services to their millions of existing customers through the mail and on their television systems.

For now, Vonage plans to spend more on advertising to find new customers, instead of focusing on trying to turn a profit.

"In order to grow our customer base and revenue, we have chosen to increase our marketing expenses significantly, rather than seeking to generate net income," the company said in a regulatory filing this month.

"This strategy, however, will result in further net losses, which generally have increased quarterly since our inception," the filing said.

The company said it spent $88.3 million on marketing and lost a net $85.2 million for the first quarter.

In its filing, Vonage also acknowledged growing competition from cable companies that can bundle phones with broadband and television at a discount.

"These offerings," the company said, "could negatively affect our ability to acquire new customers or retain our existing customers."

Though Vonage appears focused on the likes of Comcast, it must also grapple with services like Skype, which eBay bought last year. Since in most cases Skype routes calls entirely over the Internet, its service is less reliable than Vonage's. But it is also free when Skype users call each other using their computers.

Last week, Skype said customers in the United States and Canada could call free from their computers to traditional phone lines anywhere within their own countries until the end of the year. Calls previously cost 2 cents a minute. Skype hopes the promotion will encourage more people to buy a phone number from them so that others can call their computer from an ordinary phone line.

Even with all these challenges, most analysts expect Vonage to remain an attractive option for customers who do not like the Bells or their cable company, or who want a cheap second phone line for their home or office. Other companies, like Packet8 and SunRocket, which have more than 100,000 customers each, should benefit from the same anti-establishment sentiment, the analysts say.

But the rebel market is a limited one, and Vonage is likely to struggle against behemoths that are turning into one-stop shops for telecommunications services.

"I kind of assumed Vonage would go away after a while," Ms. Shaening said.

    An Internet Phone Pioneer, Poised to Go Public, Has Rivals at Its Heels, NYT, 23.5.2006, http://www.nytimes.com/2006/05/23/technology/23voip.html

 

 

 

 

 

E-Commerce Report

An Online Market Blooms for Video Clip Reruns

 

May 22, 2006
The New York Times
By BOB TEDESCHI

 

YOU might not care that a student pilot in Idaho flipped his plane while landing last month and left himself with an injured hand and a cranky flying instructor. You might care even less to know that a local news station got film of the plane lying belly up in a field, and that the clip is now available online.

But someone cares. And on the Internet these days, as long as someone cares, cash flows.

In this case, the beneficiary is KTVX, an ABC affiliate in northern Utah owned by Clear Channel Communications. Until recently the station was like other local broadcasters in that it had little use for its news clips aside from posting them on its Web site for a couple of days and then relegating them to the digital vault. Now a new online service, ClipSyndicate, is finding Web sites like AeroSpaceNews.com that are happy to show these reruns and share the advertising revenue that may follow.

The idea behind ClipSyndicate is to give local television stations, which have long watched as online upstarts have stolen viewers and advertising dollars, their own foothold on the Web. Local stations have failed miserably in attracting audiences to their Web sites. But given the fascination with online video, that model is now serendipitously flipping. After all, why struggle to build an audience of your own when new Internet businesses will find video-starved viewers for you in the far-flung corners of the Web?

"Web sites and bloggers would love to add video, and news outlets would love to give it to them, but they haven't figured out a way to do it without getting ripped off," said Allen Weiner, an analyst with Gartner, a technology consulting firm. "So this addresses a major pain point."

ClipSyndicate, a service of the online video search company Critical Mention, indexes videos from Bloomberg, The Associated Press and other news outlets. Web publishers then visit ClipSyndicate.com and search for clips they like. ClipSyndicate allows Web sites to show the clips only as long as they are not broadcast companies themselves (and as long as they do not also show pornography).

Publishers either pay an undisclosed fee to ClipSyndicate each time they show a clip — then display their own ads with the clip — or they can run the videos with ads sold by ClipSyndicate and earn 5 percent of the advertising revenue. The video's owners, meanwhile, receive 30 percent of whatever revenue is generated from each clip.

Mr. Weiner, of Gartner, said ClipSyndicate was the only service of its kind at the moment, but he expected many competing online video companies, like Veoh and Revver to introduce similar initiatives.

Television networks are also embarking on efforts that can help them find more eyeballs for their local stations' video assets, without having to share the proceeds with an outside company.

Take NBC Universal, for one. Late last month the company said it would form the National Broadband Company, a joint venture between the network and its roughly 230 affiliates. NBBC, as the venture is known, will syndicate video from the affiliates, the NBC Universal library and other content on sites throughout the Web.

According to Mike Steib, who is overseeing the formation of NBBC, the venture will, among other things, collect and categorize clips according to their type, so NBBC can offer an entire channel of consumer news, for instance, for other sites and its own affiliates to show online.

Mr. Steib said the company was still signing up affiliates to distribute its videos, and NBBC was also determining how to derive revenue from the clips, be it from a pay-per-view approach, advertising, or both. The venture, though, is getting closer to an official introduction.

"It'll happen in a handful of months," Mr. Steib said. "I'm using a sand wedge, not a driver."

The ClipSyndicate service has not yet signed up major advertisers to show its ads, but Sean Morgan, Critical Mention's chief executive, said he did not expect any difficulty in attracting marketers. "We haven't put any advertisers on yet because we're still focused on aggregating content, but all the advertisers we're talking to say it sounds like it's going to work," he said.

Mr. Weiner, of Gartner, agreed that ClipSyndicate would be interesting to marketers. "It gives stations a viral audience that's potentially as large as what they'd get through their commercial medium," he said. "And because a significant part of the audience may be outside the local area, regional or national advertisers have a reason to be part of the mix."

That may not yet be the case with KTVX, but the station is certainly gaining a wider audience than before. According to Jason Gould, general manager of Inergize Digital Media, a unit of Clear Channel that manages the online operations of Clear Channel stations and others, the service provides "a whole new revenue stream."

The company had sought ways to generate revenue from the roughly 500 stories its affiliated stations broadcast daily — and the trove of videos from the past two years — but with little success. While some of the stories can be shown on the Web sites of other stations within Inergize's stable, "there hasn't been a mechanism for us to take them to the marketplace beyond our stations," Mr. Gould said. "So ClipSyndicate was a no-brainer to jump into."

Internet companies that show the videos are also pleased so far with the service. "This has worked beautifully for us," said Richard D. Stamberger, chief executive of SmartBrief, which distributes e-mail newsletters to roughly one million subscribers, and who recently began including videos from ClipSyndicate in those newsletters.

Subscribers have clicked on links to the videos at the same rate they click on links to text stories in the newsletters, which typically focus on a particular industry. But since marketers pay more for video ads than text ads, Mr. Stamberger said the videos would probably help SmartBrief's revenues.

"We haven't sold any ads yet but our initial conversations with advertisers have been very positive," Mr. Stamberger said. "This is right on the money in terms of hitting the market just as video is exploding."

    An Online Market Blooms for Video Clip Reruns, NYT, 22.5.2006, http://www.nytimes.com/2006/05/22/technology/22ecom.html

 

 

 

 

 

A Weinstein Will Invest in Exclusivity

 

May 22, 2006
The New York Times
By MARIA ASPAN

 

Most popular Internet communities, like Facebook.com or MySpace .com, measure their success by their ability to attract new members. A notable exception to this rule is aSmallWorld.net, an exclusive online community that is about to get bigger.

The Weinstein Company, the production business started by Bob and Harvey Weinstein after they left Miramax, has invested in aSmallWorld, the company will announce today. The Weinsteins, whose multimedia portfolio includes Miramax Books and a magazine publishing company, Niche Media, head a team of investors including Robert W. Pittman, former chief operating officer of AOL Time Warner. The company declined to put a dollar figure on its investment, describing it only as "significant." The Weinstein Company was attracted to aSmallWorld by the community's social networking and advertising opportunities, Harvey Weinstein said in an interview. This is the company's first investment in an online venture.

ASmallWorld, a private company founded in 2004, has approximately 130,000 members, or about half the number who join MySpace each day. On its log-in page, it describes its members as "like-minded individuals" who share the "same circle of friends, interests and schedule."

Invitations are difficult to come by: only some members have the right to invite friends to join. According to Erik Wachtmeister, the site's founder and the son of a former Swedish ambassador to the United States, a panel considers 12 to 15 variables before permitting certain users to issue invitations.

"You don't want to let just anyone invite," Mr. Wachtmeister said. Asked what those variables were, he replied that it's a "secret sauce."

Mr. Wachtmeister said he had the initial idea for the community in 1998, having lived in 10 cities. While traveling, "you see the same people over and over, gravitating toward each other," he said.

Once admitted, members have access to "trusted and select information," the site says, like nightclub or restaurant recommendations from other members. Those who abuse the system by trying to network with celebrity members can quickly find themselves out of the club.

"We keep track of people's behavior and we actually do kick people out," Mr. Wachtmeister said. Although he declined to identify celebrity members, media reports have named Quentin Tarantino, Ivanka Trump and Naomi Campbell.

The Weinstein Company's investment may affect the community's size, if not its purpose and membership. According to Mr. Weinstein, his company will be expanding aSmallWorld, while maintaining its membership restrictions and its appeal to a "smaller, more select" audience. "I think we'll become very successful with one million people," he said, "but we have to find the right one million."

    A Weinstein Will Invest in Exclusivity, NYT, 22.5.2006, http://www.nytimes.com/2006/05/22/technology/22weinstein.html

 

 

 

 

 

Voice Encryption May Draw U.S. Scrutiny

 

May 22, 2006
The New York Times
By JOHN MARKOFF

 

SAN FRANCISCO, May 21 — Philip R. Zimmermann wants to protect online privacy. Who could object to that?

He has found out once already. Trained as a computer scientist, he developed a program in 1991 called Pretty Good Privacy, or PGP, for scrambling and unscrambling e-mail messages. It won a following among privacy rights advocates and human rights groups working overseas — and a three-year federal criminal investigation into whether he had violated export restrictions on cryptographic software. The case was dropped in 1996, and Mr. Zimmermann, who lives in Menlo Park, Calif., started PGP Inc. to sell his software commercially.

Now he is again inviting government scrutiny. On Sunday, he released a free Windows software program, Zfone, that encrypts a computer-to-computer voice conversation so both parties can be confident that no one is listening in. It became available earlier this year to Macintosh and Linux users of the system known as voice-over-Internet protocol, or VoIP.

What sets Zfone apart from comparable systems is that it does not require a web of computers to hold the keys, or long numbers, used in most encryption schemes. Instead, it performs the key exchange inside the digital voice channel while the call is being set up, so no third party has the keys.

Zfone's introduction comes as reports continue to emerge about the government's electronic surveillance efforts. A lawsuit by the Electronic Frontier Foundation, a privacy rights group, contends that AT&T has given the National Security Agency real-time access to Internet communications.

In the wake of 9/11, there were calls for the government to institute new barriers to cryptography, to avoid its use in communications by enemies of the United States. Easily accessible cryptography for Internet calling may intensify that debate.

"I'm afraid it will put front and center an issue that had been resolved in the individual's favor in the 1990's," said James X. Dempsey, policy director for the Center for Democracy and Technology, a Washington-based public policy group.

The Federal Communications Commission has begun adopting regulations that would force Internet service providers and VoIP companies to adopt the technology that permits law enforcement officials to monitor conventional telephone calls. But for now, at least, F.C.C. regulation exempts programs that operate directly between computers, not through a hub.

"From the F.C.C.'s perspective you can't regulate point-to-point communications, which I think will let Phil off the hook," said Marc Rotenberg, director of the Electronic Privacy Information Center, an advocacy group in Washington.

Zfone may face more of a challenge in Europe, where the British government is preparing to give the police the legal authority to compel both organizations and individuals to disclose encryption keys.

But Mr. Zimmermann, 52, does not see those fearing government surveillance — or trying to evade it — as the primary market. The next phase of the Internet's spyware epidemic, he contends, will be software designed to eavesdrop on Internet telephone calls made by corporate users.

"They will have entire digital jukeboxes of covertly acquired telephone conversations, and suddenly someone in Eastern Europe is going to be very wealthy," he said.

While Mr. Zimmerman is giving away his software so far, his goal is to attract VoIP software and hardware developers to license his technology and embed it in their products.

Zfone can automatically encrypt any call between users of freely available VoIP software programs like X-Lite, Gizmo or SJphone. It can be downloaded at www.philzimmermann.com.

The system does not work with Skype, the VoIP system acquired by eBay, which uses its own encryption scheme. But at a conference last week in Cyprus, German officials said they had technology for intercepting and decrypting Skype phone calls, according to Anthony M. Rutkowski, vice president for regulatory affairs and standards for VeriSign, a company that offers security for Internet and phone operations.

Mr. Zimmermann said he had not yet tested Zfone's compatibility with Vonage, another popular VoIP service.

Mr. Zimmermann contends that the nation is better off with strong cryptography. Indeed, Zfone can be considered an asset, he said, because it allows people to have secret conversations without hiding their Internet protocol addresses, which could be traceable geographically. Those observed having a secured conversation could come under suspicion, of course. But for that reason, he argued, sophisticated criminals or terrorists are unlikely to use the technology.

"I'm sympathetic to the needs of the intelligence community to catch the bad guys," he said. "I specifically protect the content the criminals want, while simultaneously not interfering with the traffic analysis that the N.S.A. is trying to do. You could make the case that I'm being socially responsible."

    Voice Encryption May Draw U.S. Scrutiny, NYT, 22.5.2006, http://www.nytimes.com/2006/05/22/technology/22privacy.html

 

 

 

 

 

The Fight Against V1@gra (and Other Spam)

 

May 21, 2006
The New York Times
By TOM ZELLER Jr.

 

TO the antispam researchers at MessageLabs, an e-mail filtering company, each new wave of a recent stock-pumping spam seemed like a personal affront.

The spammers were trying to circumvent the world's junk-mail filters by embedding their messages — whether peddling something called China Digital Media for $1.71 a share, or a "Hot Pick!" company called GroFeed for just 10 cents — into images.

In some ways, it was a desperate move. The images made the messages much bulkier than simple text messages, so the spammers were using more bandwidth to churn out fewer spams. But they also knew that, to filters scanning for telltale spam words in the text of e-mail messages, a picture of the words "Hot Stox!!" is significantly different from the words themselves.

So the bulk e-mailers behind this campaign seemed to calculate that they had a good chance of slipping their stock pitches past spam defenses to land in the in-boxes of prospective customers.

It worked, but only briefly. Antispam developers at MessageLabs, one of several companies that essentially reroute their clients' e-mail traffic through proprietary spam-scrubbing servers before delivering it, quickly developed a "checksum," or fingerprint, for the images, and created a filter to block them.

Advances in spam-catching techniques mean that most computer users no longer face the paralyzing crush of junk messages that began threatening the very utility of e-mail communications just a few years ago.

But spammers have hardly given up, and as they improve and adapt their techniques, network managers must still face down the pill-pushers, get-rich-quick artists and others who use billions of unwanted e-mail messages to troll for income. "For the end user, spam isn't that much of a problem anymore," said Matt Sergeant, MessageLabs' senior antispam technologist. "But for the network, and for people like us, it definitely is."

Shortly after MessageLabs created a filter to catch the stock spams, the images they contained changed again.

They were now arriving with what looked to the naked eye like a gray border. Zooming in, however, the MessageLabs team discovered that the border was made up of thousands of randomly ordered dots. Indeed, every message in that particular spam campaign was generated with a new image of the border — each with its own random array of dots.

"That was kind of cool and kind of funny," said Mr. Sergeant, a soft-spoken British transplant who spends his days helping to douse spam fires from his home office outside Toronto.

During a recent meeting at the company's New York office, in Midtown Manhattan, Mr. Sergeant and a colleague, Nick Johnson, an antispam developer visiting from MessageLabs' headquarters in Gloucester, England, expressed both amusement and respect over the sheer creativity of the world's most prolific spammers, who continue to dump hundreds of millions of junk messages into the e-mail stream each day.

"It was almost like they knew what we were doing," Mr. Sergeant said.

SEVERAL surveys — from AOL, the Pew Internet and American Life Project and others — have indicated that the amount of spam reaching consumer inboxes has at least stabilized.

That is true for users whose networks are protected by off-site, third-party filtering services like MessageLabs', as well as those protected by network software or in-house equipment that filters messages before they hit a company's e-mail server.

If individual users also have personal spam filters installed on their computers, their in-box spam count can be reduced to a trickle.

But spam continues to account for roughly 70 percent of all e-mail messages on the Internet, despite tough antispam laws across the globe (including the Can-Spam Act in the United States), despite vigorous lawsuits against individual junk-mail senders and despite the famous prediction, by Bill Gates at the World Economic Forum in 2004, that spam would be eradicated by 2006.

The continuing defiance of spammers was demonstrated last week when one of them forced Blue Security, an antispam company based in Israel, to shut down its services. The company gave customers the power to enact mob justice on spammers by overloading them with requests to be removed from mailing lists. A spammer in Russia retaliated by knocking out Blue Security's Web site and threatening virus attacks against its customers. Blue Security said it would back off rather than be responsible for a "cyberwar."

While there are some indications that the growth rate of spam has plateaued or even slowed, experts say that spikes are always looming. That is partly because spammers can hide themselves or their operations in countries where law enforcement is lax, from Russia and Eastern Europe to China and Nigeria. Because some spammers can churn out 200 million or more messages a day, and because less than 1 percent of those need to bring responses from naοve, click-happy users to turn handsome profits, there is little incentive to stop.

"That's really just the daily battle," said Mr. Sergeant, who routinely shares intelligence on individual spammers with other antispam organizations and with the F.B.I. and other law enforcement agencies. "That 1 percent is the wall, really — it's the spammers creating something new that we just haven't seen before. And for us it's a matter of how quickly we can deal with it."

There is plenty to deal with. Most spam is still just, well, spam: low-rent pitches for stocks and penis-enlargement pills. But there are also the more immediate menaces, including attempts to trick consumers into giving up bank and credit card information — or the use of spam to deliver viruses and other malicious software.

From an industry perspective, antivirus and antispam scanning are virtually inseparable, and MessageLabs is among many companies jockeying to position themselves as full-service contractors, offering to filter, scan, scrub and archive both incoming and outgoing mail.

It's a lucrative strategy.

IDC, the research firm, estimates that the global market for "messaging security" will grow to $2.6 billion by 2009, from $675 million in 2004. The category consists mostly of antispam services, but also covers outbound filtering — something that employers now demand and all vendors include, according to Brian Burke, an IDC analyst.

IDC estimates that the larger market for "secure content management," which folds in virus protection, Web filtering and spyware protection, will grow to $11.4 billion by 2009 from $4.8 billion in 2004.

In 2005, about 60 percent of businesses were using software to combat spam, with the rest split between using managed services and antispam hardware, according to Osterman Research, which conducts market analysis on the messaging industry. But the percentage of businesses moving to managed services is expected to double, to almost 40 percent, during the next two years.

In that context, it may not be surprising that Microsoft recently acquired FrontBridge, the third-largest provider of managed e-mail services. MessageLabs and Postini, based in San Carlos, Calif., have long been the leaders in the category.

While much growth in this field will be driven by the threat of viruses and other bugs attached to messages, the wave of simple but inventive marketing spam remains a big concern — and, in many ways, is the harder thing to catch. Consider the stock spam using random dots in the borders.

"We actually developed some technology to detect borders in images and figure out the entropy — that is, to figure out if the border was random," Mr. Sergeant said. "So that was fine." Of course, shortly afterward, "they decided to stop using the borders," he added.

From there, the senders began placing a small number of barely perceptible and, again, randomly placed dots — a pink one here, a blue one there, a green one near the bottom — throughout the images. Then they shifted to multiple images, with words spelled partially in plain text and partially as images, so that the content, when viewed on a common e-mail reader like Outlook or AOL, would look like an ordinary message.

"There are loads of different kinds of obfuscation," Mr. Johnson said. "They've realized that people are looking for V1agra spelled with a '1' and st0ck with a 'zero' and that sort of thing, so they might try some sort of meaning obfuscation, like just referring to a watch as a 'wrist accessory' or something like that. So they say something like, 'Drape your wrist with this elegant accessory.'

"Any way not to say 'Rolex,' " he added, "so it's quite cryptic."

Sitting in a windowless conference room, Mr. Sergeant alternated his gaze between the conversation at hand and the streams of filtered e-mail subject lines slithering down his laptop screen.

The lines were feedback from the company's "radar" system, which allows team members to test a new "rule" or "signature" that they have devised on a slice of the incoming torrent of spam. If the rule is too broad and general, legitimate e-mail messages — dreaded "false positives" in the parlance of spam assassins — will begin showing up on the radar.

Mr. Johnson plugs into the radar himself and highlights a common obfuscation technique he calls "gappy text": words with spaces between the letters, to fool filters designed to look only for whole words. The example was in a message advertising a work-at-home opportunity out of "T u l s a , O k l a h o m a ."

"That's something that we might consider signaturing, that whole line there, with the spaces," he said, "because it's not very common behavior for someone to want to write like that."

Mr. Johnson began reading from a customer testimonial included in the same message: "I was skeptical at first. I made money. I couldn't believe it!"

Mr. Sergeant erupted in laughter.

"It's a classic joke in our office," Mr. Johnson said. "If it's advertised in spam, it must be true."

MR. JOHNSON described another trick that a spammer had recently deployed so that messages peddling Viagra would move into recipients' in-boxes.

By default, most modern e-mail software can display messages that are written with the same text formatting code used to create Web pages — known as hypertext markup language, or HTML. Like viewers of Web pages, e-mail users never actually see the underlying code, or "tags" used to make some words appear, say, bold or italicized. But spam filters scan this code, too, looking for "spammy behavior," as Mr. Johnson put it.

In this instance, a clever spam writer slipped a Viagra message past many filters by spelling the word with several I's, then using HTML code to shove all of the I's together. "Whenever you view this in your e-mail program," Mr. Johnson said, "the letter spacing is set to minus-3 pixels, so it will show all these I's on top of each other, and it will look like one I.

"That was quite an impressive one, actually," he said.

And vexing, Mr. Sergeant added. Without a special rule created by the team, it would have been virtually impossible for a machine to examine the source code of a message and determine that this was the word "Viagra."

"The word appears on screen as it should," Mr. Sergeant said. "But if you actually are examining the HTML, you just couldn't pull out a word from it. So while a computer can't figure out what the words are in the e-mail, the human eyes can."

A company like MessageLabs tries to avoid examining messages at this level. Instead, it prefers to stop much of the junk at the door, using what is called I.P. blocking. This prevents the receipt of messages from a particular Internet protocol address already identified as a spamming source.

This technique is sometimes frowned upon by Internet purists, because it can punish innocent users by blacklisting a whole range of addresses from a single host. But Mr. Sergeant said that I.P. blocking had become more refined since the early days of spam fighting. "It's very, very important to us," he said. "It's our first line of defense, really."

Still, spammers can often get around this by turning to zombie bots. These are vast networks of personal computers that have been surreptitiously infected with malicious software, permitting a spammer to use their computing power, without the owners' knowledge, to spew or relay spam, viruses, keyloggers, phony "update your bank account" messages and other dark payloads.

Zombies now deliver half to three-quarters of all spam, according to a Federal Trade Commission report to Congress in December on the state of the spam problem. Among the zombies' many advantages is an ever-shifting collection of I.P. addresses.

Another trump card was handed to spammers just over a year and a half ago, when VeriSign, the security and services company that controls the dot-com and dot-net network domains, unveiled a quicker way to update domain names.

Although a boon to people setting up their own sites, the new system decreased the time needed for a newly registered domain name to be activated, to 5 minutes from about 12 hours. That put spammers, armed with stolen credit cards and a willingness to buy and quickly abandon domain names, at a new advantage.

VeriSign updates its domain information every 12 hours. "But a spammer can register a new domain and have it live within 5 minutes," Mr. Sergeant said. "So he's got a big window where nobody has any information about his domain. They make use of that window."

MESSAGELABS' filtering database tries to discover new zombie bots by studying the behavior of e-mail messages from new addresses. Normally, for instance, a machine looking to deliver a message to another machine essentially says "hello" by passing an identifying string of code. Most legitimate mail servers will say "hello" with the same string over and over, for every message.

"When a machine communicates with us in two, three, four different ways within a small time frame," Mr. Sergeant said, "that makes the sending machine look kind of weird." That behavior can indicate "it's not a real machine, it's just one of these drone armies."

Some low-end spamming software, too, may leave characteristic fingerprints — for instance, the telltale way in which it forges the header information — that spam fighters gradually add to their cumulative antispam wisdom.

For all the algorithmic derring-do, however, sooner or later the game turns not on I.P. addresses or software fingerprints, but on the content of the message. It's the approach that MessageLabs researchers like least, but one that spammers constantly force on them.

Nigerian e-mail scams are a particular nuisance in this regard. Familiar to any e-mail user, these are the ones seeking an advance payment from the recipient to help rescue a deposed prince or to collect a percentage on some elaborately portrayed fortune. They are difficult to weed out because the senders often use Web-based e-mail services like Yahoo or Gmail, so I.P. blocking is impractical.

The language used in the e-mail messages, too, is often common enough that no particular string lends itself to safe rule-making; the risk of filtering out legitimate communications would be high.

MessageLabs has spent a year compiling a database, "Scam DNA," of 15,000 Nigerian scam messages, and used pattern analysis to build a family tree of the scams. It has found that most of the pitches are derived among a few hundred templates.

"Scam DNA basically codifies this into an algorithm," Mr. Sergeant said, "where, hopefully, we can detect this going on and find new scams based on the old scams."

But even if it works, the amount of spam it would eliminate from the overall deluge would be negligible by almost any measure, and Mr. Sergeant and his team will still be forced into encounters with "C i a l i s" and "st0x" and "Viiiiagra." The researchers are certain that the last, with multiple I's shoved together, is the handiwork of Leo Kuvayev.

Mr. Kuvayev is No. 3 on the list of the world's most prolific and notorious spammers, maintained at Spamhaus.org, a London-based watchdog group. The listing is not undeserved.

In Massachusetts last October, a Suffolk Superior Court judge, D. Lloyd MacDonald, levied $37 million in penalties on Mr. Kuvayev and six other people after deciding against them — in absentia — in a lawsuit brought by the state's attorney general, Tom Reilly.

The suit contended that the defendants, who once worked out of Newton, Mass., and Boston, used "a complicated web of Internet sites and domain names selling a variety of illegal products," including counterfeit drugs, pirated software, pornography and phony designer watches.

Spam watchers say they believe Mr. Kuvayev is now in Russia — still very much in business and employing a team of spam writers to continue poking holes in the world's filters.

"They must be pretty good HTML gurus," Mr. Sergeant said, "who must really know their stuff."

Mr. Sergeant said that just two men — Mr. Kuvayev and Alex Blood, a Ukrainian who is rated the No. 1 junk mailer by Spamhaus — hammer the world's e-mail systems with five million messages an hour. "You're talking about being responsible for something like 10 percent of all e-mail on the Internet," Mr. Sergeant said, "from just two guys."

Two guys who, along with plenty of others, may keep antispam outfits like MessageLabs in business.

"A lot of people would say, 'Why would you want to have these spammers prosecuted and why give information to the F.B.I., because surely you want there to be more spam?' " Mr. Sergeant said. "But with the volumes these guys are sending, it would actually help us more if there were less of it.

"We're just not going to kid ourselves and say we believe that spam is ever going to go away," he added. "It's always going to be a prob- lem."

    The Fight Against V1@gra (and Other Spam), NYT, 21.5.2006, http://www.nytimes.com/2006/05/21/business/yourmoney/21spam.html

 

 

 

 

 

Another Arrest in Webcam Pornography Case

 

May 16, 2006
The New York Times
By JEREMY W. PETERS

 

DETROIT, May 15 — A 28-year-old computer consultant was arrested here Monday for his suspected involvement in the case of a California teenager who used a Webcam to start his own online pornography business.

The consultant, Ken Gourlay of Detroit, is being held on a $500,000 cash-only bail and faces 10 felony charges, including criminal sexual conduct, contributing to the delinquency of a minor and distributing child pornography. If convicted, he faces up to 20 years in prison.

The arrest of Mr. Gourlay signals a new front in the government's response to the revelation that minors have been using Webcams to run their own child pornography Web sites, one that could have a crippling effect on this once-burgeoning business.

Justin Berry, now 19, has accused Mr. Gourlay of luring him to Michigan when he was 13, molesting him and setting up a Web site that charged a monthly fee for videos of him performing various sex acts.

In December, a front-page article in The New York Times described Mr. Berry's involvement in the underworld of Webcam child pornography, and the case has generated national interest. Last month, Congress held hearings on the issue.

Mike Cox, the Michigan attorney general, said Monday that after reading the Times article and learning that Mr. Berry had been abused in Michigan, he began investigating Mr. Gourlay.

Last week, law enforcement officials searched Mr. Gourlay's home in Detroit and seized multiple computers. One of them, state officials said, had thousands of pornographic images on it. That computer was owned by Edward Mulak II, 24, Mr. Gourlay's roommate, who was arrested on charges of possessing child pornography, they said.

"It's a parent's worst nightmare," Mr. Cox said. "An adult reaches into a home and pulls the child out."

The Times article on Mr. Berry revealed that at least hundreds of teenagers had created sites similar to his, with help from Web hosting companies that accept a lucrative cut of their revenue in exchange for access to the servers needed to operate the site. That is the service Mr. Berry said was provided to him for some of his earliest sites by Mr. Gourlay and his Web hosting company, Chain Communications.

The action by the Michigan attorney general has made clear that law enforcement officials could view a Web hosting company as being in the business of promoting and distributing child pornography. If such companies refused to provide support to child Webcam sites, most of them would probably vanish.

At the Congressional hearing, Mr. Gourlay took the Fifth Amendment and declined to comment. His lawyer, James C. Howarth, could not be reached on Monday.

Mr. Berry has identified as many as 1,500 men who gave him money and gifts to perform on camera. In January, one of the men, Gregory J. Mitchel of Virginia, pleaded guilty to four felony counts involving the production, sale, distribution and possession of child pornography.

    Another Arrest in Webcam Pornography Case, NYT, 16.5.2006, http://www.nytimes.com/2006/05/16/us/16porn.html

 

 

 

 

 

Death on MySpace

When 17-year-old Anna Svidersky was stabbed to death in a small-town American restaurant, it was a tragedy for those who knew her. But then friends decided to compose an online tribute, and suddenly, thousands of people were mourning a girl they had never met. By Tim Jonze

 

Monday May 15, 2006
Guardian
Tim Jonze


Take a glance at Anna Svidersky's profile on MySpace, the web's most popular social networking site, and you get an insight into the life of a typical American teenager, from her love of The OC to the request that you "make me smile". What it doesn't tell you about are the events of April 20, when schizophrenic David Barton Sullivan visited the McDonald's where Anna worked and brutally stabbed her to death. The story dominated the news in Anna's home town of Vancouver, Washington. Not only was the victim six days short of her 18th birthday, but Sullivan was a twice-convicted sex offender. He had left his home that night armed with a kitchen knife and the sole intention of "hurting a female".

Tragic as it was, this story was never destined to attract worldwide attention. Until, that is, Anna's friends posted the news of her murder on MySpace. Together, they composed a tribute to Anna - complete with a collage of photographs - and sent it out to all their contacts. They wanted to let people know what had happened and to keep Anna's memory alive. Soon it was circulating around the entire MySpace community, along with pleas to forward the message. Just a few days after Anna's death, the story had reached much of the online world. People started taking virtual pilgrimages to Anna's profile while others made video tributes and posted them online. Anna's death had once again showed the power of the internet to spread information across the world almost immediately: while few, if any, British news sources have covered the story, tens of thousands of British web users know about Anna. But the case also brings up some moral dilemmas. Should we be intruding on someone else's grief, even if we have been invited to? And in circulating the story of Anna's death, are we treating her with the same triviality we would afford to a funny forwarded email?

Among those who have posted a tribute to Anna is Alex Milnes, an 18-year-old music fan from Banbury in Oxfordshire. He had never heard of Anna Svidersky until he received the MySpace bulletin. Despite living 5,000 miles away from her, he felt the need to respond. "Although we hear about murders every day, somehow it seems worse when you hear about it over MySpace," he says. "Something that feels quite safe to teenagers has made people realise that life isn't all about how many [MySpace] 'friends' you have on your page."

Blake Ford is also 18 and from Florida. He claims to have been so touched by the tribute that he wrote a song for Anna and plans to sell it online for $1, with the proceeds going to her family. He told people about his song by posting a further bulletin. Within an hour, he had people responding to it from California, New York and London. Another surfer, Shelby, 17, made a video tribute to Anna and posted it on youtube.com: "Seeing all the messages made me feel so bad. Me and my friends were crying." So far, her video has received more than 2,200 hits. She's not alone. One video tribute has already been watched over a million times. It would seem, at first glance, that this is grief on a global scale. But can it really be possible to grieve over someone you've never met?

In 2004, the thinktank Civitas produced a report on the way British people had reacted to events such as Princess Diana's death and the Soham murders. They gave the mass outpouring of grief a name, "mourning sickness", and went on to suggest that people were making "phoney" emotional connections in order to feel better about themselves.

Alex agrees with this idea of a phoney connection, likening the interest in Anna to the way people "grieve" over celebrities because they "think they know the person". But by visiting Anna's page, he says, "you could find out nearly everything about her". Indeed, reading Anna's page seems to show her life exactly as it was up to the moment she died. Locked by a security password only she knew, it cannot be altered or airbrushed now that she is dead. Hence it is still full of risque comments and goofy phrases. Instead of assurances from heartbroken family members that the victim was a sweet young girl who would "do anything for anyone", we find a portrait in which Anna boasts of being "legal in six days" and chooses as a theme song a coarse little number by the band Hollywood Undead.

But being able to pore over the details of Anna's life is not without an element of creepiness. People who have never met Anna have posted tributes to her as emotional as those of Anna's closest friends. Some members of the online gaming community, meanwhile, have reportedly been using the pictures on Anna's tribute page as "avatars" to represent characters in their role-playing games.

Understandably, this has led to tensions between those who know Anna and those who think they do. "I don't want any more friend requests, or sympathy messages from people - I just want you back," wrote one of Anna's best friends, Shona. Another, Sage, posted: "I'm sorry, Anna. I'm sure you don't wanna see 100 comments that say in the first line 'I didn't know you,' and at your funeral, some of the people who spoke, their first words were, "I didn't know her, but ..." That really irritated me."

Clearly, there is a divide between those treating Anna's death with respect and those who are not. But there is a further distinction to be made, between those who are actually grieving for Anna (her closest friends) and those grieving for someone, or something, else entirely. The Civitas report claims that in making these false connections with strangers, people are actually grieving for a sadness inside themselves and attaching these feelings to a well-known face or event. Certainly, in an age where chat rooms and "virtual" friends are replacing traditional support structures such as religion and the family, the need to make emotional connections is stronger than ever, even if they are not genuine. And because the grief cannot, in this case, be genuine, a competitive element has arisen over who can grieve the most hysterically. In Anna's case, the quantifiable nature of hits and posts only magnifies this competitive element.

"I reposted the bulletin once, but a few people on my contact list have reposted it and I have noticed changes to it, like extra pictures of Anna with poems on them," says Alex. "MySpace is renowned for being an emotional, scenester place so it doesn't surprise that people are trying to show who can be the most emotional. Maybe they think it will get them more online friends."

The story looks unlikely to stop here. Condolences from all over the world continue to flood in, with 29 video tributes currently hosted on You Tube alone. There is already a 200-word entry on Anna's life at Wikipedia, complete with a picture from her high-school yearbook. For those frustrated at being unable to leave comments on her MySpace site (only her approved MySpace friends can do that), there is a tribute page set up at www.myspace.com/loving_memory_anna . On this page there is a request from Anna's friends that the "RPers" (players of role-playing games) show some respect and stop using Anna's picture in their online games. Sadly, though, control is no longer in their hands. The grim truth is that this tragedy has mutated into the latest internet buzz. And as with anything on the internet, this dangerous combination of grief, sympathy and voyeurism is starting to snowball at a frantic rate.

    Death on MySpace, G, 15.5.2006, http://technology.guardian.co.uk/news/story/0,,1775013,00.html

 

 

 

 

 

Media Frenzy

Can TV's and PC's Live Together Happily Ever After?

 

May 14, 2006
The New York Times
By RICHARD SIKLOS

 

HOLY Grails, swirling myths and big lies seem to be in the air these days — and we're not just talking about a certain heavily publicized movie opening this week that is based on a certain megaselling novel. Rather, consider the much-ballyhooed convergence between television and personal computers (a k a the grail), which seems to edge ever closer with every week.

Slowly but surely, it seems that TV programs and movies are finding their way onto the Internet through a growing array of distribution outlets.

Just in the last few weeks, for example, Warner Brothers announced it would make hundreds of its hit films and shows available this summer for paid download via the file-sharing site BitTorrent; Fox Entertainment has joined the other major networks on iTunes with downloadable episodes of "24" and "Prison Break"; TiVo announced a deal with the Web video outfit Brightcove that intends to give people with TiVo boxes access to Internet fare on their TV sets; and ABC and CBS have begun streaming replays of some of their most popular shows on their Web sites, offering a new advertising-supported way to tune in.

Even though no one seems to be making much money yet on these ventures and there are still chewy legal and rights issues to sort out, there is palpable excitement — a sense that the TV and movie industries are going to head off the pirates and file-sharing teens by making their products widely available online in legal ways.

In doing so, it seems the ultimate no-brainer that anyone with a fancy TV monitor and a broadband Internet connection will next be able to pluck their favorite TV programs and movies off the Web (and eventually choose to disconnect their cable or satellite provider, or, as I've written previously, at least force the cable operators to offer smaller and more appealing packages of channels).

Now, this is the kind of convergence that people could really get behind — it makes a whole lot more sense than some of the "benefits" promised earlier, like surfing Web sites on a 60-inch plasma screen or answering e-mail messages while sitting in the La-Z-Boy. All the elements are falling into place: sales of high-definition TV's that can also be used as computer monitors are soaring — they are already in 19 percent of American homes — and, according to the Consumer Electronics Association, sales of digital sets will surpass the sale of analog sets this year for the first time. Meanwhile, more than 40 percent of households in the United States have signed up for high-speed connections, and the number continues to rise.

The consumer electronics industry and technology giants like Microsoft and Intel are working double-time to concoct the next generation of gadgets that will bridge the gap between computers and televisions. Some companies, among them Apple, Hewlett-Packard and Cisco Systems, already have products that make watching Web video on TV possible, though they are cumbersome to use.

Sharp announced last month that it would soon introduce an LCD-screen TV for the Japanese market that will let viewers watch high-definition television, use the remote control to surf the Internet, and store data and TV programs on a built-in hard drive. (One studio executive said he expected these machines would be the rage by this time next year, and that Apple is believed to have the most promising version in development.)

But here is the swirling myth — or is it The Big Lie? — about convergence: It's not as close as all of that activity suggests. For various reasons, watching TV programs delivered by the Internet on regular TV looks like it will remain tantalizingly out of reach for all but the most enthusiastic gadget junkies for some time.

The point of all these new video-content deals being struck by networks and studios is, of course, to avoid making the mistakes of the music industry, which focused too much on rear-guard actions like lawsuits and not enough on figuring out new ways to give the fans what they wanted.

The music analogy only goes so far, however. The way music is promoted and sold and listened to bears scant resemblance to TV and video products. Ventures like the one announced by Warner and the big networks are not really an alternative way of receiving conventional TV, but rather an alternative to buying or renting DVD's coupled with an intriguing new market opportunity to reach viewers on their desktop or mobile devices.

David G. Sanderson, who heads the media consulting practice at Bain & Company, offers four reasons most people won't be downloading their favorite shows onto their TV's any time soon: limitations in broadband infrastructure, the degree of readiness among electronics makers to provide a product with mass appeal, the behavior of consumers and the agenda of the players in the TV ecosystem.

"If you started from scratch, you'd do it differently," Mr. Sanderson said of the fitful process of making television shows available on the Internet. "But we have an entrenched structure in how programming is brought to consumers."

Mr. Sanderson's first two points — basically whether the Internet-based network and devices are ready for prime-time — are where most of the action is and where things could change if businesses keep investing and innovating. Still, for now, there are logjams associated with delivering large quantities of video over the Web and the unresolved "net neutrality" debate over whether heavy users should pay more to telecommunications carriers for the large amount of bandwidth they use.

His second two points — about consumer behavior and the entrenched players — are actually more complex. The consumer question boils down to whether enough people want to give up access to the dozens or hundreds of channels they pay for through their cable providers to buy programs over the Internet. And that is closely related to his point about the industry structure, which is a function of the willingness of cable networks to risk giving up their guaranteed monthly subscription fees in favor of a free-wheeling Internet alternative.

"The reality is that I don't think you're going to see the current cable offering — hundreds of linear channels — replicated on the Internet," Glenn A. Britt, the chief executive of Time Warner Cable, told me recently. "One reason is the Internet isn't physically capable of handling that volume, but obviously, with a lot of money and time, that can be alleviated. But the second thing is that we actually provide a very important economic function in the TV distribution chain."

CABLE networks are not about to jeopardize the millions they receive from guaranteed subscription fees each month — and it is probably no coincidence that the versions of TV programs sold through iTunes or Google Video are inferior in picture quality to what is offered by cable companies (while the growing popularity of high-definition TV shows that viewers want higher quality). Even Sharp's new Japanese TV, the Internet Aquos, only accesses online video material from a closed-circuit service, and displays it at inferior quality.

Mr. Britt said his industry was not ignoring the enormous amount of effort being poured into providing alternative ways to get video material delivered to the TV set. But, as he put it, "it's very complicated to set up unless you have a 13-year-old son."

Those seeking true convergence may have to keep the faith for a while yet. On the other hand, those seeking grails don't tend to give up easily.

    Can TV's and PC's Live Together Happily Ever After?, NYT, 14.5.2006, http://www.nytimes.com/2006/05/14/business/yourmoney/14frenzy.html

 

 

 

 

 

Google jazzes up search capabilities

 

Updated 5/10/2006 9:40 PM ET
USA Today
By Jefferson Graham

 

MOUNTAIN VIEW, Calif. — It's still about search.

Internet giant Google (GOOG), which has lately been talking about new products that include finance pages, calendars and free urban Wi-Fi programs, returned Wednesday to its roots with a slew of products aimed at improving the search experience.

At a meeting with reporters from around the globe, Google introduced several new search enhancements, including a way to subscribe to health research from experts and tools that let people save portions of websites in a pop-up box that can be shared via e-mails.

The theme, says analyst Allen Weiner at research firm Gartner, was Google "moving the playing field back to its core strength — search — and all about fearing Microsoft (MSFT) as a threat."

In the past two weeks, MSN and Yahoo overhauled their search advertising programs in a bid to more effectively compete with Google. And Microsoft says it will feature desktop search in the new edition of its Windows software, Vista, expected in early 2007.

Google's share of online searches rose to 42.7% in March from 36.4% a year ago. Yahoo's and MSN's shares fell, says research firm ComScore Media Metrix.

Google co-founder Larry Page dismissed the Microsoft rivalry, saying Google "tries really hard to not be focused on what they're doing, but what we're doing." Page says 98% of what will exist in 10 years "has yet to be done, and we won't get there by looking at what other companies are doing."

Weiner doesn't buy it. "It's all about Google extending search into a desktop tool so you don't have to use an operating system," he says. The new tools:

•Google Co-op. Users can sign up at www.google.com/coop/directory to subscribe to free health information from several organizations, including the federal Centers for Disease Control, the Mayo Clinic and Kaiser Permanente. Their tips on the best health data will show up in search results. Google Co-op also offers city guide information for more than 300 cities, including London and New York. Co-op is designed to let organizations label Web pages relevant to their areas of expertise. "We're going to take the Tom Sawyer view and see how our users paint the fence," said Google Vice President Marissa Mayer.

•Desktop 4. An extension of Google's tool to search for items on your computer now comes with more than 100 "Gadgets" — little widgets that do things such as list friends' birthdays, show videos and play music.

•Google Trends. Lets users examine searches for market trends. For example, a search for "surfers" will show that most searches come from Hawaii and Australia and link to news stories about surfing.

"For the first time ever, Google is making it possible to sift through billions of search queries from around the world to see what people are thinking about," said Mayer. Trends is targeted primarily toward marketers.

•Google Notebook. Available next week, it lets people save a portion of a website to a box that can be shared with others. Google showed an example of shopping for shoes, saving a certain pair and writing a note about it, then sending it to friends. The tool works in conjunction with Desktop 4.

    Google jazzes up search capabilities, UT, 10.5.2006, http://www.usatoday.com/tech/news/2006-05-10-google-search_x.htm

 

 

 

 

 

Microsoft and Google Grapple for Supremacy as Stakes Escalate

 

May 10, 2006
The New York Times
By STEVE LOHR

 

The Microsoft-Google rivalry is shaping up as a titanic corporate clash for the ages.

It may not turn out that way. Markets and corporate fortunes routinely defy prediction. But it sure looks as if the two companies are on a collision course, as the realms of desktop computing and Internet services and software overlap more and more.

Microsoft, of course, is the reigning powerhouse of computing and Google is the muscular Internet challenger. On each side, the battalions are arrayed: executives, engineers, marketers, lawyers and lobbyists. The spending and competition are escalating daily. For each, it seems, the other passes what Andrew S. Grove, a founder and former chairman of Intel, calls the "silver bullet test" of strategic competition. "If you had one bullet, who would you shoot with it?"

How the Microsoft-Google confrontation plays out could shape the future of competition in computing and how people use information technology.

Do the pitched corporate battles of the past shed any light on how this one might turn out?

Business historians and management experts say the experience in two of the defining industries of the 20th century, mass-market retailing and automobiles, may well be instructive. The winners certainly scored higher in the generic virtues of business management: innovation, execution and leadership.

But perhaps even more significant, those who came out on top, judging from history, had two more specific attributes. They were the companies, according to business historians, that proved able to adapt to change instead of being prisoners of past success. And in their glory days, these corporate champions were magnets for the best and brightest people.

"One area where Microsoft and Google are really competing head-to-head now is in the war for talent," said Richard S. Tedlow, a historian and professor at the Harvard Business School. "Historically, the company that won the war for talent, won the war."

Mr. Tedlow points to Montgomery Ward as a company that lost talented managers to its rival Sears, and then lost its way. The crucial defection, Mr. Tedlow said, was Robert E. Wood, a former Army general who joined Montgomery Ward in 1919 as a general merchandise manager.

Even in the Army, Mr. Wood was a close reader of the Statistical Abstract of the United States, the Census Bureau's annual tracking of social and economic conditions. Mr. Wood became convinced that America was at the beginning of a huge population shift from rural regions to urban areas.

That meant, he understood, that the mail-order giants like Montgomery Ward and Sears needed to move from being catalog retailers serving a dispersed market to department store merchants with stores in city and suburban population centers.

Sears, as a company, grasped that fundamental change in the marketplace in a way that initially Montgomery Ward did not, Mr. Tedlow said.

In 1924, Mr. Wood left Montgomery Ward to join Sears, and he later recruited others. In 1945, Mr. Wood, then the chairman of Sears, made another smart call on economic trends. The postwar years, he decided, would bring a long expansion, as pent-up consumer demand from the war years was unleashed.

So Sears embarked on a national store-building binge. His counterpart at Montgomery Ward, Sewell Avery, made the opposite bet, keeping money in the bank to prepare the company for a postwar depression, which he was convinced was around the corner.

Over the next several years, sales at Sears doubled, while Montgomery Ward's shrank 10 percent. "Losing Robert Wood was catastrophic to Ward," Mr. Tedlow observed.

In its recruiting face-offs against Google, Microsoft insists that it fares quite well over all. But there have been some high-profile defections of leading engineers, who said they preferred Google's technological direction and corporate culture.

The most prominent was Kai-Fu Lee, a stellar computer scientist and manager. Mr. Lee not only established Microsoft's research labs in China, but he is also an expert in areas like natural language and speech-recognition technologies — important ingredients to Internet search today and to the way people will interact with computers in the future.

Last year, when Mr. Lee left Microsoft, it sued Google and Mr. Lee. Microsoft claimed, under a Washington state law, that Mr. Lee violated a noncompete clause in his employment contract and misused inside information in going to work for Google. The suit was settled last December.

"What does it say about a company when it sues when someone leaves?" Mr. Tedlow asked. "It makes Microsoft sound like a prison."

In business, forever tends to last about five years, a decade or two at most. So Sears prospered for a time and celebrated its success by building the Sears Tower in Chicago in the 1970's. Yet even from a height of 110 stories, Sears failed to see Wal-Mart coming. Wal-Mart brought the next revolution in retailing with its shrewd use of computer technology to track buying trends and orchestrate suppliers to become a hyper-efficient, low-cost merchant.

The auto industry presents a sobering history of past-success syndrome. The Model T, introduced by Henry Ford in 1908, famously made the automobile affordable, helped along by his pioneering assembly-line production, which started in 1913. Ford's laserlike focus on efficiency drove the cost of a Model T from $850 when it was introduced down to $275 by the early 1920's.

But cost and efficiency was all he focused on. The design was not updated, the color selection remained black and only black. Eventually, the single-mindedness caught up with the company. In 1925, the Ford share of the American market had fallen to 45 percent, from 57 percent two years earlier. By then, Alfred P. Sloan Jr., the managerial maestro of Detroit, was president of General Motors and its sales were surging.

"Henry Ford was so in love with his brilliant idea that he refused to change," said John Steele Gordon, a historian and author of "The Business of America" (Walker, 2001).

General Motors was well on its way to becoming the world's largest carmaker. Yet as early as the 1950's, the Japanese challenge to Detroit's auto supremacy was quietly getting under way. The architect of the Japanese ascent was a production engineer, Taiichi Ohno, who worked at Toyota. In 1950, Toyota manufactured 13,000 cars, barely a day's production for G.M.

Mr. Ohno had to devise an efficient way to manufacture a variety of cars in small production runs. He turned that adversity into an advantage, using rapid tooling changes, constant quality improvements and just-in-time parts delivery to steadily improve the cars.

Once again, the corporate giant was complacent, and late to see a fundamental shift in its industry.

"G.M. did not take Toyota and the Japanese seriously until the 1980's," said Michael A. Cusumano, a professor at the Sloan School of Management of the Massachusetts Institute of Technology and author of "The Japanese Automobile Industry" (Harvard University Press, 1986). "By then it was really too late."

History, then, suggests that past success is often an anchor holding a company back, and that Microsoft is at risk from the Google challenge. "The wind is really behind Google, and Microsoft's main tool for navigating the future is the rear view mirror," said Paul Saffo, a director of the Institute for the Future, a forecasting consultancy in Silicon Valley.

Microsoft bristles at being cast as a laggard. In a meeting last week with online advertisers and reporters, Bill Gates, the Microsoft chairman, portrayed his company as a force for healthy competition in Internet search. "We will keep them honest," Mr. Gates said of Google. And he vowed to catch up. "I think this is a rare case where we are being underestimated," he said. Microsoft certainly has plenty of money to finance any competitive foray, with $35 billion in cash, while Google has about $8 billion.

Indeed, the incumbent-challenger narrative — which portrays the incumbent as an endangered species — may not apply this time. Microsoft has adapted nimbly to big challenges before.

Apple introduced point-and-click graphical computing with the Macintosh in 1984, but Microsoft caught up and became dominant on the desktop with Windows.

In the mid-1990's, Netscape Communications posed a threat because the Internet browser might undermine the importance of Windows. Microsoft came up with its own browser and rebuffed that challenge, partly with tactics that violated antitrust laws, a federal appeals court ruled.

"Microsoft has responded every time in the past," said Mr. Cusumano, who is also the author of two books on Microsoft.

Now comes Google. It is offering or developing as free Web-based services e-mail, word processing and other programs that could replace Microsoft desktop programs and eat into Microsoft's lucrative software business. But that is by no means certain.

Google is cagey about its strategy. When Netscape was flying high, some of its executives talked of making Microsoft irrelevant — a strategic blunder, according to Silicon Valley lore.

Google's chief executive, Eric E. Schmidt, is a veteran of past battles with Microsoft, and he has no intention of making the same misstep. He speaks mainly of Google's limitless potential and ambitions, embellished by intriguing remarks like the one recently that Google is "building the systems and infrastructure of a global $100 billion company," many times its current yearly revenue. Some clues about Google's plans could emerge today, when its executives hold an annual media day at its Silicon Valley headquarters. Google now makes virtually all its money by selling advertisements linked to its enormously popular Internet search service. Microsoft and Yahoo are desperately trying to close the gap with Google, the Internet search and ad sales titan.

If Google stumbles, it will be seen as the company unable to move beyond a single stellar success.

Since the future is so often the pattern of the past with some twist, what is the expert view? "I'm a historian," said Mr. Tedlow of Harvard. "Ask me in 10 years and I'll tell you why what happened was inevitable."

    Microsoft and Google Grapple for Supremacy as Stakes Escalate, NYT, 10.5.2006, http://www.nytimes.com/2006/05/10/technology/10titans.html?hp&ex=1147320000&en=ba9c6053f9bf4c11&ei=5094&partner=homepage

 

 

 

 

 

Yahoo Is Unleashing a New Way to Turn Ad Clicks Into Ka-Ching

 

May 8, 2006
The New York Times
By SAUL HANSELL

 

When Yahoo finally switches on the new search-advertising software code-named Project Panama this summer, users of its search engine will hardly notice a difference. But if Yahoo's project was worth the two years and tens of millions of dollars it cost — far more money and time than it expected — users will find the text ads adjacent to the main search results just a little more interesting, luring them to click on those ads a little more often.

Those clicks should immediately turn into a lot more cash for Yahoo. It will not say how much. But Jordan Rohan, an analyst for RBC Capital Markets, estimates that if the strategy works, Yahoo will increase search-advertising revenue at least 20 percent right away — about $125 million in the fourth quarter of this year and $600 million next year.

That is a big impact from new software, and it speaks to the complex art and science of running a search engine. When hundreds of thousands of advertisers bid for the attention of hundreds of millions of searchers, little changes can have big results.

It is also a sign of how well Google, Yahoo's rival, has mastered those nuances. Mr. Rohan estimates that Google's ability to draw more advertisers and show the right ads to searchers lets it earn about 40 percent more from every search than Yahoo does.

Yahoo realized that its existing software had limitations shortly after it paid $1.6 billion in 2003 to buy Overture Services, the company that invented search advertising. But its effort to rebuild the software was delayed as it shifted its resources to creating its own Web search engine.

Daniel L. Rosensweig, Yahoo's chief operating officer, says he does not regret putting the search-advertising system behind the main search engine.

"We have been very clear that the goose that laid the golden egg is the audience," he said.

When the company turned its full attention to search-advertising software in late 2004, the task was bigger than it initially expected, partly because Yahoo wanted the system to be able to handle ads with graphics and video eventually, not just text.

But now the software is almost done. Today, Yahoo is releasing the technical specifications so that its customers can prepare for changes that will affect many millions of individual advertisements. At an analyst presentation on May 17, the company will offer more details about the introduction and financial impact of Project Panama.

In the meantime, Yahoo's existing system is straining to keep up with the search market. It is harder for advertisers and their agencies to use than Google's, and it has suffered from a series of embarrassing disruptions, leaving paying customers unable to buy ads. Yahoo also faces emerging competition from Microsoft, which has been developing its own search-advertising system.

"Yahoo has taken a lot of bumps and bruises," said Peter Hershberg, a managing partner of Reprise Media, a New York search-advertising agency. "We would get notification every day that data was not available, and that made it very challenging to manage our campaigns." He added that these problems had been cleared up in recent weeks.

Yahoo says the new system is more stable and is built for much higher volume. It hopes to make the system easier to use, both for small businesses and for giant marketers.

Most important, it is building a far more sophisticated system to determine the order in which it displays advertisements. That is crucial because users have a strong propensity to pick from among the top few ads.

When Overture began as Goto.com, an advertising-only search engine, it introduced what turned out to be two powerful innovations: Customers paid for an advertisement only when users clicked on it; and the price of an ad was set by a computerized auction. Thus, the advertiser that bid the most per click was listed first, and so on.

When Google got into the search-advertising business in 2002, it realized that Goto had made a critical mistake. Its system allowed obscure advertisers to gain a prominent position, even if they were not appealing to users and were unlikely to be clicked on. So Google found a way to predict the popularity of ads in order to put the ones that would bring in the most dollars on top.

Google's models have become quite sophisticated, trying to take into account that different ads may appeal to users in different locations at different times. Indeed, Google asserts that a supercomputer network of 100 machines evaluates more than a million variables in milliseconds to pick which to display each time someone searches.

Yahoo is building a cadre of mathematicians and economists to build similar models. But it acknowledges that it does not yet analyze as many data elements as claimed by Google.

Late last month, there was a clear sense of urgency at the headquarters of what is now called Yahoo Search Marketing in Burbank, Calif., near Los Angeles. Amid a sea of Yahoo's trademark purple cubicles, there were signs with "Panama: Are you ready?" written in big letters.

Under them was a mosaic of color-coded notations, tracking the work of 28 teams in three locations that are building the system. On other walls, more signs coordinated another effort, known as Roosevelt, a series of technological bandages meant to keep the old system running until the new one is ready.

"We are flying an airplane while rebuilding it," said David Henke, whom Yahoo hired last year as group vice president for engineering in the search-advertising group. "This is a bigger project than we expected because we are doing it in parallel with our existing systems. It required additional personnel and expertise."

Still, he said he had the complete support of Terry S. Semel, Yahoo's chief executive, and Susan L. Decker, its cost-conscious chief financial officer. When he asked earlier this year for a "gigantic" amount of money to buy a big portion of the thousands of servers and other machines that Panama requires, the approval came back in six hours.

"They said, 'Go figure what it takes and do it right,' " Mr. Henke said.

Gigantic for Yahoo, however, may well be pipsqueak compared with its free-spending competitors. Google plans to spend at least $1.5 billion this year on servers, networking equipment and the facilities to house them, and it is hiring 1,000 people each quarter, many of them engineers. Microsoft plans to spend $2 billion on search and Internet technology this year.

Ellen Siminoff, a former Yahoo executive who now runs Efficient Frontier, a search-advertising agency in Mountain View, Calif., said Yahoo had to recognize that it was in a technological arms race.

"Yahoo hires a lot of smart people, and they can do this if they want to," she said. "The big issue for them is their willingness to spend and keep up with Google's R.& D."

While the underlying Panama system has a lot of capabilities, the first version will present only a subtle difference from what Google offers. Advertisers will simply enter the keywords they want their ad to appear next to and the maximum price they are willing to pay for a click. The most significant option will be to specify a certain geographic region in which the ads will be shown, a feature Google also offers.

Microsoft, in contrast, has sought to distinguish itself by allowing advertisers to enter bids based on the sex, age and other characteristics of the ad viewer. Even though Yahoo could do the same, it says that for now such an approach is not helpful to advertisers.

"The system is built to handle many variables," said Tim Cadogan, the vice president who runs the business side of Yahoo's Web search operation. "We don't want to go overboard" and confuse customers with too many choices.

Yahoo says the main distinction from Google will be in providing information about how a given ad is displayed. Google is often criticized by advertisers as a black box: they do not really know how a given bid will affect the placement of their ads. Yahoo isn't going to tell advertisers either — as its computers will keep experimenting to get the highest ad revenue.

But as advertisers enter each bid, they will see an estimate of how many clicks they will receive each day. More important, a graph will show how many more clicks they can expect for each increased bid.

"One of the primary complaints we get is users can't explain to their bosses what they could get for spending the next $1,000," said Steve Mitgang, the Yahoo senior vice president who oversaw the development of Project Panama. "Now they can take this to their bosses to justify spending more."

    Yahoo Is Unleashing a New Way to Turn Ad Clicks Into Ka-Ching, NYT, 8.5.2006, http://www.nytimes.com/2006/05/08/technology/08yahoo.html

 

 

 

 

 

It's always 'OPEN HOUSE' as real estate goes online

 

Updated 5/7/2006 8:33 PM ET
USA Today
By Noelle Knox

 

For six months, Nancy Teer-Sims tried selling her parents' home in Durham, N.C., with a real estate agent. The results: few showings, no bids. So when the agent's contract expired in December, Teer-Sims dumped the agent, cut the asking price and listed the home on five websites, including eBay, Craigslist and ForSaleByOwner.com.

"By selling it ourselves, we could lower the price by $50,000," she says, because she wouldn't have to pay the standard 6% commission. In four months, she's shown the house 10 times and had three offers.

Though the offers so far were too low, she's amazed by the flood of responses: 1,400 visitors to her website (www.43beverly.com) and dozens of e-mail inquiries from people interested in the property.

"It's been remarkable, the feedback," says Teer-Sims, 49, a manager of small online companies.

Her story illustrates how the breadth of information now available on the Internet is shifting the balance of power in the real estate industry, giving home buyers and sellers more control over the deal than ever before and fueling competition among agents.

Gone are the days when real estate agents could guard the information about homes for sale in their Multiple Listing Service. Now, buyers and sellers can see all the homes for sale on 800 regional multiple listing services on the Web. They can see thousands of newly built homes for sale and apartments for rent nationwide. They can view aerial photos of homes and neighborhoods. They can get appraisals or see how much the house down the block fetched. They can shop for loans and compare mortgage rates. They can check out local schools and community features for towns across America. They can ask questions and get answers in online forums.

And all of it's free.

"The Internet has done what no consumer advocate could ever do: It has reduced the distance between the consumer and the real estate expert to the point where the consumer is so much more informed, they don't need the expert as much as they used to," says Art Raby, an agent for McColly Real Estate in Valparaiso, Ind.

The Internet is also revolutionizing the job of real estate agent — from the way agents attract clients to how they advertise and show properties. When a buyer walks into his office, "They've seen the inventory of homes for sale over the Internet, so I don't have to show as many homes, so I can sell faster and sell more," Raby says.

But he acknowledges a downside: "The consumer sees us not working as many hours for getting the commissions we used to get. So commissions are under pressure."

In 1995, just 2% of home buyers used the Internet to look for a home. Last year, 77% of home shoppers went house-hunting online, and nearly one-fourth of buyers first found the property they bought on the Internet, according to the National Association of Realtors. Traffic on real estate websites jumped 8% in the past year — double the growth rate of Internet traffic overall, according to comScore Media Metrix.

 

A pivotal point in the market

The rising dominance of the Internet comes at a pivotal point in the real estate market. After a five-year feeding frenzy, home sales are expected to drop at least 6% this year. Some sellers are already chopping their prices from last year's record levels. Home buyers and sellers, meantime, are seeking new ways to save money, and they're finding them on the Internet.

Armed with more information, sellers are bargaining down agents' commissions, and buyers are asking for rebates. They are turning to a growing number of brokers who offer discounted or a la carte services. And some are even cutting out the agent altogether and forging deals directly on the Internet. These factors have pushed commissions to an average of 5.1%, down from the long-standing 6%, according to Real Trends, a real estate newsletter.

"I haven't found that the Realtor does much more than I end up doing myself in terms of checking out a house first," says Todd Tierney, a 41-year-old architect who bought a home in Boston using ZipRealty.

ZipRealty is a full-service real estate firm that gives buyers a 20% rebate on their commission and offers sellers a discount of 1 percentage point. While Tierney did most of his house-hunting from San Francisco, the ZipRealty agent in Boston sent him video virtual tours and set up appointments or confirmed times of open houses for Tierney's trip to Boston.

But make no mistake: There's no shortage of buyers and sellers grateful that they used a traditional real estate agent even though they paid full price for the privilege. For most Americans, after all, a home is the most expensive purchase they'll ever make. It's exponentially more complex than booking the family vacation on Expedia.com.

Just ask Oliver Schmalholz. Last month, while he was in the midst of selling his home in Denver, an inspection turned up structural problems that had to be fixed while he was in Las Vegas buying a new home. His Re/Max agent oversaw all the repairs and kept the buyers from backing out.

"I don't think a discount broker would spend all this time, working until midnight to save the deal," says Schmalholz, 33, who owns a software development company. "This is one of the biggest investments for people out there; going with a discount broker is like buying cheap tires for your car."

Home buyers use an agent — and the Internet

And, in fact, 81% of home buyers who used the Internet to look for a home also used a real estate agent. And last year, only 13% of homes were sold directly by the owner, without an agent, down from 19% in 1991, in part because the documentation is more onerous now, according to the NAR.

Nevertheless, the Internet is shaking up the real estate industry, and many agents, such as Bud Kleppe, say it's forced changes in his business model.

Kleppe, an agent for Coldwell Banker in St. Paul, says 70% of his business comes from his website now. The downside, though, is that 2.6 million licensed real estate agents nationwide can compete more easily with each other. And that is dragging down commissions.

Many agents now resort to paying for leads (contact information for potential buyers or sellers) gathered by Internet sites like HouseValues.com, RealEstate.com and e-Agent. Sites such as HomeGain.com even take a piece of the broker's commission once the deal closes.

The gravest threat of all to Realtors is probably the rise of discount brokers, who dangle rebates, or charge low flat fees or reduced commissions. Realtors have helped persuade about a dozen states to pass laws limiting the ability of real estate agents to give rebates to home buyers or to offer a la carte services at low prices to home sellers. The Justice Department, in trying to protect competition, has pressured some states, such as Idaho, to reverse plans to pass such laws.

State regulators say their laws are designed to protect home sellers who don't understand the potential hazards of hiring a limited-service agent. Some brokers, for example, will charge a flat $295 to put a seller's house on the Multiple Listing Service, but they won't provide any other support in closing the deal, such as complying with lead-based paint disclosures or ensuring that advertising meets fair housing laws.

"Apparently, there have been a lot of situations where the seller was trying to save as much money as possible but somewhere in the process got in over their heads," says Craig Cheatham, chief executive for the Association of Real Estate License Law Officials, which represents state real estate regulators.

But Betty Mahmoody says she's sold four houses with just a yard sign and a real estate lawyer to handle the closing. She recently listed her home on Lake Huron in Michigan in January on ForSaleByOwner.com for $1,225,000. "I've heard too many horror stories about Realtors," says Mahmoody, 60, an author who was called at random by a journalist looking at listings. "If someone's calling on the house and wants to see the house, I know if those calls are being answered or not. If they are to a Realtor, I don't know that."

There are now about 50,000 homes listed on ForSaleByOwner.com. The success rate for sellers on the site (which has a marketing relationship with USATODAY.com) is about 65%, according to the company.

 

'What does a real estate agent do?'

And there are plenty of experts, such as Steven Levitt, economics professor at the University of Chicago, who think the Internet is fast eroding the value of traditional real estate agents.

"What does a real estate agent do for a homeowner?" Levitt says. "One is the actual labor of showing the house, but you wouldn't actually pay that much money to show a home. What you're actually paying for is knowledge of how the real estate industry works — what your property is worth and the state of the market — and finding you buyers, because you have to have an agent to list on the MLS."

The Internet lets home buyers and sellers do almost all of that themselves. And that means there will be less need for traditional real estate agents, says Levitt, co-author of the best-seller Freakonomics: A Rogue Economist Explores the Hidden Side of Everything.

"I predict there will be a shakeout in real estate," he says. "I would not be surprised if there are one-third less of the traditional real estate agents a decade from now than there are today."

Back in Durham, N.C., Teer-Sims' sister, Pam Whilden, also has decided to put her home for sale on the Internet after having listed it with a Realtor for the past two years with barely a nibble. She said she feels comfortable going it alone because she can get help from her brother, who's in real estate development.

"We didn't want to drop the price too much because we think we're asking a fair price," says Whilden, a 57-year-old homemaker. "But if you can cut out the commission, you can drop it $30,000 and still get what you were going to get in the first place, after the commission."

    It's always 'OPEN HOUSE' as real estate goes online, UT, 7.5.2006, http://www.usatoday.com/tech/news/2006-05-07-real-estate-online_x.htm

 

 

 

 

 

Napster's back to basics: Free tunes

 

Posted 5/1/2006 12:01 AM ET
USA TODAY
By Jefferson Graham

 

LOS ANGELES — All the songs on Napster are free again.

In a bid to gain traction against Apple's dominant iTunes online music store, Napster over the weekend shifted to an advertising-supported model. Visitors can listen to any of the 2 million tunes in its catalog without having to fork over a credit card or download the Napster software application.

But there is a catch. You can only listen to a song five times. After that, you have to either buy it for 99 cents or sign up for a monthly subscription.

Still, "This is the closest we have ever come to the original vision of the Napster service that swept the world in 1999 — except now, it's legal," says Napster CEO Chris Gorog.

Napster has 600,000 subscribers. It offers unlimited online listening to songs for $9.95 a month, or $14.95 for a version that lets you transfer songs to certain portable devices.

The service is compatible with digital music devices that include the SanDisk Sansa and Samsung Z10, but not Apple's iconic iPod, which has a 77.6% market share, according to researcher NPD Group.

Napster, the original unauthorized music-swapping site, was born in a college dorm before the record labels persuaded the courts to shut it down. The new Napster, launched in 2003, has lost more than $73 million over the last two years, according to equity firm American Technology Research.

The company, now based in Los Angeles, spent heavily in 2005 on an advertising campaign that included a Super Bowl ad. That helped increase sales "by 100%," Gorog says.

Now Gorog says the boom in online advertising can pay off for Napster, which averages 2 million visitors a month to its website. Walt Disney and Guitar Center have signed up as sponsors; more will be announced this week.

"Napster clearly had to find something different," says American Technology Research analyst P.J. McNealy. "But until the device market for non-iPods picks up, Napster faces an uphill battle."

To pull off the ad-supported music model, Gorog needed the approval of the record labels, which will get a cut of the ad revenue.

"Ad-supported music is something we've been encouraging all the services to try," says Larry Kenswil, president of Universal Music's eLabs unit.

Napster competes with RealNetworks' Rhapsody service, among others. Rhapsody also has a free preview, letting users sample 25 songs a month at no charge. Real says it has 1.4 million subscribers for its music properties.

David Card, an analyst at JupiterResearch, says Napster's ad-supported model gives users a better feel for the service and will encourage them to become subscribers. "It's a really good offering," he says.

Napster hasn't found more acceptance from its subscription model "because it requires explanation and a change in consumer behavior," he says. "This promotion will help people understand subscriptions."

    Napster's back to basics: Free tunes, UT, 1.5.2006, http://www.usatoday.com/tech/products/services/2006-04-30-napster-free_x.htm

 

 

 

 

 

New Microsoft Browser Raises Google's Hackles

 

May 1, 2006
The New York Times
By STEVE LOHR

 

With a $10 billion advertising market at stake, Google, the fast-rising Internet star, is raising objections to the way that it says Microsoft, the incumbent powerhouse of computing, is wielding control over Internet searching in its new Web browser.

Google, which only recently began beefing up its lobbying efforts in Washington, says it expressed concerns about competition in the Web search business in recent talks with the Justice Department and the European Commission, both of which have brought previous antitrust actions against Microsoft.

The new browser includes a search box in the upper-right corner that is typically set up to send users to Microsoft's MSN search service. Google contends that this puts Microsoft in a position to unfairly grab Web traffic and advertising dollars from its competitors.

The move, Google claims, limits consumer choice and is reminiscent of the tactics that got Microsoft into antitrust trouble in the late 1990's.

"The market favors open choice for search, and companies should compete for users based on the quality of their search services," said Marissa Mayer, the vice president for search products at Google. "We don't think it's right for Microsoft to just set the default to MSN. We believe users should choose."

Microsoft replies that Google is misreading its intentions and actions. It says the default settings in the browser, Internet Explorer 7, are easy to change. And it says the product was designed with consumers and many partners in mind — even though it might not be to the liking of Google, the leading search engine.

"Whatever behavior happened in the past, the guiding principle we had is that the user is in control," said Dean Hachamovitch, general manager of the Internet Explorer group.

Companies often talk with antitrust officials, and the talks do not imply that an investigation is imminent. But they do indicate that Google is pursuing every option in its escalating rivalry with Microsoft, which has already led to some public battles.

Last December, Google outbid Microsoft to remain the primary search service on America Online, paying $1 billion and taking a 5 percent stake in AOL. Last year, Microsoft sued Google to stop a star computer scientist and manager at Microsoft, Kai-Fu Lee, from working on search technology at Google. The suit was settled, and Mr. Lee runs Google's operations in China.

The browser that set off the latest dispute has been in development for some time, but Microsoft first made it available to the public for downloading last week in a test version. It is the first new release of Microsoft's browser in five years. A final version is expected to be released this summer and will be included in Microsoft's new operating system, Windows Vista, which is scheduled for release next January.

The focus of Google's concern is a slender box in the corner of the browser window that allows users to start a search directly instead of first going to the Web site of a search engine like Google, Yahoo or MSN. Typing a query and hitting "Enter" immediately brings up a page of results from a designated search engine.

That slice of on-screen real estate has the potential to be enormously valuable, and Microsoft is the landlord. Internet Explorer 7 is the first Microsoft browser to have a built-in search box, while other browsers like Firefox, Opera and Safari have had them for some time. Google estimates that the boxes, when available, are the starting point for 30 to 50 percent of a user's searches, making them a crucial gateway to the lucrative and fast-growing market for advertisements that appear next to search results.

Microsoft has lost some ground in the browser market in the last year, mainly to Firefox, which is a Google ally. But Microsoft still holds more than 80 percent of the market. And Internet Explorer 7 is expected to be extremely popular because it is an improvement over Microsoft's previous browser, and because Microsoft will promote downloads of it and include it in Windows Vista.

That gives Microsoft the potential to use the browser to steer substantial traffic, and business, to MSN and away from rivals. MSN handled 11 percent of searches in the United States in March, down slightly from a year earlier, according to Nielsen/Net Ratings, a market research firm. That put it well behind Google, which had a 49 percent share, and Yahoo, with 22 percent.

Microsoft insists it has no intention of deploying its browser as a weapon in the search wars. But Google suspects otherwise.

In meetings beginning last year, Google told Microsoft of its objections to the company's plans to set MSN as the default search engine in Internet Explorer 7, according to Ms. Mayer of Google. Yahoo raised similar objections in a meeting with Microsoft last year, according to a Yahoo employee who was briefed on the conversation. Yahoo declined to comment last week beyond a statement: "We would be concerned about any company's attempts to limit user choice or change user preferences without their knowledge, and believe others would share that concern."

With its objections unresolved, Google took the matter to antitrust authorities in Europe and the United States during the last month. It is not clear what, if anything, will come of the talks or how far Google is willing to push the issue.

In Europe, where Microsoft is challenging an antitrust decision against the company for its past behavior, the European Commission has already made inquiries about Microsoft's plans for Vista. Though it is now distributing Internet Explorer 7 separately, Microsoft has long maintained that its browser is part of its Windows operating system.

Google has informed the European antitrust authorities of its worry that "Microsoft's approach to setting search defaults in Internet Explorer 7 benefits Microsoft while taking away choice from users," said Steve Langdon, a spokesman for Google.

Google would not say specifically what it has discussed with American antitrust officials. "We have spoken to the Justice Department generally about our business and the importance of preserving competition in the search market," Mr. Langdon said.

A Justice Department spokeswoman declined to comment.

The best way to handle the search box, Google asserts, would be to give users a choice when they first start up Internet Explorer 7. It says that could be done by asking the user to either type in the name of their favorite search engine or choose from a handful of the most popular services, using a simple drop-down menu next to the search box.

The Firefox and Opera browsers come with Google set as the default, but Ms. Mayer said Google would support unfettered choice on those as well.

Microsoft replies that giving users an open-ended choice could add complexity and confusion to the browser set-up process, while offering a few options would be arbitrarily limiting.

Instead, those wanting to pick a new search-box option in the new browser need to click through a menu with options like "Get Search Providers," which links to a Web page with six search engines including Google and 16 "topic search" sites, from Amazon to MTV to Wal-Mart.

Mr. Hachamovitch, who led Microsoft's browser team, said MSN was not always the default search in Internet Explorer 7. When downloaded, the new browser inherits the settings from the old Microsoft browser, version 6. But the search default in that program was based on a feature called AutoSearch that Google says was not widely used.

Mr. Hachamovitch said Microsoft's user research and early reviews indicate that it is easy to change the default setting. "People seem to be O.K. with what we're doing," he said.

Google counters that claim with a study it sponsored that was conducted by Tec-Ed, a research firm. It found that only a third of users could master the four-click process to change the default.

Whether Microsoft's treatment of the search box will have an impact on the search market is uncertain. From an antitrust perspective, harm to competition is the litmus test, not just swinging a sharp elbow or two. There are many ways people get to search engines other than through a search box — for example, by typing google.com in the browser or making it their home page.

"Assume that everything Google says is true; the question then is whether Microsoft's conduct is really going to have a serious effect on Google," said Andrew I. Gavil, a law professor at Howard University. "Obviously, Google thinks that it will."

Google is now a rich, powerful company in its own right, far larger than the browser pioneer Netscape Communications was when Microsoft set out to dominate the market it had created in the 1990's. In 2001, after a lengthy trial, a federal appeals court held that Microsoft had repeatedly violated antitrust laws as it tried to stifle the challenge from Netscape. Later, Microsoft reached a settlement with the Justice Department that freed personal computer makers from some restrictions Microsoft had placed on their use of software and services that compete with its own products.

When Internet Explorer 7 begins to be loaded on new machines next year, computer makers like Dell and Hewlett-Packard will be free to determine what search engines and other sites they feature in the browser's Web guide and search box.

That promises to be valuable screen real estate indeed, especially the coveted spot as the preferred search engine, which the computer makers are likely to sell to the highest bidder. Google and Yahoo have deep pockets, but no one can match Microsoft's spending power. "People will be bidding aggressively to get in that space," said Mr. Hachamovitch of Microsoft. "And that's a good thing."

John Markoff contributed reporting for this article.

    New Microsoft Browser Raises Google's Hackles, NYT, 1.5.2006, http://www.nytimes.com/2006/05/01/technology/01google.html

 

 

 

 

 

Web Sites Set Up to Celebrate Life Recall Lives Lost

 

April 27, 2006
The New York Times
By WARREN ST. JOHN

 

Like many other 23-year-olds, Deborah Lee Walker loved the beach, discovering bands, making new friends and keeping up with old ones, often through the social networking site MySpace.com, where she listed her heroes as "my family, and anyone serving in the military — thank you!"

So only hours after she died in an automobile accident near Valdosta, Ga., early on the morning of Feb. 27, her father, John Walker, logged onto her MySpace page with the intention of alerting her many friends to the news. To his surprise, there were already 20 to 30 comments on the page lamenting his daughter's death. Eight weeks later, the comments are still coming.

"Hey Lee! It's been a LONG time," a friend named Stacey wrote recently. "I know that you will be able to read this from Heaven, where I'm sure you are in charge of the parties. Please rest in peace and know that it will never be the same here without you!"

Just as the Web has changed long-established rituals of romance and socializing, personal Web pages on social networking sites that include MySpace, Xanga.com and Facebook.com are altering the rituals of mourning. Such sites have enrolled millions of users in recent years, especially the young, who use them to expand their personal connections and to tell the wider world about their lives.

Inevitably, some of these young people have died — prematurely, in accidents, suicides, murders and from medical problems — and as a result, many of their personal Web pages have suddenly changed from lighthearted daily dairies about bands or last night's parties into online shrines where grief is shared in real time.

The pages offer often wrenching views of young lives interrupted, and in the process have created a dilemma for bereaved parents, who find themselves torn between the comfort derived from having access to their children's private lives and staying in contact with their friends, and the unease of grieving in a public forum witnessed by anyone, including the ill-intentioned.

"The upside is definitely that we still have some connection with her and her friends," said Bob Shorkey, a graphic artist in North Carolina whose 24-year-old stepdaughter, Katie Knudson, was killed on Feb. 23 in a drive-by shooting in Fort Myers, Fla. "But because it's public, your life is opened up to everyone out there, and that's definitely the downside."

It's impossible to know how many people with pages on social networking sites have died; 74 million people have registered with MySpace alone, according to the company, which said it does not delete pages for inactivity. But a glib and sometimes macabre site called MyDeathSpace.com has documented at least 116 people with profiles on MySpace who have died. There are additions to the list nearly every day.

Last Thursday, for example, a 17-year-old from Vancouver, Wash., named Anna Svidersky was stabbed to death while working at a McDonald's there. As word of the crime spread among her extended network of friends on MySpace, her page was filled with posts from distraught friends and affected strangers. A separate page set up by Ms. Svidersky's friends after her death received about 1,200 comments in its first three days.

"Anna, you were a great girl and someone very special," one person wrote. "I enjoyed having you at our shows and running into you at the mall. You will be missed greatly ... rest in peace."

Tom Anderson, the president of MySpace, said in an e-mail message that out of concern for privacy, the company did not allow people to assume control of the MySpace accounts of users after their deaths.

"MySpace handles each incident on a case-by-case basis when notified, and will work with families to respect their wishes," Mr. Anderson wrote, adding that at the request of survivors the company would take down pages of deceased users.

Friends of MySpace users who have died said they had been comforted by the messages left by others and by the belief or hope that their dead friends might somehow be reading from another realm. And indeed many of the posts are written as though the recipient were still alive.

"I still believe that even though she's not the one on her MySpace page, that's a way I can reach out to her," said Jenna Finke, 23, a close friend of Ms. Walker, the young woman who died in Georgia. "Her really close friends go on there every day. It means a lot to know people aren't forgetting about her."

More formal online obituary services have been available for a number of years. An Illinois company called Legacy.com has deals with many newspapers, including The New York Times, to create online guest books for obituaries the papers publish on the Web, and offers multimedia memorials called Living Tributes starting at $29. But Web pages on social networking sites are more personal, the online equivalent of someone's room, and maintaining them has its complications. Some are frustratingly mundane.

Amanda Presswood, whose 23-year-old friend Michael Olsen was killed in a fire in Galesburg, Ill., on Jan. 23, said none of his friends or family members knew or could guess the password to his MySpace account, which he signed onto the day before he died. That made it impossible to accept some new messages.

"There's a lot of pictures on there that people haven't seen," Ms. Presswood said. "His parents have been coming to me for help because they know I know about the Internet. They even asked if I could hack it so I could keep the page going."

The Walkers correctly guessed the password to their daughter's page, and used it to alert her friends to details of her memorial service. They also used it to access photographs and stories about their daughter they had missed out on.

"It's a little weird to say as a parent, but the site has been a source for us to get to know her better," Mr. Walker said. "We didn't understand the breadth and scope of the network she had built as an individual, and we got to see that through MySpace. It helped us to understand the impact she's had on other people."

At the same time, Ms. Walker's mother, Julie, wrote in an e-mail message, the family was overwhelmed by unsolicited e-mail messages from strangers offering platitudes and seeking to advise them on how to handle their grief. The family found such offerings unwelcome, however well intentioned.

"The grief of our own friends and family is almost more than we can bear on top of our own, and we don't need anyone else's on our shoulders," Mrs. Walker wrote.

Mr. Shorkey said he and his wife remained in touch with their daughter's friends through MySpace. And they visit her Web page daily.

"Some days it makes me feel she's still there," he said. "And some days it reminds me I can never have that contact again."

    Web Sites Set Up to Celebrate Life Recall Lives Lost, NYT, 27.4.2006, http://www.nytimes.com/2006/04/27/technology/27myspace.html?hp&ex=1146196800&en=084b178f05f18bd0&ei=5094&partner=homepage

 

 

 

 

 

Malicious-software spreaders get sneakier, more prevalent

 

Posted 4/23/2006 10:25 PM ET
USA TODAY
By Byron Acohido and Jon Swartz

 

SEATTLE — At the height of his powers, Jeanson James Ancheta felt unstoppable.

From his home in Downey, Calif., the then-19-year-old high school dropout controlled thousands of compromised PCs, or "bots," that helped him earn enough cash in 2004 and 2005 to drive a souped-up 1993 BMW and spend $600 a week on new clothes and car parts.

He once bragged to a protιgι that hacking Internet-connected PCs was "easy, like slicing cheese," court records show.

But Ancheta got caught. In the first case of its kind, he pleaded guilty in January to federal charges of hijacking hundreds of thousands of computers and selling access to others to spread spam and launch Web attacks.

In separate cases, federal authorities last August also assisted in the arrest of Farid Essebar, 18, of Morocco, and last month indicted Christopher Maxwell, 19, of Vacaville, Calif., on suspicion of similar activities.

The arrests underscore an ominous shift in the struggle to keep the Internet secure: Cybercrime undergirded by networks of bots — PCs infected with malicious software that allows them to be controlled by an attacker — is soaring.

Without you realizing it, attackers are secretly trying to penetrate your PC to tap small bits of computing power to do evil things. They've already compromised some 47 million PC's sitting in living rooms, in your kids' bedrooms, even on the desk in your office.

Bot networks have become so ubiquitous that they've also given rise to a new breed of low-level bot masters, typified by Ancheta, Essebar and Maxwell.

Tim Cranton, director of Microsoft's Internet Safety Enforcement Team, calls bot networks "the tool of choice for those intent on using the Internet to carry out crimes."

Budding cyberthieves use basic programs and generally stick to quick-cash schemes. Brazen and inexperienced, they can inadvertently cause chaos: Essebar is facing prosecution in Morocco on charges of releasing the Zotob worm that crippled systems in banks and media companies around the world; Maxwell awaits a May 15 trial for allegedly spreading bots that disrupted operations at Seattle's Northwest Hospital.

More elite bot herders, who partner with crime groups to supply computer power for data theft and other cyberfraud, have proved to be highly elusive. But the neophytes tend to be sloppy about hiding their tracks. The investigations leading to the arrests of Ancheta, Essebar and Maxwell have given authorities their most detailed look yet at how bots enable cybercrime.

Estimating the number of bots is difficult, but top researchers who participate in meetings of high-tech's Messaging Anti-Abuse Working Group often use a 7% infection rate as a discussion point. That means as many as 47 million of the 681 million PCs connected to the Internet worldwide may be under the control of a bot network.

Security giant McAfee detected 28,000 distinct bot networks active last year, more than triple the amount in 2004. And a February survey of 123 tech executives, conducted by security firm nCircle, pegged annual losses to U.S. businesses because of computer-related crimes at $197 billion.

Law enforcement officials say the ground floor is populated by perhaps hundreds of bot herders, most of them young men. Mostly, they assemble networks of compromised PCs to make quick cash by spreading adware — those pop-up advertisements for banking, dating, porn and gambling websites that clutter the Internet. They get paid for installing adware on each PC they infect.

"The low-level guys ... can inflict a lot of collateral damage," says Steve Martinez, deputy assistant director of the FBI's Cyber Division.

Ancheta and his attorney declined to be interviewed, and efforts to reach Essebar with help from the FBI were unsuccessful. Steven Bauer, Maxwell's attorney, said his client was a "fairly small player" who began spreading bots "almost as a youthful prank."

The stories of these three young men, pieced together from court records and interviews with regulators, security experts and independent investigators, illustrate the mind-set of the growing fraternity of hackers and cyberthieves born after 1985. They also provide a glimpse of Cybercrime Inc.'s most versatile and profitable tool.

 

Ancheta: Trading candy

School records show that Ancheta transferred out of Downey High School, in a suburb near Los Angeles, in December 2001 and later attended an alternative program for students with academic or behavioral problems. Eventually, he earned a high school equivalency certificate. Ancheta worked at an Internet cafe and expressed an interest in joining the military reserves, his aunt, Sharon Gregorio, told the Associated Press.

Instead, in June 2004, court records show, he discovered rxbot, a potent — but quite common — computer worm, malicious computer code designed to spread widely across the Internet.

Ancheta likely gravitated to it because it is easy to customize, says Nicholas Albright, founder of Shadowserver.org, a watchdog group. Novices often start by tweaking worms and trading bots. "I see high school kids doing it all the time," says Albright. "They trade bot nets like candy."

Ancheta proved more enterprising than most. He infected thousands of PCs and started a business — #botz4sale — on a private Internet chat area. From June to September 2004, he made about $3,000 on more than 30 sales of up to 10,000 bots at a time, according to court records.

By late 2004, he started a new venture, court records show. He signed up with two Internet marketing companies, LoudCash of Bellevue, Wash., and GammaCash Entertainment of Montreal, to distribute ads on commission.

But instead of setting up a website and asking visitors for permission to install ads — a common, legal practice — he used his bots to install adware on vulnerable Internet-connected PCs, court records show. Typically, payment for each piece of adware installed ranges from 20 cents to 70 cents.

Working at home, Ancheta nurtured his growing bot empire during a workday that usually began shortly after 1 p.m. and stretched non-stop until 5 a.m., a source with direct knowledge of the case says. He hired an assistant, an admiring juvenile from Boca Raton, Fla., nicknamed SoBe, court records show. Chatting via AOL's free instant-messaging service, Ancheta taught him how to spread PC infections and manage adware installations.

Checks ranging as high as $7,996 began rolling in from the two marketing firms. In six months, Ancheta and his helper pulled in nearly $60,000, court records show.

During one online chat with SoBe about installing adware, Ancheta, who awaits sentencing May 1, advised his helper: "It's immoral, but the money makes it right."

Sean Sundwall, a spokesman for Bellevue, Wash.-based 180solutions, LoudCash's parent company, said Ancheta distributed its adware in only a small number of incidents listed in the indictment. GammaCash had no comment.

 

Maxwell: Infecting a hospital

At about the same time — in early 2005 — Christopher Maxwell and two co-conspirators were allegedly hitting their stride running a similar operation. From his parents' home in Vacaville, Calif., Maxwell, then an 18-year-old community college student, conspired with two minors in other states to spread bots and install adware, earning $100,000 from July 2004 to July 2005, according to a federal indictment.

They ran into a problem in January 2005 when a copy of the bot they were using inadvertently found its way onto a vulnerable PC at Seattle's Northwest Hospital. Once inside the hospital's network, it swiftly infected 150 of the hospital's 1,100 PCs and would have compromised many more. But the simultaneous scanning of 150 PCs looking for other machines to infect overwhelmed the local network, according to an account in court records.

Computers in the intensive care unit shut down. Lab tests and administrative tasks were interrupted, forcing the hospital into manual procedures.

Over the next few months, special agent David Farquhar, a member of the FBI's Northwest Cyber Crime Task Force, traced the infection to a NetZero Internet account using a phone number at Maxwell's parents' home, leading to Maxwell's indictment on Feb. 9. He pleaded not guilty.

 

Essebar: Birth of a worm

As authorities closed in on Ancheta and Maxwell last summer, 18-year-old Farid Essebar was allegedly just getting started in the bots marketplace. The FBI says the skinny, Russian-born resident of Morocco operated under the nickname Diabl0 (pronounced Diablo but spelled with a zero). Diabl0 began attracting notice as one of many copycat hackers tweaking the ubiquitous Mytob e-mail worm. E-mail worms compromise a PC in much the same way as a bot, but the victim must help, by clicking on an e-mail attachment to start the infection.

Diabl0 created a very distinctive version of Mytob designed to lower the security settings on infected PCs, install adware and report back to Diabl0 for more instructions. Last June, David Taylor, an information security specialist at the University of Pennsylvania, spotted Diabl0 on the Internet as he was about to issue such instructions. Taylor engaged the hacker in a text chat.

Diabl0 boasted about using Mytob to get paid for installing adware. "I really thought that he was immature," Taylor recalls. "He was asking me what did I think about his new bot, with all these smiley faces. Maybe he didn't realize what he was doing was so bad."

In early August, Diabl0 capitalized on a golden opportunity when Microsoft issued its monthly set of patches for newly discovered security holes in Windows. As usual, independent researchers immediately began to analyze the patches as part of a process to develop better security tools. Cybercrooks closely monitor the public websites where results of this kind of research get posted.

Diabl0 latched onto one of the test tools and turned it into a self-propagating worm, dubbed Zotob, says Charles Renert,director of research at security firm Determina. Much like Mytob, Zotob prepared the infected PC to receive adware. But Zotob did one better: It could sweep across the Internet, infecting PCs with no user action required.

Diabl0 designed Zotob to quietly seek out certain Windows computer servers equipped with the latest compilation of upgrades, called a service pack. But he failed to account for thousands of Windows servers still running outdated service packs, says Peter Allor, director of intelligence at Internet Security Systems.

By the start of the next workweek, Zotob variants began snaking into older servers at the Canadian bank CIBC, and at ABC News, The New York Times and CNN. The servers began rebooting repeatedly, disrupting business and drawing serious attention to the new worm. "Zotob had a quality-assurance problem," says Allor. Diabl0 had neglected to ensure Zotob would run smoothly on servers running the earlier service packs, he says.

Within two weeks, Microsoft's Internet Safety Enforcement Team, a group of 65 investigators, paralegals and lawyers, identified Essebar as Diabl0 and pinpointed his base of operations. Microsoft's team also flushed out a suspected accomplice, Atilla Ekici, 21, nicknamed Coder.

Microsoft alerted the FBI, which led to the Aug. 25 arrests by local authorities of Essebar in Morocco and Ekici in Turkey.

The FBI holds evidence that Ekici paid Essebar with stolen credit card numbers to create the Mytob variants and Zotob, Louis Reigel, assistant director of the FBI's Cyber Division told reporters.

While Ancheta operated as a sole proprietor, and Maxwell was part of a three-man shop, Essebar and Ekici functioned more like freelancers, says Allor. They appeared to be part of a loose "confederation of folks who have unique abilities," says Allor.

"They come together with others who have unique abilities, and from time to time they switch off who they work with."

Despite their notoriety, Essebar, Ancheta and Maxwell represent mere flickers in the Internet underworld. More elite hackers collaborating with organized crime groups take pains to cover their tracks — and rarely get caught.

"Those toward the lower levels of this strata are the ones that tend to get noticed and arrested pretty quickly," says Martin Overton, a security specialist at IBM.

Acohido reported from Seattle, Swartz from San Francisco.

 

 

______

 

 

SOME 'SCRIPT KIDDIES' GET MORE ATTENTION THAN OTHERS

 

SAN FRANCISCO — It used to be that kids collected comic books and baseball cards. In the digital age, some youngsters amuse themselves by seeing how many Internet-connected computers they can infect for fun or profit.

Known as "script kiddies," these young people typically have no formal training. But they are comfortable at a keyboard and adept at self-learning. Noodling at their computers while munching on junk food, they search out and tweak malicious computer code, called scripts, created by others, according to computer-security experts and law enforcement officials involved in the prosecution of teenage hackers.

Instead of riding bikes or playing ball, script kiddies immerse themselves in a digital world steeped in an ethic that holds all things in cyberspace to be fair game for clever manipulation.

Most seek kudos from peers who admire those who can infect the most PCs. But from there it's a small step to rationalize using hacking skills to make a quick buck.

"We talk about safe sex, avoiding drugs and alcohol. But we don't talk about computer ethics," says Paul Luehr, a former federal computer-crimes prosecutor.

Script kiddies who rose above their peers to earn wider infamy include:

Kim Vanvaeck, 19 when arrested in 2004. The Belgian female, author of a computer virus that scrambled MP3 files and caused quotes from TV's Buffy the Vampire Slayer to pop up on PC screens, was arrested outside Brusselsand charged with computer data sabotage. The case was dropped.

Vanvaeck began tweaking viruses at 14 but maintained she never actually released any of her creations on the Web. "When people make guns, can you blame them when somebody else kills with them?" she told TechTV.com in a 2002 interview. "I only write them. I don't release them."

Sven Jaschan, 17 when arrested in 2004. The German author of the Sasser worm, which caused millions of Windows-based PCs to crash and reboot, was sentenced to 21 months of probation.

He received only 30 hours of community service and was later hired as a consultant at a computer-security company, Securepoint, in Germany.

Jaschan started writing computer viruses in early 2004 after he learned about the MyDoome-mail virus and how it had infected millions of Windows-based PCs.

Working in the basement with his stepfather, a PC repairman, the precocious Jaschan wrote the Netsky e-mail virus, which cleaned up MyDoom infections but was itself invasive, according to a 2004 interview Jaschan did with Germany'sStern magazine.

Jaschan progressed to creating the destructive Sasser worm, which spread much faster than Netsky because it required no action by the PC user.

Jeffrey Lee "Teekid" Parson, 18 when arrested in 2003. A high school senior from Hopkins, Minn., Parson was one of many copycat hackers who tweaked the invasive MSBlaster worm in 2003. His version infected 48,000 PCs and caused $1.2 million in damage, prosecutors said.

But Parson failed to cover his tracks well. A link in his coding pointed to a website where he stored other viruses alongside lyrics to his favorite songs by Judas Priest and Megadeth.

U.S. District Judge Marsha Pechman, who sentenced Parson in January 2005, said Parson was a lonely teenager who holed up in his room and created his "own reality."

Parson is currently serving an 18-month sentence in Duluth (Minn.) Federal Prison Camp. His projected release is Aug. 14. His attorney, Nancy Tenney, describes him as shy and said he declined an interview.

Parson was the only hacker arrested in connection with MSBlaster, which infected more than 20 million PCs.

By Jon Swartz and Byron Acohido, USA TODAY




WHAT BOTS DO

Infected PCs that await commands, bots are being used for:

Spamming. Bots deliver 70% of nuisance e-mail ads.

Phishing. Bots push out e-mail scams that lure victims into divulging log-ons and passwords.

Denial-of-service attacks. Bots flood targeted websites with nuisance requests, shutting them down. To stop such attacks, website operators are coerced into making extortion payments.

Self-propagation. Bots scour the Internet for other PCs to infect; they implant password breakers and packet sniffers that continually probe for routes to drill deeper into corporate systems.

Direct theft. Bots implant keystroke loggers and man-in-the-middle programs that record when the PC user types in account log-on information, then transmit the data back to the bot master.

    Malicious-software spreaders get sneakier, more prevalent, NYT, 24.4.2006, http://www.usatoday.com/tech/news/computersecurity/infotheft/2006-04-23-bot-herders_x.htm

 

 

 

 

 

Google Posts 60% Gain in Earnings

 

April 21, 2006
The New York Times
By SAUL HANSELL

 

Google returned to favor among investors yesterday as its profit for the first quarter increased 60 percent, well above expectations.

Three months ago, the company disappointed investors, even though its profit grew 82 percent, and its stock sagged. This time, Google's ascent was enough to satisfy.

"Investors, surprisingly, acted rationally this quarter and had low expectations," said Safa Rashtchy, an analyst at Piper Jaffray & Company. Google's stock rose about 8 percent in after-hours trading after the announcement, recouping its losses since the last earnings report.

Pointing to particulars behind its successful quarter, the company said its share of the search market continued to grow around the world, as did the money it earned from advertising for each search result displayed.

Eric E. Schmidt, Google's chief executive, said the market share increase might be related to the use of some of the company's new products, like Google Video, Google Earth and Google Maps, as well as the introduction of Google News in several countries.

These services attract people to Google's site, where they may also conduct searches, he said in an interview. "All of a sudden Google is top of mind again, over and over again."

Google continued to make substantial capital investments, mainly in computer servers, networking equipment and space for its data centers. It spent $345 million on these items in the first quarter, more than double the level of last year. Yahoo, its closest rival, spent $142 million on capital expenses in the first quarter.

Google has an enormous volume of Web site information, video and e-mail on its servers, Mr. Schmidt said. "Those machines are full. We have a huge machine crisis."

Jordan Rohan, an analyst for RBC Capital Markets, called Google's capital spending "unfathomably high," noting that it spent the same percentage of its revenue on equipment as a company in the telephone business, an industry traditionally seen as far more capital-intensive than the Internet.

He said investors would tolerate this high spending level as long as Google's results continued to be so strong.

"If Google's market share continues to increase, and its position as the central hub of the Internet is reinforced, an extra $1 billion is a worthwhile investment," Mr. Rohan said. "The day market share peaks, we have a problem."

Investors saw little problem in the latest numbers. Google earned $592 million in the first quarter, compared with $369 million in the year-earlier period.

Excluding charges for stock-based compensation and payments to the plaintiffs' lawyers in the settlement of a class-action lawsuit, earnings were $2.29 a share, well ahead of the $1.97 that analysts had anticipated.

Gross revenue was $2.25 billion, up 79 percent. Analysts prefer to look at Google's revenue after deducting the payments it makes to services like America Online, which display its advertisements and keep most of the money from them. Using this measure, Google's revenue was $1.53 billion, compared with the $1.44 billion that analysts had estimated.

The company's stock, which ended regular trading at $415, up $4.50, rose after hours to $448.31 It reached a high of $475.11 in January and was at $432.66 before its last earnings report, then fell back as far as $337.06 in March.

Google saw faster growth on the Web sites it owns, which are far more profitable because it does not have to share advertising money. Google's sites posted revenue of $1.3 billion, up 97 percent.

Revenue from partner sites was $928 million, up 59 percent. Google kept 22 percent of the revenue for ads shown on partner sites, compared with 21 percent a year ago.

Revenue is growing faster overseas. Revenue from outside the United States was 42 percent of total revenue, compared with 39 percent a year ago. The company said that it noted particular growth in Britain, France and elsewhere in Northern Europe.

Mr. Rohan said that in the first quarter, Google's search revenue in the United States grew 10 percent from the fourth quarter of 2005, about the same growth as Yahoo. Google has long grown substantially faster than Yahoo, and it is still increasing its share of user searches, he said. That means Yahoo is starting to catch up on technology to generate more advertising revenue for each search, he said.

Google added $825 million to its cash hoard, giving it $8.4 billion in cash at the end of the quarter. In April, it raised another $2.1 billion by selling shares to the public and spent $1 billion to buy 5 percent of AOL.

The company also continued to hire at a breakneck pace. It added 1,110 workers in the quarter for a total of 6,790 full-time employees.

In a conference call with investors, Mr. Schmidt highlighted several areas for future growth.

One was advertising from local businesses on the company's main search service, as well on its local search and maps products. The delivery of such advertising is based on an inference of the user's location from the search query or Internet protocol address.

"Locally targeted ads are an increasingly meaningful contributor to revenue, and much more is coming," Mr. Schmidt told the investors.

Mr. Rashtchy, the Piper Jaffray analyst, estimated that 10 percent of Google's advertising was local.

Mr. Schmidt also said the company saw great opportunity in developing services for mobile phones. It has developed a system called a transcoder that will reformat Web pages for display on the small screens of cellphones.

The company has started delivering advertising on its mobile service in Japan and it is negotiating with wireless carriers to put advertising on its services in other countries as well, Mr. Schmidt said in an interview.

    Google Posts 60% Gain in Earnings, NYT, 21.4.2006, http://www.nytimes.com/2006/04/21/technology/21google.html

 

 

 

 

 

High hopes grow for big, new wireless networks

 

Posted 4/20/2006 9:35 PM ET
USA TODAY
By Michelle Kessler

 

SAN FRANCISCO — Officials in San Francisco have high hopes for the giant wireless Internet network that soon will span this hilly city.
Mayor Gavin Newsom has said that the Wi-Fi network, being built through a partnership with Internet service provider EarthLink and search giant Google, will help eliminate the "digital divide" by providing free Web access to nearly every home and business.

Residents who already have high-speed Internet access at home may benefit, too, by using the free service to connect when they're out at a local park, friend's house or anywhere else around town. Visitors will find it easier to do business in the city, because they can always hop online to check their e-mail.

The service will make San Francisco more connected to the global economy — and a better place to live, work and visit, Newsom said when announcing the deal.

Philadelphia; Portland, Ore.; and Anaheim, Calif., each have similar plans for big Wi-Fi networks.

Yet all it takes is a look back at Wi-Fi's pioneers to discover that big wireless Internet projects often don't live up to lofty expectations.

That doesn't necessarily mean they're failures. Indeed, many become useful in unexpected ways.

Take Pittsburgh. In 2003, the Pittsburgh Cultural Trust, a civic group, unveiled an ambitious plan to help revive the city's struggling downtown by building a Wi-Fi network there with Internet service provider Telerama Internet.

But the flood of businessmen and women, students and other Wi-Fi users never appeared. Today, there are only about six public Wi-Fi hotspots, or antennas, in the downtown area, says Robert Pell, Telerama's director of operations. (A hotspot usually provides coverage to a single building or, if outdoors, a city block.)

The main hotspot — in the Benedum Center for the Performing Arts — is used mainly by theater workers, says Veronica Corpuz, spokeswoman for the Cultural Trust.

That wasn't the original plan, but Wi-Fi has become a crucial tool, Corpuz says. Workers can now access the Web from deep inside the theater — making it easier to set up and take down shows, she says.

It's a typical tale. The tech industry is notorious for overhyping new technologies, and Wi-Fi received more than its share, says wireless analyst Phillip Redman at researcher Gartner.

The vision of Wi-Fi as a tool for businesses and a limited number of tech-savvy consumers "has really come true," he says. "But if you think about things like Wi-Fi services, public hotspots, Wi-Fi taking over the cellular (phone) world ... it's been a letdown," he says.

 

Rushing in

Wi-Fi made its public debut during the tough period after the dot-com bust of 2001. Tech companies were desperate for something — anything — that would drive business. Wi-Fi, with its promise of anywhere, anytime Internet connectivity, seemed the catalyst the industry craved.

Giants such as Intel and IBM plunged millions into Wi-Fi projects. Dozens of start-ups, with goofy names such as Proxim Wireless, Joltage Networks and Boingo Wireless, popped up to enter the promising market. One young company, Tropos Networks, crowed in a 2003 press release, "Wi-Fi's real potential is true broadband wireless data access with anytime, anywhere availability in coverage areas similar to those of cellular telephone service."

Three years later, Wi-Fi still falls far short of those promises. Coverage is limited, and "We're still waiting for these large-scale deployments that everyone has been talking about," says wireless analyst Gemma Tedesco at researcher In-Stat.

Perhaps that's because early Wi-Fi deployments often did not work out as planned, she says.

•Firefighters, police and other officials in Nevada, Mo., are big fans of the town's Wi-Fi network, which helps them do their jobs while moving through the community of 8,600 people.

But that wasn't the reason the network was built in 2003. At the time, no traditional broadband, such as cable modem or digital subscriber line (DSL) service, was available in town. Officials built the Wi-Fi network, through a partnership with service provider NeighborLink Broadband, to provide access to citizens.

About a year later, SBC (now AT&T) began offering traditional broadband service. Nevada (pronounced Ne-vay-duh) won't release subscriber numbers, but City Manager Craig Hubler says it significantly cut into sales.

Still, the network remains popular enough that Nevada is currently retooling its offering to make it easier for small businesses in town to resell the service.

"It's really exciting for the community to have access to this technology," says Mayor Brian Leonard, who also teaches at the local high school and coaches the golf team.

•Incoming dentistry students at the University of Medicine and Dentistry of New Jersey receive a laptop as part of their tuition. Combined with the school's Wi-Fi network, it lets them access the Internet from almost anywhere on campus. When the network was installed in 2003, "Wireless was still a very new technology," says Dean Cecile Feldman. "Now we look at it as basic infrastructure we need to supply."

But crucial course material is stored directly on laptops, rather than just being placed on the Web, so students don't have to worry if their Internet connection drops or is slow, Feldman says. "There are speed issues," she says.

Furthermore, the school has turned off Wi-Fi access in some lecture halls, because "People were surfing the Internet instead of paying attention," she says.

 

Going mainstream

It takes time for any new technology — no matter how exciting — to go mainstream, Gartner's Redman says.

And Wi-Fi has a particularly long learning curve, because "Wireless is as much an art as a science," says wireless analyst Julie Ask at JupiterResearch.

A Wi-Fi signal can travel farther than a block under ideal conditions. But buildings, trees, cars and other wireless networks can interfere. Even emissions from microwave ovens and cordless phones can cause a Wi-Fi signal to go wrong. With so many variables, designing a Wi-Fi system is always part luck, Ask says.

Additionally, Wi-Fi can be tough for consumers to use. The Wi-Fi software on many laptops is packed with jargon-laden technical terms such as "WEP key" and "LAN settings." (Both terms refer to software settings that a consumer might need to tweak to connect to a Wi-Fi network.)

As these drawbacks have hindered Wi-Fi's growth, the industry has undergone painful changes. Many players have merged or gone out of business. One prominent failure was Cometa Networks, a onetime powerhouse backed by tech giants Intel, IBM and AT&T. Joltage, too, shut down, and Proxim was acquired by another company. (It still operates under the Proxim name.) Boingo is still in business.

By other measures, Wi-Fi has already been a success.

 

A shift to laptops

In June 2005, the number of laptops sold at U.S. retail stores surpassed for the first time the number of desktops sold, says researcher NPD. Laptops became more appealing once they could connect to the Internet outside the office, says tech analyst Stephen Baker at NPD.

Strong laptop sales in turn helped propel the overall PC industry to 15.5% growth in 2005, Gartner says.

Non-tech businesses are benefiting from Wi-Fi, too. Starbucks, which offers Wi-Fi from carrier T-Mobile in 90% of its U.S. stores, says the technology sells coffee. A typical Starbucks customer stays in the store for about 20 minutes, but most Wi-Fi users linger for more than an hour, says spokesman Nick Davis. And while Starbucks' business typically tapers off after 9 a.m., Wi-Fi users are keeping stores busy well into the afternoon, he says.

Early adopter Schlotzsky's deli has kept Wi-Fi in about 50 of its stores, despite a painful restructuring and corporate cutbacks. There, too, customers using Wi-Fi visit at non-peak hours and stay longer, says spokesman Rob Nylund. "And they often make an extra trip (to the counter) for dessert," he says.

 

Improvements ahead

Expect Wi-Fi to get even better as the technology improves.

The earliest commonly used Wi-Fi standard, known in the industry as 802.11b, transfers data at a maximum rate of 11 megabits per second. That's fast enough for basic Internet surfing but not for very-high-bandwidth media files.

Newer Wi-Fi standards, including 802.11g, can transfer data fast enough to stream a movie to a TV set without wires. New products are springing up to take advantage of the technology. Philips, Sharp and others have developed TVs that connect to media center PCs wirelessly, for example.

That's one reason Wi-Fi deployments remain popular. Even Pittsburgh is considering building another big downtown network.

Officials in Portland, Ore., are finally moving forward with a Wi-Fi network after talking about it since 2003, says Matt Lampe, the city's chief technical officer.

Newer Wi-Fi technologies will make the network speedier and more stable, Lampe says. And a more mature Wi-Fi industry will make it easier for the city to strike up partnerships. Officials are working through paperwork and finalizing deals. Lampe expects a pilot to be in place by late summer.

Lampe acknowledges that many early Wi-Fi projects didn't turn out as expected. But he's confident that his network will provide much-needed Internet access to small businesses, mobile professionals and even some homes.

"There's a lot of buzz, a lot of interest," he says. "We see a lot of potential."

    High hopes grow for big, new wireless networks, UT, 20.4.2006, http://www.usatoday.com/tech/wireless/2006-04-20-big-wi-fi-networks_x.htm

 

 

 

 

 

Attorney general describes online kid porn

 

Updated 4/20/2006 10:40 PM ET
USA Today

 

WASHINGTON (AP) — Attorney General Alberto Gonzales used strikingly graphic language Thursday to focus attention on online child pornography and said Internet services companies are not doing enough to combat the problem.

"It is graphic, but if we do not talk candidly, then it is easy for people to turn away and worry about other matters," Gonzales said in a speech at the National Center for Missing and Exploited Children in Alexandria, Va.

Acknowledging that his descriptions could make people uncomfortable, Gonzales said he wanted to make sure people knew what was going on.

"I have seen pictures of older men forcing naked young girls to have anal sex. There are videos on the Internet of very young daughters forced to have intercourse and oral sex with their fathers. Viewing this was shocking and it makes my stomach turn," said Gonzales, who was accompanied by his wife, Rebecca.

It was their second visit to the center, created in 1984 as a clearinghouse for information about missing and exploited children.

Ernie Allen, the center's president, said many Americans continue to hold mistaken impressions of the issue. "We hear all the time that this is really just adult porn, 20-year-olds in pigtails made to look like they're 15," Allen said. "This is about children being sexually victimized. They're young children and they're getting younger."

Without identifying companies, Gonzales said some investigations have been hampered by the failure of Internet service providers to retain certain records long enough to help authorities identify purveyors of child pornography. He did not propose a remedy Thursday.

But he did support tripling the criminal fines for companies that fail to report apparent violations of child pornography laws — to $150,000 for the first instance and $300,000 for subsequent failures.

The Justice Department has never written regulations establishing standards on how to report illegal activities or mandating how long records must be kept.

Kate Dean, director of the United States Internet Service Provider Association, said AOL, Earthlink, BellSouth, Verizon and other association members "currently have robust policies in place to ensure that law enforcement can obtain the information they need to prosecute child pornographers."

Dean said the companies would welcome a discussion with Gonzales on the issue.

The Internet companies last year made 34,939 reports to the missing children center, which forwards them to law enforcement authorities, said Michelle Collins, director of the center's exploited children unit.

Last week alone, there were 938 reports, Collins said.

"Several people a week are being arrested somewhere in the country because of information provided by an electronic service provider," she said.

The Justice Department was criticized recently by a victim of child pornography, who said investigators were acting too slowly on information he provided on 1,500 pedophiles. Justin Berry testified to Congress in early April that he starred in his own webcam child pornography business for five years.

"I believed that the government would protect the children being abused. I believed they would act quickly," Berry, now 19, told the House Energy and Commerce Committee. "I was wrong."

Gonzales and other officials have declined to discuss Berry's case and resulting investigations, but they have pointed to a threefold increase in federal prosecutions of child pornography and abuse cases nationally over the past decade.

    Attorney general describes online kid porn, UT, 20.4.2006, http://www.usatoday.com/news/washington/2006-04-20-gonzales-child-porn_x.htm

 

 

 

 

 

Suspected shooter found sex offenders' homes on website

 

Updated 4/18/2006 5:43 AM ET
USA TODAY
By Emily Bazar

 

The killings of two convicted child molesters in Maine prompted authorities to briefly remove the state's online sex-offender registry and revived concerns that such websites may encourage vigilante-style justice.

The Maine Sex Offender Registry's online search was taken down Sunday morning after two convicted sex offenders were shot and killed in their towns about 25 miles apart, said Stephen McCausland, spokesman for the Maine Department of Public Safety.

Stephen Marshall, identified by Maine State Police as the only suspect in the shooting, killed himself Sunday night as police boarded the bus he had taken to Boston.

Marshall had logged onto the site sometime before the two men were shot several times, McCausland said. While on the site, Marshall also sought information on 32 other sex offenders.

The site provides photos, names, ages, addresses and conviction histories of about 2,200 registered sex offenders in the state.

"In order to get an individual profile, you have to register," McCausland said. He said Marshall had signed up to get access to the data.

Joseph Gray, 57, of Milo, was shot about 3 a.m. Sunday while sitting on his living room couch. He was convicted in Massachusetts of sexually assaulting a child. About five hours later, William Elliott, 24, of Corinth, was killed when he answered the door. He was convicted of sexual abuse of a minor in Maine.

Marshall, a Canadian from Nova Scotia, had been visiting his father in Maine, McCausland said. Police identified him from a license plate spotted at the scene of the second shooting and traced him to Boston.

"There's no known connection between the three men," McCausland said. "We have a lot more questions than we have answers."

Maine restored its sex-offender website Monday afternoon.

Most states post their sexual-offender registries online, says Charles Onley, a research associate for the Center for Sex Offender Management, a project of the U.S. Department of Justice.

Early on, he says, critics of the online registries warned that readily available details about sex offenders could spur widespread vigilante-style killings. That did not happen, he says.

However, registered sex offenders have been affected in other ways: Neighbors have badgered them and put signs on their lawns. Governments have passed laws preventing sex offenders from living within a certain distance of schools, playgrounds and other places frequented by children.

"The drift has basically been to tighten everything up, making it tougher on sex offenders," Onley says.

He says he knows of only one other case of lethal vigilantism linked to a website: In August, Michael Mullen killed two sex offenders in Bellingham, Wash., after finding their addresses on a sex-offender website.

Bellingham police briefly shut down the city's sex-offender website but put it back online shortly afterward and made no changes to its content.

"The value to the community far outweighs the risk," says Don Pierce, executive director of the Washington Association of Sheriffs and Police Chiefs.

Fred Berlin, an associate professor of psychiatry at the Johns Hopkins University School of Medicine, says online registries may create unforeseen problems.

Most sex offenders and their families, he says, want a new start. But the killings in Washington and Maine, coupled with the more pervasive harassment of registered sexual offenders in their own neighborhoods, may make them angry and bitter.

"They want to be able to be employed. They don't want to be disenfranchised from their neighbors," he says. "They and their family don't want to be stigmatized."

Jake Goldenflame, a registered sex offender in San Francisco and author of Overcoming Sexual Terrorism, agrees.

He supports registries because they provide important information to the public and remind sex offenders of their past. But if sex offenders continue to be murdered, he says, others will be less likely to register, and some officials may choose to remove the sites.

"Anybody who chooses to use these websites as a vehicle to take vengeance against us is killing these websites, too," he says. "You kill us, you're killing the websites."

Contributing: Kasie Hunt, USA TODAY

    Suspected shooter found sex offenders' homes on website, UT, 18.4.2006, http://www.usatoday.com/news/nation/2006-04-16-maine-shootings_x.htm

 

 

 

 

 

A Sinister Web Entraps Victims of Cyberstalkers

 

April 17, 2006
The New York Times
By TOM ZELLER Jr.

 

Claire E. Miller, a 44-year-old publishing executive in Manhattan, recently stripped her nameplate from the tenant directory at the entrance to her Kips Bay apartment building, where she has lived for more than 11 years. She has also asked the landlord to disconnect the buzzer and is in the process of changing her phone number.

Drastic measures, all, for an otherwise cheerful and outgoing person. But Ms. Miller has been unnerved by a sudden and, since last September, steady onslaught of unsolicited and lusty phone calls, e-mail messages and even late-night visits from strange men — typically seeking delivery on dark promises made to them online by someone, somewhere, using her name.

"I wouldn't even try to guess at the motivation behind this," Ms. Miller said.

She is being harassed — cyberstalked, by modern definition. The term has by now found its way into dozens of state legislatures, police reports and talk-show lineups, joining other unsavory byproducts of the Internet age.

State legislatures took notice around 1999 and began passing laws that make cyberstalking a crime. Three months ago, President Bush signed federal anti-cyberstalking legislation. But cases like Ms. Miller's make it clear that the problem is not easily legislated away and show how devastating it can be to individuals caught in its web.

One profile posted at the "adult personals" site iwantu.com included Ms. Miller's full name, address and phone number, along with a solicitation for eager suitors to call or drop by her home. "My name is Claire E. Miller," the ad began. It concluded: "I can make you very happy and satisfied. In my den of love pad."

It is the online equivalent of scrawling "for a good time, call Jane Doe" on a bathroom wall, but the reach of the Internet has made such pranks — if they are only that — far more sinister. And the problem is only likely to grow, fueled by the availability of personal data online and the huge growth in social networking and dating sites, which are attracting investment from big companies.

"Cyberstalking is the hidden horror of the Internet," said Parry Aftab, an attorney and executive director of WiredSafety.org, a network of 9,000 volunteers who patrol the Web and assist victims of cyberstalking, child pornography and other online ills. "Nobody talks about it. They think they have to live with it."

Ms. Miller suspects that her perpetrator is a stranger who may have found her personal information while snooping around in the AOL e-mail account of an old high school friend. But late at night, in the topsy-turvy churn of an anxious brain, all kinds of people — old lovers, acquaintances — become possible culprits.

"That's when the self-doubt and fear comes in," Ms. Miller said.

There are no statistics on how often this particular breed of online impersonation takes place, but Jayne A. Hitchcock, the director of Working to Halt Online Abuse, an organization that assists victims of Internet harassment, says it is common enough.

"I think I've seen everything," Ms. Hitchcock said. Participants in online fantasy football leagues, angered by some nuance of the competition, silently turn on and anonymously harass one another, and in eBay auctions, either the seller or the buyer turns stalker, she said. They channel that "Internet road rage," Ms. Hitchcock said, into a variety of anonymous vendettas.

After receiving informal requests for information about cyberstalking from the F.B.I. and other law enforcement agencies, Ms. Hitchcock's group began tracking demographic details in 2000. In February, the group — which she says handles an average of 50 new cases each week — released a five-year analysis of data on the victims and, to the extent possible, the stalkers. The data is sketchy; victims volunteered to fill out a questionnaire, and harasser data is, in most cases, provided by the harassed. But there are some insights. For example, increasing numbers of men appear to be applying for help, and overt threats of offline harm occurred in about a quarter of the cases last year.

In about half the cases, victim and perpetrator appear to be strangers. For the rest, it can be deeply, disturbingly personal.

Earlier this month, a Suffolk County police officer, Michael Valentine, was indicted on 197 counts of stalking, unauthorized use of a computer and other charges after hacking into the Yahoo e-mail account of a woman he had briefly dated and posing as her in online communications.

The Suffolk County District Attorney's office also charges that Mr. Valentine, of Lake Grove, accessed the woman's personal profile on the dating site Match.com, sending electronic "winks" and other communications to 70 different men on the site. At least two showed up at the woman's home for dates.

That case, and Ms. Miller's, echo that of Gary S. Dellapenta, of Los Angeles, a former security guard who spent the summer of 1998 trolling chat rooms and personals sites posing as his ex-girlfriend. He posted rape fantasies under her name and, providing her home address, begged strangers to deliver on them.

Six men arrived at the former girlfriend's door before Mr. Dellapenta was eventually tracked down. He was sentenced in 1999 to six years in prison under California's then-new cyberstalking law.

J. Reid Meloy, a forensic psychologist and the author of several books on criminal personalities, said that the universe of cyberstalkers runs the gamut, from "jokesters and pranksters to people who have clear criminal intent." He called this particular brand of harassment — in which the perpetrator deploys third parties, wittingly or not, to haunt the victim — "stalking by proxy."

"With any new technology that comes along, you have the shadow of criminality that follows," Mr. Meloy said, although he added that the Internet, with all its distance and anonymity, provided a unique vehicle for the unleashing of hidden furies.

"It's a much more veiled, shielded, disinhibited way of communicating," Mr. Meloy said, "and much more raw in the expression of aggression."

Mari J. Frank, an attorney and privacy consultant who specializes in cases of identity theft, called Ms. Miller's situation "identity theft for revenge."

"I speak about it all the time," Ms. Frank said, adding that the rise of social networking sites like MySpace and Facebook, where young people often naοvely divulge too much information to a world of potential stalkers, has made the situation worse. "Even teens are becoming the victims of cyber ID theft and cyberstalking," she said.

About 45 states now have laws similar to California's. And the new federal law — tucked into the Violence Against Women and Department of Justice Reauthorization Act — updated telephone harassment law to include computer communications.

Some advocates of civil liberty have complained about what they see as overly broad language of the federal update, which prohibits not only anonymous communications intended to threaten, abuse and harass, but also those intended to "annoy" — a term that might characterize a wide range of anonymous Internet banter that falls far short of cyberstalking.

Others, though, have argued that such banter would be protected by the First Amendment, and only cyberstalkers have anything to fear.

That is, of course, if they can be found.

Ms. Miller filed an initial complaint with the New York City police department in October, but said she was not contacted after that. Using a number provided by a friend, she called a detective with the department's units on computer crimes last week, and is now working with investigators there. (A deputy chief, Michael Collins, a police spokesman, said a clerical error in the processing of Ms. Miller's initial complaint apparently delayed her case.)

Ms. Miller has also found two dating sites where her name has been used — imatchup.com and iwantu.com — and had the profiles either removed or hidden.

According to Ms. Hitchcock, the director of Working to Halt Online Abuse, federal cyberstalking legislation can provide needed leverage in pursuing what are often complicated cases. Perpetrator and victim might reside in different states, for instance, and the evidence might be in the hands of Internet companies all over the country, or the world. The law also gives the F.B.I. and other federal law enforcement agencies greater purview over cyberstalking.

But getting that far, Ms. Hitchcock said, is a long road.

Using a Web site usually involves leaving tracks in the form of an I.P. address, which can be traced back to an Internet service provider and perhaps the computer of a stalker. Under most circumstances, a subpoena or a search warrant is required to obtain that information from an online service, so filing a police report is crucial. After that, contacting an organization like WiredSafety.org or Working to Halt Online Abuse, at haltabuse.org, can help. They work with both victims and law enforcement to help move cases forward.

Ms. Miller has taken all these steps — and worked diligently on her own.

Late last month Ms. Miller asked the support staff of iwantu.com, which has offices in Seattle and Canada, Costa Rica and Britain, for data that would reveal the Internet service provider of the person who set up the account there.

On April 3, the company put its position succinctly in an e-mail message to Ms. Miller: "Please note that unfortunately, we cannot supply I.P. addresses. Sorry."

That is precisely what they should have done, said Mark Brooks, an online personals industry analyst and the editor of Online Personals Watch, an industry newsletter. "They can't possibly give that out to another user," said Mr. Brooks, who is a former executive of dating and social networking sites like Cupid.com and Friendster. "It might be a stalker calling to get that information."

Executives for iwantu.com did not return phone calls or e-mail messages seeking comment, and the contact number provided on the imatchup.com Web site for the media relations representative and "Romance Director," Dan Levine, connected to the customer service department instead. A representative reached last weekend said he was not sure why that number was listed, and suggested sending an e-mail message or a letter.

These are delicate issues for an industry that is in the throes of a debate about client safety and security. Several states are considering legislation that would require online personals services to disclose whether they conduct background checks on their members.

According to Mr. Brooks, most members of the industry are sensitive to issues of online safety, but argue that background checks — which must rely on third-party commercial data brokers with spotty information — are expensive and by no means foolproof.

And yet one service, True.com, has quickly become one of the most popular personals sites by conducting background checks on anyone seeking to make a connection. Its staff promises to prosecute those who misrepresent themselves on the site — a concept that Ms. Miller might endorse. She said she planned to pursue her tormenter until he is found.

"I do feel that the Internet is a wonderful tool," she said. "I just want to make sure it's kept safe for everyone."

    A Sinister Web Entraps Victims of Cyberstalkers, NYT, 17.4.2006, http://www.nytimes.com/2006/04/17/technology/17stalk.html?hp&ex=1145332800&en=352ad6b337a3884a&ei=5094&partner=homepage

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Doug Marlette        The Tallahassee Democrat, FL        Cagle        13.4.2006
http://cagle.msnbc.com/politicalcartoons/PCcartoons/marlette.asp

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Google Chief Rejects Putting Pressure on China

 

April 13, 2006
The New York Times
By JIM YARDLEY

 

BEIJING, April 12 — Google's chief executive, Eric E. Schmidt, whose company has been sharply criticized for complying with Chinese censorship, said on Wednesday that the company had not lobbied to change the censorship laws and, for now, had no plans to do so.

"I think it's arrogant for us to walk into a country where we are just beginning operations and tell that country how to run itself," Mr. Schmidt told reporters from foreign news organizations.

Mr. Schmidt is visiting China this week to promote Google's new Chinese search engine and to meet with officials of government ministries. He announced the opening of a research and development center in Beijing's high-technology district and also introduced a Chinese-language brand name for the company's domestic search engine — Gu Ge, which roughly translates as "a harvesting song."

But in briefing sessions that involved both Chinese and foreign reporters, Mr. Schmidt faced questions about the censorship controversy that has involved Google, Microsoft, Yahoo and Cisco Systems.

At a Congressional hearing in February, executives from the four companies were criticized as collaborating with the Chinese government to silence dissidents. Google's Chinese search engine, introduced in January, blocks subjects restricted by the government, including searches for "Tibet" and "democracy."

On Wednesday, Mr. Schmidt defended the decision to cooperate with the censors, saying that accepting the restrictions of Chinese law were unavoidable for Google to enter the Chinese market. "We had a choice to enter the country and follow the law," Mr. Schmidt told the foreign reporters. "Or we had a choice not to enter the country."

Earlier, during a broader news conference including Chinese journalists, he said, "We believe the decision that we made to follow the law in China was absolutely the right one."

Mr. Schmidt said Google's China strategy had been hotly debated inside the company. He called its final choice a difficult but principled decision.

Google's regular, unfiltered search engine is still available in China, although it is significantly slowed by the Chinese censors. And the filtered search engine does notify a user when information has been censored.

In addition, Google has not introduced e-mail or blogging to avoid being told to turn over personal information on cyberdissidents to officials. Yahoo has been denounced for providing information that has helped the Chinese authorities convict such dissidents.

Many critics contend that giants like Google should put pressure on China to change; some industry executives respond that they have little leverage to do so.

Mr. Schmidt said that while the company had not ruled out lobbying with the Chinese on the matter, it had no immediate plans to push for a loosening of restrictions.

Google is still negotiating to receive the full complement of government licenses to operate in the country. Mr. Schmidt declined to discuss which licensing hurdles remain.

China already has more than 111 million Internet users, the second-highest number in the world, after the United States, and this is growing quickly. Mr. Schmidt said he expected China to become one of Google's most important markets, even though it still accounted for a small slice of overall revenue. He said the same was true when Google entered other foreign markets, including those in Europe, where revenue has jumped as users became familiar with the company's services.

Mr. Schmidt said he expected the new research center in Beijing to become one of Google's leading innovators. He noted that Chinese universities could provide a rich talent pool of software engineers and said that the new center would have a work force of more than 150 by this summer. Eventually, he said, the number of employees would reach into the thousands.

 

_____
 

 

Displeasure Over Share Structure

By Bloomberg News

SAN FRANCISCO, April 12 — A pension fund investor wants Google to give equal voting rights to all shareholders, saying its current ownership structure reduces management accountability.

The investor, the Bricklayers and Trowel Trades International Pension Fund, which owns 4,735 shares, wants to eliminate a class of stock that gives the founders, Larry Page and Sergey Brin, and the chief executive, Mr. Schmidt, 10 times the voting rights of other shareholders.

"This disproportionate voting power presents a significant danger to shareholders," the fund said in a proposal included in Google's proxy statement filed Wednesday with the Securities and Exchange Commission. "Dual-class voting stocks like our company's reduce accountability for corporate officers and insiders."

Google has urged shareholders to reject the proposal.

    Google Chief Rejects Putting Pressure on China, NYT, 13.4.2006, http://www.nytimes.com/2006/04/13/business/worldbusiness/13google.html?hp&ex=1144987200&en=80172a601f6f35b9&ei=5094&partner=homepage

 

 

 

 

 

Google debuts Chinese-language brand name, defends cooperation with censors

 

Updated 4/12/2006 9:07 AM ET
USA Today

 

BEIJING (AP) — Google CEO Eric Schmidt on Wednesday defended the search engine's cooperation with Chinese censorship as he announced the creation of a Beijing research center and unveiled a Chinese-language brand name.

Google is trying to raise its profile in China after waiting until January to launch its Chinese-language site Google.cn. Activists have criticized the company for blocking searches for material about Taiwan, Tibet, democracy and other sensitive issues on the site.

"We believe that the decision that we made to follow the law in China was absolutely the right one," Schmidt said at a news conference.

He said Google had to accept restrictions in order to serve China, which has the world's second-largest population of Internet users after the United States, with more than 111 million people online.

Schmidt also announced the creation of a research center in Beijing that he said should have 150 employees by mid-2006 and "eventually thousands of people." He said the center is meant to create products for markets worldwide, though he said planning was still in such an early stage that he didn't know what they might be.

Schmidt was speaking at a ceremony to announce Google's Chinese-language brand name — "Gu Ge," or "Valley Song," which the company says draws on Chinese rural traditions to describe a fruitful and rewarding experience.

Talking to reporters later, Schmidt said Google's managers were stung by criticism that they accepted Chinese censorship, but said they haven't lobbied Beijing to change its rules.

"I think it's arrogant for us to walk into a country where we are just beginning to operate and tell that country how to operate," he said.

Asked whether Google might try to persuade Beijing to change its restrictions, Schmidt said he didn't rule anything out, but said it hasn't tried to change such limits elsewhere. He noted that Google's site in Germany is barred from linking to Nazi-oriented material.

"There are many cases where certain information is not available due to local law or local custom," he said.

Schmidt said China accounts for only a small portion of Google's revenues because the company has only recently obtained a license to allow it to carry local advertising. But he said the company expects China to be an important part of its future business.

One possible Google project in China would be to make Chinese books available online in digital form or to use translation software to produce English-language editions, Schmidt said.

He said the Beijing technical center could quickly become Google's biggest outside the United States, surpassing its European lab in Zurich, Switzerland.

Chinese universities "are now churning out a very large number of very, very good programmers," he said. "So we are moving quickly now to hire the best and the brightest."

    Google debuts Chinese-language brand name, defends cooperation with censors, UT, 12.4.2006, http://www.usatoday.com/tech/world/2006-04-12-google-china_x.htm

 

 

 

 

 

Advertising

Soon, Catch 'Lost' Online, a Day Later
 

April 11, 2006
The New York Times
By JULIE BOSMAN

 

For the Walt Disney Company, plans to make television shows available free online are a way to bolster revenue by selling two sets of advertising — TV commercials and online ads — for a single show.

For advertisers, the online offerings represent an opportunity to capture the attention of particularly Web-savvy consumers who do not have the luxury of fast-forwarding through the ads as they can on a digital video recorder.

Yesterday, Disney announced details of the plan. Beginning in May, the company will begin a two-month trial that will make four popular shows from its ABC network — "Desperate Housewives," "Lost," "Commander in Chief" and "Alias" — available for free viewing online the day after they are broadcast. The plan was first reported in The Wall Street Journal.

Unilever is among the advertisers that bought ads for the initial test run. Noreen Simmons, Unilever's director of strategic media planning, said she expected that consumers who were watching shows in streaming video online would be more alert than if they were watching the same content on television.

"It's going to be a different viewing experience," Ms. Simmons said. "Rather than people sitting back in their chairs watching TV, this is going to be a lean-forward experience."

A string of other companies — including Cingular, Ford, Toyota, Procter & Gamble and Universal Pictures — have also purchased ads, a spokeswoman for Disney said. Jon Winsell, the director of online media strategy for ID Society, an interactive marketing agency in New York, said people who were willing to log on to a computer to watch a missed episode might be loyal enough to tolerate the unskippable commercial breaks.

"When you're talking about 'Desperate Housewives' or 'Lost,' you're talking about a rabid fan base, so they're probably willing to put up with a little more," Mr. Winsell said. Some advertisers are looking at the Web site as a way to find consumers wherever they are taking in content. Mark Simmons, the national manager of advertising strategy and media for Toyota, said the company viewed Disney's new offering primarily as an experiment.

"We wanted to basically test this and learn what we can," Mr. Simmons said. "I think the measurement will be in how many people view these Webisodes."

The plan is the first time a broadcast network will give away full-length hit prime-time TV shows on the Internet. It is also an indication of the pressure networks are feeling from popular video-on-demand services, which are offered by cable operators, among others, and allow viewers to see TV shows and movies when they want. In addition to the four ABC shows, the Web site, www.abc.com, will carry content from three of Disney's cable channels, the Disney Channel, Soapnet and ABC Family.

At a panel discussion yesterday in Atlanta at the National Show, a cable conference put on by the National Cable and Telecommunications Association, Anne Sweeney, president of the Disney-ABC Television Group, said she thought of the plan as "a learning opportunity."

"None of us live in the world of one business model," she said, referring to the other panelists, who included Brian L. Roberts, the chairman and chief executive of Comcast, and Richard D. Parsons, the chairman of Time Warner.

Mr. Roberts, referring to Ms. Sweeney of Disney, said, "People say television will be free on the Internet. I can't believe that's HBO's model, CNBC's model or Anne's model. The idea is to make the pie bigger."

At a news conference after the panel discussion, Mr. Parsons of Time Warner said he was not concerned about the possibility of Disney content cannibalizing video-on-demand from cable companies.

"It's the same way video-on-demand is going," Mr. Parsons said. "You have to have a full suite of video. The notion that someone is going to hollow out the business, I don't see that happening."

Indeed, one analyst suggested that the new model was more old-school than revolutionary.

"They are going back to the traditional way that people have watched television for years: free with ads," said Richard Greenfield, an analyst at Pali Research. "It's reverting back to what consumers are most comfortable with."

Like other media companies, Disney is trying to rally attention in an out-of-favor sector, said Michael Nathanson, a media analyst at Sanford C. Bernstein & Company.

"A lot of companies are trying experiments like these, not just Disney," Mr. Nathanson said. "But no one knows what the business model is and whether it will pay off."

Laura M. Holson and Ken Belson contributed reporting for this article.

    Soon, Catch 'Lost' Online, a Day Later, NYT, 11.4.2006, http://www.nytimes.com/2006/04/11/business/media/11adco.html

 

 

 

 

 

Kids with cancer bond online

 

Updated 4/10/2006 7:58 PM ET
USA TODAY
By Liz Szabo

 

More than 10 million Americans are cancer survivors. That number is expected to grow as the population ages, as improved therapies help people live longer and as screenings identify the disease earlier. In this occasional series, USA TODAY examines how a cancer diagnosis changes people's lives and outlooks.

Cancer has consumed 2½ years of Simone Weinstein's young life.

It took her hair, her eyebrows and her eyelashes.

At times, cancer has even taken away her friends.

Simone, 16, often has been afraid to see or even call them. Chemotherapy makes her nauseous, and she's terrified of throwing up in front of other kids. A lifesaving medication called prednisone causes turbulent mood swings that make it hard to control her temper. Rather than risk snapping at people who care about her, Simone often chooses to be alone.

"I was so afraid of doing something gross in front of people," says Simone, of Walnut Creek, Calif., who is scheduled to finish treatment this spring.

Yet Simone is never afraid to talk to Lauren Sharp of Versailles, Mo. The girls, who have both been treated for acute lymphoblastic leukemia, met at a website for teen cancer patients called Group Loop.

They are among thousands of patients with cancer and other serious illnesses who use technology to cope. Some patients create blogs. Others record their stories through podcasts that can be downloaded onto iPods. Many follow online discussion boards.

One of the best-known sites, the Cancer Survivors Network of the American Cancer Society, has 72,000 members, most of whom are adults.

The Internet has special appeal for adolescent patients, says Jennifer Ford, an assistant attending psychologist at New York's Memorial Sloan-Kettering Cancer Center. Young cancer patients have grown up with technology, and many already have their own websites and blogs. Other popular sites, she says, include teenswithcancer.org and planetcancer.org, which is geared toward young adults.

Girls seem especially drawn to these sites; they make up about two-thirds of the users at Group Loop, says Mitch Golant, the site's vice president for research and development. Women generally are more likely than men to use support groups, he says.

Online communities can be especially important for teens because their disease is so rare, Ford says. The 12,400 patients under 20 who are diagnosed with cancer each year make up less than 1% of the 1.4 million new annual cases of the disease, the American Cancer Society says. Loneliness is a common problem for these young patients, many of whom, like Simone, sometimes isolate themselves.

Sometimes, after a visit with classmates, Simone says, "I would just collapse from the pressure of holding it all in."

Battling cancer is grueling at any age, but Ford says the disease can be particularly tough on teens. At this age, even healthy children worry about their bodies, their looks and fitting in.

The last thing that teens want is to be taken away from home and set apart from everyone else.

Lauren, 16, was the only child with cancer in her hometown in Missouri. She wishes she had known about Group Loop when she was in treatment. She was 11 when she began treatment, which made her swell up and gain weight. At school, Lauren hid her puffy cheeks by walking through the hallways with her hands in front of her face.

Lauren says she understands the agony of patients still going through therapy.

Now, in their hours online and on the phone, Lauren and Simone air their resentment of medications that punish patients in order to cure them. They can speak freely without the fear of boring anyone, without anyone staring.

Like Lauren, Simone is sensitive about her appearance. On a discussion board last year, she wrote of being ashamed of her "big, fat hideous cheeks." Yet Simone also has found courage to poke fun at herself, choosing "chpmnkcheekz" as her screen name.

"When I talk to Lauren, I don't have to explain," says Simone, who discovered the website shortly after being diagnosed. "Whenever I am sad or depressed, I always feel like she can help."

The two girls, who have been friends for two years, met in person last summer at Simone's house. They plan to meet at Lauren's home in a few months.

It's important for teens to have their own support systems, Ford says, because teens' concerns are so different from those of other patients. Unlike adults, teens rarely worry about death, she says. They focus more on immediate threats: appearance or missed opportunities, such as going to the prom.

Teens also have close ties to familiar places, such as their schools and neighborhoods, Ford says. They suffer when they are plucked out of that environment, especially if sent hundreds of miles away to a specialty pediatric hospital, a common practice.

 

Connected by cellphone

Emily Bye, who was treated for bone cancer at 17, often spent five days at a time in the hospital.

Every day felt the same, she says, until time no longer seemed to matter. The hospital charged high fees for the Internet and forbid the use of cellphones — a hardship for a generation accustomed to sending dozens of text messages a day.

To Emily's teen classmates, even the vocabulary of cancer — platelets, catheters and sarcomas — seemed foreign. "I felt like I wasn't normal," says Emily, now a 19-year-old sophomore at Virginia's James Madison University.

She heard about Group Loop during treatment, but didn't become a regular member at the site, which doesn't charge a fee, until she left the hospital and finished therapy.

"I found there were other people out there like me," she says. "I felt normal in that way. It was nice to know that they had gone through the same thing."

Some hospitals make a special effort to help patients stay in touch.

Memorial Sloan-Kettering allows cellphones and text paging and even provides laptops and high-speed Internet connections. Kids can use teleconference facilities to follow along with their classes at home, says Nina Pickett, administrator of the hospital's pediatrics department.

One of the hospital's patients, 15-year-old Anthony Scilingo, says he's never far from his laptop. He carries his cellphone in one of the many pockets of his cargo pants.

Yet Anthony, who is undergoing chemo for bone cancer, spends much of his day waiting to talk. His old friends in Edison, N.J., don't get out of school, and back online, until 4 p.m.

 

A natural distance

Ford notes that the Internet fills another crucial need for kids with cancer: It gives them a place to complain about their parents.

Adolescent cancer patients sometimes lose the opportunity to become independent, Ford says. Kids usually spend their teen years staking out an identity distinct from their parents and bonding with their peers.

Cancer, however, makes teenagers dependent on their parents, sometimes for the most basic and embarrassing of needs, such as getting dressed.

Many parents end up sleeping in their child's hospital room. websites for teen cancer patients can give kids a place to put a little healthy distance between themselves and their caregivers, Ford says.

Yet she cautions against spending too much time on the Web. Chatting online can't replace face-to-face interactions with peers, Ford says. Kids who spend too much time at the computer may become even more isolated.

And in the end, no technology can make cancer easy.

Emily says her online buddies understand cancer, but they don't know her as well as her longtime friends.

She also is reluctant to really bond with other young patients. One of her online friends has relapsed. A friend with cancer died of an infection.

"It's hard to get close to people because you know they all have cancer and that something could happen to them," she says. "As much as we talk, I sort of restrain myself."

 

_____

 

FAMILIES FIND A LIFELINE

A number of hospitals recognize the power of online support, making it easy for patients and their families to connect through the Internet or even create their own blogs.

Tony Scilingo of Edison, N.J., had never used the Internet before his son was diagnosed with bone cancer. But he now files Web updates about his son's progress every week, thanks to a site called caringbridge.org.

Scilingo learned about the site, which was designed with families in mind, from New York's Memorial Sloan-Kettering Cancer Center. Scilingo says the site spares him from having to repeat the same news to dozens of well-wishers. It also allows him to keep up with his tech-savvy 15-year-old son, Anthony.

"He's teaching me how to copy and paste," Scilingo says.

Karen Grant of Methuen, Mass., has been teaching senior citizen patients about podcasts. Grant, 31, has survived mesothelioma, a rare and deadly lung cancer typically found in older people who were exposed to asbestos. She volunteers at the International Mesothelioma Program at Brigham and Women's Hospital in Boston.

The hospital has recorded video testimonials from survivors on its website. She says the online videos reach patients who may never meet another person with mesothelioma. Grant passes out iPods in the hospital so that anxious patients can listen to the testimonials.

"As tough as it is, I try to help them have a smile on their face and relax and know it's OK," Grant says.

Lori Todaro says she pours her heart into her son's site at carepages.com. She found it through The Children's Inn at the National Institutes of Health, where her 7-year-old son, Nino, is being treated for a rare disease called periodic fever syndrome.

"It was so helpful to be able to go back to the inn and just dump everything on those pages," says Todaro, who travels to the NIH every four weeks from her home in Carlisle, Pa. "I was able to just leave my worries and my tears there, because I couldn't be down for Nino."

By Liz Szabo

    Kids with cancer bond online, UT, 10.4.2006, http://www.usatoday.com/news/health/2006-04-10-teen-cancer-web_x.htm

 

 

 

 

 

 

Child Sex as Internet Fare, Through Eyes of a Victim

 

April 5, 2006
The New York Times
By JOSHUA BROCKMAN

 

WASHINGTON, April 4 — The sexual exploitation of children on the Internet is a $20 billion industry that continues to expand in the United States and abroad, overwhelming attempts by the authorities to curb its growth, witnesses said at a Congressional hearing on Tuesday.

The witnesses, who testified at a hearing of the Oversight and Investigations Subcommittee, part of the House Committee on Energy and Commerce, said that sexual predators were preying on victims as young as 18 months by using instant messaging and Web cameras to meet, lure and digitally stalk children and to share pornography.

Internet technologies have the capacity to drive a wedge between children and their families, they said.

"Online predators befriend adolescents," said Dr. Sharon Cooper, a pediatrician at the University of North Carolina at Chapel Hill, who was one of the witnesses. "They become closer to them than some family members are."

Dr. Cooper compared the new forms of online exploitation, which involve constant surveillance of subjects, to security cameras in convenience stores. "We're seeing real-time sexual exploitation of children." She cautioned that predators were using online child pornography not just for sexual gratification, but as "a plan for action."

The lead witness at the hearings was Justin Berry, who was molested as a teenager by people he had met online, and then went on to run a pornographic Web site for five years, featuring images of himself.

Mr. Berry was the subject of a front-page article in The New York Times in December by an investigative reporter, Kurt Eichenwald. The article detailed Mr. Berry's experiences and his efforts to assist in the prosecution of some of the 1,500 people who had paid him to perform on camera.

Mr. Eichenwald spent six months on the investigation and was subpoenaed to testify before the committee. He sat alongside Mr. Berry, 19, who delivered his remarks in a measured tone to the committee.

"There are hundreds of kids in the United States alone who are right now wrapped up in this horror," Mr. Berry said in his testimony. "Within each of your Congressional districts, I guarantee there are children who have used their Webcams to appear naked online, and I guarantee you there are also children in your district on the Internet right now being contacted and seduced by online sexual predators."

Child exploitation investigators in the Justice Department came under fire from lawmakers at the hearings, who questioned whether officials had responded too slowly to leads provided by Mr. Berry. These included clients' names and credit card numbers, which could presumably help investigators identify children entangled in the online pornography industry. The department denied that contention.

"The Department of Justice uses every resource available to quickly protect and remove children who are being exploited from dangerous situations, and to prosecute those responsible for their abuse," a spokesman, Bryan Sierra, said.

The hearing was the first of several on this topic. On Thursday, the committee is to address law enforcement efforts. A representative from the Justice Department is expected to testify.

"Justin Berry stepped forward at a time the government did not know he existed," Mr. Eichenwald said. "He is, to experts' knowledge, the first such teenage witness to ever turn over this kind of vast evidence to the government."

Still, he added, "important data offered to the government by Justin has, even at this late date, not been collected and has only been reviewed by me."

At issue is how to handle the companies involved in these crimes, from Internet service providers to credit card companies to banks.

"At a minimum what we can do is follow the money," said Ernie Allen, president of the National Center for Missing and Exploited Children. "If we take away the profitability, it is going to be very difficult for these sites to maintain themselves."

 

 

 

U.S. Official Is Arrested

MIAMI, April 4 (AP) — The deputy press secretary for the Department of Homeland Security was arrested on Tuesday and accused of using the Internet to seduce someone he thought was a teenage girl, the authorities said.

According to the sheriff's office in Polk County, Fla., where the charges were issued, the official, Brian J. Doyle, 55, of Silver Spring, Md., had a sexually explicit conversation with a person he believed was a 14-year-old girl whose profile he had seen on the Internet. In reality, the sheriff's office said, Mr. Doyle was talking with an undercover sheriff's detective.

    Child Sex as Internet Fare, Through Eyes of a Victim, NYT, 5.4.2006, http://www.nytimes.com/2006/04/05/washington/05porn.html

 

 

 

 

 

Media Frenzy

Death by Smiley Face: When Rivals Disdain Profit

 

April 2, 2006
The New York Times
By RICHARD SIKLOS

 

THE tectonic changes facing media companies are by now the topic of an often-recited sermon. Put briefly, digital technology is placing control over much information squarely in the hands of consumers and creating all kinds of opportunities for new entrants who can push the revolution forward.

Understandably, attention in this race is focused on the companies that are, as the management consultants like to say, transferring value from conventional outlets to new disruptors that deliver personalized media more efficiently and hence with greater profitability. In other words, to the victor go the spoils.

The obvious standouts are Google and Yahoo with their aggregation software, prominent brands and ability to layer advertisements all over the Internet and perhaps beyond; or Apple Computer with its iTunes and iPod and their utter dominance over portable music.

Consider Monster Worldwide, the online employment advertising company, where the numbers tell the story: Monster, the owner of the www.monster.com site, has a stock market value of $6.2 billion, some 40 percent greater than the amount for which Knight Ridder, the newspaper chain owner, is being sold. But Monster has only one-third of Knight Ridder's $3 billion in annual revenue.

There is another breed of rival lurking online for traditional media, and it is perhaps the most vexing yet: call it purpose-driven media, with a shout-out to Rick Warren, the author of "A Purpose-Driven Life," for borrowing his catchphrase.

These are new-media ventures that leave the competition scratching their heads because they don't really aim to compete in the first place; their creators are merely taking advantage of the economics of the online medium to do something that they feel good about. They would certainly like to cover their costs and maybe make a buck or two, but really, they're not in it for the money. By purely commercial measures, they are illogical. If your name were, say, Rupert or Sumner, they would represent the kind of terror that might keep you up at night: death by smiley face.

Probably the best-known practitioner is Craigslist.org, the online listing site. Although it is routinely described as a competitor with — and the bane of — newspaper classified ads, the site is mostly a free listings service that acts as a community resource. When the company contemplates imposing fees for using its site in a particular city, as it has recently in New York, it does so cautiously and thoughtfully, as a means to weed out real estate brokers who are abusing the site by posting their ads over and over.

The twist about Craigslist and its ilk is that their egalitarianism could make them very valuable someday — although Craigslist's founder, Craig Newmark, has proclaimed no interest in cashing in. EBay, no doubt sensing the commercial potential, bought a 25 percent stake from a former employee last year. Other examples are the "for sale by owner" Web sites that have cropped up across the country, in which people can sell their homes at a cost that is a small fraction of the usual broker's fee.

And let's not forget that Google began life as one of these ventures: it was only a handful of years ago that one of Google's founders quaintly decried the evils of advertising before figuring out a do-gooder way (as they saw it) to sell boatloads of it.

Now Google, with its market valuation of more than $100 billion, has drawn the ire of the newspaper and book publishing industries, among others, which argue that its supposedly benevolent search robots have been usurping their intellectual property.

Purpose-driven media, by the way, are even more common in the software world. The shining example is the Firefox browser that is available free for download and has emerged as a credible rival to Microsoft's Internet Explorer. And, for icing on the cake, Firefox makes money for its not-for-profit owners because Google pays to be its search engine.

Another example of genius ideas from people who don't seek Internet riches is Chowhound.com. This nine-year-old site features community-generated restaurant review boards in various cities and steadfastly refuses to accept restaurant advertising. Rather than continue to grovel for donations and make a few dollars selling Chowhound books, the founders sold the company last month to CNET Networks, a Web business known for its reviews of technology products, for an undisclosed amount. Unlike Chowhound, whose independence and spirit it has vowed to maintain while helping to spiff up the site, CNET.com is chockablock with ads.

A fascinating new entrant in the field is LaLa.com, a music-swapping site introduced last month. Depending on where you are sitting, the LaLa concept is either brilliant (if you are a music fan with a lot of CD's you don't listen to, or if you are an artist) or terrifying (if you are a retailer of new or used music, or perhaps even a music label).

Here again, the founders are not in it just for profit. Rather, their idea is that despite all the cool new digital music services, well over 90 percent of the music industry sales are still in the CD format; most people still have CD's and artists don't gain any benefit from the sale of used discs. Many music lovers, the founders contend, feel disenfranchised by the way music is sold.

So LaLa is essentially a CD-swapping site that matches people who want one another's old CD's. It charges them a mere $1 a disc and provides the postage-paid envelopes to send them in for 49 cents apiece. Out of each dollar, the company voluntarily pays 20 cents to the performer on the recording; there is no more a legal obligation to do so than there is to pay General Motors a cut every time a used Chevy changes hands.

Bill Nguyen, the man behind several Silicon Valley start-ups, who is one of LaLa's founders, said that the service might work just as well at a cost of $4 a CD — still a quite a bit cheaper than a typical used CD on eBay or in an East Village record shop — but that making money wasn't the point.

Like those of other purpose-driven ventures, the company's costs are relatively low: it has only 17 employees at its offices in Palo Alto, Calif. So far, the site has been operating by e-mail invitation only because Mr. Nguyen and his partners want to build a strong base of music lovers, and not just people looking for cheap CD's. Mr. Nguyen maintains that the site already has 1.8 million album titles available for swapping. By comparison, Amazon has more than one million different CD's available for purchase, according to a spokeswoman for the company.

MR. NGUYEN expects to open the site to the broader public by the summer. And no matter how successful the site becomes, he vows that it will not carry ads for the music industry or for anyone else — except some links to charities. Nor will the company sell singles, although it will sell physical and download versions of entire new albums.

He also asks that LaLa members "do the right thing," as he sees it, and erase from their hard drives and iPods any copies of songs from CD's they have traded. "We did a lot of weird things that didn't make sense," Mr. Nguyen said proudly.

Or, maybe they do. After all, the company did manage to attract $9 million in financing from the venture capital firms Bain Capital and Ignition Partners. Obviously, these investors believe that there is money to be made in communal efficiency, just as CNET must believe in its purchase of Chowhound or eBay in its investment in Craigslist.

Maybe the lesson for media companies is to keep your friends close but to keep these friendly menaces even closer. As far as Mr. Nguyen is concerned, pursuing his labor of love is enough reward in and of itself. "We just dig music," he said. "Karma plays a role, man."

    Death by Smiley Face: When Rivals Disdain Profit, NYT, 2.4.2006, http://www.nytimes.com/2006/04/02/business/yourmoney/02frenzy.html

 

 

 

 

 

Internet Injects Sweeping Change Into U.S. Politics

 

April 2, 2006
The New York Times
By ADAM NAGOURNEY

 

WASHINGTON, March 31 — The transformation of American politics by the Internet is accelerating with the approach of the 2006 Congressional and 2008 White House elections, producing far-reaching changes in the way campaigns approach advertising, fund-raising, the mobilizing of supporters and even the spreading of negative information.

Democrats and Republicans are sharply increasing their use of e-mail, interactive Web sites, candidate and party blogs, and text messaging to raise money, organize get-out-the-vote efforts and assemble crowds for rallies. The Internet, they say, appears to be far more efficient, and less costly, than the traditional tools of politics, notably door knocking and telephone banks.

Analysts say the campaign television advertisement, already diminishing in influence with the proliferation of cable stations, faces new challenges as campaigns experiment with technology that allows direct messaging to more specific audiences and through unconventional means.

Those include podcasts featuring a daily downloaded message from a candidate and so-called viral attack videos, designed to set off peer-to-peer distribution by e-mail chains, without being associated with any candidate or campaign.

Campaigns are now studying popular Internet social networks, like Friendster and Facebook, as ways to reach groups of potential supporters with similar political views or cultural interests.

President Bush's media consultant, Mark McKinnon, said television advertising, while still crucial to campaigns, had become markedly less influential in persuading voters than it was even two years ago.

"I feel like a woolly mammoth," Mr. McKinnon said.

What the parties and the candidates are undergoing now is in many ways similar to what has happened in other sectors of the nation — including the music industry, newspapers and retailing — as they try to adjust to, and take advantage of, the Internet as its influence spreads across American society. To a considerable extent, they are responding to, and playing catch up with, bloggers who have demonstrated the power of their forums to harness the energy on both sides of the ideological divide.

Certainly, the Internet was a significant factor in 2004, particularly with the early success in fund-raising and organizing by Howard Dean, a Democratic presidential contender. But officials in both parties say the extent to which the parties have now recognized and rely on the Internet has increased at a staggering rate over the past two years.

The percentage of Americans who went online for election news jumped from 13 percent in the 2002 election cycle to 29 percent in 2004, according to a survey by the Pew Research Center after the last presidential election. A Pew survey released earlier this month found that 50 million Americans go to the Internet for news every day, up from 27 million people in March 2002, a reflection of the fact that the Internet is now available to 70 percent of Americans.

This means, aides said, rethinking every assumption about running a campaign: how to reach different segments of voters, how to get voters to the polls, how to raise money, and the best way to have a candidate interact with the public.

In 2004, John Edwards, a former Democratic senator from North Carolina and his party's vice presidential candidate, spent much of his time talking to voters in living rooms in New Hampshire and Iowa; now he is putting aside hours every week to videotape responses to videotaped questions, the entire exchange posted on his blog.

"The effect of the Internet on politics will be every bit as transformational as television was," said Ken Mehlman, the Republican national chairman. "If you want to get your message out, the old way of paying someone to make a TV ad is insufficient: You need your message out through the Internet, through e-mail, through talk radio."

Michael Cornfield, a political science professor at George Washington University who studies politics and the Internet, said campaigns were actually late in coming to the game.

"Politicians are having a hard time reconciling themselves to a medium where they can't control the message," Professor Cornfield said. "Politics is lagging, but politics is not going to be immune to the digital revolution."

If there was any resistance, it is rapidly melting away.

Mark Warner, the former Democratic governor of Virginia, began preparing for a potential 2008 presidential campaign by hiring a blogging pioneer, Jerome Armstrong, a noteworthy addition to the usual first wave of presidential campaign hiring of political consultants and fund-raisers.

Mr. Warner is now one of at least three potential presidential candidates — the others are the party's 2004 presidential and vice presidential candidates, Senator John Kerry of Massachusetts and Mr. Edwards — who are routinely posting what aides say are their own writings on campaign blogs or on public blogs like the Daily Kos, the nation's largest political blog.

Analysts said that the Internet appeared to be a particularly potent way to appeal to new, young voters, a subject of particular interest to both parties in these politically turbulent times. In the 2004 campaign, 80 percent of people ages 18 to 34 who contributed to Mr. Kerry's campaign made their contributions online, said Carol Darr, director of the Institute for Politics, Democracy and the Internet at George Washington University.

Not incidentally, as it becomes more integrated in American politics, the Internet is being pressed into service for the less seemly side of campaigns.

Both parties have set up Web sites to discredit opponents. In Tennessee, Republicans spotlighted what they described as the lavish spending habits of Representative Harold E. Ford Jr. with a site called www.fancyford.com. That site drew 100,000 hits the first weekend, and extensive coverage in the Tennessee press, which is typically the real goal of creating sites like this. And this weekend, the Republicans launched a new attack site, www.bobsbaggage.com, that is aimed at Senator Robert Menendez of New Jersey and focused on ethics accusations against him.

For their part, Democrats have set up decoy Web sites to post documents with damaging information about Republicans. They described this means of distribution as far more efficient than the more traditional slip of a document to a newspaper reporter.

A senior party official, who was granted anonymity in exchange for describing a clandestine effort, said the party created a site, now defunct, called D.C. Inside Scoop to, among other things, distribute a document written by Senator Mel Martinez, Republican of Florida, discussing the political benefits of the Terri Schiavo case. A second such site, capitolbuzz.blogspot.com, spread more mischievous information: the purported sighting of Senator Rick Santorum, a Pennsylvania Republican, parking in a spot reserved for the handicapped.

On the left in particular, bloggers have emerged as something of a police force guarding against disloyalty among Democrats, as Steve Elmendorf, a Democratic consultant, learned after he told The Washington Post that bloggers and online donors "are not representative of the majority you need to win elections."

A Daily Kos blogger wrote: "Not one dime, ladies and gentlemen, to anything connected with Steve Elmendorf. Anyone stupid enough to actually give a quote like that deserves to have every single one of his funding sources dry up."

Asked about the episode, Mr. Elmendorf insisted that the posting had not hurt his business, but added, "Since I got attacked on them, I read blogs a lot more and I find them very useful."

One of the big challenges to the campaigns is not only adjusting to the changes of the past two years but also anticipating the kind of technological changes that may be on hand by the next presidential campaign. Among those most cited is the ability of campaigns to beam video advertisements to cellphones.

"All these consultants are still trying to make sense of what blogs are, and I think by 2008 they are going to have a pretty good idea: They are going to be like, 'We're hot and we're hip and we're bloggin',' " said Markos Moulitsas, the founder of the Daily Kos. "But by 2008, the blogs are going to be so institutionalized, it's not going to be funny."

Bloggers, for all the benefits they may bring to both parties, have proved to be a complicating political influence for Democrats. They have tugged the party consistently to the left, particularly on issues like the war, and have been openly critical of such moderate Democrats as Senator Joseph I. Lieberman of Connecticut.

Still, Democrats have been enthusiastic about the potential of this technology to get the party back on track, with many Democratic leaders arguing that the Internet is today for Democrats what talk radio was for Republicans 10 years ago.

"This new media becomes much more important to us because conservatives have been more dominant in traditional media," said Simon Rosenberg, the president of the centrist New Democratic Network. "This stuff becomes really critical for us."

For all the attention being paid to Internet technology, there remain limitations to its reach. Internet use declines markedly among Americans over 65, who tend to be the nation's most reliable voters. Until recently, it tended to be more heavily used by middle- and upper-income people.

And while the Internet is efficient at reaching supporters, who tend to visit and linger at political sites, it has proved to be much less effective at swaying voters who are not interested in politics.

"The holy grail that everybody is looking for right now is how can you use the Internet for persuasion," said Mr. Armstrong, the Warner campaign Internet adviser.

In this age of multitasking, voters are not as captive to a Web site as they may be to a 30-second television advertisement or a campaign mailing. That was a critical lesson of the collapse of Mr. Dean's presidential campaign, after he initially enjoyed great Internet success in raising money and drawing crowds.

"It's very easy to look at something and just click delete," said Carl Forti, a spokesman for the National Republican Congressional Committee. "At least if they are taking out a piece of mail, you know they are taking it out and looking at it on the way to the garbage can."

    Internet Injects Sweeping Change Into U.S. Politics, NYT, 2.4.2006, http://www.nytimes.com/2006/04/02/washington/02campaign.html?hp&ex=1144040400&en=084f5d4d5902cc23&ei=5094&partner=homepage


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Jazmyn Johnson, 9, recently helped her mother, Barbara,
use their high-speed DSL Internet connection at their home in Duluth, Ga.

Erik S. Lesser The New York Times        March 31, 2006

Blacks Turn to Internet Highway, and Digital Divide Starts to Close        NYT

31.3.2006
http://www.nytimes.com/2006/03/31/us/31divide.html
 

 

 

 

 

 

 

 

 

 

 

 

 

Blacks Turn to Internet Highway,

and Digital Divide Starts to Close

 

March 31, 2006
The New York Times
By MICHEL MARRIOTT

 

African-Americans are steadily gaining access to and ease with the Internet, signaling a remarkable closing of the "digital divide" that many experts had worried would be a crippling disadvantage in achieving success.

Civil rights leaders, educators and national policy makers warned for years that the Internet was bypassing blacks and some Hispanics as whites and Asian-Americans were rapidly increasing their use of it.

But the falling price of laptops, more computers in public schools and libraries and the newest generation of cellphones and hand-held devices that connect to the Internet have all contributed to closing the divide, Internet experts say.

Another powerful influence in attracting blacks and other minorities to the Internet has been the explosive evolution of the Internet itself, once mostly a tool used by researchers, which has become a cultural crossroad of work, play and social interaction.

Studies and mounting anecdotal evidence now suggest that blacks, even some of those at the lower end of the economic scale, are making significant gains. As a result, organizations that serve African-Americans, as well as companies seeking their business, are increasingly turning to the Internet to reach out to them.

"What digital divide?" Magic Johnson, the basketball legend, asked rhetorically in an interview about his new Internet campaign deal with the Ford Motor Company's Lincoln Mercury division to use the Internet to promote cars to black prospective buyers.

The sharpest growth in Internet access and use is among young people. But blacks and other members of minorities of various ages are also merging onto the digital information highway as never before.

According to a Pew national survey of people 18 and older, completed in February, 74 percent of whites go online, 61 percent of African-Americans do and 80 percent of English-speaking Hispanic-Americans report using the Internet. The survey did not look at non-English-speaking Hispanics, who some experts believe are not gaining access to the Internet in large numbers.

In a similar Pew survey in 1998, just 42 percent of white American adults said they used the Internet while only 23 percent of African-American adults did so. Forty percent of English-speaking Hispanic-Americans said they used the Internet.

Despite the dissolving gap, some groups like the Intel Computer Clubhouse Network, which introduces digital technologies to young people, say the digital divide is still vast in more subtle ways. Instant messaging and downloading music is one thing, said Marlon Orozco, program manager at the network's Boston clubhouse, but he would like to see black and Hispanic teenagers use the Internet in more challenging ways, like building virtual communities or promoting their businesses.

Vicky Rideout, vice president of the Henry J. Kaiser Family Foundation, which has studied Internet use by race, ethnicity and age, cautioned that a new dimension of the digital divide might be opening because groups that were newer to the Internet tended to use less-advanced hardware and had slower connection speeds.

"The type and meaningful quality of access is, in some ways, a more challenging divide that remains," Ms. Rideout said. "This has an impact on things like homework."

In addition, Internet access solely at institutions can put students at a disadvantage. Schools and other institutions seldom operate round the clock, seven days a week, which is especially an issue for students, said Andy Carvin, coordinator for the Digital Divide Network, an international group that seeks to close the gap.

But not everyone agrees that minorities tend toward less-advanced use of the Internet. Pippa Norris, a lecturer on comparative politics at Harvard who has written extensively about the digital divide, said members of minorities had been shown to use the Internet to search for jobs and to connect to a wide variety of educational opportunities.

"The simple assumption that the Internet is a luxury is being disputed by this group," Ms. Norris said.

The divide was considered so dire a decade ago that scholars, philanthropists and even President Bill Clinton in his 1996 State of the Union address fretted over just what the gap would mean in lost educational and employment opportunities for young people who were not wired.

In an effort to help erase the divide, the federal government has provided low-cost connections for schools, libraries, hospitals and health clinics, allocated money to expand in-home access to computers and the Internet for low-income families and given tax incentives to companies donating computer and technical training and for sponsoring community learning centers.

As a result of such efforts, "most kids, almost all kids, have a place in which they can go online and have gone online," said Ms. Rideout of the Kaiser foundation.

Jason Jordan of Boston is one of the young people closing the divide. Jason, 17, who is black, is getting a used computer from an older brother. He said he had wanted a computer for years, since "I heard about a lot that I was missing."

Jason said he had access to the Internet at school, where he is pursuing a general equivalency diploma, but looked forward to having his own computer and Web access at his home in the Dorchester section of Boston. "I can work in my own place and don't have to worry about the time I'm online," he said.

Like Jason, almost 9 out of 10 of the 21 million Americans ages 12 to 17 use the Internet, according to a report issued in July by the Pew Internet and American Life Project. Of them, 87 percent of white teenagers say they use the Internet, while 77 percent of black teenagers and 89 percent of Hispanic teenagers say they have access to it, the report said.

The gap in access among young Americans is less pronounced than among their parents' generation, said Susannah Fox, associate director of the Pew project. "Age continues to be a strong predictor for Internet use," Ms. Fox said.

While, overall Internet use among blacks still significantly trails use among whites, the shrinking divide is most vividly reflected in the online experience of people like Billy and Barbara Johnson. Less than two years ago, the Johnsons, who are black, plugged into the Internet in their upscale suburban home near Atlanta for the first time. Mrs. Johnson, a 52-year-old mother of four and homemaker, said she felt she had little choice because her school-age children needed to use the Internet for research.

And then there is e-mail. "No one really wants to take the time anymore to pick up the phone and keep in touch," lamented Mrs. Johnson, who said that so much of the communications with her children's school was done through e-mail correspondence. "I felt like I was pretty much forced into it."

Even so, Mrs. Johnson said her husband, an assistant coach for the Atlanta Falcons, still chided her when she neglected to check her e-mail at least every day.

Ms. Norris and other experts on Internet use see progress on the horizon. They note that the declining cost of laptop and other computers, and efforts, like those in Philadelphia, to provide low-cost wireless Internet access, are likely to increase online access for groups that have been slow to connect.

Philanthropic efforts have also helped to give more people Internet access. For example, the Bill and Melinda Gates Foundation has awarded $250 million since 1997 for American public libraries to create Internet access for the public. Martha Choe, the foundation's director of global libraries, said some 47,000 computers had been bought for 11,000 libraries. Today, Ms. Choe said, most libraries in the United States have public Internet access.

Education levels remain a major indicator of who is among the 137 million Americans using the Internet and who is not, said Ms. Fox.

There is also a strong correlation, experts say, between household income and Internet access.

With so many more members of minorities online, some Web sites are trying to capitalize on their new access. For example, the New York/New Jersey region of the State of the African American Male, a national initiative to improve conditions for black men, is encouraging men to use digital equipment to "empower themselves" to better their lives. The site, which includes studies, public policy reports and other information about issues related to black men, promotes using digital cameras, mobile phones and iPods, but mainly computers, to organize through the Internet, said Walter Fields, vice president for government relations for the Community Service Society, an antipoverty organization, and a coordinator of the black-male initiative. Users are encouraged to submit articles, write blogs and upload pertinent photographs and video clips.

"What we're doing is playing against the popular notion of a digital divide," Mr. Fields said. "I always felt that it was a misnomer."

    Blacks Turn to Internet Highway, and Digital Divide Starts to Close, NYT, 31.3.2006, http://www.nytimes.com/2006/03/31/us/31divide.html?hp&ex=1143781200&en=ead60b6a64ccf2ea&ei=5094&partner=homepage

 

 

 

 

 

Google, Once a Maverick, Joins Lobbying Herd

 

March 28, 2006
The New York Times
By KATE PHILLIPS

 

WASHINGTON, March 27 — For a company that takes pride in being the quintessential outsider, Google is moving quickly into the ultimate insider's game: lobbying.

Started less than a decade ago in a Stanford dorm room, Google has evolved into a multibillion-dollar business, its search engine ubiquitous on the Internet. Its sprawling growth, fueled by a public stock offering in August 2004 that created a market behemoth, has now thrust it into the glare of Washington.

As lawmakers and regulators begin eyeing its ventures in China and other countries and as its Web surfers worry about the privacy of their online searches, Google is making adjustments that do not fit neatly with its maverick image.

It has begun ramping up its lobbying and legislative operations after largely ignoring Washington for years, in a scramble to match bases long established here by competitors like Yahoo and Microsoft, as well as the deeply entrenched telecommunication companies.

Google has hired politically connected lobbying firms and consultants with ties to Republican leaders like the party chairman, Ken Mehlman; Speaker J. Dennis Hastert; and Senator John McCain; and advisers say the company may set up a fund-raising arm for political donations to candidates. And in a town where Republicans hold the levers of power, Google has begun stockpiling pieces of the party's machine.

To some, Google is a novice arriving late to the table. To others, the company's embedding on K Street, which serves as home to many of Washington's top lobbyists, represents a new and not necessarily welcome sign of sophistication.

"It's sad," said Esther Dyson, editor of the technology newsletter Release 1.0 and former chairwoman of Icann, a nonprofit group that plays a role in Internet administration. "The kids are growing up. They've lost youth and innocence. Now they have to start being grown-ups and playing at least to some extent by grown-up rules."

In doing so, Google provides another example of how Internet companies, no matter how unconventional their roots or nonconformist their corporate cultures, increasingly find themselves wrestling with the same forces in Washington that more traditional industries have long faced. Google's executives consider the moves necessary as they achieve a prominence that allows them to elbow their own interests onto the political stage.

"We've staked out an agenda that really is about promoting the open Internet as a revolutionary platform for communication," said Alan Davidson, brought on board less than a year ago as the company's policy counsel to set up offices in the Penn Quarter area of Washington. "It's been the growth of Google as a company and as a presence in the industry that has prompted our engagement in Washington."

Even as they emphasize policy over politics to raise their profile, Google executives and advisers are also fully aware that they are embracing the lobbying world at a time when it has been rocked by the Jack Abramoff scandal of influence peddling. Some advisers say the company may wait until after Congress decides whether or how to overhaul lobbying laws before it wades more deeply into fund-raising and politics.

With its stock price closing on Monday near $370 a share and its vaulting onto the Standard & Poor's 500 stock index this week, the company also cannot afford to be caught flat-footed by regulatory agencies or its competitors.

"They are brilliant engineers," said Lauren Maddox, a principal in the bipartisan lobbying firm Podesta Mattoon that was hired by Google last year. "They are not politicians."

In signing on Podesta Mattoon and other consultants, Google is spreading its lobbying dollars on both sides of the political aisle, increasing its spending on outside firms this year to well beyond $500,000, officials said, although that does not include its own new office complex or payments to some of the consulting groups being added on. (By comparison, the giant Microsoft spent almost $9 million last year in lobbying, and Yahoo spent more than $1 million for just part of last year, according to partial-year filings compiled by PoliticalMoneyLine, an independent campaign finance Internet site.)

Podesta Mattoon is led by Anthony Podesta, a Democrat, and Daniel Mattoon, a Republican and longtime friend of Speaker Hastert, an Illinois Republican. The speaker's son Joshua also works at the firm, along with Ms. Maddox, a former top aide to Newt Gingrich.

Adding to its arsenal is the DCI Group, a firm with top-flight corporate clients and strong ties to Mr. Mehlman and Karl Rove, President Bush's senior political adviser. DCI, Google officials say, will help it establish links to Republicans, as well as promote its book search project, an effort to make the full text of books searchable online, among publishers and authors.

At the helm of that operation is Stuart Roy, senior vice president of DCI and a former aide to Representative Tom DeLay, Republican of Texas. Mr. Roy also counts as a client Progress for America, the conservative group that successfully rallied grass-roots support for Mr. Bush's Supreme Court nominees.

Ms. Maddox said Google's emerging army of advisers would help it fight fires along several policy lines, including copyright law, access to the Internet and privacy issues like its successful court fight this month to narrow a Justice Department subpoena over disclosure of its users' searches.

"We have a team of Republicans and Democrats who are helping them sort out these issues," Ms. Maddox said, an effort that recognizes that the "policy process is an extension of the market battlefield."

The big Internet companies, including Google, are bracing for an uphill struggle with lawmakers and the titans of the telephone and cable industries over whether fees should be charged for heavy data traffic, like video streaming over broadband width.

"Our belief is that this is going to be an issue of great concern for consumers," Mr. Davidson said. "The telephone companies have been lobbying these committees for generations. Our industry is very young."

Google's political awakening was nowhere more evident than on Capitol Hill last month, when it, Microsoft, Cisco Systems and Yahoo were slammed by Republicans and Democrats alike over business dealings in China. Elliot Schrage, vice president for global communications and public affairs at Google, was lashed repeatedly with the company's motto, "Don't Be Evil," as House members accused the corporations of abetting China's government in censoring Internet communications and imperiling the safety of Chinese Internet surfers.

It is an issue that Google and others know will not go away soon. Representative Christopher H. Smith, Republican of New Jersey, and other legislators are demanding that Internet companies be more sensitive when dealing with foreign countries.

"I think they are just going to lobby to spread this yarn that by being there, they're going to spread democracy," said Mr. Smith, who presided at the hearing. "This dictatorship can go on for generations if it's not unchecked."

Mr. Davidson said companies were trying to address the prickly subject. "I think we all said in our testimony that we were serious about trying to work out standards for engaging in countries where these kinds of censorship issues come up," he said.

By some accounts, China may be so radioactive that even a longstanding relationship with Congress would not have tempered that hostile reception. But "the lack of a presence is what they recognized needed to get remedied fast," said Harry W. Clark, managing partner of the Stanwich Group, who has just been hired as a management consultant for Google. A veteran adviser to Internet corporations, Mr. Clark is a tightly connected Republican who worked in the Bush administration and who is now doing volunteer work for Senator McCain, an Arizona Republican.

Google's recruitment of heavy hitters in the nation's capital has not stopped. While it had already retained the firms of Public Policy Partners and Capital Tax Solutions, the headhunter Russell Reynolds Associates is in the midst of a search to fill a senior position alongside Mr. Davidson. Mr. Clark also predicted that Google would name a political director, probably a Republican.

Because some Republicans still view the company as Democratic-leaning, citing the 2004 election analyses that showed nearly all its employees' contributions went to Democrats, the company will be careful, Mr. Clark said, to spread its wealth around.

"The folks I've talked to," he added, "everybody recognizes that the employee contributions were weighted heavily toward Democrats, and they're waiting to see a course correction."

And despite the climate of indictments and investigations that pervades K Street right now, industry experts say Google has no choice but to get into the arena.

Rhett Dawson, president of the Information Technology Industry Council, admonished that lobbying was not "a dirty word." Google, Mr. Dawson noted, "is quickly going through a maturation phase that a lot of companies have gone through that shows it pays to pay attention to Washington or it can hurt you in ways that don't reflect well on you."

He added, "It doesn't have to be a system that makes you embarrassed to talk to your mother about."

    Google, Once a Maverick, Joins Lobbying Herd, NYT, 28.3.2006, http://www.nytimes.com/2006/03/28/politics/28google.html?hp&ex=1143522000&en=a42616ed1d4aaf20&ei=5094&partner=homepage

 

 

 

 

 

Google avoids surrendering search requests

 

Posted 3/17/2006 10:59 PM
USA Today

 

SAN FRANCISCO (AP) — A federal judge on Friday ordered Google Inc. to give the Bush administration a peek inside its search engine, but rebuffed the government's demand for a list of people's search requests — potentially sensitive information that the company had fought to protect.

In his 21-page ruling, U.S. District Judge James Ware told Google to provide the U.S. Justice Department with the addresses of 50,000 randomly selected websites indexed by its search engine by April 3.

The government plans to use the data for a study in another case in Pennsylvania, where the Bush administration is trying to revive a law meant to shield children from online pornography.

Ware, though, decided Google won't have to disclose what people have been looking for on its widely used search engine, handing a significant victory to the company and privacy rights advocates.

"This is a clear victory for our users," Nicole Wong, Google's associate general counsel said in a statement Friday.

Attempts to reach a spokesman for the Justice Department late Friday weren't immediately successful.

The government had asked for the contents of 5,000 randomly selected search requests, dramatically scaling back its initial demands after Google's vehement protests gained widespread attention.

When the Justice Department first turned to Ware for help in January, the government wanted an entire week's worth of Google search requests — a list that would encompass queries posed by millions of people.

    Google avoids surrendering search requests, UT, 17.3.2006, http://www.usatoday.com/tech/news/internetprivacy/2006-03-17-google-justice_x.htm

 

 

 

 

 

Judge Lets U.S. Have Google Info

 

March 15, 2006
The New York Times
By KATIE HAFNER

 

SAN JOSE, Calif., March 14 — After the Justice Department drastically reduced its request for information from Google, a federal judge said on Tuesday that he intended to approve at least part of that request.

The government first subpoenaed Web data from Google last August, as part of its defense of an online pornography law.

At a hearing in Federal District Court here, Judge James Ware said that in supporting the government's more limited request, he would nonetheless pay attention to Google's concerns about its trade secrets and the privacy of its users.

The government is now requesting a sample of 50,000 Web site addresses in Google's index instead of a million, which it was demanding until recently. And it is asking for just 5,000 search queries, compared with an earlier demand for an entire week of queries, which could amount to billions of search terms.

A Justice Department lawyer said at the hearing that the government would review just 10,000 Web sites and 1,000 search queries out of those turned over.

It intends to use the data in a study to measure the effectiveness of software that filters out pornographic Web sites. The government says it is not seeking information that would "personally identify" individuals.

"It is my intent to grant some relief to the government," Judge Ware said, "given the narrowing that has taken place with the request and its willingness to compensate Google for whatever burden that imposes."

He said, however, that he was well aware that the request for individual search terms from Google had raised privacy concerns. He appeared to be less troubled about the release of Web site addresses.

He said he was particularly concerned about perceptions by the public that Web searches could be subject to government scrutiny, "so I'll pay particular attention to that part of it." The judge said that he would issue a full decision shortly, but did not give a date.

Google stock closed at $351.16, up $14.10, or 4.2 percent.

Three of Google's competitors in Internet search technology — the America Online unit of Time Warner, Yahoo and MSN, Microsoft's online service — have complied with subpoenas in the case. None of those companies have indicated how much data was turned over to the government.

Albert Gidari, a lawyer representing Google at the hearing, said in an interview afterward that he had been surprised by the large reduction in the number of Web site addresses, or U.R.L.'s, and search queries the government was requesting.

The revised request appeared in a footnote to a declaration filed with the court on Feb. 24 by Philip B. Stark, a statistician the Justice Department had hired to study search engine data.

The reduced data request had not come up in direct discussions between Google and the Justice Department. But it appears that Google's well-publicized resistance forced the department to modify its position.

The new request substantially mitigates Google's concerns over trade secrets, Mr. Gidari said, adding that "99.99 percent of Google is unexposed, and this teeny sliver will tell them nothing."

"This would have been a very different case if the government walked in the door and said, 'We need 50,000 U.R.L.'s and a thousand searches,' " Mr. Gidari said. "It's doubtful we would have been in court. We got to where we wanted."

The Web data study is part of a continuing lawsuit in which the government is defending the Child Online Protection Act, a 1998 law under which it is a crime to make "material that is harmful to minors" commercially available on the Web. The lawsuit was brought by the American Civil Liberties Union, among others.

The act has faced repeated legal challenges. Opponents contend that filtering software could protect minors effectively enough to make the law unnecessary.

Two years ago, the Supreme Court upheld an injunction blocking the law's enforcement and returned the case to a district court for further examination of Internet-filtering technology that might be another way to achieve the law's aims. At a trial scheduled to begin in October, the government will try to prove that filters are ineffective.

"Given the slight amount of information now sought by the government, Google's burden arguments seem less persuasive than they might be," said Susan P. Crawford, a professor at the Cardozo School of Law at Yeshiva University.

At one point in the hearing, Judge Ware asked Joel McElvain, the lawyer for the government, why the Justice Department needed the Google data when it already had information from three other companies. Mr. McElvain said that although the government had enough information to do its study, it "would be substantially improved if we had the data from Google" because Google commands nearly half the search market.

Judge Ware appeared to sympathize with Google's concern that it could become entangled in the underlying lawsuit over the Child Online Protection Act, although it is not a party to the suit.

The judge also sought specific assurance from Mr. McElvain that the government would not use information contained in search queries for other investigations.

If a search query appeared to suggest a connection between a particular person and Osama bin Laden, the judge asked him, "are you telling me the government would ignore that and not use it?" Mr. McElvain assured him that the government would not.

Mr. McElvain said at the hearing that the government would pay Google for the effort needed to put the information together.

"We're very encouraged," said Nicole Wong, associate general counsel at Google. "At a minimum we have come a long way from the government's initial subpoena. If it had started this way, it would have been a very different discussion."

Still, Ms. Crawford said that even the relatively small amount of data demanded posed a troubling prospect. "The government has been able to commandeer private parties to assist it in its research, and the next request may be far broader," she said.

Aden J. Fine, a lawyer for the American Civil Liberties Union, was more optimistic.

"The mere fact that Google has stood up to the government is a positive thing," Mr. Fine said. "The government cannot simply demand that third parties give information without providing a sufficient justification for why they need it, and that's the theme that will hopefully resonate from this hearing, whichever way the judge rules."

    Judge Lets U.S. Have Google Info, NYT, 15.3.2006, http://www.nytimes.com/2006/03/15/technology/15google.html

 

 

 

 

 

Google, Justice Dept. face off on search/privacy issue

 

Posted 3/13/2006 8:45 PM Updated 3/13/2006 10:14 PM
USA TODAY
By Jon Swartz

 

SAN FRANCISCO — Google and the Justice Department will square off in federal court Tuesday in a seminal Internet privacy case that could touch millions of Americans.

The Bush administration is demanding the results of millions of searches on Google during a random week to buttress an online child-protection law blocked by the U.S. Supreme Court. Its reasoning: Internet filters don't properly shield kids from viewing pornography. (Survey: Do you think Google should hand over its search results to the Bush administration?)

Google has resisted, citing competitive and privacy concerns, in a dispute that has escalated in a series of legal maneuvers since January. The American Civil Liberties Union says it will urge the court to reject the government's bid at a hearing in San Jose, Calif. A ruling could come on Tuesday.

Privacy advocates are worried Internet search engines could become tools for government snooping and spawn a wave of subpoenas by individuals against search engine companies.

More significantly, the case undercuts the basic Internet tenet of anonymity, says Evan Hendricks, editor of newsletter Privacy Times. If the government has its way, he says, the Internet could be used as a digital microscope to seek out people. A Justice Department spokesman had no comment.

In an 18-page court filing Feb. 24, Justice lawyers argued privacy rights would not be trampled because the information requested would not identify individuals or be traceable.

The brief includes a declaration by Philip Stark, a researcher and statistics professor at the University of California at Berkeley, who says the government specifically asked that Google remove any identifying information from the search requests.

AOL, Yahoo  and Microsoft MSN are cooperating with the government. They say that their assistance is limited and that the privacy of their users has not been violated.

But as the largest and most influential search engine, Google has significantly more at stake. "This case will make it clear how much information is collected and stored on Google searches," says Paul Schiff Berman, an expert in cyberlaw at the University of Connecticut School of Law.

Berman and other legal experts say the consequences could be far-reaching for U.S. residents on several levels. The government might delve into the vast stores of Web-browsing data to look for individuals who are national security risks or engaged in criminal activity. Divorce lawyers also could subpoena search-engine providers for e-mail and browsing records to investigate the fidelity of a spouse.

"It creates a logistical problem for Google by putting it in the position of being an extension of law enforcement," Berman says. "Of course, because Google is mining data for commercial purposes, it could put an end to its troubles if it stopped collecting data."

    Google, Justice Dept. face off on search/privacy issue, UT, 13.3.2006, http://www.usatoday.com/tech/news/internetprivacy/2006-03-13-google-justice-case_x.htm

 

 

 

 

 

Google agrees to pay $90 mln in "click fraud" suit

 

Wed Mar 8, 2006 11:28 PM ET
Reuters
By Eric Auchard

 

SAN DIEGO (Reuters) - Google Inc. said on Wednesday it had agreed to pay up to $90 million to settle its part of an industrywide lawsuit alleging Web search companies overcharge some advertisers by billing them for false customer leads.

Google's proposed class action settlement stems from a suit filed a year ago by several plaintiffs, including Lane's Gifts and Collectibles, in an Arkansas state court. It covers abuse of Google's pay-per-click advertising system by outside parties.

The deal aims to resolve all outstanding claims against Google for so-called "click fraud" dating back to 2002, a spokesman said, but similar claims against the Mountain View, California-based company are outstanding in other courts.

At issue is "click fraud," the abuse of search advertising systems for the purpose of driving up advertiser fees.

It involves a malicious party repeatedly clicking on an advertising link -- either manually or using robots -- and so generating a commission payment with each click.

Plantiffs argue Google and other search providers indirectly benefit from click fraud by doing too little to thwart it.

The $90 million would involve legal fees and credits -- rather than any cash payments -- to any of its advertisers who apply to be part of the class settlement, once the judge certifies the agreement, Google spokesman Steve Langdon said.

Also named in the original lawsuit were the search businesses of Yahoo Inc., and lesser players Walt Disney Co., Lycos Inc., LookSmart Ltd. and Findwhat.com Inc., which is now known as MIVA Inc..

A spokeswoman for Yahoo said her company was prepared to continue to defend itself against the legal action. A spokesman for Disney could not immediately be reached.

Google's proposed settlement deal would also cover Google ad search partners including America Online and Ask.com who were also originally named in the suit, which alleged that click fraud was a widespread Internet industry practice.

The case covers all advertisers using Google's pay-per-click advertising system from February 2002 through the date when the judge certifies the settlement. The final settlement hearing is expected to take place in coming weeks.

 

PAY-PER-CLICK

Google counts thousands of advertisers on its system but declines to disclose any actual numbers. The vast majority of Google's revenues, around 97 percent, are the result of pay-per-click ads.

Critics have said the threat of click fraud is the single greatest risk to Google's advertising-dependent business model. But the company has downplayed the risk, saying only a small percentage of the clicks on its search ads are fraudulent.

Google is the most popular provider of Web search. It makes money largely by selling small text based ads along the edges of search results pages on Google or on many partner sites who run Google ads on their own Web pages.

In a statement on Google's Web site, Nicole Wong, associate general counsel, said the company would extend the deadline so all advertising customers over the past four years can apply for reimbursement for ad clicks they believe were invalid.

Under its existing policy, advertisers had 60 days to recoup any such losses. Instead, Google would offer credits regardless of when the click fraud occurred, Wong said. The credits can be used by advertisers to buy new ads from Google.

"We do not know how many will apply and receive credits, but under the agreement, the total amount of credits, plus attorneys fees, will not exceed $90 million," Wong said.

Google has reported more than $7 billion in revenue during its first five quarters as a public company and has generated billions of dollars more since the system was first launched four years ago.

Yahoo spokeswoman Gaude Paez said nothing had changed as far as her company's willingness to pursue the case.

"We stand firmly by our proprietary click protection and look forward to vigorously defending our position in court," she said.

    Google agrees to pay $90 mln in "click fraud" suit, R, 8.3.2006, http://today.reuters.com/business/newsarticle.aspx?type=ousiv&storyID=2006-03-09T042929Z_01_N08534695_RTRIDST_0_BUSINESSPRO-GOOGLE-CLICKFRAUD-DC.XML

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Andy Singer, NO EXIT        Cagle        2.3.2006
http://cagle.msnbc.com/
politicalcartoons/PCcartoons/singer.asp

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Cyberthieves Silently Copy as You Type

 

February 27, 2006
The New York Times
By TOM ZELLER Jr.

 

Most people who use e-mail now know enough to be on guard against "phishing" messages that pretend to be from a bank or business but are actually attempts to steal passwords and other personal information.

But there is evidence that among global cybercriminals, phishing may already be passι.

In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con — the use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks. These programs are often hidden inside other software and then infect the machine, putting them in the category of malicious programs known as Trojan horses, or just Trojans.

Two weeks ago, Brazilian federal police descended on the northern city of Campina Grande and several surrounding states, and arrested 55 people — at least 9 of them minors — for seeding the computers of unwitting Brazilians with keyloggers that recorded their typing whenever they visited their banks online. The tiny programs then sent the stolen user names and passwords back to members of the gang.

The fraud ring stole about $4.7 million from 200 different accounts at six banks since it began operations last May, according to the Brazilian police. A similar ring, broken up by Russian authorities earlier this month, used keylogging software planted in e-mail messages and hidden in Web sites to draw over $1.1 million from personal bank accounts in France.

These criminals aim to infect the inner workings of computers in much the same way that mischief-making virus writers do. The twist here is that the keylogging programs exploit security flaws and monitor the path that carries data from the keyboard to other parts of the computer. This is a more invasive approach than phishing, which relies on deception rather than infection, tricking people into giving their information to a fake Web site.

The monitoring programs are often hidden inside ordinary software downloads, e-mail attachments or files shared over peer-to-peer networks. They can even be embedded in Web pages, taking advantage of browser features that allow programs to run automatically.

"These Trojans are very selective," said Cristine Hoepers, general manager of Brazil's Computer Emergency Response Team, which runs under the auspices of the country's public-private Internet Steering Committee. "They monitor the Web access the victims make, and start recording information only when the user enters the sites of interest to the fraudster." She added: "In Brazil, we are rarely seeing traditional phishing."

According to data compiled by computer security companies in 2005, the use of "crimeware" like keyloggers to steal user names and passwords — and ultimately cash — has soared. The crimes often cross international borders, and they put Internet users everywhere at risk.

"It's the wave of the future," said Peter Cassidy, the secretary general of the Anti-Phishing Working Group, a consortium of industry and law enforcement partners that fights online fraud and identity theft. "All this stuff is becoming more and more automated and more and more opaque."

Mr. Cassidy's group found that the number of Web sites known to be hiding this kind of malicious code nearly doubled between November and December, rising to more than 1,900. The antivirus company Symantec has reported that half of the malicious software it tracks is designed not to damage computers but to gather personal data. Over the course of 2005, iDefense, a unit of Verisign that provides information on computer security to government and industry clients, counted over 6,000 different keylogger variants — a 65 percent increase over 2004. About one-third of all malicious code tracked by the company now contains some keylogging component, according to Ken Dunham, the company's rapid-response director.

And the SANS Institute, a group that trains and certifies computer security professionals, estimated that at a single moment last fall, as many as 9.9 million machines in the United States were infected with keyloggers of one kind or another, putting as much as $24 billion in bank account assets — and probably much more — literally at the fingertips of fraudsters. John Bambenek, the SANS researcher who made the estimate, suggested that the infection rate was probably much higher.

In most cases, a keylogger or similar program, once installed, will simply wait for certain Web sites to be visited — a banking site, for instance, or a credit card account online — or for certain keywords to be entered — "SSN," for example — and then spring to life.

Keystrokes are saved to a file, Web forms are copied — even snapshots of a user's screen can be silently recorded. The information is then sent back to a Web site or some waiting server where a thief, or a different piece of software, sifts through the data for useful nuggets.

The Federal Deposit Insurance Corporation, responding to the growing threat of cybercrime to the financial industry, stiffened its guidelines for Internet banking in October, effectively ordering banks to do more than ask for a simple user name and password. But it stopped short of requiring, for instance, the use of electronic devices that generate numeric passcodes every 60 seconds, which many experts say would help foil much online fraud, including the use of keyloggers.

Technology for grabbing text and screen images is not new — or particularly sophisticated. Keyloggers are even sold commercially, as tools for keeping an eye on what children are doing online, or what a spouse might be doing in online chat rooms.And while most experts agree that data-swiping software is spreading rapidly, there are some who say the problem has been exaggerated.

"I get concerned that we're scaring people off the Internet," said Alex Eckelberry, the president of Sun-Belt Software, a maker of antispyware software based in Clearwater, Fla. Mr. Eckelberry believes that the infection rate is probably far lower than most estimates indicate, in part because the trend is hard to measure and so many computers are already protected.

"There's a lot of hyperbole out there," he said, adding that his company has identified only about 30 keyloggers over the last six months, most being variations on a piece of code known as Winldra.exe.

That code proudly bears the copyright signature of its creators, "Smash and Sars," who also happen to be the proprietors of a Russian site, RATSystems.org, which is well-known among traders at online swap meets like theftservices.com and carders.ws/forum that traffic in confidential personal data — or the means to steal it.

"Smash is one of the revolutionaries," said one member of a trading site, who insisted on anonymity because the sites are often watched by law enforcement. "If you're entry-level and want a keylogger, that's who you're going to go to," he said, adding, "It's a simple, cheap way to make money."

In fact, keylogging's simplicity may be why it is suddenly so popular among thieves. "Phishing takes a lot of time and effort," said David Thomas, the chief of the computer intrusion division at the Federal Bureau of Investigation. "This type of software is a much more efficient way to get what they're after."

The programming, too, is often trivial. "These can be developed by a 12-year-old hacker," said Eugene Kaspersky, a co-founder of Kaspersky Labs, an international computer security and antivirus company based in Moscow.

Being wary of unfamiliar Web links sent via e-mail is a first-line of defense, according to experts, as is avoiding questionable downloads and keeping up to date with Windows patches and antivirus updates.

It is worth noting, however, that in a test of major antivirus programs conducted by Ms. Hoepers's group in Brazil last fall, the very best detected only 88 percent of the known keyloggers flourishing there. In this country, victims of fraudulent money transfers are typically limited to $50 in liability under the Federal Reserve's Regulation E, so long as they report the crime quickly enough — within two days. If they report it within 60 days, their liability is capped at $500.

One Florida man has had trouble getting that kind of protection. In a closely watched case, Joe Lopez, the owner of a small computer supply company in Miami, sued Bank of America after cybercrooks were able to use a keylogging Trojan planted on his business computers to swipe bank account information and transfer $90,000 to Latvia.

Bank of America says it does not need to cover the loss because Mr. Lopez was a business customer — and because it is not the bank's fault that he did not practice good computer hygiene. Mr. Lopez claims he did, and that in any case, Bank of America should have done more to warn him of the risks of computer crime. That risk is one that Mr. Kaspersky believes is in danger of getting out of hand.

"I'm afraid that if the number of criminals grows with this same speed, the antivirus companies will not be able to create adequate protection," said Mr. Kaspersky, who added that the time has come for increased investment in law enforcement and far better cross-border cooperation among investigators, who are overwhelmed by the global nature of cybercrime.

"There are more criminals on the Internet street than policemen," he said.

    Cyberthieves Silently Copy as You Type, NYT, 27.2.2006, http://www.nytimes.com/2006/02/27/technology/27hack.html?hp&ex=1141016400&en=767b2797184835f7&ei=5094&partner=homepage

 

 

 

 

 

Protecting Yourself From Keylogging Thieves

 

February 27, 2006
The New York Times
By TOM ZELLER Jr.

 

The network security firm Sophos estimates that an unprotected computer has a 40 percent chance of being infected by a malicious worm within 10 minutes of being connected to the Internet. After an hour, the odds rise to 94 percent.

That's reason enough to keep up to date with operating system patches, invest in a solid antivirus program and use a basic firewall. But even with those measures in place, malicious code — including a keylogger — can sometimes find its way onto your computer.

"There are plenty of ways to get around all of those things," said Ken Dunham, director of the rapid response team at iDefense, a unit of VeriSign that focuses on computer security information.

Most major commercial antivirus software will seek out keylogging Trojan horses, as will most of the leading antispyware packages — although they may not catch them all. Some products, like Spyware Doctor from PC Tools and SpySweeper from WebRoot Software, pay particular attention to keylogging Trojans and cost about $30.

StrikeForce Technologies, based in Edison, N.J., is developing an anti-keylogging toolbar for the Internet Explorer Web browser, called WebSecure, that promises to encrypt text from the moment it leaves the computer keyboard and send it directly to the browser. It is scheduled for release in June.

"With keyloggers, you've literally got someone sitting over your shoulder watching everything that you do," said George Waller, the executive vice president of StrikeForce. "It's no wonder why they're so popular."

The CERT Coordination Center at Carnegie Mellon University in Pittsburgh also recently posted some simple — and free — ways to tweak various Web browsers to help prevent hidden code on Web pages from invading a computer — a common tactic used by purveyors of keyloggers. The information is at cert.org/tech_tips/securing_browser/.

And for those who feel safe because they use a non- Microsoft browser? Be on guard.

"Internet Explorer used to be targeted most frequently, and a lot of people have been switching away from it," said Rob Murawski, an Internet security analyst with CERT. "But the attackers follow these trends, of course."

    Protecting Yourself From Keylogging Thieves, NYT, 27.2.2006, http://www.nytimes.com/2006/02/27/technology/27hackside.html

 

 

 

 

 

Justice Dept. Rejects Google's Privacy Issues

 

February 26, 2006
By THE ASSOCIATED PRESS
The New York Times

 

SAN FRANCISCO, Feb. 25 (AP) — Google Inc.'s concerns that a Bush administration demand to examine millions of its users' Internet search requests would violate privacy rights are unwarranted, the Justice Department said Friday in a court filing.

The 18-page brief argued that because the information provided would not identify or be traceable to specific users, privacy rights would not be violated.

The brief was the Justice Department's reply to arguments filed by Google last week. Google has rebuffed the government's demand to review a week of its search requests.

The department believes that the information will help revive an online child protection law that the Supreme Court has blocked. By showing the wide variety of Web sites that people find through search engines, the government hopes to prove that Internet filters are not strong enough to prevent children from viewing pornography and other inappropriate material online.

The filing included a declaration by Philip B. Stark, a statistics professor at the University of California, Berkeley, who rejected the privacy concerns, noting the government specifically requested that Google remove any identifying information.

    Justice Dept. Rejects Google's Privacy Issues, NYT, 26.2.2006, http://www.nytimes.com/2006/02/26/national/26google.html

 

 

 

 

 

Google rips Justice Department in court papers

 

Posted 2/17/2006 9:06 PM Updated 2/17/2006 9:14 PM
USA Today
By Michael Liedtke, The Associated Press

 

SAN FRANCISCO — Google criticized the Bush administration's demand to examine millions of its users' Internet search requests as a misguided fishing expedition that threatens to ruin the company's credibility and reveal its closely guarded secrets.

The Mountain View, Calif.-based company delivered its indignant critique Friday in a 25-page brief that marked its initial legal response to the U.S. Justice Department's attempt to force the online search engine leader to comply with a 6-month-old subpoena.

The Justice Department has until Feb. 24 to respond to the papers that Google filed Friday. A hearing for oral arguments is scheduled March 13 before U.S. District Judge James Ware in San Jose, Calif.

The case has attracted widespread attention because the Justice Department's demand to peek under the hood of the Internet's most popular search engine has underscored the potential for online databases becoming tools for government surveillance.

Hoping to revive an online child protection law that has been blocked by the U.S. Supreme Court, the Justice Department wants a random list of the search requests made by the millions of people who visit Google during any week.

The government believes the search requests will help prove that Internet filters aren't strong enough to prevent children from accessing online pornography and other potentially offensive websites.

Yahoo, Microsoft's MSN and Time Warner's America Online already have provided some of the search engine information sought by the Justice Department. All three companies say they complied without relinquishing their users' private information.

But Google has steadfastly refused to hand over the requested information, a defiant stance that the company reaffirmed in a brief that depicts the Bush administration as heavy-handed snoops and technological rubes.

In one particularly scathing section, Google's lawyers ridiculed the government's belief that a list of search requests would help it understand the behavior of Web surfers.

"This statement is so uninformed as to be nonsensical," the lawyers wrote.

Although the Justice Department says it doesn't want any of the personal information, Google contends its cooperation would set off privacy alarms and scare away some of the traffic that has driven its success.

"If users believe that the text of their search queries into Google's search engine may become public knowledge, it only logically follows that they will be less likely to use the service," Google's lawyers wrote.

The American Civil Liberties Union, which is opposing the Bush administration's effort to revive the online child protection law, also filed a brief Friday in support of Google.

"This subpoena is the latest example of government overreaching, in which the government apparently believes it can demand that private entities turn over all sorts of information about their customers just because the government asserts that it needs the information," the ACLU's lawyers wrote.

Google also said it doubts the government would be available to shield the requested information from public scrutiny. The company maintains the data sought by the government could provide its rivals and website operators with valuable insights about how its search engine works.

As it battles the Justice Department, Google is cooperating with China's Communist government by censoring some of the search results that the company produces in a country that restricts free speech.

That odd juxtaposition has caused civil rights activists to applaud Google for defying the U.S. government while the champions of human rights and free speech jeer the company for bending to China's will.

    Google rips Justice Department in court papers, UT, 17.2.2006, http://www.usatoday.com/tech/news/techpolicy/2006-02-17-google-court-papers_x.htm

 

 

 

 

 

Increasingly, Internet's Data Trail Leads to Court

 

February 4, 2006
The New York Times
By SAUL HANSELL

 

Who is sending threatening e-mail to a teenager? Who is saying disparaging things about a company on an Internet message board? Who is communicating online with a suspected drug dealer?

These questions, and many more like them, are asked every day of the companies that provide Internet service and run Web sites. And even though these companies promise to protect the privacy of their users, they routinely hand over the most intimate information in response to legal demands from criminal investigators and lawyers fighting civil cases.

Such data led directly to a suspect in a school bombing threat; it has also been used by the authorities to track child pornographers and computer intruders, and has become a tool in civil cases on matters from trade secrets to music piracy. In St. Louis, records of a suspect's online searches for maps proved his undoing in a serial-killing case that had gone unsolved for a decade.

In short, just as technology is prompting Internet companies to collect more information and keep it longer than before, prosecutors and civil lawyers are more readily using that information.

When it comes to e-mail and Internet service records, "the average citizen would be shocked to find out how adept your average law enforcement officer is at finding information," said Paul Ohm, who recently left the Justice Department's computer crime and intellectual property section.

The issue has come to the fore because of a Justice Department request to four major Internet companies for data about their users' search queries. While America Online, Yahoo and Microsoft complied with the request, Google is resisting it. That case does not involve information that can be linked to individuals, but it has cast new light on what privacy, if any, Internet users can expect for the data trail they leave online.

The answer, in many cases, is clouded by ambiguities in the law that governs electronic communication like telephone calls and e-mail. In many cases, the law requires law enforcement officials to meet a higher standard to read a person's e-mail than to get copies of his financial or medical records.

Requests for information have become so common that most big Internet companies, as well as telephone companies, have a formal process for what is often called subpoena management. Most of the information sought about users is basic, but very personal: their names, where they live, when they were last online — and, if a court issues a search warrant, what they are writing and reading in their e-mail. (Not surprisingly, the interpretation of voluminous computer records can be error-prone, and instances of mistaken identity have also come to light.)

AOL, for example, has more than a dozen people, including several former prosecutors, handling the nearly 1,000 requests it receives each month for information in criminal and civil cases. The most common requests in criminal cases relate to children — threats, abductions and pornography. Next come cases of identity theft, then computer hacking. But with more than 20 million customers, AOL has been called on to help in nearly every sort of legal action.

In recent years, "we found ourselves involved in every imaginable classification of traditional crimes, from murder to the whole scope of criminal behavior, because AOL was used to communicate or there is some trace evidence," said Christopher Bubb, assistant general counsel at AOL.

Investigators have found new ways to identify people who visit Web sites anonymously or use a false identity. Many Web sites keep a log of all user activity, and they record the Internet Protocol address of each user. I.P. addresses are assigned in blocks to Internet service providers, who use them to route information to the computers of their users. If an investigator determines the I.P. address used by a suspect, he can subpoena the Internet provider for the identity of the user associated with that address at a particular date and time.

For example, in investigating a bomb threat at a Canadian high school in 2002, Mr. Ohm approached the operator of a message board in California on which the threats were placed. He asked to review the log monitoring each user's activities, which showed the Internet Protocol address of the person who left the threatening message. Mr. Ohm used that address in turn to determine the suspect's Internet service provider, who identified a teenager who had posted the message. (As a minor, he was not prosecuted.)

While Internet evidence has been used to solve some crimes, there have also been examples of mistakes in the process. Last year, Manchester Technologies, a company in Hauppauge, N.Y., sued Ronald Kuhlman Jr. and Kim Loviglio, claiming they had posted messages on a Web site that defamed its chief executive.

Manchester had identified Mr. Kuhlman and Ms. Loviglio based on information provided by Cablevision, their Internet provider, which incorrectly associated their account with the Internet Protocol address used to make the postings. Manchester dropped its suit against Mr. Kuhlman and Ms. Loviglio, who in turn sued Cablevision. That case was settled for undisclosed terms, their lawyer, Mark Murray, said.

The 1996 law that governs privacy for telephones, Internet use and faxes — the Electronic Communications Privacy Act — provides varying degrees of protection for online information. It generally requires a court order for investigators to read e-mail, although the law is inconsistent on this, treating unopened items differently from those previously read. The standard to compel an Internet service provider to provide identifying information about an Internet user is lower — in general, an investigator needs a subpoena, which can be signed by a prosecutor, not a judge. (And the USA Patriot Act allows some of these procedures to be waived when lives are at risk.) By comparison, domestic first-class mail requires a search warrant to be opened.

In cases in which investigators want to intercept Internet communication as it occurs, they must get the same authorization needed for a telephone wiretap, which requires continuing court monitoring. In 2004, there were 49 cases of computer or fax transmissions being monitored under these procedures, according to federal statistics (which exclude national security cases).

Mr. Ohm, now an associate professor at the University of Colorado Law School, said those statistics undercounted the instances of such monitoring, especially cases in which an Internet company was tracing attacks on its own system.

"The Wiretap Act has enough loopholes built into it that you can often do a wiretap without having to get a court order," he said.

The law for civil cases, like divorces or employment disputes, is also a bit unclear. Litigants can generally subpoena the identifying information of a user behind an e-mail account or an I.P. address.

AOL says that only 30 of the 1,000 monthly requests it receives are for civil cases, and that it initially rejects about 90 percent of those, arguing that they are overly broad or that the litigants lack proper jurisdiction. About half of those rejected are resubmitted, on narrower grounds. Generally, AOL gives its members notice when their information is sought in civil cases. If the member objects, the issue is referred back to the court. (In criminal cases, there is often no notice, or notice is given after the information has been given to investigators.)

"Subpoenas come in all the time that ask for everything," said Kelly Skoloda, an AOL lawyer. "We engage in an active dialogue to determine what they want and what we can give in compliance with our privacy policies."

AOL and most other Internet providers take the view that the content of e-mail messages cannot be turned over to lawyers in civil suits. The most significant exception is that e-mail can be turned over with the consent of the account owner, and litigants often persuade judges to order their opponents to authorize the disclosure of e-mail.

A gray area that has recently gained prominence involves the pages that users read online and the terms of their searches.

Yahoo, Google and the new free AOL.com site, for example, maintain records of user surfing behavior. Google also keeps a log file that associates every search made on its site with the I.P. address of the searcher. And Yahoo uses similar information to sell advertising; car companies, for example, place display advertising shown only to people who have entered auto-related terms in Yahoo's search engine.

It is unclear what standard is required to force Internet companies to turn over this search information to criminal investigators and perhaps civil litigants.

"The big story is the privacy law that protects your e-mail does not protect your Google search terms," said Orin S. Kerr, a professor at the George Washington University Law School and a former lawyer in the computer crime section of the Justice Department.

Other lawyers argue that the law that provides protection for e-mail content, or even the Fourth Amendment protection against unreasonable searches, could be applied to data about Web searching, but the issue has not been tested in court.

The break in the St. Louis murders came in 2002, when a reporter received an anonymous letter with a map generated by Microsoft's MSN service — marked with the location where a body could be found.

The F.B.I. subpoenaed Microsoft for records of anyone who had searched for maps of that area in the days before the letter was sent. Microsoft discovered that only one user had searched for precisely that area and provided the user's Internet Protocol address. That address, in turn was provided by a unit of WorldCom, which identified the user as Maury Troy Travis, a 36-year-old waiter. (Mr. Travis was arrested and hanged himself in jail without ever admitting guilt.)

While requests for search data have been few, computer experts expect them to increase.

"It is rare that those links will be a slam-dunk that will make a case," said John Curran, a former cybercrime investigator for the F.B.I. "But when you are putting together a larger case, you are trying to connect the dots, and it is the little things that actually help."

    Increasingly, Internet's Data Trail Leads to Court, NYT, 4.2.2006, http://www.nytimes.com/2006/02/04/technology/04privacy.html?hp&ex=1139115600&en=e86a719a6750998c&ei=5094&partner=homepage

 

 

 

 

 

Seeing Fakes, Angry Traders Confront EBay

 

January 29, 2006
The New York Times
By KATIE HAFNER

 

SAN FRANCISCO, Jan. 28 — A year ago Jacqui Rogers, a retiree in southern Oregon who dabbles in vintage costume jewelry, went on eBay and bought 10 butterfly brooches made by Weiss, a well-known maker of high-quality costume jewelry in the 1950's and 1960's.

At first, Ms. Rogers thought she had snagged a great deal. But when the jewelry arrived from a seller in Rhode Island, her well-trained eye told her that all of the pieces were knockoffs.

Even though Ms. Rogers received a refund after she confronted the seller, eBay refused to remove hundreds of listings for identical "Weiss" pieces. It said it had no responsibility for the fakes because it was nothing more than a marketplace that links buyers and sellers.

That very stance — the heart of eBay's business model — is now being challenged by eBay users like Ms. Rogers who notify other unsuspecting buyers of fakes on the site. And it is being tested by a jewelry seller with far greater resources than Ms. Rogers: Tiffany & Company, which has sued eBay for facilitating the trade of counterfeit Tiffany items on the site.

If Tiffany wins its case, not only would other lawsuits follow, but eBay's very business model would be threatened because it would be nearly impossible for the company to police a site that now has 180 million members and 60 million items for sale at any one time.

Of course, fakes are sold everywhere, but the anonymity and reach of the Internet makes it perfect for selling knockoffs. And eBay, the biggest online marketplace, is the center of a new universe of counterfeit with virtually no policing.

EBay, based in San Jose, Calif., argues that it has no obligation to investigate counterfeiting claims unless the complaint comes from a "rights owner," a party holding a trademark or copyright. A mere buyer who believes an item is a fake has almost no recourse.

"We never take possession of the goods sold through eBay, and we don't have any expertise," said Hani Durzy, an eBay spokesman. "We're not clothing experts. We're not car experts, and we're not jewelry experts. We're experts at building a marketplace and bringing buyers and sellers together."

Company officials say they do everything they can to stop fraud. The company says only a minute share of the items being sold at any given time — 6,000 or so — are fraudulent. But that estimate reflects only cases that are determined by eBay to be confirmed cases of fraud, like when an item is never delivered.

Experienced eBay users say that the fraud goes well beyond eBay's official numbers, and that counterfeiters easily pass off fakes in hundreds of categories.

"EBay makes a lot of money from a lot of small unhappy transactions," said Ina Steiner, the editor and publisher of AuctionBytes.com, an online newsletter. "If you've lost a few thousand dollars, you might go the extra mile to recover it. But if you've lost $50 or $20 you may never be able to prove your case, and in the meantime eBay has gotten the listing fee and the closing fee on that transaction."

The Tiffany lawsuit, in addition to accusing eBay of facilitating counterfeiting, also contends that it "charges hundreds of thousands of dollars in fees" for counterfeit sales.

In 2004, Tiffany secretly purchased about 200 items from eBay in its investigation of how the company was dealing with the thousands of pieces of counterfeit Tiffany jewelry. The jeweler found that three out of four pieces were fakes.

The case will go to trial by the end of this year, said James B. Swire, an attorney with Arnold & Porter, a law firm representing Tiffany. The legal question — whether eBay is a facilitator of fraud — is a critical issue that could affect not only eBay's future but Internet commerce generally, said Thomas Hemnes, a lawyer in Boston who specializes in intellectual property.

"If eBay lost, or even if they settled and word got out that they settled, it would mean they would have to begin policing things sold over eBay, which would directly affect their business model," Mr. Hemnes said. "The cost implied is tremendous."

But eBay members like Ms. Rogers have little desire to wait for court decisions; they say that the uncontrolled flood of fakes is driving down the value of the authentic goods.

For the past few months, Ms. Rogers and three women she met on eBay who are also costume jewelry buffs have banded together to track the swindlers they say are operating in their jewelry sector. "People have faith that eBay will take care of them, but it doesn't," Ms. Rogers said. "EBay has done nothing."

Carrie Pollack, who sells jewelry from her home in Sudbury, Mass., and is part of Ms. Rogers's group, said an authentic Weiss brooch of good quality could command $150. But she said the profusion of counterfeits had confused the market and diluted the value of such a pin to as little as $30.

"It's a situation that's facing all of us in the jewelry world, and I suspect other decorative arts as well," said Joyce Jonas, an antique jewelry specialist in New York. "It's totally out of control."

Over the past few months Ms. Rogers and her team have reported to eBay more than a thousand jewelry listings they believe to be fakes; only a few listings have been removed.

The women say that by watching the listings they have uncovered a ring of a half-dozen or so counterfeiters, most of them living in Rhode Island within a few miles of one other. They say the sellers supply one another with fake jewelry, conceal the fact that they are buying from one another to boost their seller status, and regularly dole out positive feedback to each other to fool potential buyers.

Ms. Pollack was unaware of the abundance of counterfeit pieces on eBay when she paid $360 for what she thought were genuine pieces of Weiss jewelry. She demanded a refund from the seller, who refused.

Ms. Pollack said it wasn't until she filed a formal complaint with PayPal, eBay's online payment system, that the seller offered to refund her money. Since then, she has sent eBay officials a raft of evidence pointing out the presence of the counterfeits, including an independent appraisal from Gary L. Smith, a gemologist in Montoursville, Pa., who declared the five brooches Ms. Pollack sent him to be unmistakable fakes.

This reporter, too, sent a butterfly brooch with "Weiss" stamped on the back, purchased for $12.99 recently from one of the alleged counterfeiters, to Mr. Smith. He determined that there was nothing vintage about it — certainly not the very new glue used to hold in the glass stones. (In a subsequent phone conversation, the seller, Garnet Justice, who lives in Leesburg, Ind., said she had "no idea" whether the pin was authentic, and offered a full refund.)

Antoinette Matlins, another gemologist, also purchased five vintage pieces from the sellers tracked by Ms. Rogers's group to determine their authenticity. She found them to be cheap knockoffs worth less than 10 percent of their sale prices.

But she was not surprised. Whether online or off, she said, "fraud is rampant in any venue where you are looking for a steal."

EBay's feedback system that allows buyers to post negative reviews of bad sellers is supposed to protect customers like Ms. Pollack. Yet all of the alleged counterfeiters had consistently positive ratings.

Ms. Steiner of AuctionBytes.com said this situation was not uncommon. Buyers and sellers are often reluctant to leave bad reviews, lest their own reputations suffer.

EBay does not allow members to contact other potential buyers to warn them of possible fraud. Otherwise, said Mr. Durzy, it would be too easy for someone to try to ruin the reputation of a legitimate rival.

Ms. Rogers said she had no qualms about breaking the rules by contacting buyers about fakes she spots. In November, she even put up a listing that advertised a fake Christmas tree brooch from Eisenberg Ice, a vintage costume jewelry maker, just to make people aware of the fraud.

"The reason I am doing this is because eBay won't," the listing read. "Let's stop this madness — these fakes are pushing down the price of authentic jewelry."

"The frustrating part is that eBay just stands back and lets these people make thousands and thousands of dollars" while taking a fee for each transaction, Ms. Rogers said. (The company's profits rose 36 percent in the last quarter from the year before, to $279.2 million.)

After the spectacular case in 2000 when a fake Richard Diebenkorn painting was nearly sold for $135,000 on eBay, the company put in place a handful of safeguards, like the PayPal buyer protection plan, an improved system for spotting eBay policy violations, and improved detection of fraud in general. But when it comes to counterfeit goods, the problem has gotten worse.

Artwork is particularly vulnerable to counterfeiting. "The majority of things that appear on eBay are fakes," said Joel Garzoli, an art gallery owner in San Rafael, Calif.

Mr. Durzy argued that "if we began to automatically pull listings for things reported to us as fake, we could be pulling listings that are legitimate." He added that the company had to rely on trademark owners to "tell us something is counterfeit." Yet trademark owners like Tiffany say they have gotten no relief.

Ms. Rogers and her team say their efforts may be working. The number of bids on the fake vintage jewelry pieces has dropped sharply since they went into action, they say. Nonetheless, the seller who sold Ms. Pollack the knockoff is still in business and recently put up for sale a "beautiful Weiss brooch with lots of sparkle and shine." Starting bid: $9.99.

    Seeing Fakes, Angry Traders Confront EBay, NYT, 29.1.2006, http://www.nytimes.com/2006/01/29/technology/29ebay.html

 

 

 

 

 

In 200 Years of Family Letters, a Nation's Story

 

January 29, 2006
The New York Times
By KIRK JOHNSON

 

BOULDER, Colo., Jan. 27 — To most college students, instant messages, or I.M.'s, are about as ephemeral as the topics they typically address. One flicker and gone.

Ethan Cowan, a 20-year-old cinema studies major, saves his I.M.'s on his computer to read again later. But in his family, that is no surprise.

Mr. Cowan comes from a long line of savers — really, really dedicated savers.

"It's in the genes," said his mother, Linda Cowan.

Beginning more than 200 years ago, Mr. Cowan's family has kept the messages — people called them letters in those days — written to one another, as well as correspondence with eminent outsiders like Ralph Waldo Emerson, sermons given by preachers in the family and multipart essays sent home while traveling.

The collection, at least 75,000 documents totaling hundreds of thousands of pages filling 200 boxes, is one of the largest private family troves that has turned up in recent years, genealogy experts say. It has been stored in attics, sheds and storage lockers over the years, and most recently in the Cowans' home here in Boulder, where they were interviewed on a recent morning. Its contents cover the scandalous (a relative jailed for embezzlement), the intriguing (a runaway slave seeking refuge in the North) and the historic (the settling of Chicago).

Now the current owner of the collection, Mr. Cowan's grandmother, Mary Leslie Wolff, who is 82, is negotiating to donate the papers — called the Ames Family Historical Collection, for her father's branch of the tree — to a historical society somewhere back East, where the family began. Ms. Wolff declined to say where the collection might go because discussions were continuing.

Historians and librarians say the collection is probably as remarkable for its intellectual vigor as for its age and size. It is essentially a dialogue of history: one well-educated, middle-class family's long conversation, and its interaction with the issues that defined the early nation and its westward tide, including the abolitionist movement before the Civil War, the early rise of feminism and the discoveries of geology that were shaking religious assumptions about the age of the earth. The family's writers talked all of it through, often at length. Letters of 10 to 12 pages were common.

"Whenever anyone finds a record like this that speaks to one family in depth, it's a gold mine," said David S. Ouimette, who manages the genealogy collection for the Family History Library, run by the Mormon Church in Salt Lake City.

"And it sounds like they weren't just observing the events of the day, they were participants," added Mr. Ouimette, who has not seen the collection. "That's what puts flesh on the bones."

One series of letters, for example, talks about a runaway slave named Mary Walker who took shelter with an abolitionist branch of the family in Philadelphia, the Leslies, during a visit by her master in the 1850's. Ms. Walker, after being hidden for a time, was eventually sent farther north to live with Leslie relatives in Massachusetts.

But the story did not end there. As the Civil War tore the country apart, the letters show an effort to reunite Ms. Walker with her family in North Carolina. A friend who was an officer in Gen. William Tecumseh Sherman's army, then advancing south, was asked to look out for Ms. Walker's children, and he apparently succeeded, because they ultimately made their way north to join her.

Another series of letters offers a vivid early glimpse of the still-raw settlement of Chicago by a family member who had journeyed west from Philadelphia in 1836 to Missouri to see some land he had bought. The land was not much to speak of, wrote the author, Peter Leslie — Ms. Wolff's great-great grandfather — in a letter to his children. But when he arrived at what he called "Chicago on Lake Michigan," Mr. Leslie immediately knew a rising force when he saw it.

"The town has more natural advantages than any place I have yet seen and is destined to be the N. York of the West," he wrote in a letter describing the construction and the bustle of the new city, then a few years old. Hotels were springing up, land fever was in the air and ambition was everywhere.

"The people of the West have a town-making mania," he wrote. "This one must succeed."

Ms. Cowan, Ms. Wolff's daughter, said she had recently been working through the letters of Mr. Leslie's son, J. Peter Leslie, who was a geologist in Philadelphia later in the 19th century. Many of those letters, she said, read like a novel: you start one, and you just have to find out what happens next.

"Right now there's a relative in jail for embezzlement," she said. "He ran off to Canada, then his conscience got the better of him and he came back and gave himself up."

Why this family saved the things that many others threw away or lost remains a mystery, Ms. Wolff said. An early progenitor in Massachusetts apparently got the ball rolling in the 1700's; that branch's attic-size collection was donated to the Massachusetts Historical Society many years ago.

Beginning in Massachusetts and Philadelphia, where the first immigrants of the family settled after arriving from Scotland, the letters piled up as the clan, like so many others of the day, gradually moved west — to Minnesota in the 1850's, then Colorado a century later.

"I think a lot of people have the urge, but at some point they just give up and throw it out," Ms. Wolff said.

Ms. Cowan spoke up. "These people didn't — they didn't throw out anything."

In today's era of the instantaneous and disposable, even the paper on which the letters were written can seem alien — so durable, at least through the 1850's vintage, that neither coal dust from furnace-room storage nor glue from an ancestor's zealous scrapbook-making apparently harmed it.

Even some of the subjects that gripped people back then can seem new again with time, like poetry. Family members transcribed poems they loved, or perhaps wrote themselves, into a book that Ms. Cowan said nobody had tried to go through yet.

"We don't even know what's in it," she said.

Mr. Cowan, a junior at Oberlin College in Ohio who said he thought of becoming an author someday, looked up sharply at the mention of unread 19th-century poetry.

"Whoa, can I check that out?" he asked.

    In 200 Years of Family Letters, a Nation's Story, NYT, 29.1.2006, http://www.nytimes.com/2006/01/29/national/29letter.html?hp&ex=1138597200&en=75f4dcde0cb8d3ea&ei=5094&partner=homepage

 

 

 

 

 

Virginia Man Pleads Guilty in Online Pornography Case

 

January 29, 2006
The New York Times
By KURT EICHENWALD

 

A Virginia man arrested in a national investigation of child pornography on the Internet pleaded guilty to multiple charges involving the sexual exploitation of boys and the operation of illegal Web sites, the Justice Department said Friday.

The man, Gregory J. Mitchel, 38, was an administrator of several illegal Web sites and admitted in his plea to producing and distributing child pornography through the Internet. In that role, the Justice Department said, Mr. Mitchel filmed boys engaging in sex acts and received money from Web site subscribers who paid monthly fees for viewing live and recorded videos.

Mr. Mitchel was arrested after being implicated by Justin Berry, a 19-year-old who was featured in a December article in The New York Times about teenagers who operate for-pay pornography sites that show images of themselves transmitted by Webcams. Mr. Mitchel has since begun naming other adult men who were actively involved in the sexual exploitation of children, court records show.

Mr. Berry, who beginning at 13 was enticed by adults he met online into performing sex acts in front of his Webcam, operated pornography sites featuring his own image for five years. In discussions with a Times reporter in July, Mr. Berry agreed to abandon his business and tell law enforcement about adult men who he knew were sexually exploiting and abusing children. Mr. Berry was granted immunity and is now a federal witness.

In interviews with The Times and the government, Mr. Berry said Mr. Mitchel had molested him over several years and had begun sexually exploiting as many as six other children.

At the time of his arrest, Mr. Mitchel was days away from escorting an under-age boy to a Las Vegas hotel, according to records of his online conversations. Law enforcement officials said they had recovered more than 600 pornographic images of children on Mr. Mitchel's computers, which were seized at the time of his arrest in September.

Through evidence provided to the government, Mr. Berry has identified as many as 1,500 adult men who gave him money and gifts over several years for his sexual performances on camera. Mr. Mitchel was among a number of adults identified by Mr. Berry as having assisted minors in the establishment, operation and marketing of illegal Webcam pornography sites.

In a hearing on Friday in Federal District Court in Roanoke, Va., Mr. Mitchel pleaded guilty to four felonies involving the production, sale, distribution and possession of child pornography. As part of a plea agreement, two related charges involving the receipt and advertising of child pornography were dropped. Because of a previous conviction on a child pornography charge, Mr. Mitchel faces a minimum sentence of 25 years in prison.

Mr. Mitchel first encountered Mr. Berry as a member of one of the teenager's pornographic Web sites and began communicating with him through online instant messaging. Soon after, Mr. Mitchel traveled to Mexico to meet Mr. Berry, then 16, and molested him, officials said.

More than a year later, Mr. Berry tried to abandon his illegal business, but Mr. Mitchel had preserved many of the teenagers' pornographic videos and images, posting them on new sites he established. For months, Mr. Mitchel encouraged Mr. Berry to return to the pornography business and posted periodic updates about his efforts on a Yahoo message board he set up for the teenager's fans.

Early last year, Mr. Berry, who by then was abusing both cocaine and marijuana, agreed to become business partners with Mr. Mitchel on a new site called justinsfriends.com that the older man had registered. The site, which charged members $29.95 a month for password-protected access, went fully active in early June.

Over the weeks that followed, numerous pornographic videos of Mr. Berry and other young men and boys were posted on it. But less than a month after the site went up, Mr. Berry left the business and reported Mr. Mitchel to the authorities.

    Virginia Man Pleads Guilty in Online Pornography Case, NYT, 29.1.2006, http://www.nytimes.com/2006/01/29/national/29kids.html?ex=1144382400&en=6ea88abf59ef0129&ei=5070

 

 

 

 

 

Software

Privacy for People Who Don't Show Their Navels

 

January 25, 2006
The New York Times
By JONATHAN D. GLATER

 

IT may be easy to forget that there are people who want to remain anonymous on the Web while the online world is full of those who happily post pictures of themselves and their navels for all to see. But interest in software that allows people to send e-mail messages that cannot be traced to their source or to maintain anonymous blogs has quietly increased over the last few years, say experts who monitor Internet security and privacy.

"People in the world are more interested in anonymity now than they were in the 1990's," when the popularity of the Internet first surged, said Chris Palmer, technology manager at the Electronic Frontier Foundation, a nonprofit group in San Francisco dedicated to protecting issues like free speech on the Web.

Increasingly, consumers appear to be downloading free anonymity software like Tor, which makes it harder to trace visits to Web sites, online posts, instant messages and other communication forms back to their authors. Sales are also up at companies like Anonymizer.com, which among other things sells software that protects anonymity.

"I get the feeling it's going up," said Roger Dingledine, Tor's project leader. "But one of the features I've been adding recently," he said, enhances anonymity protection by making it harder to count downloads of the software. Still, the number of servers forming layers in the Tor network has risen to 300 from 50 in the last year, Mr. Dingledine added.

A few reasons exist for the surge, which is hard to measure - it is nearly impossible to track how many people have made themselves invisible online. People who want to continue to swap music via the Internet but fear lawsuits brought by the recording industry want to hide their identity. Some people wish to describe personal experiences that could land them in jail. And some Web authors share their thoughts about repressive regimes and face government reprisal if they are caught.

"The more equipment is acquired and produced by a repressive regime, the more important anonymity is," said Julien Pain, who heads the Internet freedom desk for Reporters Without Borders, an advocacy group that supports press freedom. The group has produced a guide, www.rsf.org/rubrique.php3?id_rubrique=542, for bloggers trying to protect their identities.

"We realized that bloggers were being arrested everywhere in the world," Mr. Pain said. One blogger in Nepal, for example, may risk arrest with every time he comments on the country's monarchy, he said.

"The problem is, you have on one side states with a lot of money," he said. "On the other side, you have small businesses" and nongovernmental organizations. Law enforcement or other government agencies have tremendous legal and technological resources to discover the identities and locations of people communicating online, though consumer software can make the task more difficult.

Despite the increased interest in anonymity, software companies have moved away from marketing products that protect identities, said Chris Jay Hoofnagle, senior counsel and director of the Electronic Privacy Information Center's office in San Francisco, a public research group that focuses on privacy and free speech issues.

"When I came into this field, it was on the heels of the failure of a number of companies that tried very hard to create privacy enhancing technologies," Mr. Hoofnagle said.

Now, though, people are more concerned about defenses that block unwanted e-mail messages and hackers seeking to steal bank accounts, credit card numbers or whole identities, said Alex Fowler, co-head of the national privacy practice at PricewaterhouseCoopers.

"The visibility and awareness of these issues goes much deeper into the general public than it did even five or six years ago," Mr. Fowler said.

Despite increased interest in anonymity and security, some providers of online anonymity protection have not been able to turn their products into successful businesses. People who want to communicate anonymously may not want anyone to know that they have obtained software to do so, and some of the available software is free, including the Java Anonymous Proxy (anon.inf.tu-dresden.de/index_en.html).

Tor, first financed by the United States Department of Defense, received support from the Electronic Frontier Foundation for a year, but the money has run out, and Mr. Dingledine is working on the project unpaid and is looking for sponsors.

Tor uses "onion routing," in which layers of servers separate computer users from the Web sites they visit to hide a user's location. The software is easily installed and operates in the background, simply adding icons in Windows.

To make sure it is working, users can visit a site like www.showmyip.com and verify that their Internet Protocol address has changed. If it has, the software is working. The software may slow browsing, because Web pages must be transmitted through various servers around the world to get to your computer.

Software bundled with Tor, called Privoxy, prevents your computer from automatically sending certain personal information to Web sites. It does not block sites from finding existing cookies on the computer, so those sites will still know you are you (but not where you are because of Tor), but it does delete new cookies after rebooting.

Some companies that focused several years ago on anonymity now focus on security, and rather than trying to sell sophisticated software to consumers, they sell to Internet service providers like Verizon and EarthLink, who in turn can promise customers protection from spam and hacker attacks.

"Privacy is a concern, it just isn't mass market," said Hamnett Hill, president and chief executive of Radialpoint, a Montreal company that provides security services for Internet customers of BellSouth, Adelphia and other companies. "One of the big enlightenments that we had at a certain point is that people don't want to buy security software. They want peace of mind."

Radialpoint used to offer software to protect identity. The idea was not enough to carry the business, which is why the company no longer focuses on such products. Of course, there still are businesses that sell software that provides anonymity protection. For example, there is Anonymizer.com and GhostSurf, which is sold by Tenebril (www.tenebril.com). And some companies sell services to protect privacy in a way that is only tangentially related to the Internet. PrivateTel, for example, offers to provide temporary phone numbers for people who, say, post personal ads.

"The need to have a conversation and to complete the actual telephone call and remain anonymous is what is the driving force," said Dan Kaluzny, the company's chief executive.

More people who use the Internet know that if they disclose any personal information online, they may receive a flood of unwanted marketing calls and e-mail messages as a result, he said.

    Privacy for People Who Don't Show Their Navels, NYT, 25.1.2006, http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1

 

 

 

 

 

Internet Users Thinking Twice Before a Search

 

January 25, 2006
The New York Times
By KATIE HAFNER

 

Kathryn Hanson, a former telecommunications engineer who lives in Oakland, Calif., was looking at BBC News online last week when she came across an item about a British politician who had resigned over a reported affair with a "rent boy."

It was the first time Ms. Hanson had seen the term, so, in search of a definition, she typed it into Google. As Ms. Hanson scrolled through the results, she saw that several of the sites were available only to people over 18. She suddenly had a frightening thought. Would Google have to inform the government that she was looking for a rent boy - a young male prostitute?

Ms. Hanson, 45, immediately told her boyfriend what she had done. "I told him I'd Googled 'rent boy,' just in case I got whisked off to some Navy prison in the dead of night," she said.

Ms. Hanson's reaction arose from last week's reports that as part of its effort to uphold an online pornography law, the Justice Department had asked a federal judge to compel Google to turn over records on millions of its users' search queries. Google is resisting the request, but three of its competitors - Yahoo, MSN and America Online - have turned over similar information.

The government and the cooperating companies say the search queries cannot be traced to their source, and therefore no personal information about users is being given up. But the government's move is one of several recent episodes that have caused some people to think twice about the information they type into a search engine, or the opinions they express in an e-mail message.

The government has been more aggressive recently in its efforts to obtain data on Internet activity, invoking the fight against terrorism and the prosecution of online crime. A surveillance program in which the National Security Agency intercepted certain international phone calls and e-mail in the United States without court-approved warrants prompted an outcry among civil libertarians. And under the antiterrorism USA Patriot Act, the Justice Department has demanded records on library patrons' Internet use.

Those actions have put some Internet users on edge, as they confront the complications and contradictions of online life.

Jim Kowats, 34, a television producer who lives in Washington, has been growing increasingly concerned about the government's data collection efforts. "I'm not a conspiracy theorist, I just feel like it's one step away from ... what's the next step?" Mr. Kowats said. "The government's going to start looking into all this other stuff."

Until last year, Mr. Kowats worked at the Discovery Channel, and a few years ago, in the course of putting together a documentary on circumcision, he and his colleagues were doing much of the research online. "When you're researching something like that and you look up the word 'circumcision,' you're going to end up with all kinds of pictures of naked children," he said. "And that can be misconstrued."

"There're so many things you can accidentally fall into when you're surfing on the Internet," he said. "I mean, you can type in almost anything and you're going to end up with something you didn't expect."

Privacy is an elusive concept, and when it comes to what is considered acceptable, people tend to draw the line at different points on the privacy spectrum.

Ming-Wai Farrell, 25, who works for a legal industry trade association in Washington, is one of those who draw the line somewhere in the middle. They are willing to part with personal information as long as they get something in return - the convenience of online banking, for example, or useful information from a search engine - and as long as they know what is to be done with the information.

Yet these same people are sometimes appalled when they learn of wholesale data gathering. Ms. Farrell said she would not be able to live without online banking, electronic bill paying or Google, but she would consider revising her Web activity if she had to question every search term, online donation or purchase.

"It's scary to think that it may just be a matter of time before Googling will invite an F.B.I. agent to tap your phone or interrogate you," Ms. Farrell said.

Mike Winkleman, 27, a law student who lives in Miami and, like Ms. Farrell, belongs to the generation of people who came of age with the Internet, said he would like to think that the erosion of his privacy was for "a good cause, like national security or preventing child porn," he said. "But I can't help but feel that for each inch I give, a mile will be taken."

But Josh Cohen, a financial adviser in Chicago, identifies more closely with a subset of Internet users who see the loss of at least some privacy as the price they pay for being on the Web. Mr. Cohen, 34, said he was willing to accept that tradeoff in the pursuit of national security.

"We as U.S. citizens have got to start making concessions," he said. "In order for the government to catch people that prey on children, or fight the war on terror, they are going to need the help of the search engines."

Mr. Cohen said he doubted there would be much compromising of his individual privacy because the amount of data collected by the government was so voluminous. "My rationale tells me that with close to 300 million people in the U.S., and about 45 to 50 percent of households having Internet access, that I don't need to be too concerned with my search engine behavior," he said.

Susan P. Crawford, a professor at the Cardozo School of Law in New York, agreed that the sheer volume of information obtained by the government was likely to dilute privacy threats.

"More experienced Internet users would understand that in the mountain of search-related data available in response to a subpoena, it is very unlikely that anything referring to them personally would be revealed," Professor Crawford said.

She likened one's online activity to walking down the street. "We walk down the street all the time and we can be seen there," she said. "We also move around online, and can be 'seen' to some extent there as well. But we continue to go for walks."

Nevertheless, last week's court motion is giving some people pause. Sheryl Decker, 47, an information technology manager in Seattle, said she was now thinking twice about what she said in her personal e-mail correspondence. "I have been known to send very unflattering things about our government and our president," Ms. Decker said. "I still do, but I am careful about using certain phrases that I once wouldn't have given a second thought."

Ms. Decker's caution is being echoed by others. Genny Ballard, 36, a professor of Spanish at Centre College in Danville, Ky., said she had grown more conscious about what she typed into the Google search box. "Each time I put something in, I think about how it could be reconstructed to mean that I have more than an academic curiosity," Ms. Ballard said.

To be sure, Google is citing a number of reasons for resisting the government's subpoena, including concern about trade secrets and the burden of compliance. While it does not directly assert that surrendering the data would expose personal information, it has told the government that "one can envision scenarios where queries alone could reveal identifying information about a specific Google user, which is another outcome that Google cannot accept."

Ms. Hanson, who did the "rent boy" search, said that although she was aware that personal information was not being required in the Google case, she remained uneasy.

She pointed to a continuing interest she has in the Palestinian elections. "If I followed my curiosity and did some Web research, going to Web sites of the parties involved, I would honestly wonder whether someone in my government would someday see my name on a list of people who went to 'terrorist' Web sites," she said.

Mr. Kowats, the television producer, shares that fear. "Where does it stop?" he said. "What about file sharing? Scalping tickets? Or traveling to Cuba? What if you look up abortion? Who says you can't look up those things? What are the limits? It's the little chipping away. It's a slippery slope."

David Bernstein and Michael Falcone contributed reporting for this article.

    Internet Users Thinking Twice Before a Search, NYT, 25.1.2006, http://www.nytimes.com/2006/01/25/national/25privacy.html?hp&ex=1138165200&en=53ada0c511b528d5&ei=5094&partner=homepage

 

 

 

 

 

Reports: Sex.com appeals, sells for $12M

 

Posted 1/24/2006 10:13 AM
Reuters
USA Today

 

SAN FRANCISCO (Reuters) — Sex.com, long coveted as potentially one of the most lucrative sites on the Web because of its catchy name, has been sold for about $12 million in cash and stock, a source familiar with the deal told Reuters on Monday.

Escom, a group of anonymous buyers, said in a statement it had acquired the Web address Sex.com from Gary Kremen, chief executive of Grant Media and the founder of Match.com. Terms of the transaction were not disclosed.

Sex.com is seen as one of the most recognizable and therefore financially most promising Web domain names but does not currently have much content.

The new owners said in the statement that they plan to transform Sex.com into "the market-leading adult entertainment destination," which they said would include "adult dating opportunities," sex and relationship advice, erotica, video-on-demand and live chat.

XBiz.com, an adult entertainment trade site, first reported the sale of Sex.com last week and said Escom had agreed to pay $14 million.

But the source said the value of the deal was closer to $12 million and involved cash and stock, as well as requirements that the business meet certain performance targets.

The sale ranks as one of the most expensive Web domain name transfers ever and outpaces the $7.5 million paid for business.com in 1999 at the peak of the dotcom boom.

Kremen — the founder of Match.com, the matchmaking site now owned by IAC/InterActiveCorp — regained control of Sex.com after a legal battle dating back to 1997 and subsequent struggles over management and ownership interests.

The site makes money selling banner ads pointing to online pornography sites. Sex.com does not even rank among the top 1,000 adult entertainment sites among U.S. Internet users, according to data by Web measurement firm Hitwise.

Kremen plans to continue as an adviser to the site.

    Reports: Sex.com appeals, sells for $12M, R, 24.1.2006, http://www.usatoday.com/tech/news/2006-01-24-sexcom_x.htm

 

 

 

 

 

Like This? You'll Hate That. (Not All Web Recommendations Are Welcome.)

 

January 23, 2006
The New York Times
By LAURIE J. FLYNN

 

SAN FRANCISCO, Jan. 22 - On Amazon.com, a customer interested in buying the novel "The Life of Pi" is also shown "The Kite Runner" because other Amazon customers - presumably with similar tastes - also purchased that book. That's just one approach among many in the science of recommendation software.

Web technology capable of compiling vast amounts of customer data now makes it possible for online stores to recommend items tailored to a specific shopper's interests. Companies are finding that getting those personalized recommendations right - or even close - can mean significantly higher sales.

For consumers, a recommendation system can either represent a vaguely annoying invasion of privacy or a big help in bringing order to a sea of choices.

"It's like if your music is in Tower Records and no one knows it, you're nowhere," said Tim Westergren, a founder of Pandora, an online music site, and of the Music Genome Project. "On the Internet, it's that times 100."

But spewing out recommendations is not entirely without risk. Earlier this month, Walmart.com issued a public apology and took down its entire cross-selling recommendation system when customers who looked at a boxed set of movies that included "Martin Luther King: I Have a Dream" and "Unforgivable Blackness: The Rise and Fall of Jack Johnson" were told they might also appreciate a "Planet of the Apes" DVD collection, as well as "Ace Ventura: Pet Detective" and other irrelevant titles.

The company said that the problem was created last year when the Web site set out to promote African-American films for Martin Luther King's Birthday. It linked a set of four African-American films to a group of 263 popular movies also boxed into sets, hoping that the links would give the four films more exposure.

"Unfortunately," said Mona Williams, a Wal-Mart spokeswoman, in a statement, "some of the inadvertent combinations were very offensive."

Wal-Mart's trouble stemmed not from the aggressive use of advanced cross-selling technology, but from the near lack of it. Companies with more nuanced strategies have avoided embarrassing linkages.

At NetFlix, the online DVD rental company, for example, roughly two-thirds of the films rented were recommended to subscribers by the site - movies the customers might never have thought to consider otherwise, the company says. As a result, between 70 and 80 percent of NetFlix rentals come from the company's back catalog of 38,000 films rather than recent releases.

"The movies we recommend generate more satisfaction than the ones they choose from the new releases page," said Neil Hunt, NetFlix's chief product officer. "It increases customer loyalty to the site."

Mr. Hunt said NetFlix's recommendation system collected more than two million ratings forms from subscribers daily to add to its huge database of users' likes and dislikes. The system assigns different ratings to a movie depending on a particular subscriber's tastes. For example, "Pretty Woman" might get a four- or five-star rating if other people who share a customer's taste in movies rated it highly, while the same film might not appear on another customer's screen at all, presumably because other viewers with that customer's tastes did not rate it highly.

"The most reliable prediction for how much a customer will like a movie is what they thought of other movies," Mr. Hunt said. The company credits the system's ability to make automated yet accurate recommendations as a major factor in its growth from 600,000 subscribers in 2002 to nearly 4 million today.

Similarly, Apple's iTunes online music store features a system of recommending new music as a way of increasing customers' attachment to the site and, presumably, their purchases. Recommendation engines, which grew out of the technology used to serve up personalized ads on Web sites, now typically involve some level of "collaborative filtering" to tailor data automatically to individuals or groups of users.

Some engines use information provided directly by the shopper, while others rely more on assumptions, like offering a matching shirt to a shopper interested in purchasing a tie. And some sites are now taking personalization to another level by improving not only the collection of data but the presentation of it.

Liveplasma.com, an online site for music and, more recently, movies, graphically "maps" shoppers' potential interests. A search for music by Coldplay, for example, brings up a graphical representation of what previous customers of Coldplay music have purchased, presented in clusters of circles of various sizes.

The bigger the circle, the greater the popularity of that band. The circles are clustered into orbits representing groups of customers with similar preferences.

"This is a way of showing recommendations that are vastly more useful than textual links," said Whit Andrews, a research vice president at Gartner Inc., a market research company in Stamford, Conn.

Another development under way is matching customer tastes across Web businesses, using knowledge of a customer's tastes in music to try to sell them books, for example. "To date, that's been largely uncharted territory," Mr. Andrews said, though not for lack of trying. Web sites have long tried to develop systems for cross-selling among companies that protect customer privacy but also allow sharing of data.

While large online stores are having success through recommendations, smaller Web sites are having a more difficult time using the technology to their advantage. Developing a system for cross-selling is expensive, and perhaps most important, requires amassing a huge amount of customer data to be effective, said Patty Freeman Evans, a Jupiter Research analyst.

As a result, according to Ms. Evans, fewer than one-quarter of online shoppers make unplanned purchases when they are online, a far smaller percentage than customers at actual stores.

Walmart.com's DVD sales site now has no automated recommendation system at all. The music section of Walmart.com, however, uses a system closer to that of Amazon, where customers are given recommendations based on music they've purchased in the past. The company is also looking at using that technology for the DVD section, along with movie reviews and guides that are automatically linked to customer searches.

Carter Cast, president of Walmart.com, says personalized recommendations are one of the company's "important priorities" for its Web store. "It's convenient and helpful for customers, and it does help generate sales," Mr. Cast said, referring to the personalization feature on Walmart.com's music section.

Certainly, Apple's iTunes store has benefited from its ability to recommend songs and artists. In fact, its newest feature, called MiniStore, is able to make recommendations based on songs in users' playlists, no matter where they came from.

When someone is using the MiniStore and selects a song on the playlist, Apple will automatically collect that information. The feature, however, has been criticized by privacy advocates who say it allows Apple to snoop on customers. Under pressure, Apple decided last week to make the feature an option that customers get only on request.

    Like This? You'll Hate That. (Not All Web Recommendations Are Welcome.), NYT, 23.1.2006, http://www.nytimes.com/2006/01/23/technology/23recommend.html


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Media Frenzy

This Time, the Revolution Will Be Televised

 

January 22, 2006
The New York Times
By RICHARD SIKLOS

 

CONVERGENCE is back, but it is not what it used to be. Following its release after about five years in the halfway house for overblown business ideas, it has been swiftly rehabilitated in the form of various online-offline business ventures.

This time around, though, some fairly radical wrinkles on the theme are in the works. One notable example is Google's deal last week to acquire dMarc Broadcasting for up to $1.24 billion.

DMarc uses software to help place ads on radio, and it could conceivably do the same for Google's armada of Web ads. The deal, along with other experiments by Google to reproduce its advertisers' notices in newspapers and other print outlets, suggests that Convergence 2.0 is moving in interesting and previously undeveloped directions.

Here are two more:

What would it mean if TV shows viewed or downloaded over the Internet could be watched only by people in certain geographic areas, mimicking the network affiliate model of over-the-air television? And what if it were as easy and inexpensive for local pizza parlors to buy cable television spots as it is for them to put ads on the Internet through portals like Google and Yahoo? The ideas are being developed by small, under-the-radar outfits - the first by a company called Decisionmark and the second by a brand-new business, Spot Runner.

Decisionmark, a private company with 35 employees, sells software for television broadcasters. One of its businesses is providing a system to the satellite broadcasters DirecTV and EchoStar Communications, allowing them to determine which local TV signals to make available to subscribers.

Under federal law, a subscriber to EchoStar's Dish Network in Decisionmark's hometown, Cedar Rapids, Iowa, for example, can receive network affiliates only from that area, because, after all, those stations own the regional rights to the networks' programming, sell advertisements against them and promote them within their own programs, such as local newscasts.

Jack Perry, the chief executive of Decisionmark, has come up with a way to limit the geographic reach of broadcast signals online, too. It is roughly similar to the way satellite companies determine where you live: by credit card billing address, although Mr. Perry adds that he can also limit a computer's access to a signal based on its Internet Protocol, or IP, address.

Mr. Perry's notion has been getting a serious hearing from television station owners who are concerned that they are being cut out of deals like ABC's sale of instant reruns of hit shows like "Lost" through iTunes and CBS's sale of "CSI: Crime Scene Investigation" through Google Video.

After all, in the complex ecosystem of television, it is the local affiliates - many independently owned - that drum up much of the interest in new network shows. Jim F. Goodmon, the president and chief executive of the Capitol Broadcasting Company in Raleigh, N.C., which operates five network affiliates, told me that he sees the Internet as just another method for picking up his signal, alongside rabbit ears, cable and satellite. Why not follow the viewers online, he said, so long as each station's programming stays in its own territory?

"The next thing that we're all buzzing about is this concept of selling programming to people over the Internet," said Mr. Goodmon, whose flagship station, WRAL, is the CBS affiliate in Raleigh. "If CBS wants to sell 'CSI,' we would like to be able to sell it for them - in partnership with them - on our Web site. I think we're in the best position to sell and promote that material on behalf of the network."

On the face of it, it's difficult to argue with that commercial logic. But even if limiting the geographic reach of content on the Internet is technologically feasible, it is ideologically contrary to one of the Web's defining principles: that it is a ubiquitous, low-cost, global distribution platform.

New gizmos like Slingbox and Sony's LocationFree are designed to allow you to tap into your hometown television signals from anywhere in the world - and a product like Decisionmark's could theoretically frustrate them, too.

The big question is whether television industry constituents - networks, affiliates, programmers, writers, even advertisers - are better served by preserving the industry's current pecking order or by pursuing a more fundamental revamping of its business model to satisfy the "anytime, anywhere" demands of digital consumers. Expect this debate to come to a head if downloads of hit shows take off and local affiliates start losing viewers and advertisers as a result.

Whereas Decisionmark's product is designed to extend a so-called old-media market online, Spot Runner's clever premise is roughly the opposite: it uses the Web to take some of what has made the Internet the fastest-growing advertising medium and extend it back to the world of television, the biggest advertising medium.

It's also a sign of the re-energized convergence craze that you have almost certainly never heard of Spot Runner: the company is officially less than two weeks old, but has been quietly incubated with $10 million in venture capital and is the brainchild of two Internet veterans, Nick Grouf and David Waxman. (The two were co-founders of PeoplePC and the Firefly Network; PeoplePC was later acquired by Earthlink, and Firefly was acquired by Microsoft.)

Spot Runner proposes a way to buy spot advertising on local cable systems for as little as $500 per television marketing campaign - making it competitive not only with the likes of Yahoo's offerings but also with local newspapers and the Yellow Pages and similar directories.

Perhaps most important, it takes the impetus to produce ads off of local cable companies and puts it on any small business with a Web hookup. Mimicking the way local ads are sold by services like Yahoo's Overture or Google's AdWords, small-business owners can go to www.spotrunner.com, type in what they want to spend, whom they want to reach and what they want to say.

Spot Runner acts as ad agency and media buyer: it has an inventory of commercial templates for 4,000 types of small businesses, each with several choices of off-the-shelf video clips, and it can place them into blocks of local cable time it controls.

If you are, say, a dry cleaner in Manhattan, the company has six prepared 30-second spots from which to choose; all it has to do is add your shop's details. One example from the Web site describes itself as: "A short documentary on the history of laundry. This is a fun ad showing old images of people slaving over their laundry. But now there's you."

It may not be Madison Avenue quality, but it puts you on the tube. And once a business signs up to use a particular ad in a market, it has exclusive use of it for the duration of the campaign. Spot Runner charges $350 to create and place the ad, and Mr. Grouf says the cost of time in some markets is less than small-business owners may think - as little as a few dollars a spot.

WE felt that the world of the Internet could be harnessed and serve local advertisers in a very efficient way," he said. "This really puts television advertising in the hands of everyone." If he is right, "Will You Marry Me, Freckle?" ads could run alongside more familiar fare from carmakers, pharmaceutical companies and restaurant chains.

By extension, these same ads could be placed on the Internet as local video-based advertising takes flight there, too.

These are, of course, just two embryonic examples among many - and in buying dMarc, Google has shown where it is placing its bets. Figuring out the winners and losers is undoubtedly no easier than it was the first time convergence redrew the media map. But it is certainly no less interesting.

    This Time, the Revolution Will Be Televised, NYT, 22.1.2006, http://www.nytimes.com/2006/01/22/business/yourmoney/22frenzy.html

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Bob Englehart

Hartford, Connecticut -- The Hartford Courant        Cagle        20.1.2006
http://cagle.msnbc.com/politicalcartoons/PCcartoons/englehart.asp

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Focus: Interview

Google's queen of big ideas

 

As the internet powerhouse takes on the White House over freedom of information, its public face, Marissa Mayer, tells where the £68bn firm is going - and how a self-confessed geek relaxes

 

Sunday January 22, 2006
David Smith in Las Vegas
Observer

 

A year ago, Marissa Mayer revealed herself as the public face of Google, the world's biggest internet search engine, to a packed lecture hall. Later, in a blog posted by audience members, it didn't take long for a theme to emerge. One wrote: 'She's hot.' Another opined: 'Yes, she's a honey too.' A third said: 'She looks like Scarlett Johansson.'
It can't be fun being a woman in Silicon Valley, surrounded by geeks who don't get out much. 'But I'm a geek, so I don't notice,' Mayer, 30, told The Observer. 'This is an example of what I do at my weekends: I decided I wanted to do a mesh of LEDs [and] ping-pong balls on my walls so I could do a changing, moving art display. The great thing about being in Silicon Valley is you can Google this stuff, and damn, sure enough, there's somebody who actually built one: you can mail them back and forth, they can give you the parts, they can teach you how to do it. That's the kind of person I am. I feel like I'm just one of a great ecosystem of people who do really cool and strange things.'

This weekend Google announced that it would not comply with requests from the White House to release records of millions of users' searches to the Justice Department. The Bush administration wanted the information to help crack down on child pornography online.

Google's stance was welcomed by civil liberties groups. But Mayer made it clear in an interview before the announcement that any organisation keeps records of those who use it. 'Just like in the real world, it's hard to undo an action,' she said. 'The same is true on the internet. So we do need users to be aware there are records and ramifications.'

Legend has it that Mayer was reluctant when, aged 23 and at Stanford University in California, she was advised to see two men on the fourth floor of the computer science building who were exploring new ways to analyse the web. 'I knew about the Stanford PhD types,' she has said. 'They love to rollerblade. They eat pizza for breakfast. They don't shower much. And they don't say "sorry" when they bump into you in the hallway.'

But Mayer did call on the pair: Larry Page and Sergey Brin, whose Google search engine went on to conquer the world, thanks in no small part to her jumping aboard in 1999. She was roughly employee number 20 and the first female engineer, and has since had hands-on responsibility for the innovations and user-friendliness that have made the company the fastest-growing in history, worth £68bn - more than Coca-Cola, General Motors or McDonald's.

Mayer now has the title of vice-president for search products and user experience, and works from 9am to midnight, a schedule that seems to preclude a boyfriend or pet. Yet she still finds time to write a blog responding to queries from Google's loyal users, one of whom regularly sends emails warning that the number of words on the famously sparse homepage is creeping too far beyond 50. She organises office outings to the cinema, having written her own software to cope with the increase in staff to more than 4,000, and has been seen giving out tickets by hand while carrying a laptop.

Ideas are invited from everyone at Google, and Mayer decides which will go before Page and Brin. Her glass-walled office at the 'GooglePlex', the firm's HQ California HQ, is reportedly opposite the engineers' coffee-break area, and she is grateful when engineers drop by late at night to share their thoughts. What is the next big idea? Mayer outlined some possibilities this month at the Consumer Electronics Show in Las Vegas, where Google launched an online video store and a free-to-download software pack.

'The presentation of results is really limited today: 10 weblinks,' she said. 'When you ask Google how to make a cake, [showing you] a video is a great answer. That's one reason we're interested in video search. If you say to Google, "the episode of Survivor I missed last night", you don't want a weblink, what you really want is that video.

'Google does a great job with text, but when it comes to voice, sound or images we really need to start pushing on those technologies ... and providing even more high quality, more relevant answers.'

Google's aspirations may one day make the computer keyboard antiquated. Mayer, who has had patents filed on her work in artificial intelligence, added: 'What we will see are more modes and mediums. How can you use Google from a phone? Is there a headset that reads your business card and runs a Google search and starts streaming the results into my eye where I can see them and you can't? Maybe it's voice in your car, so you can talk to it and have it read back results. Those things are really intriguing.'

Mayer has been a high achiever from the start. Growing up in Wausau, Wisconsin, she starred in the school debating team, captained the cheerleaders, practised ballet for years and wanted to be a doctor. As a 'persnickety little kid' she spent an afternoon fiercely arguing with friends whether a baseball diamond has 88 or 90 feet between bases (Google says 90). She turned down a job teaching computer science to join Google, but has since taught introductory computer programming classes at Stanford.

'I watch my mother: she just gets so overwhelmed sometimes with the computer. But you give someone a tool and it makes it that much more empowering. That's also the thing that excited me about teaching computer science: you can teach people for two or three weeks and they can suddenly write their own screensaver and their own browser. That sort of empowerment is what really moves innovation forward.'

Such optimism was seldom heard five years ago when the dotcom boom went bust. This time, thanks to fast broadband connections and fewer crazy schemes, maturer dotcoms such as Google seem unstoppable. Mayer said: 'The easiest way to think about 1999 is probably from the dating perspective, of being a single person in Silicon Valley. In '99 everybody you talked to was the chief executive of their new dotcom. Sergey realised that to get himself a date he needed to distinguish himself from being the founder of a losing-money dotcom - he was going to have to be the founder of a making-money dotcom.

'It feels a lot more centralised than it did in 1999, when I met the founder of the dotcom that shipped pet food after selling it online. I thought to myself: petfood's heavy. Why would you pay the shipping cost? Now the businesses usually kind of make sense to me.'

Google is succeeding in its mission to organise all the world's information, putting it on collision course with American book publishers and now the US government. Mayer is apparently ready for the fight. Type her name into Google's image search engine and there are pictures of Marissa the sweet-as-apple-pie schoolgirl and Marissa at her 30th birthday bash, looking slightly the worse for wear. This is clearly a woman who spares no one - not even herself.

 

 

 

Google: The Facts

 

· It's named after the mathematical term 'googol', a 1 with 100 zeros after it.

· Co-founders: Larry Page and Sergey Brin, each worth an estimated £6bn.

· It carries out up to 1 billion searches per week of more than 8bn web pages.

· Google.com is one of the five most popular sites on the internet.

· Company's estimated worth: £68bn.

· Webster's New Millennium Dictionary of English defines Googling as 'to search for information about a specific person through the Google search engine'.

· 'Janet Jackson' was the most Googled 'news story' in 2005.

    Google's queen of big ideas, O, 22.1.2006, http://observer.guardian.co.uk/focus/story/0,,1692168,00.html

 

 

 

home Up