Les anglonautes

About | Search | Vocapedia | Learning | Podcasts | Videos | History | Arts | Science | Translate

 Previous Home Up Next

 

History > 2011 > USA > Internet (I)

 

 

 

 

A Social Networking Device for Smokers

 

May 10, 2011
The New York Times
By JOSHUA BRUSTEIN

 

Companies have started adding the ability to communicate wirelessly to an increasing range of devices, like tablet computers, cars and refrigerators.

Now they are doing it with cigarettes.

Blu, the maker of electronic cigarettes that release a nicotine-laden vapor instead of smoke, has developed packs of e-cigarettes with sensors that will let users know when other e-smokers are nearby.

Think of it as social smoking for the social networking era.

“You’ll meet more people than ever, just because of the wow factor,” said Jason Healy, the founder of Blu, who did not appear to be making friends as he exhaled the odorless vapor of an e-cigarette at a coffee shop in Midtown Manhattan recently. “It’s like with any new technology.”

E-cigarettes have several obvious advantages to their traditional counterparts. They allow users to avoid bans on smoking in public places because they release only water vapor. Mr. Healy and other e-cigarette manufacturers also claim that they have practically no negative health effects — an assertion that draws skepticism in many quarters. But the devices are also, in their own way, gadgets.

The new “smart packs,” which will go on sale next month for $80 for five e-cigarettes, are equipped with devices that emit and search for the radio signals of other packs. When they get within 50 feet of one another, the packs vibrate and flash a blue light.

The reusable packs, which serve as a charger for the cigarettes, can be set to exchange information about their owners, like contact information on social networking sites, that can be downloaded onto personal computers.

The packs also conveniently vibrate when a smoker nears a retail outlet that sells Blu cigarettes.

Later versions will be tethered to a smartphone through an app, allowing more options for real-time communication, Mr. Healy said. The company also plans to develop a system through which the packs will monitor how much people are smoking and report back to them — or to their doctors.

Marketers think people want more devices to link to each other. More than 105 million adult Americans have at least two types of connected devices, and 37 million have five or more, according to Forrester Research.

Nintendo’s new hand-held gaming systems, the 3DS, communicate with one another when brought into close proximity. A smartphone app called Color allows users to take photographs that are then automatically shared with anyone nearby who has also downloaded the app. It recently raised $41 million from venture capitalists.

But Charles S. Golvin, an analyst at Forrester Research who has studied connected devices, said that ideas like Blu’s connected cigarettes or Color show that digital connections can get ahead of the reasons for doing so.

“The way that groups of affinity are conferred just by physical proximity makes a bit of sense,” he said. “If someone walks by with a Nintendo, great, I share a common interest. The fact that I walk by a smoker? Seems like a weak link.”

Mr. Healy says he thinks the connected packs would be most useful in nightclubs, where people are interested in striking up conversations and want to smoke without being forced outside.

Adam Alfandary, 24, a Brooklyn resident who works for a technology start-up, was skeptical. He said that the social aspects of smoking were a part of the reason he continued to light up, but he scoffed at the idea of a cigarette that would do the social part for him. “I think that’s the dumbest thing I’ve ever heard in my life,” he said.

“And I’m saying that in full acknowledgment that smoking is one of the dumbest things I can do.”

    A Social Networking Device for Smokers, NYT, 10.5.2011,
    http://www.nytimes.com/2011/05/11/technology/11smoke.html

 

 

 

 

 

Social Networks Offer a Way to Narrow the Field of Friends

 

May 9, 2011
The New York Times
By JENNA WORTHAM and CLAIRE CAIN MILLER

 

There are times when you just have to tell your friends about something — but not necessarily your Facebook friends.

Just ask Becca Akroyd. When Ms. Akroyd, a 29-year-old lawyer in Sacramento, Calif., wanted to share a picture of her new vegetable garden, she didn’t turn to Facebook. Instead she posted it on Path, a service that lets people share pictures, videos and messages with a small group.

“The people I have on my Path are the people who are going to care about the day-to-day random events in my life, or if my dog does something funny,” Ms. Akroyd said. “On Facebook, I have colleagues or family members who wouldn’t necessarily be interested in those things — and also that I wouldn’t necessarily want to have view those things.”

Path, which limits friend groups to 50, is among a new crop of Web services that allow people to connect with a handful of friends in a private group. Users get the benefits of sharing without the strangeness that can result when social worlds collide on Facebook. Other start-ups in this anti-oversharing crowd include GroupMe, Frenzy, Rally Up, Shizzlr, Huddl and Bubbla.

Even Facebook recognizes that people don’t want to share everything with every “friend.” It has privacy settings that control who can see what, but many people find these challenging to set up. So last fall, Facebook introduced Groups, for sharing with subsets of Facebook friends. And in March, it acquired Beluga, a start-up that allows sharing photos and messages with small groups privately.

Last month, Facebook said its users had created 50 million groups with a median of just eight members. It also introduced the Send button, which Web sites can use to let people share things with Facebook groups.

“We realized there wasn’t a way to share with these groups of people that were already established in your real life — family, book club members, a sports team,” said Peter Deng, director of product for Facebook Groups. “It’s one of the fastest-growing products within Facebook. Usage has been pretty phenomenal.”

Google is also working on tools for sharing with limited groups of people, according to a person briefed on the company’s plans who was not authorized to speak publicly. Slide, a maker of social networking apps that was bought by Google, recently released an iPhone app called Disco, for texting with small groups.

Google may discuss its plans in this area at a conference for developers this week. A spokeswoman, Katie Watson, declined to comment.

No one expects the start-ups in this field — most of which are new and have relatively few users — to replace Facebook or Twitter. Instead, their creators say that they do a better job of mimicking offline social relationships, and that they represent a new wave of social networking that revolves around specific tasks, like sharing photos or coordinating plans for the evening.

Shizzlr, for example, was created by two graduate business students at the University of Connecticut after they realized it was impossible to organize plans on Facebook.

“You put out a status about weekend plans and, all of a sudden, you get your uncle commenting that he wants to go hiking with you and your friends,” said Nick Jaensch, who created Shizzlr with Keith Bessette.

After users invite a few friends into a group on Shizzlr, the service grabs a list of coming events from Yelp, Google and Facebook and lets members discuss their options. The groups reach capacity at 20 people.

In the last three months, about 3,600 people have downloaded the application — a tiny number compared with Facebook’s 600 million members. But Mr. Jaensch says he is not interested in competing with Facebook.

“The people that you’ve called in the past two to three weeks are the people you actually do stuff with,” he said.

Shizzlr is just getting off the ground, but some of the other services in this field have attracted the attention of prominent investors. Path has raised $11 million from venture capitalists, including Kleiner Perkins Caufield & Byers and Index Ventures. GroupMe, which says it is handling 100 million messages a month, raised $10.6 million from Khosla Ventures, General Catalyst and First Sound, and others. AOL acquired Rally Up late last summer.

Dave Morin, Path’s founder, was an early Facebook employee, but thought the social network had grown too large and impersonal for sharing certain things. Hundreds of thousands of users have agreed and signed up for Path, sharing more than five million photos and videos so far, Mr. Morin said. Most of their groups include far fewer than the 50 friends they are allowed, he said.

“People pull out their phone and show their photos and start telling a story about their life — ‘Last week I was on vacation,’ or ‘here’s my cat,’ or ‘here’s what I ate for dinner last night’ — but when we ask if they put those photos anywhere, people would say, ‘Oh, no, no, no, it’s way too personal,’ ” Mr. Morin said.

Those photos might also be too boring for the full lineup of one’s Facebook friends. And, of course there are other photos that your cubicle neighbors and former flames might find to be ... too interesting.

“The larger social networks have certainly become more loose-tie networks of acquaintances,” said Mo Koyfman, an investor at Spark Capital who follows social media trends. “But the way we communicate with acquaintances is very different from how we communicate with friends.”

Spark recently invested in Kik, a mobile group messaging app.

Mr. Koyfman said most of these start-up applications centered on cellphones because they were inherently more personal than Web sites used at a computer.

Mr. Deng at Facebook said that his company was working on more tools for small-group sharing. But some Internet users and entrepreneurs maintain that the big social networks will always be too big for people to share comfortably.

John Winter, a developer in New Zealand, cobbled together Frenzy, an application that lets friends share links, photos, songs and other items in an invitation-only folder on the Web storage service Dropbox, effectively turning it into a private social feed.

“Twitter is public and Facebook is basically public,” he said. “What else are you going to use?”

    Social Networks Offer a Way to Narrow the Field of Friends R, 9.5.2011,
    http://www.nytimes.com/2011/05/10/technology/10social.html

 

 

 

 

 

Google to Unveil Service to Let Users Stream Their Music

 

May 10, 2011
The New York Times
By CLAIRE CAIN MILLER

 

SAN FRANCISCO — Google plans to introduce its long-awaited service to allow people to upload and store their music collections on the Web and listen to their songs on Android phones or tablets and on computers.

The announcement of the new service, a so-called cloud-based music player, will be made on Tuesday at Google I/O, the company’s developers conference here, which will run through Wednesday.

The service, to be called Music Beta by Google, is similar to one introduced by Amazon in March, although it will store considerably more music. And like Amazon, Google does not have the cooperation of music labels, which means that users cannot do certain things that would legally require licenses, like sharing songs with friends and buying songs from Google.

But Google’s announcement at this time was unexpected because it has been negotiating with the music labels for months to try to make a deal to team with them on a cloud music service.

“A couple of major labels were not as collaborative and frankly were demanding a set of business terms that were unreasonable and did not allow us to build a product or a business on a sustainable business,” said Jamie Rosenberg, director for digital content for Android. “So we’re not necessarily relying on the partnerships that have proven difficult.”

After Amazon introduced its service, music label executives said they were disappointed and exploring their legal options.

Neither Google’s nor Amazon’s cloud players make true many Web companies’ dream, which is for people to be able to listen to their music whenever they want, on any device. Ideally, Web companies would keep a copy of every song in the cloud, creating a kind of Internet jukebox, and give users instant access to those they own without uploading. But that would require licenses.

“This whole upload thing just seems like a significant barrier to wide consumer adoption, because even with broadband it just takes a long time” to upload, said David Pakman, who invests in digital media start-ups for the venture capital firm Venrock, and helped found a similar music service, Myplay, in 1999.

But Amazon forced Google’s hand, he said. “If you’re faced with another six months of brutal negotiations and your competitor just launched this, you just get in the market and get a lot of users.”

Mr. Rosenberg characterized Music Beta as a first step in a broader cloud music service and said Google hoped to continue negotiating with the record labels to get licenses to offer other things, like a music store that sells songs or a service that suggests new music to listeners.

For Google, the new service is a way to compete with the iPhone by giving Android users the ability to easily use their music collections. Android users could previously store MP3 music files on their phones but it was a cumbersome process. Amazon’s service, Cloud Player, also works on Android phones, but stores many fewer songs free.

Since songs stored by Google will stream from the Web, they are not always as accessible as songs stored on iPods, because people can’t listen to them in places without data connections, like airplanes. But Google stores copies of recently played songs and certain songs that users choose for offline access.

The music labels have long argued that they should be paid when people listen to songs on various devices. Google, Amazon and Apple, along with start-ups like Spotify and the now-defunct Imeem, have struggled to strike agreements.

Apple is still expected to be working on such a service. It acquired Lala, a cloud music service, and built a data center in North Carolina that could store users’ music collections. It also has relationships with the labels through iTunes.

Google and Amazon, meanwhile, say they do not need licenses to store music for users and play songs on multiple devices because users upload the songs they own, just as they would if they backed up their computers. “This is really a personal storage service in the same way that you would put songs on an iPad or you would put songs on a backup hard drive, so this service does not involve licenses for the music industry,” Mr. Rosenberg said.

The service is invitation-only to start. Verizon Xoom owners will receive invitations and others can sign up at music.google.com. Users download an application to their computer and upload their music, which could take many hours. The songs will be available on any device linked to the user’s Google account using a mobile app or a Web-based player, as long as they support Flash, which excludes iPhones and iPads.

Users can store 20,000 songs free, as opposed to Amazon’s service, which stores up to 1,000 songs without charge.

The service syncs activity on different devices, so if users create playlists on their phones, the playlists will automatically show up on their computers.

“We looked at the power of Google to deliver a compelling cloud-based service and essentially married those technologies with what we felt was lacking in the Android experience up until now,” Mr. Rosenberg said.

    Google to Unveil Service to Let Users Stream Their Music, R, 10.5.2011,
    http://www.nytimes.com/2011/05/10/technology/10google.html

 

 

 

 

 

YouTube adds Hollywood movies for rental

 

NEW YORK | Mon May 9, 2011
6:14pm EDT
Reuters
By Yinka Adegoke

 

NEW YORK (Reuters) - YouTube is adding more than 3,000 mainstream movies for users to rent starting on Monday, along with the millions of free user-created videos the popular website is best known for.

Google Inc-owned YouTube is offering a mix of recent Hollywood blockbusters, independent and foreign movies for 99 cents up to $3.99 each. These include last year's Oscar winners "The King's Speech" and "Inception" alongside classics including "Scarface" and "Taxi Driver." Most of the movies on the site are priced around $2.99.

In addition, hundreds of movies, including some offered before the latest launch, are available for free viewing as with other clips.

YouTube signed deals with major studios including Time Warner Inc's Warner Bros, Sony Corp'sJ Sony Pictures, Comcast Corp's Universal Pictures and Lions Gate Entertainment.

Once users have upgraded their YouTube accounts they can pay to watch a movie, which they have 30 days to begin viewing. Once users begin watching the movie, they typically have 24 hours to finish.

Many of the movies, which will be streamed, will be available at the same time as DVD releases.

Hollywood studios are slowly warming up to the idea of using social media not just for marketing but as a potential new distribution outlet like cable and theaters.

Warner Bros recently started experimenting with some of its popular movies on Facebook for a rental fee which could be paid with Facebook credits.

YouTube will allow users of movie rentals to share the movies on Facebook and Twitter but if the recipient clicks on the link they will see a trailer unless they have also rented the movie.

Another feature is YouTube Movie Extras, similar to DVD extras with behind-the-scenes videos, cast interviews, parodies and remixes made by YouTube users.

The new service is available only in the United States.

YouTube has spent the last couple of years redeveloping the popular site, to tweak its image as a site for grainy 2-minute clips of users' pets and kids.

The goal for YouTube is to drive more views of its videos which, in a fast-evolving Web content sector, need to offer better production values to compete against paid professional offerings from the likes of Hulu, Netflix Inc and websites CBS, Walt Disney Co's ABC and other broadcasters.

 

(Reporting by Yinka Adegoke; Editing by Richard Chang and Matthew Lewis)

    YouTube adds Hollywood movies for rental, R, 9.5.2011,
    http://www.reuters.com/article/2011/05/09/us-youtube-movies-idUSTRE7485WU20110509

 

 

 

 

 

Memories Lost to a Whirlwind

Alight on Facebook to Be Claimed

 

April 29, 2011
The New York Times
By AMY HARMON

 

The tornado that killed Emily Washburn’s grandfather this week also destroyed his Mississippi home, leaving his family with nothing to remember him by — until a picture of him holding the dog he loved surfaced on Facebook, posted by a woman who found it in her office parking lot, 175 miles away in Tennessee.

Like hundreds of others finding keepsakes that fell from the sky and posting photographs of them on a Facebook lost and found, the woman included her e-mail address, and Ms. Washburn wrote immediately: “That man is my granddaddy. It would mean a lot to me to have that picture.”

Created by Patty Bullion, 37, of Lester, Ala., a page on the social networking site has so far reunited dozens of storm survivors with their prized — and in some cases, only — possessions: a high school diploma that landed in a Lester front yard was traced to its owner in Tupelo, Miss., for example. A woman who lost her home in the tiny town of Phil Campbell, Ala., claimed her homemade quilt found in Athens, Ala., nearly 50 miles away: “Phil Campbell Class of 2000,” it read.

But the page is also turning social networking software designed to help friends stay in touch into an unexpected meeting ground for strangers. Along with the photographs of found items are the comments of well-wishers and homespun detectives speculating as to the identities of their owners. For those spared by the storms that killed hundreds in the South, the page is a bridge to its victims, a way to offer solace and to share in their suffering.

“Is she okay?” wrote one commenter on a snapshot of a red-haired child at a swimming pool. “I see her face throughout the day, and wonder.”

The tornado did not touch down in Lester. But when Ms. Bullion ventured into her yard on Wednesday afternoon, she found it littered with other people’s memories that the storm had disgorged in passing. One document, lying face down on the wet pavement, was a sonogram, just like those she had saved from her own pregnancies. “I would want that back,” she said.

Ms. Bullion already had her own Facebook page with a few hundred friends, but the chances of any of them knowing the people whose items she had found were slim, she thought. So she created a new page with a title that described precisely what she hoped it would contain: “Pictures and Documents found after the April 27, 2011 Tornadoes.” She asked her friends to post a link to it on their own pages.

“I feel like I know these people,” Ms. Bullion said. “They could so easily have been us.”

The first of the images that Ms. Bullion had posted was identified a few hours later by the sister of two children shown in a black-and-white photograph. They were from Hackleburg, Ala., the sister wrote in the comments section, a town almost 100 miles away: Ms. Bullion’s husband, a forest ranger, looked it up on a map.

By Friday evening, more than 52,000 people had clicked the “like” button on the page, and more than 600 pictures had been posted: an unopened letter, a death certificate and scores of photographs. Some of the items were unscathed. Some were carefully pieced together by their finder. Some, like mortgage statements and canceled checks, evoked calls to be sure to block out account numbers and personal financial information.

One water-damaged picture of a chubby-cheeked toddler elicited over two dozen comments, its rips and smudges an unavoidable metaphor for what people feared had happened to the child. “This breaks my heart,” wrote one commenter. A digitally restored version someone posted yielded approving comments, almost as though saving the picture could ensure the child’s safety.

Laura Mashburn saw some sign of providence in the fact that Hannah Wilson, the young woman whose photo she had found on her doorstep in Lester, turned out to work in a dentist’s office, just as she once had.

The woman’s co-workers saw the image of what looked to be her old prom picture on the page and supplied her name and address. Her mother, someone else volunteered, had a heart attack during the storm. “I saw Hannah yesterday,” wrote another friend, “and she is grateful to you for getting this back to her.”

Laura Monks, the director of a community college in Fayetteville, Tenn., who had found the picture of Ms. Washburn’s grandfather, Elvin Patterson, and his dog Yoyo, said she would return it right away.

“My great-grandfather’s name was Elvin also,” she wrote to Ms. Washburn in an e-mail. “Is there anything that I can do for your family or your community?”

Ms. Washburn, 31, whose maternal grandmother also died in the storm, said in an interview on Friday that she would frame the photograph. Then she said, her voice breaking, “I’ll probably give it to my mom.”

    Memories Lost to a Whirlwind Alight on Facebook to Be Claimed, R, 29.4.2011
    http://www.nytimes.com/2011/04/30/us/30reunite.html

 

 

 

 

 

Factbox: Sony breach latest in string of cyber attacks

 

BOSTON | Tue Apr 26, 2011
6:34pm EDT
Reuters

 

BOSTON (Reuters) - An unauthorized person stole names, addresses and possibly credit card data belonging to 77 million account holders on Sony's PlayStation Network in what could be one of the largest-ever Internet security breaches.

Internet security experts believe that these systems were breached by hackers who persuaded unsuspecting system administrators to load malicious software onto their machines. Here are some other large Internet security breaches:

April 2011 -- Online marketer Epsilon, which sends billions of emails a year for clients that represent a "Who's Who" of major banks and retailers, reports a breach of its system. It says that some clients' customer names and email addresses were stolen.

2010 -- Security researchers identify a computer worm dubbed Stuxnet that they speculate was designed to breach a system used to refine uranium in Iran at that nation's Natanz enrichment plant.

2010 -- Google Inc says that it was the victim of a cyber attack on its operations in China that resulted in the theft of its intellectual property. Google said that the networks of more than 20 other companies had been infiltrated.

2009 -- Hacker Albert Gonzalez pleads guilty to stealing tens of millions of payment card numbers by breaking into corporate computer systems from businesses including payment card processor Heartland Payment Systems, TJX Company Inc, 7-Eleven Inc and Target Co

 

(Reporting by Jim Finkle, editing by Bernard Orr)

    Factbox: Sony breach latest in string of cyber attacks, R, 26.4.2011,
    http://www.reuters.com/article/2011/04/26/us-sony-stolendata-factbox-idUSTRE73P7GF20110426

 

 

 

 

 

Guantanamo documents

name Pakistan ISI as al Qaeda associate

 

ISLAMABAD | Mon Apr 25, 2011
12:30pm EDT
By Chris Allbritton

 

ISLAMABAD (Reuters) - The U.S. military classified Pakistan's top spy agency as a terrorist support entity in 2007 and used association with it as a justification to detain prisoners in Guantanamo Bay, according to leaked documents published on Sunday that are sure to further alienate Pakistan.

One document (link.reuters.com/tyn29r), given to The New York Times, say detainees who associated with Pakistan's Inter-Services Intelligence Directorate "may have provided support to al-Qaida or the Taliban, or engaged in hostilities against US or Coalition forces."

The ISI, along with al Qaeda, Hamas and Hezbollah and Iranian intelligence, are among 32 groups on the list of "associated forces," which also includes Egypt's Islamic Jihad, headed by al Qaeda deputy Ayman al-Zawahiri.

The document defines an "associate force" as "militant forces and organizations with which al-Qaida, the al-Qaida network, or the Taliban has an established working, supportive, or beneficiary relationship for the achievement of common goals."

The ISI said it had no comment.

The "JTF-GTMO Matrix of Threat Indicators for Enemy Combatants" likely dates from 2007 according to its classification code, and is part of a trove of 759 files on detainees held in Guantanamo Bay, the U.S. military prison in Cuba.

The secret documents were obtained by WikiLeaks and date from between 2002 and 2009, but they were made available to The New York Times from a separate source, the paper said.

They reveal that most of the 172 remaining prisoners have been rated as a "high risk" of posing a threat to the United States and its allies if released without adequate rehabilitation and supervision, the newspaper said.

The documents also show about a third of the 600 detainees already sent to other countries were also designated "high risk" before they were freed or passed to the custody of other governments, the Times said in its report late on Sunday.

 

SEAT-OF-THE-PANTS INTELLIGENCE GATHERING

The dossiers, prepared under the Bush administration, also show the seat-of-the-pants intelligence gathering in war zones that led to the incarcerations of innocent men for years in cases of mistaken identity or simple misfortune, the Times said.

The documents are largely silent about the use of the harsh interrogation tactics at Guantanamo that drew global condemnation, the newspaper reported.

The Times also said an Obama administration task force set up in January 2009 had reviewed the assessments and, in some cases, come to different conclusions. "Thus... the documents published by The Times may not represent the government's current views of detainees at Guantanamo."

WikiLeaks previously released classified Pentagon reports on the wars in Afghanistan and Iraq and 250,000 State Department cables. Bradley Manning, a 23-year-old U.S. soldier accused of leaking secret documents to WikiLeaks has been detained since May of last year.

Last week, the Admiral Mike Mullen, chairman of the U.S. military's Joint Chiefs of Staff, told Pakistani media that the ISI had a "longstanding" relationship with the Haqqani Network which is allied to al Qaeda.

"Haqqani is supporting, funding, training fighters that are killing Americans and killing coalition partners. And I have a sacred obligation to do all I can to make sure that doesn't happen," Mullen told Pakistan's daily Dawn newspaper.

"So that's at the core -- it's not the only thing -- but that's at the core that I think is the most difficult part of the relationship," Mullen said.

Pakistan's powerful ISI has long been suspected of maintaining ties to the Haqqani network, cultivated during the 1980s when Jalaluddin Haqqani was a feared battlefield commander against the Soviet Union in Afghanistan.

U.S.-Pakistan ties have been strained this year by the case of CIA contractor Raymond Davis, who shot dead two Pakistanis in Lahore on January 27, as well as by tensions in Pakistan over U.S. drone strikes that have fanned anti-American sentiment.

(Editing by Andrew Marshall)

    Guantanamo documents name Pakistan ISI as al Qaeda associate, R, 25.4.2011,
    http://www.reuters.com/article/2011/04/25/us-pakistan-usa-guantanmo-idUSTRE73O2L920110425

 

 

 

 

 

A Statement by the United States Government

 

April 24, 2011
The New York Times

 

“It is unfortunate that The New York Times and other news organizations have made the decision to publish numerous documents obtained illegally by Wikileaks concerning the Guantanamo detention facility. These documents contain classified information about current and former GTMO detainees, and we strongly condemn the leaking of this sensitive information.

“The Wikileaks releases include Detainee Assessment Briefs (DABs) written by the Department of Defense between 2002 and early 2009. These DABs were written based on a range of information available then.

“The Guantanamo Review Task Force, established in January 2009, considered the DABs during its review of detainee information. In some cases, the Task Force came to the same conclusions as the DABs. In other instances the Review Task Force came to different conclusions, based on updated or other available information. The assessments of the Guantanamo Review Task Force have not been compromised to Wikileaks. Thus, any given DAB illegally obtained and released by Wikileaks may or may not represent the current view of a given detainee.

“Both the previous and the current Administrations have made every effort to act with the utmost care and diligence in transferring detainees from Guantanamo. The previous Administration transferred 537 detainees; to date, the current Administration has transferred 67. Both Administrations have made the protection of American citizens the top priority and we are concerned that the disclosure of these documents could be damaging to those efforts. That said, we will continue to work with allies and partners around the world to mitigate threats to the U.S. and other countries and to work toward the ultimate closure of the Guantanamo detention facility, consistent with good security practices and our values as a nation.”

Geoff Morrell

Pentagon Press Secretary

Ambassador Dan Fried

Special Envoy for Closure of the Guantanamo Detention Facility

    A Statement by the United States Government, NYT, 24.4.2011,
    http://www.nytimes.com/2011/04/25/world/guantanamo-files-us-government-statement.html

 

 

 

 

 

Classified Files Offer New Insights Into Detainees

 

April 24, 2011
The New York Times
By CHARLIE SAVAGE, WILLIAM GLABERSON and ANDREW W. LEHREN

 

WASHINGTON — A trove of more than 700 classified military documents provides new and detailed accounts of the men who have done time at the Guantánamo Bay prison in Cuba, and offers new insight into the evidence against the 172 men still locked up there.

Military intelligence officials, in assessments of detainees written between February 2002 and January 2009, evaluated their histories and provided glimpses of the tensions between captors and captives. What began as a jury-rigged experiment after the 2001 terrorist attacks now seems like an enduring American institution, and the leaked files show why, by laying bare the patchwork and contradictory evidence that in many cases would never have stood up in criminal court or a military tribunal.

The documents meticulously record the detainees’ “pocket litter” when they were captured: a bus ticket to Kabul, a fake passport and forged student ID, a restaurant receipt, even a poem. They list the prisoners’ illnesses — hepatitis, gout, tuberculosis, depression. They note their serial interrogations, enumerating — even after six or more years of relentless questioning — remaining “areas of potential exploitation.” They describe inmates’ infractions — punching guards, tearing apart shower shoes, shouting across cellblocks. And, as analysts try to bolster the case for continued incarceration, they record years of detainees’ comments about one another.

The secret documents, made available to The New York Times and several other news organizations, reveal that most of the 172 remaining prisoners have been rated as a “high risk” of posing a threat to the United States and its allies if released without adequate rehabilitation and supervision. But they also show that an even larger number of the prisoners who have left Cuba — about a third of the 600 already transferred to other countries — were also designated “high risk” before they were freed or passed to the custody of other governments.

The documents are largely silent about the use of the harsh interrogation tactics at Guantánamo — including sleep deprivation, shackling in stress positions and prolonged exposure to cold temperatures — that drew global condemnation. Several prisoners, though, are portrayed as making up false stories about being subjected to abuse.

The government’s basic allegations against many detainees have long been public, and have often been challenged by prisoners and their lawyers. But the dossiers, prepared under the Bush administration, provide a deeper look at the frightening, if flawed, intelligence that has persuaded the Obama administration, too, that the prison cannot readily be closed.

Prisoners who especially worried counterterrorism officials included some accused of being assassins for Al Qaeda, operatives for a canceled suicide mission and detainees who vowed to their interrogators that they would wreak revenge against America.

The military analysts’ files provide new details about the most infamous of their prisoners, Khalid Shaikh Mohammed, the planner of the Sept. 11, 2001, attacks. Sometime around March 2002, he ordered a former Baltimore resident to don a suicide bomb vest and carry out a “martyrdom” attack against Pervez Musharraf, then Pakistan’s president, according to the documents. But when the man, Majid Khan, got to the Pakistani mosque that he had been told Mr. Musharraf would visit, the assignment turned out to be just a test of his “willingness to die for the cause.”

The dossiers also show the seat-of-the-pants intelligence gathering in war zones that led to the incarcerations of innocent men for years in cases of mistaken identity or simple misfortune. In May 2003, for example, Afghan forces captured Prisoner 1051, an Afghan named Sharbat, near the scene of a roadside bomb explosion, the documents show. He denied any involvement, saying he was a shepherd. Guantánamo debriefers and analysts agreed, citing his consistent story, his knowledge of herding animals and his ignorance of “simple military and political concepts,” according to his assessment. Yet a military tribunal declared him an “enemy combatant” anyway, and he was not sent home until 2006.

Obama administration officials condemned the publication of the classified documents, which were obtained by the anti-secrecy group WikiLeaks last year but provided to The Times by another source. The officials pointed out that an administration task force set up in January 2009 reviewed the information in the prisoner assessments, and in some cases came to different conclusions. Thus, they said, the documents published by The Times may not represent the government’s current view of detainees at Guantánamo.

Among the findings in the files:

¶The 20th hijacker: The best-documented case of an abusive interrogation at Guantánamo was the coercive questioning, in late 2002 and early 2003, of Mohammed Qahtani. A Saudi believed to have been an intended participant in the Sept. 11 attacks, Mr. Qahtani was leashed like a dog, sexually humiliated and forced to urinate on himself. His file says, “Although publicly released records allege detainee was subject to harsh interrogation techniques in the early stages of detention,” his confessions “appear to be true and are corroborated in reporting from other sources.” But claims that he is said to have made about at least 16 other prisoners — mostly in April and May 2003 — are cited in their files without any caveat.

¶Threats against captors: While some detainees are described in the documents as “mostly compliant and rarely hostile to guard force and staff,” others spoke of violence. One detainee said “he would like to tell his friends in Iraq to find the interrogator, slice him up, and make a shwarma (a type of sandwich) out of him, with the interrogator’s head sticking out of the end of the shwarma.” Another “threatened to kill a U.S. service member by chopping off his head and hands when he gets out,” and informed a guard that “he will murder him and drink his blood for lunch. Detainee also stated he would fly planes into houses and prayed that President Bush would die.”

¶The role of foreign officials: The leaked documents show how many foreign countries sent intelligence officers to question Guantánamo detainees — among them China, Russia, Tajikistan, Yemen, Saudi Arabia, Jordan, Kuwait, Algeria and Tunisia. One such visit changed a detainee’s account: a Saudi prisoner initially told American interrogators he had traveled to Afghanistan to train at a Libyan-run terrorist training camp. But an analyst added: “Detainee changed his story to a less incriminating one after the Saudi Delegation came and spoke to the detainees.”

¶A Qaeda leader’s reputation: The file for Abd al-Rahim al-Nashiri, who was charged before a military commission last week for plotting the bombing of the American destroyer Cole in 2000, says he was “more senior” in Al Qaeda than Khalid Shaikh Mohammed, and describes him as “so dedicated to jihad that he reportedly received injections to promote impotence and recommended the injections to others so more time could be spent on the jihad (rather than being distracted by women).”

¶The Yemenis’ hard luck: The files for dozens of the remaining prisoners portray them as low-level foot-soldiers who traveled from Yemen to Afghanistan before the Sept. 11 attacks to receive basic military training and fight in the civil war there, not as global terrorists. Otherwise identical detainees from other countries were sent home many years ago, the files show, but the Yemenis remain at Guantánamo because of concerns over the stability of their country and its ability to monitor them.

¶Dubious information: Some assessments revealed the risk of relying on information supplied by people whose motives were murky. Hajji Jalil, then a 33-year-old Afghan, was captured in July 2003, after the Afghan chief of intelligence in Helmand Province said Mr. Jalil had taken an “active part” in an ambush that killed two American soldiers. But American officials, citing “fraudulent circumstances,” said later that the intelligence chief and others had participated in the ambush, and they had “targeted” Mr. Jalil “to provide cover for their own involvement.” He was sent home in March 2005.

¶A British agent: One report reveals that American officials discovered a detainee had been recruited by British and Canadian intelligence to work as an agent because of his “connections to members of various Al-Qaeda-linked terrorist groups.” But the report suggests that he had never shifted his militant loyalties. It says that the Central Intelligence Agency, after repeated interrogations of the detainee, concluded that he had “withheld important information” from the British and Canadians, and assessed him “to be a threat” to American and allied personnel in Afghanistan and Pakistan. He has since been sent back to his country.

¶A journalist’s interrogation: The documents show that a major reason a Sudanese cameraman for Al Jazeera, Sami al-Hajj, was held at Guantánamo for six years was for questioning about the television network’s “training program, telecommunications equipment, and newsgathering operations in Chechnya, Kosovo, and Afghanistan,” including contacts with terrorist groups. While Mr. Hajj insisted he was just a journalist, his file says he helped Islamic extremist groups courier money and obtain Stinger missiles and cites the United Arab Emirates’ claim that he was a Qaeda member. He was released in 2008 and returned to work for Al Jazeera.

¶The first to leave: The documents offer the first public look at the military’s views of 158 detainees who did not receive a formal hearing under a system instituted in 2004. Many were assessed to be “of little intelligence value” with no ties to or significant knowledge about Al Qaeda or the Taliban, as was the case of a detainee who was an Afghan used car salesman. But also among those freed early was a Pakistani who would become a suicide attacker three years later.

Many of the dossiers include official close-up photographs of the detainees, providing images of hundreds of the prisoners, many of whom have not been seen publicly in years.

The files — classified “secret” and marked “noforn,” meaning they should not be shared with foreign governments — represent the fourth major collection of secret American documents that have become public over the past year; earlier releases included military incident reports from the wars in Afghanistan and Iraq and portions of an archive of some 250,000 diplomatic cables. Military prosecutors have accused an Army intelligence analyst, Pfc. Bradley Manning, of leaking the materials.

The Guantánamo assessments seem unlikely to end the long-running debate about America’s most controversial prison. The documents can be mined for evidence supporting beliefs across the political spectrum about the relative perils posed by the detainees and whether the government’s system of holding most without trials is justified.

Much of the information in the documents is impossible to verify. The documents were prepared by intelligence and military officials operating at first in the haze of war, then, as the years passed, in a prison under international criticism. In some cases, judges have rejected the government’s allegations, because confessions were made during coercive interrogation or other sources were not credible.

In 2009, a task force of officials from the government’s national security agencies re-evaluated all 240 detainees then remaining at the prison. They vetted the military’s assessments against information held by other agencies, and dropped the “high/medium/low” risk ratings in favor of a more nuanced look at how each detainee might fare if released, in light of his specific family and national environment. But those newer assessments are still secret and not available for comparison.

Moreover, the leaked archive is not complete; it contains no assessments for about 75 of the detainees.

Yet for all the limitations of the files, they still offer an extraordinary look inside a prison that has long been known for its secrecy and for a struggle between the military that runs it — using constant surveillance, forced removal from cells and other tools to exert control — and detainees who often fought back with the limited tools available to them: hunger strikes, threats of retribution and hoarded contraband ranging from a metal screw to leftover food.

Scores of detainees were given disciplinary citations for “inappropriate use of bodily fluids,” as some files delicately say; other files make clear that detainees on a fairly regular basis were accused by guards of throwing urine and feces.

No new prisoners have been transferred to Guantánamo since 2007. Some Republicans are urging the Obama administration to send newly captured terrorism suspects to the prison, but so far officials have refused to increase the inmate population.

As a result, Guantánamo seems increasingly frozen in time, with detainees locked into their roles at the receding moment of their capture.

For example, an assessment of a former top Taliban official said he “appears to be resentful of being apprehended while he claimed he was working for the US and Coalition forces to find Mullah Omar,” a reference to Mullah Muhammad Omar, the Taliban chief who is in hiding.

But whatever the truth about the detainee’s role before his capture in 2002, it is receding into the past. So, presumably, is the value of whatever information he possesses. Still, his jailers have continued to press him for answers. His assessment of January 2008 — six years after he arrived in Cuba — contended that it was worthwhile to continue to interrogate him, in part because he might know about Mullah Omar’s “possible whereabouts.”

 

Charlie Savage reported from Washington, and William Glaberson and Andrew W. Lehren from New York. Scott Shane contributed reporting from Washington, and Benjamin Weiser and Andrei Scheinkman from New York.

    Classified Files Offer New Insights Into Detainees, NYT, 24.4.2011,
    http://www.nytimes.com/2011/04/25/world/guantanamo-files-lives-in-an-american-limbo.html

 

 

 

 

 

At Facebook headquarters,

Obama seeks 2008 campaign energy

 

PALO ALTO, Calif | Wed Apr 20, 2011
6:53pm EDT
Reuters
By Jeff Mason

 

PALO ALTO, Calif (Reuters) - President Barack Obama sought to reignite the youthful energy that propelled his 2008 election Wednesday with a campaign-style visit to the nexus of social communications, Facebook.

Democrats acknowledge that Obama will need to rally many of the same forces that propelled him into the White House in order to win re-election in 2012: an army of young, energetic voters as well as a sizable showing from independent voters.

By visiting Facebook headquarters in California's Silicon Valley, where 26-year-old founder Mark Zuckerberg is a folk hero, Obama sought to connect to tens of millions of people who have adopted social media as a prime method of communications.

"My name is Barack Obama and I'm the guy who got Mark to wear a jacket and tie," the president said, to laughter, at the beginning of a live-streamed town hall event with Zuckerberg.

Zuckerberg, dressed in jeans, sneakers and a tie, and Obama, dressed in a business suit, then took off their jackets before the president started fielding questions about how to reduce the budget deficit, which is projected to hit $1.4 trillion this fiscal year.

Promoting his plan of spending cuts and tax increases for the wealthiest Americans, Obama told the rich Facebook founder that both of them would have to pay more taxes to help out.

"I'm cool with that," Zuckerberg said.

Obama heads to San Francisco for Democratic fund-raising events after the Facebook session.

He then plans stops in Las Vegas and Los Angeles before returning to Washington Friday.

Jon Krosnick, a political science professor at Stanford University, said having Obama on stage with Zuckerberg could help the president with young people.

"That alone is a way of trying to re-energize this young generation that might be crucial for him to be re-elected again," Krosnick said.

Obama held his deficit-cutting roadshow as policy-makers and financial markets recover from ratings agency Standard & Poor's threat to downgrade America's triple-A credit rating on worries Washington won't address its fiscal woes.

A potential Republican challenger to Obama, former Massachusetts Governor Mitt Romney, said S&P "downgraded the Obama presidency" and that Obama should meet with S&P officials to try to gain their confidence.

 

DEEPENING ECONOMIC PESSIMISM

It is early in the 2012 election cycle, but Obama has much work ahead. An ABC News/Washington Post poll released on Tuesday showed Obama's approval ratings near record lows because of deepening economic pessimism among Americans.

Ipsos pollster Cliff Young said rising gasoline prices are taking their toll but they probably did not present a long-term problem for Obama, who he called the odds-on favorite.

Obama is using the first steps on the road to 2012 to promote a budget ideology that is at odds with the fiscal views of Republicans who are planning presidential campaigns.

He wants to raise taxes on wealthier Americans to fund social programs while making some budget cuts, a plan he says would bring down deficits by $4 trillion over 12 years.

Republican Representative Paul Ryan has called for slightly higher cuts, $4.4 trillion over 10 years, without raising taxes. He would make deep cuts in spending, including overhauls in the Medicare and Medicaid health programs for the elderly and poor that Democrats say would violate the "social compact" with Americans.

Obama said Ryan's plan was "fairly radical" and that his budget proposal was not "particularly courageous."

"Nothing is easier than solving a problem on the backs of people who are poor or people who are powerless or don't have lobbyists or don't have clout," he said to applause.

Polls suggests Americans so far are siding with Obama.

Data released from the ABC News/Washington Post poll on Wednesday said 72 percent of those surveyed favor higher taxes for wealthy Americans and 78 percent opposed to cutting health benefits for the elderly. The survey of 1,001 adults has a 3.5 percentage point error margin.

 

(Additional reporting by Kim Dixon, Alister Bull, Peter Henderson, Alexei Oreskovic and David Morgan; Writing by Steve Holland and Jeff Mason; Editing by Deborah Charles)

    At Facebook headquarters, Obama seeks 2008 campaign energy, R, 20.4.2011,
   
http://www.reuters.com/article/2011/04/20/us-usa-politics-obama-idUSTRE73J0W920110420

 

 

 

 

 

U.S. Cracks Down on Online Gambling

 

April 15, 2011
The New York Times
By MATT RICHTEL

 

In an aggressive attack on Internet gambling, federal prosecutors on Friday unsealed fraud and money laundering charges against operators of three of the most popular online poker sites. The government also seized the Internet addresses of the sites, a new enforcement tactic that effectively shuttered their doors.

Prosecutors charged that the operators of Full Tilt Poker, PokerStars and Absolute Poker tricked banks into processing billions of dollars in payments from customers in the United States. They said the actions violated a federal law passed in 2006 that prohibits illegal Internet gambling operations from accepting payments.

The sites have their headquarters in places where online gambling is legal — Antigua and the Isle of Man — a hurdle that has made it difficult for authorities in the United States to crack down on the industry. The indictment shows the intensifying game of cat-and-mouse between prosecutors and gambling sites that generate billions of dollars in transactions.

The online poker operators sought to avoid detection by banks and legal authorities by funneling payments through fictitious online businesses that purported to sell jewelry, golf balls and other items, according to the indictment. It says that when some banks processed the payments, they were unaware of the real nature of the business, but the site operators also bribed banks into accepting the payments.

Preet Bharara, the United States attorney for the Southern District of New York, said in a statement that the defendants “concocted an elaborate criminal fraud scheme, alternately tricking some U.S. banks and effectively bribing others to assure the continued flow of billions in illegal gambling profits.”

Representatives for the poker sites could not immediately be reached.

On Friday, authorities arrested two defendants, including John Campos, the vice chairman of a small bank in Saint George, Utah, who they said processed gambling transactions in exchange for a $20,000 fee and a $10 million investment in the bank by poker site operators and their associates. The United States attorney’s office is working with foreign law enforcement in hopes of extraditing defendants located abroad and seizing their assets.

Experts in gambling law said that the forceful action raises tricky questions about gambling laws and the government’s reach. These experts said it was not clear, for example, whether countries that sanctioned and licensed such activity would allow extraditions.

Lawrence Walters, a lawyer who represents online gambling operations, though not those involved in these cases, said the indictment might raise an even more fundamental question: Is online poker actually illegal? Federal law prohibits sports betting, but experts are divided over whether it clearly prohibits online games like poker and blackjack.

In the indictment, prosecutors seemed to skirt the issue. They based parts of their prosecution on state laws in New York and elsewhere that prohibited unlicensed gambling, including poker. Legal experts said the prosecutors needed to rely on such prohibitions as a foundation for going after the claims of money laundering and fraud. But Mr. Walters said this strategy might face challenges. He said it was not clear that the state laws applied to foreign-based gambling operations, given that under federal law, international commerce was regulated at the federal level.

“This appears to be a precedent-setting case,” Mr. Walters said. “It will be the first time the Department of Justice takes on the looming question of whether federal law prohibits online poker.”

Opponents of online gambling have been trying to figure out for years how best to police casinos that can be located abroad but reach easily into American homes. According to statistics provided by the Poker Player’s Alliance, an advocacy organization led by former Senator Alfonse D’Amato of New York, seven million Americans play online for money once a month.

In a statement, Mr. D’Amato criticized the prosecution. “We are shocked at the action,” he said, adding, “Online poker is not a crime and should not be treated as such.”

ComScore, a company that measures Internet traffic, said that in March, Full Tilt Poker had 2.6 million visitors from the United States, PokerStars had 1.9 million and Absolute Poker had 1.3 million. ComScore also reported that 1.4 million people visited Ultimate Bet, a site that the federal indictment says joined forces last year with Absolute Poker. Those were the nation’s four most popular poker sites, ComScore said.

On Friday, visitors to those sites were met with a message that begins: “This domain name has been seized by the F.B.I.” The government used the same controversial tactic of seizing domain names in actions last year against sites accused of copyright violations. Losing a domain name can be costly for a company that has invested in promoting it as the main route to its site. But the tactic can also be of only temporary effectiveness, because the company can switch to a new Web address that is outside the reach of law enforcement in the United States — one that, for example, does not end in .com.

According to the indictment, the fraud and money laundering scheme evolved from deception to bribery. Initially, after the enactment of the 2006 law aimed at limiting payment processing for online gambling, the defendants sought to dupe banks by creating fake companies, according to the indictment.

But the indictment says that as financial institutions got wise to those efforts, several defendants sough to persuade smaller banks to process the transactions by making multimillion-dollar investments in them.

    U.S. Cracks Down on Online Gambling, NYT, 15.4.2011,
    http://www.nytimes.com/2011/04/16/technology/16poker.html

 

 

 

 

 

U.S. shuts down massive cyber theft ring

 

WASHINGTON/BOSTON | Wed Apr 13, 2011
6:55pm EDT
By Diane Bartz and Jim Finkle

 

WASHINGTON/BOSTON (Reuters) - U.S. authorities claimed one of their biggest victories against cyber crime as they shut down a ring they said used malicious software to take control of more than 2 million PCs around the world, and may have led to theft of more than $100 million.

A computer virus, dubbed Coreflood, infected more than 2 million PCs, enslaving them into a "botnet" that grabbed banking credentials and other sensitive data its masters used to steal funds via fraudulent banking and wire transactions, the U.S. Department of Justice said on Wednesday.

The government shuttered that botnet, which had operated for a decade, by seizing hard drives used to run it after a federal court in Connecticut gave the go-ahead.

"This was big money stolen on a large scale by foreign criminals. The FBI wanted to stop it and they did an incredibly good job at it," said Alan Paller, director of research at the SAN Institute, a nonprofit group that helps fight cyber crime.

The vast majority of the infected machines were in the United States, but the criminal gang was likely overseas.

"We're pretty sure a Russian crime group was behind it," said Paller.

Paller and other security experts said it was hard to know how much money the gang stole. It could easily be tens of millions of dollars and could go above $100 million, said Dave Marcus, McAfee Labs research and communications director.

A civil complaint against 13 unnamed foreign nationals was also filed by the U.S. district attorney in Connecticut. It accused them of wire and bank fraud. The Justice Department said it had an ongoing criminal investigation.

The malicious Coreflood software was used to infect computers with keylogging software that stole user names, passwords, financial data and other information, the Justice Department said.

"The seizure of the Coreflood servers and Internet domain names is expected to prevent criminals from using Coreflood or computers infected by Coreflood for their nefarious purposes," U.S. Attorney David Fein said in a statement.

In March, law enforcement raids on servers used by a Rustock botnet were shut down after legal action against them by Microsoft Corp. Authorities severed the Rustock IP addresses, effectively disabling the botnet.

Rustock had been one of the biggest producers of spam e-mail, with some tech security experts estimating they produced half the spam that fills people's junk mail bins.

A botnet is essentially one or more servers that spread malicious software and use the software to send spam or to steal personal information or data that can be used to empty a victim's bank account.

U.S. government programmers shut down the Coreflood botnet on Tuesday. They also instructed the computers enslaved in the botnet to stop sending stolen data and to shut down. A similar tactic was used in a Dutch case, but it was the first time U.S. authorities had used this method to shut down a botnet, according to court documents.

Victims of the botnet included a real estate company in Michigan that lost $115,771, a South Carolina law firm that lost $78,421 and a Tennessee defense contractor that lost $241,866, according to the complaint filed in the U.S. District Court for the District of Connecticut.

The government plans to work with Internet service providers around the country to identify other victims.

 

(Reporting by Diane Bartz and Jim Finkle; editing by Gary Hill and Andre Grenon)

    U.S. shuts down massive cyber theft ring, R, 13.4.2011,
    http://www.reuters.com/article/2011/04/13/us-cybersecurity-coreflood-idUSTRE73C7NQ20110413

 

 

 

 

 

Analysis: Data breach shows new "spear-phishing" risk

 

BOSTON/WASHINGTON | Mon Apr 4, 2011
9:43pm EDT
Reuters
By Ross Kerber and Diane Bartz

 

BOSTON/WASHINGTON (Reuters) - Tens of millions of customers and employees of major banks, hotels and retailers are now at risk of "spear-phishing" attacks after hackers stole their email addresses in what may become one of the biggest data breaches ever, security experts warned.

The massive breach, involving online marketer Epsilon, a unit of Alliance Data Systems Corp, looks like it will mainly put individuals at risk if they respond to camouflaged emails seeking their credit card numbers or other information, though it could help make those emails more believable.

The breach appeared to hit about 50 companies. About two percent of the companies that pay Epsilon to email their customers had data exposed in the attack, the online marketer said in a brief online statement on Monday. A spokeswoman would not give more details, but the company said on its website it has more 2,500 customers in all.

The breach, disclosed in stages since Friday, also reminded experts of other recent incidents in which individual company employees were targeted for email scams.

On Friday, Epsilon said some clients' customer names and email addresses were obtained via an "unauthorized entry."

Companies that have said they were exposed since then include banks Citigroup Inc and Capital One Financial Corp, and retailers Walgreen Co and Best Buy Co.

More companies came forward on Monday, including Blackstone Group LP's Hilton Hotels, Marriott International Inc and Target Corp.

Compromised files apparently did not include the payment card data that has created scares in the past, such as at retailer TJX Cos.

But security experts said just having email addresses -- plus knowing where someone shops -- can help thieves write more sophisticated emails to steal financial data or spread malicious software, or malware.

That practice -- using emails that appear to come from a trustworthy source to steal data -- is sometimes known "spear-phishing" because such emails are more focused than traditional "phishing" emails.

 

BETTER TARGETING

One aim can be to get behind a company's firewalls without needing sophisticated software, said Anup Ghosh, chief scientist of Virginia security firm Invincea. Thieves might then aim for business plans or trade secrets.

"I think the Epsilon breach is a symptom of where we are in the security industry," he said. "If you look at the attacks over the past quarter they're all targeting the users, the employees inside the companies," he said.

Gartner Group analyst Avivah Litan said the Epsilon case showed better security rules may be needed. "The criminals are definitely trending toward targeted attacks, and they often start with targeted spear-phishing emails," she said.

Even as the Epsilon alarm sounded, details came out Friday in another spear-phishing case. This involved the RSA security unit of data-storage giant EMC Corp.

According to a company blog dated April 1, an attacker sent two different phishing emails over a two-day period "to two small groups of employees" that seemed harmless, with the subject line "2011 Recruitment Plan."

"This was intriguing enough for one of the employees to actually pull the e-mail out of their junk box and double-click on the email attachment," according to the blog.

The attachment was a spreadsheet that also contained a feature that exploited a security vulnerability to give access to the employees' PCs and elsewhere in RSA.

Other attacks against oil and energy companies have been classified as "Night Dragon" by security firm McAfee, now part of Intel Corp, and also rely on spear-phishing and other misleading methods.

Epsilon helps companies manage email marketing campaigns. It is too early to know the financial consequences of the attack for Epsilon, said David Frankland, who follows the company for Forrester Research.

But, he said, other marketers could have been hit just as easily. "This is an industry issue, everybody in this industry should recognize that they've dodged a bullet," said Frankland. He said he received emails from Disney, Best Buy and retailer Brookstone Inc notifying him his email had been obtained in the Epsilon attack.

 

REVIEWS UNDER WAY

Kevin Rowney, director of breach response at Symantec Corp, said it would be weeks before investigators would figure out who hacked into Epsilon's records.

"Given the phishing activity it feels like a hacker crime ring. It's not a nation state or an intelligence agency. It's clearly someone interested in profit off of this data," he said.

Joris Evers, spokesman for McAfee, said individuals as well as companies should be on the lookout for tricks. Addresses gathered from Epsilon, he said, could be a treasure trove for cyberattackers who could use the information to trick unsuspecting individuals out of more valuable information such as credit card numbers and home addresses.

 

(Additional reporting by Martinne Geller and Maria Aspan in New York)

(Editing by Ros Krasny, Steve Orlofsky and Bernard Orr)

    Analysis: Data breach shows new "spear-phishing" risk, R, 4.4.2011,
http://www.reuters.com/article/2011/04/05/us-hackers-epsilon-idUSTRE7336DZ20110405

 

 

 

 

 

Targeted cyber attacks to rise further: Symantec

 

HELSINKI | Tue Apr 5, 2011
12:21am EDT
Reuters
By Tarmo Virki, European Technology Correspondent

 

HELSINKI (Reuters) - Targeted cyber attacks will pose a growing threat to companies around the world this year after the Stuxnet worm hit Iran's nuclear program in 2010, security software maker Symantec Corp said on Tuesday.

"Last year was the year of high-profile targeted attacks. We will see so many more," said Sian John, security strategist at Symantec.

So-called targeted attacks succeed as most consumers avoid clicking on suspicious links in spam emails, but open files that seem to arrive from legitimate senders.

"They are more challenging, but the return is higher," John said.

In total, the number of measured Web-based attacks rose 93 percent in 2010 from a year ago, boosted by proliferation of shortened Internet addresses, Symantec said in its annual threat review.

"Last year, attackers posted millions of these shortened links on social networking sites to trick victims into both phishing and malware attacks, dramatically increasing the rate of successful infection," Symantec said.

Social networking sites are increasingly important platform for attackers as their popularity among consumers is rising fast.

The software company said attacks on leading mobile platforms were also set to increase after a 42 percent rise in mobile vulnerabilities last year.

"The major mobile platforms are finally becoming ubiquitous enough to garner the attention of attackers," Symantec said. "Attackers are really following the consumers here."

 

(Editing by Andre Grenon)

    Targeted cyber attacks to rise further: Symantec, R, 6.4.2011,
http://www.reuters.com/article/2011/04/05/us-computer-security-research-idUSTRE7340QY20110405

 

 

 

 

 

Google's Page presages bolder era; some uneasy

 

SAN FRANCISCO | Mon Apr 4, 2011
7:07pm EDT
Reuters
By Alexei Oreskovic

 

SAN FRANCISCO (Reuters) - Google Inc's Larry Page is back in charge of the company he founded a decade ago and, while some investors are uneasy about his credentials, they hope he will breathe new life into the Internet search giant.

Page takes over on Monday after a decade of "adult supervision" for Google under Eric Schmidt, as the outgoing CEO called it. The switch comes as mobile gadgets redefine the way people use the Internet and Google's main ad business is under threat from rapidly growing upstarts such as Facebook and Groupon.

Page, who as a graduate student paired up with Sergey Brin to create the algorithm that launched Google's search engine to Web stardom, has yet to make his battle plan public. But industry insiders and analysts expect he will try to shore up Google's strength in search and mobile, while breaking into a hot social networking market that has eluded his company.

In the three months since the announcement that Schmidt would step down to become executive chairman, Page has wasted little time taking greater control of the company and hacking away at some of the bureaucracy, according to a Google executive who requested anonymity because he was not authorized to speak about internal matters.

Page's first official day on the job was also marked by the resignation of Google's Senior Vice President of Product Management, Jonathan Rosenberg.

A Google spokesperson told Reuters Rosenberg had planned to leave the company in the next year or two as his children reached college age, but decided it was appropriate to do so now since he could not commit to being part of the team for any significant amount of time going forward. Rosenberg plans on writing a book and is not joining another company, the spokesperson said.

To some industry observers, the jury is still out as to whether Page can win back investors and shareholders to re-energize the company's stock and stem an exodus of talent to smaller start-ups dangling pre-IPO stock options. Google shares have slid more than 6 percent since his CEO appointment was announced in January.

Page and Brin were the top managers under Schmidt.

Ironfire Capital Managing Partner Eric Jackson says Page, whose reported disdain for marketing and public relations was detailed in the Ken Auletta book "Googled," could make investors uneasy.

"The first couple of big public events he does, whether it's an earnings call or an investment banker conference, there is going to be a huge immediate interest in how he performs and I think he's bound to disappoint," said Jackson, who does not have a position in Google.

Like Yahoo Inc founder Jerry Yang's, whose tenure there as CEO in 2007 and 2008 drew an extraordinary investor backlash, Page may not be comfortable as the face of Google, Jackson said.

"He probably underestimates the importance of that public role aspect and being a liaison with the public and shareholders," Jackson added.

BGC Partners analyst Colin Gillis wrote in a note to investors on Monday that one of the key questions of the Page era is whether meeting analysts' earnings expectations will become less of a priority.

"The company may be moving back to a mindset where investments take priority over profits," wrote Gillis.

Google and Page declined to comment for this article.

 

PAGE'S STAMP

According to those who know Google's 38-year-old co-founder, the era of Page is not likely to be measured in half-steps.

"I always say to my team, you can never outflank Larry," Dave Girouard, head of Google's enterprise business, told Reuters shortly after the announcement of the CEO change.

"As much as you think you're going to go in and blow him away with something cool, he's going to say: 'Well, why are you just doing it for three-quarters of the world?'"

In recent months, Page's stamp has already become clear within the company.

Among the first items he has reworked are the way internal meetings are run and decisions are made, said the Google source.

"It's part of the larger thesis of let's make this plan run faster, move more quickly and take bigger bets."

The executive now expects Page to take a hard look at the many projects underway at Google, placing bigger bets on those that seem to show promise and pulling the plug on others.

With more than 24,000 employees, Google has used its vast resources to expand into various markets beyond Web search, including telephone and television products, online productivity software and even electronic books.

Google's Android software has become the No. 1 smartphone operating system after barely three years on the market, but many other projects remain works in progress.

Some, like the infamous self-driving car and a plan to join a $5 billion offshore wind grid venture, have drawn fire as extravagant excesses or pipe dreams. [ID:nN12164531]

But the company's dominance in search is inviting heightened regulatory scrutiny, which is one reason Google shares underperformed in 2010. Investors also fretted about increased competition from social networking sites and the company's decision to partially pull out of China.

While Page is widely respected for his technology prowess and vision, it remains to be seen how he will adapt to the day-to-day duties of running a giant, advertising-supported business.

"His focus tends to be on the end-user experience," said Paul Buchheit, a former Google engineer who created Gmail and is now a partner at early-stage venture capital firm Y Combinator.

Buchheit praised Page's penchant for betting on big ideas that can yield hit products, but said some parts of the business might get less attention from the new CEO.

"In terms of running the sales organization, I can imagine that that is not his priority," Buchheit added.

 

(Editing by Lisa Von Ahn; editing by Andre Grenon)

    Google's Page presages bolder era; some uneasy, R, 4.4.2011,
http://www.reuters.com/article/2011/04/04/us-google-idUSTRE7334Z020110404

 

 

 

 

 

Google takes on Facebook with latest social tweak

 

SAN FRANCISCO | Wed Mar 30, 2011
4:45pm EDT
Reuters
By Alexei Oreskovic

 

SAN FRANCISCO (Reuters) - Google Inc will begin allowing users to personally endorse search results and Web pages, its latest attempt to stave off rival Facebook Inc while trying to jump onboard a social networking boom.

The so-called "+1" button will start to appear alongside Google search results for select users from Wednesday, letting people recommend specific search results to friends and contacts by clicking on that button.

Eventually, the feature may begin to influence the ranking of search results, though that is only under consideration. Results are now ranked via a closely guarded algorithm.

The world's leader in Internet search is battling to maintain its share of Web surfers' time and attention, which is increasingly getting taken up by Facebook, Twitter and other social networks. But it has struggled to find its footing in the nascent market.

Its last attempt to create a social network -- Buzz -- has not fared well. A flood of complaints about how Buzz handled user privacy cast a pall over the product. On Wednesday, Google announced it had reached a settlement with regulators under which it agreed to independent privacy audits every two years.

With the new +1 buttons, Google aims to counter one of Facebook's most popular features. The new feature comes nearly a year after Facebook began offering special "Like" buttons to websites, creating a personalized recommendation system that some analysts believe could challenge the traditional ranking algorithms that search engines use to find online information.

 

A LOSING BATTLE?

Maintaining its role as the main gateway to information on the Internet is key for Google, which generated roughly $29 billion in revenue last year -- primarily from search ads.

While Google remains the Internet search and advertising leader, Facebook is taking a larger and larger portion of advertising dollars.

Google said that +1 recommendations will also appear in the paid ads that Google displays alongside its search results. In its internal tests, Google found that including the recommendations boosted the rates at which people click on the ads, executives told Reuters in an interview on Tuesday.

Eventually, Google plans to let third-party websites feature +1 buttons directly on their own pages, the company said.

Google's Matt Cutts, a principal engineer for search, said the +1 buttons were part of the evolution of Google's own social search efforts, rather than a direct response to Facebook's Like buttons.

"We always keep an eye out on what other people are doing, but for me the compelling value is just that it's right there in the search results," said Cutts.

Google introduced social search in 2009, and in February the company began displaying special snippets underneath any search results that have been shared by a person's contacts on Twitter, the popular Internet microblogging service.

Currently Google is not using +1 recommendations as a factor in how it ranks search results -- a user only sees that a friend recommended a search result if the result would have turned up in a search based on Google's existing ranking criteria.

Google's Cutts said the company is evaluating whether to use +1 recommendations as a ranking factor in the future.

To use the new recommendation system, users must create a Google Profile page. Any +1 clicks that a person makes will be publicly visible to their network of contacts, which is based on existing contacts in Google products such as the company's Gmail email and its instant messaging service.

Google faced privacy criticisms last year when it launched Buzz, a social networking messaging product that automatically revealed people's personal contact lists to the public.

Cutts said that Google hoped to address any potential privacy concerns with the +1 service by making it clear that any +1 tags are public.

"As long as people have that mental model, they know what to expect, they're not surprised if they +1 something and it shows up in a different context," he said.

The feature will initially be available to a small portion of Google users in the United States on Wednesday, and the company plans to allow other U.S. users to sign up to try the +1 feature later in the day.

 

(Reporting by Alexei Oreskovic; Editing by Gary Hill)

    Google takes on Facebook with latest social tweak, R, 30.3.2011,
    http://www.reuters.com/article/2011/03/30/us-google-idUSTRE72T5J720110330

 

 

 

 

 

Paul Baran, Internet Pioneer, Dies at 84

 

March 27, 2011
The New York Times
By KATIE HAFNER

 

Paul Baran, an engineer who helped create the technical underpinnings for the Arpanet, the government-sponsored precursor to today’s Internet, died Saturday night at his home in Palo Alto, Calif. He was 84.

The cause was complications from lung cancer, said his son, David.

In the early 1960s, while working at the RAND Corporation in Santa Monica, Calif., Mr. Baran outlined the fundamentals for packaging data into discrete bundles, which he called “message blocks.” The bundles are then sent on various paths around a network and reassembled at their destination. Such a plan is known as “packet switching.”

Mr. Baran’s idea was to build a distributed communications network, less vulnerable to attack or disruption than conventional networks. In a series of technical papers published in the 1960s he suggested that networks be designed with redundant routes so that if a particular path failed or was destroyed, messages could still be delivered through another.

Mr. Baran’s invention was so far ahead of its time that in the mid-1960s, when he approached AT&T with the idea to build his proposed network, the company insisted it would not work and refused.

“Paul wasn’t afraid to go in directions counter to what everyone else thought was the right or only thing to do,” said Vinton Cerf, a vice president at Google who was a colleague and longtime friend of Mr. Baran’s. “AT&T repeatedly said his idea wouldn’t work, and wouldn’t participate in the Arpanet project,” he said.

In 1969, the Defense Department’s Advanced Research Projects Agency built the Arpanet, a network that used Mr. Baran’s ideas, and those of others. The Arpanet was eventually replaced by the Internet, and packet switching still lies at the heart of the network’s internal workings.

Paul Baran was born on April 29, 1926, in Grodno, Poland. His parents moved to the United States in 1928, and Mr. Baran grew up in Philadelphia. His father was a grocer, and as a boy, Paul delivered orders to customers in a small red wagon.

He attended the Drexel Institute of Technology, which later became Drexel University, where he earned a bachelor’s degree in electrical engineering in 1949. He took his first job at the Eckert-Mauchly Computer Corporation in Philadelphia, testing parts of radio tubes for an early commercial computer, the Univac. In 1955, he married Evelyn Murphy, and they moved to Los Angeles, where Mr. Baran took a job at Hughes Aircraft working on radar data processing systems. He enrolled in night classes at the University of California, Los Angeles.

Mr. Baran received a master’s degree in engineering from U.C.L.A. in 1959. Gerald Estrin, who was Mr. Baran’s adviser, said Mr. Baran was the first student he ever had who actually went to the Patent Office in Washington to investigate whether his master’s work, on character recognition, was patentable.

“From that day on, my expectations of him changed,” Dr. Estrin said. “He wasn’t just a serious student, but a young man who was looking to have an effect on the world.”

In 1959, Mr. Baran left Hughes to join RAND’s computer science department. He quickly developed an interest in the survivability of communications systems in the event of a nuclear attack, and spent the next several years at RAND working on a series of 13 papers — two of them classified — under contract to the Air Force, titled, “On Distributed Communications.”

About the same time that Mr. Baran had his idea, similar plans for creating such networks were percolating in the computing community. Donald Davies of the British National Physical Laboratory, working a continent away, had a similar idea for dividing digital messages into chunks he called packets.

“In the golden era of the early 1960s, these ideas were in the air,” said Leonard Kleinrock, a computer scientist at U.C.L.A. who was working on similar networking systems in the 1960s.

Mr. Baran left RAND in 1968 to co-found the Institute for the Future, a nonprofit research group specializing in long-range forecasting.

Mr. Baran was also an entrepreneur. He started seven companies, five of which eventually went public.

In recent years, the origins of the Internet have been subject to claims and counterclaims of precedence, and Mr. Baran was an outspoken proponent of distributing credit widely.

“The Internet is really the work of a thousand people,” he said in an interview in 2001.

“The process of technological developments is like building a cathedral,” he said in an interview in 1990. “Over the course of several hundred years, new people come along and each lays down a block on top of the old foundations, each saying, ‘I built a cathedral.’

“Next month another block is placed atop the previous one. Then comes along an historian who asks, ‘Well, who built the cathedral?’ Peter added some stones here, and Paul added a few more. If you are not careful you can con yourself into believing that you did the most important part. But the reality is that each contribution has to follow onto previous work. Everything is tied to everything else.”

Mr. Baran’s wife, Evelyn, died in 2007. In addition to his son, David, of Atherton, Calif., he is survived by three grandchildren; and his companion of recent years, Ruth Rothman.

    Paul Baran, Internet Pioneer, Dies at 84, NYT, 27.3.2011, http://www.nytimes.com/2011/03/28/technology/28baran.html

 

 

 

 

 

A Girl’s Nude Photo, and Altered Lives

 

March 26, 2011
The New York Times
By JAN HOFFMAN

 

LACEY, Wash. — One day last winter Margarite posed naked before her bathroom mirror, held up her cellphone and took a picture. Then she sent the full-length frontal photo to Isaiah, her new boyfriend.

Both were in eighth grade.

They broke up soon after. A few weeks later, Isaiah forwarded the photo to another eighth-grade girl, once a friend of Margarite’s. Around 11 o’clock at night, that girl slapped a text message on it.

“Ho Alert!” she typed. “If you think this girl is a whore, then text this to all your friends.” Then she clicked open the long list of contacts on her phone and pressed “send.”

In less than 24 hours, the effect was as if Margarite, 14, had sauntered naked down the hallways of the four middle schools in this racially and economically diverse suburb of the state capital, Olympia. Hundreds, possibly thousands, of students had received her photo and forwarded it.

In short order, students would be handcuffed and humiliated, parents mortified and lessons learned at a harsh cost. Only then would the community try to turn the fiasco into an opportunity to educate.

Around the country, law enforcement officials and educators are struggling with how to confront minors who “sext,” an imprecise term that refers to sending sexual photos, videos or texts from one cellphone to another.

But adults face a hard truth. For teenagers, who have ready access to technology and are growing up in a culture that celebrates body flaunting, sexting is laughably easy, unremarkable and even compelling: the primary reason teenagers sext is to look cool and sexy to someone they find attractive.

Indeed, the photos can confer cachet.

“Having a naked picture of your significant other on your cellphone is an advertisement that you’re sexually active to a degree that gives you status,” said Rick Peters, a senior deputy prosecuting attorney for Thurston County, which includes Lacey. “It’s an electronic hickey.”

In the fall of 2009, Margarite, a petite, pretty girl with dark hair and a tiny diamond stud in her nose, was living with her father, and her life was becoming troubled. Her relationship with her father’s new wife was tense. Her grades were in a free fall.

Her social life was deteriorating. A good friendship with a girl had soured, abetted by a fight over a boy. This girl would be the one who would later brand Margarite’s photo and forward it.

Margarite’s former friend is tough and strong-willed, determined to stand out as well as fit in, according to those who know her. Her parents, recent immigrants, speak limited English and were not able to supervise her texting.

In the shifting power dynamics of middle school girls, the former friend understood well that she who sneers first sneers best. The flick of a cutting remark, swiftly followed by “Just kidding!” The eye roll. As the animosity between the two girls escalated, Margarite felt shunned by an entire group of girls and was eating lunch by herself. At home she retreated to her bedroom, alone with her cellphone and computer.

Her mother would later speculate that Margarite desperately needed to feel noticed and special. That December, just before the holidays, she took the photo of herself and sent it to Isaiah, a low-key, likable athlete she had recently gotten to know.

After the winter break, Margarite was preparing a fresh start. She would move back in with her mother and transfer to a school in a nearby district.

But one night in late January, a few days before her transfer, Margarite’s cellphone began vibrating around 1 a.m., waking her. She was being bombarded by texts — alerts from worried friends, leers from boys she scarcely knew.

The next morning in her mother’s car, Margarite lowered her head, hiding her reddened eyes, her terrible secret.

“Are you O.K.?” asked her mother, Antoinette, who like other parents and children who agreed to be interviewed asked to be identified by only first or middle names to protect their privacy.

“Yeah.”

“Are you sure?”

“Yeah.”

But her mother knew otherwise. Earlier that morning a parent had phoned Kirsten Rae, the principal of Margarite’s school, Chinook Middle, complaining about a naked photo sent to her child. The child knew at least a dozen students who had received it.

The principal then called Antoinette. The police wanted to question Margarite. On the drive to school, the girl sobbed uncontrollably, feeling betrayed and degraded.

The school was buzzing. “When I opened my phone I was scared,” recalled an eighth grader. “I knew who the girl in the picture was. It’s hard to unsee something.”

Meanwhile, another middle school principal in Lacey had begun investigating a sexting complaint that morning. Ms. Rae realized that Margarite’s photo had gone viral.

Students were summoned to Ms. Rae’s office and questioned by the police. Their cellphones were confiscated.

Ms. Rae went into crisis management. Parents were calling, wanting to know whether their children would be arrested and how she would contain the spread. She drafted a letter for school families. Administrators planned a districtwide voicemail to the families of middle school students. Chinook teachers would discuss the issue in homerooms the next day.

By late morning, Isaiah and Margarite’s former friend had been identified and pulled out of class.

Then Isaiah’s mother, Jennifer, got the call. “Naked?” she shouted. “How naked?”

When Jennifer, who works for an accountant, arrived at the school, she ran to Isaiah, a tall, slender boy with the startled air of an unfolding foal. He was weeping.

“I was in shock that I was in trouble,” he recalled during a recent interview. “I didn’t go out of my way to forward it, but I felt responsible. It was bad. Really bad.”

He told the police that the other girl had pressured him into sending her Margarite’s photo, vowing she just wanted to look at it. He said he had not known that their friendship had disintegrated.

How had the sexting from Margarite begun? “We were about to date, and you’ll be like, ‘Oh, blah blah, I really like you, can you send me a picture?’ ” Isaiah recalled.

“I don’t remember if I asked her first or if she asked me. Well, I think I did send her a picture. Yeah, I’m pretty sure. Mine was, like, no shirt on.

“It is very common,” he said. “I’d seen pictures on other boys’ cellphones.”

Mr. Peters, the county prosecutor, had been hearing that sexting was becoming a problem in the community. In a recent interview, he said that if the case had just involved photos sent between Isaiah and Margarite, he would have called the parents but not pressed charges.

“The idea of forwarding that picture was bad enough,” he said. “But the text elevated it to something far more serious. It was mean-girl drama, an all-out attempt to destroy someone without thinking about the implications.”

He decided against charging Margarite. But he did charge three students with dissemination of child pornography, a Class C felony, because they had set off the viral outbreak.

After school had been let out that day in late January, the police read Isaiah his rights, cuffed his hands behind his back and led him and Margarite’s former friend out of the building. The eighth graders would have to spend the night in the county juvenile detention center.

The two of them and a 13-year-old girl who had helped forward the photo were arraigned before a judge the next day. (Margarite’s former friend declined to be interviewed, as did the girl who helped her.)

Officials took away Isaiah’s clothes and shoes. He changed into regulation white briefs and a blue jumpsuit. He was miserable and terrified.

“My socks got wet in the shower,” Isaiah said.

 

WHERE TO DRAW THE LINE?

Sexting is not illegal.

Two adults sending each other naughty pictures, dirty language? Just garden-variety First Amendment-protected speech.

A November 2009 AARP article, “Sexting Not Just For Kids,” reported approvingly on the practice for older people, too. In women’s magazines and college students’ blogs, coy guides include pragmatic tips like making sure to keep your face out of the photo.

But when that sexually explicit image includes a participant — subject, photographer, distributor or recipient — who is under 18, child pornography laws may apply.

“I didn’t know it was against the law,” Isaiah said.

That is because culturally, such a fine distinction eludes most teenagers. Their world is steeped in highly sexualized messages. Extreme pornography is easily available on the Internet. Hit songs and music videos promote stripping and sexting.

“Take a dirty picture for me,” urge the pop stars Taio Cruz and Kesha in their recent duet, “Dirty Picture.” “Send the dirty picture to me. Snap.”

In a 2010 Super Bowl advertisement for Motorola, the actress Megan Fox takes a cellphone picture of herself in a bubble bath. “I wonder what would happen if I were to send this out?” she muses. The commercial continues with goggle-eyed men gaping at the forwarded photo — normalizing and encouraging such messages.

“You can’t expect teenagers not to do something they see happening all around them,” said Susannah Stern, an associate professor at the University of San Diego who writes about adolescence and technology.

“They’re practicing to be a part of adult culture,” Dr. Stern said. “And in 2011, that is a culture of sexualization and of putting yourself out there to validate who you are and that you matter.”

The prevalence of under-age sexting is unclear and can often depend on the culture of a particular school or circle of students. An Internet poll conducted for The Associated Press and MTV by Knowledge Networks in September 2009 indicated that 24 percent of 14- to 17-year-olds had been involved in “some type of naked sexting,” either by cellphone or on the Internet. A December 2009 telephone poll from the Pew Research Center’s Internet and American Life Project found that 5 percent of 14- to 17-year-olds had sent naked or nearly naked photos or video by cellphone, and that 18 percent had received them. Boys and girls send photos in roughly the same proportion, the Pew survey found.

But a double standard holds. While a boy caught sending a picture of himself may be regarded as a fool or even a boastful stud, girls, regardless of their bravado, are castigated as sluts.

Photos of girls tend to go viral more often, because boys and girls will circulate girls’ photos in part to shame them, explained Danah Boyd, a senior social media researcher at Microsoft and a fellow at Harvard University’s Berkman Center for Internet and Society.

In contrast, when a boy sends a revealing photo of himself to a girl, Dr. Boyd noted, she usually does not circulate it. And, Dr. Boyd added, boys do not tend to circulate photos of other boys: “A straight-identified boy will never admit to having naked photos of a boy on his phone.”

Policy makers are beginning to recognize that a uniform response to these cases does not fit.

“I hate the word ‘sexting,’ ” said Andrew J. Harris, an assistant professor of criminology at the University of Massachusetts in Lowell, who is leading a study of the practice among adolescents to help develop policies to address it. “We’re talking about a lot of different behaviors and a lot of different motivations.”

There is the high-tech flirt. The troubled attention-seeker. A couple’s consensual exchanges. Drunken teenagers horsing around. Pressure from a boyfriend. Malicious distribution. A teenager who barrages another with unsolicited lewd photos or texts. Or, as in a 2009 Wisconsin case of “sextortion,” a boy, pretending to be a girl online, who solicited explicit pictures of boys, which he then used as blackmail to compel those boys to have sex with him.

The content of the photos can vary widely too, from suggestive to sadistic.

Adults in positions of authority have been debating how to respond. Many school districts have banned sexting and now authorize principals to search cellphones. According to the National Conference of State Legislatures, at least 26 states have tried to pass some sort of sexting legislation since 2009.

“The majority of states are trying to put something in place to educate kids before and after the event,” said Justin T. Fitzsimmons, a senior attorney at the National District Attorneys Association who specializes in Internet crimes against children. “We have to protect kids from themselves sometimes. We’re on the cusp of teaching them how to manage their electronic reputations.”

But if the Lacey students were convicted of dissemination of child pornography, they could be sentenced to up to 36 weeks in a juvenile detention center. They would be registered as sex offenders. Because they were under 15, however, after two years they could petition a court to remove their names from the registry, if they could prove they no longer posed a threat to the public.

 

PENALTIES AND PREVENTION

Rick Peters, the prosecuting attorney, never intended for the Chinook Middle School students to receive draconian sentences. But he wanted to send a scared-straight message to them, as well as to the community.

Yet when the local news media storm cascaded, the outcry was not about the severe penalties for a felony sexting conviction. It was about why Mr. Peters had not also arrested Margarite.

“She’s a victim,” Mr. Peters said. “She made an ill-advised decision to share that picture with her boyfriend. As far as she knew, that was as far as it would go.

“What good would come from prosecuting her? What lesson could we teach her that she hasn’t already learned now 1,000 times over?”

Eventually a deal was brokered for the three teenagers who were charged. The offense would be amended from the child pornography felony to a gross misdemeanor of telephone harassment. Isaiah and the two girls who had initially forwarded Margarite’s photo would be eligible for a community service program that would keep them out of court, and the case could be dismissed.

Those three students would have to create public service material about the hazards of sexting, attend a session with Margarite to talk about what happened and otherwise have no contact with her.

After Margarite and her mother approved the conditions, Mr. Peters signed off, pleased.

Throughout last spring, on Monday afternoons after school, Eric Fredericks, Isaiah’s math teacher, met with the three students to help them develop their material.

Margarite’s former friend made a PowerPoint presentation, with slides copied from the Internet.

The younger girl made a poster dense with warnings about sexting’s consequences. She concluded: “I am a 13 year old teen that made a bad choice and got my life almost totaled forever. I regret what I did more than anything but I cant take it back.”

Isaiah created a two-page brochure, citing studies from the Internet, accompanied by a tumble of adolescent feeling:

“Not only does it hurt the people that are involved in the pictures you send, it can hurt your family and friends around you, the way they see you, the way you see yourself. The ways they feel about you. Them crying because of your mistakes.”

Ms. Rae has yet to distribute the material. Chinook, with 630 seventh and eighth graders, still has students who know those involved in last year’s episode. She wants to give Isaiah, Margarite and the others more time to distance themselves.

While the case was on its way to resolution, prosecutors and district educators decided to put its aftershock to good use.

“After the story broke, parents called us because they didn’t know about the law that could send kids to jail for a bad choice,” said Courtney Schrieve, a spokeswoman for the North Thurston Public Schools. “Kids didn’t know about it either. So we decided to turn this into an opportunity to educate teachers, parents and students.”

In October, Ms. Rae, the police, prosecutors and Mr. Fitzsimmons of the National District Attorneys Association held separate forums about sexting for Lacey’s teachers, parents and student delegations from the four middle schools.

The students then returned to their homerooms to teach classmates what they had learned.

Elizabeth Colón taught a session with Jon Reid. Both are eighth graders at Chinook.

“Most of the questions were about penalties,” she said. “Kids wanted to know if they would get into trouble just for receiving the picture.”

Jon spoke about long-term consequences. “I said that people may look at you differently,” he said. “They’ll know what kind of person you were, even though you changed.”

One spring evening, the three students who had been disciplined met for a mediation session with Margarite and two facilitators from Community Youth Services. The searing, painful session, which included the students’ parents and Mr. Fredericks, lasted several hours. Everyone was asked to talk about his or her role in the episode.

Mr. Fredericks listed all the people who had spent hours trying to clean the mess the students had created in a matter of seconds: police officers, lawyers, teachers, principals, hundreds of families.

Then it was Isaiah’s turn. He looked Margarite in the eye. “He poured his heart out,” Mr. Fredericks recalled. Isaiah said that he was ashamed of himself, but that most of all, he was sorry he had broken Margarite’s trust. Then he asked for her understanding and forgiveness. “He cried,” Mr. Fredericks said. “I choked up.”

The former friend who had forwarded the photo, creating the uproar, was accompanied by her mortified father, an older sister and a translator. She came across as terse and somewhat perfunctory, recalled several people who were there.

One of the last to speak was Margarite’s father, Dan, an industrial engineer.

“I could say it was everyone else’s fault,” Dan said. “But I had a piece of it, too. I learned a big lesson about my lack of involvement in her use of the phone and texting. I trusted her too much.”

He had not expected the students to be punished severely, he continued. But they needed to understand that their impulsive actions had ramifications.

“When you walk out of here tonight, it’s over, you’re done with it,” he said, looking around the room.

“Keep in mind that the only person this will have a lasting impact on,” he concluded, is his daughter.

The photo most certainly still exists on cellphones, and perhaps on social networking sites, readily retrievable.

“She will have to live with this for the rest of her life.”

 

THE VICTIM

When the police were finished questioning Margarite at Chinook in January 2010, her mother, a property manager, laid down the law. For the time being, no cellphone. No Internet. No TV.

Margarite, used to her father’s indulgence and unfettered access to technology, was furious.

But the punishment insulated Margarite from the wave of reaction that surged online, in local papers and television reports, and in texted comments by young teenagers throughout town. Although the police and the schools urged parents to delete the image from their children’s phones, Antoinette heard that it had spread to a distant high school within a few days.

The repercussions were inescapable. After a friend took Margarite skating to cheer her up, he was viciously attacked on his MySpace page. Kids jeered, telling him to change schools and go with “the whore.”

The school to which Margarite had transferred when she moved back in with her mother was about 15 miles away. She badly wanted to put the experience behind her. But within weeks she was recognized. A boy at the new school had the picture on his cellphone. The girls began to taunt her: Whore. Slut.

Margarite felt depressed. Often she begged to stay home from school.

In January, almost a year to the day when her photo went viral, she decided to transfer back to her old district, where she figured she at least had some friends.

The episode stays with her still. One recent evening in her mother’s condominium, Margarite chatted comfortably about her classes, a smile flashing now and then. But when the moment came to recount the events of the winter before, she slipped into her bedroom, shutting the door.

As Antoinette spoke about what had happened, the volume on the television in Margarite’s room grew louder.

Finally, she emerged. The smell of pizza for supper was irresistible.

What is it like to be at school with her former friend?

“Before I switched back, I called her,” Margarite said. “I wanted to make sure the drama was squashed between us. She said, were we even legally allowed to talk? And I said we should talk, because we’d have math together. She apologized again.”

What advice would Margarite give anyone thinking of sending such a photo?

She blushed and looked away.

“I guess if they are about to send a picture,” she replied, laughing nervously, “and they have a feeling, like, they’re not sure they should, then don’t do it at all. I mean, what are you thinking? It’s freaking stupid!”

    A Girl’s Nude Photo, and Altered Lives, G, 26.3.2011, http://www.nytimes.com/2011/03/27/us/27sexting.html

 

 

 

 

 

States Struggle With Minors’ Sexting

 

March 26, 2011
The New York Times
By JAN HOFFMAN

 

In the last two years, legislators have been weighing graduated responses to sexting between minors. Some legal scholars refer to the images as “self-produced child pornography.”

Some states have amended their statutes on child pornography, obscenity or Internet crimes. Many allow juvenile offenders to be charged with a misdemeanor or a lesser offense, so they can qualify for diversion programs and have their records expunged.

A few states have tried to define a sexting offense.

The laws have had a mixed response. While many experts, educators and parents applaud the lessening of sanctions for what is often seen as thoughtless adolescent risk-taking, others deplore the establishment of a new crime that could not only intrude on First Amendment rights but could also sweep more children into the court system.

As Susan Hanley Duncan notes in a recent article in the Oregon Law Review about such legislation, the states disagree philosophically about the nature of the offense, which participants should be punished and which factors may aggravate or mitigate the criminal charge.

Provisions in a new Nebraska law punish those who forward an image but not its creator. A proposed law in Ohio would charge minors who produced the image as well.

A proposal in North Dakota would increase sanctions for someone who circulated a photo with the intention to humiliate the minor. Conversely, a few states, like Texas, propose to grant immunity to minors who destroy the image or report it to the authorities within 48 hours.

Not only do states disagree about who should be prosecuted, they also differ over how to define the content to be criminalized.

Some states propose new misdemeanor crimes for minors who exchange photos that are “lewd and lascivious.” Others would create a misdemeanor for minors who send a minor’s “nude” images — a category that might not survive First Amendment challenges.

Pennsylvania is proposing relatively mild sanctions for minors who transmit images of “sexually explicit conduct,” but the depiction of activities like penetration, sadism and masturbation could bring more severe penalties.

New Jersey is considering a bill that would send first-time juvenile offenders to educational diversion programs. Other proposed bills would require schools to provide students and parents with information on sexting and require stores that sell cellphones to give customers pamphlets on it.

Some district attorneys have made such cases a priority but, using prosecutorial discretion, have designed specialized diversion programs.

Mathias H. Heck Jr., prosecuting attorney for Montgomery County, Ohio, requires teenagers charged with sexting to turn in their cellphones, perform community service and receive education about age-appropriate sexual behavior and the legal and social consequences of sexting. Since the six-month program was started about two years ago, about 60 teenagers have attended.

    States Struggle With Minors’ Sexting, R, 26.3.2011, http://www.nytimes.com/2011/03/27/us/27sextinglaw.html

 

 

 

 

 

What They’re Saying About Sexting

 

March 26, 2011
The New York Times

 

The New York Times interviewed teenagers individually and in two focus groups. The first, in Manhattan, was organized by the Anti-Defamation League, which offers cyberbullying prevention programs. The second, with students from Lower Merion, a Philadelphia suburb, was coordinated by Stephanie Newberg, a therapist who works with adolescents, and Paula Singer, a community organizer.

The following quotes from the sessions and interviews have been edited and condensed.

Q. Is sexting ever O.K.?

Saif, 18, Brooklyn: It’s a way to express your feelings. If a guy and a girl are in love, instead of saying it face to face, they can say it through technology.

Kathy, 17, Queens: There’s a positive side to sexting. You can’t get pregnant from it, and you can’t transmit S.T.D.’s. It’s a kind of safe sex.

Q. How common is sexting at your school?

Mei, 16, Staten Island: People call us the nerd school. My friends wouldn’t think sexting is all right. But even with the popular kids, it’s not acceptable.

Kathy: At my school, if you like a boy and you want to get his attention, you know what you have to do. When I was with my last boyfriend I refused to sext and I would go through his iPod and find pictures of girls’ breasts, and in weird ways that I never wanted to see. And they were all girls in my school.

Farrah, 17, Lower Merion: People don’t think it’s that big of a deal anymore.

Q. Do boys sext as often as girls?

Farrah: No. But the guys who get caught sexting are the cockier ones who just like to show off what they’re working with.

Q. Why do girls sext?

Zoe, 18, Lower Merion: A freshman girl doesn’t consciously want to be a slut, but she wants to be liked and she likes attention from the older boys. They’ll text to her, “Hey, hottie,” and it will progress from there.

Joe, 17, Lower Merion: I don’t think those girls are insecure. I think they’re confident, and they know they’re hot.

Rachel, 18, Philadelphia: A girl thinks, “I know I’ve been warned against it, but this is something I want to share with my boyfriend, and he’s different.”

Q. How are texts used differently from photos in sexting?

William, 18, Lower Merion: Photo sexting is done more in middle school when you just get this technology and you’re horny.

Farrah: As you get older, kids use raunchy texts more. They’re things kids wouldn’t want to say in person. But they can really send the wrong message.

William: If a girl sent me a picture of her boobs, well, obviously I’d like to show it to some friends. But I wouldn’t show them a raunchy text from her because that would be awkward. Sexually charged language is more intimate, more private.

Zoe: We see virtual images all day long, so if someone sends you an image, it loses the identity of the person. It’s just a picture.

William: And usually the face is not in it.

Q. Why do sexts go viral?

Rachel: In eighth grade, four girls were having a sleepover and they took off their clothes, covered themselves with whipped cream and sent pictures to boys of themselves licking it off. People forwarded it because it was gossip and scandalous. In middle school, that’s really appealing.

Q. How often do they go viral, really?

Nate, 16, Lower Merion: About three photos go viral each year and a third of the school sees them. The kids who receive them are in the alpha social group, and they send it to their friends. But everyone hears about them.

Q. To what extent do parents know about sexting?

Glenn, 18, Long Island: I didn’t tell my parents I was doing this focus group because they don’t know what sexting is, and it would be awkward to talk about it.

Kathy: My mom and I talk about everything.

Q. Did you know that sexting under 18 is illegal?

Saif: There’s a law? I didn’t know that. How would you catch somebody when everyone does it?

    What They’re Saying About Sexting, NYT, 26.3.2011, http://www.nytimes.com/2011/03/27/us/27sextingqanda.html

 

 

 

 

 

Soldier Faces 22 New WikiLeaks Charges

 

March 2, 2011
The New York Times
By CHARLIE SAVAGE

 

WASHINGTON — The Army announced 22 additional charges on Wednesday against Pfc. Bradley Manning, the military intelligence analyst who is accused of leaking a trove of government files to WikiLeaks a year ago.

The new charges included “aiding the enemy”; wrongfully causing intelligence to be published on the Internet, knowing that it was accessible to the enemy; multiple counts of theft of public records, transmitting defense information and computer fraud. If he is convicted, Private Manning could be sentenced to life in prison.

“The new charges more accurately reflect the broad scope of the crimes that Private First Class Manning is accused of committing,” said Capt. John Haberland, an Army spokesman.

The charges provide new details about when prosecutors believe that Private Manning downloaded copies of particular files from a classified computer system in Iraq. For example, the charges say he copied a database of more than 250,000 diplomatic cables between March 28 and May 4, 2010.

The charges also accuse Private Manning of twice “adding unauthorized software” to the secret computer system — once between February and early April 2010, and again on May 4. A press release accompanying the charges said the software was used “to extract classified information” from the system.

Eugene Fidell, who teaches military law at Yale Law School, noted that several of the charges seemed to be describing the same basic act, but in different ways. He said that it was “typical for military prosecutors to draft charges in as many ways as possible,” and he predicted that the defense would challenge the redundancies later in the process.

“We’re potentially entering a new chapter with this set of charges,” Mr. Fidell said.

Several of the charges were predicated on the notion that various sets of files were worth more than $1,000. The charge sheet did not explain how the government had determined the value of the copied files, but it cited a federal statute that has a higher penalty when property worth at least $1,000 is involved.

The charge sheet also did not identify “the enemy” that Private Manning was accused of aiding. A military statement says that charge can be a capital offense, but the prosecution team had decided against recommending the death penalty in this case.

In its Twitter feed, WikiLeaks said the charge of aiding the enemy was “a vindictive attack on Manning for exercising his right to silence. No evidence of any such thing.” It also said the charge suggested that “WikiLeaks would be defined as ‘the enemy.’ A serious abuse.”

Military officials did not respond to a question on Wednesday about who the “enemy” was. The charge sheet, however, accuses the private of giving intelligence to the enemy “through indirect means,” which could suggest that prosecutors are referring to Afghan and Iraqi insurgents rather than to WikiLeaks.

Private Manning’s lawyer, David E. Coombs, who has largely declined to talk to the news media, said on Twitter that “aiding the enemy” was the “most significant additional charge.”

Mr. Coombs also posted on his Web site two statements in response to the new charges. One contained an excerpt from a military rule describing what can qualify for that charge. The other said “the defense has been preparing for the possibility of additional charges in this case” for several weeks. In a statement on Tuesday, he predicted that a hearing on whether to move forward with a court-martial would probably begin in May or June.

Private Manning has been held under highly restrictive conditions since July at the Marine Corps brig in Quantico, Va. One question has been why legal proceedings against him did not seem to be moving forward.

The Army said Wednesday that the delay was to evaluate Private Manning’s “mental capacity” at the defense’s request. That evaluation is pending, it said.

    Soldier Faces 22 New WikiLeaks Charges, NYT, 2.3.2011, http://www.nytimes.com/2011/03/03/us/03manning.html

 

 

 

 

 

A $20 Loan, a Facebook Quarrel and a Fatal Stabbing

 

March 1, 2011
The New York Times
By AL BAKER and TIM STELLOH

 

The dispute between the two friends began over $20, money that had been given to buy baby formula and diapers, but that went for some other purpose. Days later, it became a heated public matter, splayed on the two young women’s Facebook pages.

At 5:44 p.m. on Sunday, one of them, Kamisha Richards, 22, wrote that this would be “the last time u will con me into giving u money.” Ten minutes later, the other, Kayla Henriques, 18, replied, “Dnt try to expose me mama but I’m not tha type to thug it ova facebook see u wen u get frm wrk.”

The war of words escalated over Facebook. In capital letters, at 8:52 p.m., Ms. Richards said that she would have the last laugh. Ms. Henriques replied within seconds: “We will see.”

They exchanged more messages, until about 9:30 p.m. on Sunday.

About 24 hours after their last Facebook exchange, Ms. Richards was dead, killed by a kitchen knife to the chest delivered inside an apartment in East New York, Brooklyn — according to the police, the home of Ms. Henriques, Ms. Richards and relatives of both women, including Ms. Henriques’s brother, who was dating Ms. Richards.

By about 1:30 a.m. on Tuesday, Ms. Henriques had been arrested, after witnesses helped point investigators in her direction, and the suspect “said things to implicate herself,” according to a law enforcement official. “It was witnessed by several people, in the apartment,” the official said.

In retrospect, some of the clues were spread like electronic bread crumbs for anyone to see.

Ms. Henriques was charged with second-degree murder and criminal possession of a weapon, said a spokesman for the Brooklyn district attorney’s office.

Deputy Commissioner Paul J. Browne, the Police Department’s chief spokesman, said the Internet postings added pieces to investigators’ knowledge, though it was not immediately clear if those clues had been gleaned before Ms. Henriques’s arrest.

“Like so many things these days, elements of this case emerged on Facebook,” Mr. Browne said.

To the victim’s relatives, it seemed unreal that the Facebook entries could foreshadow such violence. In fact, Ms. Richards did not consider the exchange she had with Ms. Henriques serious, said her sister, Schneiqua Henry, 20.

“She didn’t pay it any mind,” Ms. Henry said. “She thought it was just another argument.”

Ms. Richards’s stepfather, Dunstan Henry, 42, said she was not someone who was easily provoked to fight. “She’s the type of person that would let you run your mouth off and she wouldn’t say nothing,” said Mr. Henry, who raised Ms. Richards since she was a newborn, after her biological father returned to Kingston, Jamaica.

Ms. Richards graduated from college in May, held two jobs and hoped to enter law school. She had been dating Ramel Henriques on and off for about seven years. Ms. Henry said she lived in the same complex as Ms. Henriques, the Cypress Hills Houses, but in a different apartment.

Ms. Henry said she believed her sister had given Ms. Henriques money in the past, though she said the two had never fought over the loans.

Mr. Henry said Ms. Richards had helped care for Ms. Henriques’s 11-month-old son. “My daughter was taking care of Kayla,” he said. “She gave her $20 to be there for her like a big sister.”

Detectives are investigating whether Ms. Richards had claimed Ms. Henriques’s son as a dependent for tax purposes, and “whether that was an element in the dispute between the women,” the official said.

But that notion angered the victim’s brother, Donell Henry, 21, who said of Ms. Richards: “She didn’t use nobody as a tax write-off. When anyone needed anything in that house, she provided for them.”

What Ms. Henriques used the $20 for was not immediately clear on Tuesday. But those who knew Ms. Richards said that when it became clear that the money had not been spent on milk and diapers, she asked for it back.

In one Facebook exchange, Ms. Richards used an acronym indicating she was laughing hard, and wrote, “girl bye I guess I’ll c u later just bring the money.”

Things quickly deteriorated when the two met on Monday night in an apartment of the complex where the women were living, officials said.

An argument started in the kitchen, and Ms. Henriques, who had her son with her, passed the child to a friend who was there, Ms. Henry said.

At one point, Ms. Richards opened the refrigerator door and saw the baby formula and poured some of it out, and said it was “half of what” Ms. Henriques owed her, the official said.

The argument then continued into one of the three bedrooms in the apartment, where Ms. Richards was mortally wounded.

“The next thing you know, she stabbed my sister in the heart,” Ms. Henry said.

Ms. Richards staggered out into the hallway, and someone tried to apply pressure to her wound, as others called 911. But she was declared dead on arrival at Brookdale University Hospital and Medical Center, officials said.

On Tuesday, Ms. Richards’ relatives were still making funeral arrangements.

The oldest of five siblings, she had graduated from John Jay College in May with a degree in criminal justice, said Yasmin Payne, 22, a longtime friend. Ms. Richards planned on attending Brooklyn Law School, and took the LSAT in December. She worked two jobs through college, friends and family members said, one as a security guard at JPMorgan Chase in Manhattan and the other as a housekeeper.

At her home in Jamaica, Queens, on Tuesday, Ms. Richards’s mother, Nicole Colter-Henry, 39, said she had raised her family in the Cypress Hills Houses but moved because she was “tired of the projects.”

“I wanted something better for them,” she said of her children as she stood surrounded by photos of her oldest daughter. “I’m never going to see my daughter. All over $20.”

No one from Ms. Henriques’s family could be reached. But later Tuesday, a message appeared on Ms. Henriques’s Facebook page, even as she was in custody.

It said: “I can’t be leave this happen I’m sorry I send my condolences to her family RiP kamisha.”

And as that message was added, many others that chronicled the women’s fight suddenly disappeared.

    A $20 Loan, a Facebook Quarrel and a Fatal Stabbing, NYT, 1.3.2011, http://www.nytimes.com/2011/03/02/nyregion/02slay.html

 

 

 

 

 

Qaddafi YouTube Spoof by Israeli Gets Arab Fans

 

February 27, 2011
The New York Times
By ISABEL KERSHNER

 

JERUSALEM — A YouTube clip mocking Col. Muammar el-Qaddafi’s megalomania is fast becoming a popular token of the Libya uprising across the Middle East. And in an added affront to Colonel Qaddafi, it was created by an Israeli living in Tel Aviv.

Noy Alooshe, 31, an Israeli journalist, musician and Internet buff, said he saw Colonel Qaddafi’s televised speech last Tuesday in which the Libyan leader vowed to hunt down protesters “inch by inch, house by house, home by home, alleyway by alleyway,” and immediately identified it as a “classic.”

“He was dressed strangely, and he raised his arms” like at a trance party, Mr. Alooshe said Sunday in a telephone interview, referring to the gatherings that feature electronic dance music. Then there were Colonel Qaddafi’s words with their natural beat.

Mr. Alooshe spent a few hours at the computer, using pitch corrector technology to set the speech to the music of “Hey Baby,” a song by the American rapper Pitbull, featuring another artist, T-Pain. Mr. Alooshe titled it “Zenga-Zenga,” echoing Colonel Qaddafi’s repetition of the word zanqa, Arabic for alleyway.

By the early hours of Wednesday morning, Mr. Alooshe had uploaded the electro hip-hop remix to YouTube, and he began promoting it on Twitter and Facebook, sending the link to the pages of young Arab revolutionaries. By Sunday night, the original clip had received nearly 500,000 hits and had gone viral.

Mr. Alooshe, who at first did not identify himself on the clip as an Israeli, started receiving enthusiastic messages from all around the Arab world. Web surfers soon discovered that he was a Jewish Israeli from his Facebook profile — Mr. Alooshe plays in a band called Hovevey Zion, or the Lovers of Zion — and some of the accolades turned to curses. A few also found the video distasteful.

But the reactions have largely been positive, including a message Mr. Alooshe said he received from someone he assumed to be from the Libyan opposition saying that if and when the Qaddafi regime fell, “We will dance to ‘Zenga-Zenga’ in the square.”

The original clip features mirror images of a scantily clad woman dancing along to Colonel Qaddafi’s rant. Mr. Alooshe said he got many requests from Web surfers who asked him for a version without the dancer so that they could show it to their parents, which he did.

Mr. Alooshe speaks no Arabic, though his grandparents were from Tunisia. He said he used Google Translate every few hours to check messages and remove any offensive remarks.

Israelis have been watching the events in Libya unfold with the same rapt attention as they have to the revolutions in Tunisia and Egypt.

In the past, Colonel Qaddafi has proposed that Palestinian refugees should return en masse by ship to Israel’s shores, and that Israel and the Palestinian territories should be combined into one state called Isratine.

Mr. Alooshe said he was a little worried that if the Libyan leader survived, he could send one of his sons after him. But he said it was “also very exciting to be making waves in the Arab world as an Israeli.”

As one surfer wrote in an Arabic talkback early Sunday, “What’s the problem if he’s an Israeli? The video is still funny.” He signed off with the internationally recognized “Hahaha.”

    Qaddafi YouTube Spoof by Israeli Gets Arab Fans, NYT, 27.2.2011, http://www.nytimes.com/2011/02/28/world/middleeast/28youtube.html

 

 

 

 

 

WikiLeaks Cables Detail Qaddafi Family’s Exploits

 

February 22, 2011
The New York Times
By SCOTT SHANE

 

WASHINGTON — After New Year’s Day 2009, Western media reported that Seif al-Islam el-Qaddafi, a son of the Libyan leader Col. Muammar el-Qaddafi, had paid Mariah Carey $1 million to sing just four songs at a bash on the Caribbean island of St. Barts.

In the newspaper he controlled, Seif indignantly denied the report — the big spender, he said, was his brother, Muatassim, Libya’s national security adviser, according to an American diplomatic cable from the capital, Tripoli.

It was Muatassim, too, the cable said, who had demanded $1.2 billion in 2008 from the chairman of Libya’s national oil corporation, reportedly to establish his own militia. That would let him keep up with yet another brother, Khamis, commander of a special-forces group that “effectively serves as a regime protection unit.”

As the Qaddafi clan conducts a bloody struggle to hold onto power in Libya, cables obtained by WikiLeaks offer a vivid account of the lavish spending, rampant nepotism and bitter rivalries that have defined what a 2006 cable called “Qadhafi Incorporated,” using the State Department’s preference from the multiple spellings for Libya’s troubled first family.

The glimpses of the clan’s antics in recent years that have reached Libyans despite Col. Qaddafi’s tight control of the media have added to the public anger now boiling over. And the tensions between siblings could emerge as a factor in the chaos in the oil-rich African country.

Though the Qaddafi children are described as jockeying for position as their father ages — three sons fought to profit from a new Coca-Cola franchise — they have been well taken care of, cables say. “All of the Qaddafi children and favorites are supposed to have income streams from the National Oil Company and oil service subsidiaries,” one cable from 2006 says.

A year ago, a cable reported that proliferating scandals had sent the clan into a “tailspin” and “provided local observers with enough dirt for a Libyan soap opera.” Muatassim had repeated his St. Barts New Year’s fest, this time hiring the pop singers Beyoncé and Usher. An unnamed “local political observer” in Tripoli told American diplomats that Muatassim’s “carousing and extravagance angered some locals, who viewed his activities as impious and embarrassing to the nation.”

Another brother, Hannibal, meanwhile, had fled London after being accused of physically abusing his wife, Aline, and after the intervention of a Qaddafi daughter, Ayesha, who traveled to London despite being “many months pregnant,” the cable reported. Ayesha, along with Col. Qaddafi’s second wife, Safiya, the mother of six of his eight children, “advised Aline to report to the police that she had been hurt in an ‘accident,’ and not to mention anything about abuse,” the cable said.

Amid his siblings’ shenanigans, Seif, the president’s second-eldest son, had been “opportunely disengaged from local affairs,” spending the holidays hunting in New Zealand. His philanthropy, the Qaddafi International Charity and Development Foundation, had sent hundreds of tons of aid to earthquake-ravaged Haiti, and he was seen as a reasonable prospect to succeed his father.

The same 2010 cable said young Libyan contacts had reported that Seif al-Islam is the ‘hope’ of ‘Libya al-Ghad’ (Libya of tomorrow), with men in their twenties saying that they aspire to be like Seif and think he is the right person to run the country. They describe him as educated, cultured, and someone who wants a better future for Libya,” by contrast with his brothers, the cable said.

That was then. Today the young protesters on the streets are demanding the ouster of the entire family, and it was Seif el-Qaddafi who declared on television at 1 a.m. Monday that Libya faced civil war and “rivers of blood” if the people did not rally around his father.

As for the 68-year-old Colonel Qaddafi, the cables provide an arresting portrait, describing him as a hypochondriac who fears flying over water and often fasts on Mondays and Thursdays. The cables said he was an avid fan of horse racing and flamenco dancing who once added “King of Culture” to the long list of titles he had awarded himself. The memos also said he was accompanied everywhere by a “voluptuous blonde,” the senior member of his posse of Ukrainian nurses.

After Colonel Qaddafi abandoned his pursuit of weapons of mass destruction in 2003, many American officials praised his cooperation. Visiting with a congressional delegation in 2009, Senator Joseph I. Lieberman, Independent of Connecticut told the leader and his party-loving national security adviser, Muatassim, that Libya was “an important ally in the war on terrorism, noting that common enemies sometimes make better friends.”

Before Condoleezza Rice visited Libya in 2008 — the first secretary of state to do so since 1953 — the embassy in Tripoli sought to accentuate the positive. True, Colonel Qaddafi was “notoriously mercurial” and “avoids making eye contact,” the cable warned Ms. Rice, and “there may be long, uncomfortable periods of silence.” But he was “a voracious consumer of news,” the cable added, who had such distinctive ideas as resolving the Israeli-Palestinian conflict with a single new state called “Isratine.”

“A self-styled intellectual and philosopher,” the cable told Ms. Rice, “he has been eagerly anticipating for several years the opportunity to share with you his views on global affairs.”


Andrew W. Lehren contributed reporting from New York.

    WikiLeaks Cables Detail Qaddafi Family’s Exploits, NYT, 22.2.2011, http://www.nytimes.com/2011/02/23/world/africa/23cables.html

 

 

 

 

 

Egyptians Were Unplugged, and Uncowed

 

February 20, 2011
The New York Times
By NOAM COHEN

 

FOR a segment of the young people of Egypt, the date to remember is not when Egyptians first took to the streets to shake off the 30-year rule of Hosni Mubarak.

Rather, it is three days later — Jan. 28, 2011 — the day the Internet died, or more precisely, was put to sleep by the Mubarak government.

That was when some of them discovered a couple of polar but compatible truths. One, the streets still had the power to act as Twitter was unplugged. And two, the Internet had become so integral to society that it wasn’t unreasonable to consider a constitutional guarantee of free access to it.

“It felt exactly like going back in time, but in today’s world,” Ahmed Gabr, a medical student and the editor of the Swalif.net technology blog, wrote in an e-mail.

Mr. Gabr included his detailed timeline of interruptions in communications services during the protests: when service at Facebook and Twitter first became spotty, when text-messaging was interrupted.

His description for Jan. 28: “Egypt is now officially offline.”

In interviews by telephone and e-mail young Egyptians like Mr. Gabr — tech-savvy but not necessarily political — were hardly Internet utopians. They had, after all, seen firsthand how shutting down the Internet had failed to stop the momentum of the protests. But they did make a case that the Internet was an irreplaceable part of Egyptian life, especially for the young. Nothing more and nothing less.

The removal of the Internet by their government, they said, was a reminder that they were not free; not truly part of the wider world that they know so well thanks to technologies like the Web.

“Frankly, I didn’t participate in Jan. 25 protests, but the Web sites’ blockade and communications blackout on Jan. 28 was one of the main reasons I, and many others, were pushed to the streets,” wrote Ramez Mohamed, a 26-year-old computer science graduate who works in telecommunications.

“It was the first time for me to feel digitally disabled,” he wrote. “Imagine sitting at your home, having no single connection with the outer world. I took the decision, ‘this is nonsense, we are not sheep in their herd,’ I went down and joined the protests.”

For Mr. Mohamed, as for Mr. Gabr, it was like going back in time. “During the five days of the Internet blackout, I was at Tahrir Square for almost every day,” he recalled, referring to the hive of the Cairo protests. “Tell you what, I didn’t miss Twitter, I can confidently say that Tahrir was a street Twitter. Almost everyone sharing in a political discussion, trying to announce something or circulate news, even if they are rumors, simply retweets.”

Laughing at how what is old is new again, Mr. Mohamed ended this e-mail passage with a smilely face icon.The idea that the Egyptian government could simply shut down the Internet (something Libya now does periodically) was a shock to outsiders — even a bit of a technical achievement. And the decision to do it ran against the grain of what had been the government’s relatively open policy toward the Internet, said Andrew Bossone, who spent the past five years in Cairo writing about technology.

“When I went to Tunisia about a year ago, I couldn’t get onto YouTube or Al Jazeera,” Mr. Bossone said in an interview from Beirut, where he now lives. “Egypt didn’t really block any Web sites.”

He said the policy had raised expectations: “It’s not just about Facebook, Twitter or YouTube. It’s about access to this technology that everybody else has. A sense of entitlement. The idea that everybody else has it, why can’t I have it?”

Perhaps that sense of entitlement is behind the discussions that Mr. Gabr reported hearing. “Some friends are now even demanding, jokingly or seriously,” he wrote, “that a new or amended constitution should emphasize on a non-negotiable ‘right to Internet access’ for everybody.”

This comfort with a relatively free-flowing Internet was on display in 2008, when Wikipedia’s annual convention was held in Alexandria, at the new high-tech library built near where the legendary Library of Alexandria had been.

Filled with much of Egypt’s technical class, which included many women, the gathering was billed as an effort to bolster Arabic Wikipedia. The relatively low number of articles didn’t accurately reflect the importance of technology in the Arab world, the thinking went. Many Egyptians had an active, even bustling, Facebook presence, and attempts were made to organize protests at the site on behalf of bloggers who had been persecuted by the government.

Moushira Elamrawy, an advocate for free culture and free software in Alexandria, remembered the conference as a chance for the budding techie community in Egypt to meet in person. Two years later, the Internet shutdown showed the need for an independent community of technical experts to protect Egyptians’ connection to the world.

The day the Internet was shut off represented a point of no return, Ms. Elamrawy said. “It was definitely one of the most provoking things. We felt abandoned — completely isolated from the world.”

Ms. Elamrawy, who is 27 and trained as an architect but consults on development for free culture projects like Wikipedia, spoke by telephone from San Francisco, where she headed after spending the protests in Alexandria.

The protesters, she recalled, realized that in the time of darkness, it was particularly important to document what happened. They knew, she said, that at some point the Internet would be back, and people would want to know about the interim.

Ahmad Balal, a radiologist at Cairo University Hospitals who was a medical student during the Wikipedia conference in 2008, was one such chronicler. Mr. Balal wrote in an e-mail that his Facebook wall was the best way to relive what he experienced during the protests.

He had joined the protests at the start, on Jan. 25, but there is an eerie gap on his Facebook wall when the Internet was down, and friends from outside Egypt asked how he was but received no reply.

On Feb. 2, 5:18 a.m., when the Internet was back, he wrote in English, one of the few times he has: “The Internet is back to Egypt. Mr. Hosni Mubarak has offered it back to us after blocking it for only 5 days. Such a generous man!!!”

Forty-two minutes later, there appeared a photograph of a crowded Tahrir Square. The caption read, “I was there.”

    Egyptians Were Unplugged, and Uncowed, 20.2.2011, http://www.nytimes.com/2011/02/21/business/media/21link.html

 

 

 

 

 

Next Question for Tunisia: The Role of Islam in Politics

 

February 20, 2011
The New York Times
By THOMAS FULLER

 

TUNIS — The Tunisian revolution that overthrew decades of authoritarian rule has entered a delicate new phase in recent days over the role of Islam in politics. Tensions mounted here last week when military helicopters and security forces were called in to carry out an unusual mission: protecting the city’s brothels from a mob of zealots.

Police officers dispersed a group of rock-throwing protesters who streamed into a warren of alleyways lined with legally sanctioned bordellos shouting, “God is great!” and “No to brothels in a Muslim country!”

Five weeks after protesters forced out the country’s dictator, President Zine el-Abidine Ben Ali, Tunisians are locked in a fierce and noisy debate about how far, or even whether, Islamism should be infused into the new government.

About 98 percent of the population of 10 million is Muslim, but Tunisia’s liberal social policies and Western lifestyle shatter stereotypes of the Arab world. Abortion is legal, polygamy is banned and women commonly wear bikinis on the country’s Mediterranean beaches. Wine is openly sold in supermarkets and imbibed at bars across the country.

Women’s groups say they are concerned that in the cacophonous aftermath of the revolution, conservative forces could tug the country away from its strict tradition of secularism.

“Nothing is irreversible,” said Khadija Cherif, a former head of the Tunisian Association of Democratic Women, a feminist organization. “We don’t want to let down our guard.”

Ms. Cherif was one of thousands of Tunisians who marched through Tunis, the capital, on Saturday demanding the separation of mosque and state in one of the largest demonstrations since the overthrow of Mr. Ben Ali.

Protesters held up signs saying, “Politics ruins religion and religion ruins politics.”

They were also mourning the killing on Friday of a Polish priest by unknown attackers. That assault was also condemned by the country’s main Muslim political movement, Ennahdha, or Renaissance, which was banned under Mr. Ben Ali’s dictatorship but is now regrouping.

In interviews in the Tunisian news media, Ennahdha’s leaders have taken pains to praise tolerance and moderation, comparing themselves to the Islamic parties that govern Turkey and Malaysia.

“We know we have an essentially fragile economy that is very open toward the outside world, to the point of being totally dependent on it,” Hamadi Jebali, the party’s secretary general, said in an interview with the Tunisian magazine Réalités. “We have no interest whatsoever in throwing everything away today or tomorrow.”

The party, which is allied with Egypt’s Muslim Brotherhood, says it opposes the imposition of Islamic law in Tunisia.

But some Tunisians say they remain unconvinced.

Raja Mansour, a bank employee in Tunis, said it was too early to tell how the Islamist movement would evolve.

“We don’t know if they are a real threat or not,” she said. “But the best defense is to attack.” By this she meant that secularists should assert themselves, she said.

Ennahdha is one of the few organized movements in a highly fractured political landscape. The caretaker government that has managed the country since Mr. Ben Ali was ousted is fragile and weak, with no clear leadership emerging from the revolution.

The unanimity of the protest movement against Mr. Ben Ali in January, the uprising that set off demonstrations across the Arab world, has since evolved into numerous daily protests by competing groups, a development that many Tunisians find unsettling.

“Freedom is a great, great adventure, but it’s not without risks,” said Fathi Ben Haj Yathia, an author and former political prisoner. “There are many unknowns.”

One of the largest demonstrations since Mr. Ben Ali fled took place on Sunday in Tunis, where several thousand protesters marched to the prime minister’s office to demand the caretaker government’s resignation. They accused it of having links to Mr. Ben Ali’s government.

Tunisians are debating the future of their country on the streets. Avenue Habib Bourguiba, the broad thoroughfare in central Tunis named after the country’s first president, resembles a Roman forum on weekends, packed with people of all ages excitedly discussing politics.

The freewheeling and somewhat chaotic atmosphere across the country has been accompanied by a breakdown in security that has been particularly unsettling for women. With the extensive security apparatus of the old government decimated, leaving the police force in disarray, many women now say they are afraid to walk outside alone at night.

Achouri Thouraya, a 29-year-old graphic artist, says she has mixed feelings toward the revolution.

She shared in the joy of the overthrow of what she described as Mr. Ben Ali’s kleptocratic government. But she also says she believes that the government’s crackdown on any Muslim groups it considered extremist, a draconian police program that included monitoring those who prayed regularly, helped protect the rights of women.

“We had the freedom to live our lives like women in Europe,” she said.

But now Ms. Thouraya said she was a “little scared.”

She added, “We don’t know who will be president and what attitudes he will have toward women.”

Mounir Troudi, a jazz musician, disagrees. He has no love for the former Ben Ali government, but said he believed that Tunisia would remain a land of beer and bikinis.

“This is a maritime country,” Mr. Troudi said. “We are sailors, and we’ve always been open to the outside world. I have confidence in the Tunisian people. It’s not a country of fanatics.”

    Next Question for Tunisia: The Role of Islam in Politics, NYT, 20.2.2011, http://www.nytimes.com/2011/02/21/world/africa/21tunisia.html

 

 

 

 

 

Will Egypt Be a Partner in Peace?

 

February 19, 2011
The New York Times
By MICHAEL B. OREN

 

Washington

FOLLOWING an uprising in Cairo, Israel’s prime minister told the Knesset that he “wishes to see a free, independent and progressive Egypt,” and that “the stormy developments there may contain positive trends for progress.” The prime minister, David Ben-Gurion, spoke on Aug. 18, 1952, shortly after a young and seemingly moderate officer, Gamal Abdel Nasser, came to power.

Israeli leaders subsequently tried to secure a peace treaty with Nasser, but his rule proved neither progressive nor peace-minded. Instead, his hostility toward Israel set off two wars, the second of which, the Six-Day War of 1967, continues to affect the Middle East today.

Almost 60 years later, during another Egyptian revolution, Prime Minister Benjamin Netanyahu proclaimed to the Knesset that “the people of Israel are inspired by genuine calls for reform” and “support the forces that promote freedom, progress and peace.”

Indeed, Israelis watched with fascination as countless Egyptians demonstrated for change, and were inspired by their yearning for freedom. Israel has been proud to be the only Middle Eastern democracy, but we would rather be one of many. And we know that elected leaders are better than autocrats and dictators at serving their people and better at maintaining peace.

Nasser led his people to wars, but his successor, Anwar Sadat, also started a revolution — a revolution of peace. That breakthrough opened the path to the Camp David peace treaty between Egypt and Israel and, later, to the Israeli-Jordanian accord, as well as negotiations between Israel and the Palestinians. An entire generation of Israelis grew up never knowing war with Egypt or Jordan, and with the chance for peace with the Palestinians.

Preserving that peace is a paramount interest for the peoples of Israel, Egypt and the region. Both Prime Minister Netanyahu and Egypt’s ambassador to the United States, Sameh Shoukry, have praised that peace as the cornerstone of Middle East stability. For us, stability is not a 20th-century relic. When we say stability, we mean security for our 7.5 million citizens. When we say stability, we mean peace.

We do not, however, view stability as a substitute for democracy. On the contrary, we believe that it is an essential component of the tolerant, open society we hope will flourish in Egypt. We have seen what democracy without tolerance and openness can yield — in Gaza, Lebanon and Iran.

For that reason, Israelis appreciated the Egyptian military’s statement affirming its commitment to the Camp David treaty. We were encouraged by the sight of demonstrators focused largely on reforming Egypt rather than on resuming hostilities with Israel.

But we would be irresponsible to ignore the Muslim Brotherhood, which, although a minority party in Egypt, is the best-organized and -financed opposition group. “Resistance is the only solution against the Zio-American arrogance and tyranny,” the Brotherhood’s supreme guide recently sermonized, pledging to raise “a jihadi generation that pursues death just as its enemies pursue life.”

And the threat to peace comes not only from religious extremists but also from some of the revolution’s secular voices. The Kafaya democratic movement, for example, once circulated a petition to nullify the peace treaty. A spokesman for the April 6 Youth Movement recently demanded the halting of Egyptian natural gas shipments to Israel, which would cut off 40 percent of our supply. And last week the reformist leader Ayman Nour declared that “the era of Camp David is over.”

The Middle East is surely in transition, but for Israel, some aspects of the region remain alarmingly unchanged. In Gaza, the Hamas regime — a branch of the Muslim Brotherhood — has fired more than 200 rockets and mortar shells at Israeli towns since September. In Lebanon, where Hezbollah has imposed a puppet government, nearly 50,000 missiles are still aimed at Israel.

President Mahmoud Ahmadinejad of Iran hailed the Egyptian revolution as a step toward creating a Middle East “without America and the Zionist regime,” and celebrated by dispatching warships to the Suez Canal. Meanwhile, Iran continues to spin out enriched uranium — “producing it steadily, constantly,” according to Yukiya Amano, director of the International Atomic Energy Agency — to achieve nuclear military capacities.

Still, in spite of persistent dangers, Israel is striving for peace in the region. We have joined with Tony Blair, the envoy of the so-called quartet of Middle East peacemakers, in proposing measures to further improve the lives of Palestinians in the West Bank and Gaza on issues like developing new energy and water sources, expanding exports and broadening the scope of the Palestinian police.

And as we strengthen the foundations for co-existence, we urge Palestinian leaders to rejoin us at the negotiating table. We are committed to forging a durable peace based on firm security arrangements and mutual recognition between the Jewish and Palestinian nation-states.

These are indeed historic days, and Israel looks forward to transforming what has long been seen as a cold peace between governments into a deeply rooted warm peace between peoples, a peace between democracies.

Back in 1952, Ben-Gurion welcomed a new Egyptian leadership, but his dream of a harmonious Middle East was crushed. Our hope is that the current Egyptian revolution realizes Ben-Gurion’s vision, for the benefit of Egyptians and Israelis alike. If the region is indeed on the cusp of a new era, and if that awakening proves peaceful, Israel will be the first to embrace it.

 

Michael B. Oren is Israel’s ambassador to the United States.

    Will Egypt Be a Partner in Peace?, NYT, 19.2.2011, http://www.nytimes.com/2011/02/20/opinion/20oren.html

 

 

 

 

 

Unrest Encircles Saudis, Stoking Sense of Unease

 

February 19, 2011
The New York Times
By ROBERT F. WORTH

 

WASHINGTON — As pro-democracy uprisings spread across the Middle East, the rulers of Saudi Arabia — the region’s great bulwark of religious and political conservatism — are feeling increasingly isolated and concerned that the United States may no longer be a reliable backer, officials and diplomats say.

Saudi Arabia is far less vulnerable to democracy movements than other countries in the region, thanks to its vast oil wealth, its powerful religious establishment and the popularity of its king.

But the country’s rulers were shaken by the forced departure of the Egyptian president, Hosni Mubarak, a close and valued ally. They are anxiously monitoring the continuing protests in neighboring Bahrain and in Yemen, with which Saudi Arabia shares a porous 1,100-mile border. Those concerns come on top of long-festering worries about the situation in Iraq, where the toppling of Saddam Hussein has empowered Iran, Saudi Arabia’s great rival and nemesis.

The recent illness of Saudi Arabia’s King Abdullah, 87, who is expected to return to the kingdom this week after an absence of more than three months for treatment in the United States and Morocco, has reinforced the sense of insecurity.

“The Saudis are completely encircled by the problem, from Jordan to Iraq to Bahrain to Yemen,” said one Arab diplomat, voicing a view that is common in the halls of power in Riyadh, the capital. “Saudi Arabia is the last heavyweight U.S. ally in the region facing Iran.” He spoke on the condition of anonymity in line with diplomatic protocol.

The Saudis tend to see any threat to the established order in the region as a gain for their nemesis Iran, and its allies Syria and Hezbollah. They have grown increasingly worried that the Obama administration is drifting away from this perspective and supporting movements for change whose outcome cannot be guaranteed. Those worries were heightened by the crisis in Egypt, where the Saudis felt that Mr. Mubarak should have been allowed to stay on and make a more “dignified” exit, Saudi officials say.

King Abdullah had at least two phone conversations with President Obama to convey his concerns in the weeks before Mr. Mubarak’s ouster, and the last conversation ended in sharp disagreement, according to officials familiar with the calls.

Saudi officials have tried to appear unruffled. On Wednesday evening, Prince Nayef bin Abdel Aziz, the interior minister, invited a group of prominent intellectuals and journalists in Riyadh to discuss the recent turmoil. He struck a confident tone, saying that Saudi Arabia is “immune” to the protests because it is guided by religious law that its citizens will not question.

“Don’t compare us to Egypt or Tunisia,” the prince said, according to one of the attendees, who spoke on the condition of anonymity because the meeting was meant to be off the record. But the attendee said he and others were skeptical, and suspected the prince was merely hiding his anxieties.

The Saudi and pan-Arab news media have been cautiously supportive of the uprisings in Egypt and Tunisia, with a number of opinion articles welcoming the call for nonviolent change. That may change now that protests and violence have seized Bahrain, which lies just across a 15-mile causeway from the Saudi border. Bahrain is a far more threatening prospect, in part because of the sectarian dimensions of the protests. Bahrain’s restive population is mostly Shiite, and is adjacent to the Eastern Province of Saudi Arabia, an important oil-producing area where the Shiite population has long complained of unfair treatment by the puritanical Saudi religious establishment. They feel a strong kinship with their co-religionists across the water.

“The Bahrain uprising may give more courage to the Shia in the Eastern Province to protest,” said one Saudi diplomat. “It might then escalate to the rest of the country.”

Most analysts say that is unlikely. Although Saudi Arabia shares many of the conditions that bred the democracy uprisings — including autocracy, corruption and a large population of educated young people without access to suitable jobs — its people are cushioned by oil wealth and culturally resistant to change.

Moreover, analysts tend to agree that Saudi Arabia would never allow the Bahraini monarchy to be overthrown. Ever since Bahrain began a harsh crackdown on protesters on Thursday, rumors have flown that Saudi Arabia provided military support or guidance; however, there is no evidence to support that. In recent days, the deputy governor of the Eastern Province, Saud bin Jalawi, spoke to Shiite religious leaders and urged them to suppress any rebellious sentiment, according to Saudi news media reports.

“Saudi Arabia did not build a causeway to Bahrain just so that Saudis could party on weekends,” said Toby Jones, an expert on Saudi Arabia at Rutgers University. “It was designed for moments like this, for keeping Bahrain under control.”

The sectarian divisions in Bahrain and Saudi Arabia could also work against unrest, allowing the authorities there to blame a sectarian agenda by Iran or its Shiite proxies for any protests. That accusation is a powerful weapon in a region where suspicion of Iran runs deep. Saudi protesters have issued a call for demonstrations in all of the country’s major cities on March 11, though many seem skeptical about the results.

“I do not expect much,” said Ali al-Ahmed, the director of the Washington-based Institute for Gulf Affairs, himself a Shiite who has been critical of the Saudi monarchy. “I think people still expect that the Saudi king will make things better.”

Still, the Saudis are closely watching American diplomatic gestures toward Bahrain. Any wavering of American support for Bahrain’s Sunni monarchy, analysts say, would provoke a deep sense of betrayal, and could create an unprecedented rift in a partnership with the United States that has been a pillar of Saudi policy since 1945.

“Saudi Arabia has always had a fear of encirclement, whether with Communism or with Iranian influence,” said Rachel Bronson, an expert on Saudi Arabia at the Chicago Council on Global Affairs. “Bahrain to me is the tipping point for when this becomes really unsettling.”

    Unrest Encircles Saudis, Stoking Sense of Unease, NYT, 19.2.2011, http://www.nytimes.com/2011/02/20/world/middleeast/20saudi.html

 

 

 

 

 

Cellphones Become the World’s Eyes and Ears on Protests

 

February 18, 2011
The New York Times
By JENNIFER PRESTON and BRIAN STELTER

 

For some of the protesters facing Bahrain’s heavily armed security forces in and around Pearl Square in Manama, the most powerful weapon against shotguns and tear gas has been the tiny camera inside their cellphones.

By uploading images of this week’s violence in Manama, the capital, to Web sites like YouTube and yFrog, and then sharing them on Facebook and Twitter, the protesters upstaged government accounts and drew worldwide attention to their demands.

A novelty less than a decade ago, the cellphone camera has become a vital tool to document the government response to the unrest that has spread through the Middle East and North Africa.

Recognizing the power of such documentation, human rights groups have published guides and provided training on how to use cellphone cameras effectively.

“You finally have a video technology that can fit into the palm of one person’s hand, and what the person can capture can end up around the world,” said James E. Katz, director of the Rutgers Center for Mobile Communication Studies. “This is the dagger at the throat of the creaky old regimes that, through the manipulation of these old centralized technologies, have been able to smother the public’s voice.”

In Tunisia, cellphones were used to capture video images of the first protests in Sidi Bouzid in December, which helped spread unrest to other parts of the country. The uploaded images also prompted producers at Al Jazeera, the satellite television network, to begin focusing on the revolt, which toppled the Tunisian government in mid-January and set the stage for the demonstrations in Egypt.

While built-in cameras have been commercially available in cellphones since the late 1990s, it was not until the tsunami that struck southeast Asia on Dec. 26, 2004, and the London subway bombings the following July that news organizations began to take serious note of the outpouring of images and videos created and posted by nonprofessionals. Memorably, in June 2009, cellphone videos of the shooting death of a young woman in Tehran known as Nedawere uploaded on YouTube, galvanizing the Iranian opposition and rocketing around the world.

Now, news organizations regularly seek out, sift and publish such images. Authenticating them remains a challenge, since photos can be easily altered by computers and old videos can resurface again, purporting to be new. YouTube is using Storyful, a news aggregation site, to help manage the tens of thousands of videos that have been uploaded from the Middle East in recent weeks and to highlight notable ones on the CitizenTube channel.

But journalists are not the only conduits. Cellphone images are increasingly being shared between users on mobile networks and social networking sites, and they are being broadly consumed on Web sites that aggregate video and images.

The hosting Web sites have reported increases both in submissions from the Middle East and in visitors viewing the content.

Among the sites, Bambuser has stood out as a way to stream video. Mans Adler, the site’s co-founder, said it had 15,000 registered users in Egypt, most of whom signed up just before last November’s election. He said there were more than 10,000 videos on the site that were produced around the time of the election, focusing on activity at the polls, in what appeared to be an organized effort.

Afterward, the level of activity settled down to 800 to 2,000 videos a day, but then soared back to 10,000 a day again when the mass protests erupted in Egypt last month, he said.

In Bahrain, the government has blocked access to Bambuser.

At training sessions to help activists use their cameras, Bassem Samir, the executive director of the Egyptian Democratic Academy, said that improving the quality of the images and video was a high priority.

“Videos are stories,” said Mr. Samir. “What happened on the 25th and 28th of January, it’s a story. It’s like a story of people who were asking for freedom and democracy, and we had, like, five or three minutes to tell it.”

 

Robert Mackey contributed reporting.

    Cellphones Become the World’s Eyes and Ears on Protests, NYT, 18.2.2011, http://www.nytimes.com/2011/02/19/world/middleeast/19video.html

 

 

 

 

 

Internet Use in Bahrain Restricted, Data Shows

 

February 18, 2011
The New York Times
By JAMES GLANZ

 

As protests have erupted in Bahrain over the last several days, the government has severely restricted the access of its citizens to the Internet, new data from an organization that monitors Internet traffic strongly suggests.

The data, collected by Arbor Networks, is the first quantitative confirmation that Internet traffic into and out of Bahrain has suffered an anomalous drop over the past days.

Jose Nazario, the senior manager of security research at Arbor, which is based in Massachusetts, said that the traffic was 10 percent to 20 percent below expected levels. The measurements gauge the amount of information flowing through Internet backbone lines into and out of Bahrain.

A fluctuation of that size is generally caused only by natural calamities or major global sporting events, Mr. Nazario said, leading the company to conclude that the most likely explanation is that Bahrain is blocking many sites on the Internet.

He said that the company could not absolutely rule out technical problems with Internet carriers inside the country as a cause.

But Jillian York of Harvard, project coordinator for the OpenNet Initiative, said that the findings were consistent with reports that Bahrainis had been blocked from various sites, including YouTube and Bambuser.

    Internet Use in Bahrain Restricted, Data Shows, NYT, 18.2.2011, http://www.nytimes.com/2011/02/18/world/middleeast/18manama.html

 

 

 

 

 

Digital Age Is Slow to Arrive in Rural America

 

February 17, 2011
The New York Times
By KIM SEVERSON

 

COFFEEVILLE, Ala. — After a couple of days in this part of rural Alabama, it is hard to complain about a dropped iPhone call or a Cee Lo video that takes a few seconds too long to load.

The county administrator cannot get broadband at her house. Neither can the sportswriter at The Thomasville Times.

Here in Coffeeville, the only computer many students ever touch is at the high school.

“I’m missing a whole lot,” Justin Bell, 17, said. “I know that.”

As the world embraces its digital age — two billion people now use the Internet regularly — the line delineating two Americas has become more broadly drawn. There are those who have reliable, fast access to the Internet, and those, like about half of the 27,867 people here in Clarke County, who do not.

In rural America, only 60 percent of households use broadband Internet service, according to a report released Thursday by the Department of Commerce. That is 10 percent less than urban households.

Over all, 28 percent of Americans do not use the Internet at all.

The report was developed in conjunction with a national broadband map that was also released Thursday. The map, considered the most comprehensive of its kind, is expected to show a number of discrepancies in the quality and availability of broadband access between rural and urban communities.

The map took five years and $200 million to develop, and is part of a billion-dollar effort to improve Internet access in the United States, particularly in rural areas.

The Obama administration has given $7.2 billion in stimulus money toward the effort, which will pay for things like wiring small communities, developing public computer centers and educating the skeptical on why they should go online in the first place.

Last week, the F.C.C. began the process of changing the $8 billion fund intended to extend telephone service to rural areas to one that extends broadband Internet to areas without it.

“This is like electricity was,” said Brian Depew, assistant executive direction for the Center for Rural Affairs, a nonprofit research group in Lyons, Neb. “This is a critical utility.”

“You often hear people talk about broadband from a business development perspective, but it’s much more significant than that,” he added. “This is about whether rural communities are going to participate in our democratic society. If you don’t have effective broadband, you are cut out of things that are really core to who we are as a country.”

Affordable broadband service through hard wiring and or cellular phone coverage could revolutionize life in rural parts of the country, according to advocates for improving such services. In addition to being able to pay bills or purchase goods not available in nearby towns, isolated people could visit doctors online. They could work from home and take college classes.

Increasingly, interacting with certain branches of government can be done only online. And in emergencies, a lack of cellphone or e-mail can have serious consequences. Emergency alerts regarding severe weather, for example, are often sent only through text or e-mail.

All of that is important, certainly. But there is also a social component to good Internet access. Here in Clarke County, where churches and taxidermy shops line the main roads and drivers learn early to dodge logging trucks hauling pine trees, most people would simply like to upload photos of their children to Facebook.

“Ninety-five percent of the people in this county who want public water can have it, but people can’t even talk to each other around here,” said Sharon Lane, 60, who owns a small logging company with her husband and lives just outside of Coffeeville. It took her three days to try to arrange a meeting with the governor 150 miles away in Montgomery because such inquiries cannot be made over the phone and she had to drive 45 minutes to her daughter’s house to use e-mail.

At home, her cellphone works only if she walks to the porch and stands at the end of a bench. So she uses a local cellphone/walkie-talkie hybrid called Southern Link.

They have dial-up at the office, “but that’s so slow it makes you pull your hair out,” Mrs. Lane said. A satellite dish is out of the question because her house is surrounded by trees.

“It takes 10 times the effort to do what someone else can do in a matter of five minutes,” she said.

For many here, where the median household income is $27,388, the existing cellphone and Internet options are too expensive.

Joyce Graham, who oversees Web-based classes at Coffeeville High School, has struggled with dial-up service at home since 2000. A month ago, she started buying satellite service with help from stimulus money.

“For most people out here, satellite is all you can get, and it’s $70 a month,” she said. “Now who is going to pay that? This is a poor, rural county.”

Not that all of the county is without decent coverage. Some towns have broadband service, and other people can get it using wireless cellular lines.

Sheldon Day, the mayor of Thomasville, about 25 miles northeast of Coffeeville, prides himself on his city’s embrace of technology. Broadband is widely available, police cars have computers and he is planning a system that will allow water meters to be read wirelessly. But even getting e-mail on a smart phone in the middle of town can be maddening.

The digital revolution, he concedes, is coming slowly.

“There are areas within five miles of where I am sitting that don’t have any connectivity, even with cell service,” he said.

Gina Wilson, director of the Thomasville library, oversees 11 terminals with lightning-fast Internet access. They attract the usual array of children and the unemployed during the day, as well as college students who take classes online. At night, people stop by after work to check their e-mail or scroll through Facebook.

Mrs. Wilson noticed that after hours, people would pull into the parking lot, open their laptops and try to use the library’s wireless signal. So she started leaving it on all night, and soon will post a sign on the door with the password (which, if you are in Thomasville and need to get online, is “guest.”)

But even she struggles at home. She lives two miles from the city limits and only began getting broadband service through a Verizon wireless device in December.

There have been efforts to improve the county’s communication services. A group of community leaders, for example, worked for years on a plan to attach microwave technology to the numerous water towers in the area. Making wireless Internet access available throughout the county would cost about $5.5 million, they estimated. They even applied for stimulus money and made it through the first round, but were ultimately turned down.

The tiny Pine Belt Telephone Company also tried for some stimulus money, hoping to run a fiber optic line into Coffeeville. They, too, were turned down.

“Essentially it comes down to the big, national companies not wanting to invest and the lack of interest in certain areas,” said John Nettles, who runs the telecommunication company his father founded 52 years ago. “It’s not much different than the impact the big-box stores have had on rural America and small town businesses.”

A spokesman for AT&T, which offers coverage in parts but not all of Clarke Country, declined to comment.

The State of Alabama is using federal and state grants to help encourage more service in rural areas. They are working with service providers and setting up outreach teams with mobile computer labs to show people why they need the Internet. The theory is that increasing demand will make it more lucrative for companies to invest in the technology and allow them to offer online service at prices that residents can afford.

It is a hard sell, especially among older residents or people with less education. A study last year by the Pew Internet & American Life Project showed that a fifth of adults do not use the Internet because they feel it is not relevant to their lives.

“The people who could benefit from broadband the most use it the least,” said Amelia Hall Stehouwer, a researcher from Auburn University who works with rural Alabama communities.

Still, it will be a long road to the digital age here.

“We are trying to pull ourselves into the 21st century,” Mrs. Lane, the logging company owner, said. “I don’t think the rest of the world understands there is a piece of the world here that is really challenged.”

    Digital Age Is Slow to Arrive in Rural America, NYT, 17.2.2011, http://www.nytimes.com/2011/02/18/us/18broadband.html

 

 

 

 

 

Google Announces Payment System for Digital Content

 

February 16, 2011
The New York Times
By CLAIRE CAIN MILLER

 

SAN FRANCISCO — A day after Apple stirred up online publishers by announcing a digital subscription plan that some called too restrictive and financially burdensome, Google on Wednesday announced its own payment service for digital content that aims to be more publisher-friendly.

Google’s service, called Google One Pass, is a way for online publishers to sell digital content on the Web and through mobile apps using Google’s existing payment service, Google Checkout, and for readers to access that content on many devices with their Google e-mail address and password.

“The overall goal is to bring publishers a simple way to charge for content they choose to charge for, and for readers to have simple access without any restrictions on which devices they use,” said Jeannie Hornung, a Google spokeswoman.

Google’s service seems to directly respond to some publishers’ concerns about Apple’s plan. Apple will keep 30 percent of any sale of digital content, like books, music and magazines, within an iPhone or iPad app, and will own the subscriber information, like names and e-mail addresses. Users can choose to share that information with publishers if they want.

When publishers use One Pass, which for now is limited to online newspapers and magazines, Google will keep 10 percent of the sale price and share the customer’s name, zip code and e-mail address, unless the customer specifically asks Google not to.

“We are allowing the publishers to transact directly with their customers,” Ms. Hornung said.

Google One Pass aims to offer a broad solution for online publishers grappling with how to charge readers. It will allow publishers to avoid having to build their own payment or sign-in systems, and can identify readers logging in across various devices. In that way, it competes with services like Journalism Online’s Press+, which offers easy log-in and payments technology to online publishers.

But unlike Apple’s service, Google’s is aimed more for use on Web sites than in apps. Ms. Hornung said publishers can only use One Pass in an app if the mobile operating system’s guidelines allow it.

Publishers selling content within an app running on Google’s Android operating system, for instance, would have to comply with Android’s revenue share. However, unlike Apple, Google allows apps to redirect customers to a mobile Web browser to make a purchase, where publishers can use Google One Pass and keep 90 percent of the revenue.

Google suggested that publishers use it to experiment with different models, like subscriptions, metered access and selling single articles, and it lets publishers give free access to existing subscribers. The system is available to publishers in the United States, Canada and several European countries, and publishers including Axel Springer in Germany and Media General in the United States have signed up.

    Google Announces Payment System for Digital Content, NYT, 16.2.2011, http://www.nytimes.com/2011/02/17/business/media/17google.html

 

 

 

 

 

Egypt Leaders Found ‘Off’ Switch for Internet

 

February 15, 2011
The New York Times
By JAMES GLANZ and JOHN MARKOFF

 

Epitaphs for the Mubarak government all note that the mobilizing power of the Internet was one of the Egyptian opposition’s most potent weapons. But quickly lost in the swirl of revolution was the government’s ferocious counterattack, a dark achievement that many had thought impossible in the age of global connectedness. In a span of minutes just after midnight on Jan. 28, a technologically advanced, densely wired country with more than 20 million people online was essentially severed from the global Internet.

The blackout was lifted after just five days, and it did not save President Hosni Mubarak. But it has mesmerized the worldwide technical community and raised concerns that with unrest coursing through the Middle East, other autocratic governments — many of them already known to interfere with and filter specific Web sites and e-mails — may also possess what is essentially a kill switch for the Internet.

Because the Internet’s legendary robustness and ability to route around blockages are part of its basic design, even the world’s most renowned network and telecommunications engineers have been perplexed that the Mubarak government succeeded in pulling the maneuver off.

But now, as Egyptian engineers begin to assess fragmentary evidence and their own knowledge of the Egyptian Internet’s construction, they are beginning to understand what, in effect, hit them. Interviews with many of those engineers, as well as an examination of data collected around the world during the blackout, indicate that the government exploited a devastating combination of vulnerabilities in the national infrastructure.

For all the Internet’s vaunted connectivity, the Egyptian government commanded powerful instruments of control: it owns the pipelines that carry information across the country and out into the world.

Internet experts say similar arrangements are more common in authoritarian countries than is generally recognized. In Syria, for example, the Syrian Telecommunications Establishment dominates the infrastructure, and the bulk of the international traffic flows through a single pipeline to Cyprus. Jordan, Qatar, Oman, Saudi Arabia and other Middle Eastern countries have the same sort of dominant, state-controlled carrier.

Over the past several days, activists in Bahrain and Iran say they have seen strong evidence of severe Internet slowdowns amid protests there. Concerns over the potential for a government shutdown are particularly high in North African countries, most of which rely on a just a small number of fiber-optic lines for most of their international Internet traffic.

 

A Double Knockout

The attack in Egypt relied on a double knockout, the engineers say. As in many authoritarian countries, Egypt’s Internet must connect to the outside world through a tiny number of international portals that are tightly in the grip of the government. In a lightning strike, technicians first cut off nearly all international traffic through those portals.

In theory, the domestic Internet should have survived that strike. But the cutoff also revealed how dependent Egypt’s internal networks are on moment-to-moment information from systems that exist only outside the country — including e-mail servers at companies like Google, Microsoft and Yahoo; data centers in the United States; and the Internet directories called domain name servers, which can be physically located anywhere from Australia to Germany.

The government’s attack left Egypt not only cut off from the outside world, but also with its internal systems in a sort of comatose state: servers, cables and fiber-optic lines were largely up and running, but too confused or crippled to carry information save a dribble of local e-mail traffic and domestic Web sites whose Internet circuitry somehow remained accessible.

“They drilled unexpectedly all the way down to the bottom layer of the Internet and stopped all traffic flowing,” said Jim Cowie, chief technology officer of Renesys, a network management company based in New Hampshire that has closely monitored Internet traffic from Egypt. “With the scope of their shutdown and the size of their online population, it is an unprecedented event.”

The engineers say that a focal point of the attack was an imposing building at 26 Ramses Street in Cairo, just two and a half miles from the epicenter of the protests, Tahrir Square. At one time purely a telephone network switching center, the building now houses the crucial Internet exchange that serves as the connection point for fiber-optic links provided by five major network companies that provide the bulk of the Internet connectivity going into and out of the country.

“In Egypt the actual physical and logical connections to the rest of the world are few, and they are licensed by the government and they are tightly controlled,” said Wael Amin, president of ITWorx, a large software development company based in Cairo.

One of the government’s strongest levers is Telecom Egypt, a state-owned company that engineers say owns virtually all the country’s fiber-optic cables; other Internet service providers are forced to lease bandwidth on those cables in order to do business.

Mr. Cowie noted that the shutdown in Egypt did not appear to have diminished the protests — if anything, it inflamed them — and that it would cost untold millions of dollars in lost business and investor confidence in the country. But he added that, inevitably, some autocrats would conclude that Mr. Mubarak had simply waited too long to bring down the curtain.

“Probably there are people who will look at this and say, it really worked pretty well, he just blew the timing,” Mr. Cowie said.

Speaking of the Egyptian shutdown and the earlier experience in Tunisia, whose censorship methods were less comprehensive, a senior State Department official said that “governments will draw different conclusions.”

“Some may take measures to tighten communications networks,” said the official, speaking on the condition of anonymity. “Others may conclude that these things are woven so deeply into the culture and commerce of their country that they interfere at their peril. Regardless, it is certainly being widely discussed in the Middle East and North Africa.”

 

Vulnerable Choke Points

In Egypt, where the government still has not explained how the Internet was taken down, engineers across the country are putting together clues from their own observations to understand what happened this time, and to find out whether a future cutoff could be circumvented on a much wider scale than it was when Mr. Mubarak set his attack in motion.

The strength of the Internet is that it has no single point of failure, in contrast to more centralized networks like the traditional telephone network. The routing of each data packet is handled by a web of computers known as routers, so that in principle each packet might take a different route. The complete message or document is then reassembled at the receiving end.

Yet despite this decentralized design, the reality is that most traffic passes through vast centralized exchanges — potential choke points that allow many nations to monitor, filter or in dire cases completely stop the flow of Internet data.

China, for example, has built an elaborate national filtering system known as the Golden Shield Project, and in 2009 it shut down cellphone and Internet service amid unrest in the Muslim region of Xinjiang. Nepal’s government briefly disconnected from the Internet in the face of civil unrest in 2005, and so did Myanmar’s government in 2007.

But until Jan. 28 in Egypt, no country had revealed that control of those choke points could allow the government to shut down the Internet almost entirely.

There has been intense debate both inside and outside Egypt on whether the cutoff at 26 Ramses Street was accomplished by surgically tampering with the software mechanism that defines how networks at the core of the Internet communicate with one another, or by a blunt approach: simply cutting off the power to the router computers that connect Egypt to the outside world.

But either way, the international portals were shut, and the domestic system reeled from the blow.

 

The Lines Go Dead

The first hints of the blackout had actually emerged the day before, Jan. 27, as opposition leaders prepared for a “Friday of anger,” with huge demonstrations expected. Ahmed ElShabrawy, who runs a company called EgyptNetwork, noticed that the government had begun blocking individual sites like Facebook and Twitter.

Just after midnight on Jan. 28, Mahmoud Amin’s iPhone beeped with an alert that international connections to his consulting company’s Internet system had vanished — and then the iPhone itself stopped receiving e-mail. A few minutes later, Mr. ElShabrawy received an urgent call telling him that all Internet lines running to his company were dead.

It was not long before Ayman Bahaa, director of Egyptian Universities Network, which developed the country’s Internet nearly two decades ago, was scrambling to figure out how the system had all but collapsed between the strokes of 12 and 1.

The system had been crushed so completely that when a network engineer who does repairs in Cairo woke in the morning, he said to his family, “I feel we are in the 1800s.”

Over the next five days, the government furiously went about extinguishing nearly all of the Internet links to the outside world that had survived the first assault, data collected by Western network monitors show. Although a few Egyptians managed to post to Facebook or send sporadic e-mails, the vast majority of the country’s Internet subscribers were cut off.

The most telling bit of evidence was that some Internet services inside the country were still working, at least sporadically. American University in Cairo, frantically trying to relocate students and faculty members away from troubled areas, was unable to use e-mail, cellphones — which were also shut down — or even a radio frequency reserved for security teams. But the university was able to update its Web site, hosted on a server inside Egypt, and at least some people were able to pull up the site and follow the emergency instructions.

“The servers were up,” said Nagwa Nicola, the chief technology officer at American University in Cairo. “You could reach up to the Internet provider itself, but you wouldn’t get out of the country.” Ms. Nicola said that no notice had been given, and she depicted an operation that appeared to have been carried out with great secrecy.

“When we called the providers, they said, ‘Um, hang on, we just have a few problems and we’ll be on again,’ ” she said. “They wouldn’t tell us it was out.”

She added, “It wasn’t expected at all that something like that would happen.”

 

Told to Shut Down or Else

Individual Internet service providers were also called on the carpet and ordered to shut down, as they are required to do by their licensing agreements if the government so decrees.

According to an Egyptian engineer and an international telecom expert who both spoke on the condition of anonymity, at least one provider, Vodafone, expressed extreme reluctance to shut down but was told that if it did not comply, the government would use its own “off” switch via the Telecom Egypt infrastructure — a method that would be much more time-consuming to reverse. Other exchanges, like an important one in Alexandria, may also have been involved.

Still, even major providers received little notice that the moves were afoot, said an Egyptian with close knowledge of the telecom industry who would speak only anonymously.

“You don’t get a couple of days with something like this,” he said. “It was less than an hour.”

After the Internet collapsed, Mr. ElShabrawy, 35, whose company provides Internet service to 2,000 subscribers and develops software for foreign and domestic customers, made urgent inquiries with the Ministry of Communications, to no avail. So he scrambled to re-establish his own communications.

When he, too, noticed that domestic fiber-optic cables were open, he had a moment of exhilaration, remembering that he could link up servers directly and establish messaging using an older system called Internet Relay Chat. But then it dawned on him that he had always assumed he could download the necessary software via the Internet and had saved no copy.

“You don’t have your tools — you don’t have anything,” Mr. ElShabrawy said he realized as he stared at the dead lines at his main office in Mansoura, about 60 miles outside Cairo.

With the streets unsafe because of marauding bands of looters, he decided to risk having a driver bring $7,000 in satellite equipment, including a four-foot dish, from Cairo, and somehow he was connected internationally again by Monday evening.

Steeling himself for the blast of complaints from angry customers — his company also provides texting services in Europe and the Middle East — Mr. ElShabrawy found time to post videos of the protests in Mansoura on his Facebook page. But with security officials asking questions about what he was up to, he did not dare hook up his domestic subscribers.

Then, gingerly, he reached out to his international customers, his profuse apologies already framed in his mind.

The response that poured in astonished Mr. ElShabrawy, who is nothing if not a conscientious businessman, even in turbulent times. “People said: ‘Don’t worry about that. We are fine and we need to know that you are fine. We are all supporting you.’ ”

    Egypt Leaders Found ‘Off’ Switch for Internet, NYT, 15.2.2011, http://www.nytimes.com/2011/02/16/technology/16internet.html

 

 

 

 

 

U.S. Policy to Address Internet Freedom

 

February 14, 2011
The New York Times
By MARK LANDLER

 

WASHINGTON — Days after Facebook and Twitter added fuel to a revolt in Egypt, the Obama administration plans to announce a new policy on Internet freedom, designed to help people get around barriers in cyberspace while making it harder for autocratic governments to use the same technology to repress dissent.

The State Department’s policy, a year in the making, has been bogged down by fierce debates over which projects it should support, and even more basically, whether to view the Internet primarily as a weapon to topple repressive regimes or as a tool that autocrats can use to root out and crush dissent.

Secretary of State Hillary Rodham Clinton, who will lay out the policy in a speech on Tuesday, acknowledged the Internet’s dual role in an address a year ago, and administration officials said she would touch on that theme again, noting how social networks were used by both protesters and governments in the uprisings in Tunisia, Egypt and other Arab countries.

The State Department plans to finance programs like circumvention services, which enable users to evade Internet firewalls, and training for human rights workers on how to secure their e-mail from surveillance or wipe incriminating data from cellphones if they are detained by the police.

Though the policy has been on the drawing board for months, it has new urgency in light of the turmoil in the Arab world, because it will be part of a larger debate over how the United States weighs its alliances with entrenched leaders against the young people inspired by the events in Tunisia and Egypt.

Administration officials say that the emphasis on a broad array of projects — hotly disputed by some technology experts and human rights activists — reflects their view that technology can be a force that leads to democratic change, but is not a “magic bullet” that brings down repressive regimes.

“People are so enamored of the technology,” said Michael H. Posner, the assistant secretary of state for democracy, human rights and labor. “People have a view that technology will make us free. No, people will make us free.”

Critics say the administration has dawdled for more than a year, holding back $30 million in Congressional financing that could have gone to circumvention technology, a proven method that allows Internet users to evade government firewalls by routing their traffic through proxy servers in other countries.

Some of these services have received modest financing from the government, but their backers say they need much more to install networks capable of handling millions of users in China, Iran and other countries.

A report by the Republican minority of the Senate Foreign Relations Committee, to be released Tuesday, said the State Department’s performance was so inadequate that the job of financing Internet freedom initiatives — at least those related to China — should be moved to another agency, the Broadcasting Board of Governors, which oversees Voice of America and Radio Free Europe.

“Certainly, the State Department took an awfully long time to get this out,” said Rebecca MacKinnon, a former CNN correspondent and expert on Internet freedom issues who is now a senior fellow at the New America Foundation. “They got so besieged by the politics of what they should be funding.”

Still, Ms. MacKinnon said that she believed the State Department’s deliberations had been thoughtful and the plan “is going to be effective if it’s couched within a broader set of policies.”

There are other contradictions in the State Department’s agenda: it champions the free flow of information, except when it is in secret cables made public by WikiLeaks; it wants to help Chinese citizens circumvent their government’s Internet firewall, but is leery of one of the most popular services for doing so, which is sponsored by Falun Gong, a religious group outlawed by Beijing as an evil cult.

In the long months the government has wrestled with these issues, critics said, the Iranian government was able to keep censoring the Internet, helping it muffle the protests that followed its disputed presidential election in 2009.

Mr. Posner, a longtime human rights advocate, acknowledges that the process has been long and occasionally messy. But he contends that over the past year, the administration has developed a coherent policy that takes account of the rapidly evolving role the Internet plays in closed societies.

The State Department has received 68 proposals for nearly six times the $30 million in available funds. The department said it would take at least two months to evaluate proposals before handing out money.

Among the kinds of things that excite officials are “circuit riders,” experts who tour Internet cafes in Myanmar teaching people how to set up secure e-mail accounts, and new ways of dealing with denial-of-service attacks.

This does not satisfy critics, who say the lawmakers intended the $30 million to be used quickly — and on circumvention.

“The department’s failure to follow Congressional intent created the false impression among Iranian demonstrators that the regime had the power to disrupt access to Facebook and Twitter,” said Michael J. Horowitz, a senior fellow at the Hudson Institute, who lobbies on behalf of the Global Internet Freedom Consortium, a circumvention service with ties to Falun Gong.

Mr. Horowitz has organized demonstrations of the service for legislators, journalists and others. On Jan. 27, the day before the Egyptian government cut off access to the Internet, he said there were more than 7.8 million page views by Egyptians on UltraSurf, one of two consumer services under the umbrella of the Global Internet Freedom Consortium. That was a huge increase from only 76,000 on Jan. 22.

The trouble, Mr. Horowitz said, is that UltraSurf and its sister service, Freegate, do not have enough capacity to handle sudden spikes in usage during political crises. That causes the speed to slow to a crawl, which discourages users. The companies need tens of millions of dollars to install an adequate network, he said. Under a previous government grant, the group received $1.5 million.

But the experience in Egypt points up the limits of circumvention. By shutting down the entire Internet, the authorities were able to make such systems moot. Administration officials point out that circumvention is also of little value in countries like Russia, which does not block the Internet but dispatches the police to pursue bloggers, or in Myanmar, which has sophisticated ways to monitor e-mail accounts.

Ron Deibert, the director of the Citizen Lab at the University of Toronto, said that governments had been shifting from blocking the Internet to hacking and disabling it. Even in the United States, he noted, the Senate is considering a bill that would allow the president to switch off the Internet in the event of a catastrophic cyberattack.

    U.S. Policy to Address Internet Freedom, NYT, 14.2.201, http://www.nytimes.com/2011/02/15/world/15clinton.html

 

 

 

 

 

Facebook Officials Keep Quiet on Its Role in Revolts

 

February 14, 2011
The New York Times
By JENNIFER PRESTON

 

With Facebook playing a starring role in the revolts that toppled governments in Tunisia and Egypt, you might think the company’s top executives would use this historic moment to highlight its role as the platform for democratic change. Instead, they really do not want to talk about it.

The social media giant finds itself under countervailing pressures after the uprisings in the Middle East. While it has become one of the primary tools for activists to mobilize protests and share information, Facebook does not want to be seen as picking sides for fear that some countries — like Syria, where it just gained a foothold — would impose restrictions on its use or more closely monitor users, according to some company executives who spoke on the condition of anonymity because they were discussing internal business.

And Facebook does not want to alter its firm policy requiring users to sign up with their real identities. The company says this requirement protects its users from fraud. However, human rights advocates like Susannah Vila, the director of content and outreach for Movements.org, which provides resources for digital activists, say it could put some people at risk from governments looking to ferret out dissent.

“People are going to be using this platform for political mobilization, which only underscores the importance of ensuring their safety,” she said.

Under those rules, Facebook shut down one of the most popular Egyptian Facebook protest pages in November because Wael Ghonim, a Google executive who emerged as a symbol of the revolt, had used a pseudonym to create a profile as one of the administrators of the page, a violation of Facebook’s terms of service.

With Egypt’s emergency law in place limiting freedom of speech, Mr. Ghonim might have put himself and the other organizers at risk if they were discovered at that time. Activists scrambled to find another administrator to get the page back up and running. And when Egyptian government authorities did figure out Mr. Ghonim’s role with the Facebook page that helped promote the Jan. 25 protest in Tahrir Square, he was imprisoned for 12 days.

Last week, Senator Richard J. Durbin, Democrat of Illinois, urged Facebook to take “immediate and tangible steps” to help protect democracy and human rights activists who use its services, including addressing concerns about not being able to use pseudonyms.

In a letter to Mark Zuckerberg, Facebook’s chief executive, Mr. Durbin said the recent events in Egypt and Tunisia had highlighted the costs and benefits of social tools to democracy and human rights advocates. “I am concerned that the company does not have adequate safeguards in place to protect human rights and avoid being exploited by repressive governments,” he wrote.

Elliot Schrage, the vice president for global communications, public policy and marketing at Facebook, declined to discuss Facebook’s role in the recent tumult and what it might mean for the company’s services.

In a short statement, he said: “We’ve witnessed brave people of all ages coming together to effect a profound change in their country. Certainly, technology was a vital tool in their efforts but we believe their bravery and determination mattered most.”

Other social media tools, like YouTube and Twitter, also played major roles in Tunisia and Egypt, especially when the protests broke out. But Facebook was the primary tool used in Egypt, first to share reports about police abuse and then to build an online community that was mobilized to join the Jan. 25 protests.

In recent weeks, Facebook pages and groups trying to mobilize protesters have sprung up in Algeria, Bahrain, Morocco and Syria. Hashtags on Twitter have also helped spread the protests, which extended to Algeria over the weekend and to Bahrain, Iran and Yemen on Monday.

“This is an incredible challenge and an incredible opportunity for Facebook, Twitter and Google,” said Ethan Zuckerman, a senior researcher at the Berkman Center for Internet and Society at Harvard, where he works on projects about the use of technology and media in the developing world. “It might be tougher for Facebook than anyone else. Facebook has been ambivalent about the use of their platform by activists.”

Unlike Vodafone and other telecommunications carriers, which often need contracts and licenses to operate within countries, Facebook and other social networks are widely available around the world (except in countries like China, Saudi Arabia and Iran, which have restricted access) and encourage the free flow of information for anyone with access to the Internet.

In a speech that Secretary of State Hillary Rodham Clinton is scheduled to deliver Tuesday, she will once again emphasize that Internet freedom is an inalienable right. In recent weeks, the State Department has been sending out Twitter updates in Arabic and began sending updates in Persian over the weekend.

Twitter and YouTube, which is owned by Google, have been more willing to embrace their roles in activism and unrest, Mr. Zuckerman said.

After the Internet was shut down in Egypt, Twitter and Google actively helped protesters by producing a new service, speak2tweet, that allowed people to leave voice mail messages that would be filed as updates on Twitter. Biz Stone, one of Twitter’s founders, used it as an opportunity to emphasize the positive global impact that comes with the open exchange of information.

When the Internet was back up, YouTube, working with Storyful, a social media news curation service, took the thousands of videos pouring in from the protests in Tahrir Square to help people retrieve and share the information as quickly as possible on CitizenTube, its news and politics channel.

Facebook has taken steps to help protesters in Tunisia after government officials used a virus to obtain local Facebook passwords this year. The company rerouted Facebook’s traffic from Tunisia and used the breach to upgrade security last month for all of its more than 550 million users worldwide; at the same time, it was careful to cast the response as a technical solution to a security problem. There are about two million Facebook users in Tunisia and five million in Egypt.

Debbie Frost, a spokeswoman for Facebook, said the company was not considering changing its policy requiring users to use their real identities, which she says leads to greater accountability and a safer environment.

“The trust people place in us is the most important part of what makes Facebook work,” she said, adding that the company welcomed a discussion with Mr. Durbin and others who have an interest in this matter. “As demonstrated by our response to threats in Tunisia, we take this trust seriously and work aggressively every single day to protect people.”

Mr. Durbin has urged Facebook to join the Global Network Initiative, a voluntary code of conduct for technology companies, created in 2008, that requires participating businesses to take reasonable steps to protect human rights.

Andrew Rasiej, founder of the Personal Democracy Forum, said that the people and companies behind the technology needed to be more transparent about what information they collect, and that they needed to develop consistent policies to allow people to opt in or out of their data collection systems. “We must have a right to protect the privacy of information stored in the cloud as rigorously as if it were in our own home,” he said.

    Facebook Officials Keep Quiet on Its Role in Revolts, NYT, 14.2.2011, http://www.nytimes.com/2011/02/15/business/media/15facebook.html

 

 

 

 

 

Israeli Archive and Google Team Up to Put Holocaust Stories at Fingertips

 

February 12, 2011
The New York Times
By DINA KRAFT

 

TEL AVIV — When Google, the world’s largest search engine, joined forces with Yad Vashem, keeper of the world’s largest Holocaust archive, the first thing one Google employee here did was search for his grandfather’s name.

A link took the employee, Doron Avni, to a Google-operated page on the Yad Vashem Web site showing a photograph of his grandfather, Yecheskel Fleischer, taken in 1941 just after he was released from a Nazi-run prison in Lithuania.

Under the photograph of his grandfather, then 27, dark-eyed and gaunt, Mr. Avni was able to type in details of his grandfather’s story. Icons on the page from Facebook, Twitter and other social media outlets allow for immediate sharing of the images and attached information.

“It’s a milestone that marks a new era in our ability to disseminate and bring useful accessibility to Yad Vashem’s databases,” said Avner Shalev, chairman of Yad Vashem, at a news conference last month at Google’s offices in central Tel Aviv.

Yad Vashem began digitizing its holdings in the 1990s and has an extensive Web site, but the technology of Google, and the expertise of a team of employees who have been working on the project for three years, will make the information easier to find in search engines.

The photographs have been scanned using optical character recognition, which identifies any text in the pictures, making it searchable. So if Mr. Avni’s grandfather’s name had not been listed in a document but had been inscribed on a photograph, whether in Latin or Hebrew letters, he would still have been found.

The first stage of the Holocaust memorial’s partnership with Google includes about 130,000 photographs in full resolution, hosted on a Google server, with the option for users to add commentary, including historical background and personal family stories. The long-term goal is to include Yad Vashem’s larger archive of millions of documents, including survivor testimonials, diaries, letters and manuscripts.

Two years ago Google and Yad Vashem began their first joint project, a YouTube channel for viewing Holocaust survivors’ testimonials.

John Palfrey, co-director of the Berkman Center for Internet and Society at Harvard, said that although such public-private partnerships could make significant contributions, the private control of a public resource raised potential conflicts.

“Down the road this altruistic project could look different,” Mr. Palfrey said by phone from Cambridge, Mass. “I would say it’s a good thing that information is made available to the world, but many of us worry about the central role a company is playing in the preservation of the world’s cultural information.”

“It is about unknowns,” he said. “We don’t know where the corporate interest might get misaligned with the public interest down the line.” For now, the interests appear to have converged.

After viewing his grandfather’s photograph, Mr. Avni, the policy manager at Google’s research and development center in Israel, added comments about how his grandfather hid in the forests of Lithuania until the end of World War II, only to be discovered by Russian soldiers who initially mistook him for a German and wanted to kill him.

When the soldiers were presented with the same photograph, clearly identifying him as a Jew because his shirt bore the Star of David that Nazis forced Jews to wear, his life was spared.

“What my grandfather wanted was for the next generation to know about the Holocaust,” Mr. Avni said. “He would have been inspired by this, to know his message is now being communicated to so many people around the world.”

    Israeli Archive and Google Team Up to Put Holocaust Stories at Fingertips, NYT, 12.2.2011, http://www.nytimes.com/2011/02/13/world/middleeast/13holocaust.html

 

 

 

 

 

The Dirty Little Secrets of Search

 

February 12, 2011
The New York Times
By DAVID SEGAL

 

PRETEND for a moment that you are Google’s search engine.

Someone types the word “dresses” and hits enter. What will be the very first result?

There are, of course, a lot of possibilities. Macy’s comes to mind. Maybe a specialty chain, like J. Crew or the Gap. Perhaps a Wikipedia entry on the history of hemlines.

O.K., how about the word “bedding”? Bed Bath & Beyond seems a candidate. Or Wal-Mart, or perhaps the bedding section of Amazon.com.

“Area rugs”? Crate & Barrel is a possibility. Home Depot, too, and Sears, Pier 1 or any of those Web sites with “area rug” in the name, like arearugs.com.

You could imagine a dozen contenders for each of these searches. But in the last several months, one name turned up, with uncanny regularity, in the No. 1 spot for each and every term:

J. C. Penney.

The company bested millions of sites — and not just in searches for dresses, bedding and area rugs. For months, it was consistently at or near the top in searches for “skinny jeans,” “home decor,” “comforter sets,” “furniture” and dozens of other words and phrases, from the blandly generic (“tablecloths”) to the strangely specific (“grommet top curtains”).

This striking performance lasted for months, most crucially through the holiday season, when there is a huge spike in online shopping. J. C. Penney even beat out the sites of manufacturers in searches for the products of those manufacturers. Type in “Samsonite carry on luggage,” for instance, and Penney for months was first on the list, ahead of Samsonite.com.

With more than 1,100 stores and $17.8 billion in total revenue in 2010, Penney is certainly a major player in American retailing. But Google’s stated goal is to sift through every corner of the Internet and find the most important, relevant Web sites.

Does the collective wisdom of the Web really say that Penney has the most essential site when it comes to dresses? And bedding? And area rugs? And dozens of other words and phrases?

The New York Times asked an expert in online search, Doug Pierce of Blue Fountain Media in New York, to study this question, as well as Penney’s astoundingly strong search-term performance in recent months. What he found suggests that the digital age’s most mundane act, the Google search, often represents layer upon layer of intrigue. And the intrigue starts in the sprawling, subterranean world of “black hat” optimization, the dark art of raising the profile of a Web site with methods that Google considers tantamount to cheating.

Despite the cowboy outlaw connotations, black-hat services are not illegal, but trafficking in them risks the wrath of Google. The company draws a pretty thick line between techniques it considers deceptive and “white hat” approaches, which are offered by hundreds of consulting firms and are legitimate ways to increase a site’s visibility. Penney’s results were derived from methods on the wrong side of that line, says Mr. Pierce. He described the optimization as the most ambitious attempt to game Google’s search results that he has ever seen.

“Actually, it’s the most ambitious attempt I’ve ever heard of,” he said. “This whole thing just blew me away. Especially for such a major brand. You’d think they would have people around them that would know better.”

TO understand the strategy that kept J. C. Penney in the pole position for so many searches, you need to know how Web sites rise to the top of Google’s results. We’re talking, to be clear, about the “organic” results — in other words, the ones that are not paid advertisements. In deriving organic results, Google’s algorithm takes into account dozens of criteria, many of which the company will not discuss.

But it has described one crucial factor in detail: links from one site to another.

If you own a Web site, for instance, about Chinese cooking, your site’s Google ranking will improve as other sites link to it. The more links to your site, especially those from other Chinese cooking-related sites, the higher your ranking. In a way, what Google is measuring is your site’s popularity by polling the best-informed online fans of Chinese cooking and counting their links to your site as votes of approval.

But even links that have nothing to do with Chinese cooking can bolster your profile if your site is barnacled with enough of them. And here’s where the strategy that aided Penney comes in. Someone paid to have thousands of links placed on hundreds of sites scattered around the Web, all of which lead directly to JCPenney.com.

Who is that someone? A spokeswoman for J. C. Penney, Darcie Brossart, says it was not Penney.

“J. C. Penney did not authorize, and we were not involved with or aware of, the posting of the links that you sent to us, as it is against our natural search policies,” Ms. Brossart wrote in an e-mail. She added, “We are working to have the links taken down.”

The links do not bear any fingerprints, but nothing else about them was particularly subtle. Using an online tool called Open Site Explorer, Mr. Pierce found 2,015 pages with phrases like “casual dresses,” “evening dresses,” “little black dress” or “cocktail dress.” Click on any of these phrases on any of these 2,015 pages, and you are bounced directly to the main page for dresses on JCPenney.com.

Some of the 2,015 pages are on sites related, at least nominally, to clothing. But most are not. The phrase “black dresses” and a Penney link were tacked to the bottom of a site called nuclear.engineeringaddict.com. “Evening dresses” appeared on a site called casino-focus.com. “Cocktail dresses” showed up on bulgariapropertyportal.com. ”Casual dresses” was on a site called elistofbanks.com. “Semi-formal dresses” was pasted, rather incongruously, on usclettermen.org.

There are links to JCPenney.com’s dresses page on sites about diseases, cameras, cars, dogs, aluminum sheets, travel, snoring, diamond drills, bathroom tiles, hotel furniture, online games, commodities, fishing, Adobe Flash, glass shower doors, jokes and dentists — and the list goes on.

Some of these sites seem all but abandoned, except for the links. The greeting at myflhomebuyer.com sounds like the saddest fortune cookie ever: “Sorry, but you are looking for something that isn’t here.”

When you read the enormous list of sites with Penney links, the landscape of the Internet acquires a whole new topography. It starts to seem like a city with a few familiar, well-kept buildings, surrounded by millions of hovels kept upright for no purpose other than the ads that are painted on their walls.

Exploiting those hovels for links is a Google no-no. The company’s guidelines warn against using tricks to improve search engine rankings, including what it refers to as “link schemes.” The penalty for getting caught is a pair of virtual concrete shoes: the company sinks in Google’s results.

Often drastically. In 2006, Google announced that it had caught BMW using a black-hat strategy to bolster the company’s German Web site, BMW.de. That site was temporarily given what the BBC at the time called “the death penalty,” stating that it was “removed from search results.”

BMW acknowledged that it had set up “doorway pages,” which exist just to attract search engines and then redirect traffic to a different site. The company at the time said it had no intention of deceiving users, adding “if Google says all doorway pages are illegal, we have to take this into consideration.”

J. C. Penney, it seems, will not suffer the same fate. But starting Wednesday, it was the subject of what Google calls “corrective action.”

Last week, The Times sent Google the evidence it had collected about the links to JCPenney.com. Google promptly set up an interview with Matt Cutts, the head of the Webspam team at Google, and a man whose every speech, blog post and Twitter update is parsed like papal encyclicals by players in the search engine world.

“I can confirm that this violates our guidelines,” said Mr. Cutts during an hourlong interview on Wednesday, after looking at a list of paid links to JCPenney.com.

He said Google had detected previous guidelines violations related to JCPenney.com on three occasions, most recently last November. Each time, steps were taken that reduced Penney’s search results — Mr. Cutts avoids the word “punished” — but Google did not later “circle back” to the company to see if it was still breaking the rules, he said.

He and his team had missed this recent campaign of paid links, which he said had been up and running for the last three to four months.

“Do I wish our system had detected things sooner? I do,” he said. “But given the one billion queries that Google handles each day, I think we do an amazing job.”

Mr. Cutts sounded remarkably upbeat and unperturbed during this conversation, which was a surprise given that we were discussing a large, sustained effort to snooker his employer. Asked about his zenlike calm, he said the company strives not to act out of anger. You get the sense that Mr. Cutts and his colleagues are acutely aware of the singular power they wield as judge, jury and appeals panel, and they’re eager to project an air of maturity and judiciousness.

That said, he added, “I don’t think I could do my job well if in some sense I was not offended by things that were bad for Google users.”

“Am I happy this happened?” he later asked. “Absolutely not. Is Google going to take strong corrective action? We absolutely will.”

And the company did. On Wednesday evening, Google began what it calls a “manual action” against Penney, essentially demotions specifically aimed at the company.

At 7 p.m. Eastern time on Wednesday, J. C. Penney was still the No. 1 result for “Samsonite carry on luggage.”

Two hours later, it was at No. 71.

At 7 p.m. on Wednesday, Penney was No. 1 in searches for “living room furniture.”

By 9 p.m., it had sunk to No. 68.

In other words, one moment Penney was the most visible online destination for living room furniture in the country.

The next it was essentially buried.

PENNEY reacted to this instant reversal of fortune by, among other things, firing its search engine consulting firm, SearchDex. Executives there did not return e-mail or phone calls.

Penney also issued a statement: “We are disappointed that Google has reduced our rankings due to this matter,” Ms. Brossart wrote, “but we will continue to work actively to retain our high natural search position.”

She added that while the collection of links surely brought in additional revenue, it was hardly a bonanza. Just 7 percent of JCPenney.com’s traffic comes from clicks on organic search results, she wrote. A far bigger source of profits this holiday season, she stated, came from partnerships with companies like Yahoo and Time Warner, from new mobile applications and from in-store kiosks.

Search experts, however, say Penney likely reaped substantial rewards from the paid links. If you think of Google as the entrance to the planet’s largest shopping center, the links helped Penney appear as though it was the first and most inviting spot in the mall, to millions and millions of online shoppers.

How valuable was that? A study last May by Daniel Ruby of Chitika, an online advertising network of 100,000 sites, found that, on average, 34 percent of Google’s traffic went to the No. 1 result, about twice the percentage that went to No. 2.

The Keyword Estimator at Google puts the number of searches for “dresses” in the United States at 11.1 million a month, an average based on 12 months of data. So for “dresses” alone, Penney may have been attracting roughly 3.8 million visits every month it showed up as No. 1. Exactly how many of those visits translate into sales, and the size of each sale, only Penney would know.

But in January, the company was crowing about its online holiday sales. Kate Coultas, a company spokeswoman, wrote to a reporter in January, “Internet sales through jcp.com posted strong growth in December, with significant increases in traffic and orders for the key holiday shopping periods of the week after Thanksgiving and the week before Christmas.”

There was considerable pressure from investors for Penney to deliver strong holiday results. It has been struggling through one of the more trying times of its century of retailing. The $17.8 billion in revenue it reported last year is the exact same figure it reported in 2001. It announced in January that it would close a handful of underperforming stores, as well as two of its five call centers and 19 outlets that sell excess catalog merchandise.

Adding to the company’s woes is the demise of its catalog business. Penney has phased out what it called its Big Book and poured money into its Web site. But so far, the loss of the catalog has not been offset by the expansion of the Web site. At its peak, the catalog brought in about $4 billion in revenue. In 2009, the site brought in $1.5 billion.

“For the last 35 years, Penney has tried to be accepted as a department store, and during unusually good times, it does very well,” said Bernard Sosnick, an analyst at Gilford Securities. “But in bad times, it gets punished by shoppers who pull back after having spent aspirationally.”

MANY owners of Web sites with Penney links seem to relish their unreachability. But there were exceptions, and they included cocaman.ch. (“Geekness — closer to the world” is the cryptic header atop the site.) It turned out to be owned and run by Corsin Camichel, a chatty 25-year-old I.T. security analyst in Switzerland.

The word “dresses” appears in a small collection of links in the middle of a largely blank Cocaman page. Asked about that link, Mr. Camichel said his records show that it turned up on his site last April, though he said it might have been earlier than that.

The link came through a Web site, TNX.net, which pays Mr. Camichel with TNX points, which he then trades for links that drive traffic to his other sites, like cookingutensils.net. He earns money when people visit that site and click on the ads. He could also, he said, get cash from TNX. Currently, Cocaman is home to 403 links, all of them placed there by TNX on behalf of clients.

“You do pretty well,” he wrote, referring to income from his links trading. “The thing is, the more you invest (time and money) the better results you get. Right now I get enough to buy myself new test devices for my Android apps (like $150/month) with zero effort. I have to do nothing. Ads just sit there and if people click, I make money.”

Efforts to reach TNX itself last week via e-mail were not successful.

Interviewing a purveyor of black-hat services face-to-face was a considerable undertaking. They are a low-profile bunch. But a link-selling specialist named Mark Stevens — who says he had nothing to do with the Penney link effort — agreed to chat. He did so on the condition that his company not be named, a precaution he justified by recounting what happened when the company apparently angered Google a few months ago.

“It was my fault,” Mr. Stevens said. “I posted a job opening on a Stanford Engineering alumni mailing list, and mentioned the name of our company and a brief description of what we do. I think some Google employees saw it.”

In a matter of days, the company could not be found in a Google search.

“Literally, you typed the name of the company into the search box and we did not turn up. Anywhere. You’d find us if you knew our Web address. But in terms of search, we just disappeared.”

The company now operates under a new name and with a profile that is low even in the building where it claims to have an office. The landlord at the building, a gleaming, glassy midrise next to Route 101 in Redwood City, Calif., said she had never heard of the company.

Mr. Stevens agreed to meet in mid-January for a dinner paid for by The Times. Asked to pick a “fine restaurant” in his neighborhood, he rather cheekily selected a modern French bistro in Palo Alto offering an eight-course prix fixe meal for $118. Liquid nitrogen and “fairy tale pumpkin” were two of the featured ingredients.

Mr. Stevens turned out to be a boyish-looking 31-year-old native of Singapore. (Stevens is the name he uses for work; he says he has a Chinese last name, which he did not share.) He speaks with a slight accent and in an animated hush, like a man worried about eavesdroppers. He describes his works with the delighted, mischievous grin of a sophomore who just hid a stink bomb.

“The key is to roll the campaign out slowly,” he said as he nibbled at seared duck foie gras. “A lot of companies are in a rush. They want as many links as we can get them as fast as possible. But Google will spot that. It will flag a Web site that goes from zero links to a few hundred in a week.”

The hardest part about the link-selling business, he explained, is signing up deep-pocketed mainstream clients. Lots of them, it seems, are afraid they’ll get caught. Another difficulty is finding quality sites to post links. Whoever set up the JCPenney.com campaign, he said, relied on some really low-rent, spammy sites — the kind with low PageRanks, as Google calls its patented measure of a site’s quality. The higher the PageRank, the more “Google juice” a site offers others to which it is linked.

“The sites that TNX uses mostly have low PageRanks,” Mr. Stevens said.

Mr. Stevens said that Web site owners, or publishers, as he calls them, get a small fee for each link, and the transaction is handled entirely over the Web.

Publishers can reject certain keywords and links — Mr. Stevens said some balked at a lingerie link — but for the most part the system is on a kind of autopilot. A client pays Mr. Stevens and his colleagues for links, which are then farmed out to Web sites. Payment to publishers is handled via PayPal.

You might expect Mr. Stevens to have a certain amount of contempt for Google, given that he spends his professional life finding ways to subvert it. But through the evening he mentioned a few times that he’s in awe of the company, and the quality of its search engine.

So how does he justify all his efforts to undermine that engine?

“I think we need to make a distinction between two different kinds of searches — informational and commercial,” he said. “If you search ‘cancer,’ that’s an informational search and on those, Google is amazing. But in commercial searches, Google’s results are really polluted. My own personal experience says that the guy with the biggest S.E.O. budget always ranks the highest.”

To Mr. Stevens, S.E.O. is a game, and if you’re not paying black hats, you are losing to rivals with fewer compunctions.

WHY did Google fail to catch a campaign that had been under way for months? One, no less, that benefited a company that Google had already taken action against three times? And one that relied on a collection of Web sites that were not exactly hiding their spamminess?

Mr. Cutts emphasized that there are 200 million domain names and a mere 24,000 employees at Google.

“Spammers never stop,” he said. Battling those spammers is a never-ending job, and one that he believes Google keeps getting better and better at.

Here’s another hypothesis, this one for the conspiracy-minded. Last year, Advertising Age obtained a Google document that listed some of its largest advertisers, including AT&T, eBay and yes, J. C. Penney. The company, this document said, spent $2.46 million a month on paid Google search ads — the kind you see next to organic results.

Is it possible that Google was willing to countenance an extensive black-hat campaign because it helped one of its larger advertisers? It’s the sort of question that European Union officials are now studying in an investigation of possible antitrust abuses by Google.

Investigators have been asking advertisers in Europe questions like this: “Please explain whether and, if yes, to what extent your advertising spending with Google has ever had an influence on your ranking in Google’s natural search.” And: “Has Google ever mentioned to you that increasing your advertising spending could improve your ranking in Google’s natural search?”

Asked if Penney received any breaks because of the money it has spent on ads, Mr. Cutts said, “I’ll give a categorical denial.” He then made an impassioned case for Google’s commitment to separating the money side of the business from the search side. The former has zero influence on the latter, he said.

“If you asked me for the names of five people in advertising engineering, I don’t think I could give you the names,” he said. “There is a very long history at Google of saying ‘We are not going to worry about short-term revenue.’ ” He added: “We rely on the trust of our users. We realize the responsibility that we have to our users.”

He noted, too, that before The Times presented evidence of the paid links to JCPenney.com, Google had just begun to roll out an algorithm change that had a negative effect on Penney’s search results. (The tweak affected “how we trust links,” Mr. Cutts said, declining to elaborate.)

True, JCPenney.com’s showing in Google searches had declined slightly by Feb. 8, as the algorithm change began to take effect. In “comforter sets,” Penney went from No. 1 to No. 7. In “sweater dresses,” from No. 1 to No. 10.

But the real damage to Penney’s results began when Google started that “manual action.” The decline can be charted: On Feb. 1, the average Penney position for 59 search terms was 1.3.

On Feb. 8, when the algorithm was changing, it was 4.

By Feb. 10, it was 52.

MR. CUTTS said he did not plan to write about Penney’s situation, as he did with BMW in 2006. Rarely, he explained, does he single out a company publicly, because Google’s goal is to preserve the integrity of results, not to embarrass people.

“But just because we don’t talk about it,” he said, “doesn’t mean we won’t take strong action.”

    The Dirty Little Secrets of Search, NYT, 12.2.2011, http://www.nytimes.com/2011/02/13/business/13search.html

 

 

 

 

 

Syria Restores Access to Facebook and YouTube

 

February 9, 2011
The New York Times
By JENNIFER PRESTON

 

The Syrian government began allowing its citizens Wednesday to openly use Facebook and YouTube, three years after blocking access to Facebook and other sites as part of a crackdown on political activism. Human rights advocates greeted the news guardedly, warning that the government might have lifted the ban to more closely monitor people and activity on social networking sites.

The move comes just weeks after human rights activists in Egypt used Facebook and other social media tools to help mobilize tens of thousands of people for antigovernment protests. Activists in Tunisia used the Internet in December and January to help amass support for the protests and revolt that toppled the government of Zine el-Abidine Ben Ali.

After the mass demonstrations began in Egypt, opposition groups in Syria created a Facebook page called the Syrian Revolution and started a Twitter campaign calling on people to join “day of rage” rallies last week against President Bashar Assad. But the effort, which has generated more than 16,000 Facebook members, did not produce the street protesters that organizers had hoped for.

Despite the ban, many Syrians had been able to use Facebook and other aspects of the Web restricted by the government through proxy servers that allowed people to circumvent the Syrian government’s firewall, which also blocks Wikipedia, Amazon, Blogspot and Israeli newspapers, among other sites.

Posts on the wall on Wednesday reflected a variety of opinions, including reminders for people to be careful about what they post to bold proclamations that the page would help spur change. “We’re going to launch a fearless attack,” one user wrote on the Syrian Revolution Facebook page wall. “Link to us on all pages so that all Syrians can see this. Think. Initiate. Decide, do and have faith in God.”

Syria’s decision was welcomed by officials from the State Department with a note of caution, given the country’s restrictions on the freedom of speech and freedom to assemble.

“We welcome any positive steps taken to create a more open Internet, but absent the freedoms of expression and association, citizens should understand the risks,” said Alec J. Ross, senior adviser for innovation to Secretary of State Hillary Rodham Clinton, who helped organize a delegation of business leaders from technology companies to meet with Mr. Assad in Syria last year. In those meetings, the business leaders said that opening the Web would be important to drive innovation.

Susannah Vila, director of content and outreach for Movements.org, said she believed that the government in Syria, in releasing controls on the Internet, was trying to make it appear as if it were making democratic concessions after the tumult in Egypt and Tunisia.

“While access to social media sites presents an opportunity for Syrians to better mobilize one another, it also makes it easier for the government to identify activists and quash protests,” said Ms. Vila, of the New York City-based organization that began in 2008 with the mission to help support advocates and activists using technology. Ms. Vila said there was growing concern that the government of Sudan was closely monitoring Facebook users there after lifting restrictions.

Abdulsalam Haykal, a leading Syrian technology entrepreneur, praised the Syrian government’s decision as a reflection of a commitment to build confidence with the country’s young people. “The power of social media is an important tool for increasing participation, especially by engaging young people,” he said.

Under Facebook’s terms of service, users are required to use their real identities and not hide behind false or anonymous accounts, a violation that can lead to Facebook’s closing an account.

Debbie Frost, a spokeswoman for Facebook, said Wednesday that the company was not considering changing or re-examining its terms of service in those countries where some users were concerned about revealing their full identity for security reasons.

“Facebook has always been based on a real-name culture,” she said. “This leads to greater accountability and a safer and more trusted environment for our users. It’s a violation of our policies to use a fake name or operate under a false identity.” Ms. Frost said the company provided multiple options for users to communicate privately through groups and to read updates on a Facebook page without having to sign up for it.

Ms. Frost said that the company had always seen some traffic for Syria, but not the number of Facebook users typical in a country, like Syria, with high Internet usage. She said the company did not see significant changes in traffic Wednesday. Syrian technology companies reported that it could take hours or days for people to get full access.

A spokesperson for YouTube declined to comment on the lifting of the ban, but pointed to Google’s Transparency report, which shows a jump in traffic to YouTube.com from Syria.

According to D-Press, a pro-government Syrian Web site, there are about 200,000 Syrians currently using Facebook.

    Syria Restores Access to Facebook and YouTube, NYT, 9.2.2011, http://www.nytimes.com/2011/02/10/world/middleeast/10syria.html

 

 

 

 

 

TV Interview of Protest Leader Revives Crowd in Cairo Square

 

February 8, 2011
The New York Times
By DAVID D. KIRKPATRICK, KAREEM FAHIM and ALAN COWELL

 

CAIRO — Several thousand demonstrators marched on the Egyptian Parliament for the first time and masses crammed into Tahrir Square on Tuesday to demand the ouster of President Hosni Mubarak in a revolt buoyed by the broadcast of an emotional television interview with a young Google executive conducted hours after his release from secret detention.

The executive, Wael Ghonim, had been a quiet force behind the YouTube and Facebook promotion of the protests, but became a symbol after he disappeared nearly two weeks ago. On Monday night, he became an instant icon when the interview was broadcast on an Egyptian satellite channel, telling his story of detention and continued hope for change that resonated deeply with the demonstrators’ demands for more fundamental shifts and their outrage over repression.

In the interview, Mr. Ghonim wept over the death toll from clashes with the government. “We were all down there for peaceful demonstrations,” he said, asking that he not be made a hero. “The heroes were the ones on the street.”

On Tuesday afternoon, Mr. Ghonim galvanized Tahrir Square, briefly joining the tens of thousands of chanting protesters there. “We will not abandon our demand, and that is the departure of the regime,” he told the crowd, which roared its agreement, The Associated Press reported.

State television responded Tuesday with an appearance by Vice President Omar Suleiman offering placating messages of respect and reform that Mr. Suleiman said came from Mr. Mubarak himself.

“The youth of Egypt deserve national appreciation,” Mr. Suleiman quoted the president as saying in a statement. “He gave orders to abstain from prosecuting them and forfeiting their rights to freedom of expression.”

Mr. Mubarak named the panel that will recommend constitutional amendments, and endorsed other moves to create a timetable for a “peaceful and organized transfer of power,” Mr. Suleiman said. Another panel will begin work to progress on other measures Mr. Suleiman announced after meeting with opposition members on Sunday.

The president “welcomed this national reconciliation,” Mr. Suleiman said, “assuring that it puts our feet at the beginning of the right path to get out of the current crisis.”

After demonstrating an ability to bring hundreds of thousands to downtown Cairo, protest organizers have sought this week to broaden their movement, acknowledging that simple numbers are not enough to force Mr. Mubarak’s departure. The government — by trying to divide the opposition, offering limited concessions and remaining patient — appears to believe it can weather the biggest challenge to its rule.

But protesters continued to demand Mr. Mubarak’s ouster and deep change. Some handed out spoof copies of the official Al Ahram newspaper with the headline: “From the people of Tahrir, Mubarak must go.” Substantial protests were seen in Alexandria, as well.

While some demonstrators had urged a general strike on Tuesday, there was little indication that the call had been heeded, or widely broadcast, in the capital, where many people live from day to day on low wages. An Egyptian state newspaper, Al Ahram, acknowledged scattered reports of walk-outs in Suez and other cities, including a sit-in by as many as 6,000 workers from the Suez Canal Authority.

Momentum has seemed to shift by the day in a climactic struggle over what kind of change Egypt will undergo and whether Egyptian officials are sincere about delivering it. In a sign of the tension, American officials described as “unacceptable” statements by Mr. Suleiman that the country was not ready for democracy, but showed no sign that they had shifted away from supporting him, a man widely viewed here as an heir to Mr. Mubarak.

Underscoring the government’s perspective that it has already offered what the protesters demanded, Naguib Sawiris, a wealthy businessman who has sought to act as a mediator, said: “Tahrir is underestimating their victory. They should declare victory.”

Normalcy had begun returning to parts of Cairo on Monday. Chronic traffic jams resumed as the city adapted to both the sprawling protests in Tahrir Square, a landmark of downtown Cairo, and the tanks, armored personnel carriers and soldiers out in the streets. People lined up at banks and returned to shops.

The government has sought to cultivate that image of the ordinary, mobilizing its newspapers and television to insist that it was re-exerting control over the capital after its police force utterly collapsed on Jan. 28. The cabinet on Monday held its first formal meeting since Mr. Mubarak reorganized it after the protests.

Officials announced that the stock market, whose index fell nearly 20 percent in two days of protests, would reopen Sunday and that six million government employees would receive a 15 percent raise, which the new finance minister, Samir Radwan, said would take effect in April.

The raise mirrored moves in Kuwait and Jordan to raise salaries or provide grants to stanch anger over rising prices across the Middle East, shaken with the repercussions of Egypt’s uprising and the earlier revolt in Tunisia. In Iraq, Prime Minister Nuri Kamal al-Maliki said Friday he would cut in half his salary, believed to be $350,000, amid anger there over dreary government services.

As in the past the government here has swerved between crackdown and modest moves of conciliation.

Human Rights Watch calculated that at least 297 people have died in the protests since Jan. 28, including 232 in Cairo, 52 in Alexandria and 13 in Suez. The majority of those deaths occurred on Jan. 28 and 29 as a result of live gunfire, the group reported, relying on hospital lists and interviews with doctors.

In one harrowing raid, the government arrested 30 human rights activists, but released them by Sunday morning. In past years the government has managed to at least make its version of events the dominant narrative, but in the outpouring of dissent here that is no longer the case. Fighting still flared in the Sinai Peninsula, where Bedouins, long treated as second-class citizens, have fought Egyptian security forces for weeks.


David D. Kirkpatrick and Kareem Fahim reported from Cairo and Alan Cowell from Paris. Anthony Shadid, Mona el-Naggar, Thanassis Cambanis and Liam Stack contributed reporting in Cairo.

    TV Interview of Protest Leader Revives Crowd in Cairo Square, NYT, 8.2.2011, http://www.nytimes.com/2011/02/09/world/middleeast/09egypt.html

 

 

 

 

 

Google Executive Who Was Jailed Said He Was Part of Facebook Campaign in Egypt

 

February 7, 2011
The New York Times
By DAVID D. KIRKPATRICK and JENNIFER PRESTON

 

CAIRO — In a tearful, riveting live television interview only two hours after his release from an Egyptian prison, the Google executive Wael Ghonim acknowledged Monday that he was one of the people behind the anonymous Facebook and YouTube campaign that helped galvanize the protest that has shaken Egypt for the last two weeks.

Since he disappeared on Jan. 28, Mr. Ghonim, 30, has emerged as a symbol for the protest movement’s young, digital-savvy organizers. During the interview on a popular television show, he said he had been kidnapped and held blindfolded by Egyptian authorities.

Afterward, hundreds of Egyptians took to Twitter and the Internet, calling on him to become one of their new leaders.

“Please do not make me a hero,” Mr. Ghonim said in a voice trembling with emotion, and later completely breaking down when told of the hundreds of people who have died in clashes since the Jan. 25 protests began. “I want to express my condolences for all the Egyptians who died.”

“We were all down there for peaceful demonstrations,” he added. “The heroes were the ones on the street.”

Mr. Ghonim rejected the government’s assertions that the protests had been instigated by foreigners or the Muslim Brotherhood, the banned Islamist opposition group. “There was no Muslim Brotherhood presence in organizing these protests,” he said. “It was all spontaneous, voluntary. Even when the Muslim Brotherhood decided to take part it was their choice to do so. This belongs to the Egyptian youth.”

The release of Mr. Ghonim, who oversees marketing efforts for Google in the Middle East and North Africa, comes as the government is trying to portray Egypt as returning to business as usual. But in the interview, Mr. Ghonim described the experience of what he called his extralegal “kidnapping” and imprisonment to rally the public to continue their protests. “It is a crime,” he said, “This is what we are fighting.”

Ending the mystery over who helped begin the social media campaign that inspired the protests, Mr. Ghonim said that he was a creator of the We are All Khaled Said Facebook page. That page and multiple videos uploaded on YouTube about Mr. Said, a 28-year-old Egyptian man beaten to death by the police in Alexandria on June 6, 2010, helped to connect human rights organizers with average Egyptians and to raise awareness about police abuse and torture.

Mr. Ghonim, an Egyptian who lives in Dubai with his wife and two children, was not well known outside of technology and business circles in Egypt. But his disappearance, followed by his interview Monday night on the same program where the Nobel laureate and diplomat Mohamed ElBaradei plunged into Egyptian politics a year ago, appeared to have quickly turned him into a national celebrity.

Mr. Ghonim, who came across as both humble and fearless, said he was grabbed by security police officers while getting into a taxi and then taken to a location where he was detained for 12 days, blindfolded the entire time. He said that he was deeply worried that his family did not know where he was. He said he was not physically harmed.

The first word of his release came when he posted this sentence in English on his Twitter account at 7:05 p.m.:

“Freedom is a bless that deserves fighting for it.”

Google then confirmed the news. “It is a huge relief that Wael Ghonim has been released,” the company said in a message posted on Twitter and then released in an e-mail. “We send our best wishes to him and his family.”

Since last June, the Khaled Said Facebook page has attracted more than 473,000 members and has become a tool not only for organizing the protests but also for providing regular updates about other cases of police abuse. But the page’s creator remained a mystery.

“We did not know who he was,” said Aida Seif el-Dawla, a human rights advocate and professor of psychiatry who works with El Nadeem Center for Rehabilitation of Victims of Violence and Torture in Cairo. The center became involved in Mr. Said’s case last June after police officials presented autopsy reports saying that he died of asphyxiation from swallowing drugs rather than the brutal beating witnessed by several people.

She said many young people identified with Mr. Said and were outraged by his death and how the police had handled it. She said that there were many Facebook pages, but that it was the page that Mr. Ghonim started that gained momentum.

“It was the most popular,” she said. “It gave a space for the young people to interact with each other and to plan together.”

The Facebook page published cellphone photographs from the morgue showing the horrific injuries Mr. Said had suffered, YouTube videos contrasting his smiling face with the morgue photos and witness accounts that disputed the initial Egyptian police version of his death. The information helped lead to prosecutors arresting two police officers in connection with Mr. Said’s death. It also prompted Facebook members to attend both street and silent protests several times since last June.

In addition to his work at Google, Mr. Ghonim had served as a technology consultant for Mr. ElBaradei’s pro-democracy campaign.

Before his family lost contact with him, Mr. Ghonim had posted an ominous message on Twitter that troubled friends and family, raising concerns about his whereabouts: “Pray for #Egypt. Very worried as it seems that government is planning a war crime tomorrow against people. We are all ready to die #Jan25.”

While friends and family searched hospitals in the area for him, several human rights activists became convinced that he was being held by the authorities for his role in the social media efforts and for inspiring some of the young protest organizers to use those media to help promote the protests.

Last Friday, members of the April 6 Youth Movement Facebook page, a group of young advocates who began using Facebook in early 2008 to raise awareness about labor strikes and human rights abuses, announced that they had designated Mr. Ghonim their spokesman.

Habib Haddad, a Boston-based businessman and a friend of Mr. Ghonim’s, said he spoke to Mr. Ghonim’s wife after her husband’s release on Monday. “Not sure I ever heard someone that happy and emotional,” Mr. Haddad posted on his Twitter account.

Mr. Ghonim was among many in Egypt who have disappeared during the revolt.

“At this point, Wael has become a symbolic figure,” said Mr. Haddad. “Moving forward, it is going to be his personal decision if he were to embrace this symbolic figure or not. As a friend, I care mostly about his personal safety and his family’s safety.”


David D. Kirkpatrick reported from Cairo, and Jennifer Preston from New York. Mona El-Naggar contributed reporting from Cairo, and Christine Hauser from New York.

    Google Executive Who Was Jailed Said He Was Part of Facebook Campaign in Egypt, NYT, 7.2.2011, http://www.nytimes.com/2011/02/08/world/middleeast/08google.html

 

 

 

 

 

China, Twitter and 20-Year-Olds vs. the Pyramids

 

February 5, 2011
The New York Times
By THOMAS L. FRIEDMAN

 

Amman, Jordan

Anyone who’s long followed the Middle East knows that the six most dangerous words after any cataclysmic event in this region are: “Things will never be the same.” After all, this region absorbed the fall of the Berlin Wall and the rise of Google without a ripple.

But traveling through Israel, the West Bank and Jordan to measure the shock waves from Egypt, I’m convinced that the forces that were upholding the status quo here for so long — oil, autocracy, the distraction of Israel, and a fear of the chaos that could come with change — have finally met an engine of change that is even more powerful: China, Twitter and 20-year-olds.

Of course, China per se is not fueling the revolt here — but China and the whole Asian-led developing world’s rising consumption of meat, corn, sugar, wheat and oil certainly is. The rise in food and gasoline prices that slammed into this region in the last six months clearly sharpened discontent with the illegitimate regimes — particularly among the young, poor and unemployed.

This is why every government out here is now rushing to increase subsidies and boost wages — even without knowing how to pay for it, or worse, taking it from capital budgets to build schools and infrastructure. King Abdullah II of Jordan just gave every soldier and civil servant a $30-a-month pay raise, along with new food and gasoline subsidies. Kuwait’s government last week announced a “gift” of about $3,500 to each of Kuwait’s 1.1 million citizens and about $850 million in food subsidies.

But China is a challenge for Egypt and Jordan in other ways. Several years ago, I wrote about Egyptian entrepreneurs who were importing traditional lanterns for Ramadan — with microchips in them that played Egyptian folk songs — from China. When China can make Egyptian Ramadan toys more cheaply and appealingly than low-wage Egyptians, you know there is problem of competitiveness.

Egypt, Jordan, Yemen, Tunisia today are overflowing with the most frustrated cohort in the world — “the educated unemployables.” They have college degrees on paper but really don’t have the skills to make them globally competitive. I was just in Singapore. Its government is obsessed with things as small as how to better teach fractions to third graders. That has not been Hosni Mubarak’s obsession.

I look at the young protesters who gathered in downtown Amman today, and the thousands who gathered in Egypt and Tunis, and my heart aches for them. So much human potential, but they have no idea how far behind they are — or maybe they do and that’s why they’re revolting. Egypt’s government has wasted the last 30 years — i.e., their whole lives — plying them with the soft bigotry of low expectations: “Be patient. Egypt moves at its own pace, like the Nile.” Well, great. Singapore also moves at its own pace, like the Internet.

The Arab world has 100 million young people today between the ages of 15 and 29, many of them males who do not have the education to get a good job, buy an apartment and get married. That is trouble. Add in rising food prices, and the diffusion of Twitter, Facebook and texting, which finally gives them a voice to talk back to their leaders and directly to each other, and you have a very powerful change engine.

I have not been to Jordan for a while, but my ears are ringing today with complaints about corruption, frustration with the king and queen, and disgust at the enormous gaps between rich and poor. King Abdullah, who sacked his cabinet last week and promised real reform and real political parties, has his work cut out for him. And given some of the blogs that my friends here have shared with me from the biggest local Web site, Ammonnews.net, the people are not going to settle for the same-old, same-old. They say so directly now, dropping the old pretense of signing antigovernment blog posts as “Mohammed living in Sweden.”

Jordan is not going to blow up — today. The country is balanced between East Bank Bedouin tribes and West Bank Palestinians, who fought a civil war in 1970. “There is no way that the East Bankers would join with the Palestinians to topple the Hashemite monarchy,” a retired Jordanian general remarked to me. But this balance also makes reform difficult. The East Bankers overwhelmingly staff the army and government jobs. They prefer the welfare state, and hate both “privatization” and what they call “the digitals,” the young Jordanian techies pushing for reform. The Palestinians dominate commerce but also greatly value the stability the Hashemite monarchy provides.

Egypt was definitely a wake-up call for Jordan’s monarchy. The king’s challenge going forward is to convince his people that “their voices are going to be louder in the voting booth than in the street,” said Salah Eddin al-Bashir, a member of Jordan’s Senate.

As for Cairo, I think the real story in Egypt today is the 1952 revolution, led from the top by the military, versus the 2011 revolution, led from below by the people. The Egyptian Army has become a huge patronage system, with business interests and vast perks for its leaders. For Egypt to have a happy ending, the army has to give up some of its power and set up a fair political transition process that gives the Egyptian center the space to build precisely what Mubarak refused to permit — legitimate, independent, modernizing, secular parties — that can compete in free elections against the Muslim Brotherhood, now the only authentic party.

If that happens, I am not the least bit worried about the Muslim Brotherhoods in Jordan or Egypt hijacking the future. Actually, they should be worried. The Brotherhoods have had it easy in a way. They had no legitimate secular political opponents. The regimes prevented that so they could tell the world it is either “us or the Islamists.” As a result, I think, the Islamists have gotten intellectually lazy. All they had to say was “Islam is the answer” or “Hosni Mubarak is a Zionist” and they could win 20 percent of the vote. Now, if Egypt and Jordan can build a new politics, the Muslim Brotherhood will, for the first time, have real competition from the moderate center in both countries — and they know it.

“If leaders don’t think in new ways, there are vacancies for them in museums,” said Zaki Bani Rsheid, political director of Jordan’s Islamic Action Front, the Muslim Brotherhood’s political arm. When I asked Rsheid if his own party was up for this competition, he stopped speaking in Arabic and said to me in English, with a little twinkle in his eye: “Yes we can.”

I hope so, and I also hope that events in Egypt and Jordan finally create a chance for legitimate modern Arab democratic parties to test him.

    China, Twitter and 20-Year-Olds vs. the Pyramids, NYT, 5.2.2011, http://www.nytimes.com/2011/02/06/opinion/06friedman.html

 

 

 

 

 

Hackers Gained Access to Nasdaq Systems, but Not Trades

 

February 5, 2011
The New York Times
By GRAHAM BOWLEY

 

Computer hackers have repeatedly breached the systems of the company that runs the Nasdaq stock exchange in New York but did not penetrate the part of the system that handles trades, according to several law enforcement officials.

An investigation into the breach is being carried out jointly by officials in New York for the F.B.I. and Department of Justice, with assistance from computer crimes specialists, according to two law enforcement officials. One government official said the federal investigation has been going on for at least a couple of months.

The officials had knowledge of the case but were not authorized to speak publicly about it.

Nasdaq is one of the country’s largest stock exchanges, and where many of the nation’s most important companies list their stocks for trading. It is a crucial part of the country’s economic infrastructure, and any attempt to disrupt the workings of the exchange could have severe repercussions across the economy.

But market experts said there was an important distinction between the computer systems of the outside shell company, Nasdaq OMX, which owns both the United States exchange and other exchanges in Europe, and the inner stand-alone computer network that runs the trading of shares.

The government official said that the investigation is limited to Nasdaq’s network and was not aware of any other stock exchanges being targeted.

Investigators are trying to work out who is behind the breaches and what their aim was — whether, for example, it was to cause disruption or profit commercially.

News of the breach was originally reported in The Wall Street Journal.

A spokesman for Nasdaq could not provide immediate comment on the investigation.

Up until a few decades ago, trading in the United States was dominated by the New York Stock Exchange on Wall Street, but trading has fragmented in recent years across a number of new electronic exchanges. Nasdaq pioneered electronic trading and has grown rapidly to rival the New York Stock Exchange.

Focusing at least initially on technology stocks, the Nasdaq includes Microsoft and Google among the companies that list their shares on its exchange. There is fierce competition between Nasdaq and the N.Y.S.E. for business. The N.Y.S.E. has also adopted more and more electronic trading. In the past five years or so, other electronic exchanges such as Direct Edge and BATS Exchange have grown up, intent on prying trading away from the two bigger markets.

It was unclear whether the investigation had also contacted other exchanges about possible breaches of their computer security.

In a statement, the New York Stock Exchange said: “We take any potential threat seriously and we continue working at the highest levels of security and integrity.” The exchange would not say whether there had been any attempts to breach its systems or whether it had been contacted by Federal investigators.

A spokesman for BATS Exchange said it had never had any issue of this kind.

A spokesman for Direct Edge, Rafi Reguer, said it was continually monitoring its systems but was not aware of any serious attempt to penetrate its computers.


Charlie Savage contributed reporting.

    Hackers Gained Access to Nasdaq Systems, but Not Trades, NYT, 5.2.2011, http://www.nytimes.com/2011/02/06/business/06nasdaq.html

 

 

 

 

 

Spotlight Again Falls on Web Tools and Change

 

January 29, 2011
The New York Times
By SCOTT SHANE

 

WASHINGTON — Fear is the dictator’s traditional tool for keeping the people in check. But by cutting off Egypt’s Internet and wireless service late last week in the face of huge street protests, President Hosni Mubarak betrayed his own fear — that Facebook, Twitter, laptops and smartphones could empower his opponents, expose his weakness to the world and topple his regime.

There was reason for Mr. Mubarak to be shaken. By many accounts, the new arsenal of social networking helped accelerate Tunisia’s revolution, driving the country’s ruler of 23 years, Zine el-Abidine Ben Ali, into ignominious exile and igniting a conflagration that has spread across the Arab world at breathtaking speed. It was an apt symbol that a dissident blogger with thousands of followers on Twitter, Slim Amamou, was catapulted in a matter of days from the interrogation chambers of Mr. Ben Ali’s regime to a new government post as minister for youth and sports. It was a marker of the uncertainty in Tunis that he had stepped down from the government by Thursday.

Tunisia’s uprising offers the latest encouragement for a comforting notion: that the same Web tools that so many Americans use to keep up with college pals and post passing thoughts have a more noble role as well, as a scourge of despotism. It was just 18 months ago, after all, that the same technologies were hailed as a factor in Iran’s Green Revolution, the stirring street protests that followed the disputed presidential election.

But since that revolt collapsed, Iran has become a cautionary tale. The Iranian police eagerly followed the electronic trails left by activists, which assisted them in making thousands of arrests in the crackdown that followed. The government even crowd-sourced its hunt for enemies, posting on the Web the photos of unidentified demonstrators and inviting Iranians to identify them.

“The Iranian government has become much more adept at using the Internet to go after activists,” said Faraz Sanei, who tracks Iran at Human Rights Watch. The Revolutionary Guard, the powerful political and economic force that protects the ayatollahs’ regime, has created an online surveillance center and is believed to be behind a “cyberarmy” of hackers that it can unleash against opponents, he said.

Repressive regimes around the world may have fallen behind their opponents in recent years in exploiting new technologies — not unexpected when aging autocrats face younger, more tech-savvy opponents. But in Minsk and Moscow, Tehran and Beijing, governments have begun to climb the steep learning curve and turn the new Internet tools to their own, antidemocratic purposes.

The countertrend has sparked a debate over whether the conventional wisdom that the Internet and social networking inherently tip the balance of power in favor of democracy is mistaken. A new book, “The Net Delusion: The Dark Side of Internet Freedom,” by a young Belarus-born American scholar, Evgeny Morozov, has made the case most provocatively, describing instance after instance of strongmen finding ways to use new media to their advantage.

After all, the very factors that have brought Facebook and similar sites such commercial success have huge appeal for a secret police force. A dissident’s social networking and Twitter feed is a handy guide to his political views, his career, his personal habits and his network of like-thinking allies, friends and family. A cybersurfing policeman can compile a dossier on a regime opponent without the trouble of the street surveillance and telephone tapping required in a pre-Net world.

If Mr. Mubarak’s Egypt has resorted to the traditional blunt instrument against dissent in a crisis — cutting off communications altogether — other countries have shown greater sophistication. In Belarus, officers of the K.G.B. — the secret police agency has preserved its Soviet-era name — now routinely quote activists’ comments on Facebook and other sites during interrogations, said Alexander Lukashuk, director of the Belarus service of Radio Free Europe/Radio Liberty. Last month, he said, investigators appearing at the apartment of a Belarusian photojournalist mocked her by declaring that since she had written online that they usually conducted their searches at night, they had decided to come in the morning.

In Syria, “Facebook is a great database for the government now,” said Ahed al-Hindi, a Syrian activist who was arrested at an Internet cafe in Damascus in 2006 and left his country after being released from jail. Mr. Hindi, now with the United States-based group CyberDissidents.org, said he believes that Facebook is doing more good than harm, helping activists form virtual organizations that could never survive if they met face to face. But users must be aware that they are speaking to their oppressors as well as their friends, he said.

Widney Brown, senior director of international law and policy at Amnesty International, said the popular networking services, like most technologies, are politically neutral.

“There’s nothing deterministic about these tools — Gutenberg’s press, or fax machines or Facebook,” Ms. Brown said. “They can be used to promote human rights or to undermine human rights.”

This is the point of Mr. Morozov, 26, a visiting scholar at Stanford. In “The Net Delusion,” he presents an answer to the “cyberutopians” who assume that the Internet inevitably fuels democracy. He coined the term “spinternet” to capture the spin applied to the Web by governments that are beginning to master it.

In China, Mr. Morozov said, thousands of commentators are trained and paid — hence their nickname, the 50-Cent Party — to post pro-government comments on the Web and steer online opinion away from criticism of the Communist Party. In Venezuela, President Hugo Chávez, after first denouncing hostile Twitter comments as “terrorism,” created his own Twitter feed — an entertaining mix of politics and self-promotion that now has 1.2 million followers.

In Russia, Mr. Morozov noted, Prime Minister Vladimir V. Putin has managed to co-opt several prominent new-media entrepreneurs, including Konstantin Rykov, whose many Web sites now skew strongly pro-Putin and whose anti-Georgia documentary about the Russia-Georgia war of 2008 went viral on the Web.

Mr. Morozov acknowledges that social networking “definitely helps protesters to mobilize.”

“But is it making protest more likely? I don’t think so.”

In Egypt, it appears, at least some activists share Mr. Morozov’s wariness about the double-edged nature of new media. An anonymous 26-page leaflet that appeared in Cairo with practical advice for demonstrators last week, The Guardian reported, instructed activists to pass it on by e-mail and photocopy — but not by Facebook and Twitter, because they were being monitored by the government.

Then Mr. Mubarak’s government, evidently concluding that it was too late for mere monitoring, unplugged his country from the Internet altogether. It was a desperate move from an autocrat who had not learned to harness the tools his opponents have embraced.


Scott Shane, a reporter in The Times’s Washington bureau, is the author of “Dismantling Utopia: How Information Ended the Soviet Union.”

    Spotlight Again Falls on Web Tools and Change, NYT, 29.1.2011, http://www.nytimes.com/2011/01/30/weekinreview/30shane.html

 

 

 

 

 

Egypt Cuts Off Most Internet and Cell Service

 

January 28, 2011
The New York Times
By MATT RICHTEL

 

Egypt has cut off nearly all Internet traffic into and out of the country in the largest blackout of its kind, according to firms that monitor international data flows.

Cellphone networks were also disrupted. Vodafone said in a statement on its Web site that “all mobile operators in Egypt have been instructed to suspend services in selected areas.” The company said it was “obliged to comply” with the order.

Egypt has been trying to contain growing protests that have been fueled in part by videos and other information shared over social networks like Facebook and Twitter.

Renesys, a Vermont-based company that tracks Internet traffic, said that just after midnight Cairo time, or 5 p.m. New York time, Egyptian authorities had succeeded in shutting down the country’s international access points.

“Almost nobody in Egypt has Internet connectivity, and there are no workarounds,” said Jim Cowie, the company’s chief technology officer. “I’ve never seen it happen at this scale.”

“In a fundamental sense, it’s as if you rewrote the map and they are no longer a country,” said Mr. Cowie. “I never thought it would happen to a country the size and scale of Egypt.”

In most countries, the points of access to the global Internet infrastructure are many and distributed. But Mr. Cowie said that Egypt was relatively late in widely adopting the Internet, so it has fewer access points. The government can shut these down with “six, or even four phone calls,” he said.

A Facebook spokesman, Andrew Noyes, said the company had seen a drop in traffic from Egypt since Thursday. “Although the turmoil in Egypt is a matter for the Egyptian people and their government to resolve, limiting Internet access for millions of people is a matter of concern for the global community,” he said in a statement.

In an interview, Mr. Noyes said the company was still seeing some traffic coming in from Egypt, but that it was “minimal.”

An executive at Google, the owner of YouTube, which activists have used to disseminate videos of the protests, spoke out against the shutdown.

David Drummond, the company’s chief legal officer, said Internet access was “a fundamental right, and it’s very sad if it’s denied to citizens of Egypt or any country.”

    Egypt Cuts Off Most Internet and Cell Service, NYT, 28.1.2011, http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html

 

 

 

 

 

From Bullets to Megabytes

 

January 26, 2011
The New York Times
By RICHARD A. FALKENRATH

 

STUXNET, the computer worm that last year disrupted many of the gas centrifuges central to Iran’s nuclear program, is a powerful weapon in the new age of global information warfare. A sophisticated half-megabyte of computer code apparently accomplished what a half-decade of United Nations Security Council resolutions could not.

This new form of warfare has several implications that are only now becoming apparent, and that will define the shape of what will likely become the next global arms race — albeit one measured in computer code rather than firepower.

For one thing, the Stuxnet attack highlights the ambiguous boundaries of sovereignty in cyberspace. Promoting national security in the information age will, from time to time, cause unpredictable offense to the rights and interests of innocent people, companies and countries.

Stuxnet attacked the Iranian nuclear program, but it did so by maliciously manipulating commercial software products sold globally by major Western companies. Whoever launched the assault also infected thousands of computers in several countries, including Australia, Britain, Indonesia and the United States.

This kind of collateral damage to the global civilian realm is going to be the norm, not the exception, and advanced economies, which are more dependent on advanced information systems, will be at particular risk.

What’s more, offensive and defensive information warfare are tightly, insidiously coupled, which will significantly complicate military-industrial relations.

The expertise needed to defend against a cyberattack is essentially indistinguishable from that needed to make such an attack. The Stuxnet programmers are reported to have exploited proprietary information that had been voluntarily provided to the American government by Siemens, that German company that makes data-and-control programs used in nuclear power facilities — including Iran’s.

Siemens did this to help Washington build up its ability to fend off cyberattacks. Will Siemens and other companies think twice next time the American government calls? Probably. Whether it’s true or not, as far as the rest of the world is concerned, the United States is now in the business of offensive information warfare, along with China, Israel and Russia, among others.

It’s not hard to imagine, then, the splintering of the global information technology industry into multiple camps according to their willingness to cooperate with governments on security matters. We can already see this happening in the telecommunications industry, where companies promote their products’ resistance to government intrusion. At the same time, other companies might see an advantage to working closely with the government.

Stuxnet also raises sticky and perhaps irresolvable legal questions. At present there is no real legal framework for adjudicating international cyberattacks; even if victims could determine who was responsible, their governments have few options outside of diplomatic complaints and, perhaps, retaliation in kind. An international entity that could legislate or enforce an information warfare armistice does not exist, and is not really conceivable.

A similar question exists within the United States. Under American law the transmission of malicious code is in many cases a criminal offense. This makes sense, given the economy’s reliance on information networks, the sensitivity of stored electronic data and the ever-present risk of attack from viruses, worms and other varieties of malware.

But the president, as commander in chief, does have some authority to conduct offensive information warfare against foreign adversaries. However, as with many presidential powers to wage war and conduct espionage, the extent of his authority has never been enumerated.

This legal ambiguity is problematic because such warfare is far less controllable than traditional military and intelligence operations, and it raises much more complex issues of private property, personal privacy and commercial integrity.

Therefore, before our courts are forced to consider the issue and potentially limit executive powers, as they did after President Harry Truman tried to seize steel plants in the early 1950s, Congress should grant the White House broad authority to wage offensive information warfare.

By explicitly authorizing these offensive operations in appropriate, defined circumstances, a new statute would strengthen the president’s power to provide for the common defense in cyberspace. Doing so wouldn’t answer all the questions that this new era of warfare presents. But one thing is sure: as bad as this arms race will be, losing it would be even worse.

 

Richard A. Falkenrath, a principal of the Chertoff Group, an investment advisory firm, is a former deputy commissioner for counterterrorism for the New York Police Department and deputy homeland security adviser to President George W. Bush.

    From Bullets to Megabytes, NYT, 26.1.2011, http://www.nytimes.com/2011/01/27/opinion/27falkenrath.html

 

 

 

 

 

For the Funeral Too Distant, Mourners Gather on the Web

 

January 24, 2011
The New York Times
By LAURA M. HOLSON

 

In an age of commemorating birthdays, weddings and anniversaries on Facebook and Twitter, it was perhaps inevitable that live Web-streaming funerals for friends and loved ones would be next.

It is no surprise that the deaths of celebrities, like Michael Jackson, or honored political figures, like the United States diplomat Richard Holbrooke, are promoted as international Web events. So, too, was the memorial service for the six people killed Jan. 8 in Tucson, which had thousands of viewers on the Web.

But now the once-private funerals and memorials of less-noted citizens are also going online.

Several software companies have created easy-to-use programs to help funeral homes cater to bereaved families. FuneralOne a one-stop shop for online memorials that is based in St. Clair, Mich., has seen the number of funeral homes offering Webcasts increase to 1,053 in 2010, from 126 in 2008 (it also sells digital tribute DVDs).

During that same period, Event by Wire, a competitor in Half Moon Bay, Calif., watched the number of funeral homes live-streaming services jump to 300 from 80. And this month, the Service Corporation International in Houston, which owns 2,000 funeral homes and cemeteries, including the venerable Frank E. Campbell funeral chapel on the Upper East Side of Manhattan, said it was conducting a pilot Webcasting program at 16 of its funeral homes.

Traveling to funerals was once an important family rite, but with greater secularity and a mobile population increasingly disconnected from original hometowns, watching a funeral online can seem better than not going to a funeral at all. Social media, too, have redrawn the communal barriers of what is acceptable when relating to parents, siblings, friends and acquaintances.

“We are in a YouTube society now,” said H. Joseph Joachim IV, founder of FuneralOne. “People are living more than ever online, and this reflects that.”

Some of the Web-streamed funerals reflect the large followings gathered by individuals. On Jan. 11, more than 7,000 people watched the Santa Ana, Calif., funeral of Debbie Friedman, an iconic singer whose music combined Jewish text with folk rhythm. It was seen on Ustream, a Web video service, with more than 20,000 viewing it on-demand in the days that followed.

“We intended to watch a few minutes, but ended up watching almost the whole thing,” said Noa Kushner, a rabbi in San Anselmo, Calif., and a fan of Ms. Friedman’s music, who watched the service with a friend at his office. “I was so moved.”

After Stefanie Spielman, a breast cancer activist and the wife of the popular National Football League player Chris Spielman, died in 2009, the Spielmans wanted a private ceremony attended by 900 friends and family members, said Lajos Szabo, the chief strategy officer at Schoedinger Funeral and Cremation Service in Columbus, Ohio, which arranged the funeral. But they also hoped to accommodate members of the public, who wanted to support the family in its grief. Streamed live and posted online, Ms. Spielman’s funeral has been viewed 4,663 times by 2,989 visitors since November 2009, according to FuneralOne.

Other Webcasts are more obscure, but no less appreciated. Two weeks ago, a friend of Ronald Rich, a volunteer firefighter in Wallace, N.C., died unexpectedly. When Mr. Rich called the mother of his friend to say he could not make the eight-hour drive to the funeral because a snowstorm threatened to close roads, he said the mother offered to send an e-mail invitation so he could watch the service online. Mr. Rich said he watched the funeral: first by himself and a second time with his girlfriend.

“It was comforting to me,” he said, adding that he planned to watch it again with fellow firefighters.

The technology to put funerals online has been around for a decade but was slow to catch on with an industry understandably sensitive to questions of etiquette. Some funeral directors eschew streaming funerals live because they do not want to replace a communal human experience with a solitary digital one, said John Reed, a past president of the National Funeral Directors Association. Other funeral directors worry that if the quality of the video is poor, it will reflect badly on the funeral home.

And the conversation about whether to stream a funeral online can be awkward, particularly if a grief-stricken family is wary of technology. Funeral directors are conservative, Mr. Reed said; privacy, even for the Facebook generation, is paramount. “We don’t jump on the first thing that comes along,” he said.

Still, some funeral directors offer the service for free (Mr. Reed is one of them) while others charge $100 to $300. If a family wants to keep the online service private, those invited get a password that allows access. (Mr. Joachim said 94 percent of the funerals his company Webcast were not password-protected.)

Not all real-life funeral attendees want their images captured online. Irene Dahl, an owner of Dahl Funeral Chapel in Bozeman, Mont., said a young man went to a funeral last year dressed as a woman and asked not to be filmed. “He did not want his mother to know,” Ms. Dahl said. “So we did not face the camera in his direction.”

Ms. Dahl said that nearly one-third of the ceremonies arranged by her funeral home last year — about 60 — were streamed live, at no extra charge. She became interested in this option after Dan Grumley, the chief executive of Event by Wire, visited her in 2008 and showed her how it worked.

“Being a funeral director is about helping people with their grief,” she said.

Russell Witek, the 14-year-old son of Karen Witek of Geneva, Ill., died of a brain tumor in 2009. The Conley Funeral Home in Elburn, Ill., offered to stream the funeral live to friends and family members. “We said, ‘Why not?’ ” Ms. Witek said. Her brother-in-law was working in the Middle East and could not attend. Russell’s home health nurse was out of town. “It was spring break,” Ms. Witek said.

She had met a number of friends on social media sites, including a patient-care support group and another for parents who home-schooled their children, and they could not attend, either. “I wanted them to experience it,” Ms. Witek said.

According to Conley Funeral Home, 186 people watched the funeral live on April 3, 2009, with an additional 511 watching it on-demand through Jan. 15.

Ms. Witek said her husband had watched the funeral more than once, “because he wanted to hear what was said that day,” but said she couldn’t bring herself to view it, except in parts. “After a child dies, you go into a fog.”

But for William Uzenski, the father of Nicholas Uzenski, a Marine serving in Afghanistan who was killed on Jan. 11, 2010, live Web-streaming has provided much comfort. Mr. Uzenski’s body was transported to his home, Bozeman, 10 days later. William Uzenski, himself a former Marine, said he wanted Nicholas’s military colleagues in Afghanistan to be able to watch the funeral. So Ms. Dahl arranged it through a military liaison who was assisting the family.

Ms. Dahl said that, unlike many streamed funerals, Nicholas Uzenski’s had three separate Webcasts and was invitation-only. The Webcasts included the arrival of his coffin at a local airport, the funeral and a graveside ceremony that his family said included a 21-gun salute. Ms. Dahl tracked virtual attendees. The funeral and the graveside ceremony were watched by 124 and 39 people, respectively, with the funeral viewed in 80 cities and 4 countries, including Afghanistan.

“Some e-mailed me,” Mr. Uzenski said. “Friends thanked us for sharing it with them. I do watch it again sometimes. I don’t know why, but I guess it’s healing.”

    For the Funeral Too Distant, Mourners Gather on the Web, NYT, 24.1.2011, http://www.nytimes.com/2011/01/25/fashion/25death.html

 

 

 

 

 

Music Industry Braces for the Unthinkable

 

January 23, 2011
The New York Times
By ERIC PFANNER

 

PARIS — After another year of plunging music sales, record company executives are starting to contemplate the unthinkable: The digital music business, held out as the future of the industry, may already be as big as it is going to get.

The International Federation of the Phonographic Industry, a trade group based in London, said last week that sales of music in digital form had risen only 6 percent worldwide in 2010, even as the overall music market had shrunk 8 percent or 9 percent, extending a decade-long decline.

In each of the past two years, the rate of increase in digital revenue has approximately halved. If that trend continues, digital sales could top out at less than $5 billion this year, about a third of the overall music market but many billions of dollars short of the amount needed to replace long-gone sales of compact discs.

“Music’s first digital decade is behind us and what do we have?” said Mark Mulligan, an analyst at Forrester Research. “Not a lot of progress.”

“We are at one of the most worrying stages yet for the industry,” he continued. “As things stand now, digital music has failed.”

Music executives disagree, saying there is hope, as long as they can come to grips with piracy, which according to the industry federation accounts for the vast majority of music distributed online.

Stronger measures to crack down on unauthorized copying are taking effect in a number of countries, executives note, and even as the authorities wield a heavier stick, the complementary carrots are appearing, too, in the form of innovative digital services.

“The challenging environment continues, but we have some grounds for optimism,” said Frances Moore, chief executive of the music federation.

Ms. Moore said the recent introduction of tough anti-piracy laws in South Korea and France, which authorize cutting off the Internet connection of repeat offenders, showed that stricter enforcement could persuade listeners to seek out legal alternatives to unauthorized file-sharing services.

In South Korea, where the music business has long been blighted by piracy, digital music sales rose 14 percent in the first half of last year, after the new law went into effect in 2009, the federation said. The first account suspensions occurred in the autumn, and the group said the publicity surrounding the crackdown should help convert more consumers.

Max Hole, chief operating officer of Universal Music Group International, said his company, the biggest of the four major record companies, was so encouraged by the signs of a turnaround in South Korea that it had decided to start investing in the development of new music acts again, after suspending operations in South Korea several years ago.

France has also implemented a so-called graduated response system. In the French system, cutting Internet access is preceded by several warnings. While the authorities say they have sent out hundreds of thousands of e-mails to suspected copyright cheats, nobody’s connection has yet been cut.

Record company executives said they were also encouraged by recent legal action in the United States to cripple the file-sharing service LimeWire, as well as by the progress in the U.S. Senate of a bill to give law enforcement officials more power to shut down file-sharing services.

In Europe, the industry has notched legal victories against other sites accused of abetting piracy, including The Pirate Bay and Mininova.

Industry executives say they are encouraged by the development of new digital services, particularly those that embrace the principles of cloud computing. These services can provide unlimited amounts of music to listeners on demand, through a variety of devices, from mobile phones to televisions.

“The television is a great opportunity,” said Thomas Hesse, head of the digital business at Sony Music Entertainment. “We haven’t innovated in the living room for many years.”

Around the world, 10 million people have already signed up for subscription-based online services from Spotify, Rdio and Deezer, some of which have attracted additional millions of users with free, advertising-supported services. Many executives hope the growth of offerings like these can reduce the industry’s dependence on sales of individual tracks through digital stores like Apple iTunes, a model that has attracted little interest from young music fans, particularly outside the United States.

Yet some services that were hailed as potential iTunes challengers when they were introduced are fading from the scene. Nokia, the mobile phone manufacturer, said this month that it was sharply scaling back a service that gives buyers of certain phones free, unlimited music downloads. Sky, the British pay-television and broadband provider, recently canceled a subscription music service.

Music executives say Internet service providers hold the key to solving the piracy problems and helping the music companies recoup lost revenue. For the most part, providers have balked at taking stronger action against file-sharing, saying they do not want to snoop on their customers.

But one provider in Ireland, Eircom, recently started instituting its own version of a graduated response system. Customers who illegally download music face a “graduated response” similar to the one in France, but they can avoid the threat of disconnection by using a new music service from Eircom that offers free, unlimited streaming.

Mr. Mulligan said tougher enforcement would succeed only if music companies and other rights holders, including collecting agencies that represent artists and composers, embraced digital services that met the needs and interests of consumers, particularly teenagers and young adults.

Rights holders have grown more flexible as industry sales have collapsed, but they remain reluctant to license their music to some services. For example, Spotify, a popular streaming service in Europe, has yet to sign the record company deals it needs to open a U.S. site. Meanwhile, Internet companies like YouTube have sometimes struggled to reach agreements to show music videos in Europe.

The industry has also balked at the unlimited MP3 format, which comes with no copy restrictions, allowing people to share music with friends or provide soundtracks for their own videos, or post songs to social networking sites.

With growth in digital revenue slowing nearly to a standstill, analysts say, it is no surprise that talk of mergers and buyouts is again swirling around some of the Big Four music companies — Universal, Sony, Warner Music Group and EMI. Warner, for example, is said to have hired bankers to explore a sale of the company or a purchase of EMI.

“What has been keeping labels afloat has been the digital story,” said Mr. Mulligan, of Forrester Research. “If, all of a sudden, what they have been telling the market is the future turns out to be a failure, that radically changes the conversation.”

    Music Industry Braces for the Unthinkable, NYT, 23.1.2011, http://www.nytimes.com/2011/01/24/technology/24music.html

 

 

 

 

 

At Google, a Boost From E-Commerce

 

January 20, 2011
The New York Times
By CLAIRE CAIN MILLER

 

Google’s strong fourth-quarter earnings proved that it is now firmly ensconced in e-commerce, and also showed that, with its Android operating system and related apps, it is smoothly transitioning to the mobile world.

But that news, reported on Thursday, was quickly followed by the announcement that Larry Page, a Google co-founder, will replace Eric E. Schmidt as chief executive in April.

The move marks a return to the helm of the company for Mr. Page, who left the role in 2001 when Google was still a private company. Mr. Schmidt will become executive chairman, focusing on outside partnerships and government outreach, the company said.

The upheaval at the top may have overshadowed the earnings report, but the numbers were good. Google benefited from the best online holiday shopping season since 2006, as Web users increasingly began their shopping sprees at the search engine.

“Whenever e-commerce improves, we see more advertisers competing for the same keywords, and that means more revenue for Google,” said Sandeep Aggarwal, an Internet analyst at Caris & Company.

To make it easier for shoppers to find what they were looking for, Google in the run-up to the holiday season introduced tools like Boutiques.com and search results that showed which offline stores have an item in stock. It also began offering retailers product ads with images.

Google reported on Thursday that net income in the quarter ended Dec. 31 was $2.54 billion, or $7.81 a share, up from $1.97 billion, or $6.13 a share, in the year-ago quarter. Excluding the cost of stock options and the related tax benefits, Google’s fourth-quarter profit was $8.75 a share, up from $6.79.

The company said revenue climbed 17 percent, to $8.44 billion, from $6.67 billion a year earlier. Net revenue, which excludes commissions paid to advertising partners, was $6.37 billion, up from $4.95 billion.

“Our strong performance has been driven by a rapidly growing digital economy, continuous product innovation that benefits both users and advertisers, and by the extraordinary momentum of our newer businesses, such as display and mobile,” Mr. Schmidt said in a statement.

While Google’s e-commerce offerings drove its search business during the quarter, the company also began to convince investors that it is successfully moving into new businesses, particularly mobile and display ads.

On a call after the earnings report, Jonathan Rosenberg, senior vice president for product management, said the winners of 2010 were Google’s display advertising business, which now has two million publishers; YouTube, where revenue doubled; businesses that have begun using Google products; and Android, with 300,000 phones activated a day.

Mr. Rosenberg also said there were 10 times as many searches year over year done from Android devices, which translates into advertising revenue for Google.

Google has been selling display ads, those with images and sometimes video, on YouTube and other Web sites. The company does not break out display ad revenue, but eMarketer, a research firm, estimated that Google accounted for 13.4 percent of display ad revenue in the United States last year, up from 4.7 percent in 2009. Meanwhile, Yahoo, the market leader, lost share, eMarketer said.

Google’s mobile business is particularly promising, analysts said, as people increasingly neglect the laptops on their desks for the phones in their pockets.

For Google to maintain its dominance, it has needed to follow them, which it has been doing with apps to search the Web on the go, look up directions, watch videos, find local businesses and even make phone calls.

This year, Mr. Rosenberg said, the company will focus on products that allow people to access local information on mobile phones, as well as commerce, adding that the two are tied together.

“They key to unlocking mobile commerce was to make it easier for people to both search and then consummate the transaction on the mobile device,” he said.

“As smartphones become ubiquitous and local businesses put their inventory online, I think this will be the year that smartphones” change the way commerce is done, he added.

Still, other Google businesses have yet to find success. Google TV has faced delays and poor reviews; the Justice Department is still deciding whether to permit Google to acquire the flight software company ITA; and analysts are watching closely to see if the iPhone’s debut on Verizon affects sales of Android phones.

Also, analysts expressed concern about Google’s spending; the company is continually hiring and paid more than $2 billion for a building in New York to house growing operations.

    At Google, a Boost From E-Commerce, NYT, 20.1.2011, http://www.nytimes.com/2011/01/21/technology/21google.html

 

 

 

 

 

In Google Shake-Up, an Effort to Revive Start-Up Spark

 

January 20, 2011
The New York Times
By CLAIRE CAIN MILLER and MIGUEL HELFT

 

SAN FRANCISCO — Google made the biggest management shake-up in a decade on Thursday, handing the reins of the company to one of its co-founders in an effort to rediscover its start-up roots.

As it has grown into the dominant company in Silicon Valley, Google has lost some of its entrepreneurial culture and become a slower-moving bureaucracy, analysts and insiders say, in contrast to Facebook, Twitter and other younger, more agile competitors.

To counter this, the company announced that Larry Page, its 38-year-old co-founder, would take over as chief executive from Eric E. Schmidt, a technology industry veteran who was brought in a decade ago to provide adult supervision, as Silicon Valley calls it.

Mr. Schmidt, 55, will remain executive chairman of the company, which had a market value of $200 billion at the close of trading on Thursday, up from $27 billion when it went public in 2004.

“One of the primary goals I have is to get Google to be a big company that has the nimbleness and soul and passion and speed of a start-up,” said Mr. Page in a telephone interview on Thursday. He will start his new role in April.

The shake-up comes at a time of major upheaval in Silicon Valley. The company, and the search industry, face challenges on several fronts.

Google remains immensely powerful and successful — as demonstrated by the stellar quarterly financial results it reported Thursday.

But the sudden rise of Facebook has exposed Google’s failures in areas like social networking and threatens its vast share of the online advertising market. Meanwhile, although Google has had success in new areas like mobile and display advertising, it has struggled to branch out into other businesses like television.

The unspoken fear within Google is that it could become like Microsoft, a once-dominant technology company that seems past its prime and perceived as stodgier, despite successes like XBox and Kinect. Indeed, for all its financial success, Google, which has 24,400 employees, is no longer considered by many top engineers as the most desirable place to work in the Valley; a new generation of start-ups has taken that place.

And in recent years, Google has lost scores of engineers and a string of high-profile senior executives, including Sheryl Sandberg, now chief operating officer at Facebook, and Tim Armstrong, now chief executive of AOL.

Mr. Page led the company in its early days but relinquished that role in 2001, when it was still private. In tapping him to return to the post, Google becomes one of the few major companies in the Valley to be put under the control of a founder after being run for so long by a professional manager. To some, the move signaled a kind of coming-of-age for Mr. Page and Mr. Brin, who were in their late 20s when Mr. Schmidt took over. Even Mr. Schmidt characterized it as a moment for the training wheels to come off.

On his Twitter account, Mr. Schmidt wrote: “Day-to-day adult supervision is no longer needed.” Later, on a conference call with analysts after Thursday’s earnings report, he said, “I believe Larry is ready,” adding, “It’s time for him to have a shot at running this.”

The management move ends an unusual experiment in which Google, the world’s largest Internet company, was run jointly by a troika of Mr. Schmidt; Mr. Page, who was president of products; and Sergey Brin, 37, the company’s other co-founder and its president of technology.

In the interview, Mr. Page also explained the move as an effort to streamline, saying the three had selected him as the top decision-maker because of “the pace of decision-making and the scale of the company.” Mr. Brin, who joined Mr. Page and Mr. Schmidt in the interview, said the three-way process confused employees.

“We wanted to make it clear to all the executives and the managers who report to us where they should send an e-mail,” he said.

Mr. Page and Mr. Schmidt said the decision was mutual. “I don’t think there’s another person in the universe that could have done as good a job as Eric has done in the company,” Mr. Page said.

The relationship between the founders and Mr. Schmidt was rocky during its early years, as the founders frequently undercut Mr. Schmidt’s decisions. Although they worked well together for the last several years, there remained recurring strains.

Ken Auletta, the author of “Googled: The End of the World As We Know It,” said in an interview that while Mr. Schmidt may simply have been ready for a change after 10 years, he may have received some encouragement to step aside.

“I don’t think he was pushed aside, but he may have been nudged,” he said.

Under Mr. Schmidt’s helm, Google has prospered, but over the years, it has become less attractive to some engineers, who say it has become harder to develop new ideas while working there. The problem is one that all big companies face, but it is more pressing in Silicon Valley, where the most talented engineers tend to have the strongest entrepreneurial drive. Google has tried to retain dissatisfied employees with perks like giving them time to work on new projects. But some insiders say those incentives have lost effectiveness.

The news of the change rocked Silicon Valley, with analysts and company insiders offering varying theories. Some said Mr. Schmidt was tired of the day-to-day hassles of management. Mr. Schmidt said in the interview, “I would tell you, frankly, a decade is a long time to be a C.E.O., and Larry will discover this.”

Others say Mr. Page always planned to re-assert his authority at some point.

“Larry has wanted to be C.E.O., so that’s not a surprise,” said a former Google sales executive who would speak only anonymously to preserve his relationship with a powerful company. “But the timing — I’ve talked to people at Google today and they were just flabbergasted.”

Esther Dyson, a veteran Valley investor who has long known the Google founders and Mr. Schmidt, said, “It is unexpected but it makes a lot of sense.” She added: “Larry and Sergey have grown up. They want to run their own company.”

After the management change, Mr. Brin will concentrate on several new products, which he declined to name, while Mr. Schmidt will focus on external business partnerships and government outreach, including fighting regulators’ concerns about Google’s growing power.

Mr. Page and Mr. Brin co-founded Google when they were graduate students in computer science at Stanford in 1998.

Mr. Page is aloof, cerebral, intensely private and occasionally brusque. While Mr. Brin is more gregarious, the two didn’t trust outside investors and sought to keep control of the company.

The co-founders and Mr. Schmidt all have controlling stakes in the company. Forbes magazine recently estimated that Mr. Page and Mr. Brin had a net worth of $15 billion each, and Mr. Schmidt, $5.5 billion.

The former executive said the change might be a welcome one if it helps launch products more quickly. “In that respect, getting one of the co-founders in place might be just the energy charge folks need.”

    In Google Shake-Up, an Effort to Revive Start-Up Spark, NYT, 20.1.2011, http://www.nytimes.com/2011/01/21/technology/21chief.html

 

 

 

 

 

Ex-Swiss Banker Gives Data to WikiLeaks

 

January 17, 2011
The New York Times
By RAVI SOMAIYA and JULIA WERDIGIER

 

LONDON — A former Swiss bank executive said on Monday that he had given the WikiLeaks founder, Julian Assange, details of more than 2,000 prominent individuals and companies that he contends engaged in tax evasion and other possible criminal activity.

Rudolf M. Elmer, the former head of the Cayman Islands office of the prominent Swiss bank Julius Baer, refused to identify any of the individuals or companies, but told reporters at a press conference that about 40 politicians and “pillars of society” worldwide are among them.

He told The Observer newspaper over the weekend that those named in the documents come from “the U.S., Britain, Germany, Austria and Asia — from all over,” and include “business people, politicians, people who have made their living in the arts and multinational conglomerates — from both sides of the Atlantic.”

Mr. Assange said that WikiLeaks would verify and release the information, including the names, in as little as two weeks. He suggested possible partnerships with financial news organizations and said he would consider turning the information over to Britain’s Serious Fraud Office, a government agency that investigates financial corruption.

Mr. Elmer said he had turned to WikiLeaks to educate society about what he considers an unfair system designed to serve the rich and aid money launderers after his offers to provide the data to universities and governments were spurned and, in his opinion, the Swiss media failed to cover the substance of his allegations. “The man in the street needs to know how this system works,” he said, referring to the offshore trusts that many “high net worth individuals” across the world use to evade taxes.

His former employers released a statement on Friday denying all wrongdoing and suggesting that Mr. Elmer’s aim was to “discredit Julius Baer as well as clients in the eyes of the public.” It accused him of using falsified documents and spreading “baseless accusations” and passing on “unlawfully acquired, respectively retained, documents to the media, and later also to WikiLeaks.”

On Monday, Mr. Elmer declined say how he had obtained the documents, which were on two CDs. He faces trial in Switzerland on Wednesday on charges of stealing the information from the bank. He was held for 30 days in 2005 over allegations that he violated Swiss banking secrecy laws, falsified documents and sent threatening messages to two people at the bank.

WikiLeaks and Bank Julius Baer previously clashed in early 2008 when the anti-secrecy organization published hundreds of documents pertaining to its offshore activities. On that occasion, it did not identify the 15 individuals concerned. But the bank succeeded, briefly, in gaining a court order to shut down the WikiLeaks.org Web site anyway. The injunction was subsequently overturned and the case was dropped.

The offshore banking industry has come under increasing pressure from whistle-blowers like Mr. Elmer over the last two years. In 2009, Bradley Birkenfeld, a former private banker for UBS, was sentenced to more than three years in prison after refusing to admit his own role in the Swiss bank’s efforts to help American clients evade taxes.

Prosecutors did, however, credit Mr. Birkenfeld for helping to disclose some illegal tactics in the industry. As a result of Mr. Birkenfeld’s disclosures, UBS agreed to turn over details of several thousand client accounts to the Internal Revenue Service as part of a legal settlement. UBS agreed to pay a $780 million fine and admitted criminal wrongdoing.

In London on Monday, Mr. Assange said that financial institutions “operate outside the rule of law” because of their economic power. WikiLeaks itself had, he said, been “economically censored” by companies like Visa and MasterCard, which stopped processing donations to it late last year in response to its release of hundreds of thousands of classified United States documents on the wars in Afghanistan and Iraq and thousands of State Department cables.

WikiLeaks has also said it would release information from an American bank, thought to be the contents of a Bank of America executive’s hard drive, early this year. But, Mr. Assange said, the site is not fully “open for public business” owing to the weight of the existing leaks it is struggling to process.

He would not comment on continuing proceedings to extradite him from Britain to Sweden to face allegations of sexual wrongdoing brought by two women in Stockholm last summer. He will next appear in a London court on Feb. 7 and 8.

The United States is also widely thought to be conducting an investigation into Mr. Assange and WikiLeaks, in connection with the release of the classified United States government and military information.

    Ex-Swiss Banker Gives Data to WikiLeaks, NYT, 17.1.2011, http://www.nytimes.com/2011/01/18/business/global/18baer.html

 

 

 

 

 

Israel Tests on Worm Called Crucial in Iran Nuclear Delay

 

January 15, 2011
The New York Times
By WILLIAM J. BROAD, JOHN MARKOFF and DAVID E. SANGER

 

This article is by William J. Broad, John Markoff and David E. Sanger.

The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal.

Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own.

Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.

“To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.”

Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program.

In recent days, the retiring chief of Israel’s Mossad intelligence agency, Meir Dagan, and Secretary of State Hillary Rodham Clinton separately announced that they believed Iran’s efforts had been set back by several years. Mrs. Clinton cited American-led sanctions, which have hurt Iran’s ability to buy components and do business around the world.

The gruff Mr. Dagan, whose organization has been accused by Iran of being behind the deaths of several Iranian scientists, told the Israeli Knesset in recent days that Iran had run into technological difficulties that could delay a bomb until 2015. That represented a sharp reversal from Israel’s long-held argument that Iran was on the cusp of success.

The biggest single factor in putting time on the nuclear clock appears to be Stuxnet, the most sophisticated cyberweapon ever deployed.

In interviews over the past three months in the United States and Europe, experts who have picked apart the computer worm describe it as far more complex — and ingenious — than anything they had imagined when it began circulating around the world, unexplained, in mid-2009.

Many mysteries remain, chief among them, exactly who constructed a computer worm that appears to have several authors on several continents. But the digital trail is littered with intriguing bits of evidence.

In early 2008 the German company Siemens cooperated with one of the United States’ premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world — and that American intelligence agencies have identified as key equipment in Iran’s enrichment facilities.

Seimens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory — which is part of the Energy Department, responsible for America’s nuclear arms — the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet.

The worm itself now appears to have included two major components. One was designed to send Iran’s nuclear centrifuges spinning wildly out of control. Another seems right out of the movies: The computer program also secretly recorded what normal operations at the nuclear plant looked like, then played those readings back to plant operators, like a pre-recorded security tape in a bank heist, so that it would appear that everything was operating normally while the centrifuges were actually tearing themselves apart.

The attacks were not fully successful: Some parts of Iran’s operations ground to a halt, while others survived, according to the reports of international nuclear inspectors. Nor is it clear the attacks are over: Some experts who have examined the code believe it contains the seeds for yet more versions and assaults.

“It’s like a playbook,” said Ralph Langner, an independent computer security expert in Hamburg, Germany, who was among the first to decode Stuxnet. “Anyone who looks at it carefully can build something like it.” Mr. Langner is among the experts who expressed fear that the attack had legitimized a new form of industrial warfare, one to which the United States is also highly vulnerable.

Officially, neither American nor Israeli officials will even utter the name of the malicious computer program, much less describe any role in designing it.

But Israeli officials grin widely when asked about its effects. Mr. Obama’s chief strategist for combating weapons of mass destruction, Gary Samore, sidestepped a Stuxnet question at a recent conference about Iran, but added with a smile: “I’m glad to hear they are having troubles with their centrifuge machines, and the U.S. and its allies are doing everything we can to make it more complicated.”

In recent days, American officials who spoke on the condition of anonymity have said in interviews that they believe Iran’s setbacks have been underreported. That may explain why Mrs. Clinton provided her public assessment while traveling in the Middle East last week.

By the accounts of a number of computer scientists, nuclear enrichment experts and former officials, the covert race to create Stuxnet was a joint project between the Americans and the Israelis, with some help, knowing or unknowing, from the Germans and the British.

The project’s political origins can be found in the last months of the Bush administration. In January 2009, The New York Times reported that Mr. Bush authorized a covert program to undermine the electrical and computer systems around Natanz, Iran’s major enrichment center. President Obama, first briefed on the program even before taking office, sped it up, according to officials familiar with the administration’s Iran strategy. So did the Israelis, other officials said. Israel has long been seeking a way to cripple Iran’s capability without triggering the opprobrium, or the war, that might follow an overt military strike of the kind they conducted against nuclear facilities in Iraq in 1981 and Syria in 2007.

Two years ago, when Israel still thought its only solution was a military one and approached Mr. Bush for the bunker-busting bombs and other equipment it believed it would need for an air attack, its officials told the White House that such a strike would set back Iran’s programs by roughly three years. Its request was turned down.

Now, Mr. Dagan’s statement suggests that Israel believes it has gained at least that much time, without mounting an attack. So does the Obama administration.

For years, Washington’s approach to Tehran’s program has been one of attempting “to put time on the clock,” a senior administration official said, even while refusing to discuss Stuxnet. “And now, we have a bit more.”

 

Finding Weaknesses

Paranoia helped, as it turns out.

Years before the worm hit Iran, Washington had become deeply worried about the vulnerability of the millions of computers that run everything in the United States from bank transactions to the power grid.

Computers known as controllers run all kinds of industrial machinery. By early 2008, the Department of Homeland Security had teamed up with the Idaho National Laboratory to study a widely used Siemens controller known as P.C.S.-7, for Process Control System 7. Its complex software, called Step 7, can run whole symphonies of industrial instruments, sensors and machines.

The vulnerability of the controller to cyberattack was an open secret. In July 2008, the Idaho lab and Siemens teamed up on a PowerPoint presentation on the controller’s vulnerabilities that was made to a conference in Chicago at Navy Pier, a top tourist attraction.

“Goal is for attacker to gain control,” the July paper said in describing the many kinds of maneuvers that could exploit system holes. The paper was 62 pages long, including pictures of the controllers as they were examined and tested in Idaho.

In a statement on Friday, the Idaho National Laboratory confirmed that it formed a partnership with Siemens but said it was one of many with manufacturers to identify cybervulnerabilities. It argued that the report did not detail specific flaws that attackers could exploit. But it also said it could not comment on the laboratory’s classified missions, leaving unanswered the question of whether it passed what it learned about the Siemens systems to other parts of the nation’s intelligence apparatus.

The presentation at the Chicago conference, which recently disappeared from a Siemens Web site, never discussed specific places where the machines were used.

But Washington knew. The controllers were critical to operations at Natanz, a sprawling enrichment site in the desert. “If you look for the weak links in the system,” said one former American official, “this one jumps out.”

Controllers, and the electrical regulators they run, became a focus of sanctions efforts. The trove of State Department cables made public by WikiLeaks describes urgent efforts in April 2009 to stop a shipment of Siemens controllers, contained in 111 boxes at the port of Dubai, in the United Arab Emirates. They were headed for Iran, one cable said, and were meant to control “uranium enrichment cascades” — the term for groups of spinning centrifuges.

Subsequent cables showed that the United Arab Emirates blocked the transfer of the Siemens computers across the Strait of Hormuz to Bandar Abbas, a major Iranian port.

Only months later, in June, Stuxnet began to pop up around the globe. The Symantec Corporation, a maker of computer security software and services based in Silicon Valley, snared it in a global malware collection system. The worm hit primarily inside Iran, Symantec reported, but also in time appeared in India, Indonesia and other countries.

But unlike most malware, it seemed to be doing little harm. It did not slow computer networks or wreak general havoc.

That deepened the mystery.

 

A ‘Dual Warhead’

No one was more intrigued than Mr. Langner, a former psychologist who runs a small computer security company in a suburb of Hamburg. Eager to design protective software for his clients, he had his five employees focus on picking apart the code and running it on the series of Siemens controllers neatly stacked in racks, their lights blinking.

He quickly discovered that the worm only kicked into gear when it detected the presence of a specific configuration of controllers, running a set of processes that appear to exist only in a centrifuge plant. “The attackers took great care to make sure that only their designated targets were hit,” he said. “It was a marksman’s job.”

For example, one small section of the code appears designed to send commands to 984 machines linked together.

Curiously, when international inspectors visited Natanz in late 2009, they found that the Iranians had taken out of service a total of exactly 984 machines that had been running the previous summer.

But as Mr. Langner kept peeling back the layers, he found more — what he calls the “dual warhead.” One part of the program is designed to lie dormant for long periods, then speed up the machines so that the spinning rotors in the centrifuges wobble and then destroy themselves. Another part, called a “man in the middle” in the computer world, sends out those false sensor signals to make the system believe everything is running smoothly. That prevents a safety system from kicking in, which would shut down the plant before it could self-destruct.

“Code analysis makes it clear that Stuxnet is not about sending a message or proving a concept,” Mr. Langner later wrote. “It is about destroying its targets with utmost determination in military style.”

This was not the work of hackers, he quickly concluded. It had to be the work of someone who knew his way around the specific quirks of the Siemens controllers and had an intimate understanding of exactly how the Iranians had designed their enrichment operations.

In fact, the Americans and the Israelis had a pretty good idea.

 

Testing the Worm

Perhaps the most secretive part of the Stuxnet story centers on how the theory of cyberdestruction was tested on enrichment machines to make sure the malicious software did its intended job.

The account starts in the Netherlands. In the 1970s, the Dutch designed a tall, thin machine for enriching uranium. As is well known, A. Q. Khan, a Pakistani metallurgist working for the Dutch, stole the design and in 1976 fled to Pakistan.

The resulting machine, known as the P-1, for Pakistan’s first-generation centrifuge, helped the country get the bomb. And when Dr. Khan later founded an atomic black market, he illegally sold P-1’s to Iran, Libya, and North Korea.

The P-1 is more than six feet tall. Inside, a rotor of aluminum spins uranium gas to blinding speeds, slowly concentrating the rare part of the uranium that can fuel reactors and bombs.

How and when Israel obtained this kind of first-generation centrifuge remains unclear, whether from Europe, or the Khan network, or by other means. But nuclear experts agree that Dimona came to hold row upon row of spinning centrifuges.

“They’ve long been an important part of the complex,” said Avner Cohen, author of “The Worst-Kept Secret” (2010), a book about the Israeli bomb program, and a senior fellow at the Monterey Institute of International Studies. He added that Israeli intelligence had asked retired senior Dimona personnel to help on the Iranian issue, and that some apparently came from the enrichment program.

“I have no specific knowledge,” Dr. Cohen said of Israel and the Stuxnet worm. “But I see a strong Israeli signature and think that the centrifuge knowledge was critical.”

Another clue involves the United States. It obtained a cache of P-1’s after Libya gave up its nuclear program in late 2003, and the machines were sent to the Oak Ridge National Laboratory in Tennessee, another arm of the Energy Department.

By early 2004, a variety of federal and private nuclear experts assembled by the Central Intelligence Agency were calling for the United States to build a secret plant where scientists could set up the P-1’s and study their vulnerabilities. “The notion of a test bed was really pushed,” a participant at the C.I.A. meeting recalled.

The resulting plant, nuclear experts said last week, may also have played a role in Stuxnet testing.

But the United States and its allies ran into the same problem the Iranians have grappled with: the P-1 is a balky, badly designed machine. When the Tennessee laboratory shipped some of its P-1’s to England, in hopes of working with the British on a program of general P-1 testing, they stumbled, according to nuclear experts.

“They failed hopelessly,” one recalled, saying that the machines proved too crude and temperamental to spin properly.

Dr. Cohen said his sources told him that Israel succeeded — with great difficulty — in mastering the centrifuge technology. And the American expert in nuclear intelligence, who spoke on the condition of anonymity, said the Israelis used machines of the P-1 style to test the effectiveness of Stuxnet.

The expert added that Israel worked in collaboration with the United States in targeting Iran, but that Washington was eager for “plausible deniability.”

In November, the Iranian president, Mahmoud Ahmadinejad, broke the country’s silence about the worm’s impact on its enrichment program, saying a cyberattack had caused “minor problems with some of our centrifuges.” Fortunately, he added, “our experts discovered it.”

The most detailed portrait of the damage comes from the Institute for Science and International Security, a private group in Washington. Last month, it issued a lengthy Stuxnet report that said Iran’s P-1 machines at Natanz suffered a series of failures in mid- to late 2009 that culminated in technicians taking 984 machines out of action.

The report called the failures “a major problem” and identified Stuxnet as the likely culprit.

Stuxnet is not the only blow to Iran. Sanctions have hurt its effort to build more advanced (and less temperamental) centrifuges. And last January, and again in November, two scientists who were believed to be central to the nuclear program were killed in Tehran.

The man widely believed to be responsible for much of Iran’s program, Mohsen Fakrizadeh, a college professor, has been hidden away by the Iranians, who know he is high on the target list.

Publicly, Israeli officials make no explicit ties between Stuxnet and Iran’s problems. But in recent weeks, they have given revised and surprisingly upbeat assessments of Tehran’s nuclear status.

“A number of technological challenges and difficulties” have beset Iran’s program, Moshe Yaalon, Israel’s minister of strategic affairs, told Israeli public radio late last month.

The troubles, he added, “have postponed the timetable.”

    Israel Tests on Worm Called Crucial in Iran Nuclear Delay, NYT, 15.1.2011, http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html

 

 

 

 

 

In an Online Game Forum, Tucson Suspect Lashed Out

 

January 14, 2011
The New York Times
By SARAH WHEATON

 

Logs of Jared L. Loughner’s conversations with fellow players in an online game of strategy show a young man who has become frustrated by his inability to find a job, who views his early education as tantamount to slavery, and who has frequent run-ins with his college professors.

In the archives of such conversations from April to June, obtained from the administrators of the game, Earth Empires, Mr. Loughner, using the name “Dare,” rails against his “scam” of an education and about his job search.

“How many applications — is a lot?” he asked on May 15, lamenting that he had gone six months without a paycheck. “I’m thinking — 2 misdemeanors hurt. Don’t do Graffiti.”

Mr. Loughner, 22, wrote that he had been fired five times, including after he walked out of a job at a Red Robin restaurant because of a “mental breakdown.”

“Currently 67 applications,” he wrote in mid-June. “No interview.”

Mr. Loughner said he was being discriminated against.

“CAN’T HOLD TERMINATION AGAINST FUTURE EMPLOYEE!” he wrote, repeating the line more than 100 times in one May posting. And in early June, he wrote that he was filing a complaint with the Equal Employment Opportunity Commission about his last workplace.

The conversations, which had been accessible only to players with a password to a forum associated with Earth Empires game, will be made available to the public on Friday evening, the administrators said. They decided to post an edited log of the conversations after reports about them appeared in The Wall Street Journal.

Players who knew Mr. Loughner outside of the forums brought the logs to the attention of other gamers over the weekend. The accounts by “Dare” of confrontations with professors match records that have been released by Pima Community College, which Mr. Loughner attended.

Mr. Loughner also refers to his education between kindergarten and the 12th grade as 15,000 hours of “unpaid work.”

“Is prison a close resemblance of high school?” he asked on May 15. “Relearning the English language. How many languages are there? Why am I a salve?” he continued, apparently meaning “slave.”

“The more I read Dare’s posts, the more I think he’s just drunk/high when he posts,” one player responded.

“I have no substance abuse problems currently,” Mr. Loughner replied. “Dude — I feel as if there is something wrong — ”

Another player added, “I think he seems like one of those people who avoids substance abuse because he is already strange.”

Mr. Loughner’s conversations took place among members of an “alliance” known as SancTuarY within Earth Empires, where players try to develop a country by teaming up with some competitors and undercutting others. Most are men between 20 and 40 years old, an administrator said.

Some of the SancTuarY alliance’s private forums are devoted to the business of dominating their online world. But players also vent, joke and share news and advice about final examinations and relationships. The language can be coarse, the political debates philosophical.

“This is like my social life,” Mr. Loughner wrote on May 15.

He uses the forums to talk about his course work, saying he had developed a “strong interest in logic.” On multiple occasions, he refers to an online grammar game for children that he is playing for a class.

He employs formal logical proofs to engage other players in debates about beating mentally disabled children to create more space in schools and about raping women. But, by his own account, Mr. Loughner ran into trouble when he tried to use similar proofs when meeting with a guidance counselor after being thrown out of a college mathematics course.

“Told her about a logical argument, but didn’t mention attending the logic class, that the logical argument was relevant. Told her about brainwashing a child and how that can change the view of mathematics,” he wrote on June 3. “I had to learn my abc’s and 123’s before entering college. Told her it was scam because of the possibility of failing the class.”

In the same conversation thread, Mr. Loughner writes, "The poetry teacher said i touched my self," repeating it three times.

    In an Online Game Forum, Tucson Suspect Lashed Out, NYT, 14.1.2011, http://www.nytimes.com/2011/01/15/us/15game.html

 

 

 

 

 

Accused Soldier in Brig as WikiLeaks Link Is Sought

 

January 13, 2011
The New York Times
By SCOTT SHANE

 

WASHINGTON — Julian Assange, the flamboyant founder of WikiLeaks, is living on a supporter’s 600-acre estate outside London, where he has negotiated $1.7 million in book deals and regularly issues defiant statements about the antisecrecy group’s plans.

Meanwhile, the young soldier accused of leaking the secret documents that brought WikiLeaks and Mr. Assange to fame and notoriety is locked in a tiny cell at the Quantico Marine Corps Base in Virginia. The soldier, Pfc. Bradley Manning, who turned 23 last month in the military prison, is accused of the biggest leak of classified documents in American history. He awaits trial on charges that could put him in prison for 52 years, according to the Army.

Even as members of Congress denounce both men’s actions as criminal, the Justice Department is still looking for a charge it can press against Mr. Assange, demanding from Twitter the account records, credit card numbers and bank account information of several of his associates. Legal experts say there are many obstacles to a prosecution of the WikiLeaks founder, but one approach under consideration is to link the two men in a conspiracy to disclose classified material.

Accusations from supporters that Private Manning is being mistreated, perhaps to pressure him to testify against Mr. Assange, have rallied many on the political left to his defense. The assertions have even drawn the attention of the United Nations’ special rapporteur on torture, Juan E. Mendez, who said he had submitted a formal inquiry about the soldier’s treatment to the State Department.

Private Manning’s cause has been taken up by the nation’s best-known leaker of classified secrets, Daniel Ellsberg, who gave the Pentagon Papers to the press in 1971. He denounces Private Manning’s seven months in custody and media coverage that has emphasized the soldier’s sexual orientation (he is gay) and personal troubles. Mr. Ellsberg, 79, calls him a courageous patriot.

“I identify with him very much,” Mr. Ellsberg said. “He sees the wars in Iraq and Afghanistan, I’d say correctly, as I saw Vietnam — as hopeless ventures that are wrong and involve a great deal of atrocities.”

The military rejects accusations that Private Manning has been mistreated. “Poppycock,” said Col. T. V. Johnson, a Quantico spokesman. He insisted that the conditions of confinement were dictated by brig rules for a pretrial detainee like Private Manning. The soldier has been designated for “maximum custody” — applied because his escape would pose a national security risk — and placed on “prevention-of-injury watch,” restrictions imposed so that he does not injure himself.

That status is based on the judgment of military medical experts and the observations of brig guards, Colonel Johnson said. Guards check Private Manning every five minutes but allow him to sleep without interruption from 10 p.m. to 5 a.m., when only dim night lights are on, unless they need to wake him to be certain he is breathing.

Colonel Johnson denied that Private Manning was in solitary confinement, as has been widely claimed, saying that he could talk with guards and with prisoners in nearby cells, though he could not see them. He leaves his 6-by-12-foot cell for a daily hour of exercise, and for showers, phone calls, meetings with his lawyer and weekend visits by friends and relatives, the colonel said.

The prisoner can read and watch television and correspond with people on an approved list. He is not permitted to speak to the media.

“Pfc. Manning is being treated just like every other detainee in the brig,” said an internal military review concluded on Dec. 27 and read to a reporter by Colonel Johnson. “His treatment is firm, fair and respectful.”

The soldier’s lawyer, David E. Coombs, declined to comment for this article, and two people who have visited him at Quantico — Private Manning’s aunt, Debra Van Alstyne, and a friend who is an M.I.T. graduate student, David M. House — did not respond to queries.

In an interview with MSNBC last month, Mr. House said of his friend that he had “noticed a remarkable decline in his psychological state and his physical well-being.” He said that Private Manning appeared “very weak from a lack of exercise” and that “psychologically, he has difficulty keeping up with some conversational topics.”

In an account on Mr. Coombs’s Web site of his client’s “typical day,” he detailed the restrictions on the soldier but called the guards’ conduct “professional.”

“At no time have they tried to bully, harass or embarrass Pfc. Manning,” he wrote.

Asked why the case appears to be moving so slowly, an Army spokeswoman, Shaunteh Kelly, said that the defense had requested a delay in July and that a “706 board,” or mental health evaluation, was not complete.

She added in an e-mail that “Cases involving computers and classified information are very complex and require methodical investigation,” and that all lawyers, members of the 706 board and military investigators needed to get proper clearances.

Mr. Assange, with his provocative statements, his recognizable shock of white hair and the accusations of sexual misconduct he faces in Sweden, has become WikiLeaks’s public face. But while he began WikiLeaks in 2006, overseeing a steady trickle of revelations, the site drew broad attention for the first time only when it began to release the material that Private Manning is accused of downloading from his computer in Iraq, where he was a low-level intelligence analyst.

The material includes a video showing two American helicopters shooting at people in Baghdad in 2007, two of them Reuters journalists who were killed; thousands of field reports on the wars in Iraq and Afghanistan; and 251,287 cables sent between American embassies and the State Department.

If Private Manning was indeed the source of the documents, as he suggested in online chat logs made public by Wired magazine, it is he who is largely responsible for making WikiLeaks a household name and the target of fury from the Pentagon, the State Department and members of Congress of both parties.

He is the only person charged in the WikiLeaks case so far. And despite his supporters’ suspicions that he will be pressured to testify against Mr. Assange, the Army spokeswoman, Ms. Kelly, said that to date, Private Manning had not spoken with civilian investigators or prosecutors.

Mr. Assange has often spoken highly of the soldier, to whose defense fund WikiLeaks has donated more than $100,000. In an article in the British magazine New Statesman on Thursday that called Private Manning “the world’s pre-eminent prisoner of conscience,” Mr. Assange said he believed the Justice Department’s goal was to force the soldier to confess “that he somehow conspired with me to harm the security of the United States.”

“Cracking Bradley Manning is the first step,” Mr. Assange said.

    Accused Soldier in Brig as WikiLeaks Link Is Sought, NYT? 13.1.2011, http://www.nytimes.com/2011/01/14/world/14manning.html

 

 

 

 

 

U.S. Subpoenas Twitter Accounts of WikiLeaks Figures

 

January 8, 2011
The New York Times
By JOHN F. BURNS and RAVI SOMAIYA

 

LONDON — The United States Department of Justice has issued a subpoena for the Twitter account activity of several people linked to the WikiLeaks organization, including its founder, Julian Assange, according to the group and official documents.

The subpoena, issued last month, offers the most detail yet about how the United States government is conducting its investigation, and likely prosecution, of WikiLeaks officials and their anti-secrecy campaign to release classified and often highly sensitive documents on the Internet. A task force composed of dozens of Pentagon and justice department officials, among others, has been active for months in investigating the damage done to American diplomatic and military operations.

The quest to get the information from five prominent figures at the group was revealed Saturday when Birgitta Jonsdottir, a former WikiLeaks activist who is also a member of Iceland’s parliament, received a notification of the subpoena from Twitter, a social Web site that allows users to post short messages. The United States government, she said in a subsequent message, “wants to know about all my tweets and more since November 1st 2009.” The subpoena, obtained by the Web site Salon.com, was issued by the United States Attorney for the Eastern District of Virginia on Dec. 14 and asks for the complete account information of Pfc. Bradley Manning, the United States Army intelligence specialist awaiting a military court martial under suspicion of leaking materials to WikiLeaks, as well as Ms. Jonsdottir, Mr. Assange and two computer programmers, Rop Gongrijp and Jacob Appelbaum.

Mr. Appelbaum wrote on his Twitter account on Saturday that the lawyers for the short-messaging service had been responsible for getting the grand jury subpoena unsealed and warned followers against sending him private messages. “Do not send me Direct Messages,” he wrote. “My twitter account contents have apparently been invited to the (presumably-Grand Jury) in Alexandria.”

While many messages on Twitter are posted publicly, the service also allows users to send private or “direct” messages to other users.

The subpoena was unsealed on Jan. 5, which allowed Twitter to inform those concerned.

The facsimile of the subpoena showed that it had been authorized by the U.S. attorney’s office in Alexandria, Va., outside Washington, an office that has often been used by the federal government in highly sensitive criminal inquiries. Some published reports in recent weeks have suggested that the justice department may have secretly empanelled a grand jury in Virginia to take evidence in the WikiLeaks probe. But a tickbox on the subpoena saying “grand jury information” was left blank.

Ms. Jonsdottir did not immediately return messages seeking comment but has said in messages on Twitter that she will fight the subpoena.

Of the five individuals named in the subpoena, only two — Mr. Manning and Jacob Appelbaum — are American citizens. The others include an Australian, Mr. Assange, Ms. Jonsdottir, from Iceland, Mr. Gongrijp, a Dutch national. This immediately raised the possibility of a diplomatic row between the United States and allied nations whose citizens were among those covered by the subpoena. They could argue that American laws were being used to stifle free communications between individuals who were not American citizens, and who were not in the United States at the time of the messages that were the target of the subpoena.

An early indication of the potential for protest came from Ms. Jonsdottir, the Icelandic parliamentarian, who used her Twitter account to ask, “Do they realize I am a member of parliament in Iceland?” In a later Twitter messages, she said she had spoken to Iceland’s minister of justice, who, she said, was “now looking into the case.” She said she had also spoken to Iceland’s interior minister, Ogmundur Jonasson, who, she said, had described the subpoena as “very odd and grave.”

Twitter said it would not comment on the specific case, but noted that its policy is “to notify users about law enforcement and governmental requests for their information, unless we are prevented by law from doing so.”

In messages on its own Twitter feed, WikiLeaks confirmed the subpoena, and suggested that Google and Facebook might also have been issued with such legal demands. A communications official for Facebook said on Saturday that the company had no comment.

The unsealed subpoena offers the first window into how the United States has been maneuvering to build its case against Mr. Assange. The government, in seeking all information related to the accounts since Nov. 1, 2009, is likely hoping to discover private discussions about the leaks or details of timing to help prove that either Mr. Assange or one of his surrogates pushed Mr. Manning to leak the government documents.

The Justice Department has so far avoided discussing details its investigation into WikiLeaks and declined to outline any grand jury activity, though Attorney General Eric Holder said he authorized investigators to take “significant” steps.

But those familiar with the department’s actions said there is intense pressure to find some way of criminally prosecuting Mr. Assange as a co-conspirator in order to deter future large-scale leaks via the Internet. The subpoena, unsealed on Saturday, describes an “ongoing criminal investigation.”

By seeking to prove Mr. Assange was a conspirator in the leak, the government seeks to differentiate the actions of WikiLeaks from those of traditional news organizations or investigative journalists who also disclose government information.

The United States has also taken steps to protect against future leaks, including suggesting employees of various agencies that handle sensitive material take measures to evaluate the “trustworthiness” of co-workers, according to a memo circulated last week by the Office of Management and Budget.

The memo, distributed to the heads of all executive branch departments and agencies, urged managers to implement programs that can evaluate “insider threats” and “detect behavioral changes in cleared employees.”

“Do you use a psychiatrist or sociologist to measure despondence and grumpiness as a means to gauge waning trustworthiness?” the memo asks agencies to consider.

In a message on Saturday, WikiLeaks compared the subpoena to the Iranian government seeking information on activists in that country. Using the acronym for direct messages, the only messages on Twitter that are not publicly accessible for some users, it said, “If the Iranian govt asked for DMS of Iranian activists, State Dept. would be all over this violation of ‘Internet freedom.’ ”

 

J. David Goodman contributed reporting from New York.

    U.S. Subpoenas Twitter Accounts of WikiLeaks Figures, NYT, 8.1.2011, http://www.nytimes.com/2011/01/09/world/09wiki.html

 

 

 

 

 

U.S. Cautions People Named In Cable Leaks

 

January 6, 2011
The New York Times
By MARK LANDLER and SCOTT SHANE

 

WASHINGTON — The State Department is warning hundreds of human rights activists, foreign government officials and businesspeople identified in leaked diplomatic cables of potential threats to their safety and has moved a handful of them to safer locations, administration officials said Thursday.

The operation, which involves a team of 30 in Washington and embassies from Afghanistan to Zimbabwe, reflects the administration’s fear that the disclosure of cables obtained by the organization WikiLeaks has damaged American interests by exposing foreigners who supply valuable information to the United States.

Administration officials said they were not aware of anyone who has been attacked or imprisoned as a direct result of information in the 2,700 cables that have been made public to date by WikiLeaks, The New York Times and several other publications, many with some names removed. But they caution that many dissidents are under constant harassment from their governments, so it is difficult to be certain of the cause of actions against them.

The officials declined to discuss details about people contacted by the State Department in recent weeks, saying only that a few were relocated within their home countries and that a few others were moved abroad.

The State Department is mainly concerned about the cables that have yet to be published or posted on Web sites — nearly 99 percent of the archive of 251,287 cables obtained by WikiLeaks. With cables continuing to trickle out, they said, protecting those identified will be a complex, delicate and long-term undertaking. The State Department said it had combed through a majority of the quarter-million cables and distributed many to embassies for review by diplomats there.

“We feel responsible for doing everything possible to protect these people,” said Michael H. Posner, the assistant secretary of state for democracy, human rights and labor, who is overseeing the effort. “We’re taking it extremely seriously.”

Contrary to the administration’s initial fears, the fallout from the cables on the diplomatic corps itself has been manageable. The most visible casualty so far could be Gene A. Cretz, the ambassador to Libya, who was recalled from his post last month after his name appeared on a cable describing peculiar personal habits of the Libyan leader, Col. Muammar el-Qaddafi. While no decision has been made on Mr. Cretz’s future, officials said he was unlikely to return to Tripoli. In addition, one midlevel diplomat has been moved from his post in an undisclosed country.

But other senior diplomats initially considered at risk — for example, the ambassador to Russia, John R. Beyrle, whose name was on cables critical of Prime Minister Vladimir V. Putin — appeared to have weathered the disclosures.

There is anecdotal evidence that the disclosure of the cables has chilled daily contacts between human rights activists and diplomats. An American diplomat in Central Asia said recently that one Iranian contact, who met him on periodic trips outside Iran, told him he would no longer speak to him. Sarah Holewinski, executive director of the Campaign for Innocent Victims in Conflict, said people in Afghanistan and Pakistan had become more reluctant to speak to human rights investigators for fear that what they said might be made public.

WikiLeaks came under fire from human rights organizations last July, after it released a large number of documents about the war in Afghanistan without removing the names of Afghan citizens who had assisted the American military. When it later released documents about the Iraq war, the group stripped names from the documents.

A Pentagon spokesman, Maj. Chris Perrine, said Thursday that the military was not aware of any confirmed case of harm to anyone as a result of being named in the Afghan war documents. But he noted that the Taliban had said it would study the WikiLeaks documents to punish collaborators with the Americans.

State Department officials believe that a wide range of foreigners who have spoken candidly to American diplomats could be at risk if publicly identified. For example, a businessman who spoke about official corruption, a gay person in a society intolerant of homosexuality or a high-ranking government official who criticized his bosses could face severe reprisals, the officials said.

Human rights advocates share the State Department’s concern that many people could be at risk if cables become public without careful redaction. “There are definitely people named in the cables who would be very much endangered,” said Tom Malinowski, Washington director for Human Rights Watch.

In one case, Mr. Malinowski said, the State Department asked Human Rights Watch to inform a person in a Middle Eastern country that his exchanges with American diplomats had been reported in a cable.

In addition to The Times, The Guardian, Le Monde, El País and Der Spiegel have had the entire cable database for several months. The Norwegian newspaper Aftenposten said last month that it had obtained the entire collection, and newspapers in several other countries have obtained a selection of cables relating to their regions.

WikiLeaks’s founder, Julian Assange, has said the group will continue to release additional cables on its own Web site as well, though to date it has moved cautiously and has reproduced the redactions made by newspapers publishing the cables.

Government officials are also worried that foreign intelligence services may be trying to acquire the cable collection, a development that would heighten concerns about the safety of those named in the documents.

For human rights activists in this country, disclosures by WikiLeaks, which was founded in 2006, have been a decidedly mixed development. Amnesty International gave WikiLeaks an award in 2009 for its role in revealing human rights violations in Kenya. Human Rights Watch wrote to President Obama last month to urge the administration not to pursue a prosecution of WikiLeaks or Mr. Assange.

But they are concerned that the cables could inflict their own kind of collateral damage, either by endangering diplomats’ sources or discouraging witnesses and victims of abuses from speaking to foreign supporters.

Sam Zarifi, director of Amnesty International’s operations in Asia, said the cables had provided valuable “empirical information” on abuses in several countries. “This is a new way to distribute information,” Mr. Zarifi said. “We just want to make sure it has the same safeguards as traditional journalism.”

    U.S. Cautions People Named In Cable Leaks, NYT, 6.1.2011, http://www.nytimes.com/2011/01/07/world/07wiki.html

 

 

 

 

 

Facing Threat From WikiLeaks, Bank Plays Defense

 

January 2, 2011
The New York Times
By NELSON D. SCHWARTZ

 

By the time the conference call ended, it was nearly midnight at Bank of America’s headquarters in Charlotte, N.C., but the bank’s counterespionage work was only just beginning.

A day earlier, on Nov. 29, the director of WikiLeaks, Julian Assange, said in an interview that he intended to “take down” a major American bank and reveal an “ecosystem of corruption” with a cache of data from an executive’s hard drive. With Bank of America’s share price falling on the widely held suspicion that the hard drive was theirs, the executives on the call concluded it was time to take action.

Since then, a team of 15 to 20 top Bank of America officials, led by the chief risk officer, Bruce R. Thompson, has been overseeing a broad internal investigation — scouring thousands of documents in the event that they become public, reviewing every case where a computer has gone missing and hunting for any sign that its systems might have been compromised.

In addition to the internal team drawn from departments like finance, technology, legal and communications, the bank has brought in Booz Allen Hamilton, the consulting firm, to help manage the review. It has also sought advice from several top law firms about legal problems that could arise from a disclosure, including the bank’s potential liability if private information was disclosed about clients.

The company’s chief executive, Brian T. Moynihan, receives regular updates on the team’s progress, according to one Bank of America executive familiar with the team’s work, who, like other bank officials, was granted anonymity to discuss the confidential inquiry.

Whether Mr. Assange is bluffing, or indeed has Bank of America in its sights at all, the bank’s defense strategy represents the latest twist in the controversy over WikiLeaks and Mr. Assange.

The United States government has been examining whether Mr. Assange, an Australian, could be charged criminally for the release by WikiLeaks of hundreds of thousands of classified Pentagon and State Department diplomatic cables that became the subject of articles in The New York Times and other publications last month.

The Swedish government is also seeking to question Mr. Assange about rape accusations against him. As he fights extradition from Britain in that case, he remains under house arrest in an English mansion. Mr. Assange has said the timing of the rape accusations was not coincidental, and that he was the victim of a smear campaign led by the United States government.

Despite his legal troubles, Mr. Assange’s threats have grown more credible with every release of secret documents, including those concerning the dumping of toxic waste in Africa, the treatment of prisoners held by the United States at Guantánamo Bay, the wars in Iraq and Afghanistan and, most recently, the trove of diplomatic cables.

That Mr. Assange might shift his attention to a private company — especially one as politically unpopular as Bank of America or any of its rivals, which have been stained by taxpayer-financed bailouts and the revelation of improper foreclosure practices — raises a new kind of corporate threat, combining elements of law, technology, public policy, politics and public relations.

“This is a significant moment, and Bank of America has to get out in front of it,” said Richard S. Levick, a veteran crisis communications expert. “Corporate America needs to look at what happens here, and how Bank of America handles it.”

Last month, the bank bought up Web addresses that could prove embarrassing to the company or its top executives in the event of a large-scale public assault, but a spokesman for the bank said the move was unrelated to any possible leak.

Then, on Dec. 18, Bank of America may have antagonized Mr. Assange further when it said it would join other companies like MasterCard and PayPal in halting the processing of payments intended for WikiLeaks, citing the possibility the organization’s activities might be illegal.

Mr. Assange has never said explicitly that the data he possesses comes from Bank of America, which is the nation’s largest bank, though he did say that the disclosure would take place sometime early this year.

The bank has emerged as the most likely target because a year before the latest threat, Mr. Assange said in an interview that his group had the hard drive of a Bank of America executive containing five gigabytes of data — enough to hold more than 200,000 pages of text — and was evaluating how to present it. It was this connection that set the wheels in motion on Nov. 30.

The financial markets took the threat seriously. Bank of America shares fell 3 percent in trading the day after Mr. Assange made his threat against a nameless bank, and while the stock has since recovered, the prospect of a Bank of America data dump from WikiLeaks remains a concern, said Moshe Orenbuch, an analyst with Credit Suisse.

“The fears have calmed down somewhat, but if there is something out there that is revealed, the market reaction will be negative,” he said.

Bank of America’s internal review has turned up no evidence that would substantiate Mr. Assange’s claim that he has a hard drive, according to interviews with executives there. The company declined to otherwise comment on the case. A WikiLeaks representative also declined to comment.

With the data trail cold, one working theory both inside and outside the bank is that internal documents in Mr. Assange’s possession, if any, probably came from the mountains of material turned over to the Securities and Exchange Commission, Congressional investigators and the New York attorney general’s office during separate investigations in 2009 and 2010 into the bank’s acquisition of Merrill Lynch.

As it happens, Mr. Assange’s first mention of the Bank of America hard drive, in October 2009, coincided with hearings by the House Committee on Oversight and Government Reform into the Merrill merger, and with wide-ranging requests for information by the committee.

The bank’s investigative team is trying to reconstruct the handover of materials to public agencies for a variety of inquiries, in pursuit of previously undisclosed documents that could embarrass the company, bank officials said.

In addition to the Merrill documents, the team is reviewing material on Bank of America’s disastrous acquisition in 2008 of Countrywide Financial, the subprime mortgage specialist, the officials said. The criticism of Bank of America’s foreclosure procedures centers mostly on loans it acquired in the Countrywide deal, and one possibility is that the documents could show unscrupulous or fraudulent lending practices by Countrywide.

If that is the case, it would not only reignite political pressure on Bank of America and other top mortgage servicers, but it could also strengthen the case of investors pressuring the big banks to buy back tens of billions in soured mortgages.

“If something happens, we want to be ready,” one bank official said. “You want to know what your options are before it comes out, rather than have to decide on the spot.” Bank of America’s efforts are complicated by the fact that it has made several huge acquisitions in recent years, and those once-independent companies had different computer systems and security procedures.

WikiLeaks has taken on private companies in the past, including leaking documents from Barclays of Britain and Bank Julius Baer of Switzerland, but neither disclosure drew nearly as much attention.

Officials at the S.E.C., the House oversight committee and the New York attorney general’s office insist the information they received had been turned over in the form of papers and discs, never a hard drive, and deny they are the source of the WikiLeaks cache.

At the same time, Mr. Assange’s own statements would seem to undermine the government-as-source theory, hinting instead that resignations might follow as evidence emerges of corruption among top executives, something the public investigations never found.

“It will give a true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms, I presume,” he said in the November 2010 interview with Forbes. “For this, there’s only one similar example. It’s like the Enron e-mails.”

 

Eric Dash and Louise Story contributed reporting.

    Facing Threat From WikiLeaks, Bank Plays Defense, NYT, 2.1.2010, http://www.nytimes.com/2011/01/03/business/03wikileaks-bank.html

 

 

 

home Up