Main

January 24, 2008

Buying a Criminal Record


Record labels seek piracy clampdown

The record industry has called on internet service providers and governments to take stronger action against digital piracy, after revealing that another year of strong digital growth had failed to compensate for the continued slump in CD sales.

According to the 2008 IFPI digital music report released today, global sales of digital music via the internet and mobile phones grew by 40% to an estimated $2.9bn (£1.48bn) last year.

Some of the ongoing structural problems of the music industry date back to its delayed and confused reaction to the emergence of file-sharing and digital distribution at the turn of the century.


Having seen groups of illegal immigrants selling a whole range of DVDs and CDs for as little as €2.50 each in the larger towns - I am shocked the the recording industry hasn't figured out what everybody else knows - the primary vectors for copyright theft on a grand scale are criminals - not music lovers.

If people are quite happy to pay out €2.50 for the music they want - even if it comes in a plastic envelope with a shoddy photocopy inside - is the slump in music sales really due to the Internet? Or is it that people are fed up with paying through the nose for music?

The people who download music are taking a single copy for their personal use, the people who rip their CD collections to their iPods are merely "device shifting" what they already own - but these criminals are stealing music for resale purposes and making a handsome profit from other people's work.

Who are the biggest criminals?

Meanwhile in Spain we will soon have no option but to subsidise the music and movie industry through a tax on CD's and DVD's called the "Digital Canon" - so everytime I make a backup of my system or distribute my own music on a CD I will be paying Big Media for the privilege of copying my own files

Now that is what I call criminal ...

Tags: , , , ,

January 21, 2008

Lip Reading Machines


Via Slashdot

"Researchers at the University of East Anglia are working to develop computerized lip-reading systems. Lip-reading is extremely hard for humans to master, but a software-based system has several benefits over even the most highly trained expert. The ultimate goal of the project is to convert lip-read speech into text. 'Apart from being extremely helpful to hearing-disabled individuals, researchers say that such a system could be used to noiselessly dictate commands to electronic devices equipped with a simple camera - like mobile phones, microwaves or even a car's dashboard. England's Home Office Scientific Development Branch ... is currently investigating the feasibility of using lip-reading software as an additional tool for gathering information about criminals or for collecting evidence.'"


After automatic "recogniiton" of numberplates, automatic "recognition" of faces and the automatic "recognition" of "brand marks" - will the automatic "recognition" of lip-reading be the next thing ...

What we don't get told very often is the success rate of programmes like these - and of course - the failure rate ..

If my "lip reading computer" has a 0.001 chance of mis-reading somebody's lips - and its is then let loose on 50,000,000 people what are the chances of it getting it wrong?

Will the "evidence" from "lip reading computers" ever stand up in court?

Tags: , , , , ,

January 16, 2008

Endemic Surveillance Micro-Societies

Microsoft seeks patent for office 'spy' software - Times Online

Microsoft is developing Big Brother-style software capable of remotely monitoring a worker’s productivity, physical wellbeing and competence.

The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees’ performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computer’s assessment of their physiological state.

Technology allowing constant monitoring of workers was previously limited to pilots, firefighters and Nasa astronauts. This is believed to be the first time a company has proposed developing such software for mainstream workplaces.

Microsoft submitted a patent application in the US for a “unique monitoring system” that could link workers to their computers. Wireless sensors could read “heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure”, the application states.

The system could also “automatically detect frustration or stress in the user” and “offer and provide assistance accordingly”. Physical changes to an employee would be matched to an individual psychological profile based on a worker’s weight, age and health. If the system picked up an increase in heart rate or facial expressions suggestive of stress or frustration, it would tell management that he needed help.

The old question - "who watches the watchers?" comes to mind.

How will monitoring "heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure" help produce a better and more productive workforce?

Worse still - could the manipulation of these parameters within the software of this new "Working Police" be used to make a more compliant (but less productive) work-force ??

Either way - very soon we all will learn to chant "I Love Big Brother, I Love Big Brother" - because the software that records all this will let "Big Brother" (or even "Little Brother") know when we are telling the truth or not ..

The implications of this kind of monitoring are too vast to explore in one post - but right now I would expect an upsurge in colleges that teach Zen Buddhist meditational techniques to enable workers to hide their real feelings and hack the system ...

Now repeat after me "I love little brother, I love little brother" ...


Tags: , , , , , , , , , ,

January 15, 2008

"Server in the Sky"


FBI wants instant access to British identity data

The US-initiated programme, "Server in the Sky", would take cooperation between the police forces way beyond the current faxing of fingerprints across the Atlantic. Allies in the "war against terror" - the US, UK, Australia, Canada and New Zealand - have formed a working group, the International Information Consortium, to plan their strategy.

Biometric measurements, irises or palm prints as well as fingerprints, and other personal information are likely to be exchanged across the network. One section will feature the world's most wanted suspects. The database could hold details of millions of criminals and suspects.

Britain's National Policing Improvement Agency has been the lead body for the FBI project because it is responsible for IDENT1, the UK database holding 7m sets of fingerprints and other biometric details used by police forces to search for matches from scenes of crimes. Many of the prints are either from a person with no criminal record, or have yet to be matched to a named individual.

...

The FBI is proposing to establish three categories of suspects in the shared system: "internationally recognised terrorists and felons", those who are "major felons and suspected terrorists", and finally those who the subjects of terrorist investigations or criminals with international links. Tom Bush, assistant director at the FBI's criminal justice information service, has said he hopes to see a pilot project for the programme up and running by the middle of the year.


How does one get your name taken off the list if it is entered in error?

Or will pie server in the sky be like the "No-Fly" list which is full of errors and is impossible to get off?


Tags: , , ,

January 14, 2008

Organs to be taken without consent

Organs to be taken without consent - Telegraph

The proposals would mean consent for organ donation after death would be automatically presumed, unless individuals had opted out of the national register or family members objected.

As if ID cards and lost data weren't a problem for the UK government - they are now committing themselves to yet another register of people - which, of course, we can trust - won't just be a money pit but will also ensure data security ...

I can just see it now - the "Death Register" makes the mistake of saying that you are dead and the "Opt-Out Register" can't find your name - the next thing you know they are cutting out your kidneys for resale recycling and the guy with the scalpel is saying "Sorry - but I'm just doing my job. See - your name is on this list (holds up deathlist printout) and this list (holds up unreadable fax copy of portion of opt-out list) and therefore - your kidneys are mine!!"

Wouldn't happen? Try reading this ...


Tags: , , , ,

January 9, 2008

Plant "logic bomb" - Go Directly to Jail ..

Medco sys admin gets 30 months for planting logic bomb

A former systems administrator at Medco Health Solutions Inc. was sentenced to 30 months in federal prison today for planting a logic bomb that could have taken down a corporate network that held customer health care information.

Yung-Hsun Lin, 51, of Montville, N.J., was sentenced in U.S. District Court in Newark, N.J. Lin, who faced a maximum of 10 years in prison, pleaded guilty to one count of computer fraud in September. He was responsible for programming and maintaining the servers at Medco, where he worked from 1997 to 2005.

This "young hacker" - only 51 - has just been found guilty of planting a "logic bomb" in the systems where he worked ...


Tags: , , , , ,

Chip 'n' Pin

Sounds like a pair of drunken chipmunks ...

The Yorkshire Ranter

Incredibly, years after Professor Ross Anderson's successful war with the banks forced them to admit first that card fraud existed, secondly that it was a problem, and thirdly that one major bank's IT department was implicated, and finally to replace the system, one of his PhD students is having to refight the war all over again - this time, because the banks are trying to deny that it is possible to breach Chip-and-PIN. Despite the existence of multiple security breaches, notably the failover attack in which readers are sabotaged so that the chip cannot be read, and the reader instead reads data off the back-up magnetic stripe, which is then used to make withdrawals in a non-PIN country, the yes card attack, in which a fake card is prepared whose chip responds "yes" to any given PIN, and the possibility of large-scale reader subversion (at least one type of card reader uses a small linux OS which can be remotely managed over a wide-area network; if the administrator security is compromised, an online attacker could do anything they liked with them. These are the ones involved in the Shell security breach), they are still trying to claim infallibility.

.. but is still not secure ...


Tags: , , , , ,

January 5, 2008

Hacking Airplanes - the Next Big Thing?


FAA: Boeing's New 787 May Be Vulnerable to Hacker Attack

Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems, according to the U.S. Federal Aviation Administration.

The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to the plane's control, navigation and communication systems, an FAA report reveals.

The revelation is causing concern in security circles because the physical connection of the networks makes the plane's control systems vulnerable to hackers. A more secure design would physically separate the two computer networks. Boeing said it's aware of the issue and has designed a solution it will test shortly.

What Boeing should do it hire in some hackers to do a proper "penetration test" on the networks before allowing passengers anywhere near the thing.

As for the other "technical solutions" which were "proprietary" we all know that this type of "security through obscurity" never works - somewhere in the technical manuals for this plane - which are vital to all the maintenance engineers - there will be enough details to figure it all out.


Tags: , ,

£2bn Wasted on Failed Computer Projects

Not fit for purpose: £2bn cost of government's IT blunders | Technology | The Guardian

The cost to the taxpayer of abandoned Whitehall computer projects since 2000 has reached almost £2bn - not including the bill for an online crime reporting site that was cancelled this week, a survey by the Guardian reveals.

The failure of the multimillion pound police site marks the latest chapter in the government's litany of botched IT projects, with several costly schemes biting the dust. Major blunders overseen by Downing Street have included the Child Support Agency's much-derided £486m computer upgrade - which collapsed and forced a £1bn claims write-off - and an adult learning programme that was subjected to extensive fraud.

Top of the ministries for wasting public money is the Department for Work and Pensions, which squandered more than £1.6bn by abandoning three major schemes - a new benefit card which was based on outdated technology; the upgrade to the CSA's computer which could not handle 1.2m existing claims; and £140m on a streamlined benefit payment system that never worked properly.

You could not make this up!! Why is the UK so incapable of getting IT right? How can we trust them to build new projects like ID cards and the proposed child registration database when they are so utterly useless at other projects?

Of course we already know we can trust them with our data - now we know we can trust them with major IT projects as well.

What we really need to do is start sacking the incompetents in charge of these projects - but given the way things work they are more likely to get promoted above their ability and end up with a "K" instead ...


Tags: , ,

January 2, 2008

Digital Bubble

Advertising analysts lay their cards on the table - Times Online

Internet search is expected to contribute up to three quarters of all advertising revenue growth this year, while traditional media stagnates, according an influential industry forecaster.

WPP’s GroupM predicts that advertising will grow by 6 per cent in 2008, but without the contribution from Google and other search engines, the rate of improvement across other media would be only 1.5 per cent.

Internet advertising will also come close to overtaking television advertising in 2008, emphasising how fast the new medium has become a mainstream means of promotion. This year internet spending is predicted to hit £3.4 billion, up from £2.6 billion in 2007, on GroupM’s estimates.

The "Internet ad-boom" is only going to work if the utility of the services doesn't approach zero ... once spam-infested email and "drive by" infections become the norm - people will treat adverts on the web like they do viruses now ..


Tags: , , , , , ,

December 31, 2007

Mandatory Internet filters to "protect children"


Conroy announces mandatory internet filters to protect children - ABC News (Australian Broadcasting Corporation)

Senator Conroy says anyone wanting uncensored access to the internet will have to opt out of the service.

He says the Government will work with the industry to ensure the filters do not affect the speed of the internet.

"There are people who are going to make all sorts of statements about the impact on the [internet] speed," he said.

"The internet hasn't ground to a halt in the UK, it hasn't ground to a halt in Scandinavian countries and it's not grinding the internet to a halt in Europe.

I really can't think how this is going to "protect children" - transnational white slave gangs operating in countries with little regulation will continue to abuse children for profit while pampered perverts from rich nations will always be able to access the material they want.

The whole thing is like putting your fingers in your ears and going "la-la-la-la" in a pretence the problem doesn't exist - if anyone really wanted to crack down on this kind of thing they would "follow the money" to its conclusion and then arrest those responsible instead of applying "out of sight out of mind" band-aids ...

... but I forget - its not really about "child-porn" is it? Its all about more censorship on the Internet using child-porn as an excuse ...


Tags: , , , , ,

April 3, 2007

The Slow Death of DRM

A step in the right direction as EMI Music launches DRM-free superior sound quality downloads across its entire digital repertoire

The new higher quality DRM-free music will complement EMI's existing range of standard DRM-protected downloads already available. From today, EMI's retailers will be offered downloads of tracks and albums in the DRM-free audio format of their choice in a variety of bit rates up to CD quality. EMI is releasing the premium downloads in response to consumer demand for high fidelity digital music for use on home music systems, mobile phones and digital music players. EMI's new DRM-free products will enable full interoperability of digital music across all devices and platforms.

Eric Nicoli, CEO of EMI Group, said, "Our goal is to give consumers the best possible digital music experience. By providing DRM-free downloads, we aim to address the lack of interoperability which is frustrating for many music fans. We believe that offering consumers the opportunity to buy higher quality tracks and listen to them on the device or platform of their choice will boost sales of digital music.

One of my biggest complaints about online downloads is the quality of the damned things - the use of low bitrate MP3 just kills music for anything other than tiny speakers or tinny earpods - allowing for CD quality downloads DRM free is a major breakthrough for music lovers everywhere.

Lets hope other companies follow suit.


Tags: , ,

Gary McKinnon Extradited

The subject of Gary McKinnon has come up here before - because it looks like he is getting a bum rap for what he did.

Now - finally - the appeals process is exhausted and the news today is that UK hacker loses extradition fight - not that there was much chance of the government changing their minds of course.

Glasgow-born Gary McKinnon, 41, is accused of gaining access to 97 US military and Nasa computers.

Home Secretary John Reid granted the US request to extradite him for trial.

At the High Court in London, his lawyers argued he had been subjected to "improper threats" and the move would breach his human rights.

His lawyers had argued that, if extradited, he would face an unknown length of time in pre-trial detention, with no likelihood of bail.

He would also face a long prison sentence, "in the region of 45 years" and may not be allowed to serve part of the sentence at home in the UK, Edmund Lawson QC said.

The question now is - how much of the trial will be publicised and whether they bother to mention that the sys-admins of these sites failed to change the default password on a piece of commercial software - or whether they sweep inconvenient facts under the carpet in the name of "national security"?

Strikes me the whole thing is a complete waste of time - a fine example of "security theatre" which will end in a showtrial and maximum publicity - while meanwhile hostile cyber-criminals and hacktivists will continue to make the Internet a battlefield every time something racks up international tension.

Wake up Department of Homeland Security!! There really are people out there who want to harm you!!

But from all appearences Gary McKinnon was not one of them ...


Tags: , , , ,

March 21, 2007

Creative Commons DJ Mixes

A long, long time ago - I noted that I was reviewing Creative Commons Copyright music with the express intention of mixing a Creative Commons Copyright CD mix.

I still am ... its just that the amount and quality of CC MP3 music is overwhelming

My original game plan was this:

(i) listen to the CC MP3 music

(ii) choose tracks I wanted to mix

(iii) convert to CD - because I mix with CD or vinyl

(iv) cut the mix live to a master

(v) remaster the cd and ensure it was good

(vi) print up the worst covers possible in the universe - so they looked like "illegal DJ mixes" - and then cut a dozen copies and give them away free to people who promised to give them away free

But - the big stumbling block is ...

... I am still trying to work out which tracks to mix - becuase there is so much stuff available

I started by going to Legal Torrents - but later spread my search to CCHits a ning type thing that allows linking and voting on tracks in the Digg style ..

All of this is a bad mistake if you have things to do - but great if you want to listen to CC MP3's ..

The upshot of it all is that I am still listening to music and trying to figure out which tracks are worth mixing ..

Some time this century I will cut my fave tracks to CD, make a mix and see if it is possible to give it away for free.

Because first - of course - I need to licence the tracks with the parties involved even if I am giving it away for free

"Some rights reserved" means I have to respect the rights of the CC copyright holders - thats why Creative Copyright exists

There will be more on this topic - just as soon as I finish listening to lots of music ...


Tags: , , , , , ,

March 15, 2007

National Security Threat

It turns out the US National Security is under threat - not from Terrorism, Cyber-Warfare or uncontrolled nuclear proliferation - but from File Sharing - not only that but File Sharing threatens our children too

But strangely enough - the report only mentions P2P File Sharing - there is nothing about the inbuilt security threats that are touted by companies such as Microsoft inlcudes in its products which are designed to enhance productivity which have been present in Windows ever since "Windows for Workgroups".

It makes some assertions which are nothing more than propaganda and rhetoric designed to put people off any form of P2P file sharing - even legal ones

because virtually everyone who uses a popular filesharing program appears to use it almost exclusively to download infringing files, a magazine or website seeking to do a meaningful review of filesharing programs would have to assess their relative efficicay as a means of copyright piracy. Perhaps for this reason, filesharing programs have become one of the most widely used, yet least discussed and reviewed computer programs on the market.

Note the weasel words "virtually everyone", "appears to use", and "almost exclusively" - no mention of any of the uses of P2P - no mention of the use of P2P to distribute FOSS software or legal CC MP3 files

Do popular search-and-download programs contain - or have they contained - features that can cause users to share files unintentionally?
Do popular Operating Systems contain - or have they contained - features that can cause users to share files unintentionally?

Well - its a long time since there were a large number of NFS and PC-NFS installations attached to the net which had /etc/passwd shared - but it used to happen.

Nobody tried to ban UNIX on the grounds that it was insecure - thank god - and the popularity of programs like SAMBA hasn't diminished because people could "unintentionally" share files.

I could also note that certain implementataions of "private web servers" using HTTPD easily allow "unintentional" file sharing - but that hasn't dented the popularity of "private web servers" in office environments (*shudder*) which, when miscongfigured constitute a major security risk.

This piece of selective misinformation is everything the RIAA and MPAA could hope for - not only is P2P filesharing a threat to society because people copy films and music, it is also a threat to National Security and a threat to our children - who somehow only need protecting when they are not paying for the violent garbage "content" that the MPAA and RIAA make so much money from ...


Tags: , , , , ,

March 1, 2007

No Guarantee for 10 Year Passports

From the "you couldn't make this up" department of NuLabour comes this following gem - via the BBC

Microchips in Britain's new ePassports only have two-year warranties, a National Audit Office report says.

They are so new, no-one knows how long they will last, or how the scanners reading them will work, the NAO said.

Public Accounts Committee chairman Edward Leigh said the fact they had a two-year warranty, when passports were kept for 10 years, was "most worrying".

More evidence of "jojned up thinking" from the government of choice for the UK - my only problem is that if you elect "the other lot" - they are bound to be just as stupid and corrupt as "this lot".

Like the old saying goes: "Whoever you vote for - the government always gets in".


Tags: , , , , , , , ,



January 30, 2007

I Feel Safer Already ...

The recent Washington Post story about how the NSA "helped" Microsoft to build Windows Vista makes me feel safer already ...

For the first time, the giant software maker is acknowledging the help of the secretive agency, better known for eavesdropping on foreign officials and, more recently, U.S. citizens as part of the Bush administration's effort to combat terrorism. The agency said it has helped in the development of the security of Microsoft's new operating system -- the brains of a computer -- to protect it from worms, Trojan horses and other insidious computer attackers.

"Our intention is to help everyone with security," Tony W. Sager, the NSA's chief of vulnerability analysis and operations group, said yesterday.

Why would I think that the NSA - of all people - would assist in making a computer "more secure" if it would thwart their efforts against the "War on Terror"?

Why is it that I suspect that the NSA intervention in this case is to ensure that in order to prosecute the "War on Terror" - they will cripple any form of security enhancements to enable a "back door" into Vista machines?

After all - if Windows Vista is as secure as Microsoft says it is - then the NSA and everyone else is going to have a harder time extracting evidence from the computers they examine - and not only that - but will also make it harder to plant Trojans and monitoring programs on the computers of terrorist suspects they are monitoring.

It doesn't make sense for the NSA to contribute technology that is a true "security enhancement" - because the last thing the NSA wants - is to make it harder for them to gather information.

Now there's a new slogan for Microsoft Vista - "I feel safer already" - except you are not.

Already Alex Ionescu is claiming to have cracked the "Driver Signing" problem.

If a well motivated hacker can crack this - for fun and all the right reasons - then think how many other people are working on this to provide us with a whole new generation of AdWare, Trojans and Monitoring software ..

Not to mention the NSA of course ...

Have I mentioned yet that I feel safer already ....


Tags: , , , , , ,


August 31, 2006

Censorship in the Router

The ultimate aim of the RIAA/MPAA anti-piracy lobby is to prevent the illegal copying of their content - you can see their point - but their methods aren't winning them any friends right now.

The problem is that they want to demonise file sharing of any kind - and not all P2P file sharers are copyright violation thieves - some of us just want to share files and try really, really, hard not to break the law.

But the announcement of this product makes the idea of including censorship in the router a reality

Allot Communications, a company specializing in "intelligent IP service optimization solutions" has unveiled the newest feature built into its NetEnforcer device. The device is now capable of detecting encrypted BitTorrent traffic. ISPs using the NetEnforcer will now be able to throttle BitTorrent traffic more efficiently.

As P2PNet observes, many ISPs recently began shaping their network traffic to keep BitTorrent users from sucking up all of the available bandwidth -- in some cases, BitTorrent accounts for half of an ISP's traffic. However, BT users were quick to work around the ISP's detection schemes by using RC4 encryption. All of the major BitTorrent clients recently added the option to encode transfer files using RC4 encryption.

The NetEnforcer uses Allot's deep packet inspection technology "to identify and analyze hundreds of applications and protocols, track subscriber behavior, prioritize traffic and shape traffic flows.

Brilliant!!

Now everybody who uses torrents to mirror innocent FOSS software or legal CC torrents are going to be penalised too.

The use of bandwidth throttling via protocols is nothing more than a form of censorship.

Sure some people use bit-torrent to share illegal files - but a lot of us don't - we want to respect the law and also share legal content.

Why should we be penalised because we use a bandwidth efficient P2P protocol to share legal content?

Why should my ISP - who I pay $$$ to monthly restrict my use of certain protocols to share legal music, video and software - when I have contracted for unlimited bandwidth for a month?

Forget FOSS and Creative Copyright - with the introduction of censorware hardware products like these, when the industry is restricting and prohibiting protocols on the grounds that some people might abuse them -then we really have reached a situation where censorship is in the router


Tags: , , , , , , , , , ,


July 12, 2006

9 Years for Wi-Fi Crime

Wired News: Crazy-Long Hacker Sentence Upheld

They discovered that at two of the stores -- in Long Beach, California, and Gainseville, Florida -- the pair had modified a proprietary piece of software called "tcpcredit" that Lowe's used to handle credit-card transactions, changing the program so it would stash customer's credit-card numbers where the hackers could retrieve them later. The program had collected only six credit-card numbers when it was discovered.
I'm not sure calling these guys "hackers" is correct - as far as I am concerned it looks like their only motive was crime - and the tools they used to attempt to commit the crime were computers rather than sawn-off shotguns.

These people are criminal hackers - true blackhats - who by their own admission wanted to install the modified code in every outlet to harvest credit card data - not hackers who explore networks, nor script kiddies who DoS everything in sight, nor organised Hacktivist groups such as Team Evil-Arab.

I can't say I am going to lose any sleep over this decision - online theft is crime, and criminal "hackers" deserve to be caught - so the rest of the Hackers can get on with playing with the Internet in peace and not get tarred with the "blackhat" brush.

Tags: , , , , ,


Sanitised by Consent

I couldn't resist commenting on this article from Information Week. Hollywood Victory In Film-Sanitizing Suit Imperils Mash-Ups

Last week, four companies that rent and sell Hollywood films stripped of their original sex, violence, and profanity were found to be violating copyright law.
I have been sanitising the output of big media for a while now and have thoughtfully made the edited films available for everyone to share - just follow this link - /dev/null

Now you can watch only the best bits of all those Hollywood "blockbusters" - which are actually second rate imitations of bad comic books, tired re-treads of old sixties tv shows, just plain utter rubbish that only got made because the star was bankable - or all three ...

Also if you haven't got ADSL you can still watch all the best bits for free without running up a huge telephone bill.

Hey! Don't thank me!!

I'm doing Big Media a favour by distributing this stuff and doing their PR for them

Don't forget - you can copy anything you find in /dev/null/ and distribute it - after all the original is still there isn't it .

Tags: , , , ,


July 9, 2006

NSA Net Wargames

A recent NSA excerise in net security - Security agency war game tries to teach Net defense | CNET News.com - has come up with a set of regulations that might be a little familiar They shuld have asked me - these are like CompSec 101

Aside from a streamlined network architecture, MacTaggart and his NSA colleagues offered three other rules of thumb:

• Follow a "deny by default" policy--that is, allow network users to access only the ports and services they truly need. "If you don't know that you need it, turn it off," said Pablo Breuer, who led the NSA's "red team" of hackers. "If someone comes screaming to you, ask them to prove they need the service."

• Remove all services, software and user accounts that aren't necessary to run a particular server. They "can be disabled, but it's better to go an extra step and have (them) completely removed," MacTaggart said.

• Plan for disasters. "No matter how well-designed the network is," MacTaggart said, "there's going to be some sort of security incident, an outage, a hard-drive failure."

At least they tried to simulate a "real world" situation:
In hopes of simulating a real-world situation, the attackers made a point of using the most publicly known exploits during the competition. They also took advantage of common mistakes like the use of weak passwords or the same passwords on multiple systems, and targeted security holes in Microsoft Windows that have readily available patches.
Again there are the same problems with these kinds of simulations that I found in the recent simulated cyber attack - no people - and as any IT security analyst knows - people are the weakest link in any IT chain.

Where were the Social Engineering attacks?

They would have been impossible to run - suppose team A phoned up team B and said "hey this is your ISP and we are checking for problems - what it your ID? hmmm ... we have a problem here - do you have your password handy?" - would they have fell for it?

Very unlikely - because they knew they were doing an excercise.

Simulations like this can never replicate the human factor and the applicaton of Murphy's Law - the "fog of war" that all military planners have to cope with.

So what did we learn from this simulation excercise? - a bunch of stuff that I recommended back in 2000 when I wrote Complete Hacker's Handbook

1) Deny by default:
... start by excluding everything and add what you need. Rememer that it is far easier to lock things down really tightly, and then loosen the bits that need loosening, than it is to make everyting loose and then lock down the bits you don't trust.

2) Remove all unused services and software
Turn off all services that are not being used ... remove completely any software that is not on use on the machine.

3) Plan for disaster
If .. your entire building is wiped out overnight you must have a business continuity plan that includes IT disaster recovery .. (this) plan .. needs to be documented and checked every year to make sure it works.

What I want to know is why it took so long for the NSA to come these conclusions when they could have bought a copy of my book and learned it 6 years ago

If it takes the NSA six years to catch up with what was accepted wisdom 6 years ago - what chance have they of catching hackers or fending off a full scale information warfare cyber-attack?

Enquiring minds want to know ...

Tags: , , , , , , ,


July 7, 2006

Gary McKinnon to be Extradited

This news from the Guardian Unlimited does not surprise me:

A Briton accused of hacking into the Pentagon's computers is to be extradited to the US, the Home Office has confirmed. Gary McKinnon, from north London, stands accused of what American prosecutors call the "biggest military hack of all time", and potentially faces a sentence of 70 years if found guilty.
I am saddened by the decision to extradite Gary McKinnon to the US for trial. I have already asked Who breaks a butterfly on the wheel? in an earlier posting, but now it seems that the US government are determined to have a "show trial" in the US to cover up their own inadequacies in securing the Milnet sites that were hacked.

Lets not forget - Gary McKinnon gained access to these systems not because he is some master hacker - he gained access because the systems adminstrators at the Milnet sites didn't change the default password on a piece of remote desktop software used for support.

Gary McKinnon is not like criminal hackers who infect computers with viruses, spyware and botnets in order to perform "click fraud", he is not like criminal hackers who steal credit card numbers and set up "phishing" sites in order to perfom identity theft, nor is he like Team Evil Arab who recenty defaced over 700 websites as a protest against the Israeli incursions into Gaza.

Will the decision to extradite and try Gary McKinnon in the USA do anything to stop the real threats on the Internet ?

Or this just more spin designed to calm public fears while doing nothing to make us safer?

Enquiring minds want to know ...

Tags: , , ,


July 4, 2006

Behind the Chinese Cyber Curtain

Nicely interesting article about how the "Cyber Curtain" in China can be circumvented with a small piece of programming - better yet, the architecture of the "Great Firewall of China" allows for DOS attacks against internal targets in China - using the flaws in their own censorware infrastructure.

Academics break the Great Firewall of China | CNET News.com

The machines in China allow data packets in and out, but send a burst of resets to shut connections if they spot particular keywords," explained Richard Clayton of the University of Cambridge computer laboratory. "If you drop all the reset packets at both ends of the connection, which is relatively trivial to do, the Web page is transferred just fine."

Clayton added that this means the Chinese firewall can be used to launch denial-of-service attacks against specific IP addresses within China, including those of the Chinese government itself.

The IDS uses a stateless server, which examines each data packet both going in and out of the firewall individually, unrelated to any previous request. By forging the source address of a packet containing a "sensitive" keyword, people could trigger the firewall to block access between source and destination addresses for up to an hour at a time.


Cool huh? My problems arise with the latter part of the article:

... the researchers had reported their findings to the Chinese Computer Emergency Response Team.
This means tha, despite all this research into the flaws of the Chinese censorware firewall - which is explicitly designed to prevent freedom of speech - public purse funded research is helping the Chinese to make their censorware firewall even better ...

Why are UK academic institutions helping countries to enforce censorware and aiding the restictions on free speech?

Enquiring minds want to know ...


Tags: , , , ,


June 29, 2006

Surfing with Cleanfeed

The Guardian Online has an article about Internet filtering that points up a lot of the problems with the technology - like the fact that it is expensive to implement and does not work anyway

There's just one problem. ISPs say the costs are huge, running to hundreds of thousands of pounds for a large provider, and that the suggested filters are easily circumvented.

Furthermore, a Cambridge professor of computing who has analysed the blocking system developed by BT, which claimed in 2004 to have been used to block thousands of attempted visits to banned sites, says it could be exploited by paedophiles to compile a list of the worst sites.

It goes on to quote Richard Clayton - who studied the Cleanfeed system and concluded that it could be "reverse engineered" to provide a directory of illegal websites

I have commented at length about censorware and pointed out that blacklist censorship of this kind does not prevent children being abused, that perverts are more likely to use P2P than the web, that the system had been found to be easily reverse engineered.and also expressed the opionion that LINX should be more concerned the with burden that implementing Cleanfeed will place on their members.

Now that the Guardian has expressed similar - although slightly more moderate - opinions, maybe public opionion will be roused to protect freedom of speech - but I doubt it.

For anyone who can't figure out why I am against censorware such as Cleanfeed being applied like a cyber-security blanket across the net - here are the reasons yet again.

1. It doesn't stop children being abused.

2. It doesn't stop perverts looking at illegal material.

3. It can be reverse engineered to provide a directory of illegal material.

4. It is expensive to implement - and doesn't work anyway.

5. It use a "secret" blacklist which is not open to inspection by ordinary people - but see (3) above.

6. There is no transparency in the "blacklists"- which could be manipulated for commercial or political gain.

7. Secret "blacklists" have no place in any "open" democratic country. - there must be checks and balance to monitor them - and currently there are none.

I have also opined that :
the government should tackle the root causes of illegal material on the Internet by attacking the criminal gangs who are linked to human trafficking for sexual activity, child pornography, and pornography spam
rather than placing the problem "out of sight and out of mind" by using internet filtering rather than tackling the real root causes of child abuse.

For some reason the government are hell bent on imposing censorware that doesn't work in stopping child abuse, but which guarantees censorship of everything you hear, see and read on the web.

What is the real agenda here? Enquiring minds want to know ....


Tags: , , , , , , ,


P2P is a Crime

Now P2P is a crime - according to this article Spain outlaws P2P filesharing

A Spanish intellectual property law has finally banned unauthorized peer-to-peer file-sharing in Spain, making it a civil offense even to download content for personal use.

The legislation, approved by Congress on Thursday, toughens previous provisions. An early May circular from Spain's fiscal general del estado, or chief prosecutor, allowed downloads for purely personal use.

Now I haven't got to the bottom of what "unauthorised peer-to-peer" file sharing is - but this article from Slashdot suggests that the law effectively outlaws all P2P file sharing.
Spanish Congress has made it a civil offense to download anything via p2p networks, and a criminal offense for ISP's to allow users to file-share, even if the use is fair.

There is also to be a tax on all forms of blank media, including flash memory drives. I guess the move towards distributing films legally via BitTorrent is a no go in Spain.

So I can't determine from all this is whether all P2P file sharing has become illegal - even for Open Source software, Creative Copyright material and self produced material.

Suppose I place a copy of "Hackers Handbook" on a P2P torrent along with some MP3's of tracks I have made and a bunch of pictures I have taken - all under Creative Copyright - am I then a criminal because I have decided to use a P2P network as my method of distribution?

But the law goes even further - it requires ISP's to take active measures to prevent P2P file sharing.

Instead of directly going after the filesharers themselves the Spanish have decided to make it a criminal offence for Internet providers to facilitate filesharing. It's not clear how "facilitate filesharing" is defined, but if it simply means "allowing it to happen", ISPs in Spain are in for some massive headaches. Blocking P2P is far from easy because it's possible to "hide" the traffic by using standard Internet protocol ports (like http and ftp) and encryption.
So while one part of the law might allow me to distribute Open Source software and Creative Copyright material - the other part of the law means that ISP's have to try and stop me - how crazy is that?

Right now I can't figure out how far this law is going to go - but it looks like a blow not just against copyright violation theft - but also against the whole Open Source and Creative Commons movement by denying them the right to distribute material which is not copyright violating via P2P networks.

It strangles small net record companies who use P2P to distribute their music under Creative Copyright at low cost, it penalises the Open Source movement who distribute software at low cost, and it strangles innovative ideas - such as delivering legal content via P2P networks - at birth.

When P2P networks are criminalised only outlaws will use P2P networks - how many times have you heard that sort of thing and thought "it will nver happen"

Now it has.


Tags: , , , ,


June 24, 2006

Telemarketing Sales Droids

Good piece here on how to prevent telemarketers called No Telemarket

Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials every number in a phone exchange until it gets lucky.

Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello".

What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence.

With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line.

I have a better way of dealing with telemarketers - after you realise that you have a phone sales droid on the phone - rap sharply on the desk as though someone is knocking at the door and then say "hang on a moment - someone is at the door".

Place the phone on the desk and walk away.

The sales droid will hang on, and on, and on waiting for you to come back - which you don't of course.

Come back after 15 minutes and listen - if the sales droid is still there - give it another 15 minutes.

This approach has the benefits of costing the telemarketing company money and ties up the resources of one sales droid for the length of time it takes them to realise you are not coming back.

One day they might realise that telephone spam is just as annoying as email spam and junk mail - but only if we demonstrate the telemarketing does not work becuase everyone has rejected the method and it costs too much money to make too few sales.


Tags: , , ,


June 23, 2006

When is a pirate not a pirate?

Good article about the impact of first world copyright laws on third world countries which examines the impact of the raid by the American Association of Publishers on copy shops providing cheap copies to third world students who want to become doctors.

read more | digg story


Tags: , , ,


June 19, 2006

Beyond Risks

Going back to Beyond Fear - and thinking back to my IT-OPS days - then filtering through my current filter - I came up with the following.

People exaggerate spectacular but rare risks and downplay common risks.
How many disaster recovery programs look at the worst-case scenarios - while ignoring the possibility that the postroom label printer PC is their worst enemy?
People have trouble estimating risks for anything not exactly like their normal situation.
Your building burning down, struck by lightning, a flood that buries your data centre, or a terrorist bomb are not "normal" situations.

Plan for them now and when a backhoe cuts your power and phone - you can cope.

Personified risks are perceived to be greater than anonymous risks.
The "I must be target" syndrome.

Maybe you are and maybe you aren't.

You only need to assess it properly and not give into the FUD factor - then take appropriate measures.

People underestimate risks they willingly take and overestimate risks in situations they can't control.
So they outsource their IT infrastructure in the hope they won't be held responsible when it all fails ...
People overestimate risks that are being talked about and remain an object of public scrutiny.
Of course!

I think its called the "Advertising" these days ...

It looks to me that "black hats" and "white hats" alike are making a LOT of money from these threats ,,,

How *do* you think that these "security companies" who specialise in patching up the incompetencies of the Big Software companies make a living?

By patching up the "insecurity" factors of YOUR operating system - the elements that need "patch tuesday" on a weekly basis.

But - why should they need to?

Why isn't the operating system secure in the first place?

Enquiring minds want to know ...

DISCLAIMER: This risk assesement document is skewed towards Docklands in London - hence the emphasis on fire, flood and terrorist bombs - all of which I had to prepare for ...


Tags: , , , , ,


Electronic Hezbollah

I have already talked about this interview between John Perry Barlow of the EFF and Dan Glickman of the MPAA here but on reflection I found I objected to John Perry Barlow's comments about the "Electronic Hezbollah".

... they're up against 17-year-olds who have turned themselves into electronic Hezbollah because they resent the content industry for its proprietary practices ...

There are a lot of kids out there copying and distributing movies not because they care about seeing the movies or sharing them with their friends but because they want to stick it to the movie business.

I find that comments like this not just unhelpful in furthering the debate about copyright - but actually helping to reinforce the RIAA & MPAA propaganda line that "P2P file sharing is piracy".

While the rest of the world is trying to fight off the current RIAA & MPAA propaganda line that ANY form of P2P file sharing is "piracy" and "copyright theft" here is John Perry Barlow telling the WHOLE WORLD that P2P violations of Big Media companies are caused by an "electronic Hezbollah" who only want to "stick it to the movie business".

The phrase "putting out fire with gasoline" comes to mind.

With "friends" like John Perry Barlow to do the propaganda PR for the RIAA & MPAA - who needs enemies ...

Furthermore, the very use of the phrase "electronic hezbollah" in this context is offensive - the words "digital underground" or "digital resistance" could have sufficed

The use of the word "hezbollah" in this context makes me as annoyed as when the RIAA & MPAA call digital copyright violators "pirates".

Copyright violation thieves are not "pirates" and the people who oppose them are not the "hezbollah" - pirates rape, kidnap and kill people and the hezbollah is outlawed as a terrorist organisation across the globe.

Labelling people who oppose DRM and harsh digital copyright laws - along with those actively breaking those copyright laws - as an "electronic hezbollah" - does nothing more than smear them by making it look like they are terrorists.

The RIAA & MPAA could not buy advertising like this - it only helps to harden attitudes on both sides of the fence.

Right now figuring out how to fix the whole digital copyright mess - without DRM and without giving up our existing rights under copyright law - should be our only priority.


Tags: , , , , , , ,


June 16, 2006

Beyond Fear

This article, The Scariest Terror Threat of All by Bruce Schneier makes a lot of sense to me - it also explains the dynamic of upping the FUD factor to a level at which your products are going to sell really well and you make a lot of money.

The best ideas tap directly into public fears. In my book, Beyond Fear, I discuss five different tendencies people have with evaluating risks:

* People exaggerate spectacular but rare risks and downplay common risks.

* People have trouble estimating risks for anything not exactly like their normal situation.

* Personified risks are perceived to be greater than anonymous risks.

* People underestimate risks they willingly take and overestimate risks in situations they can't control.

* People overestimate risks that are being talked about and remain an object of public scrutiny.

How many of the "security industries" specialise in using tactics based around these principles to sell their products?

Tags: , , , , ,


June 10, 2006

Hollywood and the hackers

This is an interesting interview between John Perry Barlow of the EFF and Dan Glickman of the MPAA here on the BBC website.

The fact of the matter is that people who create content for movies and television have to make a profit. If they don't you won't see all this wonderful stuff and listen to it.
Quote: "all this wonderful stuff"

Has this man actually WATCHED the rubbish that is being pumped out of Hollywood these days?

Remixes of comic books that were crap in the first place, sexist ultra-violent trash designed for people who are 14 years old in mind or body, yet another sequel of yet another film that was a pile of stinking ordure in the first place but has a "bankable" star and a plot a demented 6 year old toddler on acid might have written.

I wouldn't pirate any of their crap even if they paid me - seriously - I can wander down the rental shop and plonk down some spare change on a film I might like - but to waste my time watching Hollywood rubbish just because some people choose to fill up p2p file sharing networks with it - no thank you.

Meanwhile all the "electronic Hezbollah" who Perry Barlow claims, are not "copying and distributing movies not because they care about seeing the movies" but "because they want to stick it to the movie business." are helping big media, big business and the government to call for stronger and stronger restrictions on what we can do on the Internet.

SoI am caught in the middle of an Internet sluggish because of p2p film sharing of films that are rubbish anyhow and also I get an Internet becuase its more restricted because of all the p2p file sharing of films that I never want to see - a classic no-win situation for anyone who doesn't engage in copyright violation via the Internet.

Welcome to the 21st Century web where the battle is between the promotors of rubbish and the promotors of the fair rights of people to watch that rubbish.

Tags: , , , , , ,


June 6, 2006

DJ Mixes "illegal music"

DJ Mixes "more than anything else that we see in illegal
music are DJ mixes"

These unique circumstances, the expert testified, made these pirated CDs "very easily identified." "Sometimes they are sophisticated," he said, "these were not." He was "absolutely" certain these CDs could be identified as pirated "DJ mixes" from a visual observation. In the black market, "probably more than anything else that we see in illegal music are DJ mixes."
I would believe this if all the DJ mixes in the world were made of tunes from companies that support the RIAA - i.e the multi-media payola manufactured pop-crud which is rammed down the throat of every human being on the planet.

They aren't.

They are compiled by DJs from vinyl records (remember vinyl - how cds would replace it forever - it didn't happen) made by small record labels who are only too happy for their music to be promoted in this way.

DJ's do not play the kind of music that the RIAA claim to support - it is too cutting edge and different for mainstream companies to buy into and promote - so it is left to the small independents who understand very well the role of DJ's in promoting their music and allow a certain latitude with home-brew cd-r's that promote the DJ or a particular club night.

If the DJ wants to cut a deal and release the mix - then the music has to be licensed - after all it is being resold at a profit.

Penalising DJ promos by categorising them as "pirate material" - rather than looking at the overall role of the DJ in promoting tunes and generating profit for the record companies by generating sales - is a little bit more of that "golden goose" killing strategy that threatens to make all our lives more difficult.

On another note - the RIAA should learn that (a) many third world countries package their cds in "slimline" cases, (b) many DJ's repackage their cds in "slim line" cases (you get 100 in a 50 bag) and (c) many record producers and musicians carry their demos and working material in "slim line" cases (yeah - the guys you are claiming to "protect") without infringing copyright laws

Arguing that "slim line" cases are a sure sign of "pirated" material is a great way to alienate - well almost everyone really.

Right now I am in the middle of reviewing CC material for a CD mix which will be given away free under CC also - I will ensure that I use a "slim line" case, I will ask a Photoshop expert to blur the cover so it looks like it has been "re-scanned" and then I will give them away free to anyone who ensures that they make at least 5 copies - which have to be distributed in a "slim line" case and with a cover that is blurry enough to arouse the suspicions of law enforcement officers .....

Tags: , , , , , , ,


May 29, 2006

Irrepresible Information

The Observer | UK News | Today, our chance to fight a new hi-tech tyranny

The internet is big business, but in the search for profits some companies have encroached on their own principles and those on which the internet was founded: free access to information.

The results of searches using China-based search engines run by Yahoo, Microsoft, Google and local firms are censored, limiting the information users can access.

Microsoft pulled down the work of one of China's most popular bloggers who had made politically sensitive comments. Yahoo gave information to the authorities that led to people being jailed for sending emails with political content.

We do not accept these firms' arguments that it is better to have a censored Google, Yahoo or Microsoft in China than none at all.

Amnesty International have launched a new campaign against censorship on the internet called "Irrepressible Information" that encourages the sharing of information blocked by censorware around the globe in order to make it "impssible to repress or control".

They do this by providing a little script that sits on your site and delivers fragments of material which is censored and the sheer banalisty of some the fragments points up the impossibility and stupidity of censorship .

I recommend anyone to have a look and see how long before you are astonished by fact that the fragment in front of you has been censored, because somewhere "someone doesn't want people to read this".

Tags: , , , , , , , , ,


May 28, 2006

Fear, loathing, and perfunctory seduction

I've been going through the comments and changing the spam URLs to sensible ones ... while doing so I've tracked down some of the blogs that are also being spammed or quoted - there are some real gems - this is more fun than technorati

I recommend this article Less than Size Zero from Rollertrain - somebody used the last line of the article for a piece of porn spam - the article is MUCH more interesting.

Next up was googling for people who had been spammed with the comment "Fear, loathing, and perfunctory seduction" - who else had this character picked?

Well there is this great story about a 48 cylinder motorcycle that I highly recommend. Three years in the making and 48 cylinders does not an elegant bike make!!

Next up is xavodim which seems like a nice sensible blog about web design and development that was good enough to make it into my RSS reader - thanks spammer!!

Moving along nicely we come to the article Can I Still Call Google GouGou "Doggy" 狗狗?: Cultural Implications of Google’s New Chinese Name-谷歌 - yet another sensible blog which made it into my RSS reader.

I though the spammer might have taste .... but next up was some kind of financial blog which has severe comment moderations problems ... no seriously ...

Andy Wibbels "the original blogging evangelist" - had one of those "40 things you Wanted to Know about Blogging" articles which I actually hadn't read yet and will add to my list of "100 articles about blogging you need to read" ...

I really tried hard to figure out what Acting to Improve was all about - but after two paragraphs I gave up ... no sorry I just tried reading it again and I don't get it - maybe wiser minds than mine can see it ... try this quote:

I believe that a small first person action research study such as mine can only make small claims of impact. The main impact has been on myself and on my own practice. This impact does not easily lend itself to measurement, these are subtle shifts in my attitudes and thinking. There is some potential impact on my professional development in that the research moves me nearer to needs identified in my mission statement in my personal development plan at the end of year 1.

I guess I should move swiftly on to NY Metro who have a story about a cinematographers strike - why did the spammer pick on that?

In fact why did the spammer pick any of the blogs that he/she spammed? There is no rhyme nor reason to any of the choices - and there is no discernable pattern to the blogs chosen - I've just picked out the interesting ones from the first Google results page ....

Still I found a couple of blogs I didn't know about - maybe I'll spamtrack some other blog comments and see what else emerges.

The site being promoted? No idea - and if the spammer thinks I'd link to it they are completely mad ... and I am still no closer to finding out where the line "fear, loathing and perfunctory seduction" originally came from.


Tags: , , , , ,


May 25, 2006

MPAA accused of hiring a hacker

MPAA accused of hiring a hacker | CNET News.com

The Motion Picture Association of America hired a hacker to steal information from a company that the MPAA has accused of helping copyright violators, according to a lawsuit filed Wednesday.

This seems unlikely - and of course the MPAA deny the claims - but the current lawsuit filed by Torrent Spy - "the largest BitTorrent search engine" claims that the hacker was hired to steal email and trade secrets from the company.

This will be one to watch - if the claims are true and stand up in court it will expose MPAA as an organisation with no scruples whatsover.

"We have very significant proof of wrongdoing and the MPAA's involvement,"

"We think it's ironic for the MPAA to claim that they are protecting the rights of the movie studios and then go out and pirate other people's property."

Ira Rothken, lawyer for TorrentSpy was quoted as saying.

You can get a copy of a pdf of the lawsuit here - it makes interesting reading.


Tags: , , , , , , ,


May 23, 2006

Cyber Extortion

In the Fight Against Spam E-Mail, Goliath Wins Again

Reshef's Silicon Valley company, Blue Security Inc., simply asked the spammers to stop sending junk e-mail to his clients. But because those sort of requests tend to be ignored, Blue Security took them to a new level: it bombarded the spammers with requests from all 522,000 of its customers at the same time.

Then, earlier this month, a Russia-based spammer counterattacked, Reshef said. Using tens of thousands of hijacked computers, the spammer flooded Blue Security with so much Internet traffic that it blocked legitimate visitors from going to Bluesecurity.com, as well as to other Web sites. The spammer also sent another message: Cease operations or Blue Security customers will soon find themselves targeted with virus-filled attacks.
Yet another reason why the end of the internet might be in sight - the SPAM epidemic shows no sign of abating and is destroying the usefulness of email.

I remember when you could email net.gods with a question and actually get an answer - these days its hard enough to get an answer from anyone because you are likely to end up in the spam bucket.

Worse still - certain free webmail based sites have not got a clue about how to handle spam.

Domain blocking is NOT going to work guys - these spammers are using fictional domains - you need to implement subject based blocking as well - I should only have to block "Pink Razor Phone" or "Horny Housewives" ONCE and should never see a mail with that subject again - and yes I am talking about the new Hotmail "Live Mail" beta which has seen my spam count go up from 0-2 a day to as many as 20 .... grrrrrrr.

Tags: , , , , , , ,


May 20, 2006

Net Neutrality & Censorship

Censoring the Internet?

Finally net-neutrality and Internet censorship is becoming a concern in mainstream political blogs.

If you've never considered the possibility that the federal government might one day tell you what websites you could access, what files you could download, and even what software packages you could install on your computer, it might be time to take a look at "Hands Off the Internet," a site representing a coalition of Internet users who have taken a proactive stance on maintaining "Net Neutrality."

Their logo of "Say NO to Government Regulation of the Internet" is complimented with pages of links to articles which further address the subject, a news section, two form letters to contact your legislators to voice your concerns about possible government interference of the Internet, and a chance to sign-up for site updates and further legislative movement as it develops.


I've already written about how net neutrality threatens to kill the golden goose, and anyone who reads here regularly will know that I am no fan of censorware and blacklists.

Right now the threat of censorship and the end of net neutrality means that the "End of Cyberspace is not just a metaphor anymore.

Maybe the the end of the internet has suddenly become a real possibilty.


Tags: , , , , , ,


May 16, 2006

What if censorship is in the router?

10 Things You Might Not Know About Censorware

This is a good article about censorware which sums up the main issues very nicely by Seth Finkelstein.

1. Censorware isn’t just for kids
2. Programmers have been sued for publishing reverse-engineering of censorware
3. Censorware often blacklists language translation sites, as a LOOPHOLE
4. Censorware often blacklists the Google cache
5. Censorware research has been one of the few successful DMCA exemptions
6. Legal arguments over the effectiveness of censorware were the reason for the subpoena for data from Google and other search engines
7. If censorware works for parents to control children in the US, it’ll work for governments to control citizens in e.g. China. Contrariwise, if censorware can’t work for governments to control citizens in e.g. China, it can’t work for parents to control children in the US.
8. Nobody wants the “.XXX domain”, except people trying to make money from it.
9. Nobody wants a kids-only domain, except politicians
10. Censorware sex blacklists are overall very boring


Tags: , , , , , ,


May 15, 2006

Who breaks a butterfly on a wheel?

The recent case of Gary McKinnon has highlighted problems wih the ongoing governmental programmes which demonises "hackers" in order to "up the ante" - and guarantee funding to watch all of us - forever.

The real problem is that the US Military installed commercial software for the remote control of PCs.without changing the default passwords

The US MILITARY were not bothered enough - or not intelligent enough - to ensure that a commonly known vulnerability and exploit was patched in order to protect the confidentiallity, integrity and access to their systems.

For two years ...

You't think that sort of thing was important - especially in the age of "Homeland Security" and the "imminent threat of terrorist attacks" - I wonder if Osama and his crew noticed the gaping security hole?

But the US Military didn't - and then some non-terrorist hacker was caught using the most basic of hacks to subvert the public portions of milnet.

Now the US Government want their pound of flesh - extradition and imprisonment in the USA, a hostile and foreign country - for up to 70 years.

This would be a "cruel and unusual punishment" - to be locked up in an American prison thousands of miles from friends and family (who would probably end up on a "no-fly" list anyhow) - for exploiting the ignorance and stupidity of military systems administators.

Gary McKinnon might be many things.

He might have pulled off the "greatest military hack" of all time in the eyes of the media - but many of his peers have a slightly different opionion of him - opinions that make it plain we are NOT dealing with some super-criminal quasi-terrorist uber-hacker.

There are laws in the UK to deal with this kind of trans-national data crime - and it is important that they are used to maintain national sovereignity - especially in the face of the US led "war on terror" where we are all are potential suspects and anyone could suffer "extraordinary rendition" if their name is similar to a name on the ever-increasing list of secret databases that watch our every move.

The UK should not extradite Gary McKinnon to the US.

Not just because the US military were incompetent, and not just because it would be a "cruel and unusual punishment" or for any of the other reasons that anyone has suggested,

It is because the UK should try, sentence and punish Gary McKinnon in the UK - in a jury of his peers, in the UK, where he is not seen as a "foreign combatant" - and to ensure that any other UK citizen accused in the "war on terror" is not whisked away at a whim by the US government.

Anything else would be nothing more than an attempt at scapegoating a hacker for governmental shortcomings.

The money spent on this case would be better spent on training systems administrators and ensuring that MILITARY systems do not have default passwords and vulnerabilities that last for TWO YEARS.

"Who breaks a butterfly on a wheel?".

It was a good question in 1967 - it is still relevant now.


Tags: , , , , , , ,






April 1, 2006

LINX: Daily Mail promotes Cleanfeed

LINX public affairs have finally caught up on the 10 day old advertisment story from the Daily Mail.

A large spread in the Daily Mail [PDF, 4Mb] last week piled on the pressure for ISPs to adopt network-level content blocking, with all the even-handed dispassionate analysis you’d expect from the Daily Mail.

They provide a link to the article in PDF format - I would never have dared - but somehow they manage to miss the fact that irresponsible reporting like this helps perverts to find illegal material.

The story also fails to point out that 100% adoption of the BT Cleanfeed system will not stop children being abused and will not stop perverts viewing illegal material.

You'd think this would be a big issue with LINX - but apparently not - I can't figure out why.

Wake up and smell the coffee guys!!!

You need to use every argument at your disposal to avoid costly filtering and/or monitoring requirements that could become mandatory under the current regime.

The operational costs of the proposed filtering and monitoring requirements are both costly and difficult to implement - and when they have been implemented won't work as intended.

What a waste of time and money.

It doesn't work, it won't work and its time to say so - don't just shilly-shally and go all ambiguous - like this -

.. with all the even-handed dispassionate analysis you’d expect from the Daily Mail ...

Try this instead

Blacklist filtering systems such as "BT Cleanfeed" do nothing to prevent children being abused and will never prevent perverts looking at illegal material.

Or even:

Rather than placing the onus, and the cost, on common carrier ISPs - the government should tackle the root causes of illegal material on the Internet by attacking the criminal gangs who are linked to human trafficking for sexual activity, child pornography, and pornography spam

The Internet doesn't have a problem - the world has a problem.

That is the message that needs to be taken to governments who advocate one-size-fits-all censorware schemes that are expensive to implement and don't work anyway.


Tags:


March 25, 2006

Operation Cleanfeed

While in Fuengirola the other day I bought a copy of the Daily Mail.

The advertisement article about BT Cleanfeed caught my eye for some reason.

The evil trade in child porn on the Internet is growing at a shocking rate.

Yet simple technology can block ALL these sites and put the pornographers out of business.

So why are some Internet companies refusing to use it?

I’ve registered my objections to blanket “blacklist” ISP censorship systems like BT Cleanfeed before – but this two-page PR puff article takes the biscuit – some of my objections are listed below.

My first objection is that the Daily Mail have actually made it *easier* for perverts to find illegal material – even though they have obscured the names of the guilty parties.

I’ll pick a quote at random.

… there is a the video ... of a ten year old girl “very cute sweety, in pain she’s even more beautiful” …

There are more quotes like this in the article – designed to overwhelm the reader with shock and horror so they buy into the major premise of the story – but each and every quote provides enough information for a Google user to locate the sites in question within minutes.

This is a big bonus for novice Internet perverts who haven’t managed to hook up with their more experienced brethren – but now the Daily Mail has managed to provide the information for anyone who can read.

I guess the author of the article did exactly what I did - looked at the links in Google - - an act which is not illegal – rather than viewing the websites – which is illegal.

There was a high degree of match between the quotes in the initial opening paragraphs of the article and the material I found on Google – too high a match in my opinion – haven’t the Daily Mail heard of synonyms, rewriting or selective editing?

I considered rewriting the quote above – but as (i) I am quoting the Daily Mail in this context I wanted to leave as much intact as possible, (ii) the illegal website in question has been removed from the (possibly) hacked site that was doing the hosting, and (iii) the damage has well and truly been done – how many people read the Daily Mail as opposed to my blog?

The Daily Mail provided enough information to any pervert with a knowledge of the Internet to find exactly the kind of goods that were being described in the article – you can’t buy advertising like that – especially with the circulation of the Daily Mail.

Shame on you Daily Mail! Next time you do an expose like that - rewrite the quotes so that they don’t lead perverts directly to illegal material – you changed the names – why not change the quotes as well?

Next on my list – the often cited figures about “100,000” attempted “accesses” to illegal material daily – figures that cannot be verified by any critical external observer because BT Cleanfeed is a closed system.

No-one can verify that the blocked URLs are illegal – that would be illegal – and BT Cleanfeed release few details about what sites are blocked as illegal because that would be like providing a directory of illegal sites.

In just two years the number of ... websites identified by British police has increased by an astonishing 78 percent to 6,128, virtually all of them abroad.

Every day in Britain alone, more than 100,000 attempts are made to access pornographic images of children- three times the number recorded in 2004.

Yet nobody can independently confirm these figures because:

The "BlackList" is secret - and any attempt to reverse engineer the contents of the BlackList might be illegal under the DMCA - and no checking can be made of the BlackListed sites anyhow.

If you really do stumble upon a dubious site - and confirm that the BlackList is working - then you are open to prosecution for viewing the wrong kind of site.

Otherwise we have no idea who is "BlackListed" - as I said the whole .ru domain seems suspect

The blunt instrument of blacklist usage - blocking servers, domains and subdomains because they are suspected of hosting illegal material - inflates the illegal “access” figures by including innocent Internet users along with the guilty – and also damages free speech.

If I access some domain in Russia that is blocked because certain hosts inside that domain are guilty of hosting illegal material – does my attempt to access that domain count as an attempt to “access” the wrong type of material?

If a domain, subdomain or even a single server were blacklisted - then BT Cleanfeed has no way of knowing whether I wanted to access legal or illegal material from that server, domain or subdomain.

The BT Cleanfeed system only knows that a site is blacklisted – and then counts any attempted access as an “attempt to access” illegal material – this must inflate the figures for “attempted illegal accesses”.

So we can’t take the claim that “100,000” attempts per day are made to “access” illegal material seriously until we know more about how BT Cleanfeed works - but we can’t find out how BT Cleanfeed works because it is secret – and if we try and figure out how it works we might be prosecuted anyway.

This is called “Catch-22” – and I still fail to see how it helps to protect children from abuse.

While we have no way of knowing the true validity of the statistics claimed for the BT Cleanfeed system – we do know that people in Russia, China and many other countries rely on the web and P2P file sharing to promote freedom of speech and free communication of ideas away from the hand of repressive government restrictions.

If whole networks are blacklisted how will they get their information?

Any server could be blacklisted for a number of reasons – including being compromised by criminal hackers seeking to set up illegal sites - but should that server be blocked because criminal elements have used it?

How long should the block last?

How would you even know that you had been blocked – after all the contents of the BT Cleanfeed blacklist are a secret – when all that appears on the screen is an error message?

In my mind there is no room in any democracy for any “secret blacklists” – they must be open to inspection – not only to ensure that data integrity, data security and data access are not compromised in any way – but also to ensure that the commercial claims based on any statistics are grounded in some kind of reality.

That is especially true when the system is from a UK company, the product costs 2K and which is being heavily promoted by the UK government who are looking for “100% takeup”.

Right now the BT Cleanfeed system provides none of the transparency and openness that we have come to expect from the current government – who claim to be in favour of “open government” – but that comes as no surprise.

I guess the correct democratic solution is to form a panel of IT experts, academics, hackers, media people, and law-enforcement types - with a sprinkling of the great and good and a couple of Tony’s cronies - to monitor the performance of the near-monopoly that BT Cleanfeed will enjoy.

At least it would help to ensure that BT Cleanfeed (i) works as specified, (ii) that any available public data was consistent and complete, (iii) that standard concerns about data integrity, security and access were addressed and (iv) that the BT Cleanfeed system cannot be reverse-engineered or hacked in order to provide a “directory of illegal sites”.

Next up – the canard about blacklists fixing the problem of child abuse on the net.

Campaigners against child abuse quite reasonably argue that if people cannot reach the websites, the criminals cannot profit from their crimes.

Whereas campaigners against secret and undemocratic blacklists reasonably argue that blacklists do not prevent children being abused, and also that black lists do not prevent perverts accessing illegal material.

Paul Goggins - the government Home Office Minister in charge of illegal websites – wants 100% of UK ISPs to take up the scheme – costing 2K plus implementation costs and is “determined that we will hit 100%”

That 100% figure looks good on paper – but it sweeps the problem of child abuse websites under the carpet where NuLabour can claim that they have tackled yet another problem successfully.

The bonus “spin-factor” of keeping abusive material “out of sight and out of mind” is good – but better still - NuLabour have made money for “Cool Britannia Plc” in the process – which should guarantee at least some of them nice directorships when they retire from politics.

The government should concentrate on action against the criminals who abuse children for profit in marginal and 3rd world countries, rather than applying media-friendly quick-fix band-aid solutions. The use of secret blacklists does not stop children being abused, nor does it stop perverts viewing illegal material – but it does make for positive spin – no surprise that NuLabour has chosen it then.

Finally, it would seem that the Daily Mail has a very shaky grasp of the “common carrier” principle.

Worryingly the ISPA is insisting its members are “mere conduits” for these depraved images, pleading that ISPs are “carriers’ of information like the postal service.

Except, or course, the postal service delivers to a specific person and the content of the postbag is not open to anyone.

I hate to mention this to the Daily Mail – but the contents of TCP/IP traffic are delivered to a specific person – the one operating the computer.

In addition to that – anything delivered via an SSL connection is also “not open to anyone” – although unencrypted traffic can still be sniffed of course.

My preferred analogy would be if the criminals who ran these operations sent out their “brochures” via snail-mail, the perverts then sent back payment via snail-mail using postal orders, and then the illegal material was sent back via snail-mail to the perverts.

Would the Daily Mail then advocate that because the Post Office is carrying illegal material they should be prosecuted?

No they would not – because the Post Office – like ISPs - are common carriers.

ISPs are not responsible for the material they transact across their networks anymore than the Post Office is responsible for illegal material delivered by post, or Fedex is responsible when criminals use their system to distribute illegal drugs.

… the ISPA asserts that it must rely on the general public and official agencies to police the net. It cannot do it, it says, because it is not “possible or practical” to monitor content.

Even if it was “possible or practical” to monitor content - would the Daily Mail advocate the opening of every parcel, letter or package in the country if it was conclusively proved that criminals were using postal and parcel delivery services to make an illegal profit?

Once again they would not – and if they did then the Post Office would point out that they were not responsible for the mail they handled – and invoke the “common carrier” principle.

So why does the Daily Mail apply one rule to the ISPs and another to more traditional forms of communication?

The appalling fact is that the government and big media are using the illegal content stick to force UK ISPs into using monopolistic CensorWare which restricts access to certain websites – the details of which are held on a secret blacklist which has no integrity checks and no accountability – and which can never work anyway.

What price free speech?

Are we to allow blacklist censorship via the back door in the name of protecting children – even though blacklist censorship does not protect children – or are we going to try and find ways of protecting free speech while still tackling the problem of child abuse?

Right now the choices are open.

We can accept passive CensorWare that glosses over the problem and waves a media friendly magic wand to convince the public that the government is doing something, or we can find a more proactive solution to child abuse – one that doesn’t involve secret blacklists and covert censorship.

The government could start by looking at the international links between the criminal gangs that are involved in human trafficking for sexual activity, child pornography, and pornography spam, rather than promoting this flawed approach

Until the government tackles the problem properly a secret blacklist will be determining everything you see or hear on the web, children will still be abused and perverts will still find illegal material on the web.

Is that the solution we want?

Can't we do more for these children?

This is not a solution – this is a problem that is not going to go away unless tackled properly – and blacklist censorship is not tackling the problem properly.

Its time to change the system – tackle the causes and not the symptoms - but NuLabour were always about shallow quick fixes backed up with propaganda - so I won’t hold my breath.


Tags:


DRM: Now EMI want to play too

You'd think after the SONY DRM debacle that big media companies would have wised up.

But no - from this report in Boing Boing it now appears that EMI are playing the DRM game now.

There are two buttons below the agreement. The first reads "Accept the Agreement" the second reads "Reject it". After reading all the above, I decided to reject it, and pressed the "reject" button. Immediately a screen with the word "Initializing" appeared, the proprietary software was installed, and the music started to play in my computer using the proprietary EMI player, as if I had "accepted" the whole thing.

So the softare is installed without explict consent, and EMI haven't provided an un-installer - that sounds like malware to me.

I'll be interested to hear what the Freedom to Tinker team have to say about the mechanisms used - asuming they woun't get prosecuted under the DMCA for investigating - and whether the EMI DRM uses rootkit style "cloaking technology" to interefere with the proper running of the operating system while possibly introducing system security vulnerabilities.

You would think that EMI - having seen the web campaign against SONY, read about the SONY DRM debacle in the trade papers, and noted the successful EFF suit against SONY - would have decided that DRM was a big mistake

1. DRM hurts paying customers
2. DRM destroys Fair Use rights
3. DRM renders customers' investments worthless
4. DRM can be defeated
5. DRM encourages platform lockdown and discourages innovation
6. DRM encourages "content lockin" or "corporate authorship"

There are many reasons not to use DRM - but big media seem helll bent on enforcing it anyway - even against the customers will.

Time to start boycotting all DRM encoded music - there are enough smalll labels out there making great music who won't implement DRM because it is not economically feasible for them - so the alternatives are there - for now.


Tags:


March 24, 2006

MPAA vs Deep Throat

I've been meaning to point out for a while that although the MPAA is all against movie "piracy" - i.e. copyright violation theft - it doesn't seem to be concerned that Deep Throat starring Linda Lovelace is widely available on all sorts of P2P sharing networks.

Today this report entitled Intellectual Property Runs Amok provides the interesting fact that I have been looking for.

42% OF ALL VIDEO files shared online are pornographic. No porn-sharing cases have yet been tried in the U.S.

Why am I not surprised at this?

Do porn film makers become members of the MPAA? or do they have to be "invited in" like members of some secret society?

Where do the MPAA get their porn films from anyhow?

Maybe they get DRM locked versions for review from the underground porn producers - just like everyone else.

They wouldn't dare to rent them from a local store - except under a false name.

They wouldn't dare pay for them via credit card from an online supplier.

They would have to go in person to their non-local porn shop and buy them in cash.

If I was cynical I could suggest that the best chance of saving them the embarrasment of the neighbours finding out that "Shemales On Top" was their favourite rented video - would be to download it from a P2P site like everyone else.

But that would be illegal wouldn't it?

So why aren't the MPAA going after the porn film file sharers if they make up 42% of the films online?

Enquiring minds want to know

Tags:


March 9, 2006

Pay for Placement vs Sponsorship

This article from FreshBlog made me think about blog monetisation vs what would work better for me ..

I haven't monetised this blog - you'll find adverts on the project spaces I run - but my personal blog is free of that kind of thing.

BUT - if someone asked about a space (e.g. top left 180x100 pixels), then maybe I would hire it out .. I have bills to pay after all .. but only if I thought it was appropriate for the blog.

A lot of people don't think like that - there is money to be made - beware the "Pay for Placement" Blog

Let's say you write an average of three posts per day. If you took one paid posting per day at $20 per post and did that five days per week, that's $400 per month of income for your blog.

Where do you draw the line, though? Do you keep the advertising (and that's what it is) on topic for your blog? Do you disclose which posts are paid advertising? If you don't disclose, what's the risk of being outed?

I would draw the line when I get PAID to promote products I don't like

However .. if anyone wants something reviewed - book, film, tech-device or whatever - send it to me.

I guarantee that I will mention it here - I can't guarantee you'll like what I say though.

Any publicity is good publicity after all - especially in the Age of the Web - when SEO robots get to determine how popular you are.

Send me your books, magazines, cds, records, expensive gadgets and very fast sports cars - I guarantee to review each and every one of them ... just don't ask for them back.

If you have a product to promote - send it to me - look at it as a kind of "sponsorship" rather than "pay for placement" - and if you get a negative review just count the links - don't worry about the content.

Tags:


Data Mining Won't Stop Terror

An article today in Wired entitled Why Data Mining Won't Stop Terror goes into more detail about the problems I discussed yesterday with automated security systems that ensure We are All the Enemy Now

Data mining works best when you're searching for a well-defined profile, a reasonable number of attacks per year and a low cost of false alarms. Credit-card fraud is one of data mining's success stories: all credit-card companies mine their transaction databases for data for spending patterns that indicate a stolen card.

Many credit-card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of operator time.

Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.

The problem with "false positives" is compounded by the problem of "false negatives"

Let's look at some numbers. We'll be optimistic -- we'll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that's about 10 events -- e-mails, phone calls, purchases, web destinations, whatever -- per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.

This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.

So, to put it mildy, vast automated systems that analyse data for security purposes not only places law-abiding citizens at risk of arrest, funds-seizure or worse - but for every 2,750 law abiding citizens that are persecuted there are 10 terrorist plots going on.

So are these systems making us safer? No they are not - and they threatean to alienate law abiding citizens who are innocent.

Will these systems stop terrorist plots? No they will not - the very lack of patterns in the methods that terrorists use means that finding them is not a job best done by computers.

No that you know these figures - ask yourself this:

Do you feel safer now that you are being watched all the time?

When everyone is perpetually watched to see if they are a potential security threat then everyone is a potential security threat - I can only conlude that we are all "The Enemy" now.

Are we in the "New Cold War" yet?


Tags:


March 3, 2006

Can you explain your rights?

This was interesting today.

Half of 1,000 Americans randomly surveyed by the McCormick Tribune Freedom Museum could name at least two of the five members of Fox Television's Simpson family, the stars of the network's long-running show.

But just 28 percent of respondents could name more than one of the five freedoms listed in the U.S. Constitution's First Amendment -- about the same proportion that could name all five Simpson family members or could recall the three judges on Fox TV's top-rated "American Idol."

Just 8 percent could recall three First Amendment freedoms.

Two-thirds of respondents did remember freedom of speech as one of five rights in the First Amendment, but just one person accurately named all five.


If only two-thirds of the population understand that they have rights to "free speech" - then how many are going to understand the complexities of the arguments against DRM? the postive side of P2P filesharing? why open-source software might be useful? why the DMCA is bad? ... and any number of other issues that are either badly presented or dumbed down in media sources - if they get mentioned at all.

It's an uphill struggle - lets keep plodding on - the top of the mountain can't be far away.


Tags:


The Big DRM mistake

Scott Granneman has an article The Big DRM Mistake which discusses DRM in a non-technical and illuminating way.

The artcicle sums up the problems with DRM succinctly.

1. DRM hurts paying customers
2. DRM destroys Fair Use rights
3. DRM renders customers' investments worthless
4. DRM can be defeated

Each of the examples explains in plain language why DRM is bad.

I shall recommend this to non-technical friends who can't figure out why I am anti-DRM.

They often can't see the point of obscure arguments about "fair use" and copyright, but pointing out that the downloaded tracks on their iPod are only there on a whim and could become worthless is an argument that most people can grasp.



Tags:





March 1, 2006

Brand Sony

I found this in an old issue of Wired and wondered how much this situation had changed after the Sony DRM debacle.

In one recent survey by Landor Associates, 99.5 percent of people said they'd be willing to pay more for a Sony. But the size of that premium is smaller than ever. Five years ago, Sony charged 44 percent more for its DVD players than the average manufacturer. Today, Sony DVD players cost just 16 percent more than the average. And yet, even though the price of Sony's most expensive DVD player fell 60 percent between 1999 and 2003, CyberHome, maker of absurdly cheap DVD players, has knocked off Sony to become the biggest DVD-machine seller in America.

I wonder how much of the SONY story has filtered down to the consumers via the media, and whether they understand enough of the DRM issues to affect their purchasing decisions. If 99.5% of all consumers would pay a Sony premium and only 10% of those understand the issues surrounding DRM enough to boycott Sony - is it enough to hurt Sony and discourage future attempts at DRM?

We could do with some figures on this one. Has the Sony DRM debacle dented consumer confidence in Sony enough to erode their brand - or is "Brand Sony" now so big that this is nothing more than a very bad PR year for them?



Tags:



February 28, 2006

Content Lock-In and Corporate Authorship

It would seem that Kathryn Cramer has reached the same conclusion that I have about DRM quite independently - its not about preventing copying - it's all about content lock in or "corporate authorship" as Kathryn calls it.

If digital watermarking schemes for DRM are put into practice, they may have little effect on the problem of bootleg versions of mega-corporate products. However, as discussed in the comment section, they may be quite effective about keeping digital artistic productions by individuals out of the distribution system: in the end, what DRM may accomplish is forcing individuals to give big corporations a cut for distribution just to get the authorized watermarking.

I believe, and have done for a while now, that the DRM madness has a hidden agenda - and that hidden agenda is to make it impossible for anyone to produce music or films that have not got the corporate seal of approval on them.

By extending DRM to many devices the day will come when you can make as much music as you like, distribute it for free in MP3 or OGG format - and no-one will be able to listen to it because the devices will refuse to play it without the hidden watermark.

So watermark-style DRM may do very little to prevent the "piracy" about which the big media corporations are up in arms, it may be the killer app of corporate authorship.

I don't care whether its called "corporate authorship" or "content lock-in" - the effect is the same - to kill the new forms of distribution and freedom engendered by the web and to ensure that whenever something is popular - the big media companies will always get their cut.

The web has great potential for short-circuiting tradional means of distribution and killing the stranglehold that Big Media have over what we read, watch and listen to.

This is not about losing 100,000 sales of Madonna's new single because it is copied illegaly - this is to do with consolidating the total and complete control of Big Media over everything we call "entertainment" - magazines, books, music, films, television and games - and beyond - to control the way we think about eveything.


Tags:


February 20, 2006

Seduction of the Innocent

The Seduction of the Innocent by Fredric Wertham fueled a backlash against perceived violence and sex in comics - forcing the closure of many titles and the eventual adoption of the voluntary "Comic Code Authority".

Seduction_of_the_Innocent.jpg

It was the 50's equivalent of the 1980's UK hysteria that led to the banning of "video nasties" - outlawing such cinematic gems as "Driller KIller' along with schock horrors such as "Last House on the Left" and "I Spit on Your Grave" - but not apparently "Texas Chainsaw Massacre" which never made the official list.

I recall most "video nasties" as cheaply made "bucket of blood" movies that were more likely to make us howl with laughter than howl with terror - but then I had already been corrupted by a childhood spent reading comics.

The only reason I mention this now I because I found a site that had come old covers of War Comics - but it seems that they aren't there for nostalgic reasons

Comics books do not only pervert the minds of children. They have helped shape and have formed the attitudes of generations of Americas toward violence, treatment of the "enemy" from World Wars I and II, Vietnam, the Gulf War - right up to the present.

This site also features sections on "Germans shown with contorted, mean and unshaven faces", "Germans depicted as being cruel and evil, usually to defenceless people" and "Hitler depicted as a crazy lunatic".

These are comic books right? I grew up on a diet of the things and I don't hate Germans - even as a child I knew the difference between a fictional representation of WWII and the real thing - no matter how many fictional stereotypes of "nazi" behaviour I was exposed to.

Every so often we get one of these moral panics come along - all of a sudden the media cry out almost as one -
its either comic books or video nasties or rave music or video games or the internet which is wrecking our youth.

Everytime we get one of these moral panics hyping up the evil "youth wreckers" it is just an excuse to whip up enough public hysteria to implement more controls on whatever it is that the government want to control next.

Whether it be comic books, video, games, internet, music with offensive lyrics - whenever you get public outrage whipped up like this - the real deal is who controls what we read, watch, play or use.


Tags: , , ,


February 7, 2006

BT sounds child web porn warning

If the new figures from the BBC are to be believed then -

The number of attempts to view illegal child pornography on the web has risen sharply since 2004, according to BT.

My problem with the Internet Watch Foundation BlackList - is that it is a secret.

How can we know whether all of these "35,000 hits per day" are really attempts at accessing "child porn" when the 'BlackList" is secret?

People could have been trying to access other sites in the .ru domain that have nothing to do with "illegal material" - these sites are blocked because, after all, "Russia is a popular location for child pornography"

No P2P file sharers in Russia trying to evade government restrictions on free speech then ...

Continue reading "BT sounds child web porn warning" »

February 4, 2006

Killing the Golden Goose

Another thing that stood out in the article The End of the Internet was the following:

Senior phone executives have publicly discussed plans to begin imposing a new scheme for the delivery of Internet content, especially from major Internet content companies. As Ed Whitacre, chairman and CEO of AT&T, told Business Week in November, "Why should they be allowed to use my pipes? The Internet can't be free in that sense, because we and the cable companies have made an investment, and for a Google or Yahoo! or Vonage or anybody to expect to use these pipes [for] free is nuts!"

Did the Telegram companies say this when national newspapers used their "pipes" to build medai empires - no they just benefited from the money they made by the extra traffic.

Did the Post Office say this when mail order empires were built on their "pipes" - no they benefited from the monet they made from the extra trafiic.

Did the phone companies say this when telemarketing companies made profits on their "pipes" - no they just benefited from the money they made from the extra traffic

The big carriers should be happy they are making money off the Internet, not trying to get a bigger slice of the pie at everyone else's expense - otherwise they might find that they kill the goose that laid the golden egg.



Tags:



The End of Cyberspace

I've been reading the discussions on the End of CyberSpace for over a week now.

Personally I kind of agree with David Sifry's view that we "don't need a new word".

Once it was called "ArpaNet", then it was called the "Internet", and it then it was called "the Web" and now these days some people talk about "Web2.0" or the "semantic web".

But "CyberSpace" has been adopted from Science Fiction -from WIlliam Gibson who invented the term - and somehow it has stuck around.

Perhaps it's because the word "Cyber Space" is convenient in so many ways.

Continue reading "The End of Cyberspace" »

February 3, 2006

Platform Control vs Content Control

It is my belief - after the SONY DRM disaster - that the long term business plan of "BigMedia" companies is not just an attempt at "content lockdown" - the prevention of unauthorised copying of copyrighted media.

It is also my belief, in disagreement with other pundits, that this is not an attempt at "platform lockdown" - where you have to buy multiple copies of your media to play on alternative devices.

I now believe that the long term aim of the BigMedia companies is nothing more than "Content Lock-In".

Continue reading "Platform Control vs Content Control" »

January 29, 2006

Mobile Phone Stalkers

I think that "Bad Science" has been in my RSS reader ever since I discovered it.

I love to see what scientists are thinking and doing, and now, with Ben Goldman's interview on the BBC, and his column today in The Guardian an old story has finally surfaced in the mainstream media.

Spy Blog carried this story a long time ago - as well as another which specifically highlighted the problems "Child Locate" & simlilar services.

Now that mainstream media has picked up the story - maybe someone will start taking the privacy issues of mobile phone tracking software seriously - or maybe they'll just keep quiet because nobody in government wants a public outrcy that negates the effectiveness of mobile phone tracking by the security agencies.


Tags:


January 26, 2006

MPAA finds itself accused of piracy

This came in on a feed ... it could be taken as "true" - it has the feel of "truth" .... and it made me think "how can the MPAA be so stupid"?

So I suspected propaganda - on the side of the anti-MPAA front

I tracked down the original posting from the "LA TImes"

The Motion Picture Assn. of America, the leader in the global fight against movie piracy, is being accused of unlawfully making a bootleg copy of a documentary that takes a critical look at the MPAA's film ratings system.

The MPAA admitted Monday that it had duplicated "This Film Is Not Yet Rated" without the filmmaker's permission after director Kirby Dick submitted his movie in November for an MPAA rating. The Hollywood trade organization said that it did not break copyright law, insisting that the dispute is part of a Dick-orchestrated "publicity stunt" to boost the film's profile.

Did they copy the film or not? Do the MPAA routinely copy films for "ratings" or not?

Apparently they do ...

... an MPAA representative did not specifically say the organization wouldn't copy the film, but did say "the confidentiality of your film ... is our first priority. Please feel assure (sic) that your film is in good hands."

What is the difference between copyright violation theft by the "good guys" and copyright violation theft by the "bad guys"?

My enquiring mind wants to know ...


Tags:

September 8, 2005

Wider Applications for Open Source?

From the "The Guardian" today, a piece entitled "Secrets Laid Bare" inspired by the recent DEMOS report "Wide Open"

I'm not sure I agree with the statement that "in a strict sense nothing except computer code can ever be open source".

Other electronic media, such a music and eBooks can also be distributed as "Open Source".

But then I realised that some of the largest "Open Source" projects have been running ever since human kind first began to speak.

Continue reading "Wider Applications for Open Source?" »

September 5, 2005

File-sharers 'breached copyright'

This from the BBC website:

According to latest reports file sharers 'breached copyright'.

Shock! Horror!

Sorry to tell you this BigMedia, but beating up the p2p guys *isn't going to help*.

Beating up the p2p *users* isn't going to help either.

Continue reading "File-sharers 'breached copyright'" »