USA > History > 2010 > Internet (I)
Twins’ Facebook Fight Rages On
December 30, 2010
The New York Times
By MIGUEL HELFT
SAN DIEGO — Some people go to court hoping to win millions of dollars. Tyler
and Cameron Winklevoss have already won tens of millions. But six years into a
legal feud with Facebook, they want to give it back — for a chance to get more.
The Winklevosses — identical twins and Harvard graduates — say that they, along
with another Harvard student, Divya Narendra, had the original idea for
Facebook, and that Mark Zuckerberg stole it. They sued Facebook and Mr.
Zuckerberg in 2004, and settled four years later for $20 million in cash and $45
million in Facebook shares.
They have been trying to undo that settlement since, saying they were misled on
the value of the deal. But it has not been an easy decision.
As recently as Thursday, the brothers considered dropping their effort to unwind
the agreement, and went as far as drafting a statement to that effect, according
to people close to the case. They decided, though, to keep fighting.
Their argument is that Facebook deceived them about the value of the shares,
leaving them with far less than they had agreed. Whatever their value at the
time of the deal, Facebook’s shares have soared since, putting the current worth
of the settlement, by some estimates, at more than $140 million.
Next month, the twins and Mr. Narendra plan to ask a federal appeals court in
San Francisco to undo the deal so they can pursue their original case against
Facebook and Mr. Zuckerberg, and win a richer payday. They could, though, lose
it all.
Still, they say it’s not about the money, it’s about the principle — and
vindication.
“The principle is that they didn’t fight fair,” said Tyler Winklevoss during an
interview at a pub here recently. “The principle is that Mark stole the idea.”
His brother, Cameron, chimed in, “What we agreed to is not what we got.”
Facebook denies it did anything improper and says the Winklevosses simply suffer
from a case of “settlers remorse.”
To make matters more complicated, the twins are also at war with the lawyers who
helped them win the settlement. The brothers fired them, accused them of
malpractice and refused to pay them. A judge recently found for the lawyers, and
ordered the twins to pay the 20 percent contingency fee, or $13 million. For
now, the money and shares remain in an escrow account.
Yet their battle with Mr. Zuckerberg is what has had them riled up. When they
talked about him, and told their version of the founding of Facebook, they
helped finish each other’s sentences, easily reciting every last detail of a
tale they have evidently told time and again.
“It shouldn’t be that Mark Zuckerberg gets away with behaving that way,” Cameron
Winklevoss said.
The company declined to make Mr. Zuckerberg available for an interview, and
Andrew Noyes, a spokesman, said Facebook would have no comment “beyond was is
already in our appellate briefs.” In the past, Mr. Zuckerberg has denied he
stole the Facebook idea from the Winklevosses, saying they planned a dating
site, not a social network.
The twins, who are 29, recently told portions of their story in a “60 Minutes”
interview for CBS. They grew up in affluence in Greenwich, Conn., were varsity
rowers at Harvard and competed in the Summer Olympics in Beijing in 2008. They
now live here in San Diego, where they are training for the 2012 London
Olympics.
They are as physically striking and imposing as they appeared in the film, “The
Social Network, where they were portrayed by one actor, Armie Hammer. They are
6-foot-5 , and their frames are lean and muscular, shaped by years of rowing.
For the interview, they wore hoodies and jeans, and only the variation in the
hoodies — one zippered with a Ron Jon Surf Shop emblem, one a pullover with a
Quicksilver logo — helped to tell them apart.
As they talked about the Facebook case, no detail was too small to omit, from
where they first met Mr. Zuckerberg (the Kirkland House dining room) to the
layout of Mr. Zuckerberg’s dorm room, to the content of the e-mails he had sent
them after they asked him to do computer programming for a Web site called
Harvard Connection. They recited arcane facts about the valuation of private
companies and even quoted from the Securities Act of 1934, which they say
Facebook violated when it drew up the settlement.
In addition to a bigger payday, the twins say they want a court to reconsider
their original claims about Facebook’s founding, pointing to instant messages on
the subject sent by Mr. Zuckerberg to various friends. The messages have come to
light since the brothers signed the deal. But they say Facebook executives and
board members have known about the messages since 2006, and played dirty by
concealing them when they negotiated the settlement.
“If you take all those documents, it is a dramatically different picture,” Tyler
Winklevoss said.
Facebook declined to comment on the messages. In prior interviews, Mr.
Zuckerberg said he had regretted sending some of them.
While the Winklevosses could end up losing their settlement, the risks for
Facebook are high as well. If the court unwinds the agreement, the company will
have to decide whether to offer them a richer settlement or face a trial. Recent
trades on a private exchange suggest that Facebook, which is not a public
company, now is worth around $50 billion, and the company may not want the
negative publicity associated with a trial, especially if it decides to move
forward with a stock offering.
The roots of the original dispute date to 2003, when Mr. Zuckerberg, then a
Harvard sophomore, said he would help the Winklevosses and Mr. Narendra program
Harvard Connection, later renamed ConnectU. But Mr. Zuckerberg delayed work on
Harvard Connection, and when pressed for answers, stalled, according to the
Winklevosses. In February 2004 he released TheFacebook, which eventually became
Facebook.
After ConnectU and its founders sued, Facebook countersued in 2005.
The settlement, which gave Facebook ownership of ConnectU, was supposed to
resolve all claims.
The details of the new dispute, which erupted almost immediately, are less
known, in part because the parties reached the settlement after a confidential
mediation. But according to court documents, the parties agreed to settle for a
sum of $65 million. The Winklevosses then asked whether they could receive part
of it in Facebook shares and agreed to a price of $35.90 for each share, based
on an investment Microsoft made nearly five months earlier that pegged
Facebook’s total value at $15 billion. Under that valuation, they received 1.25
million shares, putting the stock portion of the agreement at $45 million.
Yet days before the settlement, Facebook’s board signed off on an expert’s
valuation that put a price of $8.88 on its shares. Facebook did not disclose
that valuation, which would have given the shares a worth of $11 million. The
ConnectU founders contend that Facebook’s omission was deceptive and amounted to
securities fraud.
They refuse to say how much they would ask for in a new negotiation, but they
said that based on the lower valuation, they should have received roughly four
times the number of shares. At today’s price, that would give the settlement a
value of more than $500 million.
In its brief, the company says it was under no obligation to disclose the $8.88
valuation, which was available in public filings. Facebook describes it as one
of many that it received and as “immaterial” to the calculations of ConnectU
founders and their battery of lawyers and advisers.
“There was no chance that that one valuation would have affected the decision of
these sophisticated investors and their entourage of advisers,” Facebook wrote
in its brief.
In marketplaces that match buyers and sellers of the shares of privately held
companies, Facebook’s shares have soared to more than $100 in recent trades,
after adjusting for stock splits.
So far, Facebook’s arguments have won the day in multiple court rulings.
The brothers are hoping for better luck next month, before the United States
Court of Appeals for the Ninth Circuit. Unless they decide to give up.
Last year, the Winklevoss brothers completed coursework for a masters in
business administration at Oxford. Cameron helped to start Guestofaguest.com, a
Web site that offers information about “people, places and parties” in New York,
Los Angeles and the Hamptons.
“We are moving forward and trying to be productive individuals,” Cameron said.
When asked if they could have turned ConnectU into a site with hundreds of
millions of users, like Mr. Zuckerberg did with Facebook, the twins replied in
unison, “Absolutely.” They added that Mr. Zuckerberg deserved some credit for
“not screwing up” and expanding Facebook into a community of 500 million users.
But they believe the fame and fortune is undeserved.
Tyler Winklevoss said: “Mark is where he is because we approached him to include
him in our idea.”
Twins’ Facebook Fight
Rages On, NYT, 30.12.2010,
http://www.nytimes.com/2010/12/31/business/31twins.html
Online Sales Rose 15% This Holiday,
Beating In-Store Growth,
Report Says
December 23, 2010
The New York Times
By TIMOTHY WILLIAMS
Online sales increased more than 15 percent this holiday season, according to
data released Thursday, the latest confirmation of the growing importance of
Internet commerce during retail’s most lucrative time of the year.
Retailers online took in $36.4 billion from Oct. 31 to Dec. 23, compared with
$31.5 billion in the period a year ago, according to MasterCard Advisors
SpendingPulse, which tracks all forms of payments for purchases, including cash
and check.
The growth of online purchases is expected to surpass in-store sales this
Christmas, though it still represents a small percentage of total sales. The
National Retail Federation said last week that it expected sales in November and
December to increase 3.3 percent this year, up from 2.3 percent a year ago, to
$451.4 billion.
Much of the online increase came in apparel sales, SpendingPulse said, which
took in $7.3 billion since Oct. 31, up 25.7 percent from a year ago.
Over all, apparel purchases online accounted for 18.9 percent of the total
clothing sales this holiday, SpendingPulse said, up from 16.9 percent a year
ago.
Cold, wet weather across much of the country in the last several weeks led
consumers to stock up on warm clothing, which has been a boon to retailers, said
Michael McNamara, vice president for research and analysis at SpendingPulse. The
inclement weather has led many to shop at home.
“What is driving this is that apparel sales online are doing well in general,
represented by a shift from brick-and-mortar stores,” Mr. McNamara said. “The
cold weather has helped, too. Retailers are saying this is the season of the
sweater.”
Department stores saw an 11 percent increase in online purchases. Sales of
electronics goods increased 12.2 percent. Jewelry had a comparatively modest 4.5
percent increase online, according to SpendingPulse.
This year, six days surpassed the $1 billion mark, led by Nov. 30 and Dec. 1,
which each had about $1.1 billion in sales.
One three-day period — Dec. 14, 15 and 16 — each had sales of more than $1
billion. Last year, only three days had $1 billion in sales or more.
On the Monday after Thanksgiving, which was Nov. 29 this year, many online
retailers offered discounts and other deals to attract shoppers. The result was
$99.3 million in sales — a 25.3 percent increase rate from a year ago. Online
deals on the Friday after Thanksgiving spurred a 34.5 percent increase in online
sales, to $597 million.
Online Sales Rose 15%
This Holiday, Beating In-Store Growth, Report Says, NYT, 23.12.2010,
http://www.nytimes.com/2010/12/24/business/24retail.html
Music Web Sites Dispute Legality of Their Closing
December 19, 2010
The New York Times
By BEN SISARIO
When federal authorities shut down five Web sites last month on suspicion of
copyright infringement, they gave no warning and offered no details of their
investigation, and they have not filed any criminal charges since.
But after the seizure warrant used in the operation was released last week, the
operators of several of the sites said in interviews that they were innocent of
infringement, and criticized the investigation for misrepresenting how their
sites worked.
In a 69-page affidavit seeking the warrant, an agent of Immigration and Customs
Enforcement, the unit of the Department of Homeland Security that did the
investigation, said the five sites — rapgodfathers.com, torrent-finder.com,
rmx4u.com, dajaz1.com and onsmash.com — were used “to commit or facilitate
criminal copyright infringement.”
The agent also said the Motion Picture Association of America and the Recording
Industry Association of America, the trade groups for the major film studios and
record labels, had confirmed that the music and movies on the sites had not been
released with the authorization of their copyright holders.
Yet after being shown the affidavit, the operator of dajaz1.com — a widely read
hip-hop blog that posts new songs and videos — disputed many of the warrant’s
examples of what it called copyright infringement. He said that, like much of
the material on his site, the songs had been sent to him for promotional
purposes by record labels and the artists.
As proof, the operator, a Queens man who declined to give his real name but is
known online as Splash, showed The New York Times several e-mails from record
label employees and third-party marketers offering songs mentioned in the
affidavit.
“It’s not my fault if someone at a record label is sending me the song,” Splash
said.
In describing what it contends are the infringing aspects of onsmash.com, the
affidavit mentions a post with a link to new music by the rapper Kid Cudi, with
a line telling readers, “You can pre-order the album on iTunes tomorrow and
receive a bonus track on the day of release.”
Waleed A. GadElKareem, an Egyptian who operated torrent-finder.com, said his
site was essentially a search engine for BitTorrent — a decentralized
file-sharing system that can be used for any data — with results that are easily
found elsewhere on the Internet.
“Google and Yahoo still link to them,” he said. “Why can’t I?”
(Torrent-finder.com, like several of the seized domains, has relocated; it is
now fully operational at torrent-finder.info.)
The sites were shut over the Thanksgiving weekend as part of “Operation In Our
Sites,” a crackdown on 82 domains, or Web addresses, suspected of copyright
infringement and selling counterfeit handbags, sunglasses and other consumer
goods. The investigation is continuing. Unlike most previous similar government
crackdowns, the domains were seized with no warning.
The move has drawn criticism among many bloggers and Web advocates who see it as
a preview of a controversial bill in Congress, the Combating Online
Infringements and Counterfeits Act, which would extend the attorney general’s
power in pursuing Web sites believed to be “dedicated to infringing activities.”
“There is tremendous concern about the climate of fear and uncertainty this is
going to create,” said Peter Eckersley of the Electronic Frontier Foundation, a
civil liberties group. “It’s a troubling situation where basically any Web site
that the Department of Homeland Security doesn’t like and is convinced has too
much infringing material on it can just disappear overnight.”
Music Web Sites Dispute
Legality of Their Closing, NYT, 19.12.2010,
http://www.nytimes.com/2010/12/20/business/media/20music.html
Social Networks Meant for Social Good, but at a Price
December 19, 2010
The New York Times
By STEPHANIE STROM
Over the last year or so, there has been an explosion of online
intermediaries promising to help nonprofit groups raise money and awareness.
Crowdrise, Jumo, Causecast, Causes on Facebook and others try to use social
networking and crowdsourcing to build interest in charities and causes, and to
help them attract donations.
“2010 has really been the year of the social network for social good,” said
Katya Andresen, chief operating officer at Network for Good, a nonprofit that
handles processing and other administrative chores for many of the new sites.
In a recent study of online giving, Network for Good found that the experience
when donating online is important to people. “I think many of these new sites
are trying to make online giving, which is rather transactional in nature, an
experience of greater intimacy, and that’s valuable,” Ms. Andresen said.
But to many in the nonprofit world, the value of the sites remains to be seen.
For one thing, they hand partial control over charity brand names and trademarks
to users who are often unknown to the nonprofit groups they support. And
virtually all of them ask users to pay to donate.
“I think of them as disintermediaries because they stand between a nonprofit and
its supporters, and what most of our clients’ value is establishing that direct
connection,” said Gene Austin, chief executive of Convio, a company that
provides technology to help nonprofits manage relations. “It’s especially
concerning if they’re taking a cut.”
To Mr. Austin and others, the new sites operate on a model that evokes memories
of the United Way a decade ago. It began to lose ground when donors questioned
why they should make donations through United Way — and give it a percentage of
the money — when they could give directly to a charity.
“Moving toward a more donor-driven, pass-through model didn’t raise more money,”
said Brian Gallagher, chief executive of the United Way of America.
Now, the United Way raises money around three core issues, which it addresses
with proprietary programs. Its “pass-through” business, Mr. Gallagher said, has
remained stagnant for the last five or six years.
“What we learned is that folks will pay you if they think they’re getting more
value for what you’re offering,” he said.
The young entrepreneurs behind the new sites say their organizations are more
than middlemen. “Saying the people can donate on an organization’s Web site
misses the fact that nonprofits have to advertise to get people there, do
marketing in various places to convince them to donate, cover credit card fees
and pay for technology associated with their Web site and payment processing,”
said Matthew Mahan, a representative of Causes.
Chris Hughes, the founder of Jumo, said his site was primarily about helping
people connect with one another and with organizations around social missions,
not about fund-raising.
“Jumo makes it easier for people to find an organization and stay in touch with
it,” said Mr. Hughes, who is also a founder of Facebook. “That has a value.”
Crowdrise pitches itself as a tool to improve an individual’s fund-raising
campaign, whether that is a celebrity like Barbra Streisand, who is raising
money for the Cedars-Sinai Women’s Heart Center, or a person like Christine
(Crowdrise users usually use only their given name), who is using the site to
raise $60,000 for the Leukemia and Lymphoma Society.
“To us, Crowdrise is a complement or additive to whatever users are already
doing,” said Robert Wolfe, a founder. “We don’t see this as a place for a
charity to raise money for operational funds. It’s more for projects.”
Several online intermediaries serve as conduits to projects that cannot
otherwise be supported directly. For example, United States Artists, a nonprofit
that works to raise awareness of artists and their work, recently turned part of
its Web site into a social network that allows everyday donors to support
specific arts projects. It charges an 18 percent fee, but there is no other
simple way to contribute as directly to those projects.
Similarly, GiveLocally, a new donation service started by Andrew Young III, who
goes by Bo and whose father is the civil rights leader Andrew Young, allows
donors to support people in need by providing money to pay for things like
someone’s overdue electric bill.
The business — it is not a nonprofit — does not just transfer money to the
recipients featured on its Web site. Rather, it makes payments or purchases
using the money that donors offer, taking an 18 percent cut of each donation for
what Mr. Young calls “a keep-the-lights-on fee.”
He said none of the company’s executive team receive a salary. “What we’re doing
is a lot more personal than what other sites are offering,” he said. “We’re
linking individual donors to individual recipients and providing all the
necessary vetting.”
Virtually all of the new intermediaries charge 4.75 percent of a donation’s
value to cover Network for Good’s administrative charges. The Web site for
Causes says that the 4.75 percent fee is “equal to or greater than” what
nonprofits pay themselves in credit card processing fees and compares its
cost-effectiveness to that of direct mail solicitation.
Experts say, however, that comparisons to direct mail are unfair and that, on
average, nonprofits pay 3 percent to 3.5 percent in credit card fees.
Most of the new sites also suggest leaving a “tip” and preselect an amount,
though donors can opt out. Jumo, for instance, proposes tipping 15 percent.
Thus, a $25 gift would be whittled down to $20.06 once a 15 percent tip and
processing charge were deducted, unless the donor decided to add the tip onto
the $25. (The donor could still claim a tax deduction for the full amount,
however, because Jumo and Network for Good are charities, too.)
Donors to Crowdrise are also asked for a tip, and even if they opt out, fees to
cover Network for Good’s charges and Web maintenance would reduce a gift of $100
to $92.75.
Causes also has its hand out, saying, “We’re a small team that relies on the
support of generous donors like you to keep the lights on.”
In fact, Causes is a profit-making business, and it recently received $9 million
in venture capital financing, bringing its total financing to $16 million. Mr.
Mahan of Causes, said, “The purpose of our recent funding round and other
revenue streams — including tipping — is to help us deliver more innovative
solutions at a faster pace in order to grow activism online, incite more giving
and deliver scale efficiently and effectively.”
Mr. Hughes of Jumo said, “I think there’s probably a good conversation to be had
about how these sites self-fund.”
Social Networks Meant
for Social Good, but at a Price, NYT, 19.12.2010,
http://www.nytimes.com/2010/12/20/business/20charity.html
Online Stores Start to Wean Shoppers Off Sales
December 19, 2010
The New York Times
By STEPHANIE CLIFFORD and CLAIRE CAIN MILLER
This holiday season, online sales are zooming, even as online retailers offer
fewer discounts and turn picky about who shops at their sites.
After two years of relative malaise, online sales grew 12 percent in the first
47 days of the holiday season, according to comScore, to $27.5 billion. That
significantly outpaces the growth rate of retail sales over all, which analysts
expect to rise 3 to 4 percent this holiday season.
But online retailers are now protecting their margins with careful offers,
dispensing with the promotions of the last two holiday seasons that were meant
to drive sales and get rid of extra inventory. Gone are the coupons that give
shoppers 40 percent off all purchases. Instead, offers go to selected customers,
and are specialized: a discount on wool jackets, free hoop earrings when people
spend $100, a “mystery” discount amount that is revealed only at checkout.
The promotions try to get customers to behave in a certain way. A coupon may
seem straightforward, like Drugstore.com offering $5 off a $30 purchase. In
fact, it is encouraging one-time customers to browse through several pages of a
site and get to know what a retailer offers as they decide what to buy.
“The reason there’s these different promotions and not just the straight
dollar-off or percent-off promotions all the time is there are different
incentives,” said David Lonczak, chief marketing officer of Drugstore.com. “You
may just need a sale, you may have a product you’re long on and you need to get
rid of it, or you may be looking to acquire customers with a higher basket,” he
said, referring to the transaction price. “You have to be thoughtful.”
Discounting has declined; in November, retailers’ e-commerce revenue from sales
of full-price items rose 52 percent versus November 2009, according to MyBuys,
which works on personalization offers for retailers.
But less discounting has not tamped down online sales. On Thanksgiving weekend,
more than one-third of purchases were made online, versus about 28.5 percent
last year, according to the National Retail Federation.
That is because even staunch in-store shoppers are now comfortable buying
online, said Fiona Dias, executive vice president for strategy and marketing for
GSI Commerce, which provides e-commerce technology to retailers like Toys “R”
Us. And the high demand means that online retailers do not have to slash prices
to get customers.
“If anything, we’re running tight on inventory because everyone has sold a lot
more than they expected to,” Ms. Dias said of the sites she works with. “That’s
why we’re not seeing 50-percent-off promotions.”
Given their strong position, retailers are trying to get customers out of the
price-wars mind-set that they adopted during the recession.
“At some point, we have to stop and try to go back to where we were because if
everyone continues to offer 20 percent, 50 percent off, it’s going to change the
market on a long-term scale that it would be too hard to get back from,” said
Melissa Joy Manning, who runs an online jewelry store bearing her name. She has
stopped discounting, but is giving a pair of silver hoop earrings to customers
who spend $100 or more. “We don’t have unlimited resources, so we do try to be
as creative with them as we can,” she said.
Like Ms. Manning, other retailers are getting creative with unusually specific
offers.
“It’s about margins,” said Andy Dunn, the chief executive and co-founder of
Bonobos, a men’s clothing site. While last December, about a third of his
revenue came from promotions, this year it’s down to about a quarter, even as he
expects his revenue to nearly triple for the month. “There’s less of a need to
be highly promotional,” he said. “At the same time, we feel we need to get
better at the laser-beam promoting.”
So he is whittling down offers, sending, for instance, a 20 percent offer on
suit elements to people who have bought wool pants but not a jacket.
“We don’t have to treat everyone the same,” he said.
Drugstore.com also changes its approach depending on the customer.
That offer for $5 off any purchase over $30 may prompt people to explore the
site. “So if a new Drugstore.com customer doesn’t know I sell toys and games,
would you think I’d sell a Razor scooter?” he said. “I have to incent you to
shop around.”
He would use a percent-off coupon, he said, when he wants to drive overall
sales. And he tends to avoid offers like “$10 off your purchase,” because “I
would get a whole bunch of people coming in, they would find the product that
was 10 dollars and one cent, they would get it and I would never see them
again,” he said.
Other retailers are trying to stand out in crowded in-boxes. Bloomingdales.com
had a “mystery savings” event last week, in which customers on its e-mail list
were sent a code that called up discounts of between 10 and 40 percent at
checkout.
“People are going, ‘Well, maybe I’m going to be the one who hits the jackpot,’ ”
said Bruce Berman, president of Bloomingdales.com and chief financial officer of
Bloomingdale’s. “So they open it at a higher rate.” The tactic helped the store
stand out, he said. The day after the Bloomingdale’s e-mail went out, Saks Fifth
Avenue also sent one promoting a “mystery sale” online. Saks declined to comment
on the promotion.
For Bloomingdale’s, Mr. Berman said, “It worked out to our advantage because
whoever shops both will say, ‘I already did that.’ ”
Sometimes, a retailer can be too successful with an online sale, and have to
shift tactics on the fly to keep profit up.
At the Gap Inc. sites, which include Banana Republic and Old Navy, the plan was
to do heavy discounts on the four days after Thanksgiving. But Friday sales
“exceeded our forecast — it was too hot, it was too strong,” said Toby Lenk, the
president of Gap Inc. Direct. “So we pulled back on our promotions for Cyber
Monday.”
And other retailers have had to devise new tactics after vendors instructed them
to stop offering discounts on their brands.
“With the discounting in the last years, the perception from our vendors is that
we were discounting their products,” said Pete LaBore, director of customer
retention at Backcountry.com.
So the company came up with a new offer — “on our dime,” Mr. LaBore said — that
gave $20 off on the site. “It’s totally free money,” the offer said. But
customers did not seem to believe it, and Backcountry.com sent another e-mail
two days later with the subject line, “Seriously — It’s Free.”
The offer went only to people who had bought, in the past, certain brands or
categories in which Backcountry.com now had too much stock, or to people who
usually spent enough that “we weren’t just going to have somebody coming in
buying a three-dollar pair of socks,” Mr. LaBore said.
It seemed a smart approach; so far, the offer has been profitable, with most
people spending much more than $20, Mr. LaBore said.
“We’re trying to get away from the ‘sale, sale, sale’ message, and this is a
different way to do that,” he said.
Online Stores Start to
Wean Shoppers Off Sales, NYT, 19.12.2010,
http://www.nytimes.com/2010/12/20/business/20ecommerce.html
Facebook Wrestles With Free Speech and Civility
December 12, 2010
The New York Times
By MIGUEL HELFT
PALO ALTO, Calif. — Mark Zuckerberg, the co-founder and chief
executive of Facebook, likes to say that his Web site brings people together,
helping to make the world a better place. But Facebook isn’t a utopia, and when
it comes up short, Dave Willner tries to clean up.
Dressed in Facebook’s quasi-official uniform of jeans, a T-shirt and flip-flops,
the 26-year-old Mr. Willner hardly looks like a cop on the beat. Yet he and his
colleagues on Facebook’s “hate and harassment team” are part of a virtual police
squad charged with taking down content that is illegal or violates Facebook’s
terms of service. That puts them on the front line of the debate over free
speech on the Internet.
That role came into sharp focus last week as the controversy about WikiLeaks
boiled over on the Web, with coordinated attacks on major corporate and
government sites perceived to be hostile to that group.
Facebook took down a page used by WikiLeaks supporters to organize hacking
attacks on the sites of such companies, including PayPal and MasterCard; it said
the page violated the terms of service, which prohibit material that is hateful,
threatening, pornographic or incites violence or illegal acts. But it did not
remove WikiLeaks’s own Facebook pages.
Facebook’s decision in the WikiLeaks matter illustrates the complexities that
the company grapples with, on issues as diverse as that controversy, verbal
bullying among teenagers, gay-baiting and religious intolerance.
With Facebook’s prominence on the Web — its more than 500 million members upload
more than one billion pieces of content a day — the site’s role as an arbiter of
free speech is likely to become even more pronounced.
“Facebook has more power in determining who can speak and who can be heard
around the globe than any Supreme Court justice, any king or any president,”
said Jeffrey Rosen, a law professor at George Washington University who has
written about free speech on the Internet. “It is important that Facebook is
exercising its power carefully and protecting more speech rather than less.”
But Facebook rarely pleases everyone. Any piece of content — a photograph,
video, page or even a message between two individuals — could offend somebody.
Decisions by the company not to remove material related to Holocaust denial or
pages critical of Islam and other religions, for example, have annoyed advocacy
groups and prompted some foreign governments to temporarily block the site.
Some critics say Facebook does not do enough to prevent certain abuses, like
bullying, and may put users at risk with lax privacy policies. They also say the
company is often too slow to respond to problems.
For example, a page lampooning and, in some instances, threatening violence
against an 11-year-old girl from Orlando, Fla., who had appeared in a music
video, was still up last week, months after users reported the page to Facebook.
The girl’s mother, Christa Etheridge, said she had been in touch with law
enforcement authorities and was hoping the offenders would be prosecuted.
“I’m highly upset that Facebook has allowed this to go on repeatedly and to let
it get this far,” she said.
A Facebook spokesman said the company had left the page up because it did not
violate its terms of service, which allow criticism of a public figure. The
spokesman said that by appearing in a band’s video, the girl had become a public
figure, and that the threatening comments had not been posted until a few days
ago. Those comments, and the account of the user who had posted them, were
removed after The New York Times inquired about them.
Facebook says it is constantly working to improve its tools to report abuse and
trying to educate users about bullying. And it says it responds as fast as it
can to the roughly two million reports of potentially abusive content that its
users flag every week.
“Our intent is to triage to make sure we get to the high-priority, high-risk and
high-visibility items most quickly,” said Joe Sullivan, Facebook’s chief
security officer.
In early October, Mr. Willner and his colleagues spent more than a week dealing
with one high-risk, highly visible case; rogue citizens of Facebook’s world had
posted antigay messages and threats of violence on a page inviting people to
remember Tyler Clementi and other gay teenagers who have committed suicide, on
so-called Spirit Day, Oct. 20.
Working with colleagues here and in Dublin, they tracked down the accounts of
the offenders and shut them down. Then, using an automated technology to tap
Facebook’s graph of connections between members, they tracked down more profiles
for people, who, as it turned out, had also been posting violent messages.
“Most of the hateful content was coming from fake profiles,” said James
Mitchell, who is Mr. Willner’s supervisor and leads the team. He said that
because most of these profiles, created by people he called “trolls,” were
connected to those of other trolls, Facebook could track down and block an
entire network relatively quickly.
Using the system, Mr. Willner and his colleagues silenced dozens of troll
accounts, and the page became usable again. But trolls are repeat offenders, and
it took Mr. Willner and his colleagues nearly 10 days of monitoring the page
around the clock to take down over 7,000 profiles that kept surfacing to attack
the Spirit Day event page.
Most abuse incidents are not nearly as prominent or public as the defacing of
the Spirit Day page, which had nearly 1.5 million members. As with schoolyard
taunts, they often happen among a small group of people, hidden from casual
view.
On a morning in November, Nick Sullivan, a member of the hate and harassment
team, watched as reports of bullying incidents scrolled across his screen, full
of mind-numbing meanness. “Emily looks like a brother.” (Deleted) “Grady is with
Dave.” (Deleted) “Ronald is the biggest loser.” (Deleted) Although the insults
are relatively mild, as attacks on specific people who are not public figures,
these all violated the terms of service.
“There’s definitely some crazy stuff out there,” Mr. Sullivan said. “But you can
do thousands of these in a day.”
Nancy Willard, director of the Center for Safe and Responsible Internet Use,
which advises parents and teachers on Internet safety, said her organization
frequently received complaints that Facebook does not quickly remove threats
against individuals. Jim Steyer, executive director of Common Sense Media, a
nonprofit group based in San Francisco, also said that many instances of abuse
seemed to fall through the cracks.
“Self-policing can take some time, and by then a lot of the damage may already
be done,” he said.
Facebook maintains it is doing its best.
“In the same way that efforts to combat bullying offline are not 100 percent
successful, the efforts to stop people from saying something offensive about
another person online are not complete either,” Joe Sullivan said.
Facebook faces even thornier challenges when policing activity that is
considered political by some, and illegal by others, like the controversy over
WikiLeaks and the secret diplomatic cables it published.
Last spring, for example, the company declined to take down pages related to
“Everybody Draw Muhammad Day,” an Internetwide protest to defend free speech
that surfaced in repudiation of death threats received by two cartoonists who
had drawn pictures of Muhammad. A lot of the discussion on Facebook involved
people in Islamic countries debating with people in the West about why the
images offended.
Facebook’s team worked to separate the political discussion from the attacks on
specific people or Muslims. “There were people on the page that were crossing
the line, but the page itself was not crossing the line,” Mr. Mitchell said.
Facebook’s refusal to shut down the debate caused its entire site to be blocked
in Pakistan and Bangladesh for several days.
Facebook has also sought to walk a delicate line on Holocaust denial. The
company has generally refused to block Holocaust denial material, but has worked
with human rights groups to take down some content linked to organizations or
groups, like the government of Iran, for which Holocaust denial is part of a
larger campaign against Jews.
“Obviously we disagree with them on Holocaust denial,” said Rabbi Abraham
Cooper, associate dean of the Simon Wiesenthal Center. But Rabbi Cooper said
Facebook had done a better job than many other major Web sites in developing a
thoughtful policy on hate and harassment.
The soft-spoken Mr. Willner, who on his own Facebook page describes his
political views as “turning swords into plowshares and spears into pruning
hooks,” makes for an unlikely enforcer. An archaeology and anthropology major in
college, he said that while he loved his job, he did not love watching so much
of the underbelly of Facebook.
“I handle it by focusing on the fact that what we do matters,” he said.
Facebook Wrestles
With Free Speech and Civility, NYT, 12.10.2010,
http://www.nytimes.com/2010/12/13/technology/13facebook.html
Spam Downloads Surge Among WikiLeaks Supporters
December 10, 2010
Filed at 11:11 a.m. EST
The New York Times
By THE ASSOCIATED PRESS
LONDON (AP) — WikiLeaks supporters on Friday downloaded increasing amounts of
the spam-shooting software used to attack companies seen as hostile — a
development that could challenge even Internet giants such as PayPal and
Amazon.com during the crucial Christmas shopping season.
U.S. data security company Imperva says downloads of the attack program used to
bombard websites with bogus requests for data have jumped to over 40,000, with
thousands of new downloads reported overnight.
"It's definitely increasing," Imperva Web researcher Tal Be'ery said in a
telephone interview from Israel.
The freely available software is a critical part of the campaign by
"hacktivists" seeking to take revenge on sites they believe have betrayed
WikiLeaks, the group that has outraged American officials by publishing hundreds
of thousands of classified U.S. diplomatic cables and military intelligence
reports.
Users who download the software essentially volunteer their computers to be used
as weapons that volley streams of electronic spam at targeted websites. The more
computers, the greater the flow of data requests, and the better chances are of
overwhelming the targeted website.
The cyberguerillas, who gather under the name Anonymous, have generally been
successful in foiling their enemies. Attacks directed at the main pages of Visa
Inc. and MasterCard Inc. succeeded in making them inaccessible, in MasterCard's
case for several hours. Attacks on online payment company PayPal Inc. have
periodically rendered part of its website inoperative. Moneybookers.com, another
targeted site, was inaccessible Friday.
All four sites have severed their links to WikiLeaks, often citing suspected
"terms of use" violations, hurting the group's ability to accept donations. The
moves angered WikiLeaks supporters and alarmed free speech advocates, whom claim
the companies are caving in to U.S. pressure to muzzle the controversial
website.
WikiLeaks has been careful to distance itself from Anonymous, saying "we neither
condemn nor applaud these attacks."
A press release circulated under the Anonymous name Friday said the group was
acting "to raise awareness about WikiLeaks and the underhanded methods employed
by the above companies to impair WikiLeaks' ability to function."
Imperva said Friday that it had monitored Anonymous supporters boasting about
bringing in huge numbers of extra computers to back the attacks — something it
said might challenge Amazon.com — another site that cut its ties to WikiLeaks —
at one of the retailer's busiest times of the year.
But Be'ery stressed the boasts were unconfirmed, and the Anonymous statement
said its members did not want to alienate the public by causing online havoc
over the holidays.
"Simply put, attacking a major online retailer when people are buying presents
for their loved ones would be in bad taste," the Anonymous release said.
Dutch police said Friday they were investigating whether hackers were
responsible for taking down the websites of police and prosecutors in the
Netherlands after the arrest of a 16-year-old suspected cybercriminal and
alleged WikiLeaks supporter.
In Australia, WikiLeaks supporters held rallies Friday in Brisbane and in
Sydney, where more than 500 people gathered outside Town Hall, some waving signs
that read, "Hands off WikiLeaks, We deserve the truth," and "Don't shoot the
messenger."
One man sealed his mouth shut with tape on which the words "NO LEAKS" was
written.
Among the most recent newsworthy WikiLeaks revelations was a claim that drug
maker Pfizer Inc. hired investigators to dig up dirt on Nigeria's former
attorney general in a bid to stop action over a 1996 drug study, and that the
U.S. considered taking military action against an arms-laden Ukrainian ship
after it was hijacked by Somali pirates two years ago.
The U.S. Department of Justice, meanwhile is considering whether to charge those
behind the leaks under the espionage act or other laws, while U.S. diplomats,
deeply embarrassed by WikiLeaks' disclosures, have struggled to contain the
fallout.
"The deplorable WikiLeaks disclosures put innocent lives at risk, and damage
U.S. national security interests," U.S. Ambassador to London Louis Susman wrote
in an editorial Friday in The Guardian newspaper. "There is nothing brave about
sabotaging the peaceful relations between nations on which our common security
depends."
The U.S. may soon be facing more than WikiLeaks as an opponent.
A former WikiLeaks spokesman plans to launch a rival website Monday called
Openleaks that will help anonymous sources deliver sensitive material to public
attention. Daniel Domscheit-Berg made the claim in a documentary by Swedish
broadcaster SVT airing Sunday but obtained in advance by the AP.
WikiLeaks founder Julian Assange remained in a U.K. jail ahead of a Dec. 14
hearing where he plans to fight Sweden's request to extradite him to face sex
crimes allegations.
___
Kristen Gelineau in Sydney, Michael Corder in The Hague and Louise Nordstrom in
Stockholm contributed to this report.
Spam Downloads Surge
Among WikiLeaks Supporters, 10.12.2010,
http://www.nytimes.com/aponline/2010/12/10/world/europe/AP-WikiLeaks.html
Web Attackers Find a Cause in WikiLeaks
December 9, 2010
The New York Times
By NOAM COHEN
They got their start years ago as cyberpranksters, an online
community of tech-savvy kids more interested in making mischief than political
statements.
But the coordinated attacks on major corporate and government Web sites in
defense of WikiLeaks, which began on Wednesday and continued on Thursday,
suggested that the loosely organized group called Anonymous might have come of
age, evolving into one focused on more serious matters: in this case, the
definition of Internet freedom.
While the attacks on such behemoths as MasterCard, Visa and PayPal were not
nearly as sophisticated as some less publicized assaults, they were a step
forward in the group’s larger battle against what it sees as increasing control
of the Internet by corporations and governments. This week they found a cause
and an icon: Julian Assange, the former hacker who founded WikiLeaks and is now
in a London jail at the request of the Swedish authorities investigating him on
accusations of rape.
“This is kind of the shot heard round the world — this is Lexington,” said John
Perry Barlow, a co-founder of the Electronic Frontier Foundation, a civil
liberties organization that advocates for a freer Internet.
On Thursday, the police in the Netherlands took the first official action
against the campaign, detaining a 16-year-old student in his parents’ home in
The Hague who they said admitted to participating in attacks on MasterCard and
Visa. The precise nature of his involvement was unclear, but in past
investigations, the authorities have sometimes arrested those unsophisticated
enough not to cover their tracks on the Web.
Meanwhile, a lawyer for Mr. Assange, 39, said he strongly denied that he had
encouraged any attacks on behalf of WikiLeaks.
“It is absolutely false,” the lawyer, Jennifer Robinson, told the Australian
Broadcasting Corporation in London on Thursday. “He did not make any such
instruction, and indeed he sees that as a deliberate attempt to conflate hacking
organizations” with “WikiLeaks, which is not a hacking organization. It is a
news organization and a publisher.”
Although Anonymous remains shadowy and without public leaders, it developed a
loose hierarchy in recent years as it took on groups as diverse as the Church of
Scientology and the Motion Picture Association of America.
The coordination and the tactics developed in those campaigns appeared to make
this week’s attacks more powerful, allowing what analysts believe is a small
group to enlist thousands of activists to bombard Web sites with traffic, making
them at least temporarily inaccessible. Experts say the group appears to have
used more sophisticated software this time that allowed supporters to repeatedly
visit the sites at a specific time when the command was given.
The Twitter account identified with the Anonymous movement contained messages
with little more than the words “Fire now.”
The attacks thus far have been of limited effect, shutting down the MasterCard
Web site, not its online transactions.
But to security experts and people who have tracked or participated in the
Anonymous movement, they indicated a step forward for cyberanarchists railing
against the “elites” — corporations and governments with power over both the
machinery and, critics increasingly argue, the content on the Web.
“In the past, Anonymous made quite a lot of noise but did little damage,” said
Amichai Shulman, chief technology officer at Imperva, a California-based
security technology company. “It’s different this time around. They are starting
to use the same tools that industrial hackers are using.”
Despite the name, Anonymous can be found in many locations and formats. Members
converse in online forums and chat rooms where friendships and alliances often
build.
“It’s the first place I go when I turn on my computer,” said one Anonymous
activist, reached on an online chat service, who did not want to be named
discussing the structure of the organization.
Groups of these friends, who form new conversations, or threads, sometimes
decide on a topic or an issue that they feel is deserving of more attention, the
activist said.
“You post things, discuss ideas and that leads to putting out a video or a
document” for a campaign. In the case of WikiLeaks, the activist said, it
appears that two groups decided almost simultaneously to mount a concerted
effort against the site’s enemies.
“I got e-mailed these two links on Sunday or Monday,” he said. Denouncing
“what’s being done to Julian and WikiLeaks,” he said, he decided to join in.
These ideas bubble up, but ultimately a small group decides exactly what
affiliated site should be attacked and when, according to a Dutch writer on the
Anonymous movement, who writes a blog under the name Ernesto Van der Sar. There
is a chat room “that is invite only, with a dozen or so people,” he said, that
pick the targets and the time of attack.
He described the typical Anonymous member as young; he guessed 18 to 24 years
old.
While Anonymous has recently had success with attacks on sites related to
copyright infringement cases, the WikiLeaks cause has brought a much greater
intensity to its efforts.
The campaigns are part of Operation Payback, created in the summer to defend a
file-sharing site in Sweden that counts itself part of the mission of keeping
the Internet unfettered and unfiltered and that was singled out by the
authorities.
“We could move against enemies of WikiLeaks so easily because there was already
a network up and running, there was already a chat room for people to meet in,”
said Gregg Housh, an activist who has been involved in Anonymous campaigns but
disavows a personal role in any illegal online activity.
The software used to coordinate the attacks is being downloaded about 1,000
times per hour, with about one-third of those downloads coming from the United
States. Recently the software was improved so that a command could be sent to a
supporter’s computers and the attack would begin — no human needed.
But even Mr. Barlow of the Electronic Frontier Foundation appeared to have
second thoughts about where such escalation could lead: On Thursday, he said
that the Anonymous group members represented “a stunning force in the world.
“But still,” he said, it is “better used to open, not to close.” He added that
he opposed denial-of-service attacks on principle: “It’s like the poison gas of
cyberspace. The fundamental principle should be to open things up and not close
them.”
Things were hardly so serious when Anonymous first made a name for itself. The
group grew out of online message boards like 4chan, an unfiltered meeting place
with more than its share of misanthropic behavior and schemes.
Mr. Housh said of Anonymous: “It was deliberately not for any good. We kind of
took pride in it.”
That changed when Mr. Housh and a few dozen others were incensed by the Church
of Scientology’s attempt to use copyright law to remove a long video in which
the actor Tom Cruise had spoken about church beliefs.
With its work on behalf of WikiLeaks, Anonymous has found a much more
high-profile cause. As the campaign expands, many fear a more contentious
Internet as governments and businesses respond to more serious attacks by
activists who benefit from improvements in bandwidth and readily available
hacking tools.
“Home field advantage goes to the attacker,” said Gunter Ollmann, vice president
of research at Damballa, an Atlanta-based firm that specializes in Internet
protection. “With a little bit of coordination and growing numbers of
participants, these things will continue to happen regularly.”
Reporting was contributed by John Markoff and Ashlee Vance from
San Francisco, Ravi Somaiya from London and Marlise Simons from Paris.
Web Attackers Find a Cause in WikiLeaks,
NYT, 9.12.2010,
http://www.nytimes.com/2010/12/10/world/10wiki.html
Hacker Threatens More Attacks on WikiLeaks Foes
December 9, 2010
The New York Times
By JOHN F. BURNS and RAVI SOMAIYA
LONDON — In a campaign that had some declaring the start of a “cyberwar,”
hundreds of Internet activists mounted retaliatory attacks on the Web sites of
multinational companies and other organizations they deemed hostile to the
WikiLeaks antisecrecy organization and its jailed founder, Julian Assange.
Within 12 hours of a British judge’s decision to deny Mr. Assange bail in a
Swedish extradition case, attacks on the Web sites of WikiLeaks’s “enemies,” as
defined by the organization’s impassioned supporters around the world, caused
several corporate Web sites to become inaccessible or slow down markedly on
Wednesday.
Targets of the attacks, in which activists overwhelmed the sites with traffic,
included the Web site of MasterCard, which had stopped processing donations for
WikiLeaks; Amazon.com, which revoked the use of its computer servers; and
PayPal, which stopped accepting donations for Mr. Assange’s group. Visa.com was
also affected by the attacks, as were the Web sites of the Swedish prosecutor’s
office and the lawyer representing the two women whose allegations of sexual
misconduct are the basis of Sweden’s extradition bid.
On Thursday, Gregg Housh, an activist with the loosely affiliated group of
so-called hacktivists, said the group was redoubling its efforts to bring down
PayPal, which is better protected than some other sites. PayPal, an online
payment service company, said the attacks had slowed its Web site “but have not
significantly impacted payments.”
No other major Web sites appeared to be suffering disruptions in service early
Thursday, however, suggesting that the economic impact of the attacks was
limited.
The Internet assaults underlined the growing reach of self-described
“cyberanarchists,” antigovernment and anticorporate activists who have made an
icon of Mr. Assange, a 39-year-old Australian.
The speed and range of the attacks Wednesday appeared to show the resilience of
the backing among computer activists for Mr. Assange, who has appeared
increasingly isolated in recent months amid the furor stoked by WikiLeaks’s
posting of hundreds of thousands of secret Pentagon documents on the wars in
Afghanistan and Iraq.
Mr. Assange has come under renewed attack in the past two weeks for posting the
first tranche of a trove of 250,000 secret State Department cables that have
exposed American diplomats’ frank assessments of relations with many countries,
forcing Secretary of State Hillary Rodham Clinton to express regret to world
leaders and raising fears that they and other sources would become more
reticent.
The New York Times and four other news organizations last week began publishing
articles based on the archive of cables made available to them.
In recent months, some of Mr. Assange’s closest associates in WikiLeaks
abandoned him, calling him autocratic and capricious and accusing him of
reneging on WikiLeaks’s original pledge of impartiality to launch a concerted
attack on the United States. He has been simultaneously fighting a remote battle
with the Swedish prosecutors, who have sought his extradition for questioning on
accusations of “rape, sexual molestation and forceful coercion” made by the
Swedish women. Mr. Assange has denied any wrongdoing in the cases.
American officials have repeatedly said that they are reviewing possible
criminal charges against Mr. Assange, a step that could lead to a bid to
extradite him to the United States and confront him with having to fight for his
freedom on two fronts.
The cyberattacks in Mr. Assange’s defense appear to have been coordinated by
Anonymous, a loosely affiliated group of activist computer hackers who have
singled out other groups before, including the Church of Scientology. Last
weekend, members of Anonymous vowed in two online manifestos to take revenge on
any organization that lined up against WikiLeaks.
Anonymous claimed responsibility for the MasterCard attack in Web messages and,
according to Mr. Housh, the activist associated with the group, conducted waves
of attacks on other companies during the day. The group said the actions were
part of an effort called Operation Payback, which began as a way of punishing
companies that tried to stop Internet file-sharing and movie downloads.
Mr. Housh, who disavows a personal role in any illegal online activity, said
that 1,500 supporters had been in online forums and chat rooms organizing the
mass “denial of service” attacks. His account was confirmed by Jose Nazario, a
senior security researcher at Arbor Networks, a Chelmsford, Mass., firm that
tracks malicious activity on computer networks.
Most of the corporations whose sites were targeted did not explain why they
severed ties with WikiLeaks. But PayPal issued statements saying its decision
was based on “a violation” of its policy on promoting illegal activities.
The sense of an Internet war was reinforced Wednesday when netcraft, a British
Internet monitoring firm, reported that the Web site being used by the hackers
to distribute denial-of-service software had been suspended by a Dutch hosting
firm, Leaseweb.
A sense of the belligerent mood among activists was given when one contributor
to a forum the group uses, WhyWeProtest.net, wrote of the attacks: “The war is
on. And everyone ought to spend some time thinking about it, discussing it with
others, preparing yourselves so you know how to act if something compels you to
make a decision. Be very careful not to err on the side of inaction.”
Mr. Housh acknowledged that there had been online talk among the hackers of a
possible Internet campaign against the two women who have been Mr. Assange’s
accusers in the Swedish case, but he said that “a lot of people don’t want to be
involved.”
A Web search showed new blog posts in recent days in which the two women,
identified by the Swedish prosecutors only as Ms. A. and Ms. W., were named, but
it was not clear whether there was any link to Anonymous. The women have said
that consensual sexual encounters with Mr. Assange became nonconsensual when he
stopped using condoms.
The cyberattacks on corporations Wednesday were seen by many supporters as a
counterstrike against the United States. Mr. Assange’s online supporters have
widely condemned the Obama administration as the unseen hand coordinating
efforts to choke off WikiLeaks by denying it financing and suppressing its
network of computer servers.
Mr. Housh described Mr. Assange in an interview as “a political prisoner,” a
common view among WikiLeaks supporters who have joined Mr. Assange in condemning
the sexual abuse accusations as part of an American-inspired “smear campaign.”
Another activist used the analogy of the civil rights struggle for the
cyberattacks.
“Are they disrupting business?” a contributor using the name Moryath wrote in a
comment on the slashdot.org technology Web site. “Perhaps, but no worse than the
lunch counter sit-ins did.”
John Markoff and Ashlee Vance contributed reporting from San Francisco, and Alan
Cowell from Paris.
Hacker Threatens More
Attacks on WikiLeaks Foes, NYT, 9.12.2010,
http://www.nytimes.com/2010/12/10/world/10wiki.html
Hackers Give Web Companies a Test of Free Speech
December 8, 2010
The New York Times
By ASHLEE VANCE and MIGUEL HELFT
A hacking free-for-all has exploded on the Web, and Facebook and Twitter are
stuck in the middle.
On Wednesday, anonymous hackers took aim at companies perceived to have harmed
WikiLeaks after its release of a flood of confidential diplomatic documents.
MasterCard, Visa and PayPal, which had cut off people’s ability to donate money
to WikiLeaks, were hit by attacks that tried to block access to the companies’
Web sites and services.
To organize their efforts, the hackers have turned to sites like Facebook and
Twitter. That has drawn these Web giants into the fray and created a precarious
situation for them.
Both Facebook and Twitter — but particularly Twitter — have received praise in
recent years as outlets for free speech. Governments trying to control the flow
of information have found it difficult to block people from voicing their
concerns or setting up meetings through the sites.
At the same time, both Facebook and Twitter have corporate aspirations that
hinge on their ability to serve as ad platforms for other companies. This leaves
them with tough public relations and business decisions around how they should
handle situations as politically charged as the WikiLeaks developments.
Some internet experts say the situation highlights the complexities of free
speech issues on the Internet, as grassroots Web companies evolve and take
central control over what their users can make public. Clay Shirky, who studies
the Internet and teaches at New York University, said that although the Web is
the new public sphere, it is actually “a corporate sphere that tolerates public
speech.”
Marcia Hofmann, a lawyer at the Electronic Frontier Foundation, said, “Any
Internet user who cares about free speech or has a controversial or unpopular
message should be concerned about the fact that intermediaries might not let
them express it.”
She added, “Your free speech rights are only as strong as the weakest
intermediary.”
The problem came into relief on Wednesday, through an effort called Operation
Payback, organized by a group calling itself Anonymous. The group spent much of
the day posting notes on Facebook and Twitter that told followers which
companies to single out and that documented hacking successes.
But Facebook banned one of the group’s pages, saying that using the site to
organize hacking attacks like that violated its terms of use. The group went on
Twitter to complain.
A Facebook spokesman issued a statement saying that the company was “sensitive
to content that includes pornography, bullying, hate speech, and threats of
violence” and would “take action on content that we find or that’s reported to
us that promotes unlawful activity.”
In an interview Wednesday morning, Joe Sullivan, Facebook’s chief security
officer, addressed WikiLeaks’s own presence on the site. He said the company had
not received any official requests to disable pages or accounts associated with
the WikiLeaks organization.
Facebook generally resists requests by governments or advocacy groups to take
down material if that content is not illegal or does not violate Facebook’s
terms of service, which prohibit attacks on individuals or incitements to
violence.
“Facebook is a place where people come to talk about all sorts of things,
including controversial topics,” Mr. Sullivan said. It was not clear whether
anyone had asked Facebook to take down the Operation Payback page.
Twitter allowed the Operation Payback account to stay active most of Wednesday.
But the group’s account was disabled late in the day, after it posted a link to
a file that provided thousands of consumer credit card numbers, according to a
person with direct knowledge of the situation.
A Twitter spokesman declined to discuss the details of the situation. “We don’t
comment about the specific actions we take around user accounts,” he said.
The company is not overly concerned about hackers’ attacking Twitter’s site, he
said, explaining that it faces security issues all the time and has technology
to deal with the situation.
Twitter is in a particularly delicate situation because its founders have
celebrated their service’s role in political protest and free speech. They have
not been shy about trying to capitalize on the good will engendered by playing
that role.
WikiLeaks’s own Twitter account remains active, and it is the group’s main
channel for reaching supporters and the media.
Last week, Amazon.com fell into a similar position when it decided to stop
storing files for WikiLeaks. Advocates of WikiLeaks complained that Amazon.com
was bowing to political pressure to cut the organization from its Web services.
An Amazon.com spokesman said the company was simply banning an organization that
had violated its terms of service by trying to distribute documents it did not
own.
The last week has given rise to a hacking war in which groups have blocked
access to WikiLeaks’s Web sites by bombarding them with requests.
And now the WikiLeaks supporters have responded in kind, flying the freedom of
speech banner as the motivation for their actions.
Claire Cain Miller contributed reporting.
Hackers Give Web
Companies a Test of Free Speech, NYT, 8.12.2010,
http://www.nytimes.com/2010/12/09/technology/09net.html
WikiLeaks Struggles to Stay Online After Cyberattacks
December 3, 2010
The New York Times
By RAVI SOMAIYA and J. DAVID GOODMAN
LONDON — An American provider of Internet domain names withdrew its service
to the WikiLeaks Web site late Thursday after a barrage of attacks by hackers
threatened to destabilize its entire system. But within hours, WikiLeaks had
registered its domain name in Switzerland, and it was back online by early
Friday morning.
Shortly after the action by EveryDNS.net, which provides domain names for about
500,000 Web sites, the French government began seeking measures to keep the
whistle blowing organization from being hosted in France. The moves follow a
decision on Wednesday by Amazon.com Inc. to expel WikiLeaks from its servers.
The organization remains on the servers of a Swedish host, Bahnhof.
WikiLeaks appears increasingly engaged in a game of digital Whac-A-Mole as it
struggles to stay online after publicizing a huge array of some 250,000 leaked
State Department documents relating to American foreign policy around the globe.
The Web infrastructure that supports WikiLeaks is deliberately diffuse and
difficult to track, with servers spread through many countries in order to
insulate the site from hostile states or companies. But cyberattacks and
problems with service providers have kept the site and its founder, Julian
Assange, moving.
“Since April of this year, our timetable has not been our own; rather it has
been one that has centered on the moves of abusive elements of the United States
government against us,” Mr. Assange wrote in a discussion on Friday on the Web
site of the British newspaper The Guardian. “The threats against our lives are a
matter of public record,” he added later, saying he and others who work on
WikiLeaks were taking “appropriate precautions.” Mr. Assange is being sought for
questioning in connection to alleged sex crimes in Sweden, which he has denied
the allegations, and his location was not disclosed.
In a statement on its Web site, EveryDNS.net said it terminated WikiLeaks’
domain name at around 10 p.m., Eastern time for violating its terms of service.
The old domain, WikiLeaks.org, “has become the target of multiple distributed
denial of service (DDOS) attacks,” the company said. Such attacks usually
involve bombarding a Web site with requests for access, effectively blocking
legitimate users, and are designed to make a targeted Web site unavailable. When
questioned about similar cyberattacks on Sunday against WikiLeaks, American
officials vigorously denied any involvement.
According to WhoIs.com, the new domain, WikiLeaks.ch, is registered to the Swiss
branch of the Swedish Pirate Party, a political organization that has previously
worked with Mr. Assange.
In an interview with The New York Times earlier this year, the Pirate Party’s
leader, Rickard Falkvinge, expressed an open offer to host the WikiLeaks site
because “our organizations generally share the same values — we value privacy,
transparency, democracy and knowledge.” Mr. Falkvinge added that any sharing of
Web services between the two organizations would offer “heightened political
protection.”
“Any prosecutors will have to target a political party in us, and the price for
doing that is much higher,” he said.
WikiLeaks reacted to the domain name switch on its Twitter feed, writing just
after midnight on Friday morning: “WikiLeaks.org domain killed by U.S.
EveryDNS.net after claimed mass attacks.”
It implored supporters to “keep us strong” and provided a link for financial
donations. Hours later, a message on the WikiLeaks Twitter feed said: “WikiLeaks
moved to Switzerland” and provided the new Web address.
In France, Industry Minister Eric Besson asked the French government on Friday
to explore measures to “ensure that it is no longer hosted in France” after
reports surfaced that WikiLeaks has servers there, according to a letter seen by
Reuters. “France cannot host an internet site that violates the secrecy of
diplomatic relations and endangers people,” Mr. Besson said.
Earlier this week, Amazon — which rents server space to companies in addition to
its online retail business — canceled its relationship with WikiLeaks after
inquiries from an aide to Senator Joseph I. Lieberman, independent of
Connecticut. The company said the organization was violating the terms of
service for the program.
“When companies or people go about securing and storing large quantities of data
that isn’t rightfully theirs, and publishing this data without ensuring it won’t
injure others, it’s a violation of our terms of service, and folks need to go
operate elsewhere,” the company said.
Anna Mossberg, Bahnhof’s chief executive, said her company held “two physical
WikiLeaks servers in our data hall in Stockholm.” Those servers, she said, have
been attacked in recent weeks, though Bahnhof has come under no overt government
pressure to abandon them. “But I know we are not the only provider of WikiLeaks’
servers — they are everywhere.”
Ravi Somaiya reported from London, J. David Goodman from New York. Eric Schmitt
contributed reporting from Washington, and Alan Cowell from Paris.
WikiLeaks Struggles to
Stay Online After Cyberattacks, NYT, 3.12.2010,
http://www.nytimes.com/2010/12/04/world/europe/04domain.html
Cables Obtained by WikiLeaks Shine Light Into Secret
Diplomatic Channels
November 28, 2010
The New York Times
By SCOTT SHANE and ANDREW W. LEHREN
WASHINGTON — A cache of a quarter-million confidential
American diplomatic cables, most of them from the past three years, provides an
unprecedented look at back-room bargaining by embassies around the world,
brutally candid views of foreign leaders and frank assessments of nuclear and
terrorist threats.
Some of the cables, made available to The New York Times and several other news
organizations, were written as recently as late February, revealing the Obama
administration’s exchanges over crises and conflicts. The material was
originally obtained by WikiLeaks, an organization devoted to revealing secret
documents. WikiLeaks posted 220 cables, some redacted to protect diplomatic
sources, in the first installment of the archive on its Web site on Sunday.
The disclosure of the cables is sending shudders through the diplomatic
establishment, and could strain relations with some countries, influencing
international affairs in ways that are impossible to predict.
Secretary of State Hillary Rodham Clinton and American ambassadors around the
world have been contacting foreign officials in recent days to alert them to the
expected disclosures. A statement from the White House on Sunday said: “We
condemn in the strongest terms the unauthorized disclosure of classified
documents and sensitive national security information.”
The White House said the release of what it called “stolen cables” to several
publications was a “reckless and dangerous action” and warned that some cables,
if released in full, could disrupt American operations abroad and put the work
and even lives of confidential sources of American diplomats at risk. The
statement noted that reports often include “candid and often incomplete
information” whose disclosure could “deeply impact not only U.S. foreign policy
interests, but those of our allies and friends around the world.”
The cables, a huge sampling of the daily traffic between the State Department
and some 270 embassies and consulates, amount to a secret chronicle of the
United States’ relations with the world in an age of war and terrorism. Among
their revelations, to be detailed in The Times in coming days:
¶ A dangerous standoff with Pakistan over nuclear fuel: Since 2007, the United
States has mounted a highly secret effort, so far unsuccessful, to remove from a
Pakistani research reactor highly enriched uranium that American officials fear
could be diverted for use in an illicit nuclear device. In May 2009, Ambassador
Anne W. Patterson reported that Pakistan was refusing to schedule a visit by
American technical experts because, as a Pakistani official said, “if the local
media got word of the fuel removal, ‘they certainly would portray it as the
United States taking Pakistan’s nuclear weapons,’ he argued.”
¶ Thinking about an eventual collapse of North Korea: American and South Korean
officials have discussed the prospects for a unified Korea, should the North’s
economic troubles and political transition lead the state to implode. The South
Koreans even considered commercial inducements to China, according to the
American ambassador to Seoul. She told Washington in February that South Korean
officials believe that the right business deals would “help salve” China’s
“concerns about living with a reunified Korea” that is in a “benign alliance”
with the United States.
¶ Bargaining to empty the Guantánamo Bay prison: When American diplomats pressed
other countries to resettle detainees, they became reluctant players in a State
Department version of “Let’s Make a Deal.” Slovenia was told to take a prisoner
if it wanted to meet with President Obama, while the island nation of Kiribati
was offered incentives worth millions of dollars to take in Chinese Muslim
detainees, cables from diplomats recounted. The Americans, meanwhile, suggested
that accepting more prisoners would be “a low-cost way for Belgium to attain
prominence in Europe.”
¶ Suspicions of corruption in the Afghan government: When Afghanistan’s vice
president visited the United Arab Emirates last year, local authorities working
with the Drug Enforcement Administration discovered that he was carrying $52
million in cash. With wry understatement, a cable from the American Embassy in
Kabul called the money “a significant amount” that the official, Ahmed Zia
Massoud, “was ultimately allowed to keep without revealing the money’s origin or
destination.” (Mr. Massoud denies taking any money out of Afghanistan.)
¶ A global computer hacking effort: China’s Politburo directed the intrusion
into Google’s computer systems in that country, a Chinese contact told the
American Embassy in Beijing in January, one cable reported. The Google hacking
was part of a coordinated campaign of computer sabotage carried out by
government operatives, private security experts and Internet outlaws recruited
by the Chinese government. They have broken into American government computers
and those of Western allies, the Dalai Lama and American businesses since 2002,
cables said.
¶ Mixed records against terrorism: Saudi donors remain the chief financiers of
Sunni militant groups like Al Qaeda, and the tiny Persian Gulf state of Qatar, a
generous host to the American military for years, was the “worst in the region”
in counterterrorism efforts, according to a State Department cable last
December. Qatar’s security service was “hesitant to act against known terrorists
out of concern for appearing to be aligned with the U.S. and provoking
reprisals,” the cable said.
¶ An intriguing alliance: American diplomats in Rome reported in 2009 on what
their Italian contacts described as an extraordinarily close relationship
between Vladimir V. Putin, the Russian prime minister, and Silvio Berlusconi,
the Italian prime minister and business magnate, including “lavish gifts,”
lucrative energy contracts and a “shadowy” Russian-speaking Italian go-between.
They wrote that Mr. Berlusconi “appears increasingly to be the mouthpiece of
Putin” in Europe. The diplomats also noted that while Mr. Putin enjoyed
supremacy over all other public figures in Russia, he was undermined by an
unmanageable bureaucracy that often ignored his edicts.
¶ Arms deliveries to militants: Cables describe the United States’ failing
struggle to prevent Syria from supplying arms to Hezbollah in Lebanon, which has
amassed a huge stockpile since its 2006 war with Israel. One week after
President Bashar al-Assad promised a top State Department official that he would
not send “new” arms to Hezbollah, the United States complained that it had
information that Syria was providing increasingly sophisticated weapons to the
group.
¶ Clashes with Europe over human rights: American officials sharply warned
Germany in 2007 not to enforce arrest warrants for Central Intelligence Agency
officers involved in a bungled operation in which an innocent German citizen
with the same name as a suspected militant was mistakenly kidnapped and held for
months in Afghanistan. A senior American diplomat told a German official “that
our intention was not to threaten Germany, but rather to urge that the German
government weigh carefully at every step of the way the implications for
relations with the U.S.”
The 251,287 cables, first acquired by WikiLeaks, were provided to The Times by
an intermediary on the condition of anonymity. Many are unclassified, and none
are marked “top secret,” the government’s most secure communications status. But
some 11,000 are classified “secret,” 9,000 are labeled “noforn,” shorthand for
material considered too delicate to be shared with any foreign government, and
4,000 are designated both secret and noforn.
Many more cables name diplomats’ confidential sources, from foreign legislators
and military officers to human rights activists and journalists, often with a
warning to Washington: “Please protect” or “Strictly protect.”
The Times, after consultations with the State Department, has withheld from
articles and removed from documents it is posting online the names of some
people who spoke privately to diplomats and might be at risk if they were
publicly identified. The Times is also withholding some passages or entire
cables whose disclosure could compromise American intelligence efforts. While
the White House said it anticipated WikiLeaks would make public “several hundred
thousand” cables Sunday night, the organization posted only 220 released and
redacted by The Times and several European publications.
The cables show that nearly a decade after the attacks of Sept. 11, 2001, the
dark shadow of terrorism still dominates the United States’ relations with the
world. They depict the Obama administration struggling to sort out which
Pakistanis are trustworthy partners against Al Qaeda, adding Australians who
have disappeared in the Middle East to terrorist watch lists, and assessing
whether a lurking rickshaw driver in Lahore, Pakistan, was awaiting fares or
conducting surveillance of the road to the American Consulate.
They show officials managing relations with a China on the rise and a Russia
retreating from democracy. They document years of effort to prevent Iran from
building a nuclear weapon — and of worry about a possible Israeli strike on Iran
with the same goal.
Even when they recount events that are already known, the cables offer
remarkable details.
For instance, it has been previously reported that the Yemeni government has
sought to cover up the American role in missile strikes against the local branch
of Al Qaeda. But a cable’s fly-on-the-wall account of a January meeting between
the Yemeni president, Ali Abdullah Saleh, and Gen. David H. Petraeus, then the
American commander in the Middle East, is breathtaking.
“We’ll continue saying the bombs are ours, not yours,” Mr. Saleh said, according
to the cable sent by the American ambassador, prompting Yemen’s deputy prime
minister to “joke that he had just ‘lied’ by telling Parliament” that Yemen had
carried out the strikes.
Mr. Saleh, who at other times resisted American counterterrorism requests, was
in a lighthearted mood. The authoritarian ruler of a conservative Muslim
country, Mr. Saleh complains of smuggling from nearby Djibouti, but tells
General Petraeus that his concerns are drugs and weapons, not whiskey, “provided
it’s good whiskey.”
Likewise, press reports detailed the unhappiness of the Libyan leader, Col.
Muammar el-Qaddafi, when he was not permitted to set up his tent in Manhattan or
to visit ground zero during a United Nations session last year.
But the cables add a touch of scandal and alarm to the tale. They describe the
volatile Libyan leader as rarely without the companionship of “his senior
Ukrainian nurse,” described as “a voluptuous blonde.” They reveal that Colonel
Qaddafi was so upset by his reception in New York that he balked at carrying out
a promise to return dangerous enriched uranium to Russia. The American
ambassador to Libya told Colonel Qaddafi’s son “that the Libyan government had
chosen a very dangerous venue to express its pique,” a cable reported to
Washington.
The cables also disclose frank comments behind closed doors. Dispatches from
early this year, for instance, quote the aging monarch of Saudi Arabia, King
Abdullah, as speaking scathingly about the leaders of Iraq and Pakistan.
Speaking to another Iraqi official about Nuri Kamal al-Maliki, the Iraqi prime
minister, King Abdullah said, “You and Iraq are in my heart, but that man is
not.” The king called President Asif Ali Zardari of Pakistan the greatest
obstacle to that country’s progress. “When the head is rotten,” he said, “it
affects the whole body.”
The American ambassador to Eritrea reported last year that “Eritrean officials
are ignorant or lying” in denying that they were supporting the Shabab, a
militant Islamist group in Somalia. The cable then mused about which seemed more
likely.
As he left Zimbabwe in 2007 after three years as ambassador, Christopher W. Dell
wrote a sardonic account of Robert Mugabe, that country’s aging and erratic
leader. The cable called him “a brilliant tactician” but mocked “his deep
ignorance on economic issues (coupled with the belief that his 18 doctorates
give him the authority to suspend the laws of economics).”
The possibility that a large number of diplomatic cables might become public has
been discussed in government and media circles since May. That was when, in an
online chat, an Army intelligence analyst, Pfc. Bradley Manning, described
having downloaded from a military computer system many classified documents,
including “260,000 State Department cables from embassies and consulates all
over the world.” In an online discussion with Adrian Lamo, a computer hacker,
Private Manning said he had delivered the cables and other documents to
WikiLeaks.
Mr. Lamo reported Private Manning’s disclosures to federal authorities, and
Private Manning was arrested. He has been charged with illegally leaking
classified information and faces a possible court-martial and, if convicted, a
lengthy prison term.
In July and October, The Times, the British newspaper The Guardian and the
German magazine Der Spiegel published articles based on documents about
Afghanistan and Iraq. Those collections were placed online by WikiLeaks, with
selective redactions of the Afghan documents and much heavier redactions of the
Iraq reports.
Fodder for Historians
Traditionally, most diplomatic cables remain secret for decades, providing
fodder for historians only when the participants are long retired or dead. The
State Department’s unclassified history series, titled “Foreign Relations of the
United States,” has reached only 1972.
While an overwhelming majority of the quarter-million cables provided to The
Times are from the post-9/11 era, several hundred date from 1966 to the 1990s.
Some show diplomats struggling to make sense of major events whose future course
they could not guess.
In a 1979 cable to Washington, Bruce Laingen, an American diplomat in Tehran,
mused with a knowing tone about the Iranian revolution that had just occurred:
“Perhaps the single dominant aspect of the Persian psyche is an overriding
egoism,” Mr. Laingen wrote, offering tips on exploiting this psyche in
negotiations with the new government. Less than three months later, Mr. Laingen
and his colleagues would be taken hostage by radical Iranian students, hurling
the Carter administration into crisis and, perhaps, demonstrating the hazards of
diplomatic hubris.
In 1989, an American diplomat in Panama City mulled over the options open to
Gen. Manuel Noriega, the Panamanian leader, who was facing narcotics charges in
the United States and intense domestic and international political pressure to
step down. The cable called General Noriega “a master of survival”; its author
appeared to have no inkling that one week later, the United States would invade
Panama to unseat General Noriega and arrest him.
In 1990, an American diplomat sent an excited dispatch from Cape Town: he had
just learned from a lawyer for Nelson Mandela that Mr. Mandela’s 27-year
imprisonment was to end. The cable conveys the momentous changes about to begin
for South Africa, even as it discusses preparations for an impending visit from
the Rev. Jesse L. Jackson.
The voluminous traffic of more recent years — well over half of the
quarter-million cables date from 2007 or later — show American officials
struggling with events whose outcomes are far from sure. To read through them is
to become a global voyeur, immersed in the jawboning, inducements and penalties
the United States wields in trying to have its way with a recalcitrant world.
In an era of satellites and fiber-optic links, the cable retains the archaic
name of an earlier technological era. It has long been the tool for the
secretary of state to send orders to the field and for ambassadors and political
officers to send their analyses to Washington.
The cables have their own lexicon: “codel,” for a Congressional delegation;
“visas viper,” for a report on a person considered dangerous; “démarche,” an
official message to a foreign government, often a protest or warning.
But the drama in the cables often comes from diplomats’ narratives of meetings
with foreign figures, games of diplomatic poker in which each side is sizing up
the other and neither is showing all its cards.
Among the most fascinating examples recount American officials’ meetings in
September 2009 and February 2010 with Ahmed Wali Karzai, the half brother of the
Afghan president and a power broker in the Taliban’s home turf of Kandahar.
They describe Mr. Karzai, “dressed in a crisp white shalwar kameez,” the
traditional dress of loose tunic and trousers, appearing “nervous, though eager
to express his views on the international presence in Kandahar,” and trying to
win over the Americans with nostalgic tales about his years running a Chicago
restaurant near Wrigley Field.
But in midnarrative there is a stark alert for anyone reading the cable in
Washington: “Note: While we must deal with AWK as the head of the Provincial
Council, he is widely understood to be corrupt and a narcotics trafficker.” (Mr.
Karzai has denied such charges.) And the cables note statements by Mr. Karzai
that the Americans, informed by a steady flow of eavesdropping and agents’
reports, believe to be false.
A cable written after the February meeting coolly took note of the deceit on
both sides.
Mr. Karzai “demonstrated that he will dissemble when it suits his needs,” the
cable said. “He appears not to understand the level of our knowledge of his
activities. We will need to monitor his activity closely, and deliver a
recurring, transparent message to him” about the limits of American tolerance.
Not All Business
Even in places far from war zones and international crises, where the stakes for
the United States are not as high, curious diplomats can turn out to be
accomplished reporters, sending vivid dispatches to deepen the government’s
understanding of exotic places.
In a 2006 account, a wide-eyed American diplomat describes the lavish wedding of
a well-connected couple in Dagestan, in Russia’s Caucasus, where one guest is
the strongman who runs the war-ravaged Russian republic of Chechnya, Ramzan
Kadyrov.
The diplomat tells of drunken guests throwing $100 bills at child dancers, and
nighttime water-scooter jaunts on the Caspian Sea.
“The dancers probably picked upwards of USD 5000 off the cobblestones,” the
diplomat wrote. The host later tells him that Ramzan Kadyrov “had brought the
happy couple ‘a five-kilo lump of gold’ as his wedding present.”
“After the dancing and a quick tour of the premises, Ramzan and his army drove
off back to Chechnya,” the diplomat reported to Washington. “We asked why Ramzan
did not spend the night in Makhachkala, and were told, ‘Ramzan never spends the
night anywhere.’ ”
Scott Shane reported from Washington, and Andrew W. Lehren from
New York. Reporting was contributed by Jo Becker, C. J. Chivers and James Glanz
from New York; Eric Lichtblau, Michael R. Gordon, David E. Sanger, Charlie
Savage, Eric Schmitt and Ginger Thompson from Washington; and Jane Perlez from
Islamabad, Pakistan.
Cables Obtained by
WikiLeaks Shine Light Into Secret Diplomatic Channels, NYT, 28.11.2010,
http://www.nytimes.com/2010/11/29/world/29cables.html
Generation Text, Living on a Screen
November 25, 2010
The New York Times
To the Editor:
Re “Growing Up Digital,
Wired for Distraction” (“Your Brain on Computers” series, front page, Nov.
21):
Cynicism aside: Teenagers are dysfunctional. Anything remotely educational or
not associated with “Gossip Girl,” Facebook or the like is seen as pointless —
when it’s actually quite the reverse. Dependency on these technological media
will result in a shallow and socially inept generation.
The teenage brain has evolved into a vestige — an appendix of sorts. Read. Draw.
Go to the museum. Do something that’s not completely mindless. School has
stigmatized learning. Of course we’re going to shut off our brains and rot in
front of a computer — it’s just easier. YouTubing, watching “Glee,” playing
Xbox? These are passive activities with easily attainable yet meaningless highs.
As a 16-year-old, I find that my average text response time is four days. I’ve
deactivated my Facebook account and rarely watch TV. I read, run and write for
pleasure. I am free — free of all these distractions. A Leisure Vegan — a Legan,
if you will.
I can only urge my fellow teenagers to do the same. That is, the three of you
reading this.
Katherine Nevitt
Manhasset, N.Y., Nov. 21, 2010
•
To the Editor:
For the last four years I have been presenting “Driving It Home,” on the dangers
of driving and using a cellphone, to 300 to 450 teenagers a week. I show photos
and video of crash scenes with dead or injured teenagers that were attributable
to cellphone calls or texts.
Despite several warnings about keeping cellphones away for the one hour I’m
speaking, I almost always have one teenager who is unable to combat the urge and
will send a text while I’m talking about cellphones as a distraction.
We should all be concerned about teenagers who can’t leave their phones alone
while viewing photos of cellphone-attributed crashes. What happens to any of us
when they get behind the wheel traveling 65 miles an hour down the road and a
text comes in?
I’ve had to change my presentation style into short snippets of information —
any more than that, and I start to lose them. Every day I experience teenagers
who have the attention span of a gnat, and it’s sad to watch.
Misty Dailey
Elk Grove, Calif., Nov. 21, 2010
•
To the Editor:
As a psychologist who specializes in treating urban teenagers who have severe
emotional and behavioral disorders, I, too, am concerned about attention
problems that might be caused by kids “wired for distraction.” Yet I, too, have
had to adapt to a new digital world.
At the same time I am comforted by the fact that the same distracting technology
in the hands of teenagers also has the potential for them to save their own
lives. Look at these examples: a teenager at risk for suicide is able to text me
in the evening about a traumatic flashback he had; a parent is able to reach me
on a cellphone to calm down her child over the weekend, preventing a 911 call;
and finally a teenage patient in the midst of a classroom crisis, borrowing a
friend’s cellphone, texts me for an immediate urgent session, thus preventing a
violent outburst.
Our new digital technology, whether it be electronic medical records or instant
communication between a teenager and his psychologist, has the potential to
change lives.
Leonard Davidman
New York, Nov. 21, 2010
The writer is an assistant professor of psychiatry and behavioral science at New
York Medical College.
•
To the Editor:
Having taught art history courses for more than a decade, I have witnessed
firsthand the relatively rapid and somewhat disheartening transformation of
attentive, questioning college students into the easily distracted, gadget-glued
generation so accurately portrayed in your article.
While the lack of focus you mention is certainly a byproduct of the digital
environment, more troubling is a corollary phenomenon — a tendency of the
digital generation to dispense with nuance and multiple layers of meaning, much
like a computer, in favor of immediate and often cursory observations.
Most academic disciplines, however, are learned and truly appreciated only
through careful, nuanced and extended readings that require not only focused
observation but also focused thought over time, seemingly a nuisance in the age
of Twitter.
It is perhaps not a lack of focus but a lack of patience that will ultimately
define us.
Brian E. Hack
Brooklyn, Nov. 21, 2010
The writer is an assistant adjunct professor in the art department of
Kingsborough Community College, CUNY.
•
To the Editor:
I agree that media multitasking can take away from very important lessons
learned through in-person interactions. Balance is critical.
The article, however, lacks any reference to the great benefits media offer
youth, especially beyond our country’s borders.
In many developing countries, technological advances have skipped generations,
and mobile phone access is ubiquitous and essential.
Text messages offer information about what to do in emergencies, both natural
and man-made.
Unlike the American youth featured in this article, teenagers from
Port-au-Prince, Nairobi and Jakarta receive messages that go beyond immediate
gratification.
Dina L. G. Borzekowski
Baltimore, Nov. 22, 2010
The writer is an associate professor in the department of health, behavior and
society, Johns Hopkins Bloomberg School of Public Health.
•
To the Editor:
Might I suggest that within living memory there was a solution to children who
did not do homework, complete assignments and so on: it was known as failure. A
child being “kept back” or “retained in grade” used to concentrate the minds of
parents wonderfully on what their children were up to. But this, of course,
antedated parents’ choosing to finance their kids’ lifestyles.
Robert L. Nielsen
Buffalo, Nov. 21, 2010
The writer is professor emeritus of philosophy at D’Youville College.
•
To the Editor:
Those of us who grew up in the television era proved less literate than our
parents. Now, it seems that those who are growing up in the Internet era will be
less literate still.
But while television proved a vast wasteland, the Internet provides resources so
rich and vast that I find it hard to believe that I once functioned without it.
Perhaps rather than worrying that our children no longer know how to cut quill
pens or groom a horse, we should be grateful that they will be at home in the
better world to come.
Joshua P. Hill
New London, Conn., Nov. 22, 2010
Generation Text, Living
on a Screen, NYT, 25.11.2010,
http://www.nytimes.com/2010/11/26/opinion/l26digital.html
Growing
Up Digital, Wired for Distraction
November 21, 2010
The New York Times
By MATT RICHTEL
REDWOOD CITY, Calif. — On the eve of a pivotal academic year in Vishal
Singh’s life, he faces a stark choice on his bedroom desk: book or computer?
By all rights, Vishal, a bright 17-year-old, should already have finished the
book, Kurt Vonnegut’s “Cat’s Cradle,” his summer reading assignment. But he has
managed 43 pages in two months.
He typically favors Facebook, YouTube and making digital videos. That is the
case this August afternoon. Bypassing Vonnegut, he clicks over to YouTube,
meaning that tomorrow he will enter his senior year of high school hoping to see
an improvement in his grades, but without having completed his only summer
homework.
On YouTube, “you can get a whole story in six minutes,” he explains. “A book
takes so long. I prefer the immediate gratification.”
Students have always faced distractions and time-wasters. But computers and
cellphones, and the constant stream of stimuli they offer, pose a profound new
challenge to focusing and learning.
Researchers say the lure of these technologies, while it affects adults too, is
particularly powerful for young people. The risk, they say, is that developing
brains can become more easily habituated than adult brains to constantly
switching tasks — and less able to sustain attention.
“Their brains are rewarded not for staying on task but for jumping to the next
thing,” said Michael Rich, an associate professor at Harvard Medical School and
executive director of the Center on Media and Child Health in Boston. And the
effects could linger: “The worry is we’re raising a generation of kids in front
of screens whose brains are going to be wired differently.”
But even as some parents and educators express unease about students’ digital
diets, they are intensifying efforts to use technology in the classroom, seeing
it as a way to connect with students and give them essential skills. Across the
country, schools are equipping themselves with computers, Internet access and
mobile devices so they can teach on the students’ technological territory.
It is a tension on vivid display at Vishal’s school, Woodside High School, on a
sprawling campus set against the forested hills of Silicon Valley. Here, as
elsewhere, it is not uncommon for students to send hundreds of text messages a
day or spend hours playing video games, and virtually everyone is on Facebook.
The principal, David Reilly, 37, a former musician who says he sympathizes when
young people feel disenfranchised, is determined to engage these 21st-century
students. He has asked teachers to build Web sites to communicate with students,
introduced popular classes on using digital tools to record music, secured
funding for iPads to teach Mandarin and obtained $3 million in grants for a
multimedia center.
He pushed first period back an hour, to 9 a.m., because students were showing up
bleary-eyed, at least in part because they were up late on their computers.
Unchecked use of digital devices, he says, can create a culture in which
students are addicted to the virtual world and lost in it.
“I am trying to take back their attention from their BlackBerrys and video
games,” he says. “To a degree, I’m using technology to do it.”
The same tension surfaces in Vishal, whose ability to be distracted by computers
is rivaled by his proficiency with them. At the beginning of his junior year, he
discovered a passion for filmmaking and made a name for himself among friends
and teachers with his storytelling in videos made with digital cameras and
editing software.
He acts as his family’s tech-support expert, helping his father, Satendra, a lab
manager, retrieve lost documents on the computer, and his mother, Indra, a
security manager at the San Francisco airport, build her own Web site.
But he also plays video games 10 hours a week. He regularly sends Facebook
status updates at 2 a.m., even on school nights, and has such a reputation for
distributing links to videos that his best friend calls him a “YouTube bully.”
Several teachers call Vishal one of their brightest students, and they wonder
why things are not adding up. Last semester, his grade point average was 2.3
after a D-plus in English and an F in Algebra II. He got an A in film critique.
“He’s a kid caught between two worlds,” said Mr. Reilly — one that is virtual
and one with real-life demands.
Vishal, like his mother, says he lacks the self-control to favor schoolwork over
the computer. She sat him down a few weeks before school started and told him
that, while she respected his passion for film and his technical skills, he had
to use them productively.
“This is the year,” she says she told him. “This is your senior year and you
can’t afford not to focus.”
It was not always this way. As a child, Vishal had a tendency to procrastinate,
but nothing like this. Something changed him.
Growing Up With Gadgets
When he was 3, Vishal moved with his parents and older brother to their current
home, a three-bedroom house in the working-class section of Redwood City, a
suburb in Silicon Valley that is more diverse than some of its elite neighbors.
Thin and quiet with a shy smile, Vishal passed the admissions test for a
prestigious public elementary and middle school. Until sixth grade, he focused
on homework, regularly going to the house of a good friend to study with him.
But Vishal and his family say two things changed around the seventh grade: his
mother went back to work, and he got a computer. He became increasingly
engrossed in games and surfing the Internet, finding an easy outlet for what he
describes as an inclination to procrastinate.
“I realized there were choices,” Vishal recalls. “Homework wasn’t the only
option.”
Several recent studies show that young people tend to use home computers for
entertainment, not learning, and that this can hurt school performance,
particularly in low-income families. Jacob L. Vigdor, an economics professor at
Duke University who led some of the research, said that when adults were not
supervising computer use, children “are left to their own devices, and the
impetus isn’t to do homework but play around.”
Research also shows that students often juggle homework and entertainment. The
Kaiser Family Foundation found earlier this year that half of students from 8 to
18 are using the Internet, watching TV or using some other form of media either
“most” (31 percent) or “some” (25 percent) of the time that they are doing
homework.
At Woodside, as elsewhere, students’ use of technology is not uniform. Mr.
Reilly, the principal, says their choices tend to reflect their personalities.
Social butterflies tend to be heavy texters and Facebook users. Students who are
less social might escape into games, while drifters or those prone to
procrastination, like Vishal, might surf the Web or watch videos.
The technology has created on campuses a new set of social types — not the
thespian and the jock but the texter and gamer, Facebook addict and YouTube
potato.
“The technology amplifies whoever you are,” Mr. Reilly says.
For some, the amplification is intense. Allison Miller, 14, sends and receives
27,000 texts in a month, her fingers clicking at a blistering pace as she
carries on as many as seven text conversations at a time. She texts between
classes, at the moment soccer practice ends, while being driven to and from
school and, often, while studying.
Most of the exchanges are little more than quick greetings, but they can get
more in-depth, like “if someone tells you about a drama going on with someone,”
Allison said. “I can text one person while talking on the phone to someone
else.”
But this proficiency comes at a cost: she blames multitasking for the three B’s
on her recent progress report.
“I’ll be reading a book for homework and I’ll get a text message and pause my
reading and put down the book, pick up the phone to reply to the text message,
and then 20 minutes later realize, ‘Oh, I forgot to do my homework.’ ”
Some shyer students do not socialize through technology — they recede into it.
Ramon Ochoa-Lopez, 14, an introvert, plays six hours of video games on weekdays
and more on weekends, leaving homework to be done in the bathroom before school.
Escaping into games can also salve teenagers’ age-old desire for some control in
their chaotic lives. “It’s a way for me to separate myself,” Ramon says. “If
there’s an argument between my mom and one of my brothers, I’ll just go to my
room and start playing video games and escape.”
With powerful new cellphones, the interactive experience can go everywhere.
Between classes at Woodside or at lunch, when use of personal devices is
permitted, students gather in clusters, sometimes chatting face to face,
sometimes half-involved in a conversation while texting someone across the
teeming quad. Others sit alone, watching a video, listening to music or updating
Facebook.
Students say that their parents, worried about the distractions, try to police
computer time, but that monitoring the use of cellphones is difficult. Parents
may also want to be able to call their children at any time, so taking the phone
away is not always an option.
Other parents wholly embrace computer use, even when it has no obvious
educational benefit.
“If you’re not on top of technology, you’re not going to be on top of the
world,” said John McMullen, 56, a retired criminal investigator whose son, Sean,
is one of five friends in the group Vishal joins for lunch each day.
Sean’s favorite medium is video games; he plays for four hours after school and
twice that on weekends. He was playing more but found his habit pulling his
grade point average below 3.2, the point at which he felt comfortable. He says
he sometimes wishes that his parents would force him to quit playing and study,
because he finds it hard to quit when given the choice. Still, he says, video
games are not responsible for his lack of focus, asserting that in another era
he would have been distracted by TV or something else.
“Video games don’t make the hole; they fill it,” says Sean, sitting at a picnic
table in the quad, where he is surrounded by a multimillion-dollar view: on the
nearby hills are the evergreens that tower above the affluent neighborhoods
populated by Internet tycoons. Sean, a senior, concedes that video games take a
physical toll: “I haven’t done exercise since my sophomore year. But that
doesn’t seem like a big deal. I still look the same.”
Sam Crocker, Vishal’s closest friend, who has straight A’s but lower SAT scores
than he would like, blames the Internet’s distractions for his inability to
finish either of his two summer reading books.
“I know I can read a book, but then I’m up and checking Facebook,” he says,
adding: “Facebook is amazing because it feels like you’re doing something and
you’re not doing anything. It’s the absence of doing something, but you feel
gratified anyway.”
He concludes: “My attention span is getting worse.”
The Lure of Distraction
Some neuroscientists have been studying people like Sam and Vishal. They have
begun to understand what happens to the brains of young people who are
constantly online and in touch.
In an experiment at the German Sport University in Cologne in 2007, boys from 12
to 14 spent an hour each night playing video games after they finished homework.
On alternate nights, the boys spent an hour watching an exciting movie, like
“Harry Potter” or “Star Trek,” rather than playing video games. That allowed the
researchers to compare the effect of video games and TV.
The researchers looked at how the use of these media affected the boys’
brainwave patterns while sleeping and their ability to remember their homework
in the subsequent days. They found that playing video games led to markedly
lower sleep quality than watching TV, and also led to a “significant decline” in
the boys’ ability to remember vocabulary words. The findings were published in
the journal Pediatrics.
Markus Dworak, a researcher who led the study and is now a neuroscientist at
Harvard, said it was not clear whether the boys’ learning suffered because sleep
was disrupted or, as he speculates, also because the intensity of the game
experience overrode the brain’s recording of the vocabulary.
“When you look at vocabulary and look at huge stimulus after that, your brain
has to decide which information to store,” he said. “Your brain might favor the
emotionally stimulating information over the vocabulary.”
At the University of California, San Francisco, scientists have found that when
rats have a new experience, like exploring an unfamiliar area, their brains show
new patterns of activity. But only when the rats take a break from their
exploration do they process those patterns in a way that seems to create a
persistent memory.
In that vein, recent imaging studies of people have found that major cross
sections of the brain become surprisingly active during downtime. These brain
studies suggest to researchers that periods of rest are critical in allowing the
brain to synthesize information, make connections between ideas and even develop
the sense of self.
Researchers say these studies have particular implications for young people,
whose brains have more trouble focusing and setting priorities.
“Downtime is to the brain what sleep is to the body,” said Dr. Rich of Harvard
Medical School. “But kids are in a constant mode of stimulation.”
“The headline is: bring back boredom,” added Dr. Rich, who last month gave a
speech to the American Academy of Pediatrics entitled, “Finding Huck Finn:
Reclaiming Childhood from the River of Electronic Screens.”
Dr. Rich said in an interview that he was not suggesting young people should
toss out their devices, but rather that they embrace a more balanced approach to
what he said were powerful tools necessary to compete and succeed in modern
life.
The heavy use of devices also worries Daniel Anderson, a professor of psychology
at the University of Massachusetts at Amherst, who is known for research showing
that children are not as harmed by TV viewing as some researchers have
suggested.
Multitasking using ubiquitous, interactive and highly stimulating computers and
phones, Professor Anderson says, appears to have a more powerful effect than TV.
Like Dr. Rich, he says he believes that young, developing brains are becoming
habituated to distraction and to switching tasks, not to focus.
“If you’ve grown up processing multiple media, that’s exactly the mode you’re
going to fall into when put in that environment — you develop a need for that
stimulation,” he said.
Vishal can attest to that.
“I’m doing Facebook, YouTube, having a conversation or two with a friend,
listening to music at the same time. I’m doing a million things at once, like a
lot of people my age,” he says. “Sometimes I’ll say: I need to stop this and do
my schoolwork, but I can’t.”
“If it weren’t for the Internet, I’d focus more on school and be doing better
academically,” he says. But thanks to the Internet, he says, he has discovered
and pursued his passion: filmmaking. Without the Internet, “I also wouldn’t know
what I want to do with my life.”
Clicking Toward a Future
The woman sits in a cemetery at dusk, sobbing. Behind her, silhouetted and
translucent, a man kneels, then fades away, a ghost.
This captivating image appears on Vishal’s computer screen. On this Thursday
afternoon in late September, he is engrossed in scenes he shot the previous
weekend for a music video he is making with his cousin.
The video is based on a song performed by the band Guns N’ Roses about a woman
whose boyfriend dies. He wants it to be part of the package of work he submits
to colleges that emphasize film study, along with a documentary he is making
about home-schooled students.
Now comes the editing. Vishal taught himself to use sophisticated editing
software in part by watching tutorials on YouTube. He does not leave his chair
for more than two hours, sipping Pepsi, his face often inches from the screen,
as he perfects the clip from the cemetery. The image of the crying woman was
shot separately from the image of the kneeling man, and he is trying to fuse
them.
“I’m spending two hours to get a few seconds just right,” he says.
He occasionally sends a text message or checks Facebook, but he is focused in a
way he rarely is when doing homework. He says the chief difference is that
filmmaking feels applicable to his chosen future, and he hopes colleges, like
the University of Southern California or the California Institute of the Arts in
Los Angeles, will be so impressed by his portfolio that they will overlook his
school performance.
“This is going to compensate for the grades,” he says. On this day, his homework
includes a worksheet for Latin, some reading for English class and an economics
essay, but they can wait.
For Vishal, there’s another clear difference between filmmaking and homework:
interactivity. As he edits, the windows on the screen come alive; every few
seconds, he clicks the mouse to make tiny changes to the lighting and flow of
the images, and the software gives him constant feedback.
“I click and something happens,” he says, explaining that, by comparison,
reading a book or doing homework is less exciting. “I guess it goes back to the
immediate gratification thing.”
The $2,000 computer Vishal is using is state of the art and only a week old. It
represents a concession by his parents. They allowed him to buy it, despite
their continuing concerns about his technology habits, because they wanted to
support his filmmaking dream. “If we put roadblocks in his way, he’s just going
to get depressed,” his mother says. Besides, she adds, “he’s been making an
effort to do his homework.”
At this point in the semester, it seems she is right. The first schoolwide
progress reports come out in late September, and Vishal has mostly A’s and B’s.
He says he has been able to make headway by applying himself, but also by
cutting back his workload. Unlike last year, he is not taking advanced placement
classes, and he has chosen to retake Algebra II not in the classroom but in an
online class that lets him work at his own pace.
His shift to easier classes might not please college admissions officers,
according to Woodside’s college adviser, Zorina Matavulj. She says they want
seniors to intensify their efforts. As it is, she says, even if Vishal improves
his performance significantly, someone with his grades faces long odds in
applying to the kinds of colleges he aspires to.
Still, Vishal’s passion for film reinforces for Mr. Reilly, the principal, that
the way to reach these students is on their own terms.
Hands-On Technology
Big Macintosh monitors sit on every desk, and a man with hip glasses and an
easygoing style stands at the front of the class. He is Geoff Diesel, 40, a
favorite teacher here at Woodside who has taught English and film. Now he
teaches one of Mr. Reilly’s new classes, audio production. He has a rapt
audience of more than 20 students as he shows a video of the band Nirvana mixing
their music, then holds up a music keyboard.
“Who knows how to use Pro Tools? We’ve got it. It’s the program used by the best
music studios in the world,” he says.
In the back of the room, Mr. Reilly watches, thrilled. He introduced the audio
course last year and enough students signed up to fill four classes. (He could
barely pull together one class when he introduced Mandarin, even though he had
secured iPads to help teach the language.)
“Some of these students are our most at-risk kids,” he says. He means that they
are more likely to tune out school, skip class or not do their homework, and
that they may not get healthful meals at home. They may also do their most
enthusiastic writing not for class but in text messages and on Facebook.
“They’re here, they’re in class, they’re listening.”
Despite Woodside High’s affluent setting, about 40 percent of its 1,800 students
come from low-income families and receive a reduced-cost or free lunch. The
school is 56 percent Latino, 38 percent white and 5 percent African-American,
and it sends 93 percent of its students to four-year or community colleges.
Mr. Reilly says that the audio class provides solid vocational training and can
get students interested in other subjects.
“Today mixing music, tomorrow sound waves and physics,” he says. And he thinks
the key is that they love not just the music but getting their hands on the
technology. “We’re meeting them on their turf.”
It does not mean he sees technology as a panacea. “I’ll always take one great
teacher in a cave over a dozen Smart Boards,” he says, referring to the
high-tech teaching displays used in many schools.
Teachers at Woodside commonly blame technology for students’ struggles to
concentrate, but they are divided over whether embracing computers is the right
solution.
“It’s a catastrophe,” said Alan Eaton, a charismatic Latin teacher. He says that
technology has led to a “balkanization of their focus and duration of stamina,”
and that schools make the problem worse when they adopt the technology.
“When rock ’n’ roll came about, we didn’t start using it in classrooms like
we’re doing with technology,” he says. He personally feels the sting, since his
advanced classes have one-third as many students as they had a decade ago.
Vishal remains a Latin student, one whom Mr. Eaton describes as particularly
bright. But the teacher wonders if technology might be the reason Vishal seems
to lose interest in academics the minute he leaves class.
Mr. Diesel, by contrast, does not think technology is behind the problems of
Vishal and his schoolmates — in fact, he thinks it is the key to connecting with
them, and an essential tool. “It’s in their DNA to look at screens,” he asserts.
And he offers another analogy to explain his approach: “Frankenstein is in the
room and I don’t want him to tear me apart. If I’m not using technology, I lose
them completely.”
Mr. Diesel had Vishal as a student in cinema class and describes him as a
“breath of fresh air” with a gift for filmmaking. Mr. Diesel says he wonders if
Vishal is a bit like Woody Allen, talented but not interested in being part of
the system.
But Mr. Diesel adds: “If Vishal’s going to be an independent filmmaker, he’s got
to read Vonnegut. If you’re going to write scripts, you’ve got to read.”
Back to Reading Aloud
Vishal sits near the back of English IV. Marcia Blondel, a veteran teacher, asks
the students to open the book they are studying, “The Things They Carried,”
which is about the Vietnam War.
“Who wants to read starting in the middle of Page 137?” she asks. One student
begins to read aloud, and the rest follow along.
To Ms. Blondel, the exercise in group reading represents a regression in
American education and an indictment of technology. The reason she has to do it,
she says, is that students now lack the attention span to read the assignments
on their own.
“How can you have a discussion in class?” she complains, arguing that she has
seen a considerable change in recent years. In some classes she can count on
little more than one-third of the students to read a 30-page homework
assignment.
She adds: “You can’t become a good writer by watching YouTube, texting and
e-mailing a bunch of abbreviations.”
As the group-reading effort winds down, she says gently: “I hope this will
motivate you to read on your own.”
It is a reminder of the choices that have followed the students through the
semester: computer or homework? Immediate gratification or investing in the
future?
Mr. Reilly hopes that the two can meet — that computers can be combined with
education to better engage students and can give them technical skills without
compromising deep analytical thought.
But in Vishal’s case, computers and schoolwork seem more and more to be mutually
exclusive. Ms. Blondel says that Vishal, after a decent start to the school
year, has fallen into bad habits. In October, he turned in weeks late, for
example, a short essay based on the first few chapters of “The Things They
Carried.” His grade at that point, she says, tracks around a D.
For his part, Vishal says he is investing himself more in his filmmaking,
accelerating work with his cousin on their music video project. But he is also
using Facebook late at night and surfing for videos on YouTube. The evidence of
the shift comes in a string of Facebook updates.
Saturday, 11:55 p.m.: “Editing, editing, editing”
Sunday, 3:55 p.m.: “8+ hours of shooting, 8+ hours of editing. All for just a
three-minute scene. Mind = Dead.”
Sunday, 11:00 p.m.: “Fun day, finally got to spend a day relaxing... now about
that homework...”
Malia Wollan contributed reporting.
Growing Up Digital,
Wired for Distraction, NYT, 21.11.2010,
http://www.nytimes.com/2010/11/21/technology/21brain.html
For Google, the Browser Does It All
November 24, 2010
The New York Times
By CLAIRE CAIN MILLER
MOUNTAIN VIEW, Calif. — When a Google engineer gave top executives computers
running the company’s new Chrome operating system, Sergey Brin, Google’s
co-founder, tried to hold on to his computer running an older version.
“I reached to take the old one, and he reaches to grab it,” recalled Linus
Upson, the vice president for engineering in charge of Chrome. “Then he
realizes, ‘I don’t need it.’ ”
That is because Chrome stores everything that people have on their computers —
like documents, photos and e-mail — online, or in tech parlance, in the cloud.
In Google’s vision of a world where all computers run on its Chrome OS, anyone
can walk up to any computer with an Internet connection and gain access to all
their information.
If Mr. Brin was momentarily confused, it is no wonder that Google users and
analysts are struggling to wrap their heads around what Google is trying to do
with Chrome.
It is all the more confusing because Google already has a Web browser named
Chrome. And Google already has an operating system, called Android.
Google says it will become clearer by the end of the year, when the company will
introduce to the public a lightweight netbook computer that runs Chrome. Though
Google declined to give details of the device, it is expected to be manufactured
by another company and branded by Google, similar to the way Google released its
Nexus phone, which runs on Android.
Google has high hopes for Chrome, and as the company weathers criticism for
relying too much on search advertising for revenue, its executives have been
describing Chrome as one of Google’s new businesses with huge potential.
With Chrome OS, Google is stepping once again into the territory of its
archrivals, Microsoft and Apple, both of which make operating systems as well as
widely used desktop software like Microsoft Office and Apple iPhoto and iTunes.
That software would not work on Chrome computers. Instead, Chrome users would
use Google’s Web-based products, like Docs, Gmail and Picasa for word
processing, e-mail and photos, or software from other companies, like
Microsoft’s cloud-based Office 365. Google also plans to open a Chrome app store
for software developers to dream up other Chrome tools.
The Chrome browser, which is installed on 8 percent of all PCs, shares a name
because the operating system is, essentially, the same thing as the browser.
“When people look at Chrome OS, they’re going to be like, ‘It’s just a browser,
there’s nothing exciting here,’ ” Mr. Upson said. “Exactly. It’s just a browser,
there’s nothing exciting here — that’s the point.”
Computers running Chrome OS will start in seconds, not minutes, and then users
will see a browser through which applications and data can be used.
Yet while Google imagines a Web-based future, analysts wonder whether Chrome’s
time has passed — before Google netbooks even hit the market.
When Google first talked about Chrome last year, netbooks — small, low-cost
laptops with keyboards — were all the rage. But since then, smartphones and
tablets — slate PCs with touch screens, like the iPad — have crushed that
market.
“When Google made their decision early on with the Chrome OS project, Android
was in its infancy and the tablet market didn’t really exist,” said Ray Valdes,
a research vice president at Gartner who studies Internet platforms. “Now things
have changed, and I think Google is likely recalibrating its strategy and
product mix to take that into account.”
Google’s hugely successful Android operating system for mobile phones and
tablets adds a level to the confusion. Chrome and Android are built by separate
Google teams and the company says there is no conflict between the two. But its
executives acknowledge they are not entirely sure how the two will coexist.
“We don’t want to call the question and say this one does one thing, this one
does another,” said Eric E. Schmidt, Google’s chief executive. “So far the model
seems to be the Android solution is particularly optimized for things that
involve touch in some form and Chrome OS appears to be for keyboard-based
solutions.”
But Mr. Upson said that Chrome OS would be a computing platform stretching to
hand-held devices, tablets and TVs. “We are starting with laptops and we will
expand in both directions,” he said.
“Google hasn’t told a great story about how Chrome and Android live relative to
each other,” said Michael Gartenberg, a Gartner research director studying
consumer applications. “It’s incumbent upon Google to start telling a story that
makes sense. It gets to the point of confusion that you have a lot of folks
saying, ‘What’s Steve Jobs’s phone number again?’ ”
Yet another source of puzzlement: even though Google has been promoting both
Chrome and Android as new big businesses, they are free and open-source, meaning
that hardware manufacturers don’t have to pay Google to use them on devices, and
software developers don’t have to pay to use them to build their own operating
systems or browsers.
That actually makes perfect sense, said Sundar Pichai, vice president for
product management with Chrome, because Google makes almost all its revenue from
things people do on browsers.
“These are enablers — platforms on which people use Google services,” Mr. Pichai
said. “Both offer benefits in terms of how people can use services easily and
increase usage, and that gives them a better experience and over all generates
more revenue for us.”
Though some people might worry about storing their private information on
Google’s servers instead of their own computers, Google says Chrome is safer
because security updates happen automatically and if people lose their
computers, their data is inaccessible once they reset their passwords.
Mr. Upson says that 60 percent of businesses could immediately replace their
Windows machines with computers running Chrome OS. He also says he hopes it will
put corporate systems administrators out of work because software updates will
be made automatically over the Web. But the vast majority of businesses still
use desktop Microsoft Office products and cannot imagine moving entirely to
Web-based software or storing sensitive documents online — at least not yet.
Even if Google missed the netbook craze, it may in fact be ahead of its time in
imagining a Web-based future, Mr. Gartenberg said. “Android, where everything is
very application-dependent, is a response to the things that are here today,” he
said. “Chrome is preparing for a future when everything can be delivered through
the Web.”
For Google, the Browser
Does It All, NYT, 24.11.2010,
http://www.nytimes.com/2010/11/25/technology/25chrome.html
Google Debuts Fashion Shopping Site
November 17, 2010
The New York Times
By CATHY HORYN
You know how remote and strange the fashion world is when you come to
Google’s headquarters in Mountain View, Calif. For one thing, employees are
zipping around the sprawling campus on scooters and bicycles, so that pretty
much eliminates platform shoes and minis. And for another, there are way too
many snack stations at Google. Fashionistas are funny about food.
But go a couple of blocks from the main building, and the mood and the desk
décor are conspicuously more invested in style. One employee, Abigail Holtz, has
on an ivory silk mini dress with a plunging neckline and a pair of high heels. A
colleague, Marissa Goodman, is more casual—but no less savvy. She used to design
women’s clothes for Old Navy and Esprit.
In a deliberate collision between nerds and fashion mavens, Google has created a
new e-commerce site that significantly improves how fashion is presented and
sold online. The site, Boutiques.com, which is expected to go up Wednesday
morning, may also change how people shop for clothes.
Boutiques.com has so many capabilities and components that even Google engineers
have a hard time qualifying it. It is a collection of hundreds of virtual
boutiques merchandised — or, in the new parlance, “curated” — by designers,
retailers, bloggers, celebrities and regular folks. You can shop in the style
of, say, the actress Carey Mulligan or Mary-Kate and Ashley Olsen — among the
celebrities who signed up for the launch — or you can build your own boutique
and amass followers who can comment on your taste.
It is a place, then, to show off your fashion acumen, much as millions of
Polyvore users already do with their picture collages.
It is also a source of inspiration. In every boutique on the site, there are
dozens of additional choices inspired by a designer’s or celebrity’s style —
generated by algorithms — with product photos that are much larger and sharper
than on other shopping sites. And if you don’t know how to wear the leopard
pumps you just bought, there’s a panel of street-style photos on the right side
of the site that visualizes the shoes in more expressive modes. Indeed, whatever
your style preference — classic, romantic, casual — the inspiration panel
automatically adjusts for them, like a support group that can read your mind
with surprising precision.
And that may be Boutiques.com’s ultimate game-changer — how precisely it
analyzes your preferences to give you what you requested. As many online
shoppers know, search engines tend to give you stuff you don’t really want. A
request for fern-colored shoes might yield fern shoes, plus fern-print blouses.
But, as two experienced online shoppers found when they tested the site earlier
this week at Google’s New York office, if you ask for cobalt blue shoes, you get
them. And if you refine your preferences with a click or two, you get even more
specific styles.
The process at Boutiques.com is accomplished through visual search technology,
and what style experts like Ms. Goodman and Ms. Holtz conveyed to Google code
writers about the nuances of fashion — from color and pattern to silhouette and
what looks good together and what does not.
The technology was actually developed by Like.com, a Silicon Valley company
co-founded by Munjal Shah, which Google acquired last summer for a reported $100
million. Before the purchase, Like.com had created a number of fashion
e-commerce sites, including Covet.com, and the styling tool Couturious.com.
“I’ve always been impressed with Like.com,” said Sucharita Mulpuru, a vice
president and retail analyst at Forrester Research, who is familiar with the
work on Boutiques.com. “I was just floored by the technology back then and it’s
evolved since. They’ve just honed the algorithm.”
Fueled in part by new gadgets like the iPad and more dollars spent by retailers
on technology, online sales have generally outpaced brick-and-mortar sales. “I
feel e-commerce in the last 12 months has caught a second wind,” Ms. Mulpuru
said. According to Forrester, Internet sales of apparel and accessories this
year will account for 14 percent, or $25 billion, of the $173 billion that
Americans will spend online.
Mr. Shah is the team leader for Boutiques.com, with a left-brain-right-brain
group of technicians and tastemakers. As he said in interviews conducted over
the past week, “Online fashion shopping has to be universal and curatorial at
the same time. This is an answer.”
A number of big companies, most notably Amazon and eBay, have been trying to get
a bigger slice of the online apparel pie. But while they have improved the
stylishness of their fashion pages, they may be ultimately constrained by their
somewhat static platforms. It’s hard to mix DVD players and $900 Christian
Louboutin peep-toe pumps.
Meanwhile dedicated fashion sites like Shopstyle.com have gathered fans.
“Shopstyle’s done one of the best jobs in my opinion of creating the right high
fashion experience,” Mr. Shah said. “But we think of it as layer one. It’s kind
of broken things down, but they didn’t go for a detailed categorization and they
didn’t personalize.”
At the time that Mr. Shah and his team at Like.com created Covet.com, a fashion
personalization site, they didn’t really have the full picture of all that was
possible on the web. “We captured your preferences but we couldn’t analyze the
items to see if they your met your preferences,” he said. “We did one half but
you need both halves. We achieved the other half only by rebuilding the
technology with a whole new way of analyzing patterns and silhouettes.”
In simple terms, what the style experts did was come up with about 500 words for
color, shape and pattern — robin’s egg blue, for instance, and gingham — and
then the engineers trained the algorithm to know what each was. They would have
pictures of what gingham was and what gingham wasn’t. “We did that word by word
by word,” Mr. Shah said. The trouble is a lot of sites don’t have, or use,
vision technology. They end up stuffing in a bunch of key words and the search
engine gets confused. So you get fern-print blouses when all you really want are
fern pumps.
Despite the amount of products that a search on Boutiques.com kicks out, the
download time is very fast, and choices appear on extra-long pages so you don’t
have to keep clicking. Virtually every kind of information is analyzed — price,
brand, color and so on. The site also includes a system called “Complete the
Look,” for which Ms. Goodman wrote “a ton of rules,” Mr. Shah said, “and our
computer vision and machine learning guys implemented them.”
Additionally, there is a good sense of discovery on Boutiques.com; items come to
your attention, almost as they do in stores, that you didn’t necessary plan to
buy. Seasonal trends, like fall’s military looks, can be boosted on the site.
Again, to Ms. Malpuru, “that’s where Munjal gets it—fashion is about discovery.”
Users of the site will have the option to take a personal style quiz, which
ranks a broad spectrum of loves and hates, but Mr. Shah is convinced that most
people will prefer to find their “style twin” and shop in that individual’s
boutique.
Among the designers who signed up are Tory Burch, Oscar de la Renta, and Isaac
Mizrahi, who for one plans to offer signature pieces like a plaid cocktail dress
and a military coat.
Bloggers include Bryan Boy and Rumi Neely of Fashiontoast. Other celebrities,
which Google said it has paid to host boutiques, are Claire Danes, Ashlee
Simpson and Nicole Richie. (By the way, Google authenticates the celebrity
boutiques, so imposters be warned.) Retailers include Neiman Marcus, Barneys,
Shopbop, Net-a-Porter, and Scoop NYC. Potentially, fashion magazines could have
boutiques. So could a character from a television show.
“Somebody may come in and built 20 goth boutiques in the first day,” Mr. Shah
said.
On Monday, Simone B. Oliver, a Web producer for The New York Times, and Jane
Son, a publicist, gave the site a test drive for this article.
As the two women, both avid online shoppers, slowly got used to the site — which
they later admitted could be overwhelming — Ms. Oliver said, glancing at the
product categories, “I’m curious why you put shoes first.”
Ms. Goodman replied, “Shoes are always one of the most popular categories.”
Ms. Oliver laughed. “Good answer.”
As Ms. Son typed in “duck boots” on her laptop, yielding a bunch of choices, Ms.
Oliver searched for cobalt platform pumps and a black leather shift dress,
quickly finding things she liked. She skipped over the celebrity boutiques,
preferring the blogger and trend boutiques: “I get more inspiration from girls
on the street than celebrities.”But, she added, “I think the celebrity choices
are useful for body shape. There are some people in the limelight that have a
similar body shape to mine, and a certain silhouette would look good on me. And
shades of skin tones.”
Mr. Shah nodded. “We could add skin tones to the preferences.”
Both women liked the inspiration panel, and also how refined the search was.“On
other sites, you can’t edit your choices as much,” Ms. Son said. “And I need an
edited selection.”Ms. Oliver rated the sense of discovery “A-plus,” adding “I
just found out about a shoe brand that I had never heard of—Velvet Angels.
They’re more in my price range than, say, Yves Saint Laurent. That was fun. I
was looking for something else and it popped up.”
She said to members of the team, “I love that you guys have so many options but
you also have the options that make sense.”
Yet, after the meeting, both women identified an obvious shortcoming of
Boutiques.com: as curated as it is, a lot still comes up in a search. Suggesting
that too much information may be a turnoff to inexperienced Web shoppers, Ms.
Son said, “It’s going to take some getting used to, that’s for sure.”
Nodding, Ms. Oliver said, “I feel it’s an amazing site but there are a few
aspects that are not very intuitive. Some people might go back to the regular
Google search and look for their boots.”
Fortunately for them, the site has that option, too.
Google Debuts Fashion
Shopping Site, NYT, 17.11.2010,
http://www.nytimes.com/2010/11/18/fashion/18googlefashion.html
Wal-Mart Says ‘Try This On’: Free Shipping
November 11, 2010
The New York Times
By STEPHANIE CLIFFORD and CLAIRE CAIN MILLER
For years, Wal-Mart has used its clout as the nation’s largest retailer to
squeeze competitors with rock-bottom prices in its stores. Now it is trying to
throw a holiday knockout punch online.
Starting Thursday, Wal-Mart Stores plans to offer free shipping on its Web site,
with no minimum purchase, on almost 60,000 gift items, including many toys and
electronics. The offer will run through Dec. 20, when Wal-Mart said it might
consider other free-shipping deals.
“Everyone’s trying to figure out how we can serve a customer that’s trying to
save every penny they can,” said Steve Nave, senior vice president and general
manager of Walmart.com. “It’s the most competitive offer out there, and we’re
pretty excited about it.”
Even before Wal-Mart’s surprise move, shipping prices were this holiday season’s
predicament for online retailers. In a bid for cost-conscious consumers, Target
and J. C. Penney introduced their most aggressive free-shipping programs ever,
and Sears, Toys “R” Us, Williams-Sonoma and others were trying to match the
success of Amazon’s shipping program, offering unlimited two-day shipping for an
annual fee.
But given Wal-Mart’s scale and influence in the marketplace, its free pass for
shipping sets a new high — or low — in e-commerce. And it may create an
expectation among consumers — free shipping, no minimum, always — that would
make it harder for smaller e-commerce sites to survive.
Wal-Mart says it will not raise prices to offset shipping and will not press
shippers, like UPS and FedEx, to absorb the costs. But Wal-Mart and other big
retailers already have low-price contracts with shippers, and the stores
maintain distribution centers nationwide that reduce shipping distances and
costs.
For smaller retailers and Web sites, which pay regular mail rates and may ship
from only one location, free shipping is not nearly as affordable and often must
be added into prices.
“You’re trying to compete with the Amazons and the Zappos, who have so many
different warehouses that they can significantly reduce transport costs,” said
Gary Schwake, director of business development at the Distribution Management
Group, a consulting firm that advises retailers like Eddie Bauer.
Retailers say that shoppers have already started to revolt against shipping
fees. While consumers are sensitive to what an item costs online, shipping costs
can have even more influence, according to market research.
When e-commerce took off a decade ago, free shipping was a rare perk. Now, 55
percent of consumers are at least somewhat likely to abandon their purchase if
they do not get free shipping, according to comScore, the online-research firm,
and about 41 percent of transactions online now include free shipping (usually
with a minimum purchase).
Wal-Mart is throwing itself into the holiday season shipping fray as it tries to
revive sales. Even as other retailers’ sales have recovered, sales at Wal-Mart’s
stores in the United States open more than a year have fallen for five
consecutive quarters. Recently, it has been adding to the merchandise it
carries, offering products for under $1 and undercutting Target on toy prices.
The Wal-Mart shipping offer has no minimum. Mr. Nave said an important factor
was that an item was likely to be given as a gift. “We looked at the areas we
felt were going to be popular in gift-giving this holiday, and went from there,”
he said.
Even after the holidays, “I would expect to see us continue to have offerings
similar to this in the future in some way, shape or form,” he said.
The Wal-Mart announcement was not public until Thursday, but retailers had
already been escalating their shipping programs since last year, when mobile
comparison-shopping apps helped make free shipping popular.
Amazon.com has one successful model. Year-round, it offers free shipping on
orders over $25. And its Amazon Prime program, in which members pay $79 a year
for unlimited two-day shipping on almost all purchases, could account for as
much as a third of sales, said Jordan Rohan, an analyst with Stifel Nicolaus.
“It is making other retailers scramble,” he said.
To fight off Amazon Prime, a month ago GSI Commerce started ShopRunner, a
service that bands together e-commerce sites including eBags and the Web site of
Toys “R” Us. Shoppers pay $79 a year for unlimited two-day shipping from any of
the members. This fall, Williams-Sonoma started a service like that for $30 a
year, and Sears and Kmart, which introduced a similar program three years ago,
are pushing it heavily this season.
Beginning in October, J.C. Penney started offering free shipping year-round,
with a minimum purchase of $69 for most of the year. Target is offering free
shipping on purchases of $50 and up, on 800,000 items. And in August L.L. Bean
began offering free shipping with no minimum, through Dec. 20.
Bigger companies have a big advantage in the battle over free shipping: volume.
According to the Distribution Management Group, air shipping prices for big
retailers are about 70 percent less than for a small company. Shipping at Amazon
costs about 4 percent of sales, and Amazon loses money on it because it offers
marketing benefits, said Aaron Kessler, an e-commerce analyst at the research
firm ThinkEquity. But shipping at small sites usually costs about 35 percent of
sales, said Mr. Schwake, the retail adviser.
Despite the costs, smaller retailers say they have little choice but to offer
free shipping, in some form, these days.
“Everyone does it,” said Michael Mente, the co-founder of Revolve Clothing, a
Los Angeles-based women’s clothing site. Asked if he received discounts from the
shippers, he said, “Unfortunately not.” At the start-up site ModCloth, which
sells women’s clothes, the co-founder Susan Gregg Koger said she couldn’t afford
free shipping year round, but she decided to do it for the holiday season. It is
a risk, she said.
“That’s really hard to offer and then roll back,” she said.
While Wal-Mart may continue with some free shipping offers after the holidays,
even other big retailers like L.L. Bean say they just cannot afford it after
Christmas is over.
“We’d love to be able to offer free shipping, but free shipping isn’t free,”
said Laurie Brooks, an L.L. Bean spokeswoman. “It does cost a company money."
There are potential downsides, even for Wal-Mart. Physical stores with Web sites
run a risk in promoting free shipping, Mr. Rohan said. “They’d much rather you
buy that same item in the store for $50 and pick up a hundred dollars of other
stuff you wouldn’t even think about,” he said.
Wal-Mart Says ‘Try This
On’: Free Shipping, NYT, 11.11.2010,
http://www.nytimes.com/2010/11/11/business/11shipping.html
Company Accused of Firing Over Facebook Post
November 8, 2010
The New York Times
By STEVEN GREENHOUSE
In what labor officials and lawyers view as a ground-breaking case involving
workers and social media, the National Labor Relations Board has accused a
company of illegally firing an employee after she criticized her supervisor on
her Facebook page.
This is the first case in which the labor board has stepped in to argue that
workers’ criticisms of their bosses or companies on a social networking site are
generally a protected activity and that employers would be violating the law by
punishing workers for such statements.
The labor relations board announced last week that it had filed a complaint
against an ambulance service, American Medical Response of Connecticut, that
fired an emergency medical technician, accusing her, among other things, of
violating a policy that bars employees from depicting the company “in any way”
on Facebook or other social media sites in which they post pictures of
themselves.
Lafe Solomon, the board’s acting general counsel, said, “This is a fairly
straightforward case under the National Labor Relations Act — whether it takes
place on Facebook or at the water cooler, it was employees talking jointly about
working conditions, in this case about their supervisor, and they have a right
to do that.”
That act gives workers a federally protected right to form unions, and it
prohibits employers from punishing workers — whether union or nonunion — for
discussing working conditions or unionization. The labor board said the
company’s Facebook rule was “overly broad” and improperly limited employees’
rights to discuss working conditions among themselves.
Moreover, the board faulted another company policy, one prohibiting employees
from making “disparaging” or “discriminatory” “comments when discussing the
company or the employee’s superiors” and “co-workers.”
The board’s complaint prompted Morgan, Lewis & Bockius, a law firm with a large
labor and employment practice representing hundreds of companies, to send a
“lawflash” advisory on Monday to its clients, saying, “All private sector
employers should take note,” regardless “of whether their work force is
represented by a union.”
The firm added, “Employers should review their Internet and social media
policies to determine whether they are susceptible to an allegation that the
policy would ‘reasonably tend to chill employees’ ” in the exercise of their
rights to discuss wages, working conditions and unionization.
American Medical Response of Connecticut denied the labor board’s allegations,
saying they were without merit. “The employee in question was discharged based
on multiple, serious complaints about her behavior,” the company said in a
statement. “The employee was also held accountable for negative personal attacks
against a co-worker posted publicly on Facebook. The company believes that the
offensive statements made against the co-workers were not concerted activity
protected under federal law.”
The case involves Dawnmarie Souza, who had to prepare a response to a customer’s
complaint about her work. Ms. Souza, the board said, was unhappy that her
supervisor would not let a representative of the Teamsters, the union
representing the company’s workers, help prepare her response.
Ms. Souza then mocked her supervisor on Facebook, using several vulgarities to
ridicule him, according to Jonathan Kreisberg, director of the board’s Hartford
office, which filed the complaint. He also said she had written, “love how the
company allows a 17 to become a supervisor” — 17 is the company’s lingo for a
psychiatric patient.
The labor board said that her comments “drew supportive responses from her
co-workers” and led to further negative comments about the supervisor. Mr.
Kreisberg said: “You’re allowed to talk about your supervisor with your
co-workers. You’re allowed to communicate the concerns and criticisms you have.
The only difference in this case is she did it on Facebook and did it on her own
time and her own computer.”
An administrative law judge is scheduled to begin hearing the case on Jan. 25.
Marshall B. Babson, a member of the National Labor Relations Board in the 1980s,
said a broad company rule that says one cannot make disparaging comments about
supervisors is clearly illegal under labor law. But he said an employee’s
criticizing a company or supervisor on Facebook was not necessarily protected
activity.
“There will arguably be cases where it is not concerted activity,” Mr. Babson
said, suggesting that if a worker lashed out in a post against a supervisor but
was not communicating with co-workers, that type of comment might not be
protected.
If the Facebook conversation involves several co-workers, however, it is far
more likely to be viewed as “concerted protected activity,” he said.
But employees might cross the line into unprotected territory if they disparage
supervisors over something unrelated to work — for instance, a supervisor’s
sexual performance — or if their statements are disloyal.
Courts often view workers’ statements as disloyal when they are defamatory and
are not supported by facts. Mr. Babson cited a case upholding the firing of
airline workers who held signs saying their airline was unsafe. But, he said, if
employees held signs accurately saying their airline or restaurant had been
cited for dozens of safety violations, that would most likely be protected.
Company Accused of Firing Over Facebook Post,
NYT, 8.11.2010,
http://www.nytimes.com/2010/11/09/business/09facebook.html
The Facebook Skeletons Come Out
November 5, 2010
The New York Times
By JEREMY W. PETERS and BRIAN STELTER
AMONG the many firsts in the 2010 elections, it is safe to assume that the
following words had never before been uttered about a future member of Congress,
“This is a candidate who is probably best known for getting drunk and having sex
on television.”
The comment, made by the chairman of the Wisconsin Democratic Party, was lobbed
at Sean Duffy, who overcame his bawdy past as a star on MTV’s “Real World:
Boston” in 1997 to ride a wave of conservative discontent into office. Some of
Mr. Duffy’s youthful indiscretions that were captured on film and dredged up by
his opponents included a drunken toga party and images of him dancing on a pool
table in his underwear.
With the ubiquity of technology and social networking Web sites like Facebook
that allow — and compel — young people to document themselves drinking, wearing
little clothing or putting themselves in otherwise compromised positions, it was
a given that a generation of politicians would someday find themselves
confronted with digital evidence of their more immodest and imprudent moments.
But who knew it would happen this quickly?
Politics today is rife with examples of candidates having to explain why they
were posing shirtless for pictures poolside with a skimpily clad woman
(Representative Aaron Schock of Illinois), simulating sex acts on a toy (the
Congressional candidate Krystal Ball of Virginia), or carousing on Halloween
night dressed as a ladybug (the Senate candidate Christine O’Donnell of
Delaware).
“I think all of us know that politicians would have to confront the Facebook
skeletons in their closet, but that it would be in 20 years, not in two years,”
said Anil Dash, a technology consultant and pioneer of the blogosphere when it
was just beginning in the late 1990s. “By the time the next generation comes
into power, they’ll just assume this is how it’s always been.”
And the list of embarrassing moments caught on film goes on. Blake Farenthold, a
Republican candidate for Congress in Texas, had to defend himself after pictures
surfaced right before the election of him wearing pajamas with little yellow
ducks as he stood grinning next to a woman in black lingerie.
A Congressional race in Ohio became awkward after Rich Iott, the Republican
candidate, was shown in a photo dressed up as a Nazi for a World War II
re-enactment.
The candidates themselves are not the only ones being confronted with images
from the past. In 2008, photographs of President Obama’s speechwriter Jon
Favreau groping a cardboard cutout of Hillary Rodham Clinton made their way onto
blogs. This year, in the Minnesota race for governor, Facebook photos of the
Republican candidate’s under-age son drinking alcohol were disseminated, forcing
the candidate, Tom Emmer, to put out a statement on the matter. He called the
episode “a serious mistake” and said his son had paid the consequences.
With so many examples to point to already, could this mean that drunken Facebook
photos of the presidential candidates of 2024 and of the Supreme Court justice
nominees of 2040 are already out there?
As the cases of Mr. Schock (29), Ms. Ball (28) and Mr. Favreau (29) suggest,
today’s generation of future leaders has grown up in an era when letting one’s
guard down for one’s Facebook friends to see is an afterthought.
Ms. Ball, a Democrat, was stunned when she found out that six-year-old party
pictures were circulating online. In them, she was wearing a Santa cap and
provocative lacy hosiery while holding and putting her mouth around a sex toy.
The story went viral, getting attention from news media outlets as varied as
Gawker and National Public Radio.
“I think I was the No. 3 most-Googled term in the whole world over some stupid
gag I played when I was 22 years old,” Ms. Ball said in a phone interview on
Wednesday, the day after she lost her election.
While her opponent already had a comfortable advantage in the Republican-leaning
district by the time the pictures came out, Ms. Ball’s experience raises the
question of whether American culture will ever evolve to the point where voters
tolerate pictures of future leaders in various states of inebriation and
undress.
Ms. Ball, a certified public accountant, has used the experience as an
opportunity to warn of a potential chilling effect on tomorrow’s leaders.
Candidates, she argued, should not be shamed out of a race because of mistakes
made in their youth. “I had a whole lot of people who were older than me saying
they were feeling grateful that Facebook and digital cameras weren’t around when
they were growing up,” she said. “I am not the only person with stupid photos
out there, and I would hate to have some young man or young woman think, ‘I
can’t run for office because I did something stupid at a party however long
ago.’ “
Mr. Duffy, who won his race, used the same argument in distancing himself from
his “Real World” days. “I never thought I would run for Congress,” he was quoted
by The Washington Post as saying in June. “If you look back at a certain reality
TV show, you know that.” His involvement with the show seemed to have little
impact on his campaign, despite efforts by his opponents to paint him as a
debaucherous lout.
As the Facebook generation ages, time indeed may prove that they are more
willing to overlook the indiscretions of their peers out of empathy.
“We’re in kind of a cultural transformation right now,” said James Lull, a
professor emeritus of communication studies at San Jose State University, an
author and an editor of books on media and culture. “It’s a relatively slow
process in political terms. But culturally we’re going to get used to this. So
I’m not sure the ‘Oh my God!’ feelings we’re getting today will be the same on
down the line. I think there’s going to be an erosion to the impact.”
Still, it seems certain that right now, the aspiring leaders of the United
States are busy scrubbing their Facebook profiles of incriminating evidence,
looking at those who have learned the hard way. In 2008, Republican handlers
failed to clean up the MySpace page of Levi Johnston, the boyfriend of vice-
presidential nominee Sarah Palin’s daughter Bristol. On the page, Mr. Johnston
called himself a “redneck” who didn’t want children; his girlfriend was pregnant
at the time.
Still, humans can be as unforgiving as they can be indiscreet. Daniel J. Solove,
a professor at George Washington University Law School and the author of “The
Future of Reputation,” said a lot of people make the argument that “if
everyone’s warts are exposed, hey, ‘Everybody has warts, we’ll live with it.’ ”
“I think that’s overly optimistic,” he added. “That’s not human nature.”
The Facebook Skeletons
Come Out, NYT, 5.11.2010,
http://www.nytimes.com/2010/11/07/fashion/07indiscretions.html
Facebook Lets Users Interact in Small Groups
October 6, 2010
The New York Times
By MIGUEL HELFT
PALO ALTO, Calif. — Facebook is trying to become a bit more like the real
world.
The company on Wednesday introduced a feature that allows users to interact with
small groups of people, like their family, high school friends or colleagues.
The move is an effort to address a longstanding problem: Facebook friends often
span a broad range of relationships that include relatives, classmates, casual
professional acquaintances or jogging partners — and not everyone wants all of
them to see his or her information.
With the new feature, called Groups, Facebook hopes to encourage users to upload
more photos, videos and other information to the site while giving them new ways
to control who sees what.
Some privacy advocates welcomed Groups, but others worried that it would give
Facebook even more information about users, which it could provide to marketers
and others.
In an interview, Mark Zuckerberg, co-founder and chief executive of Facebook,
said the feature, which has been in development for months, was not created in
reaction to the recent series of privacy mishaps that have forced the company to
roll back new features and apologize to users.
“We think about this stuff a lot,” Mr. Zuckerberg said, referring to privacy.
“Often people don’t think we think about it as much as we do.”
He said Groups was simple in concept but technically difficult. At a news
conference at Facebook headquarters here, he noted that Groups was not the
company’s first effort to let users share more selectively.
Facebook has long allowed users to create lists of friends, but that feature has
largely failed. Mr. Zuckerberg said only about 5 percent of Facebook users take
advantage of the lists.
Groups allows anyone to create a group and include other people. For example,
someone’s cousin may create a group for their family and put every family member
in it. In that way, Facebook contends that if even a small percentage of users
create groups, most people on Facebook will end up in several groups.
“We think this is going to be a pretty fundamental shift for how people use
Facebook,” Mr. Zuckerberg said. “The amount of sharing will go up massively and
will be completely additive.”
Once a group is created, users can upload information only to that group, and
can communicate with everyone in the group simultaneously through online chat.
Mr. Zuckerberg said that other applications and services that use Facebook’s
technology would be able to use Groups, and that Groups would help improve other
parts of Facebook.
“Knowing the groups you are part of helps us understand the people who are most
important to you, and that can help us rank items in the news feed,” he said.
Augie Ray, an analyst with Forrester Research, called Groups “a big step forward
to allow Facebook to reflect the same social norms that we have in the real
world.”
He added: “In the real world, we don’t shout one thing to everyone that we know.
With Groups, you have this opportunity to begin to control who hears what.”
Larry Magid, co-director of ConnectSafely.org, a nonprofit group focused on
online safety for children, said Groups could protect privacy. “But there is the
danger of a false sense of security,” said Mr. Magid, whose organization
receives some financial support from Facebook and other technology companies.
Mr. Magid said a group member could deliberately or inadvertently allow a
stranger into a group, potentially exposing information in the group to an
outsider.
Mr. Zuckerberg said he thought the system would police itself because everyone
in the group would be notified when a new member joins and would flag someone
who does not belong.
But Marc Rotenberg, executive director of the Electronic Privacy Information
Center, called the new service “double-edged.”
“Yes, it’s good to be able to segment posts for particular friends,” he said.
“But you will also be revealing information to Facebook about the basis of your
online connections.”
Mr. Rotenberg said he worried about how Facebook would use that information.
On Wednesday Facebook also introduced two other services: one to allow users to
download all their Facebook information into one file, and another to let people
monitor how third-party applications gain access to their personal data.
Facebook Lets Users
Interact in Small Groups, NYT, 6.10.2010,
http://www.nytimes.com/2010/10/07/technology/07facebook.html
Private Moment Made Public, Then a Fatal Jump
September 29, 2010
The New York Times
By LISA W. FODERARO
It started with a Twitter message on Sept. 19: “Roommate asked for the room
till midnight. I went into molly’s room and turned on my webcam. I saw him
making out with a dude. Yay.”
That night, the authorities say, the Rutgers University student who sent the
message used a camera in his dormitory room to stream the roommate’s intimate
encounter live on the Internet.
And three days later, the roommate who had been surreptitiously broadcast —
Tyler Clementi, an 18-year-old freshman and an accomplished violinist — jumped
from the George Washington Bridge into the Hudson River in an apparent suicide.
The Sept. 22 death, details of which the authorities disclosed on Wednesday, was
the latest by a young American that followed the online posting of hurtful
material. The news came on the same day that Rutgers kicked off a two-year,
campuswide project to teach the importance of civility, with special attention
to the use and abuse of new technology.
Those who knew Mr. Clementi — on the Rutgers campus in Piscataway, N.J., at his
North Jersey high school and in a community orchestra — were anguished by the
circumstances surrounding his death, describing him as an intensely devoted
musician who was sweet and shy.
“It’s really awful, especially in New York and in the 21st century,” said Arkady
Leytush, artistic director of the Ridgewood Symphony Orchestra, where Mr.
Clementi played since his freshman year in high school. “It’s so painful. He was
very friendly and had very good potential.”
The Middlesex County prosecutor’s office said Mr. Clementi’s roommate, Dharun
Ravi, 18, of Plainsboro, N.J., and another classmate, Molly Wei, 18, of
Princeton Junction, N.J., had each been charged with two counts of invasion of
privacy for using “the camera to view and transmit a live image” of Mr.
Clementi. The most serious charges carry a maximum sentence of five years.
Mr. Ravi was charged with two additional counts of invasion of privacy for
trying a similar live feed on the Internet on Sept. 21, the day before the
suicide. A spokesman for the prosecutor’s office, James O’Neill, said the
investigation was continuing, but he declined to “speculate on additional
charges.”
Steven Goldstein, chairman of the gay rights group Garden State Equality, said
Wednesday that he considered the death a hate crime. “We are sickened that
anyone in our society, such as the students allegedly responsible for making the
surreptitious video, might consider destroying others’ lives as a sport,” he
said in a statement.
At the end of the inaugural event for the university’s “Project Civility”
campaign on Wednesday, nearly 100 demonstrators gathered outside the student
center, where the president spoke. They chanted, “Civility without safety — over
our queer bodies!”
It is unclear what Mr. Clementi’s sexual orientation was; classmates say he
mostly kept to himself. Danielle Birnbohm, a freshman who lived across the hall
from him in Davidson Hall, said that when a counselor asked how many students
had known Mr. Clementi, only 3 students out of 50 raised their hands.
But Mr. Clementi displayed a favorite quotation on his Facebook page, from the
song “I’ll Never Fall in Love Again”: “What do you get when you kiss a guy? You
get enough germs to catch pneumonia.”
And his roommate’s Twitter message makes plain that Mr. Ravi believed that Mr.
Clementi was gay.
A later message from Mr. Ravi appeared to make reference to the second attempt
to broadcast Mr. Clementi. “Anyone with iChat,” he wrote on Sept. 21, “I dare
you to video chat me between the hours of 9:30 and 12. Yes, it’s happening
again.”
Ms. Birnbohm said Mr. Ravi had said the initial broadcast was an accident — that
he viewed the encounter after dialing his own computer from another room in the
dorm. It was not immediately known how or when Mr. Clementi learned what his
roommate had done. But Ms. Birnbohm said the episode quickly became the subject
of gossip in the dormitory.
Mr. Clementi’s family issued a statement on Wednesday confirming the suicide and
pledging cooperation with the criminal investigation. “Tyler was a fine young
man, and a distinguished musician,” the statement read. “The family is
heartbroken beyond words.”
The Star-Ledger of Newark reported that Mr. Clementi posted a note on his
Facebook page the day of his death: “Jumping off the gw bridge sorry.” Friends
and strangers have turned the page into a memorial.
Witnesses told the police they saw a man jump off the bridge just before 9 p.m.
on Sept. 22, said Paul J. Browne, the New York Police Department’s chief
spokesman. Officers discovered a wallet there with Mr. Clementi’s
identification, Mr. Browne said.
The police said Wednesday night that they had found the body of a young man in
the Hudson north of the bridge and were trying to identify it.
Officials at Ridgewood High School, where Mr. Clementi graduated in June, last
week alerted parents of current students that his family had reported him
missing and encouraged students to take advantage of counseling at the school.
The timing of the news was almost uncanny, coinciding with the start of “Project
Civility” at Rutgers, the state university of New Jersey. Long in the planning,
the campaign will involve panel discussions, lectures, workshops and other
events to raise awareness about the importance of respect, compassion and
courtesy in everyday interactions.
Events scheduled for this fall include a workshop for students and
administrators on residential life on campus and a panel discussion titled
“Uncivil Gadgets? Changing Technologies and Civil Behavior.”
Rutgers officials would not say whether the two suspects had been suspended. But
in a statement late Wednesday, the university’s president, Richard L. McCormick,
said, “If the charges are true, these actions gravely violate the university’s
standards of decency and humanity.” At the kickoff event for the civility
campaign, Mr. McCormick made an oblique reference to the case, saying, “It is
more clear than ever that we need strongly to reassert our call for civility and
responsibility for each other.”
Mr. Ravi was freed on $25,000 bail, and Ms. Wei was released on her own
recognizance. The lawyer for Mr. Ravi, Steven D. Altman, declined to comment on
the accusations. A phone message left at the offices of Ms. Wei’s lawyer was not
returned.
Some students on the Busch campus in Piscataway seemed dazed by the turn of
events, remembering their last glimpse of Mr. Clementi. Thomas Jung, 19, shared
a music stand with Mr. Clementi in the Rutgers Symphony Orchestra.
On Wednesday afternoon, hours before Mr. Clementi’s death, the two rehearsed
works by Berlioz and Beethoven. “He loved music,” Mr. Jung said. “He was very
dedicated. I couldn’t tell if anything was wrong.”
Reporting was contributed by Al Baker, Barbara Gray, Nate Schweber and Tim
Stelloh.
Private Moment Made
Public, Then a Fatal Jump, NYT, 29.7.2010,
http://www.nytimes.com/2010/09/30/nyregion/30suicide.html
U.S. Is Working to Ease Wiretaps on the Internet
September 27, 2010
The New York Times
By CHARLIE SAVAGE
WASHINGTON — Federal law enforcement and national security officials are
preparing to seek sweeping new regulations for the Internet, arguing that their
ability to wiretap criminal and terrorism suspects is “going dark” as people
increasingly communicate online instead of by telephone.
Essentially, officials want Congress to require all services that enable
communications — including encrypted e-mail transmitters like BlackBerry, social
networking Web sites like Facebook and software that allows direct “peer to
peer” messaging like Skype — to be technically capable of complying if served
with a wiretap order. The mandate would include being able to intercept and
unscramble encrypted messages.
The bill, which the Obama administration plans to submit to lawmakers next year,
raises fresh questions about how to balance security needs with protecting
privacy and fostering innovation. And because security services around the world
face the same problem, it could set an example that is copied globally.
James X. Dempsey, vice president of the Center for Democracy and Technology, an
Internet policy group, said the proposal had “huge implications” and challenged
“fundamental elements of the Internet revolution” — including its decentralized
design.
“They are really asking for the authority to redesign services that take
advantage of the unique, and now pervasive, architecture of the Internet,” he
said. “They basically want to turn back the clock and make Internet services
function the way that the telephone system used to function.”
But law enforcement officials contend that imposing such a mandate is reasonable
and necessary to prevent the erosion of their investigative powers.
“We’re talking about lawfully authorized intercepts,” said Valerie E. Caproni,
general counsel for the Federal Bureau of Investigation. “We’re not talking
expanding authority. We’re talking about preserving our ability to execute our
existing authority in order to protect the public safety and national security.”
Investigators have been concerned for years that changing communications
technology could damage their ability to conduct surveillance. In recent months,
officials from the F.B.I., the Justice Department, the National Security Agency,
the White House and other agencies have been meeting to develop a proposed
solution.
There is not yet agreement on important elements, like how to word statutory
language defining who counts as a communications service provider, according to
several officials familiar with the deliberations.
But they want it to apply broadly, including to companies that operate from
servers abroad, like Research in Motion, the Canadian maker of BlackBerry
devices. In recent months, that company has come into conflict with the
governments of Dubai and India over their inability to conduct surveillance of
messages sent via its encrypted service.
In the United States, phone and broadband networks are already required to have
interception capabilities, under a 1994 law called the Communications Assistance
to Law Enforcement Act. It aimed to ensure that government surveillance
abilities would remain intact during the evolution from a copper-wire phone
system to digital networks and cellphones.
Often, investigators can intercept communications at a switch operated by the
network company. But sometimes — like when the target uses a service that
encrypts messages between his computer and its servers — they must instead serve
the order on a service provider to get unscrambled versions.
Like phone companies, communication service providers are subject to wiretap
orders. But the 1994 law does not apply to them. While some maintain
interception capacities, others wait until they are served with orders to try to
develop them.
The F.B.I.’s operational technologies division spent $9.75 million last year
helping communication companies — including some subject to the 1994 law that
had difficulties — do so. And its 2010 budget included $9 million for a “Going
Dark Program” to bolster its electronic surveillance capabilities.
Beyond such costs, Ms. Caproni said, F.B.I. efforts to help retrofit services
have a major shortcoming: the process can delay their ability to wiretap a
suspect for months.
Moreover, some services encrypt messages between users, so that even the
provider cannot unscramble them.
There is no public data about how often court-approved surveillance is
frustrated because of a service’s technical design.
But as an example, one official said, an investigation into a drug cartel
earlier this year was stymied because smugglers used peer-to-peer software,
which is difficult to intercept because it is not routed through a central hub.
Agents eventually installed surveillance equipment in a suspect’s office, but
that tactic was “risky,” the official said, and the delay “prevented the
interception of pertinent communications.”
Moreover, according to several other officials, after the failed Times Square
bombing in May, investigators discovered that the suspect, Faisal Shahzad, had
been communicating with a service that lacked prebuilt interception capacity. If
he had aroused suspicion beforehand, there would have been a delay before he
could have been wiretapped.
To counter such problems, officials are coalescing around several of the
proposal’s likely requirements:
¶ Communications services that encrypt messages must have a way to unscramble
them.
¶ Foreign-based providers that do business inside the United States must install
a domestic office capable of performing intercepts.
¶ Developers of software that enables peer-to-peer communication must redesign
their service to allow interception.
Providers that failed to comply would face fines or some other penalty. But the
proposal is likely to direct companies to come up with their own way to meet the
mandates. Writing any statute in “technologically neutral” terms would also help
prevent it from becoming obsolete, officials said.
Even with such a law, some gaps could remain. It is not clear how it could
compel compliance by overseas services that do no domestic business, or from a
“freeware” application developed by volunteers.
In their battle with Research in Motion, countries like Dubai have sought
leverage by threatening to block BlackBerry data from their networks. But Ms.
Caproni said the F.B.I. did not support filtering the Internet in the United
States.
Still, even a proposal that consists only of a legal mandate is likely to be
controversial, said Michael A. Sussmann, a former Justice Department lawyer who
advises communications providers.
“It would be an enormous change for newly covered companies,” he said.
“Implementation would be a huge technology and security headache, and the
investigative burden and costs will shift to providers.”
Several privacy and technology advocates argued that requiring interception
capabilities would create holes that would inevitably be exploited by hackers.
Steven M. Bellovin, a Columbia University computer science professor, pointed to
an episode in Greece: In 2005, it was discovered that hackers had taken
advantage of a legally mandated wiretap function to spy on top officials’
phones, including the prime minister’s.
“I think it’s a disaster waiting to happen,” he said. “If they start building in
all these back doors, they will be exploited.”
Susan Landau, a Radcliffe Institute of Advanced Study fellow and former Sun
Microsystems engineer, argued that the proposal would raise costly impediments
to innovation by small startups.
“Every engineer who is developing the wiretap system is an engineer who is not
building in greater security, more features, or getting the product out faster,”
she said.
Moreover, providers of services featuring user-to-user encryption are likely to
object to watering it down. Similarly, in the late 1990s, encryption makers
fought off a proposal to require them to include a back door enabling
wiretapping, arguing it would cripple their products in the global market.
But law enforcement officials rejected such arguments. They said including an
interception capability from the start was less likely to inadvertently create
security holes than retrofitting it after receiving a wiretap order.
They also noted that critics predicted that the 1994 law would impede cellphone
innovation, but that technology continued to improve. And their envisioned
decryption mandate is modest, they contended, because service providers — not
the government — would hold the key.
“No one should be promising their customers that they will thumb their nose at a
U.S. court order,” Ms. Caproni said. “They can promise strong encryption. They
just need to figure out how they can provide us plain text.”
U.S. Is Working to Ease
Wiretaps on the Internet, NYT, 27.9.2010,
http://www.nytimes.com/2010/09/27/us/27wiretap.html
Facebook Hopes Credits Make Dollars
September 22, 2010
The New York imes
By MIGUEL HELFT
PALO ALTO, Calif. — For all its success, Google is often criticized for being
a one-trick pony. After 12 years, the Internet search company is still
struggling to find a significant new revenue source to supplement its lucrative
text advertising business.
Facebook, which more than any other company aspires to usurp Google’s dominant
place on the Internet, hopes to avoid that problem. Already on the path to
becoming an advertising powerhouse, the social networking company is laying the
groundwork for its second act: a virtual currency system that some day could
turn into a multibillion-dollar business.
Facebook began testing its virtual currency, called Credits, more than a year
ago with some popular games on Facebook. This month, Credits passed a milestone
when it became the exclusive payment method for most of the games created by
Zynga, the No. 1 developer of Facebook applications.
Zynga is expected to have $500 million in revenue this year, according to the
Inside Network, which tracks Facebook applications, as millions of users pay
real money to buy virtual goods on games like FarmVille and Mafia Wars. Through
Credits, Facebook will take a 30 percent cut.
By the end of the year, Facebook expects that Credits will be used to buy the
vast majority of virtual goods sold on Facebook. The fast-growing market is
expected to reach $835 million on Facebook this year, according to the Inside
Network. To bolster that market, Facebook began selling Credits gift cards at
Target stores across the country this month.
For now, Facebook says it simply wants Credits to help foster the growth of
virtual goods transactions. But Mark Zuckerberg, the chief executive, said
recently that the company may choose to do “a lot more” with Credits in the
future. Over time, the company plans to turn Credits into a system for
micropayments that could be open to any application on Facebook, be it a game or
perhaps a media company, people with direct knowledge of Facebook’s plans said.
They spoke anonymously because the plans have not been announced publicly.
In addition to games, which account for the vast majority of money spent on
Facebook, more than a million other applications run on the site. In the future,
many of those may choose to charge for access to certain features or to things
like music, videos or news articles.
Some analysts and industry insiders say that expanding Credits makes sense and
could eventually put Facebook in competition with PayPal, Google, Amazon and
others for a slice of the growing pie of online transactions.
“If they can get 50 million registered credit cards, why wouldn’t they use them
to pay for your newspaper subscription?” said Alex Rampell, the chief executive
of TrialPay, an advertising company that offers free Facebook Credits to people
who buy certain products.
Others say the potential for using Credits could extend beyond the Facebook
site, through Facebook Connect, a service that allows users to log in to sites
across the Web using their Facebook identities.
“There is a huge opportunity for Facebook to use Facebook Connect to offer
seamless checkout on other sites,” said Ron Hirson, a senior vice president at
Boku, a start-up company that enables online payments using a cellphone. “They
are focusing on games and apps now, but it would make sense for them to go into
other” product categories.
For now, Facebook prefers to play down talk of its broader ambitions for
Credits. Dan Rose, Facebook’s vice president for partnerships and platform
marketing, talks about the usefulness of Credits while playing Facebook games.
Users will have a single currency they can spend on any game, sparing them the
trouble of entering the credit card or PayPal credentials multiple times, he
says. Currently users can buy Credits with 15 currencies, including the United
States dollars, the euro, the British pound, the Venezuelan bolivar and the
Danish krone
It works much like Apple’s App Store, which allows users to enter their credit
cards or PayPal accounts once and buy applications from any developer. Apple
also takes a 30 percent cut of sales on iTunes and its app store.
Mr. Rose said that while some developers might initially see a decline in
revenue because of Facebook’s commission, the plan is for Credits to more than
offset that loss over time, because Credits will make it easier to spend more in
a game.
“We need to be able to grow the total level of money spent,” Mr. Rose said.
Facebook is also helping lubricate the system by giving its developers credits
that they can give away to users.
Some developers say they already have made gains. “We are seeing the number of
paying users increase and the revenue per user increase, and FB deserves a lot
of the credit for it,” said Mark Hull, vice president for marketing at
CrowdStar, whose Happy Aquarium game is among the most popular on Facebook.
Mr. Rose said that if Facebook succeeded, Credits “could grow it to a size where
over time it will become a material revenue generator.” For now, he said,
Facebook plans to reinvest revenue from Credits into improving its software for
developers.
But Facebook’s ambitions are unmistakable. Credits is backed by a sizable
engineering and product team that is full of PayPal veterans.
“It is a lot like PayPal in the early days,” said Deb Liu, a former director of
corporate strategy at PayPal who is now product marketing manager for Credits.
“We are moving fast and changing the industry.”
For now, Credits is not a rival to PayPal or other payment systems. In February,
Facebook signed an agreement with PayPal, a unit of eBay, making PayPal one of
the preferred ways to finance Credits accounts. Facebook users can buy Credits
using their credit cards and some mobile payments services.
Since Zynga was one of PayPal’s largest customers, Facebook is now a significant
customer as well. “Facebook has been a great partner,” Osama Bedier, PayPal’s
vice president for platform, said.
But as Credits expands beyond Facebook games, it could collide with a number of
others competing for a piece of the growing commerce in digital goods. They
include Apple, the leading seller of music and apps; Google, whose Checkout
system is used in e-commerce and on the company’s app store for mobile phones;
and even Amazon, which is seeking to expand its payment system across the Web.
Analysts said Facebook’s ambitions might well run into the same obstacles that
have thwarted Google and Amazon as they have sought to expand across the Web.
“Facebook is a very innovative company, but we have had two large innovative
companies, Google and Amazon, that have spent a fair amount of effort on
payments,” said Mark Mahaney, an analyst at Citigroup. Those companies have yet
to gain much traction, he said. “I have to think that the odds against Facebook
are steep.”
Facebook Hopes Credits
Make Dollars, NYT, 22.9.2010,
http://www.nytimes.com/2010/09/23/technology/23facebook.html
Code That Tracks Users’ Browsing Prompts Lawsuits
September 20, 2010
The New York Times
By TANZINA VEGA
Sandra Person Burns used to love browsing and shopping online. Until she
realized she was being tracked by software on her computer that she thought she
had erased.
Ms. Person Burns, 67, a retired health care executive who lives in Jackson,
Miss., said she is wary of online shopping: “Instead of going to Amazon, I’m
going to the local bookstore.”
Ms. Person Burns is one of a growing number of consumers who are taking legal
action against companies that track computer users’ activity on the Internet. At
issue is a little-known piece of computer code placed on hard drives by the
Flash program from Adobe when users watch videos on popular Web sites like
YouTube and Hulu.
The technology, so-called Flash cookies, is bringing an increasing number of
federal lawsuits against media and technology companies and growing criticism
from some privacy advocates who say the software may also allow the companies to
create detailed profiles of consumers without their knowledge.
Unlike other so-called HTML cookies, which store Web site preferences and can be
managed by changing privacy settings in a Web browser, Flash cookies are stored
in a separate directory that many users are unaware of and may not know how to
control.
Ms. Person Burns, a claimant who is to be represented by KamberLaw, said she
knew cookies existed but did not know about Flash cookies.
“I thought that in all the instructions that I followed to purge my system of
cookies, I thought I had done that, and I discovered I had not,” she said. “My
information is now being bartered like a product without my knowledge or
understanding.”
Since July, at least five class-action lawsuits filed in California have accused
media companies like the Fox Entertainment Group and NBC Universal, and
technology companies like Specific Media and Quantcast of surreptitiously using
Flash cookies. More filings are expected as early as this week.
The suits contend that the companies collected information on the Web sites that
users visited and from the videos they watched, even though the users had set
their Web browser privacy settings to reject cookies that could track them.
“What these cases are about is the right of a computer user to dictate the terms
by which their personal information is harvested and shared. This is all about
user control,” said Scott A. Kamber, 44, a privacy and technology lawyer with
KamberLaw who is involved with some of the cases. The suits have been filed by
firms including Parisi & Havens and the law office of Joseph H. Malley.
One lawsuit contends that Clearspring Technologies and media companies including
the Walt Disney Internet Group “knowingly authorized” the use of online tracking
devices that would “allow access to and disclosure of Internet users’ online
activities as well as personal information.” Others say that the information was
gathered to sell to online advertisers.
In August, Clearspring and Quantcast issued statements on their company blogs
addressing the suits. Clearspring clarified its use of Flash cookies and said
the legal filings were “factually inaccurate.” The company said it used Flash
cookies, also known as Flash local storage, “to deliver standard Web analytics
to publishers.” The post also stated that data was collected at the aggregate
level including unique users and interaction time, but did not include
personally identifiable information.
Quantcast’s blog post said that the company “uses Flash cookies for measurement
purposes only and not for any form of targeted content delivery.”
Specific Media did not respond to requests for comment. Counsel for the media
companies in the cases declined to comment; representatives of companies that
had not yet been served with the suits also declined to comment.
Some privacy advocates said that despite the companies’ claims, if enough data
is collected over time, advertisers can create detailed profiles of users
including personally identifiable data like race and age in addition to data
about what Web sites a user visits. They also take issue with the fact that
Flash cookies can be used to restore HTML cookies that have been deleted from a
user’s computer, circumventing a user’s privacy settings.
“The core function of the cookie is to link what you do on Web site A to what
you do on Web site B,” said Peter Eckersley, a technologist at the Electronic
Frontier Foundation. “The Flash cookie makes it harder for people to stop that
from happening.”
According to Adobe, more than 75 percent of online videos are delivered using
Flash technology, with media companies also using it to serve games and
animation to users. The company says that Flash cookies are intended to be used
for basic Web functions like saving a user’s volume and language preferences or
remembering where a user left off on a video game.
In a public letter to the Federal Trade Commission in January, Adobe condemned
the practice of restoring cookies after they had been deleted by a user. The
company provides an online tool on its Web site to erase Flash cookies and
manage Flash player settings. At least one suit, however, claims that the
controls are not easy to reach and are not obvious to most Web users.
Chris Jay Hoofnagle, 36, one of the authors of a University of California,
Berkeley, study about Internet privacy and Flash cookies that has been used in
several of the legal filings, said the recent spate of suits pointed to a
weakness in federal rules governing online privacy.
“Consumer privacy actions have largely failed,” Mr. Hoofnagle said. The
lawsuits, he added, “actually are moving the policy ball forward in the ways
that activists are not.”
Complaints about online privacy are now migrating to mobile technology. Last
week, a lawsuit was filed by three California residents against a technology
company called Ringleader Digital saying that the company used a product called
Media Stamp that “acquired information from plaintiff’s phone and assigned a
unique ID to their mobile device.”
The suit says that the information collected by the unique ID, using a
technology called HTML 5, allowed Web site operators “to track the mobile
devices’ Internet activities over multiple Web sites.”
In a statement, Bob Walczak Jr., Ringleader’s chief executive, said, “Our intent
since the inception of the company has been to build a mobile advertising
platform that users can control.” He added that Ringleader was working on “new
ways for consumers to be able to verify for themselves that their opt-outs have
taken effect.”
John Verdi, senior counsel at the Electronic Privacy Information Center, faulted
the Federal Trade Commission for not being more aggressive on privacy issues,
focusing largely, instead, on self-regulation.
“The F.T.C. has been inactive on this front and has failed to present meaningful
regulation on this,” he said. “There’s wide evidence that online tracking is not
being controlled by self-regulation.”
Christopher Olsen, an assistant director in the division of privacy and identity
protection at the agency, said it had hosted a series of roundtable discussions
about online and offline privacy challenges from December to March and planned
to issue a report in the next few months to address those issues.
The agency is investigating several companies, but Mr. Olson declined to comment
on the specifics.
Other efforts to address online privacy are taking place at the Congressional
level. In July, Representative Bobby L. Rush, Democrat of Illinois, introduced
an online privacy bill that would, among other things, require companies to
disclose how they collect, use and maintain the personal information on users
and to make those disclosures easy for users to understand.
Code That Tracks Users’
Browsing Prompts Lawsuits, NYT, 20.9.2010,
http://www.nytimes.com/2010/09/21/technology/21cookie.html
At Twitter, a Web Site Is Revamped and Simplified
September 14, 2010
The New York Times
By CLAIRE CAIN MILLER and MIGUEL HELFT
Twitter unveiled a new Web site on Tuesday that it hopes will be user
friendly.
The redesigned site, which will be available to all users in the next few weeks,
makes it simpler to see information about the authors of Twitter posts,
conversations among Twitter users, and the photos and videos that posts link to.
“It’s going to increase the value that people are getting out of Twitter, so in
less time you can get more information and value,” Evan Williams, Twitter’s
co-founder and chief executive, said in an interview. He had the idea for the
redesign and has spent much of his time in the last few months working with
Twitter engineers on the site. He has said he was surprised that so many people
use the service — 160 million — given how difficult its Web site is to navigate.
That large audience is appealing to advertisers, but the unappealing Web site
has not been a welcoming place for them. Twitter, which has raised $160 million
in venture capital, has slowly started to run ads called Promoted Tweets that
people see when they search the site. Mr. Williams said the new site would
improve ads “because there’s going to be more real estate and more engagement.”
Twitter’s new Web site could threaten the many start-ups that build apps, like
TweetDeck, Brizzly and Seesmic, to make Twitter easier to use and to provide
users with more sophisticated tools.
Even though 78 percent of Twitter’s unique users gain access to the service
through its Web site, the site has had some major flaws. Twitter has not been
able to funnel resources into redesigning the site until now, Mr. Williams said,
because the company has had trouble keeping up with its growth, even struggling
to keep its Web site from crashing.
If people want to learn more about the author of a post, for instance, they must
go to a new page. It has been almost impossible to follow a conversation between
two Twitter users. And while a quarter of the posts contain links, if people
post a link to a photo, readers have not been able to see the picture without
going to a new site.
On the new Twitter Web site, people see two panes instead of a single timeline
of posts. The timeline stays in the left pane. In the right pane, they can see
more information about posts — like biographies of authors, photos and videos to
which posts link — and conversations that spring from a particular post. This
eliminates the need to click back and forth.
Mr. Williams said the new site was not designed for the sake of advertisers, but
the experience of viewing ads would improve. For example, when a movie studio
puts out a “sponsored tweet” for a film with a link to the trailer, users will
be able to see the trailer without leaving the Twitter site.
Borrowing an idea from image searching on Google and Bing, Twitter now shows a
continuous stream of posts so people do not need to click “more” to view
additional posts.
Twitter, which was founded in 2006, has grown so quickly in part because it
opened its technology to thousands of software developers outside the company
who have built Twitter tools.
But as Twitter has matured, it has angered many of those developers by building
similar tools itself or acquiring the start-ups that built the tools, limiting
opportunities for competing app developers. Last spring, for example, it bought
Atebits, which made a Twitter iPhone app called Tweetie, and turned it into the
official Twitter for iPhone app.
Other start-ups worry that if Twitter builds its own tools, they will go out of
business. Indeed, mobile Twitter users now reach Twitter through the company’s
own iPhone and BlackBerry apps more than through any others, according to the
company.
“We’ve made it pretty clear that we are going to create the best experiences we
can with all our clients,” Mr. Williams said. “We made it clear to developers
that it’s great for everyone if we make it as good as possible, because that
will create more successful Twitter users.”
At Twitter, a Web Site
Is Revamped and Simplified, NYT, 14.9.2010,
http://www.nytimes.com/2010/09/15/technology/15twitter.html
YouTube Ads Turn Videos Into Revenue
September 2, 2010
The New York Times
By CLAIRE CAIN MILLER
SAN BRUNO, Calif. — Last month, a YouTube user, TomR35, uploaded a clip from
the AMC series “Mad Men” in which Don Draper makes a heartfelt speech about the
importance of nostalgia in advertising.
Viewers wouldn’t notice, but that clip also makes an important point about
modern advertising — YouTube is an increasingly fruitful place for advertisers.
In the past, Lions Gate, which owns the rights to the “Mad Men” clip, might have
requested that TomR35’s version be taken down. But it has decided to leave clips
like this up, and in return, YouTube runs ads with the video and splits the
revenue with Lions Gate.
Remarkably, more than one-third of the two billion views of YouTube videos with
ads each week are like TomR35’s “Mad Men” clip — uploaded without the copyright
owner’s permission but left up by the owner’s choice. They are automatically
recognized by YouTube, using a system called Content ID that scans videos and
compares them to material provided by copyright owners.
Those two billion views, a 50 percent increase over last year, according to the
company, are just 14 percent of the videos viewed each week on the Google-owned
site. But that’s enough to turn YouTube profitable this year, analysts say.
“YouTube is a big component of our display revenue, and display is our next big
business,” Eric E. Schmidt, Google’s chief executive, said in an interview.
In the last year, the video site has become a significant contributor to the
family business at a time when Google, which makes more than 90 percent of its
revenue from text search ads, is seeking a second act. Though Google does not
report YouTube’s earnings, it has hinted that it is hovering near profitability.
Analysts say YouTube will bring in around $450 million in revenue this year and
earn a profit. Revenue at YouTube has more than doubled each year for the last
three years, according to the company.
YouTube’s new profitable relationship with content creators was not always so
easy. For a long time, YouTube executives spent their time across conference
tables with lawyers worried about copyright violations, said Chris Maxcy,
YouTube’s director of content partnerships.
“It was 90 percent lawyers in a meeting and the marketing people faded into the
background,” he said. “Now the partners we are working with get checks that get
bigger every month. And now when you walk into a meeting there’s almost no
lawyers, or there’s a couple of lawyers but they are deal lawyers there to help
you get your contract done.”
The shift is also an important development for Google, which bought YouTube for
$1.65 billion in 2006. The video site at first played the role of Google’s
profligate son, throwing money at building out bandwidth and storage to handle
all the videos but making little money of its own.
Mr. Schmidt said that YouTube’s role began to change about a year and a half
ago, when he asked the unit to start focusing on revenue.
The strategy had been to amass “an audience first, then figure out the tools
that will create the revenue, then you go to the content partners and say, ‘Hey,
look guys,’ ” Mr. Schmidt said. “And I think we’re at that point now.”
Salar Kamangar, YouTube’s co-head, who also co-founded Google’s AdWords search
advertising program, started spending his time figuring out how to make money on
the video business.
YouTube gives Google the chance to get a piece of the television ad market, Mr.
Kamangar said, by bringing videos straight to the television over an Internet
connection, or Internet protocol, as the industry calls it. “Ads can be a lot
more effective when they’re delivered over I.P. instead of cable or broadcast,
because they’re delivered personalized to you.”
YouTube now offers several types of ads, including display ads on its home page
and on the video pages, ads that promote videos and ads that run in the video
stream or pop up on the bottom of a video.
When someone uploaded a recording of the Eminem song “Not Afraid,” for instance,
instead of taking down the recording, YouTube ran pop-up ads that let people buy
the song or the ring tone and shared the revenue with the copyright owner.
“Google smartly realized that consumers consume different types of media
throughout the day,” said Dave Marsey, senior vice president of media at
Digitas, the online advertising agency. “Search is a huge component of that, but
there are times when you want some entertainment or you want to solve a problem
and going to YouTube makes sense.”
YouTube shares advertising revenue with content partners, who may be big
entertainment companies like Lions Gate or amateur videographers who have
developed a following. Hundreds of these partners make more than $100,000 a
year. Some, like Sal Khan, a former hedge fund manager who now makes math and
science education videos, have quit their day jobs.
YouTube’s next challenge is to attract more advertisers by offering more
professional, long-form content to supplement the videos of cooing babies and
surprised kittens. YouTube is testing a pay-per-view film rental service and
broadcasting live events like concerts, and it just signed a deal to show
on-demand Major League Baseball games in Japan.
Hulu, the site started by TV networks that streams movies and shows, makes
considerably more revenue per stream than YouTube because it has more
professionally produced content, said Jordan Rohan, an Internet and digital
media research analyst at Stifel Nicolaus. “YouTube is certainly the market
leader in terms of streams. They’re certainly the market leader in terms of
revenues,” Mr. Rohan said. But only a small percentage of its revenue streams
would justify a high ad rate, he said.
YouTube must also follow its viewers as they increasingly watch videos away from
their computers, on small mobile phone screens and big TV screens. YouTube now
has 160 million mobile views a day, almost triple last year’s number. When
Google introduces Google TV later this year, people will be able to watch
YouTube videos on Internet-connected televisions.
YouTube Ads Turn Videos
Into Revenue, NYT, 2.9.2010,
http://www.nytimes.com/2010/09/03/technology/03youtube.html
Neighborly Borrowing, Over the Online Fence
August 28, 2010
The New York Times
By JENNA WORTHAM
THE first time I unboxed my gleaming Roomba, I beamed like a proud new parent
as I placed it gently on my hardwood floor.
That evening, I watched it putter around my apartment, sweeping and inhaling
dust bunnies. When it gamely bumbled around bulky pieces of furniture, I dashed
about, too, lifting the obstacles out of its way. After the Roomba finished its
chaotic dance, I put it back into its case and patted the sweet little machine
good night. The next morning, I returned it to its rightful owner.
The Roomba was mine for only 24 hours. I had rented it through a service called
SnapGoods, which allows people to lend out their surplus gadgetry and various
gear for a daily fee.
SnapGoods is one of the latest start-ups that bases its business model around
allowing people to share, exchange and rent goods in a local setting. Among
others are NeighborGoods and ShareSomeSugar. Other commercial services are
springing up, too, including group-buying sites like Groupon, the peer-to-peer
travel site Airbnb and Kickstarter, which allows people to invest small sums in
creative ventures.
The common thread of all these sites is that access trumps ownership; consumers
are offered ways to share goods instead of having to buy them.
Ron J. Williams, co-founder of SnapGoods, based in New York, describes the
phenomenon as the “access economy.”
“There may always be certain products that you do need to buy,” says Mr.
Williams. “But there is also a growing cultural awareness that you don’t always
get enjoyment out of hyperconsumption. The notion of ownership as the barrier
between you and what you need is outdated.”
The most obvious reason for all of this is financial. Recession-battered
shoppers can test pricey new devices before deciding whether to take the plunge
or wait until the next upgrade. (Roombas, for example, can retail for as much as
$600 for the newer models. I borrowed mine for a much more palatable $10.)
For all the promise of these new marketplaces, analysts say they aren’t likely
to overtake more traditional models anytime soon.
“The holy grails of consumerism are convenience and choice,” says Rachel
Botsman, co-author of the forthcoming book, “What’s Mine Is Yours: The Rise of
Collaborative Consumption.” “This is not the end of the old consumer way. But
they could sit side by side. Peer-to-peer could become the default way to
share.”
There’s much evidence that this is already happening. Do-it-yourself home
improvers can borrow tools for a weekend project, and hobbyist campers can rent
equipment per trip, rather than splurge on all-new gear. Travelers looking for
inexpensive accommodations can spend the night in someone’s spare bedroom for a
fraction of the cost of a hotel room. For people who lend their stuff, it’s a
way to make extra money on possessions that are gathering dust.
“My Roomba is on track to pay for itself,” says Luke Tucker, 31, a software
engineer who rented me his robotic vacuum cleaner through SnapGoods.
But some experts think that there may be something bigger than thriftiness at
play. These services may be gaining popularity because they reinforce a sense of
community.
“It turns out to actually be a good way to meet my neighbors,” says Mr. Tucker,
who also lists a jigsaw, a digital camera and a wireless keyboard for rent on
SnapGoods.
Charlis Floyd, a 22-year-old student, and Nema Williams, a 30-year-old comedian,
who rent out their spare bedroom in Brooklyn on Airbnb, say that while the extra
income helps — as any little bit does these days — they’re much more interested
in the revolving cast of characters they meet.
“We had a couple from England teach us how to make red curry,” says Ms. Floyd.
“Another guy, an artist, promised to paint a mural in our kitchen,” adds Mr.
Williams.
Of course, that doesn’t mean it always goes off without a hitch.“Sometimes
people can be weird,” says Ms. Floyd. “One girl drank all our milk and another
person broke our toilet handle.”
Even so, Ms. Floyd and Mr. Williams still like being in the rental business.
“It’s a win-win situation,” says Ms. Floyd. “You make some extra money and make
new friends.”
For entrepreneurs, there’s a payoff in such commerce. Groupon, for example, says
it’s on track to generate $500 million in revenue this year; Airbnb has said it
is profitable, though it does not provide exact numbers.
Paul J. Zak, director of the Center for Neuroeconomics Studies at Claremont
Graduate University in California, says that participating in a community like
SnapGoods, Kickstarter, Groupon or Airbnb can ease social isolation and flesh
out our network of friends.
“There is an underlying notion that if I rent my things in my house, I get to
meet my neighbor, and if I’m walking the goods over, I get to meet them in
person,” he says. “We’re drawing on a desire in a fast-paced world to still have
real connections to a community.”
Mr. Zak says he conducted a preliminary experiment indicating that posting
messages on Twitter caused the release of oxytocin, a neurotransmitter that
evokes feelings of contentment and is thought to help induce a sense of positive
social bonding. He is now testing those ideas in research on a group of 40
people.
The social interaction “reduces stress hormones, even through the Web,” he says.
“You’re feeling a real physiological relationship to that person, even if they
are online.”
MR. ZAK says Web commerce is moving beyond transactions by individuals and
companies and embracing models that encourage social contact and interaction — a
hallmark of the already robust social media phenomenon and a throwback to the
good old days when people actually spent time socializing at local markets.
“The Web is bringing businesses back down to the individual as the average
company becomes smaller, more niche and specialized,” he says. “Paradoxically,
the Web is moving us back to a human-centric business model.”
Trust is a big factor in all of this. Otherwise, how can you be sure that
someone won’t just rip you off?
Marketplaces like eBay have long relied on ratings and user reviews to weed out
unreliable participants. But in addition to safeguards like preauthorizing the
price of rentals through PayPal, the latest wave of peer-to-peer systems make
use of social networks like Facebook and Twitter to engender trust.
If someone wants to rent your iPad or crash on your couch, the person’s online
profile leaves a trail of digital bread crumbs that makes it harder to pull off
a scam, giving potential lenders and hosts reason to breathe easier.
“This new economy,” says Ms. Botsman, “is going to be driven entirely by
reputation, which is part of a new cultural shift — seeing how our behavior in
one community affects what we can access in another.”
Neighborly Borrowing,
Over the Online Fence, NYT, 28.8.2010,
http://www.nytimes.com/2010/08/29/business/29ping.html
Digital Devices Deprive Brain of Needed Downtime
August 24, 2010
THe New York Times
By MATT RICHTEL
SAN FRANCISCO — It’s 1 p.m. on a Thursday and Dianne Bates, 40,
juggles three screens. She listens to a few songs on her iPod, then taps out a
quick e-mail on her iPhone and turns her attention to the high-definition
television.
Just another day at the gym.
As Ms. Bates multitasks, she is also churning her legs in fast loops on an
elliptical machine in a downtown fitness center. She is in good company. In gyms
and elsewhere, people use phones and other electronic devices to get work done —
and as a reliable antidote to boredom.
Cellphones, which in the last few years have become full-fledged computers with
high-speed Internet connections, let people relieve the tedium of exercising,
the grocery store line, stoplights or lulls in the dinner conversation.
The technology makes the tiniest windows of time entertaining, and potentially
productive. But scientists point to an unanticipated side effect: when people
keep their brains busy with digital input, they are forfeiting downtime that
could allow them to better learn and remember information, or come up with new
ideas.
Ms. Bates, for example, might be clearer-headed if she went for a run outside,
away from her devices, research suggests.
At the University of California, San Francisco, scientists have found that when
rats have a new experience, like exploring an unfamiliar area, their brains show
new patterns of activity. But only when the rats take a break from their
exploration do they process those patterns in a way that seems to create a
persistent memory of the experience.
The researchers suspect that the findings also apply to how humans learn.
“Almost certainly, downtime lets the brain go over experiences it’s had,
solidify them and turn them into permanent long-term memories,” said Loren
Frank, assistant professor in the department of physiology at the university,
where he specializes in learning and memory. He said he believed that when the
brain was constantly stimulated, “you prevent this learning process.”
At the University of Michigan, a study found that people learned significantly
better after a walk in nature than after a walk in a dense urban environment,
suggesting that processing a barrage of information leaves people fatigued.
Even though people feel entertained, even relaxed, when they multitask while
exercising, or pass a moment at the bus stop by catching a quick video clip,
they might be taxing their brains, scientists say.
“People think they’re refreshing themselves, but they’re fatiguing themselves,”
said Marc Berman, a University of Michigan neuroscientist.
Regardless, there is now a whole industry of mobile software developers
competing to help people scratch the entertainment itch. Flurry, a company that
tracks the use of apps, has found that mobile games are typically played for 6.3
minutes, but that many are played for much shorter intervals. One popular game
that involves stacking blocks gets played for 2.2 minutes on average.
Today’s game makers are trying to fill small bits of free time, said Sebastien
de Halleux, a co-founder of PlayFish, a game company owned by the industry giant
Electronic Arts.
“Instead of having long relaxing breaks, like taking two hours for lunch, we
have a lot of these micro-moments,” he said. Game makers like Electronic Arts,
he added, “have reinvented the game experience to fit into micro-moments.”
Many business people, of course, have good reason to be constantly checking
their phones. But this can take a mental toll. Henry Chen, 26, a self-employed
auto mechanic in San Francisco, has mixed feelings about his BlackBerry habits.
“I check it a lot, whenever there is downtime,” Mr. Chen said. Moments earlier,
he was texting with a friend while he stood in line at a bagel shop; he stopped
only when the woman behind the counter interrupted him to ask for his order.
Mr. Chen, who recently started his business, doesn’t want to miss a potential
customer. Yet he says that since he upgraded his phone a year ago to a
feature-rich BlackBerry, he can feel stressed out by what he described as
internal pressure to constantly stay in contact.
“It’s become a demand. Not necessarily a demand of the customer, but a demand of
my head,” he said. “I told my girlfriend that I’m more tired since I got this
thing.”
In the parking lot outside the bagel shop, others were filling up moments with
their phones. While Eddie Umadhay, 59, a construction inspector, sat in his car
waiting for his wife to grocery shop, he deleted old e-mail while listening to
news on the radio. On a bench outside a coffee house, Ossie Gabriel, 44, a nurse
practitioner, waited for a friend and checked e-mail “to kill time.”
Crossing the street from the grocery store to his car, David Alvarado pushed his
2-year-old daughter in a cart filled with shopping bags, his phone pressed to
his ear.
He was talking to a colleague about work scheduling, noting that he wanted to
steal a moment to make the call between paying for the groceries and driving.
“I wanted to take advantage of the little gap,” said Mr. Alvarado, 30, a
facilities manager at a community center.
For many such people, the little digital asides come on top of heavy use of
computers during the day. Take Ms. Bates, the exercising multitasker at the
expansive Bakar Fitness and Recreation Center. She wakes up and peeks at her
iPhone before she gets out of bed. At her job in advertising, she spends all day
in front of her laptop.
But, far from wanting a break from screens when she exercises, she says she
couldn’t possibly spend 55 minutes on the elliptical machine without “lots of
things to do.” This includes relentless channel surfing.
“I switch constantly,” she said. “I can’t stand commercials. I have to flip
around unless I’m watching ‘Project Runway’ or something I’m really into.”
Some researchers say that whatever downside there is to not resting the brain,
it pales in comparison to the benefits technology can bring in motivating people
to sweat.
“Exercise needs to be part of our lives in the sedentary world we’re immersed
in. Anything that helps us move is beneficial,” said John J. Ratey, associate
clinical professor of psychiatry at the Harvard Medical School and author of
“Spark: The Revolutionary New Science of Exercise and the Brain.”
But all things being equal, Mr. Ratey said, he would prefer to see people do
their workouts away from their devices: “There is more bang for your buck doing
it outside, for your mood and working memory.”
Of the 70 cardio machines on the main floor at Bakar Fitness, 67 have
televisions attached. Most of them also have iPod docks and displays showing
workout performance, and a few have games, like a rope-climbing machine that
shows an animated character climbing the rope while the live human does so too.
A few months ago, the cable TV went out and some patrons were apoplectic. “It
was an uproar. People said: ‘That’s what we’re paying for,’ ” said Leeane
Jensen, 28, the fitness manager.
At least one exerciser has a different take. Two stories up from the main floor,
Peter Colley, 23, churns away on one of the several dozen elliptical machines
without a TV. Instead, they are bathed in sunlight, looking out onto the pool
and palm trees.
“I look at the wind on the trees. I watch the swimmers go back and forth,” Mr.
Colley said. “I usually come here to clear my head.”
Digital Devices Deprive
Brain of Needed Downtime, NYT, 24.8.2010,
http://www.nytimes.com/2010/08/25/technology/25brain.html
Facebook Makes Headway Around the World
July 7, 2010
The New York Times
By MIGUEL HELFT
Sergey Brin, a Google founder, takes issue with people who say
Google has failed to gain a foothold in social networking. Google has had
successes, he often says, especially with Orkut, the dominant service in Brazil
and India.
Mr. Brin may soon have to revise his answer.
Facebook, the social network service that started in a Harvard dorm room just
six years ago, is growing at a dizzying rate around the globe, surging to nearly
500 million users, from 200 million users just 15 months ago.
It is pulling even with Orkut in India, where only a year ago, Orkut was more
than twice as large as Facebook. In the last year, Facebook has grown eightfold,
to eight million users, in Brazil, where Orkut has 28 million.
In country after country, Facebook is cementing itself as the leader and often
displacing other social networks, much as it outflanked MySpace in the United
States. In Britain, for example, Facebook made the formerly popular Bebo all but
irrelevant, forcing AOL to sell the site at a huge loss two years after it
bought it for $850 million. In Germany, Facebook surpassed StudiVZ, which until
February was the dominant social network there.
With his typical self-confidence, Mark Zuckerberg, Facebook’s 26-year-old chief
executive, recently said it was “almost guaranteed” that the company would reach
a billion users.
Though he did not say when it would reach that mark, the prediction was not
greeted with the skepticism that had met his previous boasts of fast growth.
“They have been more innovative than any other social network, and they are
going to continue to grow,” said Jeremiah Owyang, an analyst with the Altimeter
Group. “Facebook wants to be ubiquitous, and they are being successful for now.”
The rapid ascent of Facebook has no company more worried than Google, which sees
the social networking giant as a threat on multiple fronts. Much of the activity
on Facebook is invisible to Google’s search engine, which makes it less useful
over time. What’s more, the billions of links posted by users on Facebook have
turned the social network into an important driver of users to sites across the
Web. That has been Google’s role.
Google has tried time and again to break into social networking not only with
Orkut, but also with user profiles, with an industrywide initiative called
OpenSocial, and, most recently, with Buzz, a social network that mixes elements
of Facebook and Twitter with Gmail. But none of those initiatives have made a
dent in Facebook.
Google is said to be trying again with a secret project for a service called
Google Me, according to several reports. Google declined to comment for this
article.
Google makes its money from advertising, and even here, Facebook poses a
challenge.
“There is nothing more threatening to Google than a company that has 500 million
subscribers and knows a lot about them and places targeted advertisements in
front of them,” said Todd Dagres, a partner at Spark Capital, a venture firm
that has invested in Twitter and other social networking companies. “For every
second that people are on Facebook and for every ad that Facebook puts in front
of their face, it is one less second they are on Google and one less ad that
Google puts in front of their face.”
With nearly two-thirds of all Internet users in the United States signed up on
Facebook, the company has focused on international expansion.
Just over two years ago, Facebook was available only in English. Still, nearly
half of its users were outside the United States, and its presence was
particularly strong in Britain, Australia and other English-speaking countries.
The task of expanding the site overseas fell on Javier Olivan, a 33-year-old
Spaniard who joined Facebook three years ago, when the site had 30 million
users. Mr. Olivan led an innovative effort by Facebook to have its users
translate the site into more than 80 languages. Other Web sites and technology
companies, notably Mozilla, the maker of Firefox, had used volunteers to
translate their sites or programs.
But with 300,000 words on Facebook’s site — not counting material posted by
users — the task was immense. Facebook not only encouraged users to translate
parts of the site, but also let other users fine-tune those translations or pick
among multiple translations. Nearly 300,000 users participated.
“Nobody had done it at the scale that we were doing it,” Mr. Olivan said.
The effort paid off. Now about 70 percent of Facebook’s users are outside the
United States. And while the number of users in the United States doubled in the
last year, to 123 million, according to comScore, the number more than tripled
in Mexico, to 11 million, and it more than quadrupled in Germany, to 19 million.
With every new translation, Facebook pushed into a new country or region, and
its spread often mirrored the ties between nations or the movement of people
across borders. After becoming popular in Italy, for example, Facebook spread to
the Italian-speaking portions of Switzerland. But in German-speaking areas of
Switzerland, adoption of Facebook lagged. When Facebook began to gain momentum
in Brazil, the activity was most intense in southern parts of the country that
border on neighboring Argentina, where Facebook was already popular.
“It’s a mapping of the real world,” Mr. Olivan said.
Facebook is not popular everywhere. The Web site is largely blocked in China.
And with fewer than a million users each in Japan, South Korea and Russia, it
lags far behind home-grown social networks in those major markets.
Mr. Olivan, who leads a team of just 12 people, hopes to change that. Facebook
recently sent some of its best engineers to a new office in Tokyo, where they
are working to fine-tune searches so they work with all three Japanese scripts.
In South Korea, as well as in Japan, where users post to their social networks
on mobile phones more than on PCs, the company is working with network operators
to ensure distribution of its service.
Industry insiders say that, most of all, Facebook is benefiting from a cycle
where success breeds more success. In particular, its growing revenue, estimated
at $1 billion annually, allows the company to invest in improving its product
and keep competitors at bay.
“I think that Facebook is winning for two reasons,” said Bing Gordon, a partner
at Kleiner Perkins Caufield & Byers and a board member of Zynga, the maker of
popular Facebook games like FarmVille and Mafia Wars. Mr. Gordon said that
Facebook had hired some of the best engineers in Silicon Valley, and he said
that the company’s strategy to create a platform for other software developers
had played a critical role.
“They have opened up a platform, and they have the best apps on that platform,”
Mr. Gordon said.
With Facebook’s social networking lead growing, it is not clear whether Google,
or any other company, will succeed in derailing its march forward.
Says Danny Sullivan, the editor of Search Engine Land, an industry blog, “Google
can’t even get to the first base of social networks, which is people interacting
with each other, much less to second or third base, which is people interacting
with each other through games and applications.”
Facebook Makes
Headway Around the World, NYT, 7.7.2010,
http://www.nytimes.com/2010/07/08/technology/companies/08facebook.html
Attached to Technology and Paying a Price
June 6, 2010
The New York Times
By MATT RICHTEL
SAN FRANCISCO — When one of the most important e-mail messages
of his life landed in his in-box a few years ago, Kord Campbell overlooked it.
Not just for a day or two, but 12 days. He finally saw it while sifting through
old messages: a big company wanted to buy his Internet start-up.
“I stood up from my desk and said, ‘Oh my God, oh my God, oh my God,’ ” Mr.
Campbell said. “It’s kind of hard to miss an e-mail like that, but I did.”
The message had slipped by him amid an electronic flood: two computer screens
alive with e-mail, instant messages, online chats, a Web browser and the
computer code he was writing. (View an interactive panorama of Mr. Campbell's
workstation.)
While he managed to salvage the $1.3 million deal after apologizing to his
suitor, Mr. Campbell continues to struggle with the effects of the deluge of
data. Even after he unplugs, he craves the stimulation he gets from his
electronic gadgets. He forgets things like dinner plans, and he has trouble
focusing on his family.
His wife, Brenda, complains, “It seems like he can no longer be fully in the
moment.”
This is your brain on computers.
Scientists say juggling e-mail, phone calls and other incoming information can
change how people think and behave. They say our ability to focus is being
undermined by bursts of information.
These play to a primitive impulse to respond to immediate opportunities and
threats. The stimulation provokes excitement — a dopamine squirt — that
researchers say can be addictive. In its absence, people feel bored.
The resulting distractions can have deadly consequences, as when
cellphone-wielding drivers and train engineers cause wrecks. And for millions of
people like Mr. Campbell, these urges can inflict nicks and cuts on creativity
and deep thought, interrupting work and family life.
While many people say multitasking makes them more productive, research shows
otherwise. Heavy multitaskers actually have more trouble focusing and shutting
out irrelevant information, scientists say, and they experience more stress.
And scientists are discovering that even after the multitasking ends, fractured
thinking and lack of focus persist. In other words, this is also your brain off
computers.
“The technology is rewiring our brains,” said Nora Volkow, director of the
National Institute of Drug Abuse and one of the world’s leading brain
scientists. She and other researchers compare the lure of digital stimulation
less to that of drugs and alcohol than to food and sex, which are essential but
counterproductive in excess.
Technology use can benefit the brain in some ways, researchers say. Imaging
studies show the brains of Internet users become more efficient at finding
information. And players of some video games develop better visual acuity.
More broadly, cellphones and computers have transformed life. They let people
escape their cubicles and work anywhere. They shrink distances and handle
countless mundane tasks, freeing up time for more exciting pursuits.
For better or worse, the consumption of media, as varied as e-mail and TV, has
exploded. In 2008, people consumed three times as much information each day as
they did in 1960. And they are constantly shifting their attention. Computer
users at work change windows or check e-mail or other programs nearly 37 times
an hour, new research shows.
The nonstop interactivity is one of the most significant shifts ever in the
human environment, said Adam Gazzaley, a neuroscientist at the University of
California, San Francisco.
“We are exposing our brains to an environment and asking them to do things we
weren’t necessarily evolved to do,” he said. “We know already there are
consequences.”
Mr. Campbell, 43, came of age with the personal computer, and he is a heavier
user of technology than most. But researchers say the habits and struggles of
Mr. Campbell and his family typify what many experience — and what many more
will, if trends continue.
For him, the tensions feel increasingly acute, and the effects harder to shake.
The Campbells recently moved to California from Oklahoma to start a software
venture. Mr. Campbell’s life revolves around computers. (View a slide show on
how the Campbells interact with technology.)
He goes to sleep with a laptop or iPhone on his chest, and when he wakes, he
goes online. He and Mrs. Campbell, 39, head to the tidy kitchen in their
four-bedroom hillside rental in Orinda, an affluent suburb of San Francisco,
where she makes breakfast and watches a TV news feed in the corner of the
computer screen while he uses the rest of the monitor to check his e-mail.
Major spats have arisen because Mr. Campbell escapes into video games during
tough emotional stretches. On family vacations, he has trouble putting down his
devices. When he rides the subway to San Francisco, he knows he will be offline
221 seconds as the train goes through a tunnel.
Their 16-year-old son, Connor, tall and polite like his father, recently
received his first C’s, which his family blames on distraction from his gadgets.
Their 8-year-old daughter, Lily, like her mother, playfully tells her father
that he favors technology over family.
“I would love for him to totally unplug, to be totally engaged,” says Mrs.
Campbell, who adds that he becomes “crotchety until he gets his fix.” But she
would not try to force a change.
“He loves it. Technology is part of the fabric of who he is,” she says. “If I
hated technology, I’d be hating him, and a part of who my son is too.”
Always On
Mr. Campbell, whose given name is Thomas, had an early start with technology in
Oklahoma City. When he was in third grade, his parents bought him Pong, a video
game. Then came a string of game consoles and PCs, which he learned to program.
In high school, he balanced computers, basketball and a romance with Brenda, a
cheerleader with a gorgeous singing voice. He studied too, with focus,
uninterrupted by e-mail. “I did my homework because I needed to get it done,” he
said. “I didn’t have anything else to do.”
He left college to help with a family business, then set up a lawn mowing
service. At night he would read, play video games, hang out with Brenda and, as
she remembers it, “talk a lot more.”
In 1996, he started a successful Internet provider. Then he built the start-up
that he sold for $1.3 million in 2003 to LookSmart, a search engine.
Mr. Campbell loves the rush of modern life and keeping up with the latest
information. “I want to be the first to hear when the aliens land,” he said,
laughing. But other times, he fantasizes about living in pioneer days when
things moved more slowly: “I can’t keep everything in my head.”
No wonder. As he came of age, so did a new era of data and communication.
At home, people consume 12 hours of media a day on average, when an hour spent
with, say, the Internet and TV simultaneously counts as two hours. That compares
with five hours in 1960, say researchers at the University of California, San
Diego. Computer users visit an average of 40 Web sites a day, according to
research by RescueTime, which offers time-management tools.
As computers have changed, so has the understanding of the human brain. Until 15
years ago, scientists thought the brain stopped developing after childhood. Now
they understand that its neural networks continue to develop, influenced by
things like learning skills.
So not long after Eyal Ophir arrived at Stanford in 2004, he wondered whether
heavy multitasking might be leading to changes in a characteristic of the brain
long thought immutable: that humans can process only a single stream of
information at a time.
Going back a half-century, tests had shown that the brain could barely process
two streams, and could not simultaneously make decisions about them. But Mr.
Ophir, a student-turned-researcher, thought multitaskers might be rewiring
themselves to handle the load.
His passion was personal. He had spent seven years in Israeli intelligence after
being weeded out of the air force — partly, he felt, because he was not a good
multitasker. Could his brain be retrained?
Mr. Ophir, like others around the country studying how technology bent the
brain, was startled by what he discovered.
The Myth of Multitasking
The test subjects were divided into two groups: those classified as heavy
multitaskers based on their answers to questions about how they used technology,
and those who were not.
In a test created by Mr. Ophir and his colleagues, subjects at a computer were
briefly shown an image of red rectangles. Then they saw a similar image and were
asked whether any of the rectangles had moved. It was a simple task until the
addition of a twist: blue rectangles were added, and the subjects were told to
ignore them. (Play a game testing how well you filter out distractions.)
The multitaskers then did a significantly worse job than the non-multitaskers at
recognizing whether red rectangles had changed position. In other words, they
had trouble filtering out the blue ones — the irrelevant information.
So, too, the multitaskers took longer than non-multitaskers to switch among
tasks, like differentiating vowels from consonants and then odd from even
numbers. The multitaskers were shown to be less efficient at juggling problems.
(Play a game testing how well you switch between tasks.)
Other tests at Stanford, an important center for research in this fast-growing
field, showed multitaskers tended to search for new information rather than
accept a reward for putting older, more valuable information to work.
Researchers say these findings point to an interesting dynamic: multitaskers
seem more sensitive than non-multitaskers to incoming information.
The results also illustrate an age-old conflict in the brain, one that
technology may be intensifying. A portion of the brain acts as a control tower,
helping a person focus and set priorities. More primitive parts of the brain,
like those that process sight and sound, demand that it pay attention to new
information, bombarding the control tower when they are stimulated.
Researchers say there is an evolutionary rationale for the pressure this barrage
puts on the brain. The lower-brain functions alert humans to danger, like a
nearby lion, overriding goals like building a hut. In the modern world, the
chime of incoming e-mail can override the goal of writing a business plan or
playing catch with the children.
“Throughout evolutionary history, a big surprise would get everyone’s brain
thinking,” said Clifford Nass, a communications professor at Stanford. “But
we’ve got a large and growing group of people who think the slightest hint that
something interesting might be going on is like catnip. They can’t ignore it.”
Mr. Nass says the Stanford studies are important because they show
multitasking’s lingering effects: “The scary part for guys like Kord is, they
can’t shut off their multitasking tendencies when they’re not multitasking.”
Melina Uncapher, a neurobiologist on the Stanford team, said she and other
researchers were unsure whether the muddied multitaskers were simply prone to
distraction and would have had trouble focusing in any era. But she added that
the idea that information overload causes distraction was supported by more and
more research.
A study at the University of California, Irvine, found that people interrupted
by e-mail reported significantly increased stress compared with those left to
focus. Stress hormones have been shown to reduce short-term memory, said Gary
Small, a psychiatrist at the University of California, Los Angeles.
Preliminary research shows some people can more easily juggle multiple
information streams. These “supertaskers” represent less than 3 percent of the
population, according to scientists at the University of Utah.
Other research shows computer use has neurological advantages. In imaging
studies, Dr. Small observed that Internet users showed greater brain activity
than nonusers, suggesting they were growing their neural circuitry.
At the University of Rochester, researchers found that players of some
fast-paced video games can track the movement of a third more objects on a
screen than nonplayers. They say the games can improve reaction and the ability
to pick out details amid clutter.
“In a sense, those games have a very strong both rehabilitative and educational
power,” said the lead researcher, Daphne Bavelier, who is working with others in
the field to channel these changes into real-world benefits like safer driving.
There is a vibrant debate among scientists over whether technology’s influence
on behavior and the brain is good or bad, and how significant it is.
“The bottom line is, the brain is wired to adapt,” said Steven Yantis, a
professor of brain sciences at Johns Hopkins University. “There’s no question
that rewiring goes on all the time,” he added. But he said it was too early to
say whether the changes caused by technology were materially different from
others in the past.
Mr. Ophir is loath to call the cognitive changes bad or good, though the impact
on analysis and creativity worries him.
He is not just worried about other people. Shortly after he came to Stanford, a
professor thanked him for being the one student in class paying full attention
and not using a computer or phone. But he recently began using an iPhone and
noticed a change; he felt its pull, even when playing with his daughter.
“The media is changing me,” he said. “I hear this internal ping that says: check
e-mail and voice mail.”
“I have to work to suppress it.”
Kord Campbell does not bother to suppress it, or no longer can.
Interrupted by a Corpse
It is a Wednesday in April, and in 10 minutes, Mr. Campbell has an online
conference call that could determine the fate of his new venture, called Loggly.
It makes software that helps companies understand the clicking and buying
patterns of their online customers.
Mr. Campbell and his colleagues, each working from a home office, are
frantically trying to set up a program that will let them share images with
executives at their prospective partner.
But at the moment when Mr. Campbell most needs to focus on that urgent task,
something else competes for his attention: “Man Found Dead Inside His Business.”
That is the tweet that appears on the left-most of Mr. Campbell’s array of
monitors, which he has expanded to three screens, at times adding a laptop and
an iPad.
On the left screen, Mr. Campbell follows the tweets of 1,100 people, along with
instant messages and group chats. The middle monitor displays a dark field
filled with computer code, along with Skype, a service that allows Mr. Campbell
to talk to his colleagues, sometimes using video. The monitor on the right keeps
e-mail, a calendar, a Web browser and a music player.
Even with the meeting fast approaching, Mr. Campbell cannot resist the tweet
about the corpse. He clicks on the link in it, glances at the article and
dismisses it. “It’s some article about something somewhere,” he says, annoyed by
the ads for jeans popping up.
The program gets fixed, and the meeting turns out to be fruitful: the partners
are ready to do business. A colleague says via instant message: “YES.”
Other times, Mr. Campbell’s information juggling has taken a more serious toll.
A few weeks earlier, he once again overlooked an e-mail message from a
prospective investor. Another time, Mr. Campbell signed the company up for the
wrong type of business account on Amazon.com, costing $300 a month for six
months before he got around to correcting it. He has burned hamburgers on the
grill, forgotten to pick up the children and lingered in the bathroom playing
video games on an iPhone.
Mr. Campbell can be unaware of his own habits. In a two-and-a-half hour stretch
one recent morning, he switched rapidly between e-mail and several other
programs, according to data from RescueTime, which monitored his computer use
with his permission. But when asked later what he was doing in that period, Mr.
Campbell said he had been on a long Skype call, and “may have pulled up an
e-mail or two.”
The kind of disconnection Mr. Campbell experiences is not an entirely new
problem, of course. As they did in earlier eras, people can become so lost in
work, hobbies or TV that they fail to pay attention to family.
Mr. Campbell concedes that, even without technology, he may work or play
obsessively, just as his father immersed himself in crossword puzzles. But he
says this era is different because he can multitask anyplace, anytime.
“It’s a mixed blessing,” he said. “If you’re not careful, your marriage can fall
apart or your kids can be ready to play and you’ll get distracted.”
The Toll on Children
Father and son sit in armchairs. Controllers in hand, they engage in a fierce
video game battle, displayed on the nearby flat-panel TV, as Lily watches.
They are playing Super Smash Bros. Brawl, a cartoonish animated fight between
characters that battle using anvils, explosives and other weapons.
“Kill him, Dad,” Lily screams. To no avail. Connor regularly beats his father,
prompting expletives and, once, a thrown pillow. But there is bonding and mutual
respect.
“He’s a lot more tactical,” says Connor. “But I’m really good at quick
reflexes.”
Screens big and small are central to the Campbell family’s leisure time. Connor
and his mother relax while watching TV shows like “Heroes.” Lily has an iPod
Touch, a portable DVD player and her own laptop, which she uses to watch videos,
listen to music and play games.
Lily, a second-grader, is allowed only an hour a day of unstructured time, which
she often spends with her devices. The laptop can consume her.
“When she’s on it, you can holler her name all day and she won’t hear,” Mrs.
Campbell said.
Researchers worry that constant digital stimulation like this creates attention
problems for children with brains that are still developing, who already
struggle to set priorities and resist impulses.
Connor’s troubles started late last year. He could not focus on homework. No
wonder, perhaps. On his bedroom desk sit two monitors, one with his music
collection, one with Facebook and Reddit, a social site with news links that he
and his father love. His iPhone availed him to relentless texting with his
girlfriend.
When he studied, “a little voice would be saying, ‘Look up’ at the computer, and
I’d look up,” Connor said. “Normally, I’d say I want to only read for a few
minutes, but I’d search every corner of Reddit and then check Facebook.”
His Web browsing informs him. “He’s a fact hound,” Mr. Campbell brags. “Connor
is, other than programming, extremely technical. He’s 100 percent Internet
savvy.”
But the parents worry too. “Connor is obsessed,” his mother said. “Kord says we
have to teach him balance.”
So in January, they held a family meeting. Study time now takes place in a group
setting at the dinner table after everyone has finished eating. It feels, Mr.
Campbell says, like togetherness.
No Vacations
For spring break, the family rented a cottage in Carmel, Calif. Mrs. Campbell
hoped everyone would unplug.
But the day before they left, the iPad from Apple came out, and Mr. Campbell
snapped one up. The next night, their first on vacation, “We didn’t go out to
dinner,” Mrs. Campbell mourned. “We just sat there on our devices.”
She rallied the troops the next day to the aquarium. Her husband joined them for
a bit but then begged out to do e-mail on his phone.
Later she found him playing video games.
The trip came as Mr. Campbell was trying to raise several million dollars for
his new venture, a goal that he achieved. Brenda said she understood that his
pursuit required intensity but was less understanding of the accompanying surge
in video game.
His behavior brought about a discussion between them. Mrs. Campbell said he told
her that he was capable of logging off, citing a trip to Hawaii several years
ago that they called their second honeymoon.
“What trip are you thinking about?” she said she asked him. She recalled that he
had spent two hours a day online in the hotel’s business center.
On Thursday, their fourth day in Carmel, Mr. Campbell spent the day at the beach
with his family. They flew a kite and played whiffle ball.
Connor unplugged too. “It changes the mood of everything when everybody is
present,” Mrs. Campbell said.
The next day, the family drove home, and Mr. Campbell disappeared into his
office.
Technology use is growing for Mrs. Campbell as well. She divides her time
between keeping the books of her husband’s company, homemaking and working at
the school library. She checks e-mail 25 times a day, sends texts and uses
Facebook.
Recently, she was baking peanut butter cookies for Teacher Appreciation Day when
her phone chimed in the living room. She answered a text, then became lost in
Facebook, forgot about the cookies and burned them. She started a new batch, but
heard the phone again, got lost in messaging, and burned those too. Out of
ingredients and shamed, she bought cookies at the store.
She feels less focused and has trouble completing projects. Some days, she
promises herself she will ignore her device. “It’s like a diet — you have good
intentions in the morning and then you’re like, ‘There went that,’ ” she said.
Mr. Nass at Stanford thinks the ultimate risk of heavy technology use is that it
diminishes empathy by limiting how much people engage with one another, even in
the same room.
“The way we become more human is by paying attention to each other,” he said.
“It shows how much you care.”
That empathy, Mr. Nass said, is essential to the human condition. “We are at an
inflection point,” he said. “A significant fraction of people’s experiences are
now fragmented.”
Attached to
Technology and Paying a Price, NYT, 6.6.2010,
http://www.nytimes.com/2010/06/07/technology/07brain.html
Video Game Review
From a Forest to a Family, One Tree at a Time
July 6, 2010
The New York Times
By SETH SCHIESEL
No new game company has been more successful over the past
couple of years than Zynga. From Mafia Wars to FarmVille, Zynga has essentially
defined the latest generation of games on Facebook. It almost goes without
saying that Facebook has become a ubiquitous, nigh indispensable element of so
many people’s social existence, and it is the rare Facebooker indeed who has not
fielded requests and seen status updates from a Zynga title. I played Mafia Wars
off and on for at least a year.
Now comes FrontierVille, in many ways Zynga’s most sophisticated project. Like
other Zynga games it is brilliantly designed and meticulously executed in its
ability to lure you onto a never-ending virtual treadmill. Hardly any electronic
code is more purely diverting than a game like FrontierVille.
But I don’t find it meaningful or rewarding. There is no mental stimulation or
biomechanical pleasure here. Rather, I find this entire category of games both
insidious in their appeal and annoyingly blatant in their attempt to
commercialize their users — to turn players into payers.
You see, FrontierVille and its ilk do not feel like games at all. Instead they
seem like lucrative business models that are being sold and packaged in the form
of a game. There is a big difference. When you talk to most designers of great
games they will tell you something along the lines of, “We make the kind of
games we would want to play.” That never feels like the case with Zynga games.
To me, a game like FrontierVille says, “We make the kind of games we think can
best attract and monetize the most number of people with credit cards who don’t
mind dropping $10 or $20 once in a while for a virtual tchotchke.”
Obviously, millions of people don’t mind at all, and FrontierVille taps into the
same veins of design and recurrence as earlier Zynga games. The setup is that
you begin alone in the forest with a couple of chickens and you must tame the
wilderness by clearing brush and cutting down trees before you can build a
cabin, plant crops, raise animals, attract a spouse, have children and build an
Old West-style settlement.
Like other Zynga games, FrontierVille is designed around a few core concepts:
keep players coming back multiple times a day, keep encouraging them to invite
more friends to the game, and keep giving them reason to pay a few bucks here
and there. You can play FrontierVille free and without badgering your friends to
come play with you all the time, but your progression will be slow and meager.
If you really want to feel like you’re getting somewhere you need to keep
inviting more friends or start shelling out some cash, or both. I paid $20 for
170 virtual horseshoes, which I used to unlock advanced farm animals like cows
and oxen and better flora like peach trees.
Whether you pay or not, FrontierVille is built to keep you coming back at least
a few times a day. You expend energy points to perform actions like feeding
pigs, chopping trees or whacking snakes. Once you’re out of energy points you
can wait a couple of hours for your pool to replenish or eat virtual food (from
your crops), or spend real money to get more energy. That real-time structure is
perfectly suited for how people use Facebook, which is to check in now and then
(or all day) on what their friends are up to.
In its infectious appeal FrontierVille borrows liberally from the sound and
visual iconography of games from Diablo to slot machines. Every time you clear
weeds or harvest crops or animals, little stars and loot pop out à la Diablo,
and your rewards are tied to how quickly you click to pick them up. The bloops
and beeps are straight off a casino floor. FrontierVille is very intelligent in
how it gets the player into a rhythm of clicking and receiving little rewards,
always with the possibility of hitting the jackpot with a rare item or piece of
a collectible set (like the oak-tree collection, or some such).
In the end all great games, like all great entertainments, involve a bit of
manipulation — doing things to consumers that they may not be completely aware
of on a conscious level. And perhaps Zynga games like FrontierVille are not
manipulative at all in the sense that they are so transparent about how they
operate.
With other games you pay upfront or with a monthly fee, and then receive access
to the whole game. With FrontierVille you never really have access to the entire
game. Instead, you continue paying here and there and inviting more and more
friends to keep seeing a little bit more of this frontier wilderness that you
will never fully master.
But you’ll have fun doing it.
From a Forest to a
Family, One Tree at a Time, NYT, 5.7.2010,
http://www.nytimes.com/2010/07/06/arts/television/06frontier.html
Giant Step Into Travel for Google
July 1, 2010
The New York Times
By BRAD STONE and JAD MOUAWAD
New Google tools to help people search easily for flights are
now on the runway. It will be up to antitrust regulators to decide whether they
can take off.
Google said Thursday that it had agreed to acquire ITA, a 14-year-old flight
information software company, for $700 million in cash.
Google said it planned to create flight search tools on Google.com, a move that
could upset the entire $132 billion-a-year air travel industry as well as its
rival Microsoft.
The deal is another significant step by Google away from how it has
traditionally conducted business. Instead of pointing searchers to the most
relevant Web sites, the company is increasingly giving information directly to
users in categories like shopping or local services like restaurants. Providing
information on flights and fares would be a new area for the company.
With 63 percent of the American search market, Google has recently drawn
scrutiny from antitrust regulators every time it has moved into a new business.
Its acquisition of AdMob, a mobile advertising firm, won approval by the Federal
Trade Commission after an intensive six-month review, and only after a rival,
Apple, undermined possible objections by introducing a competing mobile ad
network. The government has also examined Google’s scanning of millions of
out-of-print and hard-to-find books.
Antitrust enforcers previously reviewed and approved Google’s 2007 acquisition
of Doubleclick, and were prepared to block a proposed deal with Yahoo in 2008
before Google walked away.
Eric E. Schmidt, Google’s chief executive, predicted a “significant review” of
the ITA acquisition. He told analysts and reporters Thursday in a conference
call: “We think they will spend a fair amount of time going through it, trying
to understand it, both because of size and price. We welcome that.”
Samuel R. Miller, an antitrust lawyer at Sidley Austin, said: “I would think
antitrust enforcers will take a very hard look at this. Every time Google makes
another acquisition, it only reinforces the argument that they are basically
trying to acquire other companies that may present potential competition to
their core dominance in paid search.”
Google does not compete directly with ITA, but many of its largest rivals in the
travel search market, including Microsoft, use ITA’s data.
ITA was founded in the 1990s by computer scientists from the Massachusetts
Institute of Technology. The company revolutionized the ability of consumers to
find the cheapest fares by making it easy to compare fares among airlines. It
has licensed its product widely, and customers include companies like American
Airlines and Continental Airlines. Web sites like Hotwire, Kayak, Orbitz and
Farecast, which is now part of Microsoft’s Bing search service, also use ITA’s
software.
Mr. Schmidt said that Google would honor all existing agreements and seek to add
new partners.
“Airline travel and search are a perfect opportunity for more innovation, more
investment and more interesting products,” Mr. Schmidt said. “The whole idea is
to give people more of what they want, and more information when they are
searching.”
Companies that may lobby against the deal include Microsoft, Expedia and Kayak;
reservation networks like Travelport, Sabre and Amadeus; and possibly even some
airlines. The deal has been rumored in the travel press for months.
Airlines could be concerned “how Google will present this information, how will
it appear in Google search and whether they will have to pay for the results,”
said Henry H. Harteveldt, an analyst at Forrester Research. “What airlines do
not know is whether they will have to bid to have their own Web sites listed
against the travel agencies.”
Google declined to predict what kinds of services might result from the
acquisition. In the conference call, Marissa Mayer, Google’s vice president for
search products and user experience, talked about being able to answer more
open-ended travel queries, like “Where can I get within seven hours and within
this price?”
“Travel is one of the hardest problems around, both in the way people like to
address queries and the accuracy and speed which you need to give people the
results they are looking for,” she said.
Rick Seaney, the co-founder of farecompare.com, which uses ITA’s technology,
said the deal might prompt some antitrust concerns, especially from Microsoft.
“We have got a couple of months to contemplate this,” Mr. Seaney said, citing
the expected lengthy review process. “We don’t really know what it all means
yet, other than they will continue on with their existing relationships.”
Giant Step Into
Travel for Google, NYT, 1.7.2010,
http://www.nytimes.com/2010/07/02/technology/02google.html
Online Bullies Pull Schools Into the Fray
June 27, 2010
The New York Times
By JAN HOFFMAN
The girl’s parents, wild with outrage and fear, showed the principal the text
messages: a dozen shocking, sexually explicit threats, sent to their daughter
the previous Saturday night from the cellphone of a 12-year-old boy. Both
children were sixth graders at Benjamin Franklin Middle School in Ridgewood,
N.J.
Punish him, insisted the parents.
“I said, ‘This occurred out of school, on a weekend,’ ” recalled the principal,
Tony Orsini. “We can’t discipline him.”
Had they contacted the boy’s family, he asked.
Too awkward, they replied. The fathers coach sports together.
What about the police, Mr. Orsini asked.
A criminal investigation would be protracted, the parents had decided, its
outcome uncertain. They wanted immediate action.
They pleaded: “Help us.”
Schools these days are confronted with complex questions on whether and how to
deal with cyberbullying, an imprecise label for online activities ranging from
barrages of teasing texts to sexually harassing group sites. The extent of the
phenomenon is hard to quantify. But one 2010 study by the Cyberbullying Research
Center, an organization founded by two criminologist who defined bullying as
"willful and repeated harm” inflicted through phones and computers, said one in
five middle-school students had been affected.
Affronted by cyberspace’s escalation of adolescent viciousness, many parents are
looking to schools for justice, protection, even revenge. But many educators
feel unprepared or unwilling to be prosecutors and judges.
Often, school district discipline codes say little about educators’ authority
over student cellphones, home computers and off-campus speech. Reluctant to
assert an authority they are not sure they have, educators can appear
indifferent to parents frantic with worry, alarmed by recent adolescent suicides
linked to bullying.
Whether resolving such conflicts should be the responsibility of the family, the
police or the schools remains an open question, evolving along with definitions
of cyberbullying itself.
Nonetheless, administrators who decide they should help their cornered students
often face daunting pragmatic and legal constraints.
“I have parents who thank me for getting involved,” said Mike Rafferty, the
middle school principal in Old Saybrook, Conn., “and parents who say, ‘It didn’t
happen on school property, stay out of my life.’ ”
According to the Anti-Defamation League, although 44 states have bullying
statutes, fewer than half offer guidance about whether schools may intervene in
bullying involving “electronic communication,” which almost always occurs
outside of school and most severely on weekends, when children have more free
time to socialize online.
A few states say that school conduct codes must explicitly prohibit off-campus
cyberbullying; others imply it; still others explicitly exclude it. Some states
say that local districts should develop cyberbullying prevention programs but
the states did not address the question of discipline.
Judges are flummoxed, too, as they wrestle with new questions about protections
on student speech and school searches. Can a student be suspended for posting a
video on YouTube that cruelly demeans another student? Can a principal search a
cellphone, much like a locker or a backpack?
It’s unclear. These issues have begun their slow climb through state and federal
courts, but so far, rulings have been contradictory, and much is still to be
determined.
The Cyberdetectives
Benjamin Franklin Middle School conveys an earnest sweetness associated with an
earlier era. Its 700 students attend classes in a low-slung building from the
mid-’50s, complete with a bomb shelter and generous, shaded playing fields.
During cafeteria lunch duty, a guidance counselor runs a foosball tournament,
attracting a throng of laughing, shouting boys. This year’s school musical:
“Guys and Dolls.”
For all its charms, Benjamin Franklin, a sixth-through-eighth-grade school in a
wealthy New Jersey suburb, also lives bluntly in the present. A sixth-grade girl
dashes to class, wearing a turquoise T-shirt with bold sequined letters:
“Texting Is My Favorite Subject.” The seventh-grade guidance counselor says she
can spend up to three-fourths of her time mediating conflicts that began online
or through text messages.
In April, the burden of resolving these disputes had become so onerous that the
principal, Mr. Orsini, sent an exasperated e-mail message to parents that made
national news:
“There is absolutely NO reason for any middle school student to be part of a
social networking site,” he wrote. If children were attacked through sites or
texting, he added, “IMMEDIATELY GO TO THE POLICE!” That was not the response
that the parents of the girl who had received the foul messages had wanted to
hear.
Mr. Orsini sighed, relenting. After all, the texts were angry and obscene, the
parents horrified, the girl badly rattled.
“We can certainly talk to the boy,” the principal said.
Investigating a complaint can be like stumbling into a sinkhole. Over the next
few days, an assistant principal, Greg Wu; Mr. Orsini; a guidance counselor; a
social worker and an elementary school principal were pulled into this one:
The sixth graders had “dated” for a week, before the girl broke it off. The
texts she received that Saturday night were successively more sneering, graphic
and intimidating.
But the exchanges shown to Mr. Orsini were incomplete. Before handing her phone
to her parents, the girl erased her replies.
The boy claimed he was innocent, telling Mr. Wu he had lost his cellphone that
Saturday. “Yeah, right,” said Mr. Wu.
The boy insisted he had dropped it while riding his bicycle that April afternoon
with his brother and his brother’s friend, both fifth graders.
By Wednesday, the girl’s father called Mr. Orsini. “How is this boy still in
school, near my daughter? Why can’t you suspend him?”
The boy was a poor student in language arts classes, yet the text messages were
reasonably grammatical. Mr. Wu dictated a basic sentence for the boy to write
down. It was riddled with errors.
Next, an elementary school principal interviewed the fifth-grade boys
separately.
By Thursday, Mr. Orsini telephoned the girl’s parents with his unsettling
conclusion:
The boy had never sent the texts. The lost phone had been found by someone else
and used to send the messages. Who wrote them? A reference or two might suggest
another sixth grader.
The identity would remain unknown.
Mr. Orsini told the girl’s shaken parents that, aside from offering her
counseling, the school, which had already devoted 10 hours to the episode, could
do no more. “They were still in so much pain,” Mr. Orsini said. “They wanted us
to keep investigating.”
Middle School Misery
Meredith Wearley, Benjamin Franklin’s seventh-grade guidance counselor, was
overwhelmed this spring by dramas created on the Web: The text spats that zapped
new best friendships; secrets told in confidence, then broadcast on Facebook;
bullied girls and boys, retaliating online.
“In seventh grade, the girls are trying to figure out where they fit in,” Mrs.
Wearley said. “They have found friends but they keep regrouping. And the
technology makes it harder for them to understand what’s a real friendship.”
Because students prefer to use their phones for texting rather than talking,
Mrs. Wearley added, they often miss cues about tone of voice. Misunderstandings
proliferate: a crass joke can read as a withering attack; did that text have a
buried subtext?
The girls come into her office, depressed, weeping, astonished, betrayed.
“A girl will get mad because her friend was friends with another girl,” Mrs.
Wearley said.
They show Mrs. Wearley reams of texts, the nastiness accelerating precipitously.
“I’ve had to bring down five girls to my office to sort things out,” she said.
“It’s middle school.”
Recently, between classes, several eighth-grade girls from Benjamin Franklin
reflected about their cyberdramas:
“We had so many fights in seventh grade,” one girl said. “None of them were
face-to-face. We were too afraid. Besides, it’s easier to say ‘sorry’ over a
text.”
Another concurred. “It’s easier to fight online, because you feel more brave and
in control,” she said. “On Facebook, you can be as mean as you want.”
Studies show that online harassment can begin in fourth grade. By high school,
students inclined to be cruel in cyberspace are more technologically
sophisticated, more capable of hiding their prints. But that is also when older
students may be more resilient:
“By high school, youths are developing more self-confidence, engaged in
extracurricular activities and focusing on the future,” said Sameer Hinduja, a
professor at Florida Atlantic University and an author of “Bullying Beyond the
Schoolyard.”
“Their identity and self-worth come from external things that don’t revolve
around social relationships.”
But during middle school, he said, “Peer perception largely dictates their
self-worth.” With their erupting skin and morphing bodies, many seventh-grade
students have a hard enough time just walking through the school doors. When
dozens of kids vote online, which is not uncommon, about whether a student is
fat or stupid or gay, the impact can be devastating.
While research shows that traditional at-school bullying is far more pervasive
than cyberbullying, each type of hostility can now blur and bleed into the
other. Jeff Taylor, principal of Frank Lloyd Wright Intermediate School in West
Allis, Wis., wades into cyber-related conflicts at school several times each
week.
Recently, a seventh-grade girl held a weekend birthday party and her jealous
former friend showed up. By Tuesday night, the uninvited guest had insulted the
birthday girl’s dress on Facebook, calling it and the girl’s mother cheap. The
remarks were particularly wounding, because the birthday girl’s family is not
well-off.
By Wednesday, Mr. Taylor said, “There were rumblings about it in the cafeteria.
When kids start posturing and switching lunch tables, you can tell.” He and an
assistant tried to calm them.
But the posturing continued online. A confrontation at school was planned, and
the details were texted. On Friday, during the four minutes between
seventh-grade lunch and the next period, 20 girls showed up in a hallway and
began shrieking.
At least four adults pulled the girls apart and talked them down.
“We must have spent five or six hours on this, throughout the week,” Mr. Taylor
said. “We got to the bottom of that pain and rejection. I don’t consider it a
waste of time. But at 3:03 those buses were pulling out and you know that as
soon as the girls got home, they’d be blasting away about it on Facebook.”
Though resolving cyberwars can be slippery and time-consuming, some schools
would like students to report them at the outset, before they intensify. But
experts on adolescence note that teenagers are loath to tell adults much of
anything.
Some students think they can handle the ridicule themselves. Or are just too
embarrassed to speak up. Others fear that parents will overreact.
If the child is texting at school or has a Facebook page without permission,
“and now they’re being bullied on it,” said Parry Aftab, executive director of
WiredSafety.org, “they can’t admit it to parents. The parents will take away the
technology and the kids are afraid of that. Or the parents will underreact.
They’ll say: ‘Why read it? Just turn it off!’ ”
The most threatening impediment to coming forward can be the cyberbully’s
revenge. Graffiti on a cyberwall can’t be blacked out with a Sharpie.
Mindful of risks to students who report bullies, some school districts have
created anonymous tip sites. At Benjamin Franklin, the staff has many ways to
give students cover.
“When girls ask their friends, ‘What were you doing in the guidance counselor’s
office?’ ” Mrs. Wearley said, “I tell them, just say ‘Mrs. Wearley was fixing my
schedule.’ ”
The Legal Battles
Tony Orsini, the Ridgewood principal, learned about a devastating Facebook group
last November, two months after it started.
“I had a 45-year-old father crying in my office,” Mr. Orsini said. “He kept
asking, ‘Why would someone do this to my son?’ ”
A Facebook page had sprung up about the man’s son, who was new in town. The
comments included ethnic slurs, snickers about his sexuality and an excruciating
nickname. In short order, nearly 50 children piled on, many of them readily
identifiable. “Kids deal with meanness all the time and many can handle it,”
said Mr. Orsini, 38, a father of two children. “But it never lasts as long as it
does now, online.”
The boy could not escape the nickname. At soccer and basketball games around
town, opposing players he’d never met would hoot: “Oh, you’re that kid.”
The boy began missing school. He became ill. After weeks, he reluctantly told
his parents.
“We don’t always get to address these problems until the damage is done,” Mr.
Orsini said.
Because the comments had been made online and off-campus, Mr. Orsini believed
that his ability to intervene was limited.
Rulings in a handful of related cases around the country give mixed signals.
A few families have successfully sued schools for failing to protect their
children from bullies. But when the Beverly Vista School in Beverly Hills,
Calif., disciplined Evan S. Cohen’s eighth-grade daughter for cyberbullying, he
took on the school district.
After school one day in May 2008, Mr. Cohen’s daughter, known in court papers as
J. C., videotaped friends at a cafe, egging them on as they laughed and made
mean-spirited, sexual comments about another eighth-grade girl, C. C., calling
her “ugly,” “spoiled,” a “brat” and a “slut.”
J. C. posted the video on YouTube. The next day, the school suspended her for
two days.
“What incensed me,” said Mr. Cohen, a music industry lawyer in Los Angeles, “was
that these people were going to suspend my daughter for something that happened
outside of school.” On behalf of his daughter, he sued.
Last November, Judge Stephen V. Wilson of Federal District Court found that the
off-campus video could be linked to the school: J. C. told perhaps 10 students
about it; the humiliated C. C. and her mother showed it to school officials;
educators watched it and investigated.
But the legal test, he wrote in his 57-page decision, was whether J. C.’s video
had caused the school “substantial” disruption. Judge Wilson ruled in favor of
the young videographer, because the disruption was only minimal: administrators
dealt with the matter quietly and before lunch recess.
This legal test comes from a 1969 Supreme Court case, Tinker v. Des Moines
Independent Community School District, in which a school suspended students for
wearing black armbands to protest the Vietnam War.
The court overturned the suspension, but crafted a balance between a school’s
authority and a student’s freedom of expression. When a student’s speech
interferes substantially with the school’s educational mission, a school can
impose discipline.
The district had to pay J. C.’s costs and lawyers’ fees: $107,150.80.
Judge Wilson also threw in an aside that summarizes the conundrum that is
adolescent development, acceptable civility and school authority.
The good intentions of the school notwithstanding, he wrote, it cannot
discipline a student for speech, “simply because young persons are unpredictable
or immature, or because, in general, teenagers are emotionally fragile and may
often fight over hurtful comments.”
The lesson Mr. Cohen hopes his daughter learns from the case is about the limits
on governmental intrusion. “A girl came to school who was upset by something she
saw on the Internet,” Mr. Cohen said in a telephone interview, “and these people
had in their mind that they were going to do something about it. The school
doesn’t have that kind of power. It’s up to the parents to discipline their
child.”
He did chastise his daughter, saying, “That wasn’t a nice thing to do.”
He describes her video as “relentlessly juvenile,” but not an example of
cyberbullying, which he said he did not condone. His daughter offered to remove
it from YouTube. But Mr. Cohen keeps it posted, he said, “as a public service”
so viewers can see “what kids get suspended for in Beverly Hills.”
The J. C. decision has ignited debate. Nancy Willard, an Oregon lawyer who
consults with schools, said that the judge could have applied another, rarely
cited prong of the Tinker standard: whether the student’s hurtful speech
collided with “the rights of other students to be secure.”
The Supreme Court has not yet addressed online student speech. Lower-court
judges in some districts have sided with schools that have disciplined students
for posting threatening videos about educators from their home computers.
In two recent cases, students were suspended for posting parodies of their
principals. Each case reached the Court of Appeals for the Third Circuit. But
one three-judge panel sided with a school for disciplining a student whose site
suggested the principal was a pedophile; another panel sided with its case’s
student, whose site suggested the principal used steroids and smoked marijuana.
To resolve the contradictory rulings, both cases were re-argued earlier this
month before 14 judges on the Third Circuit, whose jurisdiction includes New
Jersey, Delaware, Pennsylvania and the United States Virgin Islands.
Nationwide, principals have responded to students who demean others online in
dramatically different ways.
In January, 28 Seattle middle school students who wrote noxious comments on
Facebook about one student received suspensions. The school also held assemblies
about digital citizenship.
But when the mother of a seventh-grade boy in Fairfax County, Va., who requested
anonymity to protect her son’s identity, sent his principal the savage e-mail
messages and Facebook jeers that six boys posted about her son, the principal
wrote back that although the material was unacceptable, “From a school
perspective this is outside the scope of our authority and not something we can
monitor or issue consequences for.”
Many principals hesitate to act because school discipline codes or state laws do
not define cyberbullying. But Bernard James, an education law scholar at
Pepperdine University, said that administrators interpreted statutes too
narrowly:
“Educators are empowered to maintain safe schools,” Professor James said. “The
timidity of educators in this context of emerging technology is working to the
advantage of bullies.”
Whether suspension is appropriate is also under discussion. Elizabeth Englander,
a psychology professor at Bridgewater State College in Massachusetts and founder
of the Massachusetts Aggression Reduction Center, believes that automatic
discipline for cyberbullies is wrong-headed.
“We tend to think that if there’s no discipline, there’s no reaction,” she said.
“But discipline should never be the only thing we consider in these cases. There
are many things we can do with children first to guide and teach them about
behavior and expectations.”
Tony Orsini wanted to help his middle school student who was being teased
mercilessly on Facebook. But he believed he had to catch the bullies at school.
He alerted teachers. At lunch, they spotted the three ringleaders as they forced
the boy from their table.
“I called them into my office,” Mr. Orsini said, “and talked to them strongly
about the lunchroom incident. Then I lied. I said I heard that the cops were
looking at a Facebook group they had posted.
“It came down the next day.”
He rubbed his face in his hands. “All we are doing is reacting,” he said. “We
can’t seem to get ahead of the curve.”
Gathering Evidence
Administrators who investigate students tangled in online disputes often resort
to a deft juggle of artfulness, technology and law.
First challenge: getting students to come clean.
Mr. Wu, the assistant principal at Benjamin Franklin, is a former household
handyman and English teacher with a fondness for scraps, gadgets and
imagination. Hence his lie detector:
It’s really an ancient tuner, connected to a helmet labeled “The
Anti-Prevaricator” — the inner webbing from a football helmet refurbished by Mr.
Wu, who glued on bells and a keypad from an old telephone.
When students balk or obfuscate, Mr. Wu may suggest they don the
Anti-Prevaricator. They answer questions; sparks flash from the tuner.
When sixth graders realize the joke, Mr. Wu said, “they start laughing with
relief and we talk about the importance of telling the truth.”
He continues his cyberinvestigations the old-fashioned way, with conversations,
confrontations, cajoling and copious handwritten notes.
But the second challenge is gathering the evidence itself: looking at material
typed on personal cellphones or online accounts.
School officials have both greater and lesser investigative authority than the
police have over students. Certainly they cannot use lie detectors. But though
police officers need probable cause and a warrant to search a student’s locker
or backpack, school administrators need only “reasonable suspicion” that a
school rule has been violated.
The police also need probable cause and a warrant to search social networking
sites and cellphones. School officials are uncertain what they need.
“I can’t look into Facebook accounts,” said Jeff Taylor, the middle school
principal from West Allis, Wis. If students or parents want him to see something
online, “they have to show it to me or bring me a printout.”
But Deb Socia, the principal at Lilla G. Frederick Pilot Middle School in
Dorchester, Mass., takes a no-nonsense approach. The school gives each student a
laptop to work on. But the students’ expectation of privacy is greatly
diminished.
“I regularly scan every computer in the building,” Ms. Socia said. “They know
I’m watching. They’re using the cameras on their laptops to check their hair and
I send them a message and say: ‘You look great! Now go back to work.’ It’s a
powerful way to teach kids: ‘I’m paying attention, you need to do what’s right.’
”
Administrators are skittish about searching cellphones because of the increase
in sexting, in which students have sent compromising photos of themselves.
Principals fear being caught up in child pornography investigations. In these
situations, they generally turn over cellphones to the police.
“The question of searching a cellphone is a gray area,” said Mary Ann McAdam, an
assistant principal at Governor Livingston High School in Berkeley Heights, N.J.
“We only do it when a student says, ‘so-and-so sent threatening messages.’ Even
then, they look through their phones and find it for us. If I felt there might
be something on a cellphone, I’d invite parents to go through it with me.”
Legal experts disagree on this issue. Professor James argues that cellphones are
like backpacks: if the search’s purpose is reasonably related to a school
infraction, like cheating, the principal’s search is legal. Others believe that
cellphones belong in another category, protected by electronic communication
privacy laws.
While a cellphone search may yield an incriminating text, it may not point to
the author.
Last year, an eighth-grade girl at Benjamin Franklin vowed on Facebook that her
boyfriend would beat up another eighth grader, a girl she had been bullying
throughout middle school. Mr. Orsini called the police.
Mr. Orsini ordered the girls to have no contact at school. Nonetheless, the
bullied girl received veiled texted threats at school, sent from a phone owned
by a friend of the bully.
“Everyone knows who did it,” said Mr. Orsini, looking miserable. “But I couldn’t
prove who really sent them. So I had to punish the girl whose phone was used.
The bully was a masterful manipulator. Her friend took the hit for her.”
By now, the targeted girl had become more self-confident. She was furious that
the bully escaped punishment. When the bully began picking on a second, weaker
girl, she grew further incensed.
One bristling morning, the two girls came to blows, which the bully sorely came
to regret. Although teachers quickly broke up the fight, word of the outcome
spread more swiftly:
“All the kids chanted the victim’s name,” Mr. Orsini said, “in triumph in the
lunchroom.”
The Cybersages
What a difference a few years can make in the life of a tween.
Earlier this month, a proud posse of Benjamin Franklin eighth-grade girls strode
into homerooms of sixth graders: inches taller than the 12-year-olds, skin
calmer, they radiated a commanding exuberance as they tossed their long, glossy
manes. They wanted to offer advice about social networking sites and
cyberbullying.
“How many of you have discussed Mr. Orsini’s letter with your parents?” asked
Annie Thurston, one of the eighth graders, referring to his admonitions about
online activity.
Slumped in their desks, at least a dozen students in one class glumly hoisted
their hands.
In April, a parent alerted Mr. Orsini about Formspring, a site on which comments
can be sent anonymously to mailboxes, and posted at the mailbox owner’s
discretion. Many adults seem confounded at why girls, in particular, would
choose to post the leering, scabrous queries; some teenagers say they do so in
order to toss back hard-shelled, tough-girl retorts.
The principal found the names of some Benjamin Franklin students on Formspring.
As Mr. Orsini later recounted the experience, he couldn’t bring himself to utter
even a sanitized version of the obscene posts he had read. His face reddened,
tears filling his eyes.
“How does a 13-year-old girl recover her sexual self-esteem after reading that
garbage?” he whispered.
It prompted his e-mail message to parents, in which he wrote that no middle
school student needed to be on social networking sites. Many parents agreed. But
others said that schools and families should work harder to teach students
digital responsibility.
These eighth-grade girls thought Mr. Orsini was right: younger students
shouldn’t be on Facebook.
They grilled the sixth graders, almost all of whom said they had cellphones.
Do your parents read your texts, they asked.
Only a smattering of palms.
“My mom keeps threatening to get software so she can monitor them,” one boy
said, shrugging his shoulders. “But she never gets around to it.”
What impact did Mr. Orsini’s letter have?
“I lied to my parents,” another boy said. “I told them I deactivated my Facebook
page. But in two days, I started it again.”
The girls looked solemn.
“If you’re under 13, you shouldn’t even be on Facebook,” said Maeve Cannon, 14.
“We think you guys can handle it but you’re still really young. It’s not that
necessary, you know. We just want you to be safe.”
The sixth graders were rapt.
“The Internet is a scary place,” said Sabrina Spatz, an eighth grader. “It can
really hurt you. Our parents didn’t grow up with it so they don’t really
understand it that well.”
So if any of the sixth graders were cyberbullied, the older girls said, “Just
come talk to us.”
Then they hesitated. They were, after all, about to graduate.
“You can tell Mr. Wu, he’s awesome!” said Maeve, bubbling over. “Tell your
guidance counselor or a teacher.” The other girls nodded eagerly.
“Yeah, go to the school,” Emily Cerrina chimed in.
“The school will make it stop,” she said, “immediately!”
Online Bullies Pull
Schools Into the Fray, NYT, 27.6.2010,
http://www.nytimes.com/2010/06/28/style/28bully.html
When Online Grievances Are Met With a Lawsuit
May 31, 2010
The New York Times
By DAN FROSCH
After a towing company hauled Justin Kurtz’s car from his apartment complex
parking lot, despite his permit to park there, Mr. Kurtz, 21, a college student
in Kalamazoo, Mich., went to the Internet for revenge.
Outraged at having to pay $118 to get his car back, Mr. Kurtz created a Facebook
page called “Kalamazoo Residents against T&J Towing.” Within two days, 800
people had joined the group, some posting comments about their own maddening
experiences with the towing company.
T&J filed a defamation suit against Mr. Kurtz, claiming the site was hurting
business and seeking $750,000 in damages.
Web sites like Facebook, Twitter and Yelp have given individuals a global
platform on which to air their grievances with companies. But legal experts say
the soaring popularity of such sites has also given rise to more cases like Mr.
Kurtz’s, in which a business sues an individual for posting critical comments
online.
The towing company’s lawyer said it was justified in towing Mr. Kurtz’s car
because the permit was not visible, and that the Facebook page is costing them
business and had unfairly damaged the company’s reputation.
Some first amendment lawyers see the case differently. They consider the lawsuit
an example of the latest incarnation of a decades-old legal maneuver known as a
strategic lawsuit against public participation, or Slapp.
The label has traditionally referred to meritless defamation suits filed by
businesses or government officials against citizens who speak out against them.
The plaintiffs are not necessarily expecting to succeed — most do not — but
rather to intimidate critics who are inclined to back down when confronted with
the prospect of a long, expensive court battle.
“I didn’t do anything wrong,” said Mr. Kurtz, who recently finished his junior
year at Western Michigan University. “The only thing I posted is what happened
to me.”
Many states have anti-Slapp laws, and Congress is considering legislation to
make it harder to file a Slapp. The bill, sponsored by Representatives Steve
Cohen, Democrat of Tennessee, and Charles Gonzalez, Democrat of Texas, would
create a federal anti-Slapp law, modeled largely on California’s statute.
Because state laws vary in scope, many suits are still filed every year,
according to legal experts. Now, with people musing publicly online and
businesses feeling defenseless against these critics, the debate over Slapps is
shifting to the Web.
“We are beyond the low-tech era of people getting Slapped because of letters
they wrote to politicians or testimony they gave at a city council meeting,”
said George W. Pring, a University of Denver law professor who co-wrote the 1996
book, “Slapps: Getting Sued For Speaking Out.”
Marc Randazza, a first amendment lawyer who has defended clients against Slapps
stemming from online comments, said he helped one client avoid a lawsuit last
year after the client, Thomas Alascio, posted negative remarks about a Florida
car dealership on his Twitter account.
“There is not a worse dealership on the planet,” read one tweet, which also
named the dealership.
The dealership threatened to sue Mr. Alascio if he did not remove the tweets.
Mr. Randazza responded in a letter that while Mr. Alascio admitted the
dealership might not be the worst in the world, his comments constituted
protected speech because they were his opinion.
While the dealership did not sue, that outcome is unusual, said Mr. Randazza,
who conceded that sometimes the most pragmatic approach for a Slapp defendant is
to take back the offending comments in lieu of a lawsuit.
In the past, Mr. Randazza said, if you criticized a business while standing
around in a bar, it went “no further than the sound of your voice.”
Do that now, however, and “there’s a potentially permanent record of it as soon
as you hit ‘publish’ on the computer,” he said. “It goes global within minutes.”
Laurence Wilson, general counsel for the user review site Yelp, said a handful
of lawsuits in recent years had been filed against people who posted critical
reviews on the site, including a San Francisco chiropractor who sued a former
patient in 2008 over a negative review about a billing dispute. The suit was
settled before going to court.
“Businesses, unfortunately, have a greater incentive to remove a negative review
than the reviewer has in writing the review in the first place,” Mr. Wilson
said.
Recognizing that lawsuits can bring more unwanted attention, one organization
has taken a different tack. The group Medical Justice, which helps protect
doctors from meritless malpractice suits, advises its members to have patients
sign an agreement that gives the doctor copyright over a Web posting if the
patient mentions the doctor or practice.
Dr. Jeffrey Segal, chief executive of Medical Justice, said about half of the
group’s 2,500 members use the agreement.
“I, like everyone else, like to hear two sides of the story,” he said. “The
problem is that physicians are foreclosed from ever responding because of state
and federal privacy laws. In the rare circumstance that a posting is false,
fictional or fraudulent, the doctor now has the tool to get that post taken
down.”
The federal bill, in the House Subcommittee on Courts and Competition Policy,
would enable a defendant who believes he is being sued for speaking out or
petitioning on a public matter to seek to have the lawsuit dismissed.
“Just as petition and free speech rights are so important that they require
specific constitutional protections, they are also important enough to justify
uniform national protections against Slapps,” said Mark Goldowitz, director of
the California Anti-Slapp Project, which helped draft the bill.
Under the proposed federal law, if a case is dismissed for being a Slapp, the
plaintiff would have to pay the defendant’s legal fees. Mr. Randazza would not
disclose specifics on the legal fees he has charged his clients, but he said the
cost of defending a single Slapp suit “could easily wipe out the average
person’s savings before the case is half done.”
Currently, 27 states have anti-Slapp laws, and in two — Colorado and West
Virginia — the judiciary has adopted a system to protect against such suits. But
the federal legislation would both create a law in states that do not have one
and offer additional protections in those that already do, Mr. Goldowitz said.
In Michigan, which does not have an anti-Slapp measure, Mr. Kurtz’s legal battle
has made him a local celebrity. His Facebook page has now grown to more than
12,000 members.
“This case raises interesting questions,” the towing company’s lawyer, Richard
Burnham, said. “What are the rights to free speech? And even if what he said is
false, which I am convinced, is his conduct the proximate cause of our loss?”
On April 30, Mr. Kurtz and his lawyers asked a judge in Kalamazoo to dismiss the
suit by T&J, which has received a failing grade from the local better business
bureau for complaints over towing legally parked cars. Mr. Kurtz is also
countersuing, claiming that T&J is abusing the legal process.
“There’s no reason I should have to shut up because some guy doesn’t want his
dirty laundry out,” Mr. Kurtz said. “It’s the power of the Internet, man.”
When Online Grievances
Are Met With a Lawsuit, NYT, 31.5.2010,
http://www.nytimes.com/2010/06/01/us/01slapp.html
The Doctor Will See You Now. Please Log On
May 28, 2010
The New York Times
By MILT FREUDENHEIM
ONE day last summer, Charlie Martin felt a sharp pain in his lower back. But
he couldn’t jump into his car and rush to the doctor’s office or the emergency
room: Mr. Martin, a crane operator, was working on an oil rig in the South China
Sea off Malaysia.
He could, though, get in touch with a doctor thousands of miles away, via
two-way video. Using an electronic stethoscope that a paramedic on the rig held
in place, Dr. Oscar W. Boultinghouse, an emergency medicine physician in
Houston, listened to Mr. Martin’s heart.
“The extreme pain strongly suggested a kidney stone,” Dr. Boultinghouse said
later. A urinalysis on the rig confirmed the diagnosis, and Mr. Martin flew to
his home in Mississippi for treatment.
Mr. Martin, 32, is now back at work on the same rig, the Courageous, leased by
Shell Oil. He says he is grateful he could discuss his pain by video with the
doctor. “It’s a lot better than trying to describe it on a phone,” Mr. Martin
says.
Dr. Boultinghouse and two colleagues — Michael J. Davis and Glenn G. Hammack—
run NuPhysicia, a start-up company they spun out from the University of Texas in
2007 that specializes in face-to-face telemedicine, connecting doctors and
patients by two-way video.
Spurred by health care trends and technological advances, telemedicine is
growing into a mainstream industry. A fifth of Americans live in places where
primary care physicians are scarce, according to government statistics. That
need is converging with advances that include lower costs for video-conferencing
equipment, more high-speed communications links by satellite, and greater
ability to work securely and dependably over the Internet.
“The technology has improved to the point where the experience of both the
doctor and patient are close to the same as in-person visits, and in some cases
better,” says Dr. Kaveh Safavi, head of global health care for Cisco Systems,
which is supporting trials of its own high-definition video version of
telemedicine in California, Colorado and New Mexico.
The interactive telemedicine business has been growing by almost 10 percent
annually, to more than $500 million in revenue in North America this year,
according to Datamonitor, the market research firm. It is part of the $3.9
billion telemedicine category that includes monitoring devices in homes and
hundreds of health care applications for smartphones.
Christine Chang, a health care technology analyst at Datamonitor’s Ovum unit,
says telemedicine will allow doctors to take better care of larger numbers of
patients. “Some patients will be seen by teleconferencing, some will send
questions by e-mail, others will be monitored” using digitized data on symptoms
or indicators like glucose levels, she says.
Eventually, she predicts, “one patient a day might come into a doctor’s office,
in person.”
Although telemedicine has been around for years, it is gaining traction as never
before. Medicare, Medicaid and other government health programs have been
reimbursing doctors and hospitals that provide care remotely to rural and
underserved areas. Now a growing number of big insurance companies, like the
UnitedHealth Group and several Blue Cross plans, are starting to market
interactive video to large employers. The new federal health care law provides
$1 billion a year to study telemedicine and other innovations.
With the expansion of reimbursement, Americans are on the brink of “a gold rush
of new investment in telemedicine,” says Dr. Bernard A. Harris Jr., managing
partner at Vesalius Ventures, a venture capital firm based in Houston. He has
worked on telemedicine projects since he helped build medical systems for NASA
during his days as an astronaut in the 1990s.
Face-to-face telemedicine technology can be as elaborate as a high-definition
video system, like Cisco’s, that can cost up to hundreds of thousands of
dollars. Or it can be as simple as the Webcams available on many laptops.
NuPhysicia uses equipment in the middle of that range — standard
videoconferencing hookups made by Polycom, a video conferencing company based in
Pleasanton, Calif. Analysts say the setup may cost $30,000 to $45,000 at the
patient’s end — with a suitcase or cart containing scopes and other special
equipment — plus a setup for the doctor that costs far less.
Telemedicine has its skeptics. State regulators at the Texas Medical Board have
raised concerns that doctors might miss an opportunity to pick up subtle medical
indicators when they cannot touch a patient. And while it does not oppose
telemedicine, the American Academy of Family Physicians says patients should
keep in contact with a primary physician who can keep tabs on their health
needs, whether in the virtual or the real world.
“Telemedicine can improve access to care in remote sites and rural areas,” says
Dr. Lori J. Heim, the academy’s president. “But not all visits will take place
between a patient and their primary-care doctor.”
Dr. Boultinghouse dismisses such concerns. “In today’s world, the physical exam
plays less and less of a role,” he says. “We live in the age of imaging.”
ON the rig Courageous, Mr. Martin is part of a crew of 100. Travis G. Fitts Jr.,
vice president for human resources, health, safety and environment at Scorpion
Offshore, which owns the rig, says that examining a worker via two-way video can
be far cheaper in a remote location than flying him to a hospital by helicopter
at $10,000 a trip.
Some rigs have saved $500,000 or more a year, according to NuPhysicia, which has
contracts with 19 oil rigs around the world, including one off Iraq. Dr.
Boultinghouse says the Deepwater Horizon drilling disaster in the Gulf of Mexico
may slow or block new drilling in United States waters, driving the rigs to more
remote locations and adding to demand for telemedicine.
NuPhysicia also offers video medical services to land-based employers with 500
or more workers at a site. The camera connection is an alternative to an
employer’s on-site clinics, typically staffed by a nurse or a physician
assistant.
Mustang Cat, a Houston-based distributor that sells and services Caterpillar
tractors and other earth-moving equipment, signed on with NuPhysicia last year.
“We’ve seen the benefit, ” says Kurt Hanson, general counsel at Mustang, a
family-owned company. Instead of taking a half-day or more off to consult a
doctor, workers can get medical advice on the company’s premises.
NuPhysicia’s business grew out of work that its founders did for the state of
Texas. Mr. Hammack, NuPhysicia’s president, is a former assistant vice president
of the University of Texas Medical Branch at Galveston, where he led development
of the state’s pioneering telemedicine program in state prisons from the
mid-1990s to 2007. Dr. Davis is a cardiologist.
Working with Dr. Boultinghouse, Dr. Davis and other university doctors conducted
more than 600,000 video visits with inmates. Significant improvement was seen in
inmates’ health, including measures of blood pressure and cholesterol, according
to a 2004 report on the system in the Journal of the American Medical
Association.
In March, California officials released a report they had ordered from
NuPhysicia with a plan for making over their state’s prison health care. The
makeover would build on the Texas example by expanding existing telemedicine and
electronic medical record systems and putting the University of California in
charge.
California spends more than $40 a day per inmate for health care, including
expenses for guards who accompany them on visits to outside doctors. NuPhysicia
says that this cost is more than four times the rate in Texas and Georgia, and
almost triple that of New Jersey, where telemedicine is used for mental health
care and some medical specialties.
“Telemedicine makes total sense in prisons,” says Christopher Kosseff, a senior
vice president and head of correctional health care at the University of
Medicine and Dentistry of New Jersey. “It’s a wonderful way of providing ready
access to specialty health care while maintaining public safety.”
Georgia state prisons save an average of $500 in transportation costs and
officers’ pay each time a prisoner can be treated by telemedicine, says Dr.
Edward Bailey, medical director of Georgia correctional health care.
With data supplied by the California Department of Corrections and
Rehabilitation, which commissioned the report, NuPhysicia says the
recommendations could save the state $1.2 billion a year in prisoners’ health
care costs.
Gov. Arnold Schwarzenegger wants the university regents and the State
Legislature to approve the prison health makeover. After lawsuits on behalf of
inmates, federal courts appointed a receiver in 2006 to run prison medical
services. (The state now runs dental and mental health services, with court
monitoring.) Officials hope that by putting university doctors in charge of
prison health, they can persuade the courts to return control to the state.
“We’re going to use the best technology in the world to solve one of our worst
problems — the key is telemedicine,” the governor said.
WITHOUT the blessing of insurers, telemedicine could never gain traction in the
broader population. But many of the nation’s biggest insurers are showing
growing interest in reimbursing doctors for face-to-face video consulting.
Starting in June, the UnitedHealth Group plans to reimburse doctors at Centura
Health, a Colorado hospital system, for using Cisco advanced video to serve
UnitedHealth’s members at several clinics. And the insurer plans a national
rollout of telemedicine programs, including video-equipped booths in retail
clinics in pharmacies and big-box stores, as well as in clinics at large
companies.
“The tide is turning on reimbursement,” says Dr. James Woodburn, vice president
and medical director for telehealth at UnitedHealth.
Both UnitedHealth and WellPoint, which owns 14 Blue Cross plans, are trying
lower-cost Internet Webcam technology, available on many off-the-shelf laptops,
as well as advanced video.
UnitedHealth and Blue Cross plans in Hawaii, Minnesota and western New York are
using a Webcam service provided by American Well, a company based in Boston. And
large self-insured employers like Delta Air Lines and Medtronic, a Blue Cross
Blue Shield customer in Minneapolis, are beginning to sign up.
Delta will offer Webcam consultations with UnitedHealth’s doctor network to more
than 10,000 Minnesota plan members on July 1, says Lynn Zonakis, Delta’s
managing director of health strategy and resources. Within 18 months, Webcam
access will be offered nationally to more than 100,000 Delta plan members.
Dr. Roy Schoenberg, C.E.O. of American Well, says his Webcam service is “in a
completely different domain” than Cisco’s or Polycom’s. “Over the last two
years, we are beginning to see a side branch of telemedicine that some call
online care,” he says. “It connects doctors with patients at home or in their
workplace.”
Doctors “are not going to pay hundreds of thousands of dollars for equipment, so
we have to rely on lower tech,” he adds. The medical records are stored on
secure Web servers behind multiple firewalls, and the servers are audited twice
a year by I.B.M. and other outside computer security companies, Dr. Schoenberg
says.
In Hawaii, more than 2,000 Blue Cross plan members used Webcams to consult
doctors last year, says Laura Lott, a spokeswoman for the Hawaii Medical Service
Association. Minnesota Blue Cross and Blue Shield started a similar Webcam
service across the state last November.
Doctors who use the higher-tech video conferencing technology say that Webcam
images are less clear, and that Webcams cannot accommodate electronic scopes or
provide the zoom-in features available in video conferencing. “If they are not
using commercial-grade video conferencing gear, the quality will be much lower,”
says Vanessa L. McLaughlin, a telemedicine consultant in Vancouver, Wash.
Last month, Charlie Martin, the crane operator, was back in the infirmary of the
Courageous for an eye checkup. In Houston, his face filled the big screen in
NuPhysicia’s office.
After an exchange of greetings, Chris Derrick, the paramedic on the oil rig,
attached an ophthalmological scanner to a scope, pointed it at Mr. Martin’s eye,
and zoomed in.
“Freeze that,” Dr. Boultinghouse ordered, as a close-up of the eye loomed on the
screen. “His eyes have been bothering him. It may be from the wind up there on
the crane.”
The Doctor Will See You
Now. Please Log On, NYT, 29.5.2010,
http://www.nytimes.com/2010/05/30/business/30telemed.html
U.S. Approves Google’s Deal for AdMob
May 21, 2010
The New York Times
By BRAD STONE
SAN FRANCISCO — After an intensive six-month review, Google won approval from
the Federal Trade Commission on Friday for its $750 million acquisition of the
mobile advertising company AdMob.
As recently as last month, F.T.C. workers appeared ready to urge the agency’s
five commissioners to challenge Google’s purchase of AdMob in court, on the
basis that it would give Google an unassailable position in the nascent market
for ads that appear on mobile phones.
But the commissioners voted 5 to 0 to approve the deal, concluding in a
statement that the merger was “unlikely to harm competition in the emerging
market for mobile advertising networks.”
The surprising endorsement stems from recent developments in the online
advertising market. Last December, Apple acquired Quattro Wireless, an AdMob
rival. Then last month, Apple announced its own mobile advertising network,
called iAd, which will allow large advertisers to run multimedia ads within
applications running on the iPhone.
The F.T.C. said in a news release that the combination of Google and AdMob
raised “serious antitrust issues,” but those concerns “ultimately were
overshadowed by recent developments in the market, most notably a move by Apple
Computer Inc.”
Google responded to the decision in a post on its corporate blog. “As mobile
phone usage increases, growth in mobile advertising is only going to
accelerate,” wrote Susan Wojcicki, Google’s vice president for product
management. “This benefits mobile developers and publishers who will get better
advertising solutions, marketers who will find new ways to reach consumers and
users who will get better ads and more free content.”
Complicating the F.T.C.’s review of the purchase, several developers of
applications for cellphones who were interviewed by the commission publicly
detailed those conversations on their own blogs, saying they had told the
commission that there were no good reasons to block the purchase.
The F.T.C. staff was “very reluctant to accept my argument that Apple/Quattro
was a bigger threat for an iPhone developer like us,” wrote an executive at Naan
Studio, which makes Twitter applications for phones, in one such blog account.
“One of the staff told me it was irrelevant, and curtailed the discussion.”
Google would have probably submitted such statements to the court as evidence
that developers did not believe they would be harmed by the deal.
Not everyone was pleased with the F.T.C.’s decision. Google rivals like
Microsoft and AT&T had opposed the deal, and some developers said it would
deprive them of options and raise prices for mobile ads.
“This will hurt me,” said Simon Buckingham, chief executive of Mobile Streams, a
provider of applications and musical content for cellphones. “It’s going to get
incredibly more expensive, I would think, because the No. 1 and No. 2 players
aren’t competing against each other anymore, and the No. 3 player, Quattro
Wireless, is focused on launching iAds.”
David Balto, a senior fellow at the Center for American Progress, a research
organization, and a former antitrust lawyer at the F.T.C., said the agency was
hampered by the lack of history in the mobile market.
“The market simply did not exist in a significant fashion a year or so ago.
Thus, the past could not testify as to the future harm of the merger,” Mr. Balto
said. “More importantly, the rapid pace of change in the market undermined any
coherent story by the F.T.C.”
According to people familiar with the government’s legal strategy, the agency
was prepared to use Section 7 of the Clayton Antitrust Act, which gives the
government discretion to block mergers “where the effect may substantially
lessen competition,” even if the market in question is new.
But that would have been a tough case to bring, said David B. Yoffie, a
professor of international business administration at the Harvard Business
School.
“Although Google may have a dominant position in Internet search advertising,
the mobile ad market is still fragmented, embryonic and potentially vulnerable
to another company, Apple, dominating the competition,” Mr. Yoffie said.
“Ironically, Google might make this market more competitive.”
The decision improves Google’s mixed overall record in Washington. The F.T.C.
approved its acquisition of the ad company DoubleClick in 2007, after a long
review, while a threatened lawsuit from the Justice Department in 2008 forced
Google to walk away from an online advertising partnership with rival Yahoo.
The Justice Department has also twice expressed opposition to Google’s
settlement with book authors and publishers over its unauthorized scanning of
library books. A federal judge is reviewing revisions to the settlement and is
expected to issue a decision soon.
Antitrust regulators “are looking hard at Google,” said Jeffrey I. Shinder,
managing partner at the law firm Constantine Cannon, who compared the scrutiny
of Google to the attention focused on Microsoft in the 1990s.
“But at the end of the day, Google has not done anything that is so blatant as
to set forth a strong antitrust claim, even though there are antitrust issues
all over the place,” Mr. Shinder said.
Google announced its intent to acquire AdMob last November, plucking the
start-up from the grip of Apple, which was also negotiating to buy it. Apple
then turned its attention to Quattro.
U.S. Approves Google’s
Deal for AdMob, NYT, 21.5.2010,
http://www.nytimes.com/2010/05/22/technology/22admob.html
At YouTube, Adolescence Begins at 5
May 16, 2010
The New York Times
By BRAD STONE
SAN FRANCISCO — Early this year, the most popular YouTube video of all time —
a 2007 clip of a British toddler gleefully biting the finger of his older
brother — was supplanted by a brash newcomer.
The upstart was Lady Gaga’s slithering, sci-fi-themed music video for her hit
single “Bad Romance.”
The shift was symbolic: YouTube, a subsidiary of the search giant Google, is
growing up. Once known primarily for skateboard-riding cats, dancing geeks and a
variety of cute-baby high jinks, YouTube now features a smorgasbord of more
professional video that is drawing ever larger and more engaged audiences.
“Our biggest challenge is making sure we don’t taste too many things,” Chad
Hurley, YouTube’s low-profile and low-key co-founder and chief executive, said
in a wide-ranging interview last week.
That cornucopia of content appears to be turning YouTube — considered by many to
be a risky investment when it was bought for $1.65 billion at the end of 2006 —
into one of Google’s smartest acquisitions. On Monday, YouTube will celebrate
its fifth birthday by announcing it has passed two billion video views a day;
YouTube said it reached the one billion mark in October.
Bolstering YouTube’s growing audience is the popularity of live broadcasts, like
the recent Indian Premier League cricket matches, and the integration of
instructional videos directly into Google search results.
YouTube also holds a large catalog of music videos that contain advertisements,
thanks to Google’s partnership with three of the four major American music
labels in an effort called Vevo.
Mr. Hurley, 33, said YouTube was increasingly focused on showing users what
their friends had watched, as a way of helping people navigate the tens of
thousands of hours of video uploaded to the site every day. He also contended
that more rights-holders were quietly allowing fans to appropriate short
snippets of their content for mash-ups and parodies, “though a lot of them might
not come out and say it for business reasons.”
Mr. Hurley declined to discuss YouTube’s financial performance, though he cited
overall improvement.
Google executives said in January that the site, which has perennially lost
money, had increased its revenue, and that ad space on YouTube’s home pages for
20 countries was sold out every day toward the end of 2009. Many analysts say
YouTube could break even this year for the first time, after five years of large
losses generated by its high bandwidth and storage costs.
YouTube has faced a fight in another regard as well: it has so far failed to
persuade major American film studios and television networks to view it as an
outlet for anything other than promotional snippets of long-form programming.
In January, YouTube introduced a movie rental store, though its only offerings
are from independent film companies and Bollywood studios.
James L. McQuivey, an analyst at Forrester Research, said YouTube’s Vevo
partnership with music labels “shows what YouTube can accomplish when it works
with the media industry. It’s really one of the first legitimizations of YouTube
as a commercial platform.”
Mr. Hurley indicated that convincing media companies to embrace YouTube was no
longer an important goal, adding that chasing Hulu.com, the joint venture of
Fox, NBC and ABC, “may have been a distraction for us.”
Hulu is “starting to have some troubles in terms of their long-term model and
relationship with their owners,” Mr. Hurley said, referring to the increasing
unease among broadcasters with the practice of streaming programming free on the
Web, where ad rates are significantly lower than they are on television.
One possibility is that YouTube would start scouring the rest of the Internet
for video, Mr. Hurley said, “indexing more video wherever it may live” and then
pointing users to it, even if the video did not reside on YouTube’s servers.
YouTube already has the second most popular search engine in the world,
according to comScore. (Second, naturally, to Google.)
One factor driving YouTube’s growth is the ever-easier availability of the
Internet on the living room television through devices like TiVo and Roku
set-top boxes.
Google is planning to back that trend in a big way at its annual I/O developers’
conference this week in San Francisco. The company plans to introduce Google TV,
a software platform for the television that it is developing with Sony, Intel
and Logitech, according to people briefed on its plans who were not authorized
to talk about them publicly.
YouTube is expected to play a prominent role in bringing a variety of video to
the Google TV platform, and Mr. Hurley contended that the rise of Web video on
the television was inevitable.
“I don’t think there’s going to be much of a difference between a phone, a
computer and a television. It’s going to be size and presentation,” he said.
Although he might not have gotten the memo about the Google TV efforts, since he
added, “Maybe we just have to wait until Apple releases a bigger iPhone that you
can strap onto the wall,” he said.
Finally, Mr. Hurley tipped his entrepreneurial hat to a chaotic, controversial
and suddenly popular site that resembles the YouTube of five years ago:
ChatRoulette. The site, created by an 18-year-old from Moscow, Andrey
Ternovskiy, allows people around the world to engage in random, instantaneous
one-on-one conversations.
ChatRoulette “demonstrates that there is still so much more that can be
unleashed with video online,” Mr. Hurley said, adding that Mr. Ternovskiy, whom
he said he would like to meet, “has the spotlight and the opportunity to do
great things.”
At YouTube, Adolescence
Begins at 5, NYT, 16.5.2010,
http://www.nytimes.com/2010/05/17/technology/17youtube.html
Online Talk, Suicides and a Thorny Court Case
May 13, 2010
The New York Times
By MONICA DAVEY
The seemingly empathetic nurse struck up conversations over the Internet with
people who were pondering suicide. She told them what methods worked best. She
told some that it was all right to let go, that they would be better in heaven,
and entered into suicide pacts with others.
But the police say the nurse, who sometimes called herself Cami and described
herself as a young woman, was actually William F. Melchert-Dinkel, a 47-year-old
husband and father from Faribault, Minn., who now stands charged with two counts
of aiding suicide.
Mr. Melchert-Dinkel, whose lawyer declined an interview request on his behalf,
told investigators that his interest in “death and suicide could be considered
an obsession,” court documents say, and that he sought the “thrill of the
chase.” While the charges stem from two deaths — one in Britain in 2005 and one
in Canada in 2008 — Mr. Melchert-Dinkel, who was indeed a licensed practical
nurse, told investigators that he had most likely encouraged dozens of people to
kill themselves, court documents said. He said he could not be sure how many had
succeeded.
The case, chilling and ghoulish, raises thorny issues in the Internet age, both
legal and otherwise. For instance, many states have laws barring assisting
suicide, but rarely have cases involved people not in the same room (much less
the same country) or the sharing of only words (not guns or pills).
The case also brings up questions about the limits of speech on the Internet:
How does one assign levels of culpability to someone who shares thoughts with
people who say they are already considering suicide? And for some who counsel
against suicide, it points to a growing area for worry, an online world where
the most isolated and vulnerable might be touched in a way that they would not
have in the past.
Groups that work to prevent suicide compare suicide chat rooms to “pro-ana”
sites, Internet sites that portray anorexia as a lifestyle as opposed to a
disease. Anti-suicide advocates say that there has been more than one instance
recently where a person killed himself on a Webcam as others watched. Papyrus, a
charity in Britain that works to stop young people from killing themselves, says
it has tracked 39 cases in that country alone where young people committed
suicide after visits to “pro-suicide” chat rooms.
It was the untrained, unpaid Internet sleuthing by Celia Blay, a 65-year-old
from a tiny community in Britain, that helped lead to charges in April against
Mr. Melchert-Dinkel. “He was practically invisible,” she said. “I tried to talk
to any police I could, and most of them would have nothing to do with it. The
first one I talked to told me, ‘If it bothers you, look the other way.’ And that
really bothered me, because by then I was pretty sure people had died.”
About four years ago, Ms. Blay, who describes herself as a “computer
illiterate,” became friends online with a young, depressed woman who had entered
into a suicide pact. Ms. Blay persuaded her not to proceed, but the incident
sent Ms. Blay searching for the other member of the pact. It was someone who
called herself Li Dao, another screen name that the police later said Mr.
Melchert-Dinkel used.
Making inquiries on a Web site aimed at people talking about suicide, Ms. Blay
said she found at least half a dozen people who had similar pacts with Li Dao, a
name that popped up on all sorts of suicide Web sites. She and a friend
uncovered Mr. Melchert-Dinkel’s name and e-mail address after setting up a sting
in which her friend posed as someone preparing for suicide and was, she said,
approached by Mr. Melchert-Dinkel.
By then, the police in Minnesota say, Mr. Melchert-Dinkel had already aided the
suicide of Mark Drybrough, 32, of Coventry, England. A coroner’s report found
that Mr. Drybrough, who was suffering from a psychiatric illness, hanged himself
from a ladder in his home in July 2005. His computer showed that he had posted a
question in a suicide chat room about how to hang oneself without access to
something high to tie a rope to, and that Li Dao — Mr. Melchert-Dinkel, the
police say — had offered details on how to use a door.
In March 2008, Nadia Kajouji, 18, disappeared from her college in Ottawa. The
Canadian authorities investigating her disappearance searched her laptop and
discovered that she had been talking online with a person who used the screen
name Cami. In e-mail messages, the authorities say, the pair agreed to a pact in
which Ms. Kajouji would jump from a bridge into a river (to avoid, at Cami’s
suggestion, the police say, creating a mess) and Cami would hang herself a day
later. In April 2008, Ms. Kajouji’s body was found in the Rideau River.
Around the same time, Ms. Blay contacted the St. Paul Police Department through
an acquaintance in Minnesota. By then, she said, she had grown frustrated with
what she described as the authorities’ unwillingness to study the huge file she
had amassed with the stories of 20 to 30 people who had been approached online.
Over time, she said, she had tried to tell the story to a police department near
her home, a member of parliament and even law enforcement in the United States.
Since at least the 1970s, many states have barred assisted suicide, though
criminal charges are rarely filed. Physician-assisted suicide is allowed under
certain conditions in Oregon and Washington.
In Minnesota, 12 charges of aiding suicide have been brought since 1994, when
the state began keeping track, and about half of those have resulted in
convictions. That state’s law, a felony, applies to “whoever intentionally
advises, encourages or assists” another in taking his or her own life;
convictions carry sentences of up to 15 years in prison.
Barbara Coombs Lee, the president of Compassion and Choices, who has advocated
for laws like the one in Oregon, said she found it “perfectly appropriate” that
Mr. Melchert-Dinkel faces such charges. “This is so egregious, so clearly wrong,
that I’ll be very disappointed if assisted-suicide statutes do not reach this,”
she said. “There is a bright line between aid in dying and assisting in suicide
like this.”
Still, legal experts suggested that there may be room for challenges. The
Minnesota law itself, some suggested, could be seen as too ambiguous or too
broad to include protected speech that falls short of actually leading someone
to suicide. The deaths occurred in other jurisdictions, posing potential issues,
other lawyers said.
Terry A. Watkins, a lawyer for Mr. Melchert-Dinkel, said it was premature to
describe what defense he intends to present but made it clear that he had
questions about the law itself, as well as the dissection of causes that lead to
any suicide. “As a society, we need to be careful when we start putting together
laws that prohibit things like ‘encouragement’ without a really clear definition
of what in God’s name you’re talking about,” he said.
Mr. Melchert-Dinkel, who is scheduled to be arraigned on May 25 in Rice County
District Court, has had his nursing license revoked. He had held it since 1991,
despite a record that included repeated discipline for complaints of leaving a
nursing home patient unattended, being too rough, sleeping on duty, failing to
take vital signs and failing to track a patient’s medications.
But Mr. Watkins said his client was basically a good person. “This is not a
monster,” he said.
Shortly after the police interviewed Mr. Melchert-Dinkel last year, he checked
into a local emergency room, state records show, saying that he was dealing with
an addiction to suicide Internet sites and feeling guilty over advice he had
given to people to end their lives.
Online Talk, Suicides
and a Thorny Court Case, NYT, 13.5.2010,
http://www.nytimes.com/2010/05/14/us/14suicide.html
Tell-All Generation Learns to Keep Things Offline
May 8, 2010
The New York Times
By LAURA M. HOLSON
Min Liu, a 21-year-old liberal arts student at the New School in New York
City, got a Facebook account at 17 and chronicled her college life in detail,
from rooftop drinks with friends to dancing at a downtown club. Recently,
though, she has had second thoughts.
Concerned about her career prospects, she asked a friend to take down a
photograph of her drinking and wearing a tight dress. When the woman overseeing
her internship asked to join her Facebook circle, Ms. Liu agreed, but limited
access to her Facebook page. “I want people to take me seriously,” she said.
The conventional wisdom suggests that everyone under 30 is comfortable revealing
every facet of their lives online, from their favorite pizza to most frequent
sexual partners. But many members of the tell-all generation are rethinking what
it means to live out loud.
While participation in social networks is still strong, a survey released last
month by the University of California, Berkeley, found that more than half the
young adults questioned had become more concerned about privacy than they were
five years ago — mirroring the number of people their parent’s age or older with
that worry.
They are more diligent than older adults, however, in trying to protect
themselves. In a new study to be released this month, the Pew Internet Project
has found that people in their 20s exert more control over their digital
reputations than older adults, more vigorously deleting unwanted posts and
limiting information about themselves. “Social networking requires vigilance,
not only in what you post, but what your friends post about you,” said Mary
Madden, a senior research specialist who oversaw the study by Pew, which
examines online behavior. “Now you are responsible for everything.”
The erosion of privacy has become a pressing issue among active users of social
networks. Last week, Facebook scrambled to fix a security breach that allowed
users to see their friends’ supposedly private information, including personal
chats.
Sam Jackson, a junior at Yale who started a blog when he was 15 and who has been
an intern at Google, said he had learned not to trust any social network to keep
his information private. “If I go back and look, there are things four years ago
I would not say today,” he said. “I am much more self-censoring. I’ll try to be
honest and forthright, but I am conscious now who I am talking to.”
He has learned to live out loud mostly by trial and error and has come up with
his own theory: concentric layers of sharing.
His Facebook account, which he has had since 2005, is strictly personal. “I
don’t want people to know what my movie rentals are,” he said. “If I am sharing
something, I want to know what’s being shared with others.”
Mistrust of the intentions of social sites appears to be pervasive. In its
telephone survey of 1,000 people, the Berkeley Center for Law and Technology at
the University of California found that 88 percent of the 18- to 24-year-olds it
surveyed last July said there should be a law that requires Web sites to delete
stored information. And 62 percent said they wanted a law that gave people the
right to know everything a Web site knows about them.
That mistrust is translating into action. In the Pew study, to be released
shortly, researchers interviewed 2,253 adults late last summer and found that
people ages 18 to 29 were more apt to monitor privacy settings than older adults
are, and they more often delete comments or remove their names from photos so
they cannot be identified. Younger teenagers were not included in these studies,
and they may not have the same privacy concerns. But anecdotal evidence suggests
that many of them have not had enough experience to understand the downside to
oversharing.
Elliot Schrage, who oversees Facebook’s global communications and public policy
strategy, said it was a good thing that young people are thinking about what
they put online. “We are not forcing anyone to use it,” he said of Facebook. But
at the same time, companies like Facebook have a financial incentive to get
friends to share as much as possible. That’s because the more personal the
information that Facebook collects, the more valuable the site is to
advertisers, who can mine it to serve up more targeted ads.
Two weeks ago, Senator Charles E. Schumer, Democrat of New York, petitioned the
Federal Trade Commission to review the privacy policies of social networks to
make sure consumers are not being deliberately confused or misled. The action
was sparked by a recent change to Facebook’s settings that forced its more than
400 million users to choose to “opt out” of sharing private information with
third-party Web sites instead of “opt in,” a move which confounded many of them.
Mr. Schrage of Facebook said, “We try diligently to get people to understand the
changes.”
But in many cases, young adults are teaching one another about privacy.
Ms. Liu is not just policing her own behavior, but her sister’s, too. Ms. Liu
sent a text message to her 17-year-old sibling warning her to take down a photo
of a guy sitting on her sister’s lap. Why? Her sister wants to audition for
“Glee” and Ms. Liu didn’t want the show’s producers to see it. Besides, what if
her sister became a celebrity? “It conjures up an image where if you became
famous anyone could pull up a picture and send it to TMZ,” Ms. Liu said.
Andrew Klemperer, a 20-year-old at Georgetown University, said it was a
classmate who warned him about the implications of the recent Facebook change —
through a status update on (where else?) Facebook. Now he is more diligent in
monitoring privacy settings and apt to warn others, too.
Helen Nissenbaum, a professor of culture, media and communication at New York
University and author of “Privacy in Context,” a book about information sharing
in the digital age, said teenagers were naturally protective of their privacy as
they navigate the path to adulthood, and the frequency with which companies
change privacy rules has taught them to be wary.
That was the experience of Kanupriya Tewari, a 19-year-old pre-med student at
Tufts University. Recently she sought to limit the information a friend could
see on Facebook but found the process cumbersome. “I spent like an hour trying
to figure out how to limit my profile, and I couldn’t,” she said. She gave up
because she had chemistry homework to do, but vowed to figure it out after
finals.
“I don’t think they would look out for me,” she said. “I have to look out for
me.”
Tell-All Generation
Learns to Keep Things Offline, NYT, 8.5.2010,
http://www.nytimes.com/2010/05/09/fashion/09privacy.html
Facebook Glitch Brings New Privacy Worries
May 5, 2010
The New York Times
By JENNA WORTHAM
For many users of Facebook, the world’s largest social network, it was just
the latest in a string of frustrations.
On Wednesday, users discovered a glitch that gave them access to supposedly
private information in the accounts of their Facebook friends, like chat
conversations.
Not long before, Facebook had introduced changes that essentially forced users
to choose between making information about their interests available to anyone
or removing it altogether.
Although Facebook quickly moved to close the security hole on Wednesday, the
breach heightened a feeling among many users that it was becoming hard to trust
the service to protect their personal information.
“Facebook has become more scary than fun,” said Jeffrey P. Ament, 35, a
government contractor who lives in Rockville, Md.
Mr. Ament said he was so fed up with Facebook that he deleted his account this
week after three years of using the service. “Every week there seems to be a new
privacy update or change, and I just can’t keep up with it.”
Facebook said it did not think the security hole, which was open a few hours,
would have a lasting impact on the company’s reputation.
“For a service that has grown as dramatically as we have grown, that now assists
with more than 400 million people sharing billions of pieces of content with
their friends and the institutions they care about, we think our track record
for security and safety is unrivaled,” said Elliot Schrage, the company’s vice
president for public policy. “Are we perfect? Of course not.”
Facebook is increasingly finding itself at the center of a tense discussion over
privacy and how personal data is used by the Web sites that collect it, said
James E. Katz, a professor of communications at Rutgers University.
“It’s clear that we keep discovering new boundaries of privacy that are possible
to push and just as quickly breached,” Mr. Katz said.
Social networking experts and analysts wonder whether Facebook is pushing the
envelope in a way that could damage its standing over time. The privacy mishap
on Wednesday, first reported by the blog TechCrunch, did not help matters.
“While this breach appears to be relatively small, it’s inopportunely timed,”
said Augie Ray, an analyst with Forrester Research. “It threatens to undermine
what Facebook hopes to achieve with its network over the next few years, because
users have to ask whether it is a platform worthy of their trust.”
Over the last few months, Facebook has introduced changes that encourage users
to make their photos and other information accessible to anyone on the Internet.
Last month its chief executive, Mark Zuckerberg, unveiled plans to begin sharing
users’ information with some outside Web sites, and Facebook began prompting
users to link information in their profile pages, like their hobbies and
hometowns, in a way that makes that information public.
That last change prompted the Electronic Privacy Information Center, an advocacy
group, to file a complaint on Wednesday with the Federal Trade Commission.
“Facebook continues to manipulate the privacy settings of users and its own
privacy policy so that it can take personal information provided by users for a
limited purpose and make it widely available for commercial purposes,” Marc
Rotenberg, the group’s executive director, said in a letter to the commission.
The extent of the discontent among users is hard to quantify, but one measure is
a group created on Facebook to protest the recent changes, which has attracted
more than 2.2 million members.
Mr. Schrage said that the company was aware that some users were not happy with
the changes, but that the overall response had been positive.
Part of the reason Facebook’s recent changes are upsetting users is that, in
contrast to a service like Twitter, most people signed up for Facebook with the
understanding that their information would be available only to an approved
circle of friends, said Danah Boyd, a social media researcher at Microsoft and a
fellow at Harvard University’s Berkman Center for Internet and Society.
“Facebook started out with a strong promise of privacy,” she said. “You had to
be at a university or some network to sign up. That’s part of how it competed
with other social networks, by being the anti-MySpace.”
As the company has changed its approach to privacy, it has introduced new ways
for users to adjust their privacy settings. But these tools have grown
increasingly convoluted, leaving many users frustrated and unsure of what
information is available to whom. They say a site that they joined for the sake
of friends and fun has started to feel too much like work.
“At this point, I have no idea how many times I’ve changed my settings,” said
Lauren Snead, a 24-year-old student in Murfreesboro, Tenn. “I’ve done it so many
times. I’m tired of logging in one day and seeing everything is different and
trying to understand what it means.”
In addition, many users are not even aware of the privacy settings, Ms. Boyd
said. A recent survey from Consumer Reports found that 23 percent of Facebook
users either did not know the site offered privacy controls or chose not to use
them.
Mr. Schrage said the company was working to clear up confusion about the
settings.
Many frustrated users may not give up on the site because it has become a vital
form of communication. Facebook continues to add users at a rapid clip, doubling
in size in the last year.
“I’m not going to quit Facebook, because it’s so ingrained in the culture,” said
Ryan Scannell, a 26-year-old food scientist in Chicago. “Facebook is not a
private place, I don’t expect it to be. But at the same time, I’d like to
control what’s accessible to strangers and what’s accessible to family and
friends.”
There are financial motives behind the company’s moves. One of the ways Facebook
makes money with its free service is by customizing the selection of
advertisements shown to individual users. The more information publicly
available about users, the more the company can make from such focused ads.
In addition, analysts say Facebook may be eyeing the lucrative market for online
search, figuring that its users will be more likely to turn to their friends for
advice and information than the wider Web. That opens up more opportunities for
advertisers.
“They’re heating up in their battle against Google,” said Sean Sullivan, a
security adviser at the Internet security firm F-Secure who analyzes social
networks. “If I’m looking for a day care for my 6-year-old, I’m going to put
that in my status message, not do a Google search.”
Mr. Schrage of Facebook said the controversy over the site’s changes was
indicative of a larger shift online.
“Facebook has been made the center of attention around a really important issue
of how technology is changing the conception of privacy, control and sharing,”
he said. “People are uneasy about it, but as they start to see the benefits and
advantages of it, they start to see the value of the experiences.”
Facebook Glitch Brings
New Privacy Worries, NYT, 5.5.2010,
http://www.nytimes.com/2010/05/06/technology/internet/06facebook.html
On Formspring, an E-Vite to Teenage Insults
May 5, 2010
The New York Times
By TAMAR LEWIN
It is the online version of the bathroom wall in school, the place to scrawl
raw, anonymous gossip.
Formspring.me, a relatively new social networking site, has become a magnet for
comments, many of them nasty and sexual, among the Facebook generation.
While Formspring is still under the radar of many parents and guidance
counselors, over the last two months it has become an obsession for thousands of
teenagers nationwide, a place to trade comments and questions like: Are you
still friends with julia? Why wasn’t sam invited to lauren’s party? You’re not
as hot as u think u are. Do you wear a d cup? You talk too much. You look stupid
when you laugh.
By setting up a free Formspring account and linking it to their Tumblr or
Twitter or Facebook accounts, young people invite their hundreds of online
friends to ask questions or post comments, without having to identify
themselves.
In part, Formspring is just the latest place to hang out and exchange gossip, as
teenagers have always done. But because of the anonymity, the banter is
unvarnished.
Comments and questions go into a private mailbox, where the user can ignore,
delete or answer them. Only the answered ones are posted publicly — leading
parents and guidance counselors to wonder why so many young people make public
so many nasty comments about their looks, friends and sexual habits.
“I’d never heard of Formspring until yesterday, but when I started asking kids,
every seventh and eighth grader I asked said they used it,” said Christine Ruth,
a middle school counselor in Linwood, N.J. “In seventh grade, especially, it’s a
lot of ‘Everyone knows you’re a slut,’ or ‘You’re ugly.’ It seems like even when
it’s inappropriate and vicious, the kids want the attention, so they post it.
And who knows what they’re getting that’s so devastating that they don’t post
it?”
Users can choose not to accept anonymous questions, but most young people seem
to ignore that option. And some Formspring users say it is precisely the
negative comments that interest them.
“Nice stuff is not why you get it,” said Ariane Barrie-Stern, a freshman at
Fiorello H. LaGuardia High School in New York City. “I think it’s interesting to
find out what people really think that they don’t have the guts to say to you.
If it’s hurtful, you have to remind yourself that it doesn’t really mean
anything.”
Ariane, who has more than 100 posts on her site, said she had not been terribly
bothered by anything she has read so far, but she acknowledged that after one
comment about a certain pair of leggings, she stopped wearing them.
Her father, Larry Stern, who like most other parents interviewed had never heard
of Formspring until a reporter’s call, was aghast.
“It’s just shocking that kids have access to all these things on the Internet
and we don’t even know about it,” Mr. Stern said. “And it’s disturbing that what
goes on there will influence how somebody behaves. How do you block it? How do
you monitor it?”
Even teenagers who do not set up Formspring accounts can peruse their friends’
accounts to see if they are mentioned.
Many families on Long Island became aware of Formspring after the March suicide
of Alexis Pilkington, a 17-year-old West Islip soccer player who had received
many nasty messages.
Since it began in late November, Formspring has caught on rapidly. More than 28
million people visit the site each month, 14 million of them in the United
States, according to Quantcast, a service that analyzes Web traffic.
The company, started in Indianapolis by John Wechsler and Ade Olonoh, recently
raised $2.5 million from a group of Silicon Valley investors and moved to San
Francisco.
According to Formspring, more than three million questions have been asked and
answered on the site. Mr. Olonoh said in an e-mail message that the company did
not know what percentage of users were teenagers.
Formspring is not the first site to allow anonymous comments. Some schools say
students have been demoralized by comments on Honesty Box, a Facebook add-on.
And Juicy Campus, a college gossip site, caused so much grief that some colleges
blocked it, and some state attorneys general began consumer-protection
investigations. The site shut down last year.
Formspring is one of many question-and-answer Internet sites that are widely
used to find, say, the calorie count of avocados. But Formspring spread like
wildfire among young people, who used it to for more intimate topics — or
flat-out cyberbullying.
Many schools say they have seen students crushed by criticism of their breasts,
their body odor or their behavior at the last party.
“There’s nothing positive on there, absolutely nothing, but the kids don’t seem
to be able to stop reading, even if people are saying terrible things about
them,” said Maggie Dock, a middle school counselor in Kinnelon, N.J. “I asked
one girl, ‘If someone was throwing rocks at you, what would you do?’ She said
she’d run, she’d move away. But she won’t stop reading what people say about
her.”
In some schools, the Formspring craze may already be burning out.
“We all got Formspring about two months ago, when it began showing in people’s
Facebook status,” said a 14-year-old from a New York City private school. “It’s
actually gone down a little bit in the past few weeks, at least in my grade,
because a lot of people realized it wasn’t a good thing, that people were
getting hurt, or posting awful comments.”
Some young Formspring users say they strive for a light touch in answering
questions about their relationships (hookups, that is, or “hu” in online
parlance). Several said they admired friends’ skills at deflecting the
often-asked question about how far they had gone, with answers like, “I’ve been
to Morocco.”
One mother in Westchester County, N.Y., discovered Formspring when her daughter
came to her, sobbing, after reading putdowns of her breasts and her teeth.
“She was very, very upset,” the woman said. “She’s always been self-conscious,
and in a way this just flushed out what people might been thinking all along.
She worked very hard on figuring out how to answer. But there’s a kind of
obsessiveness to it. She still wants to read everything.”
Unknown to her daughter, the woman has learned her password, and occasionally
checks her Facebook and Formspring accounts.
“The comments are all gross and sexual,” the mother said. “And yet, of course,
this is coming from her friends. I wish I could just erase it, but all of her
friends are online, and so much of their social interaction is online that I
don’t think I could just take away her Internet access. But I do think this
whole online social media thing is a huge experiment on our children.”
On Formspring, an E-Vite
to Teenage Insults, NYT, 5.5.2010,
http://www.nytimes.com/2010/05/06/us/06formspring.html
Profit Rose 68% at Amazon, Topping Analysts’ Forecasts
April 22, 2010
The New York Times
By THE ASSOCIATED PRESS
SAN FRANCISCO (AP) — Amazon.com said Thursday that its first-quarter profit
surged 68 percent, showing that consumers are even more comfortable opening
their wallets to the online retailer as the economy slowly improves.
Earnings were $299 million, or 66 cents a share, in the January through March
period. The amount was 5 cents more than analysts polled by Thomson Reuters had
expected. Amazon had a profit of $177 million, or 41 cents a share in the
year-earlier period. Revenue rose 46 percent to $7.13 billion, well above the
$6.87 billion analysts had expected.
For the current quarter, Amazon expects revenue of $6.1 billion to $6.7 billion.
That would be an increase of 31 percent to 44 percent over last year, but it
also means Amazon’s revenue could fall below analysts’ expectations for $6.43
billion.
Amazon shares fell $9.49 to $141 in after-hours trading, after finishing regular
trading up $4.06 at $150.49. Earlier in the day the stock hit a high of $151.09,
adjusted for splits.
Revenue from books, CDs, DVDs and other media grew 26 percent to $3.43 billion.
Electronics and other “general merchandise” revenue increased 72 percent to
$3.51 billion.
The first quarter ended right before the arrival of a major competitor to
Amazon’s Kindle e-reader, the Apple iPad tablet device. Like the Kindle, the
iPad can wirelessly download books.
As in the past, Amazon declined to give details about Kindle sales.
It reiterated that the device is Amazon’s best-selling product, but the meaning
of that is unclear, given that the Kindle can be bought only on Amazon’s site.
Amazon will start selling the Kindle at some Target stores this month.
Profit Rose 68% at
Amazon, Topping Analysts’ Forecasts, NYT, 22.4.2010,
http://www.nytimes.com/2010/04/23/technology/23amazon.html
For Web’s New Wave, Sharing Details Is the Point
April 22, 2010
The New York Times
By BRAD STONE
SAN FRANCISCO — Mark Brooks wants the whole Web to know that he spent $41 on
an iPad case at an Apple store, $24 eating at an Applebee’s, and $6,450 at a
Florida plastic surgery clinic for nose work.
Too much information, you say? On the Internet, there seems to be no such thing.
A wave of Web start-ups aims to help people indulge their urge to divulge — from
sites like Blippy, which Mr. Brooks used to broadcast news of what he bought, to
Foursquare, a mobile social network that allows people to announce their precise
location to the world, to Skimble, an iPhone application that people use to
reveal, say, how many push-ups they are doing and how long they spend in yoga
class.
Not that long ago, many were leery of using their real names on the Web, let
alone sharing potentially embarrassing personal details about their shopping and
lifestyle habits. But these start-ups are exploiting a mood of online openness,
despite possible hidden dangers.
“People are not necessarily thinking about how long this information will stick
around, or how it could be used and exploited by marketers,” said Chris Conley,
a technology and civil liberties fellow at the American Civil Liberties Union.
The spirit of sharing has already run into some roadblocks. Amazon.com was so
wary of the security ramifications of Blippy’s idea of letting consumers post
everything they bought that, for several months, it blocked the site from
allowing people to publish their Amazon purchases.
In March, Blippy sidestepped Amazon by asking its customers for access to their
Gmail accounts, and then took the purchase data from the receipts Amazon had
e-mailed them. Blippy says thousands of its users have supplied the keys to
their e-mail accounts; Amazon declined to comment.
There is no way to quantify the number of these start-ups, but they are the rage
among venture capitalists. Although some doubt whether the sites will gain true
mainstream popularity — and whether they will make any money — the entrepreneurs
involved think they are on to something.
Blippy, which opened last fall, was the first site to introduce the notion of
publishing credit card and other purchases. Last month it attracted around
125,000 visitors and closed an investment round of $11 million from venture
capitalists. It hopes to one day make money by, among other things, taking a
commission when people are inspired to imitate their friends’ purchases posted
on the site.
The people behind Swipely, a site soon to arrive and similar to Blippy, are also
optimistic.
“We will help people discover a great restaurant or movie through their friends
and make it easy to recommend their own purchases,” said Angus Davis, 32, a
veteran of Netscape and Microsoft who is testing Swipely with a limited group of
users. “I really believe that the lens of your friends is fast becoming the most
powerful way to discover things on the Internet.”
Mr. Brooks, a 38-year-old consultant for online dating Web sites, seems to be a
perfect customer. He publishes his travel schedule on Dopplr. His DNA profile is
available on 23andMe. And on Blippy, he makes public everything he spends with
his Chase Mastercard, along with his spending at Netflix, iTunes and Amazon.com.
“It’s very important to me to push out my character and hopefully my good
reputation as far as possible, and that means being open,” he said, dismissing
any privacy concerns by adding, “I simply have nothing to hide.”
This new world owes its origin to the rampant sharing of photos, résumés and
personal news bites on services like Facebook, LinkedIn and Twitter, which have
acclimated people to broadcasting even the most mundane aspects of their lives.
To Silicon Valley’s deep thinkers, this is all part of one big trend: People are
becoming more relaxed about privacy, having come to recognize that publicizing
little pieces of information about themselves can result in serendipitous
conversations — and little jolts of ego gratification.
DailyBooth, founded in London but moving to San Francisco, asks users to publish
a photograph of themselves every day. “It’s the richest and quickest way to
share how you are doing and what you are feeling,” said Brian Pokorny, a Silicon
Valley investor who recently became the company’s chief executive.
While the over-30 set might recoil from this type of activity, young people do
not seem to mind. The site, which gets around 300,000 visitors a month,
according to the online research company Compete.com, appears to be largely
populated with enthusiastically exhibitionist teenagers.
Still, only two years ago, Facebook members rebelled when the site introduced
its notorious Beacon service, which published members’ online transactions back
to the site — essentially the same concept as Blippy and Swipely.
A decade ago, Dennis Crowley was trying to get people to share information about
their geographic location with a service called Dodgeball. For years, he said,
he faced a barrage of questions about why anyone would want an update on where
someone was having a beer.
“After we sold the company to Google and they shut it down, we left those
questions to Twitter, and they did a great job of answering them,” said Mr.
Crowley, who went on to create Foursquare, which Silicon Valley venture
capitalists are competing to finance. “This kind of sharing makes people feel
connected to each other,” he said.
But there is the worry about identity theft.
“Ten years ago, people were afraid to buy stuff online. Now they’re sharing
everything they buy,” said Barry Borsboom, a student at Leiden University in the
Netherlands, who this year created an intentionally provocative site called
Please Rob Me. The site collected and published Foursquare updates that
indicated when people were out socializing — and therefore away from their
homes.
“Times are changing, and most people might not know where the dangers lie,” Mr.
Borsboom said.
The business plans for these start-ups are no sure thing, either.
“These companies are betting they take this data, monetize it or resell it,”
said John Borthwick, an entrepreneur based in New York who advises companies
like DailyBooth and Hot Potato, which lets people share plans and experiences of
live events. “But the assumption that every scrap of data is actually useful to
individuals, or even companies, will be tested.”
For Web’s New Wave,
Sharing Details Is the Point, NYT, 22.4.2010,
http://www.nytimes.com/2010/04/23/technology/23share.html
Web Coupons Know Lots About You, and They Tell
April 16, 2010
The New York Times
By STEPHANIE CLIFFORD
For decades, shoppers have taken advantage of coupons. Now, the coupons are
taking advantage of the shoppers.
A new breed of coupon, printed from the Internet or sent to mobile phones, is
packed with information about the customer who uses it. While the coupons look
standard, their bar codes can be loaded with a startling amount of data,
including identification about the customer, Internet address, Facebook page
information and even the search terms the customer used to find the coupon in
the first place.
And all that information follows that customer into the mall. For example, if a
man walks into a Filene’s Basement to buy a suit for his wedding and shows a
coupon he retrieved online, the company’s marketing agency can figure out
whether he used the search terms “Hugo Boss suit” or “discount wedding clothes”
to research his purchase (just don’t tell his fiancée).
Coupons from the Internet are the fastest-growing part of the coupon world —
their redemption increased 263 percent to about 50 million coupons in 2009,
according to the coupon-processing company Inmar. Using coupons to link Internet
behavior with in-store shopping lets retailers figure out which ad slogans or
online product promotions work best, how long someone waits between searching
and shopping, even what offers a shopper will respond to or ignore.
The coupons can, in some cases, be tracked not just to an anonymous shopper but
to an identifiable person: a retailer could know that Amy Smith printed a 15
percent-off coupon after searching for appliance discounts at Ebates.com on
Friday at 1:30 p.m. and redeemed it later that afternoon at the store.
“You can really key into who they are,” said Don Batsford Jr., who works on
online advertising for the tax preparation company Jackson Hewitt, whose coupons
include search information. “It’s almost like being able to read their mind,
because they’re confessing to the search engine what they’re looking for.”
While companies once had a slim dossier on each consumer, they now have
databases packed with information. And every time a person goes shopping, visits
a Web site or buys something, the database gets another entry.
“There is a feeling that anonymity in this space is kind of dead,” said Chris
Jay Hoofnagle, director of the Berkeley Center for Law and Technology’s
information privacy programs.
None of the tracking is visible to consumers. The coupons, for companies as
diverse as Ruby Tuesday and Lord & Taylor, are handled by a company called
RevTrax, which displays them on the retailers’ sites or on coupon Web sites, not
its own site.
Even if consumers could figure out that RevTrax was creating the coupons, it
does not have a privacy policy on its site — RevTrax says that is because it
handles data for the retailers and does not directly interact with consumers.
RevTrax can also include retailers’ own client identification numbers (Amy Smith
might be client No. 2458230), then the retailer can connect that with the actual
person if it wants to, for example, to send a follow-up offer or a thank-you
note.
Using coupons also lets the retailers get around Google hurdles. Google allows
its search advertisers to see reports on which keywords are working well as a
whole but not on how each person is responding to each slogan.
“We’ve built privacy protections into all Google services and report Web site
trends only in aggregate, without identifying individual users,” Sandra
Heikkinen, a spokeswoman for Google, said in an e-mail message.
The retailers, however, can get to an individual level by sending different
keyword searches to different Web addresses. The distinct Web addresses are
invisible to the consumer, who usually sees just a Web page with a simple
address at the top of it.
So clicking on an ad for Jackson Hewitt after searching for “new 2010
deductions” would send someone to a different behind-the-scenes URL than after
searching for “Jackson Hewitt 2010,” though the Web pages and addresses might
look identical. This data could be coded onto a coupon.
RevTrax works as closely with image-rich display ads, with coupons also
signaling what ad a person saw and on what site.
“Wherever we provide a link, whether it’s on search or banner, that thing you
click can include actual keywords,” said Rob O’Neil, director of online
marketing at Tag New Media, which works with Filene’s. “There’s some trickery.”
The companies argue that the coupon strategy gives them direct feedback on how
well their marketing is working.
Once the shopper prints an online coupon or sends it to his cellphone and then
goes to a store, the clerk scans it. The bar code information is sent to
RevTrax, which, with the ad agency, analyzes it.
“We break people up into teeny little cross sections of who we think they are,
and we test that out against how they respond,” said Mr. Batsford, who is a
partner at 31 Media, an online marketing company.
RevTrax can identify online shoppers when they are signed in to a coupon site
like Ebates or FatWallet or the retailer’s own site. It says it avoids
connecting that number with real people to steer clear of privacy issues, but
clients can make that match.
The retailer can also make that connection when it is offering coupons to its
Facebook fans, like Filene’s Basement is doing.
“When someone joins a fan club, the user’s Facebook ID becomes visible to the
merchandiser,” Jonathan Treiber, RevTrax’s co-founder, said. “We take that and
embed it in a bar code or promotion code.”
“When the consumer redeems the offer in store, we can track it back, in this
case, not to the Google search term but to the actual Facebook user ID that was
signing up,” he said. Although Facebook does not signal that Amy Smith responded
to a given ad, Filene’s could look up the user ID connected to the coupon and
“do some more manual-type research — you could easily see your sex, your
location and what you’re interested in,” Mr. Treiber said. (Mr. O’Neil said
Filene’s did not do this at the moment.)
The coupon efforts are nascent, but coupon companies say that when they get more
data about how people are responding, they can make different offers to
different consumers.
“Over time,” Mr. Treiber said, “we’ll be able to do much better profiling around
certain I.P. addresses, to say, hey, this I.P. address is showing a proclivity
for printing clothing apparel coupons and is really only responding to coupons
greater than 20 percent off.”
That alarms some privacy advocates.
Companies can “offer you, perhaps, less desirable products than they offer me,
or offer you the same product as they offer me but at a higher price,” said Ed
Mierzwinski, consumer program director for the United States Public Interest
Research Group, which has asked the Federal Trade Commission for tighter rules
on online advertising. “There really have been no rules set up for this
ecosystem.”
Web Coupons Know Lots
About You, and They Tell, NYT, 16.4.2010,
http://www.nytimes.com/2010/04/17/business/media/17coupon.html
After Google’s Move, a Shift in Search Terms
March 28, 2010
The New York Times
By JONATHAN STRAY and LILY LEE
HONG KONG — Chinese searches for politically delicate terms peaked the day
Google stopped filtering its search results, but the government pressed on with
a campaign to remove online praise of the company.
Searches for “Tiananmen,” “Falun Gong” and “corruption” increased by more than
10 times here on Tuesday, the day that Google began offering uncensored
Chinese-language search results.
But searches for censored terms on Google’s uncensored Hong Kong search engine
fell off quickly in the next few days in part because most Chinese did not rush
to search for politically delicate material and also because the pages newly
revealed by Google were still mostly blocked in China.
In tests over the weekend from several Chinese cities, users searching for
“Tiananmen” or even the names of Chinese government leaders reliably found the
site google.com.hk mysteriously inaccessible for a few minutes. The more
frequently used Chinese search engine Baidu, which continues to censor its
results, remained accessible no matter what users searched for.
“I heard that Google is leaving China. But I don’t care. Why should I? I’m fine
with Baidu,” said Xiong Huan, 27, a software engineer in Shenyang. “And for now,
there’s not much change on Google either, as long as you don’t search for
sensitive info.”
Nonetheless, a significant number of people took advantage of Google’s newly
unfiltered service on its first day of operation. There were about 2.5 million
searches for phrases containing “Tiananmen” and about 4.7 million searches for
the banned religious group “Falun Gong,” according to estimates based on data
from the Google Trends and Google Keyword Tool Box.
But these are tiny numbers compared with almost 400 million Chinese Internet
users, and search activity quickly returned to average levels over the next few
days.
Searches for “Google” in English and Chinese were far more popular, totaling
more than 20 million on Tuesday, suggesting that Google users were much more
concerned about their continued access to Google’s search services than their
ability to find politically delicate information.
Meanwhile, the Chinese government has begun a concerted campaign to eradicate
pro-Google sentiments from the Internet.
Comments on social networking sites that are supportive of Google “will be
deleted in a couple of seconds,” said Oiwan Lam, 38, an independent journalist
and researcher who is an expert on Chinese independent media.
The China Digital Times reported that the Chinese State Council Information
Office had ordered all news sites to “carefully manage the information in
exchanges, comments and other interactive sessions” and “clean up text, images
and sound and videos which support Google, dedicate flowers to Google, ask
Google to stay, cheer for Google and others that have a different tune from
government policy.”
China routinely directs news coverage of delicate topics, but the restrictions
relating to Google are particularly severe.
Javen Yang, 27, webmaster of a Guangzhou travel site, said that site’s staff was
told on Friday to remove all comments relating to Google. “We have been told to
delete posts relating to ‘some American company leaving China’ by the general
webmaster, who usually receive notices from the government,” he said.
The State Council Information Office could not be reached for comment.
With domestic chat closely controlled, the contrast between the sentiments on
Chinese and foreign networks is striking. The popular Chinese discussion site
Tianya.cn had only a few dozen posts mentioning Google on Saturday. All of them
were negative or neutral opinions of the company, whereas Chinese Twitter users
generally applauded Google’s decision to offer uncensored results. Twitter has
been vocal in its opposition to censorship. It, like Facebook and YouTube,
cannot be reached from mainland China without special software.
Over all, Google’s move will make little difference in the short run to the
average citizen.
Even if the Chinese can reliably access Google’s newly unfiltered search, it
will be difficult for them to read pages the government does not want them to
see. Domestic Web sites are easily gagged; foreign sites are blocked by a
sophisticated firewall.
“Even though Google has stopped censoring, people cannot get access to sensitive
news” without firewall circumvention software, said Ms. Lam. “The Great Firewall
is still there.”
The government has never admitted the existence of such a firewall, nor the
censorship directives issued to news organizations and Web sites. Unlike other
nations that filter Internet access, China never gives notice that sites have
been blocked — connections just fail, as if there were problems with the
network.
Ultimately, indifference may prove more effective than any firewall. “I don’t
worry that Google will be blocked in China completely,” said Luo Peng, a Beijing
salesman.
“Just like YouTube and Facebook, my life is fine without them. I can always use
other similar services that are available.”
After Google’s Move, a
Shift in Search Terms, NYT, 28.3.2010,
http://www.nytimes.com/2010/03/29/technology/29googletrends.html
Google Searches for a Foreign Policy
March 26, 2010
The New York Times
By MARK LANDLER
WASHINGTON — When Google announced last week that it would shut its censored
online search service in China, it was doing more than standing up to a
repressive government: it was showing that, with the United States still
struggling to develop a foreign policy for the digital age, Internet companies
need to articulate their own foreign policies.
Google is hardly the first American company to stray into the State Department’s
bailiwick. Since the bad old days of the United Fruit Company in Latin America,
powerful multinationals have conducted themselves like quasi-states, influencing
the foreign lands in which they operate by deciding whether to accommodate or
resist the unsavory practices of authorities there.
For Internet companies, that choice has been sharpened by the fact that the
World Wide Web is no longer just a force for freedom and diversity but also a
tool for repression. Governments use it to spy on dissidents, human rights
activists, and other troublesome elements.
This change happened so fast that it left the foreign policy establishment
gasping to catch up. It also exposed Washington’s deep ambivalence about
information technology: while it champions the free flow of ideas in closed
societies like Iran, it fears being a target for cyber-attacks by hostile
governments and doesn’t want to export technology that could be diverted into
military uses. Conflicted and confused, Foggy Bottom has little to offer Silicon
Valley by way of support or even guidance.
”What forces Google to have a foreign policy is that what they’re exporting
isn’t a product or a service, it’s a freedom,” said Clay Shirky, who teaches at
New York University and writes about the Internet’s social effects. “The
question is, ‘Are they going to be United Fruit?’ ” For Google, the sinister
side of China’s cyberpolicy eventually came to outweigh the economic attraction
of China’s market and the putative benefit of opening the Internet to a vast
audience.
If the folks at Google were diplomats instead of “digirati,” one might say their
view of the Internet had evolved from Woodrow Wilson’s idealistic notion that
independent countries tend toward democracy to the realpolitik understanding
that their interests simply differ from your own. But seen another way, the
company’s decision to stop censoring pushes it farther away from the moral
neutralism of United Fruit, showing that it is no longer willing to collude with
a restrictive system in pursuit of profits.
The choice was not easy. Since late 2006, when it entered China, Google argued
that a censored search service was better than no search service at all. But
after it discovered that its network had been hacked from inside China, and that
the Gmail accounts of human rights activists had been infiltrated, that tradeoff
no longer seemed defensible. This “goes to the heart of a much larger global
debate about freedom of speech,” Google’s chief legal officer, David Drummond,
said in a post explaining the company’s thinking.
As if on cue, the Obama administration made its first major statement on
Internet freedom. Secretary of State Hillary Rodham Clinton said the Internet
could be a force for good or ill and encouraged governments to use it for good,
while urging American companies not to knuckle under to censorship. But she left
the work of navigating restrictions to the companies.
That navigation gets harder by the day, said Mark Palmer, a former United States
ambassador to Hungary who has started independent TV stations in Eastern Europe.
“There are more than 40 countries that restrict the Internet,” he said. “The
State Department and the Treasury Department have not come to grips with it.”
The Treasury did recently begin allowing firms to export free online services
like instant messaging, chat and photo sharing to Iran, Sudan, and Cuba. Having
watched the impetus that Twitter and Facebook gave to antigovernment protests in
Tehran, the administration wanted more of it. But the difficult-to-jam
high-speed satellite Internet service that Iran’s dissidents also crave remains
unavailable because of sanctions intended to retard Iran’s nuclear program.
The State Department is encouraging the development of technologies that enable
users to circumvent restrictions on the Internet. But advocates for some
startups said that the government had not allotted enough money or steered
support to the most promising ventures. And the United States lacks a uniform
policy for dealing with American companies that export software that governments
can use to filter the Internet.
Google’s problems are not just with repressive regimes. Last month, an Italian
court convicted Mr. Drummond and two colleagues of breaking privacy laws after a
video of an autistic boy being bullied was posted on Google’s network.
Google’s showdown with Beijing, analysts said, is driven in part by its fear of
similar lawsuits from China. Google also wants the United States to treat
Internet censorship as a trade barrier that influences decisions on foreign aid.
Not all tech companies share Google’s fervor. Microsoft remains in China,
running a government-censored search engine. Its founder, Bill Gates, said in
January that companies needed to decide if they are going to obey the rules of
the countries in which they operate, although Microsoft says that it, too,
pushes back.
Mr. Shirky says he sees a generational divide. “It’s no accident,” he said,
“that Microsoft was founded during the cold war while Google was founded after
the cold war.” While Microsoft has a mentality in which national sovereignty
still trumps ethical arguments, he said, Google is trying to balance the rights
of sovereignty against its own evolving set of values.
Google Searches for a
Foreign Policy, NYT, 26.3.2010,
http://www.nytimes.com/2010/03/28/weekinreview/28landler.html
Social Networks a Lifeline for the Chronically Ill
March 24, 2010
The New York Times
By CLAIRE CAIN MILLER
A former model who is now chronically ill and struggles just to shower says
the people she has met online have become her family. A quadriplegic man uses
the Web to share tips on which places have the best wheelchair access, and a
woman with multiple sclerosis says her regular Friday night online chats are her
lifeline.
For many people, social networks are a place for idle chatter about what they
made for dinner or sharing cute pictures of their pets. But for people living
with chronic diseases or disabilities, they play a more vital role.
“It’s really literally saved my life, just to be able to connect with other
people,” said Sean Fogerty, 50, who has multiple sclerosis, is recovering from
brain cancer and spends an hour and a half each night talking with other
patients online.
People fighting chronic illnesses are less likely than others to have Internet
access, but once online they are more likely to blog or participate in online
discussions about health problems, according to a report released Wednesday by
the Pew Internet and American Life Project and the California HealthCare
Foundation.
“If they can break free from the anchors holding them down, people living with
chronic disease who go online are finding resources that are more useful than
the rest of the population,” said Susannah Fox, associate director of digital
strategy at Pew and author of the report.
They are gathering on big patient networking sites like PatientsLikeMe,
HealthCentral, Inspire, CureTogether and Alliance Health Networks, and on small
sites started by patients on networks like Ning and Wetpaint.
Sherri Connell, 46, modeled and performed in musicals until, at age 27, she
learned she had multiple sclerosis and Lyme disease. She began posting her
journal entries online for friends and family to read. Soon, people from all
over the world were reading her Web site and telling her they had similar health
problems.
In 2008, she and her husband started a social network using Ning called My
Invisible Disabilities Community. It now has 2,300 members who write about
living with lupus, forthcoming operations or medical bills, for example.
“People have good and bad days, and they don’t know a good day’s going to come
Wednesday at 5 o’clock when a live support group is meeting,” Ms. Connell said.
“The Internet is a great outlet for people to be honest.”
Not surprisingly, according to Pew, Internet users with chronic illnesses are
more likely than healthy people to use the Web to look for information on
specific diseases, drugs, health insurance, alternative or experimental
treatments and depression, anxiety or stress.
But for them, the social aspects of the Web take on heightened importance.
Particularly if they are homebound, they also look to the Web for their social
lives, discussing topics unrelated to their illnesses. Some schedule times to
eat dinner or watch a movie while chatting online.
John Linna, a pastor in Neenah, Wis., did not know what a blog was when his son
suggested he start one after discovering he needed to stay home on a ventilator.
“That day my little world began to expand,” he wrote in a post last year about
blogging. “Soon I had a little neighborhood. It was like stopping in for coffee
every day just to see how things were going.”
When Mr. Linna died earlier this year, people all over the Web who had never met
him in person mourned the loss.
Others use the Web to find practical tips about living with their disease or
disability that doctors and family members, having not lived with it themselves,
cannot provide.
On Diabetic Connect, a diabetes social network with 140,000 members, people
share recipes like low-sugar banana pudding, review products like an insulin
pump belt and have discussions like a recent one started by a patient with a new
diagnosis. “I don’t like to talk to my family and friends about this,” she
wrote. “Honestly I feel helpless. I really just need some advice and people to
talk to who might have been experiencing the same things.”
Amy Tenderich is the community manager for Diabetic Connect and writes a blog
called Diabetes Mine. “There’s no doctor in the world, unless they’ve actually
lived with this thing, that can get into that nitty-gritty,” she said. “I’ve
walked away from dinner parties with tears in my eyes because people just don’t
understand.”
Patients often use social networks to interact with people without worrying
about the stigma of physical disabilities, said Susan Smedema, an assistant
professor of rehabilitation counseling at Florida State University who studies
the psychosocial aspects of disability.
From her home in Maine, Susan Fultz plays online games at Pogo.com and
commiserates with people who are frustrated that they do not have a diagnosis
for their symptoms.
“There’s no worry of being judged or criticized, and that is something that I
know a lot of us don’t get in our daily lives,” said Ms. Fultz, who has Lyme
disease and psoriatic arthritis.
Those with chronic diseases or disabilities, like all Internet users, have to be
wary about sharing private health information online, particularly with
anonymous users.
Research has also shown that emotions can be contagious, said Paul Albert,
digital services librarian at Weill Cornell Medical Library in New York who has
researched how social networks meet the needs of patients with chronic diseases.
“If you hang out on a message board where people are very negative, you can
easily adopt a negative attitude about your disease,” he said. “On the other
hand, if people are hopeful, you might be better off.”
Some people also worry that patients might exchange erroneous medical
information on the Web, he said. Yet most patient social networks make clear
that the information on the site should not substitute for medical advice, and
the Pew study found that just 2 percent of adults living with chronic diseases
report being harmed by following medical advice found on the Internet.
Instead, the sites are used to share information from the front lines, said Lily
Vadakin, 45, who has multiple sclerosis and works as a site administrator for
Disaboom, a social network for people with disabilities. For instance, she has
discussed with other patients how to combat fatigue by working at home and
taking vitamin supplements.
“That’s what the community can give you — a real-life perspective,” she said.
Social Networks a
Lifeline for the Chronically Ill, NYT, 24.3.2010,
http://www.nytimes.com/2010/03/25/technology/25disable.html
Google Faces Fallout as China Reacts to Site Shift
March 23, 2010
The New York Times
By MIGUEL HELFT and MICHAEL WINES
Google pushed. Now China is pushing back.
The company’s problems in China escalated on Tuesday as its ties to some Chinese
partners began to come apart and the government reacted angrily to Google’s
attempt to bypass government censors.
The overseas edition of the People’s Daily, the main newspaper of the Chinese
Communist Party, on Wednesday accused Google of collaborating with U.S. spy
agencies, Reuters reported.
‘‘For Chinese people, Google is not god, and even if it puts on a full-on show
about politics and values, it is still not god,’’ said a front-page commentary
piece. ‘‘In fact, Google is not a virgin when it comes to values. Its
cooperation and collusion with the U.S. intelligence and security agencies is
well-known."
As for Google's move, the newspaper said: ‘‘All this makes one wonder. Thinking
about the United States’ big efforts in recent years to engage in Internet war,
perhaps this could be an exploratory pre-dawn battle."
Google, the world’s largest Internet company, once viewed China, the world’s
largest Internet market, as a bottomless well of opportunity with nearly 400
million Web users, and an even larger number of potential customers for its
nascent, but vital, mobile phone business.
But by directing search users in China to its uncensored search engine based in
Hong Kong, Google may have jeopardized its long-range plans.
“I don’t understand their calculation,” said J. Stapleton Roy, director of the
Kissinger Institute on China and the United States at the Woodrow Wilson
International Center for Scholars. “I do not see how Google could have concluded
that they could have faced down the Chinese on a domestic censorship issue,”
said Mr. Roy, a former United States ambassador to China.
Google called the move sensible and said it hoped to keep its sales, research
and other operations in China.
But some of those other businesses quickly came under pressure. China Mobile,
the biggest cellular communications company in China and one of Google’s
earliest partners in its foray into smartphones, was expected to cancel a deal
that had placed Google’s search engine on its mobile Web home page. Millions of
people use the page daily. In interviews, business executives close to industry
officials said China Mobile was planning to scrap the deal under government
pressure, although it had yet to find a replacement.
Similarly, China’s second-largest mobile company, China Unicom, was said by
analysts and others to have delayed or scrapped the imminent introduction of a
cellphone based on Google’s Android platform. One popular Web portal, Tom.com,
already ceased using Google to power its search engine. The company is
controlled by Li Ka-shing, the Hong Kong billionaire who has close ties to the
Chinese government.
Technology analysts and the business executives said Google might also face
problems in keeping its advertising sales force, which is crucial to the success
of its Chinese language service on PCs and mobile phones.
In an interview on Tuesday, David Drummond, Google’s chief legal officer, said
he did not see the company’s decision to serve Chinese search customers from
outside China as an act of defiance. He said the move was consistent with
Chinese law and with the company’s goal to stop participating in censorship.
While it is possible that Google’s prospects in China could suffer, the company
has yet to see any concrete business impact from its decision, he said.
“We certainly expected that if we take a stand around censorship that the
government doesn’t like that it would have an impact on our business,” Mr.
Drummond said. “We understood that as a possibility.”
But Mr. Drummond said that over time, Google would benefit from taking a
principled stand in China and elsewhere. “It is good for our business to push
for free expression,” he said.
Several analysts suggested that the government could shut down the company’s
Chinese search service entirely by blocking access to Google’s mainland address,
google.cn, or to its Hong Kong Web site, google.com.hk, though that had not
happened as of Tuesday.
Users who went to google.cn were automatically being sent to google.com.hk.
Google’s search engine in Hong Kong provides results in the simplified Chinese
characters that mainland Chinese use. Chinese in Hong Kong use the traditional
characters, which can contain more strokes and are more difficult to read and
write. Government firewalls either disabled searches for highly objectionable
terms completely or blocked links to certain results. That had typically been
the case before Google’s action, only now millions more visitors were liable to
encounter the disrupted access to an uncensored site.
Some China experts say they were perplexed by Google’s handling of the crisis,
given its stated goals of keeping business operations in China.
David M. Lampton, director of China Studies at the Johns Hopkins School of
Advanced International Studies, said it was not surprising for China to balk at
the idea of an American company using Hong Kong, and China’s own “one country,
two systems” policy, as a way around censorship.
“That would be seen as fundamentally politically subversive in China,” Mr.
Lampton said. “I am not sure whether it was an attempt by Google to give the
Chinese a way out, but instead it magnified the political controversy.”
Others said Google’s move also put Chinese authorities in a difficult situation,
as the government might be wary of agitating loyal Google users in China, who
tend to be highly educated and vocal.
“To block Google entirely is not necessarily a desirable outcome for the
government,” said Mark Natkin, managing director of Marbridge Consulting, a
technology research firm in Beijing. “It’s going to boil down to whether
authorities feel it is acceptable for users to be redirected to that site
without having to figure it out themselves.”
The potential loss of cellphone search customers could prove particularly
painful over time, analysts say. As on PCs, Google makes money on mobile phones
when people click on its ads. If carriers like China Mobile and China Unicom
remove Google as their principal mobile search service, it could cut Google’s
mobile business.
Also, the spread of Android phones, which is just beginning in China, was meant
by Google to ensure the availability of its services like search and maps on
smartphones. Yet this month, Motorola replaced Google’s search on Android phones
in China with Bing, Microsoft’s rival service, because of the uncertainty
surrounding Google’s fate in the country.
Estimates from analysts and some Google insiders put the company’s annual
revenue in China at $300 million to $600 million, a small fraction of Google’s
nearly $24 billion in annual sales. But investors were counting on that
strategically important business to grow rapidly.
“Having that potential is worth quite a bit to investors,” said Ben Schachter,
an analyst with Broadpoint AmTech.
Google shares have lost nearly 6 percent of their value since the company said
in January that it might pull out of China. During the same period, the Nasdaq
100 index rose by nearly 5 percent.
For his part, Sergey Brin, a Google founder and its president of technology, on
Monday held out the possibility that some day Google and China would patch up
their differences.
“Perhaps we can return to serving mainland China in the future,” he said.
Edward Wong, Jonathan Ansfield and Xiyun Yang contributed reporting.
Google Faces Fallout as
China Reacts to Site Shift, NYT, 23.3.2010,
http://www.nytimes.com/2010/03/24/technology/24google.html
Google Shuts China Site in Dispute Over Censorship
March 22, 2010
The New York Times
By MIGUEL HELFT and DAVID BARBOZA
SAN FRANCISCO — Just over two months after threatening to leave China because
of censorship and intrusions from hackers, Google on Monday closed its Internet
search service there and began directing users in that country to its uncensored
search engine in Hong Kong.
While the decision to route mainland Chinese users to Hong Kong is an attempt by
Google to skirt censorship requirements without running afoul of Chinese laws,
it appears to have angered officials in China, setting the stage for a possible
escalation of the conflict, which may include blocking the Hong Kong search
service in mainland China.
The state-controlled Xinhua news agency quoted an unnamed official with the
State Council Information Office describing Google’s move as “totally wrong.”
“Google has violated its written promise it made when entering the Chinese
market by stopping filtering its searching service and blaming China in
insinuation for alleged hacker attacks,” the official said.
The Chinese Foreign Ministry said on Tuesday that the government will handle the
Google case “according to the law,” Reuters reported. The ministry spokesman,
Qin Gang, said at a regular briefing in Beijing that Google’s move was an
isolated act by a commercial company, and that it should not affect China-U.S.
ties “unless politicized’’ by others.
Google declined to comment on its talks with Chinese authorities, but said that
it was under the impression that its move would be seen as a viable compromise.
“We got reasonable indications that this was O.K.,” Sergey Brin, a Google
founder and its president of technology, said. “We can’t be completely
confident.”
Google’s retreat from China, for now, is only partial. In a blog post, Google
said it would retain much of its existing operations in China, including its
research and development team and its local sales force. While the China search
engine, google.cn, has stopped working, Google will continue to operate online
maps and music services in China.
Google’s move represents a powerful rejection of Beijing’s censorship but also a
risky ploy in which Google, a global technology powerhouse, will essentially
turn its back on the world’s largest Internet market, with nearly 400 million
Web users.
“Figuring out how to make good on our promise to stop censoring search on
google.cn has been hard,” David Drummond, Google’s chief legal officer, wrote in
the blog post. “The Chinese government has been crystal clear throughout our
discussions that self-censorship is a nonnegotiable legal requirement.”
Mr. Drummond said that Google’s search engine based in Hong Kong would provide
mainland users results in the simplified Chinese characters used on the mainland
and that he believed it was “entirely legal.”
“We very much hope that the Chinese government respects our decision,” Mr.
Drummond said, “though we are well aware that it could at any time block access
to our services.” Some Western analysts say Chinese regulators could retaliate
against Google by blocking its Hong Kong or American search engines entirely,
just as it blocks YouTube, Facebook and Twitter.
Google’s decision to scale back operations in China ends a nearly four-year bet
that Google’s search engine in China, even if censored, would help bring more
information to Chinese citizens and loosen the government’s controls on the Web.
Instead, specialists say, Chinese authorities have tightened their grip on the
Internet in recent years. In January, Google said it would no longer cooperate
with government censors after hackers based in China stole some of the company’s
source code and even broke into the Gmail accounts of Chinese human rights
advocates.
“It is certainly a historic moment,” said Xiao Qiang of the China Internet
project at the University of California, Berkeley. “The Internet was seen as a
catalyst for China being more integrated into the world. The fact that Google
cannot exist in China clearly indicates that China’s path as a rising power is
going in a direction different from what the world expected and what many
Chinese were hoping for.”
While other multinational companies are not expected to follow suit, some
Western executives say Google’s decision is a symbol of a worsening business
climate in China for foreign corporations and perhaps an indication that the
Chinese government is favoring home-grown companies. Despite its size and
reputation for innovation, Google trails its main Chinese rival, Baidu.com,
which was modeled on Google, with 33 percent market share to Baidu’s 63 percent.
The decision to shut down google.cn will have a limited financial impact on
Google, which is based in Mountain View, Calif. China accounted for a small
fraction of Google’s $23.6 billion in global revenue last year. Ads that once
appeared on google.cn will now appear on Google’s Hong Kong site. Still,
abandoning a direct presence in the largest Internet search market in the world
could have long-term repercussions and thwart Google’s global ambitions,
analysts say.
Government officials in Beijing have sharpened their attacks on Google in recent
weeks. China experts say it may be some time before the confrontation is
resolved.
“This has become a war of ideas between the American company moralizing about
Internet censorship and the Chinese government having its own views on the
matter,” said Emily Parker, a senior fellow at the Center on U.S.-China
Relations at the Asia Society.
In China, many students and professionals said they feared they were about to
lose access to Google’s vast resources.
In January, when Google first threatened to leave China, many young people
placed wreaths at the company headquarters in Beijing as a sign of mourning.
The attacks were aimed at Google and more than 30 other American companies.
While Google did not say the attacks were sponsored by the government, the
company said it had enough information about the attacks to justify its threat
to leave China.
People, inside and outside of Google, investigating the attacks have since
traced them to two universities in China: Shanghai Jiao Tong University and
Lanxiang Vocational School. The schools and the government have denied any
involvement.
After serving Chinese users through its search engine based in the United
States, Google decided to enter the Chinese market in 2006 with a local search
engine under an arrangement with the government that required it to purge search
results on banned topics. But since then, Google has struggled to comply with
Chinese censorship rules and failed to gain significant market share from
Baidu.com.
Google is not the first American Internet company to stumble in China. Nearly
every major American brand has arrived with high hopes only to be stymied by
government rules or fierce competition from Chinese rivals.
After struggling to compete, Yahoo sold its Chinese operations to Alibaba Group,
a local company; eBay and Amazon never gained traction; and Microsoft’s MSN
instant messaging service badly trails that of Tencent.
Google’s departure could present an opportunity for Baidu, whose stock has
soared since the confrontation between Google and China began. It could also
give a chance to Microsoft, a perennial underdog in Internet search, to make
inroads in the Chinese market. Microsoft’s search engine, Bing, has a very small
share of the market.
Miguel Helft reported from San Francisco, and David Barboza from Shanghai. Steve
Lohr contributed reporting from New York.
Google Shuts China Site
in Dispute Over Censorship, NYT, 22.3.2010,
http://www.nytimes.com/2010/03/23/technology/23google.html
F.C.C. Plan to Widen Internet Access in U.S. Sets Up Battle
March 12, 2010
The New York Times
By BRIAN STELTER and JENNA WORTHAM
The Federal Communications Commission is proposing an ambitious 10-year plan
that will reimagine the nation’s media and technology priorities by establishing
high-speed Internet as the country’s dominant communication network.
The plan, which will be submitted to Congress on Tuesday, is likely to generate
debate in Washington and a lobbying battle among the telecommunication giants,
which over time may face new competition for customers. Already, the broadcast
television industry is resisting a proposal to give back spectrum the government
wants to use for future mobile service.
The blueprint reflects the government’s view that broadband Internet is becoming
the common medium of the United States, gradually displacing the telephone and
broadcast television industries. It also signals a shift at the F.C.C., which
under the administration of President George W. Bush gained more attention for
policing indecency on the television airwaves than for promoting Internet
access.
According to F.C.C. officials briefed on the plan, the commission’s
recommendations will include a subsidy for Internet providers to wire rural
parts of the country now without access, a controversial auction of some
broadcast spectrum to free up space for wireless devices, and the development of
a new universal set-top box that connects to the Internet and cable service.
The effort will influence billions of dollars in federal spending, although the
F.C.C. will argue that the plan should pay for itself through the spectrum
auctions. Some recommendations will require Congressional action and industry
support, and will affect users only years from now.
Still, “each bullet point will trigger its own tortuous battle,” said Craig
Moffett, a senior analyst at Sanford C. Bernstein & Company.
For much of the last year, Julius Genachowski, the F.C.C. chairman and the
plan’s chief salesman, has laid the groundwork for the Congressionally mandated
plan by asserting that the United States is lagging far behind other countries
in broadband adoption and speed. About a third of Americans have no access to
high-speed Internet service, cannot afford it or choose not to have it.
In a speech last month, Mr. Genachowski observed that the country could build
state-of-the-art computers and applications, but without equivalent broadband
wiring, “it would be like having the technology for great electric cars, but
terrible roads.”
The plan envisions a fully Web-connected world with split-second access to
health care information and online classrooms, delivered through wireless
devices yet to be dreamed up in Silicon Valley. But to get there, analysts say
the F.C.C. must tread carefully with companies like Comcast and AT&T that
largely control Internet pricing and speeds. Already, there are questions about
the extent to which the F.C.C. has jurisdiction over Internet providers.
The F.C.C. says it can make some important changes on its own. They include
reforms to the Universal Service Fund, which spends $8 billion a year from
telephone surcharges to ensure that rural and poor people have phone lines at
home. It also supplies Internet access to schools, libraries and rural clinics.
By reducing the phone subsidies over time, the fund could instead “support
broadband access and affordability,” especially in remote locations where
private companies have little incentive to build networks, said Colin Crowell, a
senior counselor to Mr. Genachowski.
In recent weeks, the most-talked-about idea in the television industry has been
a voluntary auction of over-the-air spectrum for future mobile broadband uses.
In total, the F.C.C. is hoping to free up roughly 500 megahertz of spectrum,
much of which would come from television broadcasters, which would be
compensated if Congress acts.
The proposal already faces resistance from the TV industry. Stations say they
still serve a valuable public service, especially during emergencies, and say
the F.C.C. proposals could cause gaps in signal coverage.
But F.C.C. officials assert that the spectrum changes are necessary given a
looming spectrum shortage. “It isn’t a crisis tomorrow, it’s a crisis in five or
six years,” Mr. Crowell said, but allocation “literally takes years.”
The plan will advise that some of the spectrum become unlicensed, so it can
serve as a test bed for new technologies.
Also notably, the plan will include an initiative the chairman calls 100 Squared
— equipping 100 million households with high-speed Internet gushing through
their pipes at 100 megabits a second by the end of this decade. According to
comScore, the average subscriber now receives speeds of three to four megabits a
second.
The government is “setting a stake in the ground by setting a standard for
broadband speeds in order to be a competitive nation,” said Dan Hays, director
of PRTM, a global management consulting firm in the telecommunications industry.
He said the plan could place “significant pressure” on incumbent providers to
improve their networks.
Mr. Genachowski also argues that broadband expansion can be an economic
stimulant, a crucial selling point in a time of high unemployment. “Broadband
will be the indispensable platform to assure American competitiveness, ongoing
job creation and innovation, and will affect nearly every aspect of Americans’
lives at home, at work, and in their communities,” he said Friday.
According to officials briefed on the proposals, the plan will also call for a
“digital literacy corps” to help unwired Americans learn online skills, and
recommendations for $12 billion to $16 billion for a nationwide public safety
network that would connect police, fire departments and other first responders.
In a move that could affect policy decisions years from now, the F.C.C. will
begin assessing the speeds and costs of consumer broadband service. Until then,
consumers can take matters into their own hands with a new suite of online and
mobile phone applications released by the F.C.C. that will allow them to test
the speed of their home Internet and see if they’re paying for data speeds as
advertised.
“Once again, the F.C.C. is putting service providers on the spot,” said Julien
Blin, a telecommunications consultant at JBB Research.
F.C.C. Plan to Widen Internet Access in U.S.
Sets Up Battle, NYT, 12.3.2010,
http://www.nytimes.com/2010/03/13/business/media/13fcc.html
Critics Say Google Invades Privacy With New Service
February 13, 2010
The New York Times
By MIGUEL HELFT
SAN FRANCISCO — When Google introduced Buzz — its answer to Facebook and
Twitter — it hoped to get the service off to a fast start. New users of Buzz,
which was added to Gmail on Tuesday, found themselves with a ready-made network
of friends automatically selected by the company based on the people that each
user communicated with most frequently through Google’s e-mail and chat
services.
But what Google viewed as an obvious shortcut stirred up a beehive of angry
critics. Many users bristled at what they considered an invasion of privacy, and
they faulted the company for failing to ask permission before sharing a person’s
Buzz contacts with a broad audience. For the last three days, Google has faced a
firestorm of criticism on blogs and Web sites, and it has already been forced to
alter some features of the service.
E-mail, it turns out, can hold many secrets, from the names of personal
physicians and illicit lovers to the identities of whistle-blowers and
antigovernment activists. And Google, so recently a hero to many people for
threatening to leave China after hacking attempts against the Gmail accounts of
human rights activists, now finds itself being pilloried as a clumsy violator of
privacy.
As Evgeny Morozov wrote in a blog post for Foreign Policy, “If I were working
for the Iranian or the Chinese government, I would immediately dispatch my
Internet geek squads to check on Google Buzz accounts for political activists
and see if they have any connections that were previously unknown to the
government."
Mr. Morozov is a researcher on the impact of the Internet on totalitarian
regimes at the Institute for the Study of Diplomacy at Georgetown University
under a fellowship financed by Yahoo. In an interview, he said the flap over
Buzz “definitely undermines Google’s credibility when it talks about freedom of
expression.”
In an e-mail message, Todd Jackson, product manager for Gmail and Google Buzz,
said, “Google remains completely committed to freedom of expression and to
privacy, and we have a strong track record of protecting both.”
Mr. Jackson defended the setup of the Buzz service. He said that Buzz came with
a built-in circle of contacts to provide a better experience to users and that
many liked that feature. He said that it was very easy for users to edit who
they were following on the service and who could follow them. He also said that
anyone could hide their list of Buzz contacts with a single click.
After numerous bloggers complained that the privacy controls were difficult to
find and adjust, Google agreed to make changes. In a blog post Thursday night,
Mr. Jackson wrote that the company had made it easier for people to hide their
Buzz contacts and block followers whose identity was unknown.
“It is still early, and we have a long list of improvements on the way,” Mr.
Jackson wrote. “We look forward to hearing more suggestions and will continue to
improve the Buzz experience with user transparency and control top of mind.”
Mr. Jackson said Buzz had proved popular, with tens of millions of people trying
it in the last two days.
But some critics said that Google’s decision to use e-mail and chat
correspondence as the basis of a social network was fundamentally misguided.
While it is common for social networks to make public a person’s list of friends
and followers, those lists are not typically created from e-mail conversations.
“People thought what they had was an address book for an e-mail program, and
Google decided to turn that into a friends list for a new social network,” said
Marc Rotenberg, executive director of the Electronic Privacy Information Center,
an advocacy group in Washington. “E-mail is one of the few things that people
understand to be private.”
Mr. Rotenberg said that his organization planned to file a complaint with the
Federal Trade Commission claiming that the Google’s use of e-mail conversations
to build a social network was unfair and deceptive.
In an expletive-laden article that was widely cited on the Web, a blogger who
writes about issues related to violence against women complained that Google had
made her fearful. She said that she had unexpectedly discovered a list of
people, which may have included her abusive ex-husband or people who sent
hostile comments to her blog, following her and her comments on Google Reader, a
service for reading blogs and automated news feeds.
“My privacy concerns are not trite,” wrote the blogger, who uses the pseudonym
Harriet Jacobs. “They are linked to my actual physical safety, and I will now
have to spend the next few days maintaining that safety by continually knocking
down followers as they pop up.”
In a further effort to contain the fallout, Google reached out to her and made
changes to enhance the privacy of shared comments on Google Reader.
Some privacy experts said that Google had made matters worse by making it
difficult for people to hide their lists of Buzz contacts after they realized
that those lists had been made public. Some users assumed that they could simply
turn off the Buzz service, but that proved inadequate.
“You want to have a simple rollback mechanism, so once things are not what you
expected them to be, you can get out quickly and not have to play a game of
Whack-a-Mole,” said Deirdre Mulligan, a privacy expert and assistant professor
at the School of Information at the University of California, Berkeley.
Google said it was planning to address that issue soon.
Google is known for releasing new products before they are fully ready and then
improving them over time. But its decision to do so with Buzz, coupled with its
introduction to all 176 million Gmail users by default, appears to have
backfired.
“It was a terrible mistake,” said Danny Sullivan, a specialist on Google and
editor of SearchEngineLand, an industry blog. “I don’t think people expected
that Google would show the world who you are connected with. And if there was a
way to opt out, it was really easy to miss.”
An earlier version of this article misidentified the name of the blog Evgeny
Morozov wrote a post for. It is Foreign Policy, not Foreign Affairs.
Critics Say Google
Invades Privacy With New Service, NYT, 13.2.2010,
http://www.nytimes.com/2010/02/13/technology/internet/13google.html
Cyberwar
In Digital Combat, U.S. Finds No Easy Deterrent
The New York Times
January 26, 2010
By JOHN MARKOFF, DAVID E. SANGER and THOM SHANKER
This article was reported by John Markoff, David E. Sanger and Thom Shanker,
and written by Mr. Sanger.
WASHINGTON — On a Monday morning earlier this month, top Pentagon leaders
gathered to simulate how they would respond to a sophisticated cyberattack aimed
at paralyzing the nation’s power grids, its communications systems or its
financial networks.
The results were dispiriting. The enemy had all the advantages: stealth,
anonymity and unpredictability. No one could pinpoint the country from which the
attack came, so there was no effective way to deter further damage by
threatening retaliation. What’s more, the military commanders noted that they
even lacked the legal authority to respond — especially because it was never
clear if the attack was an act of vandalism, an attempt at commercial theft or a
state-sponsored effort to cripple the United States, perhaps as a prelude to a
conventional war.
What some participants in the simulation knew — and others did not — was that a
version of their nightmare had just played out in real life, not at the Pentagon
where they were meeting, but in the far less formal war rooms at Google Inc.
Computers at Google and more than 30 other companies had been penetrated, and
Google’s software engineers quickly tracked the source of the attack to seven
servers in Taiwan, with footprints back to the Chinese mainland.
After that, the trail disappeared into a cloud of angry Chinese government
denials, and then an ugly exchange of accusations between Washington and
Beijing. That continued Monday, with Chinese assertions that critics were trying
to “denigrate China” and that the United States was pursuing “hegemonic
domination” in cyberspace.
These recent events demonstrate how quickly the nation’s escalating cyberbattles
have outpaced the rush to find a deterrent, something equivalent to the
cold-war-era strategy of threatening nuclear retaliation.
So far, despite millions of dollars spent on studies, that quest has failed.
Last week, Secretary of State Hillary Rodham Clinton made the most comprehensive
effort yet to warn potential adversaries that cyberattacks would not be ignored,
drawing on the language of nuclear deterrence.
“States, terrorists and those who would act as their proxies must know that the
United States will protect our networks,” she declared in a speech on Thursday
that drew an angry response from Beijing. “Those who disrupt the free flow of
information in our society or any other pose a threat to our economy, our
government and our civil society.”
But Mrs. Clinton did not say how the United States would respond, beyond
suggesting that countries that knowingly permit cyberattacks to be launched from
their territories would suffer damage to their reputations, and could be frozen
out of the global economy.
There is, in fact, an intense debate inside and outside the government about
what the United States can credibly threaten. One alternative could be a
diplomatic démarche, or formal protest, like the one the State Department said
was forthcoming, but was still not delivered, in the Google case. Economic
retaliation and criminal prosecution are also possibilities.
Inside the National Security Agency, which secretly scours overseas computer
networks, officials have debated whether evidence of an imminent cyberattack on
the United States would justify a pre-emptive American cyberattack — something
the president would have to authorize. In an extreme case, like evidence that an
adversary was about to launch an attack intended to shut down power stations
across America, some officials argue that the right response might be a military
strike.
“We are now in the phase that we found ourselves in during the early 1950s,
after the Soviets got the bomb,” said Joseph Nye, a professor at the Kennedy
School at Harvard. “It won’t have the same shape as nuclear deterrence, but what
you heard Secretary Clinton doing was beginning to explain that we can create
some high costs for attackers.”
Fighting Shadows
When the Pentagon summoned its top regional commanders from around the globe for
meetings and a dinner with President Obama on Jan. 11, the war game prepared for
them had nothing to do with Afghanistan, Iraq or Yemen. Instead, it was the
simulated cyberattack — a battle unlike any they had engaged in.
Participants in the war game emerged with a worrisome realization. Because the
Internet has blurred the line between military and civilian targets, an
adversary can cripple a country — say, freeze its credit markets — without ever
taking aim at a government installation or a military network, meaning that the
Defense Department’s advanced capabilities may not be brought to bear short of a
presidential order.
“The fact of the matter,” said one senior intelligence official, “is that unless
Google had told us about the attack on it and other companies, we probably never
would have seen it. When you think about that, it’s really scary.”
William J. Lynn III, the deputy defense secretary, who oversaw the simulation,
said in an interview after the exercise that America’s concepts for protecting
computer networks reminded him of one of defensive warfare’s great failures, the
Maginot Line of pre-World War II France.
Mr. Lynn, one of the Pentagon’s top strategists for computer network operations,
argues that the billions spent on defensive shields surrounding America’s banks,
businesses and military installations provide a similarly illusory sense of
security.
“A fortress mentality will not work in cyber,” he said. “We cannot retreat
behind a Maginot Line of firewalls. We must also keep maneuvering. If we stand
still for a minute, our adversaries will overtake us.”
The Pentagon simulation and the nearly simultaneous real-world attacks on Google
and more than 30 other companies show that those firewalls are falling fast. But
if it is obvious that the government cannot afford to do nothing about such
breaches, it is also clear that the old principles of retaliation — you bomb Los
Angeles, we’ll destroy Moscow — just do not translate.
“We are looking beyond just the pure military might as the solution to every
deterrence problem,” said Gen. Kevin P. Chilton, in charge of the military’s
Strategic Command, which defends military computer networks. “There are other
elements of national power that can be brought to bear. You could deter a
country with some economic moves, for example.”
But first you would have to figure out who was behind the attack.
Even Google’s engineers could not track, with absolute certainty, the attackers
who appeared to be trying to steal their source code and, perhaps, insert a
“Trojan horse” — a backdoor entryway to attack — in Google’s search engines.
Chinese officials have denied their government was involved, and said nothing
about American demands that it investigate. China’s denials, American officials
say, are one reason that President Obama has said nothing in public about the
attacks — a notable silence, given that he has made cybersecurity a central part
of national security strategy.
“You have to be quite careful about attributions and accusations,” said a senior
administration official deeply involved in dealing with the Chinese incident
with Google. The official was authorized by the Obama administration to talk
about its strategy, with the condition that he would not be named.
“It’s the nature of these attacks that the forensics are difficult,” the
official added. “The perpetrator can mask their involvement, or disguise it as
another country’s.” Those are known as “false flag” attacks, and American
officials worry about being fooled by a dissident group, or a criminal gang,
into retaliating against the wrong country.
Nonetheless, the White House said in a statement that “deterrence has been a
fundamental part of the administration’s cybersecurity efforts from the start,”
citing work in the past year to protect networks and “international engagement
to influence the behavior of potential adversaries.”
Left unsaid is whether the Obama administration has decided whether it would
ever threaten retaliatory cyberattacks or military attacks after a major
cyberattack on American targets. The senior administration official provided by
the White House, asked about Mr. Obama’s thinking on the issue, said: “Like most
operational things like this, the less said, the better.” But he added, “there
are authorities to deal with these attacks residing in many places, and
ultimately, of course, with the president.”
Others are less convinced. “The U.S. is widely recognized to have pre-eminent
offensive cybercapabilities, but it obtains little or no deterrent effect from
this,” said James A. Lewis, director of the Center for Strategic and
International Studies program on technology and public policy.
In its final years, the Bush administration started a highly classified effort,
led by Melissa Hathaway, to build the foundations of a national cyberdeterrence
strategy. “We didn’t even come close,” she said in a recent interview. Her hope
had been to recreate Project Solarium, which President Dwight D. Eisenhower
began in the sunroom of the White House in 1953, to come up with new ways of
thinking about the nuclear threats then facing the country. “There was a lot of
good work done, but it lacked the rigor of the original Solarium Project. They
didn’t produce what you need to do decision making.”
Ms. Hathaway was asked to stay on to run Mr. Obama’s early review. Yet when the
unclassified version of its report was published in the spring, there was little
mention of deterrence. She left the administration when she was not chosen as
the White House cybersecurity coordinator. After a delay of seven months, that
post is now filled: Howard A. Schmidt, a veteran computer specialist, reported
for work last week, just as the government was sorting through the lessons of
the Google attack and calculating its chances of halting a more serious one in
the future.
Government-Corporate Divide
In nuclear deterrence, both the Americans and the Soviets knew it was all or
nothing: the Cuban missile crisis was resolved out of fear of catastrophic
escalation. But in cyberattacks, the damage can range from the minor to the
catastrophic, from slowing computer searches to bringing down a country’s
cellphone networks, neutralizing its spy satellites, or crashing its electrical
grid or its air traffic control systems. It is difficult to know if small
attacks could escalate into bigger ones.
So part of the problem is to calibrate a response to the severity of the attack.
The government has responded to the escalating cyberattacks by ordering up new
strategies and a new United States Cyber Command. The office of Defense
Secretary Robert M. Gates — whose unclassified e-mail system was hacked in 2007
— is developing a “framework document” that would describe the threat and
potential responses, and perhaps the beginnings of a deterrence strategy to
parallel the one used in the nuclear world.
The new Cyber Command, if approved by Congress, would be run by Lt. Gen. Keith
B. Alexander, head of the National Security Agency. Since the agency spies on
the computer systems of foreign governments and terrorist groups, General
Alexander would, in effect, be in charge of both finding and, if so ordered,
neutralizing cyberattacks in the making.
But many in the military, led by General Chilton of the Strategic Command and
Gen. James E. Cartwright, the vice chairman of the Joint Chiefs of Staff, have
been urging the United States to think more broadly about ways to deter attacks
by threatening a country’s economic well-being or its reputation.
Mrs. Clinton went down that road in her speech on Thursday, describing how a
country that cracked down on Internet freedom or harbored groups that conduct
cyberattacks could be ostracized. But though sanctions might work against a
small country, few companies are likely to shun a market the size of China, or
Russia, because they disapprove of how those governments control cyberspace or
use cyberweapons.
That is what makes the Google-China standoff so fascinating. Google broke the
silence that usually surrounds cyberattacks; most American banks or companies do
not want to admit their computer systems were pierced. Google has said it will
stop censoring searches conducted by Chinese, even if that means being thrown
out of China. The threat alone is an attempt at deterrence: Google’s executives
are essentially betting that Beijing will back down, lift censorship of searches
and crack down on the torrent of cyberattacks that pour out of China every day.
If not, millions of young Chinese will be deprived of the Google search engine,
and be left to the ones controlled by the Chinese government.
An Obama administration official who has been dealing with the Chinese mused
recently, “You could argue that Google came up with a potential deterrent for
the Chinese before we did.”
In Digital Combat, U.S.
Finds No Easy Deterrent, NYT, 26.1.2010,
http://www.nytimes.com/2010/01/26/world/26cyber.html
China Rebuffs Clinton on Internet Warning
January 23, 2010
The New York Times
By EDWARD WONG
BEIJING — The Chinese Foreign Ministry lashed out Friday against criticism of
China in a speech on Internet censorship made by Secretary of State Hillary
Rodham Clinton, calling on the United States government “to respect the truth
and to stop using the so-called Internet freedom question to level baseless
accusations.”
Ma Zhaoxu, a Foreign Ministry spokesman, said in a written statement posted
Friday afternoon on the ministry’s Web site that the criticism leveled by Mrs.
Clinton on Thursday was “harmful to Sino-American relations.”
“The Chinese Internet is open,” he said.
The statement by the Foreign Ministry, along with a scathing editorial in the
English-language edition of The Global Times, a populist, patriotic newspaper,
signaled that China was ready to wrestle politically with the United States in
the debate over Internet censorship.
President Obama promised last year to start a more conciliatory era in United
States-China relations, pushing human rights issues to the background, but the
new criticism of China’s Internet censorship and rising tensions over currency
valuation and Taiwan arms sales indicate that animus could flare in the months
ahead.
Mrs. Clinton’s sweeping speech with its cold war undertones — likening the
information curtain to the Iron Curtain — criticized several countries by name,
including China, for Internet censorship. It was the first speech in which a top
administration official offered a vision for making Internet freedom an integral
part of foreign policy.
The debate over Internet censorship was brought to the fore in China last week
when Google announced it might shut down its Chinese-language search engine,
Google.cn, and curtail its other operations in mainland China if Chinese
officials did not back down from requiring Google to censor search results.
Until now, the Chinese government had been trying to frame the dispute with
Google as a commercial matter, perhaps because officials want to avoid having
the dispute become a referendum on Internet censorship policies among Chinese
liberals and foreign companies operating in China. On Thursday, He Yafei, a vice
foreign minister, had said the Google dispute should not be “over-interpreted”
or linked to the bilateral relationship with the United States, according to
Xinhua, the official state news agency.
But in the aftermath of Mrs. Clinton’s speech, that attitude could be changing.
Mrs. Clinton pointedly said that “a new information curtain is descending across
much of the world” and identified China as one of a handful of countries that
had stepped up Internet censorship in the past year. (Starting in late 2008, the
Chinese government shut down thousands of Web sites under the pretext of an
antipornography campaign.) She also praised American companies such as Google
that are “making the issue of Internet and information freedom a greater
consideration in their business decisions.”
The State Department had invited at least two prominent Chinese bloggers to
travel to Washington for Mrs. Clinton’s speech, and on Friday the United States
Embassy here invited bloggers, mostly liberals, to attend a briefing on Internet
issues.
A White House spokesman, Bill Burton, said Friday that “all we are looking for
from China are some answers.”
In its editorial, the English-language edition of The Global Times said Mrs.
Clinton “had raised the stakes in Washington’s clash with Beijing over Internet
freedom.”
The American demand for an unfettered Internet was a form of “information
imperialism,” the newspaper said, because less developed nations cannot possibly
compete with Western countries in the arena of information flow.
“The U.S. campaign for uncensored and free flow of information on an
unrestricted Internet is a disguised attempt to impose its values on other
cultures in the name of democracy,” the newspaper said, adding that the “U.S.
government’s ideological imposition is unacceptable and, for that reason, will
not be allowed to succeed.”
Articles on the Chinese-language Web site of The Global Times asserted that the
United States employs the Internet as a weapon to achieve worldwide hegemony.
One big question is whether ordinary Chinese will, to any large degree, accept
China’s arguments justifying Internet censorship. Although urban, middle-class
Chinese often support government policies on sovereignty issues such as Tibet or
Taiwan, they generally deride media censorship. That feeling is especially
pronounced among those who call themselves netizens. China has the most Internet
users of any country, some 384 million by official count, but also the most
complex system of Internet censorship, nicknamed the Great Firewall.
Except in the western region of Xinjiang, which is only starting to restore
Internet access after cutting service off entirely after ethnic riots in July,
canny netizens across China use software to get over the Great Firewall while
chafing at the controls.
Jonathan Ansfield and Xiyun Yang contributed reporting.
China Rebuffs Clinton on
Internet Warning, NYT, 23.1.2010,
http://www.nytimes.com/2010/01/23/world/asia/23diplo.html
Clinton Urges a Global Response to Internet Attacks
January 22, 2010
The New York Times
By BRIAN KNOWLTON
WASHINGTON — Coupling a salute to Internet freedom with a carefully worded
caution to countries like China and Iran, Secretary of State Hillary Rodham
Clinton said Thursday that countries that engaged in cyberattacks should face
consequences and international condemnation.
“In an interconnected world, an attack on one nation’s networks can be an attack
on all,” she said in a speech in Washington. “By reinforcing that message, we
can create norms of behavior among states and encourage respect for the global
networked commons.”
Mrs. Clinton’s comments came in a speech in which she announced a new $15
million effort to help more young people, women and citizens groups in other
countries communicate on the Web.
“Given the magnitude of the challenges we’re facing, we need people around the
world to pool their knowledge and creativity to help rebuild the global economy,
protect our environment, defeat violent extremism and build a future in which
every human being can realize their God-given potential,” she said, according to
the advance text of a speech at the Newseum in Washington.
Her remarks came at a time when Internet controls have drawn increasing public
attention. Limits on Internet searches led to a dispute made public this month
between Google and China, and sites such as Facebook and Twitter, which played a
critical role in helping protesters in Iran spread news and images of violent
crackdowns on antigovernment demonstrations, have been blocked by the
authorities in Tehran.
Foreign companies and millions of Chinese Google users have been watching the
matter with keen interest.
Google announced on Jan. 12 that it was “no longer willing to continue
censoring” search results for its Chinese users, pointing to breaches of Gmail
accounts held by human rights activists in China. Tens of other companies had
also been targets of hacking, the company found. Google has taken a cautious
approach to the dispute, avoiding placing direct blame on the government in
Beijing, and the Chinese government has sought to describe the situation as
strictly business.
None of the proposals Mrs. Clinton mentioned focused specifically on China or
Iran, and the financing is relatively modest.
Still, Mrs. Clinton made an unmistakable allusion to Google and China when she
said, “Countries or individuals that engage in cyberattacks should face
consequences and international condemnation.
She did not suggest what the consequences should be, though.
Five United States senators, led by Sam Brownback, Republican of Kansas, have
urged Mrs. Clinton to move quickly to support organizations that have tried to
make it easier for people in countries like China and Iran to sidestep
government restrictions on Internet use.
The senators, in a letter written before the recent Google dispute, urged Mrs.
Clinton to quickly spend $45 million earmarked over the last two years for
Internet freedom.
Her announcement, while calling for spending just a third that amount, appeared
to be otherwise in line with their urgings.
Mrs. Clinton said the new programs would help expand Internet access to women
and other groups, put in place programs to train and support civil society
groups and nongovernmental organizations in new media technologies; and support
pilot projects to increase access, particularly among young people, in the
Middle East and North Africa.
Mrs. Clinton paid tribute to the power of the Internet both for opening new
forums for the exchange of ideas and for fostering social and economic
development. “In this context,” she said, “the Internet can serve as a great
equalizer. By providing people with access to knowledge and potential markets,
networks can create opportunity where none exists.”
Brett Solomon, executive director of the group AccessNow.org, which promotes
digital openness, praised Mrs. Clinton’s speech.
“This is a big couple of weeks for Internet freedom,” he said, mentioning both
Google’s stand and Mrs. Clinton’s proposal. “Digital activists across the world
may now increasingly see their demands for democracy and justice pierce the
firewall.”
Clinton Urges a Global
Response to Internet Attacks, NYT, 22.1.2010,
http://www.nytimes.com/2010/01/22/world/asia/22diplo.html
China Cautions Internet Companies
January 15, 2010
The New York Times
By ANDREW JACOBS
BEIJING — After Google announced it would quit China unless the nation’s
censors eased their grip, the government on Thursday offered an indirect but
unambiguous response: Companies that do business in China must follow the laws
of the land.
Beijing’s comments, offered by two officials on Thursday, suggested that China
was unlikely to give in to Google’s demands that its search-engine results be
unfiltered.
In announcing its decision Tuesday to possibly leave the world’s biggest
Internet market, Google also cited a series of cyberattacks aimed at breaching
the Gmail accounts of human rights advocates.
Several of those who say their e-mail accounts were hacked provided more details
about those assaults on Thursday.
After a day of silence on the issue, the Foreign Ministry said China welcomed
foreign Internet companies but those offering online services must do so “in
accordance with the law.” Speaking at a regular news conference, Jiang Yu, a
ministry spokeswoman, did not address Google’s complaints about censorship and
cyberattacks, and she simply stated, “China’s Internet is open.”
The remarks, and those of a high-ranking propaganda official who called for even
tighter Internet restrictions, may speed Google’s departure and increase
frictions between Beijing and Washington. The Obama administration has said
Internet freedom and online security are priorities.
“The recent cyberintrusion that Google attributes to China is troubling, and the
federal government is looking into it,” Nicholas Shapiro, a White House
spokesman, said Wednesday.
Beyond voicing concern, American officials have yet to say how they might
respond. Robert Gibbs, the White House press secretary, said Wednesday that the
White House had been briefed by Google on the company’s decision. However, he
declined to describe a course of action.
If the Chinese Foreign Ministry’s comments were vague, those of Wang Chen, the
information director for the State Council, or cabinet, were more pointed.
In a transcript of an interview posted on the agency’s Web site on Thursday, Mr.
Wang urged Internet companies to increase scrutiny of news or information that
might threaten national stability and stressed the importance of “guiding”
online public opinion.
“China’s Internet is entering an important stage of development, confronting
both rare opportunities and severe challenges,” he said. “Internet media must
always make nurturing positive, progressive mainstream opinion an important
duty.”
China Cautions Internet
Companies, NYT, 15.1.2010,
http://www.nytimes.com/2010/01/15/world/asia/15beijing.html
In Rebuke of China, Focus Falls on Cybersecurity
January 14, 2010
The New York Times
By MIGUEL HELFT and JOHN MARKOFF
SAN FRANCISCO — Even before Google threatened to pull out of China in
response to an attack on its computer systems, the company was notifying
activists whose e-mail accounts might have been compromised by hackers.
In a world where vast amounts of personal information stored online can quickly
reveal a network of friends and associates, Google’s move to protect individuals
from government surveillance required quick action. In early January, Tenzin
Seldon, a 20-year-old Stanford student and Tibetan activist, was told by
university officials to contact Google because her Gmail account had been
hacked.
Ms. Seldon, the Indian-born daughter of Tibetan refugees, said she immediately
contacted David Drummond, Google’s chief legal officer.
“David informed me that my account was hacked by someone in China,” Ms. Seldon
said in a telephone interview. “They were concerned and asked whether they could
see my laptop.”
Ms. Seldon immediately changed her password and became more careful of what she
wrote. She also allowed Google to examine her personal computer at the company’s
request. Google returned it this week, saying that while no viruses or malware
had been detected, her account had indeed been entered surreptitiously.
Google confirmed Ms. Seldon’s account of events, but declined to say whether it
had notified other activists who might have been victims of hacking.
Mr. Drummond said that an attack originating in China was aimed at its corporate
infrastructure.
While the full scope of the attacks on Google and several dozen other companies
remains unclear, the events set off immediate alarms in Washington, where the
Obama administration has previously expressed concern about international
computer security and attacks on Western companies.
Neither the sequence of events leading to Google’s decision nor the company’s
ultimate goal in rebuking China is fully understood. But this was not the first
time that the company had considered withdrawing from China, according to a
former company executive. It had clashed repeatedly with Chinese officials over
censorship demands, the executive said.
Google said on Tuesday that that in its investigation of the attacks on
corporations, it found that the Gmail accounts of Chinese and Tibetan activists,
like Ms. Seldon, had been compromised in separate attacks involving phishing and
spyware.
Independent security researchers said that at least 34 corporations had been
targets of the attacks originating in China.
Adobe, a software maker, said it had been the victim of an attack, but said that
it did not know if it was linked to the hacking of Google. Some reports
suggested that Yahoo had been a victim, but a person with knowledge said that
Yahoo did not think that it been subject to the same attack as Google.
The decision by Google to draw a line and threaten to end its business
operations in China brought attention to reports of Chinese high-technology
espionage stretching back at least a decade. But despite Google’s suggestion
that the hacking came from within China, it remained unclear who was
responsible. Nevertheless, it presented the Obama administration with a problem
of how to respond.
Google’s description of the attacks closely matches a vast surveillance system
called Ghostnet that was reported in March by a group of Canadian researchers
based at the Munk Center for International Studies at the University of Toronto.
They found that an automated espionage system based in China was using targeted
e-mail messages to compromise thousands of computers in hundreds of governmental
organizations. In each case, after the computers were controlled by the
attackers, they were able to scan for documents that were then stolen and
transferred to a digital storage facility in China.
The researchers stopped short of directly accusing the Chinese government of
masterminding the attacks. However, for years there have been reports of attacks
planned by so-called patriotic hackers in China, and many American security
specialists argue that these are simply irregular elements of the People’s
Liberation Army. At the same time, hackers frequently use so-called false flag
espionage or denial of service attacks to route their activities through the
computers of a third country and hide their identity.
One of the Canadian researchers said that fellow computer security researchers
suspected that the attack on Google and other recent intrusions relied on
hackers sending booby-trapped documents that were stored in Adobe’s Acrobat
Reader format, which then infect victims’ computers. This method was seen in a
recent wave of attacks on the Dalai Lama’s computers. “We’ve seen a huge upsurge
in attacks using Adobe Acrobat,” said Greg Walton, an editor at Information
Warfare Monitor, a publication of the Canadian research group.
A spokeswoman for Adobe said the company was investigating the reports, but
could not confirm that the Adobe software was linked to the most recent attacks.
For Google, the attacks appeared to have been the final straw in a series of
confrontations with Chinese authorities.
Top Google executives, including the chief executive, Eric E. Schmidt, and the
co-founders, Larry Page and Sergey Brin, were ambivalent about the decision to
go into China in 2006, which involved agreeing to censor some search results on
the company’s local search engine, according to a former executive with
knowledge of the discussions. The resistance was strong from Mr. Brin, who had
grown up in the Soviet Union.
But after discussions and internal lobbying from Chinese and Chinese-American
employees inside Google, as well as some of the company’s sales executives,
Google’s top executives came around. They were particularly swayed by the
argument that even a censored version of Google’s search engine would provide
Chinese people more access to information and help promote free expression in
that country.
Once the decision was made, however, Google began expanding its operation in
China, which it expected would grow to be one of the largest Internet markets.
During Mr. Schmidt’s 2006 visit to China, shortly after Google introduced the
company’s China-based search engine, Google.cn, he told reporters that it would
be “arrogant” to try to change China’s censorship laws.
But repeated clashes with Chinese authorities caused Google to reconsider its
decision on many occasions, the former executives said. Things almost collapsed
in 2008, when Chinese government officials asked Google to censor results not
only on Google.cn but also on Google.com. the company’s English-language search
engine. Google refused, and after the 2008 Olympics, Chinese officials dropped
the issue.
Google now says it thinks that its attempt to help bring openness to China has
failed.
“We were looking at an environment that is more difficult than it was when we
started,” Mr. Drummond said in an interview on Tuesday. “Far from our presence
helping to open things up, it seems that things are getting tighter for open
expression and freedom.”
Robert Gibbs, the White House press secretary, said Wednesday that the White
House had been briefed by Google on the company’s decision. However, he declined
to describe what actions the government might take in response to the claims of
Chinese-directed Internet attacks.
“The recent cyberintrusion that Google attributes to China is troubling, and the
federal government is looking into it,” said a White House spokesman, Nicholas
Shapiro. He said that the president had stated that Internet freedom was a
central human rights issue on a recent China trip. He also said that the
president had made Internet security a national priority.
Gabriel Stricker, a Google spokesman, said Google’s decision to publicize the
attacks was motivated in part by its desire to alert activists that their
accounts could have been compromised.
The attacks present a challenge for the Obama administration, which last year
debated the role of a federal Internet security adviser. The administration is
grappling on how to balance stricter security controls and the freedom of
technology companies to innovate.
Several Internet security specialists were quick to point out that a group
within the White House led by Lawrence H. Summers, the national economic
adviser, had pointed to Google in debates on the appointment as an example of an
innovative Silicon Valley company that might be hamstrung by strict new Internet
security restrictions.
“It’s ironic that the new economy folks at the White House were pushing back
against faster movement on cybersecurity to protect companies like Google from
stricter regulations,” said James Lewis, an Internet security specialist at the
Center for Strategic and International Studies in Washington. Last year, Mr.
Lewis led a bipartisan study calling for the creation of a strong Internet czar
reporting directly to the president to combat a rash of new security threats.
The White House said on Tuesday that Robert A. Schmidt, a compromise candidate
who was chosen last month to be the Internet security adviser, would not start
in the position until later in the month.
Ashlee Vance contributed reporting from Mountain View, Calif., and Thom
Shanker from Washington.
In Rebuke of China,
Focus Falls on Cybersecurity, NYT, 14.1.2010,
http://www.nytimes.com/2010/01/14/technology/14google.html
|