History > 2012 > USA > Internet (I)
Rutgers Webcam-Spying Defendant
Is Sentenced to 30-Day Jail Term
May 21, 2012
The New York Times
By KATE ZERNIKE
NEW BRUNSWICK, N.J. — A judge here sentenced Dharun Ravi to 30
days in jail on Monday for using a webcam to spy on his roommate having sex with
a man, a punishment that angered prosecutors and did little to quiet the debate
over using laws against hate crimes to fight antigay bias.
His roommate, Tyler Clementi, killed himself in September 2010, two days after
discovering that Mr. Ravi had spied on him in their room at Rutgers University,
galvanizing national concern about suicide among gay teenagers.
Mr. Ravi had faced up to 10 years in prison after a jury convicted him of all 15
counts against him, which included bias intimidation, invasion of privacy and
tampering with a witness and evidence.
Prosecutors vowed to appeal, and the sentence surprised even many who had called
for leniency, as it came after an extended scolding by Judge Glenn Berman in
Superior Court in Middlesex County.
“I heard this jury say guilty 288 times — 24 questions, 12 jurors, that’s the
multiplication,” the judge told Mr. Ravi, recalling the questionnaire jurors
filled out in arriving at the verdict. “And I haven’t heard you apologize once.”
“I do not believe he hated Tyler Clementi,” the judge told a courtroom packed on
one side with supporters of Mr. Ravi and on the other with those of the Clementi
family. “I do believe he acted out of colossal insensitivity.”
Prosecutors and Mr. Clementi’s family, who had addressed reporters with relief
bordering on buoyancy following the verdict two months ago, canceled a news
conference planned for after the sentencing. Mr. Ravi’s family collapsed into an
embrace with his lawyers. Just moments earlier, his mother, Sabitha Ravi, had
sobbed while imploring the judge to spare her son prison time.
“The media misconstrued the facts to the public and misconceptions were formed,”
she said, telling how she watched helplessly as her son sank into despair after
he was charged and dropped out of Rutgers, barely eating or leaving the house.
“All I could do was hug him and cry.”
At her tears, Mr. Ravi himself broke down crying, the first time since the
beginning of the trial that he had publicly shown more than a glimpse of
emotion.
Mr. Ravi, 20, was not charged with causing Mr. Clementi’s death, but the suicide
hung heavily over the trial, and over the sentencing on Monday. Mr. Clementi’s
mother, father and brother spoke before the judge delivered his decision,
breaking down occasionally as they recalled his accomplishment and his promise,
and the pain of losing him and of reliving the agony of his final days as they
endured three weeks of courtroom testimony.
“I cannot imagine the level of rejection, isolation and disdain he must have
felt from his peers,” Tyler’s brother James Clementi said. “Dharun never
bothered to care about the harm he was doing to my brother’s heart and mind. My
family has never heard an apology, an acknowledgment of any wrongdoing.”
His mother, Jane Clementi, also criticized students who knew about the spying
from Mr. Ravi’s Twitter feeds. “How could they all go along with such meanness?”
she said. “Why didn’t any one of them speak up and try to stop it?”
Judge Berman said he wanted to impose a sentence that was “constructive” and
would provide a measure of closure — “though I don’t know how the Clementis will
ever get closure,” he said. He said he imposed the jail time for witness and
evidence tampering and for lying to the police. But for the bias intimidation
convictions, he gave Mr. Ravi three years’ probation.
The judge did not explicitly say why he deviated so far from the maximum
sentence. But he said he believed the State Legislature had intended prison time
to be attached to crimes of violence, and there had been none.
Mr. Ravi’s lead lawyer, Steven Altman, had earlier read from a presentencing
memo by a corrections officer who had interviewed Mr. Ravi and recommended
against incarceration.
Mr. Ravi, who came to this country from India as a child, remains a felon and
could face deportation. But the judge said he would recommend against that.
Gillian M. Christensen, a spokeswoman for Immigration and Customs Enforcement,
said the agency was “in the process of reviewing documents relating to the
conviction and sentencing” of Mr. Ravi, but would not comment further.
Some immigration lawyers pointed on Monday to a clause declaring that a legal
resident, or green card holder, like Mr. Ravi can be deported if convicted of
two or more crimes involving “moral turpitude,” as long as neither crime arose
out of a single scheme.
Thomas E. Moseley, an immigration lawyer based in Newark, said that if the
immigration authorities “wanted to be really aggressive,” they might argue that
the tampering crime was separate from the bias crime.
Judge Berman also sentenced Mr. Ravi to 300 hours of community service,
counseling about cyberbullying and what he called “alternate lifestyles,” and
approximately $11,000 in fees. Most of the money is to be used to help victims
of bias crimes.
Mr. Clementi, an 18-year-old who had recently come out to his parents, and Mr.
Ravi were three weeks into their freshman year at Rutgers when Mr. Clementi
asked if he could have the room for the evening so he could be alone with a man,
whom he had met on a Web site for gay men.
In court, prosecutors presented a long trail of electronic evidence to show how
Mr. Ravi had set up a webcam to spy on the men, then gone into a friend’s room
and watched. He caught only a glimpse of Mr. Clementi and his visitor in an
embrace, then sent out Twitter messages announcing that he had seen his roommate
“making out with a dude.” He set up the camera again two days later and urged
others to watch. But by then, Mr. Clementi had seen the Twitter posts and turned
off the webcam.
Mr. Clementi, an accomplished violinist from Ridgewood, N.J., checked Mr. Ravi’s
Twitter feed 38 times and filed a request for a room change — and then jumped to
his death from the George Washington Bridge. In court on Monday, his mother said
she feared Mr. Ravi’s Twitter posts were the last thing her son saw before he
jumped.
Many gay rights advocates had hailed the jury’s verdict as a bold strike against
bias, a message that bullying of gay men and lesbians should not be dismissed as
a mere prank.
But other prominent gay commentators argued that while what Mr. Ravi did was
repugnant, it was not the kind of sustained or aggressive behavior that
constitutes bullying.
The sentence similarly divided them.
Steven Goldstein, the chairman of Garden State Equality, a New Jersey gay rights
group that pushed for the state to pass its strict antibullying statutes after
Mr. Clementi’s death, said the sentence was lighter than what many shoplifters
received.
“We have opposed throwing the book at Dharun Ravi,” Mr. Goldstein said in a
statement. “But we have similarly rejected the other extreme, that Ravi should
have gotten no jail time at all, and today’s sentencing is closer to that
extreme than the other.”
William Dobbs, who had attended rallies supporting Mr. Ravi, said the judge was
reflecting the discomfort many gay rights campaigners expressed at the use of
hate crimes to prosecute Mr. Ravi.
“The judge had to control a backlash to an out-of-control prosecution,” he said.
“The number of charges, the severity and the potential penalties, even the
amount of resources devoted to this trial, was out of all proportion to the
incident.”
Bruce J. Kaplan, the Middlesex County prosecutor, issued a statement after the
sentencing, saying that while his office had not requested the maximum prison
term, “it was expected that his conviction on multiple offenses of invading the
privacy of two victims on two separate occasions, four counts of bias
intimidation against Tyler Clementi, and the cover-up of those crimes would
warrant more than a 30-day jail term.”
Still, even some jurors continued to struggle over the appropriate sentence.
One, Susan Matiejunas, said she had watched the proceedings on television all
morning and was surprised.
“Thirty days is a slap on the wrist,” she said. “Six months to a year would have
been more suitable, since we convicted him on so many counts.”
Ms. Matiejunas telephoned later to say she had reconsidered.
“The kid has spent two years in purgatory just waiting for all of this to end,”
she said. “I think probably 30 days really is quite enough on top of all that.”
Nate Schweber contributed reporting from New Brunswick, and Hannah Miet and Kirk
Semple from New York.
Rutgers
Webcam-Spying Defendant Is Sentenced to 30-Day Jail Term, NYT, 21.5.2012,
http://www.nytimes.com/2012/05/22/nyregion/rutgers-spying-defendant-sentenced-to-30-days-in-jail.html
From a Facebook Founder
Comes a Way to Streamline Work Flow
May 20, 2012
The New York Times
By QUENTIN HARDY
SAN FRANCISCO — Facebook’s success has spawned a
multimillion-dollar boom in social networking. There are networks for
photo-sharers, for children and for workers inside companies. Yammer and Jive,
for instance, promise to energize employees and increase their productivity by
enabling fast information sharing.
Dustin Moskovitz thinks this is a bad idea that won’t fly. “The first time I
looked at Yammer, I thought I was on Facebook,” he said. “Work is not a social
network, with serendipitous communications and photo collections. Work is about
managing tasks, and responding to things quickly.”
Mr. Moskovitz does know a little bit about running the operations of a
fast-growing company. He helped found Facebook along with Mark Zuckerberg,
Eduardo Saverin and Chris Hughes while at Harvard in 2004. His job was to make
sure the computers straining to run Facebook’s expanding network never went
down.
After leaving Facebook in 2008 with enough equity to make him one of the world’s
youngest billionaires, Mr. Moskovitz, now 27, works on his own version of
company management software for the networked age. He calls it Asana.
Asana is task-based software, a shared to-do list for the company. Work is
assigned and completed by a potentially unending set of teams created on the
fly. Asana is a Sanskrit word meaning “easeful posture.” Yoga practitioners
think of it in terms of complex poses done effortlessly. “You should read a lot
into the name,” Mr. Moskovitz said.
Tasks can be named and assigned across the company, then shut down or subdivided
as the work progresses. People can rank, or have others rank, which of their
jobs need attention soonest. If a company wants, anyone can look in on anyone
else’s work, offering help and criticism. “We think of e-mail, in-person
meetings, and whiteboards as our competition,” said Justin Rosenstein, Mr.
Moskovitz’s co-founder at Asana.
Like Mr. Moskovitz, Mr. Rosenstein came from Facebook, though he stopped first
at Google where he built an early system for engineers to organize their work.
At Facebook, he helped invent the “like” button and ran Facebook’s Pages
project, which is a way for brands and celebrities to build networks. He was
frustrated, he said, building “an enormously ambitious project, and losing a lot
of time around coordination.”
Mr. Moskovitz, who was used to working one on one, was by then managing 200
engineers. His solution was something called “Tasks,” which is similar to what
became Asana, but it was mainly for engineers. Eventually the two men decided
that helping whole companies get things done might be something important that
they were good at doing, and they left Facebook to start Asana.
Mr. Moskovitz is uncomfortable with his outsize wealth. It remains a complex
legacy of the Facebook years, he says. What he finds far more interesting to
talk about is the ambition derived from having built something so big. “You
learn what an enterprise is capable of. Everything else measures against that,”
he said. “One of the purposes of life, and selfishly what makes people happy, is
building things that are impactful.”
Mr. Moskovitz left Facebook on good terms. He socializes with Mr. Zuckerberg,
who still gives Mr. Moskovitz credit for building much of Facebook.
Asana was released and tested on only a few companies in February 2011, then
more broadly last November, with several thousand users. The company has not
revealed the size of its user base, but said it had been growing rapidly.
Asana will compete with corporate networking products from fellow start-ups like
Jive Software and Yammer, as well as the offerings from big companies, like
Chatter, which is owned by Salesforce.com, and Socialcast, owned by VMWare.
These corporate social networks are now used by millions of employees.
The privately held Asana has a small fraction of that. Early adopters of Asana
include Foursquare, a location-based social network, and The Sacramento Bee,
where it is used in the online news department. “Having all the jobs you have to
do in one place definitely speeds up the amount we work, though,” said Sean
McMahon, director of digital media at The Bee. He still likes to oversee his
employees, though he can do it with a lighter hand than in the past.
Managers will probably have to learn new tasks when they use corporate social
software. “Businesses are in the midst of a retooling because of cloud
computing, social media, mobility and lots of data,” said Tony Zingale, chief
executive of Jive Software, the largest of the corporate social networks.
“Groups are starting to make decisions, and information to them has to be
filtered and personalized.”
Mr. Rosenstein, Asana’s co-founder, says people will have to learn to work
independently. “Each company will have to develop its own conventions,” he said.
“I spend a lot of time developing people, setting a vision, and explaining why
we do what we do.” For the faint of heart, Asana does offer tools for
centralized management.
For the bold, there are outcomes like Asana itself, where everyone can name and
assign tasks to anyone else, or kick them back to the originator if they do not
like what they were assigned.
Both Mr. Moskovitz and Mr. Rothstein say their job titles simply are “Asana,” as
are the titles for their 22 colleagues. Pay, however, still varies widely,
depending on qualifications and how early someone joined the company. Mr.
Moskovitz pays himself $33,280 a year, which his lawyers have advised him is
legally less risky for the company than a salary of $1 a year.
The title sharing is a pragmatic attempt at company building. “It wasn’t
uncommon for people to call themselves Googlers or Facebookers, so we just took
it further,” Mr. Moskovitz said. “We brought in people who could all be managers
elsewhere. If one person was named the manager, the rest would leave.”
For a company full of young, successful people that is run by a billionaire,
Asana is a remarkably hard-working and down-to-earth place — all the way down.
It is on the ground floor of a building that looks out on a parking lot of the
Society for the Prevention of Cruelty to Animals.
Instead of the fancy pool tables found in Google or the open bars and expensive
murals at Facebook, on the floor is a single game of the 1960s hit Twister — a
social game, and one particularly suited to a young and flexible work force.
From a Facebook Founder Comes a Way to
Streamline Work Flow, NYT, 20.5.2012,
http://www.nytimes.com/2012/05/21/technology/from-a-facebook-founder-a-social-network-for-the-office.html
Facebook Gold Rush: Fanfare vs. Realities
May 19, 2012
The New York Times
By GRETCHEN MORGENSON
IT’S an old line on Wall Street: If you can get your hands on
a hot new stock, you probably don’t want it.
This bit of Street wisdom came to mind last week, as Facebook went public amid
so much fanfare.
The stock eked out a 23-cent gain on its Day 1, to $38.23. This suggests that
many professional money managers viewed all the hype as just that. Whatever the
long-term prospects of this company — an issue over which reasonable people
reasonably disagree — the idea that small-time investors might get rich fast
struck the pros as absurd.
It is true that initial public offerings have increasingly become a game for
early investors and their Wall Street enablers. Since the 1980s, average
first-day gains on new stock issues have risen steadily. According to one 2006
study, the average first-day return on I.P.O.’s in the 1980s was 7 percent. By
the mid-1990s, it was 15 percent. In the 1999-2000 dot-com boom, it was 65
percent.
We all know how that last one turned out.
It’s no coincidence that as those averages were rising, individual investors
were becoming more enamored with the stock market. The great democratization of
the equity market, which began in the 1980s, lured small investors into the
game.
A lot of these people got burned. Academics at the Warrington College of
Business Administration at the University of Florida recently compiled a list of
about 250 companies that doubled — at least — in price on their first trading
day. Many quickly fell back to earth.
Going back to 1975, the list provides some of the greatest hits in I.P.O. land.
The top 10 first-day gainers all went public in the Internet boom. They included
VA Linux, which rose almost 700 percent, to a market capitalization of more than
$1 billion, and The Globe.com, which produced a gain of 606 percent on its first
day as a public company. Foundry Networks and WebMethods soared more than 500
percent.
Some of the companies on the list have disappeared or have been acquired. Others
are still around, to lesser and greater degrees. TheGlobe.com trades at less
than a penny a share. VA Linux is now called Geeknet and, as of Friday, had a
market value of $94 million.
Why did Facebook get a relatively slow start out of the trading gate? One
possibility is that the investment bankers who priced the stock considered the
history of private trading in the shares before the offering. Facebook was
unusual in this way, Laszlo Birinyi of Birinyi Associates pointed out last week.
“There was trading before the I.P.O., so many investors have some feel, some
idea of pricing,” he noted. Most offerings are priced based upon what the
company and its bankers guess the stock will fetch.
Indications are that Facebook was bought primarily by individual investors, not
institutions. Indeed, institutions that had invested early were big sellers in
the I.P.O. To many market veterans, this showed that the smart money was getting
out while the getting was good.
With investors still believing the advice of Peter Lynch, the former Fidelity
fund manager who told individuals to buy stocks of companies they knew as
consumers, it is easy to see why Facebook’s offering resonated with the public.
But now comes the hard part: operating as a company that returns its investors’
favors with actual earnings.
Facebook Gold Rush: Fanfare vs. Realities,
NYT, 19.5.2012,
http://www.nytimes.com/2012/05/20/business/in-facebook-stock-rush-fanfare-vs-realities.html
Facebook’s Prospects May Rest on Trove of Data
May 14, 2012
The New York Times
By SOMINI SENGUPTA
SAN FRANCISCO — Mark Zuckerberg, Facebook’s chief, has managed
to amass more information about more people than anyone else in history.
Now what?
As Facebook turns to Wall Street in the biggest public offering ever by an
Internet company, it faces a new, unenviable test: how to keep growing and
enriching its hungry new shareholders.
The answer lies in what Facebook will be able to do — and how quickly — with its
crown jewel: its status as an online directory for a good chunk of the human
race, with the names, photos, tastes and desires of nearly a billion people.
Facebook’s shares are expected to begin trading as early as this week. Already,
lots of investors are scrambling to buy those shares, with giddy hopes that it
will become a big moneymaker like Google. Because of that high demand, Facebook
is expected to increase its offering price from its initial range, giving the
company a valuation possibly as high as $104 billion.
In the eight years since it sprang out of a Harvard dorm room, Facebook has
signed up users at breakneck speed, kept them glued to the site for longer
stretches of time and turned a profit by using their personal information to
customize the ads they see.
Whether it can spin that data into enough gold to justify a valuation of as much
as $104 billion remains unclear.
“We know Facebook has an awful lot of data, but what they have not worked out
yet is the most effective means of using that data for advertising,” said
Catherine Tucker, a professor of marketing at the Sloan School of Management at
the Massachusetts Institute of Technology. “They are going to have to experiment
a lot more.”
Analysts, investors and company executives can rattle off any number of
challenges facing the company. As it works to better match ads to people, it has
to avoid violating its users’ perceived sense of privacy or inviting regulatory
scrutiny. It needs to find other ways to generate revenue, like allowing people
to buy more goods and services with Facebook Credits, a kind of virtual
currency. Most urgently it has to make money on mobile devices, the window to
Facebook for more and more people.
All the while, its ability to innovate with new features and approaches — to
“break things,” in the words of Mr. Zuckerberg — may be markedly constrained
once it has investors to answer to.
“They are going to have to think about whether they can continue with the motto
‘Done is better than perfect,’ ” said Susan Etlinger, an industry analyst at the
Altimeter Group. “When you’re operating as a public company, life is very
different. We haven’t seen that play out yet. It’s going to take a few quarters
to figure out what a public Facebook is going to look like.”
Skeptics point out that the company’s revenue growth showed signs of slowing in
the first quarter of 2012. And a Bloomberg survey of 1,253 investors, analysts
and traders found that a substantial majority were dubious about the eye-popping
valuation Facebook was seeking. “It’s a risky asset. No doubt about that,” said
Brian Wieser, of Pivotal Research Group. “Google was less risky.” No matter. Mr.
Wieser says he thinks that Facebook is worth $83 billion and that its revenue
will grow by at least 30 percent for the next five years.
The comparisons to Google are inevitable. When that company went public in 2004,
there were so many doubters that the company lowered its offering price to $85 a
share. It closed at just over $100 on the first day of trading, and now sells
for more than $600. Facebook is farther along than Google was in terms of
revenue, having brought in nearly $4 billion last year, or $5.11 a user,
compared with Google’s $2 billion in 2003.
One Facebook investor, who spoke on the condition of anonymity because of market
regulations as the offering draws near, noted that when Google went public it
already had a clear business strategy. By contrast, he described Facebook this
way: “They have built an incredibly valuable asset — as opposed to a business
they have executed well.”
The most pressing issue for Facebook executives may be the mobile challenge.
Already, over half of Facebook’s 901 million users access the site through
mobile devices. In regulatory filings, the company says mobile use is growing
fastest in some of Facebook’s largest markets, including the United States,
India and Brazil. Facebook goes on to acknowledge that it makes little to no
money on mobile and that “our ability to do so successfully is unproven.”
There is not much space on mobile screens to show advertisements. And Google and
Apple, two of Facebook’s biggest rivals, control the basic software on most
smartphones, which could make it harder for the company to make inroads there.
Facebook’s response to this challenge so far has been to aggressively acquire
companies focused on mobile, including Instagram, for which it paid $1 billion
in April. But it warned in a revision to its offering documents last week that
the mobile shift meant it was adding users faster than it was increasing the
number of ads it displayed.
What Facebook already has — more than any other digital company — is a
spectacularly rich vault of information about its users, who cannot seem to stay
away from the site. Americans, on average, now spend 20 percent of their online
time on Facebook alone, thanks to the ever-growing menu of activities the
company has introduced, from playing games to sampling music to posting pictures
of baby showers and drunken escapades. Some 300 million photos are uploaded to
the site daily.
How Facebook exploits its users’ information — and how those users react — is
the next reckoning. David Eastman, worldwide digital director for the
advertising agency JWT, said Facebook would need to give marketers more data
about what kinds of users click on what kinds of advertising, and about their
travels on the Internet before and after they click on an ad. Most brands want
to have a presence on Facebook, he said, but they do not quite understand who
sees their pitches and whether they lead to greater sales.
“They need to make the data work more,” Mr. Eastman said. “They need to provide
deeper data. Right now the value of Facebook advertising is largely unknown.”
While the bulk of Facebook’s revenue comes from North America, it is banking on
international growth. The company has expanded its global footprint so rapidly
that four out of five Facebook users are now outside the United States. It is
the dominant social network in large emerging markets like Brazil and India,
though it shows no signs of penetrating China — where it would face not only
government censorship but stiff competition from homegrown social networks.
Mr. Zuckerberg, who has studied Mandarin, signaled his ambitions to crack the
vast Chinese market as far back as 2010. He suggested that Facebook would first
try to advance deeper into markets like Russia and Japan before it took on a
country as “complex” as China.
With international growth comes international regulatory headaches. Facebook
already faces audits in Europe on whether the company is living up to promises
made to consumers about how it uses their data — and now, a stringent new data
protection law. In India, it has been sued for spreading offensive content. And
in the United States, it faces privacy audits by the Federal Trade Commission
for the next 20 years. In its offering documents, Facebook repeatedly warns of
legislative and regulatory scrutiny over user privacy, “which may adversely
affect our reputation and brand.”
Maintaining brand loyalty is excruciatingly difficult in the Internet business.
Across Silicon Valley, investors are plotting the next big thing in social
networks. Already, the clock may be ticking for Facebook.
“There is no consumer-facing Internet brand or site that ever keeps consumers’
attention for more than 10 years,” said Tim Chang, a managing director at
Mayfield Fund. “It is not hard to imagine that in 10 years, people are going to
be off of Facebook even.”
Mr. Zuckerberg has an answer to that. In the video for investors released this
month, Mr. Zuckerberg hinted at the ambitions he had for the company. Facebook,
in his vision, will hook itself into the rest of the Web, making itself
indispensable. Already Facebook serves as a de facto Internet passport, allowing
users to log in with their Facebook identities and explore millions of other Web
sites and applications.
“I think that we’re going to reach this point where almost every app that you
use is going to be integrated with Facebook in some way,” Mr. Zuckerberg says in
the video. “We make decisions at Facebook not optimizing for what is going to
happen in the next year, but what’s going to set us up for this world where
every product experience you have is social, and that’s all powered by
Facebook.”
Facebook’s Prospects May Rest on Trove of
Data, NYT, 14.5.2012,
http://www.nytimes.com/2012/05/15/technology/facebook-needs-to-turn-data-trove-into-investor-gold.html
Data Harvesting at Google Not a Rogue Act, Report Finds
April 28, 2012
The New York Times
By DAVID STREITFELD
SAN FRANCISCO — Google’s harvesting of e-mails, passwords and
other sensitive personal information from unsuspecting households in the United
States and around the world was neither a mistake nor the work of a rogue
engineer, as the company long maintained, but a program that supervisors knew
about, according to new details from the full text of a regulatory report.
The report, prepared by the Federal Communications Commission after a 17-month
investigation of Google’s Street View project, was released, heavily redacted,
two weeks ago. Although it found that Google had not violated any laws, the
agency said Google had obstructed the inquiry and fined the company $25,000.
On Saturday, Google released a version of the report with only employees’ names
redacted.
The full version draws a portrait of a company where an engineer can easily
embark on a project to gather personal e-mails and Web searches of potentially
hundreds of millions of people as part of his or her unscheduled work time, and
where privacy concerns are shrugged off.
The so-called payload data was secretly collected between 2007 and 2010 as part
of Street View, a project to photograph streetscapes over much of the civilized
world. When the program was being designed, the report says, it included the
following “to do” item: “Discuss privacy considerations with Product Counsel.”
“That never occurred,” the report says.
Google says the data collection was legal. But when regulators asked to see what
had been collected, Google refused, the report says, saying it might break
privacy and wiretapping laws if it shared the material.
A Google spokeswoman said Saturday that the company had much stricter privacy
controls than it used to, in part because of the Street View controversy. She
expressed the hope that with the release of the full report, “we can now put
this matter behind us.”
Ever since information about the secret data collection first began to emerge
two years ago, Google has portrayed it as the mistakes of an unauthorized
engineer operating on his own and stressed that the data was never used in any
Google product.
The report, quoting the engineer’s original proposal, gives a somewhat different
impression. The data, the engineer wrote, would “be analyzed offline for use in
other initiatives.” Google says this was never done.
The report, which was first published in its unredacted form by The Los Angeles
Times, also states that the engineer, who began the project as part of his “20
percent” time that Google gives employees to do work on their own initiative,
“specifically told two engineers working on the project, including a senior
manager, about collecting payload data.”
As early as 2007, the report says, Street View engineers had “wide access” to
the plan to collect payload data. Five engineers tested the Street View code, a
sixth reviewed it line by line, and a seventh also worked on it, the report
says.
Privacy advocates said the full report put Google in a bad light.
“Google’s rogue engineer scenario collapses in light of the fact that others
were aware of the project and did not object,” said Marc Rotenberg, executive
director of the Electronic Privacy Information Center. “This is what happens in
the absence of enforcement and the absence of regulation.”
The Street View program used special cars outfitted with cameras. Google first
said it was just photographing streets and did not disclose that it was
collecting Internet communications called payload data, transmitted over Wi-Fi
networks, until May 2010, when it was confronted by German regulators.
Eventually, it was forced to reveal that the information it had collected could
include the full text of e-mails, sites visited and other data.
Even if a user was not working on a computer at the moment the Street View car
slowly passed, if the device was on and the network was unencrypted, all sorts
of information about what the user had been doing could be scooped up, data
experts say.
“So how did this happen? Quite simply, it was a mistake,” a Google executive
wrote on a company blog in 2010. “The project leaders did not want, and had no
intention of using, payload data.”
But according to the report, the engineer suggested in his proposal that it was
entirely intentional: “We are logging user traffic along with sufficient data to
precisely triangulate their position at a given time, along with information
about what they were doing.”
Attending to paperwork did not seem to be a high priority, however. Managers of
the Street View project told F.C.C. investigators that they never read the
engineer’s proposal, called a design document. A senior manager of Street View
said he “preapproved” the document before it was written.
More than a dozen countries began investigations of Street View in 2010. In the
United States, the Justice Department, the Federal Trade Commission, state
attorneys general and the F.C.C. looked into the matter.
The engineer at the center of the project cited the Fifth Amendment protection
against self-incrimination. Because F.C.C. investigators could not interview
him, they said there were still unresolved questions about the case.
Data Harvesting at Google Not a Rogue Act,
Report Finds, NYT, 28.4.2012,
http://www.nytimes.com/2012/04/29/technology/google-engineer-told-others-of-data-collection-fcc-report-reveals.html
Following the Breadcrumbs on the Data-Sharing Trail
April 28, 2012
The New York Times
By NATASHA SINGER
WOULD you like to donate to the Obama campaign? Sign up for a
college course? Or maybe subscribe to Architectural Digest?
If you have ever felt inundated by such solicitations, by e-mail or by snail
mail, you may have wondered what you did to deserve it.
I did.
I wondered how all those campaigns, companies and institutions got my number.
And how much money data brokers behind the scenes might make by flipping my name
and address.
Turns out there’s no easy way for consumers in the United States to track the
data dealers who profile our spending, Web browsing and social media habits, the
better to sell us stuff. Although the Federal Trade Commission issued a consumer
privacy report last month urging companies that collect and share customer
information to give people more notification and control over the proliferation
of their personal details, the recommendations don’t have the force of binding
regulations.
So, without a right to compel vendors to show me where my data goes, I decided
to do some profiling of my own.
I subscribed to a half-dozen print magazines last year, signing up for each with
a different typo in my name or variation in my address. Then I collected the
direct mail that resulted, tracking the solicitations back to the publishers who
had shared my erroneous contact information.
Admittedly, it was unscientific. But I figured this little off-line experiment
might provide insight into an even more opaque world — online behavioral
targeting — where ad networks deliver tailored marketing pitches to people based
on their location, search queries, online purchases and the like.
Here are the results:
Natawsha, the name under which I had subscribed to Wired and The New Yorker, got
hit up for a donation to Literacy Partners, a tutoring company in Manhattan, and
received a bulletin from the New-York Historical Society.
Nafasha, who signed up for Fast Company, received solicitations from Forbes. The
mangled address I had submitted to Foreign Policy received a cascade of mail
from, among others, the World Monuments Fund, Barron’s and the Kiplinger Letter.
And a subscription to The New York Review of Books led to solicitations from the
Central Park Conservancy, the New York Public Library and The New York Times —
and, on behalf of President Obama’s 2012 campaign, an appeal from Michelle
Obama.
“It is revenue-producing for a publisher to collect subscribers’ information and
sell it,” said Paul Stephens, the director of policy and advocacy at the Privacy
Rights Clearinghouse, a consumer group in San Diego. “It’s just information that
is very valuable to advertisers who want to target individuals based on their
interests.”
INDEED, the Direct Marketing Association, a trade group, has estimated that
spending on direct marketing in the United States reached $163 billion in 2011.
Still, a report earlier this year from the White House, laying out a privacy
bill of rights for consumers, implicates the decades-old practice of
list-sharing, among others. The report says consumers have a right to expect
that companies will collect, use and share information in ways consistent with
the context in which people provided it.
In other words, if you subscribe to a magazine, you might reasonably expect to
receive offers from magazines owned by the same publishing house, said Nancy J.
King, a privacy law expert who is an associate professor at Oregon State
University’s College of Business.
“But you probably would not have expected a magazine to share your information
with a political campaign” that has inferred your political preferences from
your choice of periodicals, Professor King said.
Of course, publishers are hardly the only businesses sharing and selling
consumer information. In the United States, with the exception of specific
sectors like credit and health care, companies are free to use their customers’
data as they deem appropriate. That means every time a person buys a car or a
house, takes a trip or stays in a hotel, signs up for a catalog or shops online
or in a mall, his or her name might end up on a list shared with other
marketers. That can happen directly, or through middlemen known as list brokers
and data brokers.
The ultimate purpose of all this sharing and profiling is to personalize
marketing, using analytics to predict the offers most likely to interest
consumers based on their past behavior, says Linda A. Woolley, the executive
vice president of Washington operations at the Direct Marketing Association.
“Sometimes the analytics are right; sometimes they are wrong,” Ms. Woolley said.
“The industry exists to try to perfect those guesses.”
For those who’d rather not receive such offers, she said, the trade group offers
a dedicated Web site, dmachoice.org, where people can opt out of getting all
kinds of direct mail or specific categories of it, like credit card offers.
But Christopher Olsen, the assistant director of privacy and identity protection
in the Federal Trade Commission’s bureau of consumer protection, said companies
ought to notify their customers if they plan to share information about them
with third parties — rather than simply permitting people to opt out after the
fact. Indeed, the agency’s recent report calls on industry to be more
transparent with consumers.
“If your name is flying around the ether because you have subscribed to a
magazine,” Mr. Olsen said, “you ought to understand who has got that information
and whether you have a choice about its onward distribution.”
ALTHOUGH all of the magazines contacted for this article said their subscribers
could opt out, some publishers took a more active approach than others to
notifying readers of their practices.
Natalie Raabe, a spokeswoman for The Atlantic, for example, said the magazine
occasionally allows companies it has screened to contact subscribers about
products or services that may be of interest. But the magazine does not share
subscriber addresses directly with these companies, she said; it uses a third
party to administer the process.
A spokeswoman for Condé Nast, publisher of The New Yorker, said it adhered to
industry best practices and offered subscribers multiple ways to opt out.
Diane R. Seltzer, list manager at The New York Review of Books, vets all
proposals from companies that want to market to subscribers to ensure the offers
are appropriate. Those making the cut are charged a rental fee of $105 per 1,000
names for one-time use, she said. The publication runs an ad in every issue, she
added, notifying subscribers of this practice and explaining how to opt out.
“We are very proactive in trying to keep subscribers happy,” she said.
In light of the new federal privacy reports, however, at least one publisher
said it might halt, or at least further limit, the selling of its subscriber
list.
“I think media companies are going to have to tackle this issue,” said David
Rothkopf, the new chief executive of Foreign Policy. Two months into the job, he
said, he had hired a new circulation director and intended to review his
magazines’ list-sharing policy: “I think there are people out there who don’t
want to be part of some giant circulating mailing list.”
Following the Breadcrumbs on the
Data-Sharing Trail, NYT, 28.4.2012,
http://www.nytimes.com/2012/04/29/business/on-the-data-sharing-trail-try-following-the-breadcrumbs.html
Facebook Offers More Disclosure to Users
April 12, 2012
The New York Times
By KEVIN J. O’BRIEN
Facebook, seeking to address concerns about the personal
information it collects on its users, said Thursday that it would provide any
user with more about the data it tracks and stores.
In a posting on its privacy blog, Facebook said the expanded archive feature
would be introduced gradually to its 845 million monthly active users. It goes
beyond the first archive made available in 2010, which has been criticized as
incomplete by privacy advocates and regulators in Europe.
The archive Facebook published two years ago gave users a copy of their photos,
posts, messages, list of friends and chat conversations. The new version,
Facebook said, includes previous user names, friend requests and the Internet
protocol addresses of the computers that users have logged in from. More
categories of information will be made available in the future, Facebook said.
Online social networks offer free services to users and make money primarily
through advertising, which can often be directed more effectively using the
information the network has collected on them.
Facebook, which is preparing for an initial public stock offering, most likely
in May, has been trying to accommodate government officials in Europe, where
privacy laws are more stringent than in the United States.
Facebook’s data collection practices have tested the boundaries of Europe’s
privacy laws. The social networking site, based in Menlo Park, Calif., is
Europe’s leading online network, according to comScore, a research firm in
Reston, Va.
In December, the Irish Data Protection Commission reached an agreement with
Facebook, which runs its international businesses from offices in Dublin, to
provide more information to its users and amend its data protection practices.
“We took up their recommendation to make more data available to Facebook users
through this expanded functionality,” the company said in a statement.
Facebook agreed to make those changes by July. In Europe, 40,000 Facebook users
have already requested a full copy of the data that the site has compiled on
each of them, straining the company’s ability to respond. Under European privacy
law, the company must comply with the requests within 40 days.
Max Schrems, the German law student who filed the complaint leading to the
agreement with the Irish authorities, criticized Facebook’s latest offer as
insufficient.
“We welcome that Facebook users are now getting more access to their data, but
Facebook is still not in line with the European Data Protection Law,” said Mr.
Schrems, a student at the University of Vienna. “With the changes, Facebook will
only offer access to 39 data categories, while it is holding at least 84 such
data categories about every user.”
In 2011, Mr. Schrems requested his own data from Facebook and received files
with information in 57 categories. The disclosure, Mr. Schrems said, showed that
Facebook was keeping information he had previously deleted from the Web site,
and was also storing information on his whereabouts, gleaned from his computer’s
I.P. address.
Facebook’s data collection practices are being scrutinized in Brussels as
European Union policy makers deliberate on changes to the European Data
Protection Directive, which was last revised in 1995. The commissioner
responsible for the update, Viviane Reding, has cited Facebook’s data collection
practices in pushing for a requirement that online businesses delete all
information held on individuals at the user’s request.
Ulrich Börger, a privacy lawyer with Latham & Watkins in Hamburg, said he
thought it was unlikely that the European Union would enact laws that would
significantly restrict the use of customized advertising, which is at the core
of the business model for Web sites like Facebook. It is more likely, Mr. Börger
said, that lawmakers would require Facebook and other networking sites to revise
their consent policies to make them more easy to understand. But it was unlikely
that Facebook would be legally prevented from using information from individuals
who sign up for the service.
“I don’t see any fundamental change,” Mr. Börger said. “It comes back to the
question of consent. They cannot go so far as to prohibit things that people are
willing to consent to. That would violate an individual’s freedom to receive
services they want to receive.”
Facebook Offers More Disclosure to Users,
12.4.2012,
http://www.nytimes.com/2012/04/13/technology/facebook-offers-more-disclosure-to-users.html
A Billion-Dollar Turning Point for Mobile Apps
April 10, 2012
The New York Times
By JENNA WORTHAM
The path for Internet start-ups used to be quite clear:
establish a presence on the Web first, then come up with a version of your
service for mobile devices.
Now, at a time when the mobile start-up Instagram can command $1 billion in a
sale to Facebook, some start-ups are asking: Who needs the Web?
Smartphones are everywhere now, allowing apps like Foursquare and Path to be
self-contained social worlds, existing almost entirely on mobile devices. It is
a major change from just a few years ago, underscoring how the momentum in the
tech world is shifting to mobile from computers.
In that context, the Instagram deal looks like something of a turning point, as
even the Web giant Facebook tries to get a better grasp on a market that
requires a rethinking of old rules.
“For decades, the center of computing has been the desktop, and software was
modeled after the experience of using a typewriter,” said Georg Petschnigg, a
former Microsoft employee who is one of the creators of Paper, a new sketchbook
app for the iPad. “But technology is now more intimate and pervasive than that.
We have it with us all the time, and we have to reimagine innovative new
interfaces and experiences around that.”
Venture capitalists are eager to get in on the mobile trend. According to the
research firm CB Insights, mobile apps and companies attracted 10 percent of the
total investment dollars from American venture capital firms in last year’s
fourth quarter, and 12 percent of deals were mobile-related, up from 7 or 8
percent in previous quarters.
Ben Lerer, manager of the venture capital firm Lerer Ventures, said he preferred
to back companies that were building services for mobile first and the Web
second, because “businesses that are thinking that way are planning for the
future.”
Mr. Lerer was one of the early investors in OMGPop, a New York company that was
close to shutting down until it had an overnight hit in Draw Something, a twist
on Pictionary for the iPhone. Last month, OMGPop was snapped up for $200 million
by the game company Zynga, which has been trying to reduce its dependence on
Facebook-based games like FarmVille.
Another hit game, Angry Birds from the Finnish company Rovio, started out on the
iPhone before migrating to computers and video game consoles — an unusual
trajectory in the game world.
Cellphones are also prompting a shift in how people want to share things online,
creating a market for apps that make instant sharing easy, said S. Shyam Sundar,
a director of the Media Effects Research Lab at Pennsylvania State University.
In other words, many people want to post a photograph of themselves right from a
sun-drenched beach in Bali, rather than waiting until they are back home to
upload all 50 pictures onto Facebook.
“People are living in the moment and they want to share in the moment,”
Professor Sundar said. “Mobile gives you that immediacy and convenience.”
Instagram, a social network focusing on just that kind of instant photo sharing,
does have a Web site — but it is essentially there just to encourage people to
download the company’s apps. It is one of several social networks that have
established themselves entirely on mobile. Another is Foursquare, which lets
users share their location with a select few friends and has attracted nearly 15
million members.
“Mobile-first is the direction that many social networks are headed,” said
Holger Luedorf, the company’s head of business development. If done right, he
said, such services start to feel “baked into” the phone itself.
Dave Morin, who was at Facebook early on and left to create Path, a social
network for mobile phones, said he realized that the world was headed for a
mobile-centric future in 2009, when the influential analyst Mary Meeker
published a report saying that more people would soon connect to the Internet on
mobile devices than on personal computers.
Path does not release user numbers, but its app appears to have traction,
particularly among people who have become disenchanted with Facebook. “Because
you take your smartphone with you everywhere, you can quickly and easily take a
photo or video, map your location or jot down a note or a thought,” Mr. Morin
said.
Companies that start with a Web site then try to shrink it into an app face a
tough challenge. Screen space on mobile devices is at a premium. And to avoid
turning off users, designers and developers have to cut back on clutter and
streamline their services, avoiding slow load times and stuttering
interruptions.
Start-ups that put their resources into mobile from the beginning can skip some
of the hassles. “You’re freed from worrying about so many of the things that you
have to think about when it comes to Web development,” said Oliver Cameron, one
of the founders of Everyme, an app introduced Tuesday that analyzes a user’s
contacts and generates miniature social networks around people it thinks belong
together.
Then there is the relative ease in finding an audience. Web sites and software
packages have trouble standing out in the crowd. But apps have a simple
distribution mechanism in app stores, which can immediately bring an app to a
customer’s attention. “In February we had close to 900,000 downloads,” said
Andreas Schobel, chief executive of Catch, a start-up in San Francisco that
makes a note-taking app. “How would we do that on the Web?”
Mobile apps tailored to work for specific devices like the iPhone also run
faster than Web sites, Mr. Schobel noted. “When you’re on the phone you need the
experience to be instantaneous,” he said. “You just can’t do that yet on the
Web.”
Brian X. Chen contributed reporting.
A Billion-Dollar Turning Point for Mobile
Apps, NYT, 10.4.2012,
http://www.nytimes.com/2012/04/11/technology/instagram-deal-is-billion-dollar-move-toward-cellphone-from-pc.html
Warned of an Attack on the Internet, and Getting Ready
March 30, 2012
The New York Times
By SOMINI SENGUPTA
SAN FRANCISCO — On a quiet Sunday in mid-February, something
curious attracted the attention of the behind-the-scenes engineers who scour the
Internet for signs of trouble. There, among the ubiquitous boasts posted by the
hacking collective Anonymous, was a call to attack some of the network’s most
crucial parts.
The message called it Operation Global Blackout, and rallied Anonymous
supporters worldwide to attack the Domain Name System, which converts
human-friendly domain names like google.com into numeric addresses that are more
useful for computers.
It declared when the attack would be carried out: March 31. And it detailed
exactly how: by bombarding the Domain Name System with junk traffic in an effort
to overwhelm it altogether.
There was no way to know for sure whether this was a pre-April Fool’s Day hoax
or a credible threat. After all, this was Anonymous, a decentralized movement
with no leaders and no coherent ideology, but a track record of considerable
damage. The call to arms would have to be treated as one would treat a bomb
threat called in to a high school football game. The engineers would have to
prepare.
Those preparations turned into a fast-track, multimillion-dollar global effort
to beef up the Domain Name System. They offer a glimpse into the largely unknown
forces that keep the Internet running in the face of unpredictable, potentially
devastating threats.
Among those leading the effort was Bill Woodcock, whose nonprofit based in San
Francisco, Packet Clearing House, defends vital pieces of Internet
infrastructure. By his calculation, the Anonymous threat was as good a reason as
any to accelerate what might have been done anyway over the next several months:
fortify the network, chiefly by expanding the capacity of the root servers that
are its main pillar.
“Whether or not Anonymous carries out this particular attack, there are larger
attacks that do happen,” Mr. Woodcock said. “A forewarning of this attack
allowed everyone to act proactively for a change. We can get out in front of the
bigger attacks.”
In an attack, the hackers would in effect point virtual cannons at the name
servers and blast them with data in what is called a distributed denial of
service attack, or DDoS. The only effective way to mitigate such an attack is to
expand capacity — so much so that the system can absorb the extra traffic thrown
at it, while still accommodating the normal load.
“DDoS is very much a numbers game,” Mr. Woodcock said. “If the target has more
than the sum of the attackers’ capability and normal day-to-day traffic, then it
is fine.”
In the last few weeks, in a campaign financed mostly by companies that maintain
Internet infrastructure, several huge 40-gigabit routers and hundreds of servers
have been shipped across the world and hooked into the network, giving the
Domain Name System additional computing power. It was part of what is often
called an arms race between attackers and defenders on the Internet.
On Saturday, if an attack takes place, it is likely to be imperceptible, at
least initially, to the bulk of the world’s Internet users, though service could
slow down in places that have narrow bandwidth to begin with — much of
sub-Saharan Africa, for instance. In the improbable event of a huge attack that
goes unabated for several days, the ability to connect to Web sites could be
impaired.
But if the defenses are effective, the result will be something akin to what
happened with the Y2K bug: advance warning, plenty of preparation and then
barely a blip on the Internet.
Still, it will be anything but a normal Saturday for the people who run the
Domain Name System. They plan to be glued to their monitors, looking out for
signs of unusual network traffic, communicating with one other through
encrypted, digitally signed e-mails or through a private telephone hot line
maintained just for this purpose.
“For us, it’s not going to be another day at the office,” said Paul Vixie, whose
nonprofit Internet Systems Consortium in Redwood City, Calif., runs a root
server known as the F-root. “We are going to be on alert.”
There are 13 root servers worldwide, run by government institutions,
universities and private companies. The operators of several of them declined to
talk about the threat, including VeriSign, which runs two root servers. Some
insisted that they routinely expand capacity to guard against attacks that come
from different quarters all the time.
Mr. Vixie, for his part, warned against what he called “panic engineering” in
the face of any particular threat. “We are using the threatened attack,” he
said, “to go kick the tires on everything, make sure there’s no loose dangly
parts.”
Part of the challenge here is the mercurial and leaderless nature of the
Anonymous movement. Just after one so-called Anonymous member called for the
attack to protest, among other things, “our irresponsible leaders and the
beloved bankers who are starving the world for their own selfish needs out of
sheer sadistic fun,” another unnamed member of the movement pushed back. “I
don’t think this is a good idea,” this person wrote on an Anonymous-affiliated
site. “The collateral damage is not worth it.”
A pragmatist wondered how participants would know when to end the attack, if
indeed the Domain Name System was overwhelmed. Another suggested that they
attack only “the 10 most used sites.” Yet another reckoned that root servers
would be so heavily protected that an Anonymous attack could only disrupt them
for “a few minutes.”
Since late February, there has been little to no chatter about Operation Global
Blackout on Twitter, which Anonymous often uses to spread the word about its
campaigns.
Even so, computer security professionals point out, anyone can act in the name
of Anonymous, and Anonymous has certainly swung its wrecking ball around in the
last few years: its denial of service attacks have impaired private sites like
that of PayPal, and some of its offshoots have penetrated the e-mail
communications of global law enforcement agencies.
Dan Kaminsky, a security researcher who pointed out the inherent vulnerabilities
of the Domain Name System several years ago, put the probability of an effective
attack this way: as unlikely as a shark descending from the sky, jaws open.
Nevertheless, on the Internet, no warning should go unheeded, he said: “It is
belt-and-suspenders stuff: Is everything where it should be? You have to be
ready for disaster.”
Warned of an Attack on the Internet, and
Getting Ready, NYT, 30.3.2012,
http://www.nytimes.com/2012/03/31/technology/with-advance-warning-bracing-for-attack-on-internet-by-anonymous.html
A Surge in Learning the Language of the Internet
March 27, 2012
The New York Times
By JENNA WORTHAM
Parlez-vous Python? What about Rails or JavaScript? Foreign
languages tend to wax and wane in popularity, but the language du jour is
computer code.
The market for night classes and online instruction in programming and Web
construction, as well as for iPhone apps that teach, is booming. Those jumping
on board say they are preparing for a future in which the Internet is the
foundation for entertainment, education and nearly everything else. Knowing how
the digital pieces fit together, they say, will be crucial to ensuring that they
are not left in the dark ages.
Some in this crowd foster secret hopes of becoming the next Mark Zuckerberg. But
most have no plans to quit their day jobs — it is just that those jobs now
require being able to customize a blog’s design or care for and feed an online
database.
“Inasmuch as you need to know how to read English, you need to have some
understanding of the code that builds the Web,” said Sarah Henry, 39, an
investment manager who lives in Wayne, Pa. “It is fundamental to the way the
world is organized and the way people think about things these days.” Ms. Henry
took several classes, including some in HTML, the basic language of the Web, and
WordPress, a blogging service, through Girl Develop It, an organization based in
New York that she had heard about online that offers lessons aimed at women in a
number of cities. She paid around $200 and saw it as an investment in her
future.
“I’m not going to sit here and say that I can crank out a site today, but I can
look at basic code and understand it,” Ms. Henry said. “I understand how these
languages function within the Internet.” Some see money to be made in the
programming trend.
After two free computer science classes offered online by Stanford attracted
more than 100,000 students, one of the instructors started a company called
Udacity to offer similar free lessons. Treehouse, a site that promises to teach
Web design, picked up financing from Reid Hoffman, the founder of LinkedIn, and
other notable early investors.
General Assembly, which offers workroom space for entrepreneurs in New York, is
adding seven classrooms to try to keep up with demand for programming classes,
on top of the two classrooms and two seminar rooms it had already. The company
recently raised money from the personal investment fund of the Amazon founder
Jeff Bezos and DST Global, which backed Facebook.
The sites and services catering to the learn-to-program market number in the
dozens and have names like Code Racer, Women Who Code, Rails for Zombies and
CoderDojo. But at the center of the recent frenzy in this field is Codecademy, a
start-up based in New York that walks site visitors through interactive lessons
in various computing and Web languages, like JavaScript, and shows them how to
write simple commands.
Since the service was introduced last summer, more than a million people have
signed up, and it has raised nearly $3 million in venture financing.
Codecademy got a big break in January when Michael R. Bloomberg, the mayor of
New York, made a public New Year’s resolution to use the site to learn how to
code. The site is free. Its creators hope to make money in part by connecting
newly hatched programmers with recruiters and start-ups.
“People have a genuine desire to understand the world we now live in,” said Zach
Sims, one of the founders of Codecademy. “They don’t just want to use the Web;
they want to understand how it works.”
The blooming interest in programming is part of a national trend of more people
moving toward technical fields. According to the Computing Research Association,
the number of students who enrolled in computer science degree programs rose 10
percent in 2010, the latest year for which figures are available.
Peter Harsha, director of government affairs at the association, said the figure
had been steadily climbing for the last three years, after a six-year decline in
the aftermath of the dot-com bust. Mr. Harsha said that interest in computer
science was cyclical but that the current excitement seemed to be more than a
blip and was not limited to people who wanted to be engineers.
“To be successful in the modern world, regardless of your occupation, requires a
fluency in computers,” he said. “It is more than knowing how to use Word or
Excel but how to use a computer to solve problems.”
That is what pushed Rebecca Goldman, 26, a librarian at La Salle University in
Philadelphia, to sign up for some courses. She said she had found herself
needing basic Web development skills so she could build and maintain a Web site
for the special collections department she oversees.
“All librarians now rely on software to do our jobs, whether or not we are
programmers,” Ms. Goldman said. “Most libraries don’t have an I.T. staff to set
up a server and build you a Web site, so if you want that stuff done, you have
to do it yourself.”
The challenge for Codecademy and others catering to the hunger for technical
knowledge is making sure people actually learn something, rather than dabble in
a few basic lessons or walk away in frustration.
“We know that we’re not going to turn the 99 percent of people interested in
learning to code into the 1 percent who are really good at it,” said Mr. Sims of
Codecademy. “There’s a big difference between being code-literate and being a
good programmer.”
Some who have set their sights on learning to program have found it to be a
steep climb. Andrew Hyde, 27, who lives in Boulder, Colo., has worked at
start-ups and is now writing a travel book. He said he leaped at the chance to
take free coding classes online.
“If you’re working around start-ups and watching programmers work, you’re always
a little bit jealous of their abilities,” he said. But despite his enthusiasm,
he struggled to translate the simple commands he picked up through Codecademy
into real-world development. “It feels like we’re going to be taught how to
write the great American novel, but we’re starting out by learning what a noun
is,” he said.
Mr. Sims said he was aware of such criticisms and that the company was working
to improve the utility of its lessons.
Seasoned programmers say learning how to adjust the layout of a Web page is one
thing, but picking up the skills required to develop a sophisticated online
service or mobile application is an entirely different challenge. That is the
kind of technical education that cannot be acquired by casual use for a few
hours at night and on the weekends, they say.
“I don’t think most people learn anything valuable,” said Julie Meloni, who
lives in Charlottesville, Va., and has written guides to programming. At best,
she said, people will learn “how to parrot back lines of code,” when they really
need “knowledge in context to be able to implement commands.”
Even so, Ms. Meloni, who has been teaching in the field for over a decade, said
she found the groundswell of interest in programming, long considered too
specialized and uncool, to be an encouraging sign.
“I’m thrilled that people are willing to learn code,” she said. “There is value
here. This is just the first step.”
This article has been revised to reflect the following
correction:
Correction: March 27, 2012
An online summary for this article misspelled the name of the company started by
Zach Sims and Ryan Bubinski. It is Codecademy, not Codeacademy. An earlier
version also misstated the employer of Rebecca Goldman as Drexel University.
A Surge in Learning the Language of the
Internet, NYT, 27.3.2012,
http://www.nytimes.com/2012/03/28/technology/for-an-edge-on-the-internet-computer-code-gains-a-following.html
With Video,
Obama Looks to Expand Campaign’s Reach
Through Social Media
March 14, 2012
The New York Times
By JEREMY W. PETERS
When presidential candidates have a message they want voters
to hear far and wide, they have typically turned to that old campaign standby:
the television ad.
But as President Obama and his advisers prepare to begin their general election
push, they are turning first not to a 30-second commercial but a 17-minute
online documentary that they hope will be shared and spread online through
social networks and e-mail.
When the Tom Hanks-narrated, Hollywood-style documentary, called “The Road We’ve
Traveled,” is set to go online Thursday night, it will appear on a new YouTube
platform that enables the Obama campaign to turn the passive experience of
watching a video into an organizing and fund-raising tool. The technology will
allow viewers to post campaign content to their Facebook pages, volunteer and
donate all without having to leave Mr. Obama’s dedicated YouTube page.
Eventually campaign strategists hope to use the new software to focus on people
in highly specific ways. For example, if someone watches a video about a certain
geographic location, like Florida, a list of that person’s Facebook friends in
Florida would appear alongside the video with a message from the campaign that
suggests recommending the video to them.
The Obama campaign’s efforts underscore the importance that political campaigns
now attach to Web video and the role the medium will probably play in the coming
election. Once best known in politics as the venue for viral parodies and
hastily produced response efforts, online video is vital in the way campaigns
communicate with and persuade voters.
“The importance of video is so new for campaigns, even relative to ’08,” said
Teddy Goff, the Obama campaign’s digital director. “Now it’s in some ways the
primary way our digital operation communicates with supporters. And increasingly
it will be the primary way we communicate with undecided voters.”
Television is likely to remain the dominant way campaigns reach voters for the
foreseeable future. Experts predict that about 10 percent of the campaigns’
advertising budgets this year will be spent on the Web. But online video offers
campaigns a way to connect with people they know are engaged and not
fast-forwarding through messages on their DVR players or flipping channels
during commercials.
And, perhaps more important, it offers them a way to disseminate their messages
into online communities where friends and family members share, discuss and
debate. Campaigns believe that helps elevate their messages beyond propaganda.
“This year it’s all about getting your message into those trusted networks
because everyone is suspicious about politicians,” said Darrell West, of the
Center for Technology Innovation at the Brookings Institution. “It’s hard to be
persuasive through a direct advertisement. But if you can get people to share
videos, it adds a degree of credibility because a friend is endorsing it. People
will take it more seriously.”
“The Road We’ve Traveled” was conceived and produced by the campaign to stand
out from standard political video fare. For starters, it was directed by Davis
Guggenheim, the Oscar-winning director whose film credits include “Waiting for
Superman” and “An Inconvenient Truth.” It features interviews with Obama
administration officials past and present, including Vice President Joseph R.
Biden Jr. and Rahm Emanuel, the former White House chief of staff. Former
President Bill Clinton makes an appearance as well, hailing Mr. Obama’s decision
to kill Osama bin Laden as one he hoped he would have had the courage to make as
president.
The new YouTube platform that the Obama campaign will use to release the
documentary gives anyone visiting the president’s YouTube page a number of
options to share the content or pledge support, the kind of one-click approach
that campaigns now see as an integral part of their digital strategies.
Mitt Romney’s campaign is using similar technology with its Web videos. Visitors
can donate, volunteer and share content, all within Mr. Romney’s YouTube page.
The campaign has worked to keep its video offerings dynamic, producing roughly
two a week over the course of the campaign.
The Obama campaign has taken a similar one-stop-shopping approach to streamline
online donations. Borrowing a technique from online merchants like Amazon and
Fresh Direct, repeat donors do not need to resubmit their credit card
information to make a pledge. The campaign saves it on file, and all the donor
has to do is click.
Where online video offers some of the most potential, strategists say, is in
modernizing the traditional aspects of campaigning, like get-out-the-vote
efforts and responses to attacks from opponents.
“It’s the ability to get your message out quickly that makes all the
difference,” said Zac Moffatt, the Romney campaign’s digital director. “And
that’s really where I think YouTube has found a niche in politics.”
Some strategists said what has changed in this election is the ability to turn
Web video into something people act on. “One of the biggest challenges with
YouTube is giving people a clear action to take after viewing,” said Stephen
Muller, the Obama campaign’s video director. “The goal is to bring our
engagement tools to our supporters.”
With Video, Obama Looks to Expand
Campaign’s Reach Through Social Media, NYT, 14.3.2012,
http://www.nytimes.com/2012/03/15/us/politics/with-youtube-video-obama-looks-to-expand-social-media-reach.html
Viral Video, Vicious Warlord
March 14, 2012
The New York Times
By NICHOLAS D. KRISTOF
I’d like to thank the makers of the “Kony 2012” video for
goading me to write about Joseph Kony. With about 100 million views, it is now
one of the most viral videos of all time.
My starting point is a “bravo” for film-makers for galvanizing young Americans
to look up from their iPhones and seek to make a difference for villagers in
central Africa who continue to be murdered, raped and mutilated by Kony and his
Lord’s Resistance Army. Just in the last two months, the Lord’s Resistance Army
has mounted 20 raids in Congo alone.
But nobody fights more wickedly than humanitarians, so there have been a series
of attacks on the video. Let me try to address some of the criticisms.
Let Africans resolve their own problems. It’s neocolonialist for Americans to
think that they can solve Congolese problems, when they can’t even solve their
own. This is just one more example of “white man’s burden” imperialism.
When a warlord continues to kill and torture across a swath of Congo and Central
African Republic, that’s not a white man’s burden. It’s a human burden.
To me, it feels repugnant to suggest that compassion should stop at a national
boundary or color line. A common humanity binds us all, whatever the color of
our skin — or passport.
The issue is complicated, in ways that don’t come through in a misleading video.
For example, the video doesn’t make clear that Kony is no longer a threat in
Uganda.
The video doesn’t contain errors, but it does simplify things greatly to hold
attention. Complexity is, er, complicated: It has been a leading excuse for
inaction during atrocities — during the Armenian genocide, during the Holocaust,
during Rwanda, during the Bosnian slaughter. Each episode truly was complicated,
but, in retrospect, we let nuance paralyze us.
It’s true that Kony’s forces are diminished and no longer a danger in Uganda,
but he remains a threat in Congo, Central African Republic and South Sudan.
Those are tough neighborhoods — I’ve been held at gunpoint in Central African
Republic and chased through the Congo jungle by a warlord whose massacres I
interrupted — that rarely get attention and are little understood. Yes, the
video glosses over details, but it has left the American public more informed.
Last year, Rush Limbaugh defended the Lord’s Resistance Army because it sounded
godly.
American kids worrying about Kony accomplish nothing. The video promotes
feel-good gestures — wear a bracelet! — that enrich a do-nothing aid
organization but have no benefit in the jungles of central Africa.
It’s true that indignation among Americans won’t by itself stop Kony. Yet I’ve
learned over the years that public attention can create an environment in which
solutions are more likely.
Public outrage over Serbian atrocities in the Balkans eventually led the Clinton
administration to protect Kosovo and hammer out the Dayton peace accord. The
Sudan civil war killed millions over half-a-century on and off, until public
outrage — largely among evangelical Christians — led President George W. Bush to
push successfully for a peace agreement in 2005.
I asked Anthony Lake, now the executive director of Unicef who was President
Clinton’s national security adviser during the 1994 Rwandan genocide, whether a
viral video about Rwanda would have made a difference then. “The answer is yes,”
he said. He suggested that this kind of public attention would also have helped
save more lives in Darfur and in Congo’s warring east.
In 1999, then-Secretary of State Madeleine Albright paid a brief visit to
war-ravaged Sierra Leone and was photographed with a 3-year-old girl whose right
arm had been chopped off. The photograph, widely circulated, helped galvanize
outside powers to crush the militias. Sierra Leone is now at peace, and that
girl is studying in the United States.
I asked Albright, who later led a task force on preventing genocide, what she
thinks of the Kony video.
“Shining a light makes a lot of difference,” she said, adding that Kony’s
prospects are probably less good now than before the video came out.
The bottom line is: A young man devotes nine years of his life to fight murder,
rape and mutilation, he produces a video that goes viral and galvanizes mostly
young Americans to show concern for needy villagers abroad — and he’s vilified?
I don’t know if this initiative will make a difference. But if I were a
Congolese villager, I would welcome these uncertain efforts over the sneering
scorn of do-nothing armchair cynics.
Viral Video, Vicious Warlord, NYT,
14.3.2012,
http://www.nytimes.com/2012/03/15/opinion/kristof-viral-video-vicious-warlord.html
New Interest in Hacking as Threat to Security
March 13, 2012
The New York Times
By MICHAEL S. SCHMIDT
WASHINGTON — During the five-month period between October and
February, there were 86 reported attacks on computer systems in the United
States that control critical infrastructure, factories and databases, according
to the Department of Homeland Security, compared with 11 over the same period a
year ago.
None of the attacks caused significant damage, but they were part of a spike in
hacking attacks on networks and computers of all kinds over the same period. The
department recorded more than 50,000 incidents since October, about 10,000 more
than in the same period a year earlier, with an incident defined as any
intrusion or attempted intrusion on a computer network.
The increase has prompted a new interest in cybersecurity on Capitol Hill, where
lawmakers are being prodded by the Obama administration to advance legislation
that could require new standards at facilities where a breach could cause
significant casualties or economic damage.
It is not clear whether the higher numbers were due to increased reporting amid
a wave of high-profile hacking, including the arrest last week of several
members of the group Anonymous, or an actual increase in attacks.
James A. Lewis, a senior fellow and a specialist in computer security issues at
the Center for Strategic and International Studies, a policy group in
Washington, said that as hacking awareness had increased, attacks had become
more common. He said that the attacks on the nation’s infrastructure were
particularly jarring.
“Some of this is heightened awareness because everyone is babbling about it,” he
said of the reported rise in computer attacks. “But much of it is because the
technology has improved and the hackers have gotten better and people and
countries are probing around more like the Russians and Chinese have.”
He added: “We hit rock bottom on this in 2010. Then we hit rock bottom in 2011.
And we are still at rock bottom. We were vulnerable before and now we’re just
more vulnerable. You can destroy physical infrastructure with a cyberattack just
like you could with a bomb.”
The legislation the administration is pressing Congress to pass would give the
federal government greater authority to regulate the security used by companies
that run the nation’s infrastructure. It would give the Homeland Security
Department the authority to enforce minimum standards on companies whose service
or product would lead to mass casualties, evacuations or major economic damage
if crippled by hackers.
The bill the administration backs is sponsored by Senators Joseph I. Lieberman,
independent of Connecticut, and Susan Collins, Republican of Maine. It has
bipartisan support, and its prospects appear good. Senator John McCain,
Republican of Arizona, is sponsoring a more business-friendly bill that
emphasizes the sharing of information and has fewer requirements for companies.
Last week on Capitol Hill, Janet Napolitano, the secretary of Homeland Security;
Robert S. Mueller III, the director of the Federal Bureau of Investigation; and
Gen. Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, made their
pitch to roughly four dozen senators about why they should pass the
Lieberman-Collins bill.
At a closed-door briefing, the senators were shown how a power company employee
could derail the New York City electrical grid by clicking on an e-mail
attachment sent by a hacker, and how an attack during a heat wave could have a
cascading impact that would lead to deaths and cost the nation billions of
dollars.
“I think General Dempsey said it best when he said that prior to 9/11, there
were all kinds of information out there that a catastrophic attack was looming,”
Ms. Napolitano said in an interview. “The information on a cyberattack is at
that same frequency and intensity and is bubbling at the same level, and we
should not wait for an attack in order to do something.”
General Dempsey told the senators that he had skipped a meeting of the National
Security Council on Iran to attend the briefing because he was so concerned
about a cyberattack, according to a person who had been told details of the
meeting. A spokesman for General Dempsey said the chairman had “sent his vice
chairman to the meeting on Iran so that he could attend the Senate meeting and
emphasize his concern about cybersecurity.”
“His point was about his presence at the cyber exercise rather than a value
judgment on the ‘threat,’ ” the spokesman, Col. David Lapan, said.
Experts say one of the biggest problems is that no part of the government has
complete authority over the issue. The Central Intelligence Agency and the
National Security Agency give the government intelligence on potential attacks,
and the F.B.I. prosecutes hackers who break the law. The Department of Homeland
Security receives reports about security breaches but has no authority to compel
business to improve their security.
“Nobody does critical infrastructure of the dot-com space where America now
relies on faith healing and snake oil for protection,” Mr. Lewis said. “The
administration wants it to be the Department of Homeland Security, but the
department needs additional authorities to be effective.”
New Interest in Hacking as Threat to
Security, NYT, 13.3.2012,
http://www.nytimes.com/2012/03/14/us/new-interest-in-hacking-as-threat-to-us-security.html
Apple Adds Sharper Screen and Speed to New iPad
March 7, 2012
The New York Times
By NICK WINGFIELD
SAN FRANCISCO — Apple updated the iPad on Wednesday with a
high-definition screen, a faster wireless connection and several other
refinements, all packaged in a device without any major design changes.
As recent history has shown, though, Apple may not need a bold overhaul of the
look of its tablet computer to attract waves of new buyers.
The company said the new iPad would go on sale on March 16 at a starting price
of $499, unchanged from the last generation of iPads. The product will have a
screen that provides a comparable level of clarity to the iPhone’s “retina
display,” with higher resolution than conventional high-definition televisions,
according to Apple executives.
“That is distinctive and is a kind of leapfrog above existing and announced
products,” said A. M. Sacconaghi, an analyst at Sanford C. Bernstein & Company.
And in a sign that Apple intends to more seriously protect its share of the
tablet market, which is expected to get more competitive this year, the company
said it would continue to sell its second-generation iPad, dropping the price to
$399 from $499.
At a company event, Apple also showed a new version of Apple TV, the company’s
$99 set-top box for accessing Internet video, which streams movies in the
sharpest of the high-definition video formats, called 1080p.
The initial reaction to the tablet computer was mixed, as has frequently been
the case of late with Apple’s new iterations. Apple’s stock price was about flat
in regular trading, ending up 43 cents higher, at $530.69, a 0.1 percent gain.
The new tablet, called simply the new iPad, with no numbers or letters after the
name, is an effort to keep growth chugging along in a two-year-old business that
has turned into a major franchise for the company. Apple’s $9.15 billion in iPad
sales over the holiday quarter was almost double the amount of revenue Microsoft
reported from its Windows software and not far from Google’s total revenue as a
company during the same period.
Speaking from the same stage where Steven P. Jobs, the company’s late chief
executive, introduced the second-generation iPad almost exactly a year ago, the
company’s new chief executive, Timothy D. Cook, said the iPad last quarter
outsold the number of personal computers sold by any individual manufacturer.
“In many ways, the iPad is reinventing portable computing and outstripping the
wildest predictions,” Mr. Cook said.
The new iPad, the third generation of the device, is nearly indistinguishable
from its predecessor, though it is slightly heavier and thicker. The most
visible of its changes is the screen, which can display text and images that
appear as sharp as they would on a printed page. The company said the screen has
more than 3.1 million pixels, or four times more than the current iPad.
It will also operate on the fourth-generation cellphone network technology known
as LTE. In the United States, the new iPad will work on AT&T’s and Verizon’s
networks to get data.
The iPad will also allow users to dictate e-mail, though Apple did not introduce
an iPad version of Siri, a voice-command virtual-assistant feature that proved
popular on the iPhone 4S.
Last fall, Apple disappointed some pundits and enthusiasts by making mostly
incremental enhancements with the iPhone 4S. That product ended up squashing
doubts to become a smash hit, leading to record sales over the holidays. During
that time, Apple, based in Cupertino, Calif., solidified its lead as the most
valuable company in the world, with a market capitalization of almost a
half-trillion dollars, well ahead of its nearest rival, Exxon Mobil.
At times, Apple has wowed people by radically rethinking the design of its
products. Several years ago, it overhauled its MacBook Air with a drastically
thinner case. It gave the iPhone 4 a novel, hard-edged case that looked very
different from the design of early iPhones.
Charles Wolf, an analyst at Needham & Company, said those kinds of radical
redesigns did not happen every year, partly because the smaller components and
other underlying technologies that made them possible did not change at that
pace. Mr. Wolf said he believed that more of Apple’s innovation was happening in
software because it was not as encumbered by the development of outside
technologies in that area.
“I always look at Apple as a software company,” he said.
The new iPad may show how durable Apple’s hold on the tablet market is. For most
of the two years the iPad has been on sale, Apple has faced a phalanx of
competitors from Hewlett-Packard, Research in Motion, Samsung and Motorola, yet
none has established a firm beachhead in the tablet business. A few of those
competitors, like H.P., gave up.
In a recent survey of American consumers with tablets by Forrester Research, 73
percent said they owned an iPad. That is a sharp contrast to the smartphone
business, where Apple’s market share has steadily eroded as phones based on
Google’s Android operating system have swept the market. Phones with Android
software accounted for 51.6 percent of smartphone shipments worldwide in the
fourth quarter, compared with 23.4 percent for the iPhone, according to Canalys,
a research firm.
Sarah Rotman Epps, an analyst at Forrester, said the iPad had maintained its
grip on the market because most consumers bought it through retail stores rather
than wireless carriers. “Android smartphones are selling like hot cakes because
that’s what the carriers push,” she said. “With tablets, carriers are not the
main destination for tablets.”
The new iPad, though, is likely to face more serious challenges to the product’s
dominance than in the past. Over the holidays, Amazon is estimated to have sold
more than five million of its Kindle Fire, a smaller tablet that has attracted a
new group of consumers to the category with a $199 price tag.
Later this year, the first tablet devices to use Windows 8, a new operating
system from Microsoft, are expected to hit the market. The software has been
redesigned by Microsoft to take advantage of touch-screen devices.
Apple sold 15.4 million iPads over the holiday quarter and has sold 55 million
iPads in total since they first went on sale in 2010.
Mr. Cook told the audience Wednesday that Apple had sold 315 million iOS devices
through the end of 2011 and that iPads, iPhones and iPods were now responsible
for 75 percent of the company’s revenue. The chief criticism that some stalwarts
of the PC industry have leveled at the iPad is that the device is not well
suited for creating content, even if it is good for consuming it.
Apple, though, sought to undermine that argument with a number of new apps.
Those include a new version of its Mac software for editing digital photographs,
iPhoto. A new version of Apple’s GarageBand music software lets up to four
people play together in a virtual band with iPads that are connected wirelessly.
Apple Adds Sharper Screen and Speed to New
iPad, NYT, 7.3.2012,
http://www.nytimes.com/2012/03/08/technology/apple-updates-ipad-with-some-refinements.html
As New iPad Debut Nears, Some See Decline of PCs
March 5, 2012
The New York Times
By NICK WINGFIELD
The chief executive of Apple, Timothy D. Cook, has a
prediction: the day will come when tablet devices like the Apple iPad outsell
traditional personal computers.
His forecast has backing from a growing number of analysts and veteran
technology industry executives, who contend that the torrid growth rates of the
iPad, combined with tablet competition from the likes of Amazon.com and
Microsoft, make a changing of the guard a question of when, not if.
Tablet sales are likely to get another jolt this week when Apple introduces its
newest version of the iPad, which is expected to have a higher-resolution
screen. With past iterations of the iPad and iPhone, Apple has made an art of
refining the devices with better screens, faster processors and speedier network
connections, as well as other bells and whistles — steadily broadening their
audiences.
An Apple spokeswoman, Trudy Muller, declined to comment on an event the company
is holding Wednesday in San Francisco that is expected to feature the new
product.
Any surpassing of personal computers by tablets will be a case of the computer
industry’s tail wagging the dog. The iPad, which seemed like a nice side
business for Apple when it was introduced in 2010, has become a franchise for
the company, accounting for $9.15 billion in revenue in the holiday quarter, or
about 20 percent of Apple’s total revenue. The roughly 15 million iPads Apple
sold in that period was more than twice the number it sold a year earlier.
In the fall, Amazon introduced the iPad’s first credible competitor in the $199
Kindle Fire. Although Amazon does not release sales figures for the device, some
analysts estimate it sold about four million in the holiday quarter. Later this
year, tablets from a variety of hardware manufacturers based on Windows 8, a
new, touch-screen-friendly operating system from Microsoft, could further propel
the market.
“Tablets are on fire, there’s no question about that,” said Brad Silverberg, a
venture capitalist in Seattle at Ignition Partners and a former Microsoft
executive, who hastened to add that he was speaking mainly of the iPad, which
dominates current sales.
Tablets are not there yet. In 2011, PCs outsold tablets almost six to one,
estimates Canalys, a technology research company. But that is still a
significant change from 2010, the iPad’s first year on the market, when PCs
outsold tablets 20 to one, according to Canalys. For the last two years, PC
sales were flat, while iPad sales were booming. The Kindle Fire and Barnes &
Noble’s Nook gave the market an additional lift over the holidays. Apple is
banking on the tablet market. Its iPad brought in nearly 40 percent more revenue
during the holidays than Apple’s own computer business, the Macintosh, did.
“From the first day it shipped, we thought — not just me, many of us thought at
Apple — that the tablet market would become larger than the PC market, and it
was just a matter of the time that it took for that to occur,” Mr. Cook of Apple
said recently at a Goldman Sachs investor conference.
Gene Munster, an analyst at Piper Jaffray, estimated that Mr. Cook’s prediction
would come true in 2017, but others contend tablets will be on top sooner than
that.
For example, in a blog post on Friday, Horace Dediu, an analyst with Asymco in
Finland, made a detailed argument that tablet sales would pass traditional PC
sales in the fall of 2013. His projections rest heavily on an assumption that
Apple will face more serious competition in the tablet market from Amazon’s
Kindle Fire, Windows 8 and a wave of other devices based on Google’s Android, an
operating system that has been mostly successful in the smartphone market.
Tim Bucher, an entrepreneur who has held senior positions at Apple, Microsoft
and Dell, said tablet sales would “absolutely” pass those of PCs, a trend he
argued would become even more pronounced as a younger, tablet-savvy generation
ages.
“I think the older generation does not pick up on the way of interacting with
the new devices,” Mr. Bucher said, contrasting older people with the next
generation. “I don’t know how many YouTube videos there are out there showing
everyone from babies to animals interacting with iPads.”
Where does that change leave the PC, the lowly machine that defined computing
for decades?
At a technology conference in 2010, Steven P. Jobs, then Apple’s chief
executive, heralded what he called the post-PC era and compared personal
computers to the trucks that prevailed in the automobile industry until society
began moving away from its agrarian roots. PCs are “still going to be around and
have a lot of value,” said Mr. Jobs, who died in October. “But they’re going to
be used by one out of X people.”
Even Mr. Cook in his recent speech said he was not predicting the demise of the
PC industry, although he did say the iPad was cannibalizing some computer sales,
more Windows PCs than the much smaller market for Macs. One category of PCs
where that is especially true is netbooks, the inexpensive notebook computers
that have had a steep decline in shipments in the last couple of years. “What
the iPad is doing is taking growth away from the PC market that would have gone
to a secondary or tertiary device,” said Mr. Dediu. “It’s not so much people are
going to drop PCs. They’re going to add this additional device.”
Traditional PCs are not standing still. Boxy desktop computers are an
ever-diminishing part of the PC business, while Apple’s MacBook Air and a
category of Windows laptops with Intel processors called ultrabooks have
reinvented traditional clamshell notebooks as superthin devices that turn on
instantly like tablets.
Microsoft’s introduction of Windows 8 promises to shake up computer designs
further. Microsoft and its hardware partners have shown laptops with keyboards
that can be swiveled around or removed altogether, turning them into tablets.
“The tablet and PC markets are all going to blur,” said Tim Coulling, an analyst
at Canalys. “We’re going to see a lot of form-factor innovation. We’ll be
asking, What is a tablet and what is a traditional PC?”
As New iPad Debut Nears, Some See Decline
of PCs, NYT, 5.3.2012,
http://www.nytimes.com/2012/03/06/technology/as-new-ipad-debut-nears-some-see-decline-of-pcs.html
Mystery Witness in Rutgers Case Tells of Webcam Unease
March 2, 2012
The New York Times
By KATE ZERNIKE
NEW BRUNSWICK, N.J. — As he and his new boyfriend lay naked on
a bed in a nondescript dormitory room at Rutgers University, the man sensed he
was being spied on.
“I just happened to glance over,” the man, now a nervous and heavily shielded
star witness, told a courtroom here on Friday. “It just caught my eye that there
was, you know, a camera lens looking directly at me.”
As he left the room that night, he testified, a group of students were standing
nearby, joking and looking at him in a way that unsettled him. When they met
again two nights later, he heard students laughing outside.
He wanted to see his new boyfriend again — they had been exchanging e-mails for
weeks now, but had had only three dates, and were texting furiously in the hopes
of setting up another one. But he was not sure he would return to the dorm.
“I felt a little uneasy about it,” he said.
He never saw his new boyfriend, Tyler Clementi, again. Mr. Clementi, an
18-year-old student at Rutgers, jumped to his death from the George Washington
Bridge the next evening, Sept. 22, 2010, after posting a message on Facebook
that ended, “sorry.”
It was two weeks later, when prosecutors went to his house, that the man learned
that the camera, on Mr. Clementi’s roommate’s computer, had been used to view
them as they had sex.
The roommate, Dharun Ravi, is on trial in Superior Court on charges that he set
up the camera and encouraged others to watch its images of the men having sex.
Prosecutors have charged him with invasion of privacy, bias intimidation and
hindering apprehension, after, they say, he tried to cover up his Twitter
messages to friends encouraging them to watch. He is not charged in Mr.
Clementi’s death.
The man was the most anticipated witness in the trial — the small windowless
courtroom in the Middlesex County Courthouse had been packed with spectators and
reporters for three days with the promise of his testimony.
He is identified in court documents only as “M.B.,” and before he came in the
room the judge warned the journalists assembled that they could not record or
photograph the man.
M.B., who appeared to be in his late 20s or early 30s, entered with his
shoulders hunched, seeming to twitch as he walked, as if he was on trial rather
than a witness. He had close cropped hair and a bit of a 5 o’clock shadow, He
wore a blue and white striped shirt, more casual than the well-tailored suits of
Mr. Ravi and his friends who have testified. In the courtroom he did not look,
as Mr. Ravi’s friends have described him, “scruffy” or “shady.”
He testified that he and Mr. Clementi met in an online chat room for gay men in
early August 2010, then exchanged instant messages and text messages for several
weeks. Mr. Clementi, an accomplished violinist, told the man he was going to
Rutgers early, before the regular start of the fall semester, for a music
program. They agreed that it made sense to wait until Mr. Clementi was at
Rutgers to meet in person.
“We were just talking, getting to know each other at that time,” he said. “I was
comfortable, he was comfortable, until he was coming closer to actually meet in
person.”
Their first date was a few weeks later, on Thursday, Sept. 16. They met twice
more, on the next Sunday and Tuesday, before Mr. Clementi, who had only recently
told his parents he was gay, went to the bridge and committed suicide.
At first the room seemed like a normal dorm room, he testified.
But then, he told a prosecutor, “I had just glanced over my shoulder and I had
noticed there was a webcam that was faced toward the direction of the bed, and I
just thought it was kind of strange. Just being in a compromising position and
seeing a camera lens — I guess it just stuck out to me that if you were sitting
at a desk using the computer, that camera wouldn’t be facing that direction, it
would be facing the person at the computer.”
The man was the witness whom both the prosecution and the defense had been
waiting for. To prosecutors, M.B. is a victim of harassment based on sexual
orientation — a proxy of sort for Mr. Clementi.
To the defense, M.B. was evidence that Mr. Ravi was not motivated by bigotry but
by suspicion — of an older man who appeared out of place among the college
freshmen in the dorm. Mr. Ravi’s lawyers contend that he set up the webcam
because he was afraid that the man would steal his valuable computer equipment.
Mystery Witness in
Rutgers Case Tells of Webcam Unease, NYT, 2.3.2012,
http://www.nytimes.com/2012/03/03/nyregion/in-rutgers-case-mystery-man-testifies-about-noticing-a-webcam.html
NASA Says It Was Hacked 13 Times Last Year
March 2, 2012
The New York Times
By REUTERS
(Reuters) - NASA said hackers broke into its computer systems
13 times last year, stealing employee credentials and gaining access to
mission-critical projects in breaches that could compromise U.S. national
security.
The National Aeronautics and Space Administration spends only $58 million of its
$1.5 billion annual IT budget on cyber security, Paul Martin, the agency's
inspector general, told a Congressional panel on NASA security earlier this
week.
"Some NASA systems house sensitive information which, if lost or stolen, could
result in significant financial loss, adversely affect national security, or
significantly impair our nation's competitive technological advantage," Martin
said in testimony before the U.S. House Committee on Science, Space and
Technology, released on Wednesday. (http://bit.ly/yQFSB8)
He said the agency discovered in November that hackers working through a
Chinese-based IP address broke into the network of NASA's Jet Propulsion
Laboratory.
He said they gained full system access, which allowed them to modify, copy, or
delete sensitive files, create user accounts for mission-critical JPL systems
and upload hacking tools to steal user credentials and compromise other NASA
systems. They were also able to modify system logs to conceal their actions, he
said.
"Our review disclosed that the intruders had compromised the accounts of the
most privileged JPL users, giving the intruders access to most of JPL's
networks," he said.
In another attack last year, intruders stole credentials for accessing NASA
systems from more than 150 employees.
Martin said the agency has moved too slowly to encrypt or scramble the data on
its laptop computers to protect information from falling into the wrong hands.
Unencrypted notebook computers that have been lost or stolen include ones
containing codes for controlling the International Space Station as well as
sensitive data on NASA's Constellation and Orion programs and Social Security
numbers, Martin said.
(Reporting By Jim Finkle; editing by Gunna Dickson)
NASA Says It Was Hacked 13 Times Last Year,
NYT, 2.3.2012,
http://www.nytimes.com/reuters/2012/03/02/technology/02reuters-nasa-cyberattack.html
Andrew Breitbart, Conservative Blogger, Dies at 43
March 1, 2012
The New York Times
By JEREMY W. PETERS
Andrew Breitbart, a conservative blogger and activist who
built a national media persona by putting undercover video on the Internet to
bring discredit and disgrace to his liberal targets, died on Thursday in Los
Angeles. He was 43.
The cause was apparently a heart attack, said his father-in-law, the actor Orson
Bean. Someone saw Mr. Breitbart collapse on the sidewalk, Mr. Bean added, and
when the paramedics arrived they were unable to revive him. Mr. Bean said he
believed Mr. Breitbart had a history of heart problems.
Mr. Breitbart was as polarizing as he was popular. On the political right he was
hailed in the same breath with Rush Limbaugh and Matt Drudge as a truth-teller
who exposed bias and corruption. On the left, he was derided by many as a
provocateur who played fast and loose with the facts to further his agenda.
Among his biggest coups was forcing the resignation of a New York congressman,
Anthony D. Weiner. Someone in Mr. Breitbart’s network of tipsters and fans had
e-mailed him sexually explicit photos that Mr. Weiner had taken of himself and
sent to women online. Mr. Breitbart published some of the photos on his Web
site, BigGovernment.com, igniting a firestorm that reached to the highest levels
of Congress.
The move displayed two of Mr. Breitbart’s defining features as a media
personality: an eagerness to flout authority, and an innate sense for the viral
news story. With the Weiner scandal, Mr. Breitbart, already a cult figure, only
solidified his status as a force in his own right.
On Thursday, many of the luminaries he looked up to as a young man paid homage
to him. Mr. Limbaugh called him “an indefatigable bulldog for the conservative
cause.”
Mr. Breitbart was one of the most aggressive — and controversial — users of
blogs to disseminate political information and rumors, and his video methods
were new in conservative media. What Mr. Limbaugh was to radio and what Mr.
Drudge was to the Internet, Mr. Breitbart was to online video and images.
Mr. Breitbart worked with Mr. Drudge early in his career, helping him staff The
Drudge Report. But another media star, Arianna Huffington, gave Mr. Breitbart
what turned out to be his biggest break. She hired him in 1997 when she was a
conservative commentator in need of research help. She gave Mr. Breitbart a
title, director of research, and what he described in his book “Righteous
Indignation” as a “bizarre and cloistered office” in her Los Angeles home.
It did not take long for Ms. Huffington to see his value as a tireless employee.
He struck up a friendship with her and her mother, who came to regard him as
almost a son of her own.
“She would say, ‘Andrew, you’ve got to sleep, got to stop,’ ” Ms. Huffington
said in an interview on Thursday. “You could sort of see the destructive side of
his incredible passion for whatever he believed in at the time. It was
all-consuming.”
Mr. Breitbart was instrumental in helping Ms. Huffington create an early Web
presence with a site called Arianna Online. After he left her for The Drudge
Report, she reached out to him again. He wrote in his book that he got a call
one day in 2004. It was Ms. Huffington. “Do you have any ideas for a Web site?”
he quoted her as asking. Mr. Breitbart went on to work with Ms. Huffington and
her business partners Kenneth Lerer and Jonah Peretti for the next seven months
creating the now heavily trafficked news site The Huffington Post.
Andrew James Breitbart was born on Feb. 1, 1969, in Los Angeles, a month before
Gerry and Arlene Breitbart adopted him. He grew up in the exclusive Brentwood
section of Los Angeles, an experience he called disjointing.
“Even though it was very much a keep-up-with-the-Joneses enclave, my parents
seemed oblivious to all that,” he wrote. “When the first sushi restaurant popped
up in our neighborhood in the early 1980s, we had meat loaf that night.”
He was a graduate of Tulane University, having majored in American studies.
Though he described his parents as Republican, he said they were not overtly
political. “They came from the Silent Generation,” he said.
Silent Mr. Breitbart was not. As a conservative commentator he was a frequent
presence on cable television shoutfests. He seemed to thrive on conflict.
In 2009, Mr. Breitbart started the first in a series of “Big” blogs with names
like “Big Journalism,” “Big Hollywood” and “Big Government.” The Web sites gave
Mr. Breitbart a big online perch of his own from which to unleash his assaults
on liberal causes and figures.
One target, in 2009, was the community organizing group Acorn. A young
conservative activist named James O’Keefe had come to Mr. Breitbart with
undercover video of Acorn workers apparently offering advice on how to evade
taxes and conceal child prostitution. In videotaping the encounter, Mr. O’Keefe
and a companion had posed as a pimp and a prostitute. Mr. Breitbart eagerly
published the tapes, and they went viral. In response, Congress ended grants to
Acorn, and federal agencies severed ties with the group.
Mr. Breitbart earned a reputation for being playful but also selective with the
facts. In an infamous case in 2010, he helped instigate the firing of an
Agriculture Department official, Shirley Sherrod, by publishing a heavily edited
video clip of her speaking at an N.A.A.C.P. event. Her comments, as edited,
suggested that she had discriminated against a white farmer more than two
decades ago.
In the full video, however, she could be heard saying that she had eventually
helped the farmer and that she had learned from the experience — that all people
must overcome their prejudices. At Mr. Breitbart’s death, she was suing him for
defamation.
Many on the left, like the liberal Web site Media Matters, often portrayed Mr.
Breitbart as a caricature. Indeed, there was an element of performance art to
what Mr. Breitbart did that could make him seem coarse and crude. He was often
profane, and it was not uncommon to find him in rumpled shirts and torn jeans.
But in reality he was a more complex figure. He supported gay rights and once
served on the board of GOProud, an organization for conservatives dedicated to
gay and lesbian causes. His friends described him as a deeply committed father
to his four children and a loyal husband to his wife, Susie.
And while he often railed against what he called corrupt mainstream media, he
also knew that he needed them to further his own legitimacy. When he released
the Weiner photos, he partnered with ABC News because, he said, he knew it would
lend an imprimatur of authority.
He is survived by his wife; a daughter, Mia; and three sons, Samson, Charlie and
William Buckley.
He was true to his reputation right up until he died. At 11:25 p.m. on Wednesday
he sent out a Twitter message to someone who had taken issue with one of his
comments. Mr. Breitbart had referred to him using a vulgarity “cause I thought
you were being intentionally disingenuous,” he wrote. “If not I apologize.”
Ian Lovett, Brian Stelter and Daniel E. Slotnik contributed
reporting.
Andrew Breitbart, Conservative Blogger,
Dies at 43, NYT, 1.3.2012,
http://www.nytimes.com/2012/03/02/us/andrew-breitbart-conservative-blogger-dies-at-43.html
Revising the Limits for the Unlimited
March 1, 2012
The New York Times
By BRIAN X. CHEN
Sometimes, all-you-can-eat does not mean all you can eat.
Smartphone users who try to get the most out of their devices are learning
exactly what that means, even while paying for plans that promise unlimited
consumption.
Some of the nation’s largest wireless phone companies are getting around those
plans by slowing down a smartphone’s Internet transfer speeds for heavy users.
The practice serves as a backdoor limit of data by making some downloads
impossible.
The wireless companies say they are trying to find a fair way to manage the
swelling demand for mobile data, but consumers are feeling cheated and suspect
some carriers are trying to lure them into higher-cost data plans.
“It’s like taking a Ferrari into a dealer, and you get it back, and it only goes
45 miles per hour, and you say, ‘What the heck, dude?’ ” said Matt Spaccarelli,
who recently found his phone slowed. “And they say, ‘You’re going 100 miles per
hour, and it’s too dangerous for you, but if you pay us more, we’ll let you go
fast again.’ ”
AT&T on Thursday clarified the limits of its unlimited data plan. It published a
Web page describing what kind of data use might lead to customers’ data
connections being slowed — or throttled, as the practice is known.
Previously, AT&T said customers with unlimited data plans who were in the top 5
percent of data users in a given area could be subject to throttling, but it did
not give any specific limits. Now the company says that customers with
smartphones on unlimited plans for its third-generation network are in the top 5
percent if they download three gigabytes of data in a month.
Three gigabytes are enough to stream more than 1,500 minutes of video or receive
150,000 e-mails, according to AT&T.
AT&T also said customers with newer 4G smartphones who used more than 5 GB of
data in a month would be in the top 5 percent of its heaviest data users and
would be subject to slower speeds.
Verizon Wireless and T-Mobile said they had not changed their policies in
reaction to AT&T’s.
Those three carriers all have some form of a throttling policy, which, they say,
helps clear congestion of cellular networks as millions of customers switch from
traditional cellphones to data-guzzling smartphones.
But to some customers, AT&T’s throttling seems to be a move to push them to pay
more.
Mr. Spaccarelli, 39, a student from Simi Valley, Calif., was streaming an
episode of “The Office” to his iPhone late last year when he received a text
message from AT&T. “Your data usage is among the top 5 percent of users,” the
message said. “Data speeds for the rest of your current bill cycle may be
reduced.”
The playback became so slow that the show was unwatchable, Mr. Spaccarelli said,
so he shut off the phone and went to bed.
For several days afterward, the data speeds on Mr. Spaccarelli’s iPhone were so
slow that checking e-mail, Web browsing and using apps that required an Internet
connection were impossible. Unhappy, he sued AT&T in small-claims court in Simi
Valley, where he argued that AT&T could not sell him an unlimited data plan
while significantly limiting its speeds.
A judge ruled in his favor last Friday, and he won $850. AT&T has said it will
appeal the judge’s ruling.
Parul Desai, policy counsel for telecommunications at Consumers Union, an
advocacy group, said carriers had not shown evidence for how and when their
networks needed to be throttled.
“Is this an issue of where you’re trying to squeeze consumers into limited data
plans?” she said. “Are you just trying to move people over to higher-priced
plans?”
AT&T, the nation’s No. 2 carrier after Verizon, appears to be getting the most
heat. The company disclosed its throttling policy in July, but only recently
have some customers begun receiving notices that their connections were being
slowed.
AT&T stopped offering unlimited data plans to new subscribers in 2010. But those
who already owned a smartphone with an unlimited data plan were allowed to
continue.
AT&T’s policy states that customers whose phones are throttled will have reduced
speeds until the next billing cycle.
Adam Varsano, 49, who lives in New York, said he was informed his phone was
being throttled one day into his new billing cycle.
AT&T’s throttling also kicks in for the heaviest unlimited data users who are in
areas with congested cell sites, said Mark Siegel, an AT&T spokesman. But those
customers are throttled until the next billing cycle, regardless of the state of
the network for the remaining time period.
AT&T is cautious when discussing the topic of throttling. The company declined
multiple requests for an interview with an executive, but provided a prepared
statement. “AT&T, like other wireless companies, must take steps to manage the
exploding demand for mobile data as fairly and as effectively as possible,” the
company said.
The company also took the opportunity to push its agenda in Washington. “To meet
that demand, we need wireless spectrum, a very scarce resource,” it said. “We
have been doing everything we can to get more spectrum through federal
government auctions and other means.”
Verizon, which calls its throttling method “network optimization,” said it
throttled the top 5 percent of data users on an unlimited data plan only when
the network in their area was overloaded.
“Once you are no longer connected to a congested site, your speed will return to
normal,” said Brenda Raney, a Verizon spokeswoman. “This could mean a matter of
seconds or hours, depending on your location and time of day.”
Sprint Nextel, the nation’s No. 3 carrier, does not throttle its unlimited data
customers — a benefit the company is aggressively marketing in its effort to
lure customers away from rivals.
Not everybody is convinced that throttling certain customers is the best
solution for network traffic. John Aalbers, chief executive of Volubill, a
London-based company that advises wireless companies on charging policies, said
a problem with data throttling was that it upset customers.
“The connotation is that you’re being punitive and you’re punishing the user
when what you really want them to do is have them use more and more of your
service,” Mr. Aalbers said.
He said that carriers could create separate types of data plans for customers
with specific types of usage patterns.
For instance, carriers could charge people who watch a lot of Netflix videos on
their smartphones a little extra — streaming video is one of the most taxing
activities on a wireless network.
In exchange the carriers could give those customers priority in gaining access
to the higher network speeds so they would get a consistently good connection
when watching videos. That way, customers on normal data plans would still be
able to enjoy fast Internet speeds, stream the occasional video or play a game
and not be throttled either.
David Isenberg, who worked at AT&T Labs Research for 12 years before leaving to
start an independent telecom consulting firm, said that carriers could reduce
network speeds based on the states of their networks, not specific customer
usage.
He said carriers could measure their networks in real time to know when there
was congestion and when throttling was necessary. “That would be a slightly less
stupid way of managing their capacity,” he said.
While defining unlimited is difficult, AT&T does know how to define one thing
clearly.
The company’s terms-of-service agreement, to which every wireless customer must
agree to use its products, forbids people from filing class-action lawsuits
against it, so disgruntled customers have to fight the carrier one by one. To
help them, Mr. Spaccarelli created a Web site, taporc.com, containing the
documentation he presented to the judge.
“I don’t want people to think this dude just got lucky,” he said.
Revising the Limits for the Unlimited, NYT,
1.3.2012,
http://www.nytimes.com/2012/03/02/technology/some-wireless-carriers-revise-limits-for-the-unlimited.html
For Impatient Web Users,
an Eye Blink Is Just Too Long to Wait
February 29, 2012
The New York Times
By STEVE LOHR
Wait a second.
No, that’s too long.
Remember when you were willing to wait a few seconds for a computer to respond
to a click on a Web site or a tap on a keyboard? These days, even 400
milliseconds — literally the blink of an eye — is too long, as Google engineers
have discovered. That barely perceptible delay causes people to search less.
“Subconsciously, you don’t like to wait,” said Arvind Jain, a Google engineer
who is the company’s resident speed maestro. “Every millisecond matters.”
Google and other tech companies are on a new quest for speed, challenging the
likes of Mr. Jain to make fast go faster. The reason is that data-hungry
smartphones and tablets are creating frustrating digital traffic jams, as people
download maps, video clips of sports highlights, news updates or recommendations
for nearby restaurants. The competition to be the quickest is fierce.
People will visit a Web site less often if it is slower than a close competitor
by more than 250 milliseconds (a millisecond is a thousandth of a second).
“Two hundred fifty milliseconds, either slower or faster, is close to the magic
number now for competitive advantage on the Web,” said Harry Shum, a computer
scientist and speed specialist at Microsoft.
The performance of Web sites varies, and so do user expectations. A person will
be more patient waiting for a video clip to load than for a search result. And
Web sites constantly face trade-offs between visual richness and snappy response
times. As entertainment and news sites, like The New York Times Web site, offer
more video clips and interactive graphics, that can slow things down.
But speed matters in every context, research shows. Four out of five online
users will click away if a video stalls while loading.
On a mobile phone, a Web page takes a leisurely nine seconds to load, according
to Google, which tracks a huge range of sites from the homes of large companies
to the legions of one-person bloggers. Download times on personal computers
average about six seconds worldwide, and about 3.5 seconds on average in the
United States. The major search engines, Google and Microsoft’s Bing, are the
speed demons of the Web, analysts say, typically delivering results in less than
a second.
The hunger for speed on smartphones is a new business opportunity for companies
like Akamai Technologies, which specializes in helping Web sites deliver
services quicker. Later this month, Akamai plans to introduce mobile accelerator
software to help speed up the loading of a Web site or app.
The government too recognizes the importance of speed in mobile computing. In
February, Congress opened the door to an increase in network capacity for mobile
devices, proposing legislation that permits the auction of public airwaves now
used for television broadcasts to wireless Internet suppliers.
Overcoming speed bumps is part of the history of the Internet. In the 1990s, as
the World Wide Web became popular, and crowded, it was called the World Wide
Wait. Invention and investment answered the call.
Laying a lot of fiber optic cable for high-speed transmission was the first
solution. But beyond bandwidth, the Web got faster because of innovations in
software algorithms for routing traffic, and in distributing computer servers
around the world, nearer to users, as a way to increase speed.
Akamai, which grew out of the Massachusetts Institute of Technology’s Laboratory
for Computer Science, built its sizable business doing just that. Most major Web
sites use Akamai’s technology today.
The company sees the mobile Internet as the next big challenge. “Users’
expectations are getting shorter and shorter, and the mobile infrastructure is
not built for that kind of speed,” said Tom Leighton, co-founder and chief
scientist at Akamai, who is also an M.I.T. professor. “And that’s an opportunity
for us.”
The need for speed itself seems to be accelerating. In the early 1960s, the two
professors at Dartmouth College who invented the BASIC programming language,
John Kemeny and Thomas Kurtz, set up a network in which many students could tap
into a single, large computer from keyboard terminals.
“We found,” they observed, “that any response time that averages more than 10
seconds destroys the illusion of having one’s own computer.”
In 2009, a study by Forrester Research found that online shoppers expected pages
to load in two seconds or fewer — and at three seconds, a large share abandon
the site. Only three years earlier a similar Forrester study found the average
expectations for page load times were four seconds or fewer.
The two-second rule is still often cited as a standard for Web commerce sites.
Yet experts in human-computer interaction say that rule is outdated. “The old
two-second guideline has long been surpassed on the racetrack of Web
expectations,” said Eric Horvitz, a scientist at Microsoft’s research labs.
Google, which harvests more Internet ad revenue than any other company, stands
to benefit more than most if the Internet speeds up. Mr. Jain, who worked at
Microsoft and Akamai before joining Google in 2003, is an evangelist for speed
both inside and outside the company. He leads a “Make the Web Faster” program,
begun in 2009. He also holds senior positions in industry standards groups.
Speed, Mr. Jain said, is a critical element in all of Google’s products. There
is even a companywide speed budget; new offerings and product tweaks must not
slow down Google services. But there have been lapses.
In 2007, for example, after the company added popular new offerings like Gmail,
things slowed down enough that Google’s leaders issued a “Code Yellow” and
handed out plastic stopwatches to its engineers to emphasize that speed matters.
Still, not everyone is in line with today’s race to be faster. Mr. Kurtz, the
Dartmouth computer scientist who is the co-inventor of BASIC, is now 84, and
marvels at how things have changed.
Computers and networks these days, Mr. Kurtz said, “are fast enough for me.”
For Impatient Web Users, an Eye Blink Is
Just Too Long to Wait, NYT, 29.2.2012,
http://www.nytimes.com/2012/03/01/technology/impatient-web-users-flee-slow-loading-sites.html
Confronting a Law Of Limits
February 24, 2012
The New York Times
By JAMES B. STEWART
These days, it’s hard to find a superlative that adequately
describes Apple. But maybe simplest is best: biggest.
Measured by market capitalization, Apple is the world’s biggest public company.
This week it solidified its lead over Exxon Mobil, the previous titleholder, as
Apple’s shares hit a record high of $526.29, which gave it a market
capitalization of just under $500 billion. Apple becomes only the 11th company
to reach the top spot since 1926, according Howard Silverblatt, a senior index
analyst for Standard & Poor’s.
Apple’s first-quarter earnings of more than $13 billion accounted for more than
6 percent of all earnings for the S.& P. 500, according to Mr. Silverblatt.
Sales for the quarter that ended Dec. 31 included an astonishing 37.04 million
iPhones and 15.43 million iPads and totaled $46.33 billion, up 73 percent from
the year before. Earnings more than doubled. Compare that with this week’s
earning from the tech giants Hewlett-Packard (down 44 percent) and Dell (down 18
percent).
Apple shares have surged 68 percent from their low point in June, and it’s not
just Apple shareholders who have benefited. Apple is now such a large part of
the S.& P. 500 and the Nasdaq 100 indexes that it has buoyed millions of
investors who own shares of broad index funds and mutual funds. These investors
account for an estimated half of the American population. This week the Nasdaq
composite reached its highest level since 2000 and the S.& P. 500 hit levels not
seen since before the financial crisis.
Here is the rub: Apple is so big, it’s running up against the law of large
numbers.
Also known as the golden theorem, with a proof attributed to the 17th-century
Swiss mathematician Jacob Bernoulli, the law states that a variable will revert
to a mean over a large sample of results. In the case of the largest companies,
it suggests that high earnings growth and a rapid rise in share price will slow
as those companies grow ever larger.
If Apple’s share price grew even 20 percent a year for the next decade, which is
far below its current blistering pace, its $500 billion market capitalization
would be more than $3 trillion by 2022. That is bigger than the 2011 gross
domestic product of France or Brazil.
Put another way, to increase its revenue by 20 percent, Apple has to generate
additional sales of more than $9 billion in its next fourth quarter. A company
with $1 billion in sales has to come up with just another $200 million.
Robert Cihra, an analyst who covers Apple at Evercore Partners, told me this
week that the law of large numbers as it applied to Apple had “been a concern
for years now.” But, he said, “over the past couple of years, they have actually
accelerated revenue growth. I don’t know that can continue indefinitely. If you
extrapolate far enough out into the future, to sustain that growth Apple would
have to sell an iPhone to every man, woman, child, animal and rock on the
planet.”
The law of large numbers may explain why, even at its recent lofty stock price,
Apple looks like a bargain by most measures. The ratio of its share price to its
earnings, a common measure of a company’s stock value, is less than 11 based on
earnings projections for this year. That is well below the market’s average P/E
ratio of about 13. Apple shares are even being bought by so-called value
investors, who are usually confined to stodgier, low-growth but arguably
undervalued companies.
“The valuation on Apple stock right now is unjustifiably low,” Mr. Cihra said.
“If it weren’t so big, the P/E multiple would be a lot higher. They almost
doubled their earnings in calendar year 2011 and yet the stock is trading
currently at a P/E multiple of less than 11. It’s trading way below the market
average, even though it’s growing way above the market average. The multiple is
being compressed simply because investors are asking how it can get bigger.”
There may be sobering reasons for that. Other companies that have reached the
top appear to have been felled by Bernoulli’s law. Cisco Systems held the top
position and hit a market capitalization of $557 billion — larger than Apple’s —
in March 2000, at the peak of the technology bubble. Its market capitalization
today is about $100 billion, and shares are down nearly 80 percent since March
2000. In contrast with Apple, Cisco’s market value and sky-high 120 P/E ratio
were inflated by investor euphoria rather than actual results. But other
titleholders have met a similarly disappointing fate, although far less drastic.
Exxon Mobil, recently displaced by Apple as the biggest company by market value,
took over the top spot in 2006, seven years after the merger of Exxon and Mobil.
At the end of that year, its market capitalization was $447 billion. Today it’s
$35 billion lower. General Electric held the title for a number of years, most
recently in 2005, when its market capitalization was $370 billion. Today, it’s
just $205 billion. Microsoft was No. 1 in 2002 with a market capitalization of
$276 billion. Today, it’s $262 billion.
Of recent titleholders, the only one that has gained is I.B.M., whose market
capitalization of $65 billion ranked first in 1990. Today, it’s $229 billion.
Over the intervening 22 years, that is a compound rate of return of 11.2 percent
including dividends — impressive but hardly the growth rate Apple shareholders
have come to expect. Over the same period, an S.& P. 500 index fund returned 8.7
percent.
Can Apple escape a similar fate?
After never being a dominant force in personal computers, Apple surged to the
top of the S.& P. 500 by transforming the cellphone into a multitasking
smartphone, arguably the single most important technological advance so far in
the 21st century. It rolled over vaunted rivals like Nokia, Motorola and
Research in Motion with a combination of brilliant technology, dazzling design
and shrewd marketing backed by the singular vision of its late founder, Steve
Jobs. “Everyone truly needs it,” Mr. Cihra said of the smartphone. “It’s the
most transformative piece of technology in our lifetimes.”
Notwithstanding Apple’s huge size, Wall Street analysts are overwhelmingly
positive on the company’s prospects. Of 57 analysts who cover the company, 52
have a strong buy or buy recommendation. Only one recommends selling: Edward
Zabitsky, the chief executive and founder of ACI Research in Toronto, who
specializes in telecommunications and has been Apple’s reigning Cassandra for
years. He’s a favorite target of the Web’s “iPhone death watch,” which features
negative (and thus far wrong) projections about Apple.
“In all my years as an analyst, I’ve never gotten the kind of attention I’ve
gotten from my Apple call,” Mr. Zabitsky told me this week. “I’ve gotten e-mails
from everyone from radiologists to car repair people from all over North America
telling me I’m a fool. We’re just a research operation, so we’re not trying to
get any business from Apple. If we were, I doubt we’d get any.”
“Apple has created a tremendous ecosystem where there was none,” Mr. Zabitsky
acknowledges. But he says he thinks competition will erode Apple’s advantages as
computing shifts to the cloud. “The question isn’t whether this will happen, but
why and when. The company that understands this best is Microsoft. They’re
betting the farm on Web apps. They’ll be competing with Apple on every product.
Microsoft is big enough and motivated enough to make this happen.”
But Mr. Zabitsky remains a solitary voice.
“The reason Apple has been able to continue growing at a spectacular rate, even
as its revenue base has surpassed $100 billion, is because it targets the
world’s biggest markets,” Mr. Cihra said. He rates the stock a buy and projects
revenue for calendar year 2012 at $165 billion. “The simple fact is that they
still have a small share of huge markets — single-digit shares in both PCs and
mobile phones.”
Global mobile phone subscriptions neared six billion in 2011, with Apple’s share
of the handset market at 5.6 percent, according to the market intelligence firm
IDC. “There’s no mathematical reason Apple can’t keep growing at a premium rate
for at least several more years,” Mr. Cihra said. “At the end of the day,
there’s no good reason for market cap to be a ceiling.”
Apple fans are eagerly awaiting Apple’s next big thing. A voice-activated
television that upends TV the way Apple transformed music and cellphones? Maybe.
And Mr. Cihra may well be right that Apple investors have at least several years
of breathing room.
But history suggests that excessive enthusiasm can often precede a fall. At
Cisco’s peak, every Wall Street analyst covering the company rated it a strong
buy or buy. “Cisco continues to execute very well and demonstrates that it is in
a class by itself,” Seth Spalding, an analyst at Epoch Partners, wrote, joining
a chorus of analysts praising Cisco’s latest earnings — in November 2000.
Confronting a Law Of Limits, NYT,
24.2.2012,
http://www.nytimes.com/2012/02/25/business/apple-confronts-the-law-of-large-numbers-common-sense.html
Army Private Faces Arraignment in WikiLeaks Case
February 23, 2012
The New York Times
By THE ASSOCIATED PRESS
FORT MEADE, Md. (AP) — An Army private accused of spilling a
mountain of U.S. secrets to WikiLeaks is being asked for the first time to enter
a plea to the charges.
The arraignment of Pfc. Bradley Manning begins Thursday afternoon at Fort Meade
near Baltimore.
Officials say Manning also will be asked whether he wants to be tried by a judge
or a jury.
The 24-year-old native of Crescent, Okla., faces 22 counts, including aiding the
enemy. That charge carries a maximum sentence of life in prison.
Manning has been locked up since May 2010. He allegedly gave the anti-secrecy
WikiLeaks website more than 700,000 classified documents and video clips while
working in Iraq.
Defense lawyers say Manning was a troubled soldier who shouldn't have had access
to classified material.
Army Private Faces Arraignment in WikiLeaks
Case, NYT, 23.2.2012,
http://www.nytimes.com/aponline/2012/02/23/us/AP-US-Manning-WikiLeaks.html
White House,
Consumers in Mind,
Offers Online Privacy Guidelines
February 23, 2012
The New York Times
By EDWARD WYATT
WASHINGTON — The Obama administration on Wednesday outlined a
set of online privacy principles that officials said would help consumers
control the use of their personal data gleaned from Internet searches.
The framework for a new privacy code moves electronic commerce closer to a
one-click, one-touch process by which users can tell Internet companies whether
they want their online activity tracked.
Much remains to be done before consumers can click on a button in their Web
browser to set their privacy standards. Congress will probably have to write
legislation governing the collection and use of personal data, officials said,
something that is unlikely to occur this year. And the companies that make
browsers — Google, Microsoft, Apple and others — will have to agree to the new
standards.
But because those companies also are the largest competitors in the business of
providing advertising to Web sites, and are part of a consortium participating
in the development of the principles, administration officials said they
expected the standards would give consumers privacy while also allowing
electronic commerce to grow.
“American consumers can’t wait any longer for clear rules of the road that
ensure their personal information is safe online,” President Obama said in a
statement released Wednesday. “By following this blueprint, companies, consumer
advocates and policy makers can help protect consumers and ensure the Internet
remains a platform for innovation and economic growth.”
Even before Congress approves privacy legislation, the Federal Trade Commission
will have the ability to enforce compliance with a code of conduct to be
developed by the Commerce Department or with advertising industry guidelines
that companies would adopt voluntarily, Jon Leibowitz, the chairman of the
F.T.C., said during a call with reporters on Wednesday.
Companies responsible for the delivery of nearly 90 percent of online behavioral
advertisements — ads that appear on a user’s screen based on browsing and buying
habits — have agreed to comply when consumers choose to control online tracking,
the consortium said on Wednesday.
But even if a click of a mouse or a touch of a button can thwart Internet
tracking devices, there is no guarantee that companies won’t still manage to
gather data on Web behavior. Compliance is voluntary on the part of consumers,
Internet advertisers and commerce sites.
"The real question is how much influence companies like Google, Microsoft, Yahoo
and Facebook will have in their inevitable attempt to water down the rules that
are implemented and render them essentially meaningless,” John M. Simpson,
privacy project director for Consumer Watchdog, said in response to the
administration’s plan. "A concern is that the administration’s privacy effort is
being run out of the Commerce Department.”
But Mr. Leibowitz noted that the F.T.C. had already been aggressively penalizing
companies that did not adhere to their stated privacy programs. Last year it
brought charges against both Google and Facebook.
“If you ask what makes businesses want to do this,” Mr. Leibowitz said, the
answer is, “respecting consumer privacy and protecting data online encourages
Internet commerce.”
The Digital Advertising Alliance, a group of marketing and advertising trade
groups, said it had committed to following the instructions that consumers gave
about their privacy choices by using Do Not Track technology already available
in most Web browsers.
Stu Ingis, general counsel for the Digital Advertising Alliance, said the group
hoped to reach agreement within about nine months with browser companies on
standards for the use of a one-click notification of a consumer’s privacy
desires.
Hardly a day goes by without some development in the expansion of privacy
standards or the punishment of privacy violations. On Wednesday, California’s
attorney general, Kamala D. Harris, said the state had reached an agreement with
Amazon, Apple, Google, Hewlett-Packard, Microsoft and Research in Motion to
strengthen privacy protections for smartphone owners who download mobile
applications.
The agreement will force software developers to post conspicuous privacy
policies detailing what personal information they plan to obtain and how they
will use it. It also compels app store providers like Apple and Google to offer
ways for users to report apps that do not comply.
The new privacy outline brings together several efforts to develop and enforce
privacy standards that have been progressing for the last couple of years on
parallel tracks, under the direction of advertisers, Internet commerce sites and
software companies.
The next step will be for the Commerce Department to gather Internet companies
and consumer advocates to develop enforceable codes of conduct aligned with a
“Consumer Privacy Bill of Rights” released as part of the administration’s plan
on Wednesday.
The bill of rights sets standards for the use of personal data, including
individual control, transparency, security, access, accuracy and accountability.
Tanzina Vega contributed reporting from New York
and Nick Bilton and Nicole Perlroth from San Francisco.
White House, Consumers in Mind, Offers
Online Privacy Guidelines, NYT, 23.2.2012,
http://www.nytimes.com/2012/02/23/business/white-house-outlines-online-privacy-guidelines.html
Behind the Google Goggles, Virtual Reality
February 22, 2012
The New York Times
By NICK BILTON
SAN FRANCISCO — It wasn’t so long ago that legions of people
began walking the streets, talking to themselves.
On closer inspection, many of them turned out to be wearing tiny earpieces that
connected wirelessly to their smartphones.
What’s next? Perhaps throngs of people in thick-framed sunglasses lurching down
the streets, cocking and twisting their heads like extras in a zombie movie.
That’s because later this year, Google is expected to start selling eyeglasses
that will project information, entertainment and, this being a Google product,
advertisements onto the lenses. The glasses are not being designed to be worn
constantly — although Google engineers expect some users will wear them a lot —
but will be more like smartphones, used when needed, with the lenses serving as
a kind of see-through computer monitor.
“It will look very strange to onlookers when people are wearing these glasses,”
said William Brinkman, graduate director of the computer science and software
engineering department at Miami University in Oxford, Ohio. “You obviously won’t
see what they can from the behind the glasses. As a result, you will see bizarre
body language as people duck or dodge around virtual things.”
Mr. Brinkman, whose work focuses on augmented reality or the projection of a
layer of information over physical objects, said his students had experimented
on their own with virtual games and obstacle courses. “It looks really weird to
outsiders when you watch people navigate these spaces,” he said.
They have not seen the Google glasses. Few people have, because they are being
built in the Google X offices, a secretive laboratory near Google’s main
Mountain View, Calif., campus where engineers and scientists are also working on
robots and space elevators.
The glasses will use the same Android software that powers Android smartphones
and tablets. Like smartphones and tablets, the glasses will be equipped with GPS
and motion sensors. They will also contain a camera and audio inputs and
outputs.
Several people who have seen the glasses, but who are not allowed to speak
publicly about them, said that the location information was a major feature of
the glasses. Through the built-in camera on the glasses, Google will be able to
stream images to its rack computers and return augmented reality information to
the person wearing them. For instance, a person looking at a landmark could see
detailed historical information and comments about it left by friends. If facial
recognition software becomes accurate enough, the glasses could remind a wearer
of when and how he met the vaguely familiar person standing in front of him at a
party. They might also be used for virtual reality games that use the real world
as the playground.
People flailing their arms in midair as they play those games is a potentially
humorous outcome of the virtual reality glasses. In a more serious vein is the
almost certain possibility of privacy issues and ubiquitous advertisements. When
someone is meeting a person for the first time, for example, Google could
hypothetically match the person’s face and tell people how many friends they
share in common on social networks.
This month, the Electronic Privacy Information Center, a research and advocacy
group for Internet privacy, asked the Federal Trade Commission to suspend the
use of facial recognition software until the government could come up with
adequate safeguards and privacy standards to protect citizens.
Mr. Brinkman said he was very excited by the possibilities of the glasses, but
acknowledged that the augmented reality glasses could pose some ethical issues.
“In addition to privacy, it’s also going to change real-world advertising, where
companies can virtually place ads over other people’s ads,” he said. “I’m really
interested in seeing how the government can successfully regulate augmented
reality in this sense. They are not really going to know what people are seeing
behind those glasses.”
Behind the Google Goggles, Virtual Reality,
NYT, 22.2.2012,
http://www.nytimes.com/2012/02/23/technology/google-glasses-will-be-powered-by-android.html
WikiLeaks, a Postscript
February 19, 2012
The New York Times
By BILL KELLER
THIS is apparently the revenge of Julian Assange: everyone who
runs afoul of the rock-star leaker is condemned to spend eternity discussing the
cosmic meaning of WikiLeaks. As the editor of The Times during our publication
of many articles based on that treasury of military and diplomatic secrets, and
as the lucky man the WikiLeaks founder singled out as his Least Favorite
Journalist, I have participated in half a dozen panel discussions, and turned
down at least that many. I can’t complain about the one in Madrid, where, after
holding forth in a packed auditorium, the American, British, German, French and
Spanish editors who broke news based on WikiLeaks commemorated the collaboration
with an after-hours prowl through the Prado Museum and a 27-course meal cooked
by master chef Ferran Adrià. (If Europe is dying, Spain is where I plan to go
for the wake.) Unforgettable in a different way was the retrospective in
Berkeley, where Assange himself, then as now awaiting an extradition ruling in
England, was Skyped in on a giant screen, like the mighty Oz, to pontificate on
Western media’s failure to turn the files into a kind of Nuremberg trial of
American imperialism. About half the audience seemed on the verge of tossing
their underwear at the screen.
Add to that the three or four documentaries on the WikiLeaks adventure, the
dozen books — including, weirdly, Assange’s unauthorized autobiography — and a
couple speculative Hollywood projects, in which I have a twofold interest. (1.
The very slight possibility that I might make some money for my small piece of
the story. 2. The exceedingly remote chance that a director will take up my
wife’s brilliant idea that Assange be played by Tilda Swinton.)
It’s amazing they keep inviting me to these things, since I’m a bit of a
spoilsport. My consistent answer to the ponderous question of how WikiLeaks
transformed our world has been: really, not all that much. It was a hell of a
story and a wild collaboration, but it did not herald, as the documentarians
yearn to believe, some new digital age of transparency. In fact, if there is a
larger point, it is quite the contrary.
With the subject showing no signs of going away — one more documentary melodrama
of our WikiLeaks adventure will be featured at next month’s South by Southwest
festival — I decided to check up on the lingering fallout from what may be the
nation’s all-time greatest cascade of blown secrets.
Assange himself, who gave a handful of journalists early access to the pilfered
data, has moved from a supporter’s country mansion to much more modest digs
while he fights extradition to Sweden on sexual abuse charges. An American grand
jury is believed to still be mulling an indictment for his role in the leaks. He
compiled many hours of interviews for an autobiography, then backed out of the
project, but his publisher — in the proper anarchist spirit of WikiLeaks —
published it over his objections. (Evidently not for profit. It is No. 1,288,313
on the Amazon list of best-selling titles.) Assange’s newest project, announced
last month, is a television talk show in which he will interview “iconoclasts,
visionaries and power insiders.” So says the proud buyer of this series, RT
(formerly Russia Today), the Kremlin’s English-language propaganda arm and
keeper of the cult of Putin. No, not kidding.
Kremlin TV aside, Assange has declined from global notoriety to B-list
celebrity: he lacks enough star power for a hosting gig on “Saturday Night
Live,” but he did have a cameo in Sunday’s episode of “The Simpsons.”
Bart: “How ya doin’, Mr. Assange?”
Julian: “That’s my personal information, and you have no right to know about
it.”
Bada-bing.
The Army private accused of divulging three-quarters of a million secret
documents to WikiLeaks, Bradley Manning — who was at first kept in such inhumane
custody that the State Department spokesman quit in protest — is scheduled to be
arraigned Thursday on charges that could mean life in prison. You don’t have to
excuse his alleged crime to think the original sin in the whole drama is that
this tormented soul had access to so many secrets in the first place.
What we cannot know for sure is the fate of the many informants, dissidents,
activists and bystanders quoted in the American cables. Assange published source
names over the strong objections of the journalists who had access to the data
(we expunged the names from our reports) and to the horror of human rights
groups and some of his WikiLeaks colleagues. I’ve been told that a few exposed
sources fled their countries with American help, a few others were detained by
authorities, and none are known to have been killed. But would we even know?
When I read stories like the Reuters account last week of the three men beheaded
in Yemen for giving information to Americans, I worry anew about the many
innocent witnesses named in the WikiLeaks cables.
The publication of so many confidences and indiscretions did not bring U.S.
foreign policy to a halt. But it did, at least temporarily, complicate the lives
of U.S. diplomats. American officials say that foreign counterparts are
sometimes more squeamish about speaking candidly, and that it is harder to
recruit and retain informants around the world.
As raw material for journalists, the cache of secrets has had a phenomenal
afterlife. It’s been 10 months since The Times, The Guardian, Der Spiegel and
the other partners in this project filed their last major extracts from the
files. And still, literally every day, stories based on the trove appear
somewhere in the world, either because local news organizations are catching up
with morsels of scandal that did not attract major newsrooms, or because new
events cast the cables in a more interesting light. Notably, State Department
dispatches reporting on the dissolute lifestyles of Mideast autocrats provided a
little extra kindling for the bonfires of the Arab Spring.
But the idea that this was the opening of a floodgate has proved exactly wrong.
In the immediate aftermath of the breach, several news organizations (including
this one) considered creating secure online drop-boxes for would-be leakers,
imagining that new digital Deep Throats would arise. But it now seems clear that
the WikiLeaks breach was one of a kind — and that even lesser leaks are harder
than ever to come by.
Steven Aftergood, who monitors secrecy issues for the Federation of American
Scientists, said that since WikiLeaks the government has elevated the “insider
threat” as a priority, and tightened access to classified material. Nudged by an
irate Congress, the intelligence agencies are at work on an electronic auditing
program that would make illicit transfer of secrets much more difficult and make
tracking the leaker much easier.
“A lot of attention has been focused on WikiLeaks and its colorful proprietors,”
Aftergood told me. “But the real action, it turns out, is not at the publisher
level; it’s at the source level. And there aren’t a lot of sources as prolific
or as reckless as Bradley Manning allegedly was.”
For good reason. The Obama administration has been much more aggressive than its
predecessors in pursuing and punishing leakers. The latest case, the arrest last
month of John Kiriakou, a former C.I.A. terrorist-hunter accused of telling
journalists the names of colleagues who participated in the waterboarding of
Qaeda suspects, is symptomatic of the crackdown. It is this administration’s
sixth criminal case against an official for confiding to the media, more than
all previous presidents combined. The message is chilling for those entrusted
with keeping legitimate secrets and for whistleblowers or officials who want the
public to understand how our national security is or is not protected.
Here’s the paradox the documentaries have overlooked so far: The most palpable
legacy of the WikiLeaks campaign for transparency is that the U.S. government is
more secretive than ever.
WikiLeaks, a Postscript, NYT, 19.2.2012,
http://www.nytimes.com/2012/02/20/opinion/keller-wikileaks-a-postscript.html
Flaw Found in an Online Encryption Method
February 14, 2012
The New York Times
By JOHN MARKOFF
SAN FRANCISCO — A team of European and American mathematicians
and cryptographers have discovered an unexpected weakness in the encryption
system widely used worldwide for online shopping, banking, e-mail and other
Internet services intended to remain private and secure.
The flaw — which involves a small but measurable number of cases — has to do
with the way the system generates random numbers, which are used to make it
practically impossible for an attacker to unscramble digital messages. While it
can affect the transactions of individual Internet users, there is nothing an
individual can do about it. The operators of large Web sites will need to make
changes to ensure the security of their systems, the researchers said.
The potential danger of the flaw is that even though the number of users
affected by the flaw may be small, confidence in the security of Web
transactions is reduced, the authors said.
The system requires that a user first create and publish the product of two
large prime numbers, in addition to another number, to generate a public “key.”
The original numbers are kept secret. To encrypt a message, a second person
employs a formula that contains the public number. In practice, only someone
with knowledge of the original prime numbers can decode that message.
For the system to provide security, however, it is essential that the secret
prime numbers be generated randomly. The researchers discovered that in a small
but significant number of cases, the random number generation system failed to
work correctly.
The importance in ensuring that encryption systems do not have undetected flaws
cannot be overstated. The modern world’s online commerce system rests entirely
on the secrecy afforded by the public key cryptographic infrastructure.
The researchers described their work in a paper that the authors have submitted
for publication at a cryptography conference to be held in Santa Barbara,
Calif., in August. They made their findings public Tuesday because they believe
the issue is of immediate concern to the operators of Web servers that rely on
the public key cryptography system.
“This comes as an unwelcome warning that underscores the difficulty of key
generation in the real world,” said James P. Hughes, an independent Silicon
Valley cryptanalyst who worked with a group of researchers led by Arjen K.
Lenstra, a widely respected Dutch mathematician who is a professor at the École
Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that
99.8 percent security is fine,” he added. That still means that approximately as
many as two out of every thousand keys would not be secure.
The researchers examined public databases of 7.1 million public keys used to
secure e-mail messages, online banking transactions and other secure data
exchanges. The researchers employed the Euclidean algorithm, an efficient way to
find the greatest common divisor of two integers, to examine those public key
numbers. They were able to produce evidence that a small percentage of those
numbers were not truly random, making it possible to determine the underlying
numbers, or secret keys, used to generate the public key.
They said they “stumbled upon” almost 27,000 different keys that offer no
security. “Their secret keys are accessible to anyone who takes the trouble to
redo our work,” they wrote.
To prevent this, one of the organizations that had collected the public keys has
removed the information from the Internet and taken steps to protect it from
theft.
To perform their study, the researchers used several databases of public keys,
including one at the Massachusetts Institute of Technology and another created
by the Electronic Frontier Foundation, a Internet privacy rights group. The
foundation’s database results from a project, known as the SSL Observatory,
originally intended to investigate the security of the digital certificates that
are used to protect encrypted data transmitted between Internet users and Web
sites.
“We were very careful: we did not intercept any traffic, we did not sniff any
networks,” Mr. Hughes said. “We went to databases that contained public
information and downloaded public keys.”
The researchers said they were not able to determine why the random number
generators had produced imperfect results, but they noted that the problem
appeared in more than the work of a single software developer.
They also stated that if they had been able to discover the flaw, it was also
possible that it had been previously uncovered, perhaps by organizations or
individuals with malicious intent: “The lack of sophistication of our methods
and findings make it hard for us to believe that what we have presented is new,
in particular to agencies and parties that are known for their curiosity in such
matters,” they wrote.
While they said that the publication of results that potentially undermine the
security of encryption keys was inappropriate unless the parties were notified
first, the researchers noted that the way they discovered the flaw made
identifying potentially vulnerable parties a challenge.
“The quagmire of vulnerabilities that we waded into makes it infeasible to
properly inform everyone involved, though we made a best effort to inform the
larger parties and contacted all e-mail addresses recommended or specified in
still-valid affected certificates,” they wrote. “The fact that most certificates
do not contain adequate contact information limited our options. Our decision to
make our findings public, despite our inability to directly notify everyone
involved, was a judgment call.”
There have been previous failures of random number generators that have
undermined Internet security. For example, in 1995, two researchers at the
University of California, Berkeley, discovered a flaw in the way the Netscape
browser generated random numbers, making it possible for an eavesdropper to
decode encrypted communications. Last year a group of computer hackers revealed
that Sony had made a crucial mistake in not using a random number in the
algorithm used by the security system of the PlayStation 3, making it possible
to discover the secret key intended to protect digital content on the system.
The researchers whimsically titled their paper “Ron Was Wrong, Whit Is Right,” a
reference to two pioneers in public key cryptography, Ron Rivest and Whitfield
Diffie.
Mr. Diffie was a developer of the first method for two people who had not
previously physically met to share a secret message safely. However, what became
known as the R.S.A. algorithm, created by and named after three mathematicians,
Mr. Rivest, Adi Shamir and Leonard Adleman, ultimately became the dominant
standard. (They later helped found the security company RSA.) The so-called
Diffie-Hellman method, developed by Mr. Diffie, Martin Hellman and Ralph Merkle,
required only a single secret number.
Flaw Found in an Online Encryption Method,
14.2.2012,
http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html
An ‘Entertainment Device’ Is Expected From Google
February 9, 2012
The New York Times
By DAVID STREITFELD and NICOLE PERLROTH
SAN FRANCISCO — Google is developing a home entertainment
device, according to people with knowledge of the company’s plans, in a move
that would bring it more broadly into consumer electronics.
The device, which exists as a prototype and will eventually be sold as a branded
item to consumers, is the company’s most significant venture into hardware.
While the initial purpose of the device will be for streaming music, the
eventual use could be much wider.
As the Internet matures, the leading companies are trying to create full-fledged
ecosystems to preserve their individual dominance. Amazon, which began as a
retailer, now makes reading devices. Apple, which originally produced only
hardware, now sells content.
Google still makes the vast majority of its money from Internet search. But as
computing detaches from the desktop and laptop, the company cannot afford to be
marginalized. The new device is an effort to control the design, production and
sale of an entertainment device, just as its competitors have done so
successfully.
Larry Page, who last year took the reins of the company he co-founded, has been
intent on moving into hardware. The entertainment device has been in the works
for more than a year, before Google made a $12.5 billion deal to buy the handset
maker Motorola Mobility, the most likely manufacturer of the device. That
acquisition is likely to close next week.
Owning Motorola — whose origins lie in a company that made an earlier generation
of home entertainment systems before stumbling — will put Google into direct
competition with the phone makers that use its Android software as well as Apple
and its iPhone.
A Google spokesman declined to comment.
While Google has talked openly about its designs on consumers’ living rooms,
news that the device was becoming a reality surfaced last week in an application
the search giant filed with the Federal Communications Commission. In the
application, Google said it would begin testing a device it labeled simply an
“entertainment device.”
The device will have Bluetooth and Wi-Fi and, as Google noted in the
application, it will “connect to other home electronics equipment.” The
application, which was first reported by the tech Web site GigaOM, said Google
would test the device for stability in employees’ homes through the summer.
Analysts are wary of Google’s venture into the notoriously cutthroat hardware
field. Apple has loyal, sometimes fanatical followers, and enviably rich profit
margins. Amazon is willing to lose money on its devices and make it up on sales
of content. Most other hardware makers have a much tougher slog.
But Google is seen as having little choice.
“Google’s future depends on extending its influence beyond the PC screen,” said
James McQuivey, a Forrester analyst. “They’ve made tremendous progress in the
mobile phone business, but their attempts to do the same thing with the TV and
tablet flopped because the hardware manufacturers they relied on were not able
to move fast enough.”
But Mr. McQuivey noted that controlling manufacturing meant calling the shots.
“It’s quite telling that Amazon introduced its tablet two months ago and is
already the second tablet maker in the market,” he said.
Last November, Google introduced its own streaming music service to compete with
Apple and Amazon in the wars for digital media. The service lets users access
music from various Internet connected devices. By manufacturing its own device,
Google can tether those listeners back to its own product.
Google’s larger goal, a person closely tied to the project said, was to connect
everything in the home to the Internet, including light bulbs, speakers and TV
sets. Google unveiled a “conceptual” version of a multi-purpose device last year
at a developer conference.
The perils of not having full control of the design and manufacturing of a
device became apparent with Google TV, which was codeveloped in 2010 by Google,
Sony, Intel and Logitech. Reviewers hated it and the public scorned it. Guerrino
De Luca, chief executive of Logitech has acknowledged publicly that the Google
TV was “a mistake of implementation of a gigantic nature.”
Nick Bilton contributed reporting.
An ‘Entertainment Device’ Is Expected From
Google, NYT, 9.2.2012,
http://www.nytimes.com/2012/02/10/technology/google-at-work-on-an-entertainment-device.html
If Silicon Valley Costs a Lot Now,
Wait Until the Facebook Update
February 8, 2012
The New York Times
By MICHAEL COOPER
PALO ALTO, Calif. — Imagine looking for a house in San
Francisco or one of the nicer parts of Silicon Valley, which are already among
the most expensive parts of the country. Now imagine having to bid against a
legion of newly minted Facebook millionaires.
“I’m kind of worried — a thousand millionaires are going to be buying houses!”
Connie Cao said as she and her family toured a home in a good school district
here.
Her husband, Jared Oberhaus, was more optimistic. “Maybe sellers are sitting on
their houses now, waiting for Facebook, and they’ll all come on the market at
the same time,” he said.
It will be some time before the first Facebook shares are sold to the public,
and even longer before Facebook’s employees are able to turn their paper wealth
into cash and officially take their places as the newest members of the 1
percent. But the mere anticipation of the event may pour a little kerosene onto
what is already a fairly hot local real estate market.
When Ken DeLeon, a Silicon Valley real estate agent, recently sold an
8,000-square-foot house to a Facebook employee, he said, the movers showed up at
the client’s old 1,000-square-foot home and asked, “Did you win the lottery?”
Silicon Valley has been good to Mr. DeLeon, a former lawyer, who said he sold
$275 million worth of homes last year, and who is finishing up a memoir about
overcoming illness, injury and loss that he calls “Why Do Bad Things Happen to
Sexy People?”
Even after some of the air went out of the housing bubble in the Bay Area in
recent years, prices in the most desirable parts of San Francisco and Silicon
Valley stayed buoyant enough to remain out of reach for most people. A report on
2011 housing prices by Coldwell Banker, the real estate company, found that 8 of
the nation’s 20 most expensive markets were in Silicon Valley or the Bay Area.
Mr. DeLeon said Palo Alto, with its limited supply, had remained remarkably
strong — and could hit new peaks this year.
In recent weeks, he said, there have been signs that the market has been heating
up more: 10 homes in Palo Alto sold for more than their asking prices last
month, some by large amounts. Now, with the long-expected Facebook public
offering a step closer to reality, Mr. DeLeon said he expected to see several
things happen: some sellers may keep their homes off the market until they judge
the time is right, some speculators may snap up old houses to tear down and
rebuild, and some buyers may feel pressure to make offers before the deluge
hits.
A steady stream of would-be buyers walked through the open house Mr. DeLeon held
here on Sunday — a 2,325-square-foot home with a small backyard and an asking
price of nearly $1.8 million. They checked out the sunken Japanese-style dining
room and the heated concrete floors with leaf inlays. Many got lattes from the
barista stationed in the backyard.
Mr. DeLeon said he already had plans to market to Facebook employees. One
strategy: he intends to buy ads on Facebook. “It’s amazing how you can target
them,” he said.
If Silicon Valley Costs a Lot Now, Wait
Until the Facebook Update, NYT, 8.2.2012,
http://www.nytimes.com/2012/02/09/us/california-housing-market-braces-for-facebook-millionaires.html
The Zuckerberg Tax
February 7, 2012
The New York Times
By DAVID S. MILLER
WHEN Facebook goes public later this year, Mark Zuckerberg
plans to exercise stock options worth $5 billion of the $28 billion that his
ownership stake will be worth. The $5 billion he will receive upon exercising
those options will be treated as salary, and Mr. Zuckerberg will have a tax bill
of more than $2 billion, quite possibly making him the largest taxpayer in
history. He is expected to sell enough stock to pay his tax.
But how much income tax will Mr. Zuckerberg pay on the rest of his stock that he
won’t immediately sell? He need not pay any. Instead, he can simply use his
stock as collateral to borrow against his tremendous wealth and avoid all tax.
That’s what Lawrence J. Ellison, the chief executive of Oracle, did. He
reportedly borrowed more than a billion dollars against his Oracle shares and
bought one of the most expensive yachts in the world.
If Mr. Zuckerberg never sells his shares, he can avoid all income tax and then,
on his death, pass on his shares to his heirs. When they sell them, they will be
taxed only on any appreciation in value since his death.
Consider the case of Steven P. Jobs. After rejoining Apple in 1997, Mr. Jobs
never sold a single Apple share for the rest of his life, and therefore never
paid a penny of tax on the over $2 billion of Apple stock he held at his death.
Now his widow can sell those shares without paying any income tax on the
appreciation before his death. She would have to pay taxes only on the increase
in value from the time of his death to the time of the sale.
Now compare Mr. Zuckerberg with Lady Gaga. Last year she told Ellen DeGeneres
that she had to get “completely wasted” to sign her tax returns because she owed
so much. Lady Gaga reportedly earned $90 million in 2010. Because she earns fees
and royalties, she’s subject to the highest income-tax rate. So, assuming she’s
just as successful this year, she will certainly pay more than $30 million in
taxes and probably more than $45 million, which is infinitely more tax than Mr.
Zuckerberg will pay on the $23 billion of Facebook stock he now holds.
Why is this?
Our tax system is based on the concept of “realization.” Individuals are not
taxed until they actually sell property and realize their gains. But this system
makes less sense for the publicly traded stocks of the superwealthy. A drastic
change is necessary to fix this fundamental flaw in our tax system and finally
require people like Warren E. Buffett, Mr. Ellison and others to pay at least a
little income tax on their unsold shares. The fix is called mark-to-market
taxation.
For individuals and married couples who earn, say, more than $2.2 million in
income, or own $5.7 million or more in publicly traded securities (representing
the top 0.1 percent of families), the appreciation in their publicly traded
stock and securities would be “marked to market” and taxed annually as if they
had sold their positions at year’s end, regardless of whether the securities
were actually sold. The tax could be imposed at long-term capital gains rates so
tax rates would stay as they were.
We could call this tax the “Zuckerberg tax.” Under it, Mr. Zuckerberg would owe
an additional $3.45 billion when Facebook went public (that’s 15 percent of the
value of the roughly $23 billion of stock he owns). He could sell some shares to
pay the tax (and would be left with over $20 billion of Facebook stock after
tax), or borrow to pay the tax.
If his Facebook shares decline in value next year, he’d get a refund.
President Obama has proposed a “Buffett rule” that would require millionaires to
pay tax at a 30 percent effective minimum rate. Under the rule, Mr. Buffett’s
taxes might have doubled to $12 million in 2010, but this would represent only a
trivial amount of additional tax for him. If the Buffett rule applied in 2010,
Mr. Buffett’s effective tax rate would be only about 2/100 of 1 percent on the
$8 billion in appreciation of his holdings. A Zuckerberg tax would be far
better: under it Mr. Buffett would have paid $1.2 billion in tax in 2010.
A mark-to-market system of taxation on the top one-tenth of 1 percent would
raise hundreds of billions of dollars of new revenue over the next 10 years. The
new revenue could be used to lower payroll taxes, extend the George W. Bush tax
cuts, repeal the alternative minimum tax, reduce the budget deficit, prevent
military cuts or a combination of all of these.
This tax would not affect the middle class, or even most wealthy Americans. Nor
would it affect small-business owners. It would affect only individuals who were
undeniably, extraordinarily rich. Only publicly traded stock would be marked to
market.
Some would argue that it is inherently unfair to tax “paper gains” before they
are realized — Mr. Zuckerberg won’t receive $28 billion in cash; he holds only
paper. Moreover, markets are inherently volatile; one year’s paper gains is
another’s real losses. However, these arguments are far less credible when paper
losses give rise to real tax refunds. Moreover, in a downturn, the
mark-to-market tax would act as a fiscal stimulus — the cash refunds would
offset a declining stock market.
This proposal follows the Ronald Reagan model by broadening the “base” of tax
without increasing rates. In fact, Reagan was responsible for the last major
reform of our antiquated realization system when he signed a law requiring
taxpayers to pay a tax on interest that accrued on bonds but was not paid.
The most profound effect of a mark-to-market tax would be to level the playing
field between wage earners, on one hand, and founders and investors on the
other. Superwealthy holders of publicly traded securities could no longer escape
tax on their vast wealth.
David S. Miller is a tax lawyer.
The Zuckerberg Tax, NYT, 7.2.2012,
http://www.nytimes.com/2012/02/08/opinion/the-zuckerberg-tax.html
Steal This Column
February 5, 2012
The New York Times
By BILL KELLER
AMONG the wonders of the Internet, Wikipedia occupies a
special place. From its birth 11 years ago it has professed, and has tried
reasonably hard to practice, a kind of idealism that stands out in the vaguely,
artificially countercultural ambience of Silicon Valley. Google’s informal
corporate mantra — “Don’t Be Evil” — has become ever more cringe-making as the
company pursues its world conquest. Though Bill Gates has applied his personal
wealth to noble causes, nobody thinks of Microsoft as anything but a business. I
marvel at Facebook’s Mark Zuckerberg and his acolytes; but I marvel at their
imagination and industry, not what the new multibillionaire described last week
as their “social mission.” But Wikipedia, while it has grown something of a
bureaucratic exoskeleton, remains at heart the most successful example of the
public-service spirit of the wide-open Web: nonprofit, communitarian,
comparatively transparent, free to use and copy, privacy-minded, neutral and
civil.
Like many people, I was an early doubter that a volunteer-sourced encyclopedia
could be trusted, but I’m a convert. Although I find errors (a spot check of the
entries for myself and my father the other day found minor inaccuracies in both,
which I easily corrected), I use it more than any other Web tool except my
search engines, and because I value it, I donate to its NPR-style fund-raising
campaign.
So as I followed the latest battle in the great sectarian war over the governing
of the Internet — the attempt to curtail online piracy — I was startled to see
that Wikipedia’s founder and philosopher, Jimmy Wales, who generally stays out
of the political limelight, had assumed a higher profile as a combatant for the
tech industry. He supplied an aura of credibility to a libertarian alliance that
ranged from the money-farming Megatrons of Google to the hacker anarchists of
Anonymous.
Et tu, Jimmy?
For those of you who have not followed this subject — or who, like me, regard
phrases like “Net neutrality” as Novocain for the brain — the latest skirmish
concerns the rampant online theft of songs, films, books and other content.
Separate bills advancing in the House and Senate would have given the government
new tools to go after digital bootleggers. The central purpose of the
legislation — rather lost in the rhetorical cross-fire and press coverage — was
to extend the copyright laws that already protect content-creators in the U.S.
to offshore havens where the most egregious pirates have set up shop. Like most
people who make their living the way I do, I think parasite Web sites should be
treated with the same contempt as people who pick pockets or boost cars.
But the legislation in question, drafted by the once-mighty entertainment
industries, was vague and ham-handed, a case of overreach by Hollywood’s
lobbyists. In the journalistic equivalent of taking a bullet for you, I read all
78 staggeringly dull pages of the House version, called SOPA. Interpreted in the
most draconian way, it might have criminalized innocent sites and messed with
the secure plumbing of the Internet itself. The partisans of an unfettered
Internet saw their moment, and seized it. They unleashed a wave of protest that
included much waving of the First Amendment and an attention-grabbing blackout
of Wikipedia, the company’s most conspicuous foray into protest politics. The
legislation is dead, and proponents of the open Web have shown that they are the
new power in Washington.
The question is, how will they use their muscle now? Does this smackdown mean
that any attempt to police the Web for thievery is similarly doomed?
Jimmy Wales, when I connected with him in London, was the voice of reason
compared with some members of the openness alliance. He disavows the hacker
anarchists — whose most recent stunt to protest enforcement of the copyright
laws was to sabotage the Justice Department Web site — as “incredibly
counterproductive.” He said he believes copyright protection is “unquestionably
good” but that enforcement should focus on serious criminal enterprises, not the
music fan who burns a copy for a friend or the search engine that merely offers
the link to a bad place. (Agreed.) He worries that, under too-sweeping
legislation, a site like Wikipedia could be punished because its very
informative article about the aptly named site “The Pirate Bay” includes a link
to the offending destination. (That kind of prosecutorial overkill seems
unlikely, but it would be appalling.)
Wales thinks the current copyright protections — which require publishers,
broadcasters and other content-makers to watch out for piracy of their own
material and notify Internet hosts to take it down — work fine in the U.S. He
grants that enforcement in foreign countries is a problem, but he opposes as
burdensome and stifling any effort to make search engines or other
intermediaries filter what flows through them.
Wales is not endorsing legislation yet, but he had positive things to say about
an alternative bill, one that has won support from some tech companies and
Internet freedom groups. The so-called OPEN Act would give new powers to the
International Trade Commission to issue temporary restraining orders against
sites that specialize in selling bootleg copies of books, movies, TV shows and
so on, and to cut off their access to the online payment processors and
ad-placing services that fund them.
I read those 44 pages, too, and the best that can be said about the law —
drafted by the improbable left-right duo of Senator Ron Wyden, an Oregon
Democrat, and Representative Darrell Issa, a California Republican — is that
it’s a start. An impartial copyright expert who examined the bill at my request
pointed out many loopholes and ambiguities that could make enforcement
cumbersome and easily evaded. And personally, I’d go beyond OPEN (and Jimmy
Wales) to give the intermediaries — search engines, online sharing services —
greater responsibility to police what passes through their sites, rather than
obliging the victim to do all the work.
“Google can remove sites from its search results for causing too much spam; why
not for piracy?” said Robert Levine, whose 2011 book, “Free Ride,” is a
wonderfully clear-eyed account of this colossal struggle over the future of our
cultural lives.
But the OPEN Act is at least something to build on, and its sponsors have
indicated they are flexible. The music and motion-picture industries should be
reaching out to the saner members of the tech industry to collaborate in making
it better, instead of demonizing it as if it were written by Blackbeard himself.
The online industry is not a monolith. Internet companies that have made
fortunes building paid venues — Apple (proprietor of iTunes) and Microsoft (Xbox
Live) and Netflix, among others — have been pretty quiet during the angry
backlash against copyright laws. They have a financial stake in protecting
intellectual property.
“Basically, we need some serious reform,” Wales told me. “Everything should be
on the table. But it’s not a war; it’s a giant public policy question.”
Ah, Jimmy, Jimmy, there’s the rub. These days in Washington, everything is a
war. This is a complicated subject that has been turned into simplistic
sloganeering by rival vested interests dressed up as the saviors of freedom.
When the founders enshrined free speech in the Constitution, they did not mean
“free” in the sense of Wikipedia. As Justice Sandra Day O’Connor wrote in an
important 1985 Supreme Court decision supporting intellectual property rights:
“the Framers intended copyright itself to be the engine of free expression. By
establishing a marketable right to the use of one’s expression, copyright
supplies the economic incentive to create and disseminate ideas.”
Content-makers would be crazy to let the Internet be stunted as a force for
invention, mobilization and shared wisdom. It’s the sea we all swim in.
At the same time, online companies would be crazy to let piracy kill off the
commerce that supplies quality material upon which even free sites like
Wikipedia depend.
Steal This Column, NYT, 5.2.2012,
http://www.nytimes.com/2012/02/06/opinion/steal-this-column.html
How to Fight The Man
February 2, 2012
The New York Times
By DAVID BROOKS
A few weeks ago, a 22-year-old man named Jefferson Bethke
produced a video called “Why I Hate Religion, but Love Jesus.” The video shows
Bethke standing in a courtyard rhyming about the purity of the teachings of
Jesus and the hypocrisy of the church. Jesus preaches healing, surrender and
love, he argues, but religion is rigid, phony and stale. “Jesus came to abolish
religion,” Bethke insists. “Religion puts you in bondage, but Jesus sets you
free.”
The video went viral. As of Thursday, it had acquired more than 18 million hits
on YouTube. It speaks for many young believers who feel close to God but not to
the church. It represents the passionate voice of those who think their
institutions lack integrity — not just the religious ones, but the political and
corporate ones, too.
Right away, many older theologians began critiquing Bethke’s statements. A
blogger named Kevin DeYoung pointed out, for example, that it is biblically
inaccurate to say that Jesus hated religion. In fact, Jesus preached a religious
doctrine, prescribed rituals and worshiped in a temple.
Bethke responded in a way that was humble, earnest and gracious, and that
generally spoke well of his character. He also basically folded.
“I wanted to say I really appreciate your article man,” Bethke wrote to DeYoung
in an online exchange. “It hit me hard. I’ll even be honest and say I agree 100
percent.”
Bethke watched a panel discussion in which some theologians lamented young
people’s disdain of organized religion. “Right when I heard that,” he told The
Christian Post, “it just convicted me, and God used it as one of those Spirit
moments where it’s just, ‘Man, he’s right.’ I realized a lot of my views and
treatments of the church were not Scripture-based; they were very experience
based.”
Bethke’s passionate polemic and subsequent retreat are symptomatic of a lot of
the protest cries we hear these days. This seems to be a moment when many people
— in religion, economics and politics — are disgusted by current institutions,
but then they are vague about what sorts of institutions should replace them.
This seems to be a moment of fervent protest movements that are ultimately vague
and ineffectual.
We can all theorize why the intense desire for change has so far produced
relatively few coherent recipes for change. Maybe people today are simply too
deferential. Raised to get college recommendations, maybe they lack the
oppositional mentality necessary for revolt. Maybe people are too distracted.
My own theory revolves around a single bad idea. For generations people have
been told: Think for yourself; come up with your own independent worldview.
Unless your name is Nietzsche, that’s probably a bad idea. Very few people have
the genius or time to come up with a comprehensive and rigorous worldview.
If you go out there armed only with your own observations and sentiments, you
will surely find yourself on very weak ground. You’ll lack the arguments,
convictions and the coherent view of reality that you’ll need when challenged by
a self-confident opposition. This is more or less what happened to Jefferson
Bethke.
The paradox of reform movements is that, if you want to defy authority, you
probably shouldn’t think entirely for yourself. You should attach yourself to a
counter-tradition and school of thought that has been developed over the
centuries and that seems true.
The old leftists had dialectical materialism and the Marxist view of history.
Libertarians have Hayek and von Mises. Various spiritual movements have drawn
from Transcendentalism, Stoicism, Gnosticism, Thomism, Augustine, Tolstoy, or
the Catholic social teaching that inspired Dorothy Day.
These belief systems helped people envision alternate realities. They helped
people explain why the things society values are not the things that should be
valued. They gave movements a set of organizing principles. Joining a tradition
doesn’t mean suppressing your individuality. Applying an ancient tradition to a
new situation is a creative, stimulating and empowering act. Without a
tradition, everything is impermanence and flux.
Most professors would like their students to be more rebellious and
argumentative. But rebellion without a rigorous alternative vision is just a
feeble spasm.
If I could offer advice to a young rebel, it would be to rummage the past for a
body of thought that helps you understand and address the shortcomings you see.
Give yourself a label. If your college hasn’t provided you with a good knowledge
of countercultural viewpoints — ranging from Thoreau to Maritain — then your
college has failed you and you should try to remedy that ignorance.
Effective rebellion isn’t just expressing your personal feelings. It means
replacing one set of authorities and institutions with a better set of
authorities and institutions. Authorities and institutions don’t repress the
passions of the heart, the way some young people now suppose. They give them
focus and a means to turn passion into change.
How to Fight The Man, NYT, 2.2.2012,
http://www.nytimes.com/2012/02/03/opinion/brooks-how-to-fight-the-man.html
Online Ambitions,
and a Dash of Real Estate,
Drive Newspaper Deals
January 29, 2012
The New York Times
By TANZINA VEGA
IF the future of media is digital, who would want to buy a
newspaper? Many people, it turns out.
Investors acquired the newspapers in several major American cities in the second
half of 2011, including The San Diego Union-Tribune, The Chicago Sun-Times, The
Omaha World-Herald, The San Francisco Examiner and the 16 newspapers that made
up The New York Times Company’s Regional Media Group.
Seventy-one daily newspapers were sold in the United States last year, for a
total “just under $800 million,” said Owen Van Essen, president of Dirks, Van
Essen & Murray, a company that specializes in newspaper mergers and
acquisitions. Investors included billionaires like Warren E. Buffett and Philip
F. Anschutz, a newly created media company called Wrapports, and media investors
like Halifax Media Holdings and the Black Press Group.
Answering the question of why is a little more difficult. Advertising revenue
and circulation, two industry benchmarks, have come under tremendous pressure in
the last few years. According to the Newspaper Association of America, from 2006
through 2010, print advertising revenue declined to $22.8 billion from $46.6
billion for daily and Sunday papers. In the same period, paid circulation
figures declined at many newspapers as users migrated to the Web.
The notion of newspaper pages whipping through printing presses, then being
bundled with twine and tossed onto street corners might be considered romantic
by some while others view it as bad business. But while newspaper companies can
be bought on the cheap these days, some investors seem persuaded they can turn a
quick profit while others may view owning a paper as a civic duty.
“A lot of these companies are acquiring newspapers and looking for
underperforming assets,” said Agata Kaczanowska, a media industry analyst for
the research company IbisWorld. “They’ll acquire the local newspapers and
they’ll go in and slash operations to where these newspapers are profitable.
It’s kind of like flipping houses.”
Ken Doctor, a news industry analyst, highlighted the “historically low prices”
for newspaper properties and the potential for the buyers to make a profit. So
far, he said, “the way they have maintained profitability is cost-cutting” —
staff reductions, outsourcing and consolidating printing operations and call
centers.
Alan D. Mutter, a lecturer for the Graduate School of Journalism at the
University of California, Berkeley, and a former newspaper editor, pointed to
the deal made by the private equity group Platinum Equity, which bought The San
Diego Union-Tribune in 2009 for a sum reported to be less than $50 million and
resold it for more than $110 million in 2011.
“They’re hoping for the same miracle that occurred with Platinum,” Mr. Mutter
said. “That’s what all these guys are trying to get.”
On Platinum’s Web site, the company cites the actions it took to make The
Union-Tribune profitable. A video features interviews with Ed Moss, the
publisher of The Union-Tribune, and Jeff Light, the editor, highlighting the new
production system, a redesign of the paper and upgraded facilities as reasons
for the company’s recent success.
“After five consecutive years of double-digit declines, we’ve now stabilized the
revenue,” Mr. Moss said in the video, adding that the company was now profitable
every month.
Real estate assets may also play a part in decisions to buy, some analysts say.
“Newspapers have big buildings,” Mr. Doctor said. “They are usually in a
somewhat valuable location.”
Douglas Arthur, a publishing and media analyst at Evercore Partners agreed.
“There’s no doubt that people who have looked at these companies, part of their
equation is to look at the value of the real estate.”
Mr. Anschutz, owner of the Anschutz Corporation in Denver, bought the Oklahoma
Publishing Company in September. The Broadmoor, a luxury hotel in Colorado
Springs, Colo., was part of the sale.
In San Diego, the real estate interests of the paper’s new owner have been on
prominent display. Douglas W. Manchester, chairman of the Manchester Financial
Group and a developer who bought The San Diego Union-Tribune from Platinum
Equity, recently wrote a front-page editorial for the paper, which was renamed
U-T San Diego, calling for development of downtown waterfront land.
In an interview with Voice of San Diego, a nonprofit news organization, Mr.
Manchester made no secret of his desire to redevelop “the prime Mission Valley
parcel on which the paper’s headquarters sit.” Mr. Manchester, like many other
newspaper buyers, did not return requests for an interview.
Mr. Van Essen, the merger specialist, said that while some buyers weighed things
like real estate in their buying decisions, the real value in purchasing a paper
was in its content. “You recognize you’re buying more than just the printed
product,” Mr. Van Essen said. “You’re buying the entire organization, which is
the backbone to be able to produce a digital product.”
Papers have an advantage in the market for local online advertising. Mr. Mutter,
the Berkeley lecturer, said, “You have to think of it as an audience gathering,
advertising delivery system.” In addition to credibility and visibility in local
communities, newspapers offer advertisers “hundreds of millions of marketing
impressions a day,” he added.
Online ad revenue in the United States has increased steadily since 1999,
according to the Interactive Advertising Bureau, reaching $7.9 billion in the
third quarter of 2011, a 22 percent increase from the period a year earlier.
Timothy P. Knight, the former publisher of Newsday and one of the co-founders of
Wrapports, which bought The Chicago Sun-Times for $20 million in December, said
the company’s goal was to make additional investments in print and digital
properties.
“Print will continue to be an extremely important part of the product offering
we use in our local communities,” Mr. Knight said. “We think this is a terrific
opportunity to invest in using digital technology to deliver content and being
able to leverage the trust that local newspapers have.”
Mr. Arthur, of Evercore Partners, said the industry was experiencing “brief
surges in optimism” from the initial success of recent digital subscription
plans. Among those with such plans are The New York Times, The Financial Times
and The Wall Street Journal.
The MediaNews Group, based in Denver, announced in August that it would begin a
digital pay model for the online versions of 23 of its newspapers outside of
Colorado. Other newspapers have experienced increased payments for mobile and
e-reader versions of their print editions.
“There is the beginning of a slow paradigm shift on the Web, where suppliers of
content and consumers of content are beginning to realize that they need to pay
for content,” Mr. Arthur said. “The free lunch will not go on forever.”
Online Ambitions, and a Dash of Real
Estate, Drive Newspaper Deals, NYT, 29.1.2012,
http://www.nytimes.com/2012/01/30/business/media/online-ambitions-fuel-newspaper-deals.html
7 Charged as F.B.I. Closes a Top File-Sharing Site
January 20, 2012
The New York Times
By BEN SISARIO
In what authorities have called one of the largest criminal
copyright cases ever brought, the Justice Department and the F.B.I. have seized
the Web site Megaupload and charged seven people connected with it with running
an international enterprise based on Internet piracy.
Megaupload, one of the most popular so-called locker services on the Internet,
allowed users to transfer large files like movies and music anonymously. Media
companies have long accused it of abetting copyright infringement on a vast
scale. In a grand jury indictment, Megaupload is accused of causing $500 million
in damages to copyright owners and of making $175 million by selling ads and
premium subscriptions.
The arrests were greeted almost immediately with digital Molotov cocktails. The
hacker collective that calls itself Anonymous attacked the Web sites of the
United States Justice Department and several major entertainment companies and
trade groups in retaliation for the seizure of Megaupload.
The case against Megaupload comes at a charged time, a day after broad online
protests against a pair of antipiracy bills in Congress: the Stop Online Piracy
Act, or SOPA, in the House of Representatives, and the Protect Intellectual
Property Act, or PIPA, in the Senate. The bills would give United States
authorities expanded powers to crack down on foreign sites suspected of piracy.
But technology companies and civil liberties groups say that the powers are too
broadly defined and could effectively result in censorship.
Four of the seven people, including the site’s founder, Kim Dotcom (born Kim
Schmitz), were arrested Friday in New Zealand; the three others remain at large.
Each of the seven people — who the indictment said were members of a criminal
group it called Mega Conspiracy — is charged with five counts of copyright
infringement and conspiracy. The charges could result in more than 20 years in
prison.
As part of the crackdown, about 20 search warrants were executed in the United
States and in eight other countries, including New Zealand. About $50 million in
assets were also seized, as well as a number of servers and 18 domain names that
formed Megaupload’s network of file-sharing sites.
The police arrived at Dotcom Mansion in Auckland on Friday morning in two
helicopters. Mr. Dotcom, a 37-year-old with dual Finnish and German citizenship,
retreated into a safe room, and the police had to cut their way in. He was
eventually arrested with a firearm close by that the police said appeared to be
a shortened shotgun.
“It was definitely not as simple as knocking at the front door,” said Grant
Wormald, a detective inspector.
The police said they seized 6 million New Zealand dollars, or $4.8 million, in
luxury vehicles, including a Rolls-Royce Phantom Drophead Coupe and a pink 1959
Cadillac. They also seized art and electronic equipment and froze 11 million
dollars in cash in various accounts.
Mr. Dotcom and three others arrested in New Zealand appeared in court Friday
afternoon and were denied bail. Extradition proceedings will continue Monday.
The police said the other three arrested in New Zealand were Finn Batato, 38, a
German citizen and resident; Mathias Ortmann, 40, a German citizen who is a
resident of Hong Kong; and Bram van der Kolk, 29, a Dutch citizen who is a
resident of New Zealand.
The police said they were still searching Dotcom Mansion on Friday evening.
Ira P. Rothken, a lawyer for Megaupload, said by telephone Thursday that
“Megaupload believes the government is wrong on the facts, wrong on the law.”
On Wednesday, Google and Wikipedia joined dozens of sites in political protests
by blacking out some content and explaining their arguments against the
antipiracy laws.
The group Anonymous, which has previously set its sights on PayPal, Sony and
major media executives, was more blunt in its response. The group disabled the
Justice Department’s site for a time, and it also claimed credit for shutting
down sites for the Motion Picture Association of America and the Recording
Industry Association of America, two of the most powerful media lobbies in
Washington, as well as those of Universal Music Group, the largest music label,
and BMI, which represents music publishers.
“Let’s just say, for #SOPA supporters their #SOPAblackout is today,” Anonymous
wrote in a Twitter post. In an e-mail, a spokesman for the group said it was
responsible for the Web attacks.
The Megaupload case touches on many of the most controversial aspects of the
anti-piracy debate. Megaupload and similar sites, like RapidShare and MediaFire,
are often promoted as convenient ways to transfer large files legitimately; a
recent promotional video had major stars like Will.i.am of the Black Eyed Peas
singing Megaupload’s praises. But media companies say the legitimate uses are a
veil concealing extensive theft.
Mr. Dotcom has made himself a visible target. He splits his time between Hong
Kong and New Zealand and casts himself in flamboyant YouTube videos. His role as
one of the most prominent Web locker operators has earned him a half-joking
nickname in Hollywood: Dr. Evil.
According to the indictment, he took in $42 million from Megaupload’s operations
in 2010.
The indictment against Megaupload, which stems from a federal inquiry that began
two years ago, was handed down by a grand jury in Virginia two weeks ago but was
not unsealed until Thursday.
It quotes extensively from correspondence among the defendants, who work for
Megaupload and its related sites. The correspondence, the indictment says, shows
that the operators knew the site contained unauthorized content.
The indictment cites an e-mail from last February, for example, in which three
members of the group discussed an article about how to stop the government from
seizing domain names.
The Megaupload case is unusual, said Orin S. Kerr, a law professor at George
Washington University, in that federal prosecutors obtained the private e-mails
of Megaupload’s operators in an effort to show they were operating in bad faith.
“The government hopes to use their private words against them,” Mr. Kerr said.
“This should scare the owners and operators of similar sites.”
Nicole Perlroth and Jonathan Hutchison contributed reporting.
7 Charged as F.B.I. Closes a Top
File-Sharing Site, NYT, 20.1.2012,
http://www.nytimes.com/2012/01/21/technology/megaupload-indictment-internet-piracy.html
Senate Postpones Vote on Internet Piracy Bill
January 20,
2012
The New York Times
By JONATHAN WEISMAN
WASHINGTON
— Senator Harry Reid, the majority leader, on Friday called off a scheduled vote
on the online antipiracy bill that had rallied the World Wide Web and rocked
Capitol Hill, and House leaders took steps to slow legislation as well.
Taking to the medium that helped organize extensive protests against the
legislation, Mr. Reid, Democrat of Nevada, announced a delay in the vote via the
social media Web site Twitter. But he indicated the issue, which had been
scheduled for a vote Tuesday, had not died.
“There’s no reason that legitimate issues raised about Protect I.P. can’t be
resolved,” he wrote, referring to the legislation by its shorthand name.
“Counterfeiting & piracy cost 1000s of #jobs yearly. Americans rightfully expect
to be fairly compensated 4 their work. I’m optimistic that we can reach
compromise on Protect I.P. in coming week.”
In the House, Representative Lamar Smith, the Texas Republican who is chairman
of the Judiciary Committee, called off plans to formally draft his version of
the antipiracy bill next month.
After vowing two days ago to move forward, Mr. Smith said in a statement on
Friday: “The committee remains committed to finding a solution to the problem of
online piracy that protects American intellectual property and innovation.” But
he added, “The House Judiciary Committee will postpone consideration of the
legislation until there is wider agreement on a solution.”
The Protect I.P. Act and its counterpart in the House, the Stop Online Piracy
Act, had broad bipartisan support when they were drafted by Mr. Smith and
Senator Patrick Leahy, Democrat of Vermont and chairman of the Judiciary
Committee. The bills were pushed hard by the Hollywood studios, recording
industry, book publishing world and United States Chamber of Commerce as
antidotes to rampant piracy of American cultural wares by offshore Web sites.
But many Internet companies, including Google, Facebook, Twitter and Reddit, saw
the bills as a threat, and said they would stifle creativity on the Internet
while forcing search engines and social media to become police officers for the
Department of Justice. Other outlets, like Wikipedia, objected to any proposed
laws that could crimp the free flow of information on the Internet.
With new-economy aplomb, the Internet giants rallied their troops to rise up
against Washington stalwarts like the Motion Picture Association of America and
the Recording Industry Association of America. What had started as a nonpartisan
issue began turning to Republican advantage, as Republicans led the flight away
from the bill.
By Thursday night, senior Republican staff members were bragging that the
remaining supporters of the bills were largely Democrats, even though members of
both parties had helped draft them.
Mr. Leahy went along with Mr. Reid’s decision to back off, but he made it clear
he was doing so reluctantly.
“More time will pass with jobs lost and economies hurt by foreign criminals who
are stealing American intellectual property and selling it back to American
consumers,” he said in a statement.
“The day will come when the senators who forced this move will look back and
realize they made a knee-jerk reaction to a monumental problem,” he added.
“Somewhere in China today, in Russia today, and in many other countries that do
not respect American intellectual property, criminals who do nothing but peddle
in counterfeit products and stolen American content are smugly watching how the
United States Senate decided it was not even worth debating how to stop the
overseas criminals from draining our economy.”
Senate Postpones Vote on Internet Piracy Bill, NYT, 20.1.2012,
http://www.nytimes.com/2012/01/21/technology/senate-postpones-piracy-vote.html
In Fight Over Piracy Bills, New Economy Rises Against
Old
January 18, 2012
The New York Times
By JONATHAN WEISMAN
WASHINGTON — When the powerful world of old media mobilized to
win passage of an online antipiracy bill, it marshaled the reliable giants of K
Street — the United States Chamber of Commerce, the Recording Industry
Association of America and, of course, the motion picture lobby, with its new
chairman, former Senator Christopher J. Dodd, the Connecticut Democrat and an
insider’s insider.
Yet on Wednesday this formidable old guard was forced to make way for the new as
Web powerhouses backed by Internet activists rallied opposition to the
legislation through Internet blackouts and cascading criticism, sending an
unmistakable message to lawmakers grappling with new media issues: Don’t mess
with the Internet.
As a result, the legislative battle over two once-obscure bills to combat the
piracy of American movies, music, books and writing on the World Wide Web may
prove to be a turning point for the way business is done in Washington. It
represented a moment when the new economy rose up against the old.
“I think it is an important moment in the Capitol,” said Representative Zoe
Lofgren, Democrat of California and an important opponent of the legislation.
“Too often, legislation is about competing business interests. This is way
beyond that. This is individual citizens rising up.”
It appeared by Wednesday evening that Congress would follow Bank of America,
Netflix and Verizon as the latest institution to change course in the face of a
netizen revolt.
Legislation that just weeks ago had overwhelming bipartisan support and had
provoked little scrutiny generated a grass-roots coalition on the left and the
right. Wikipedia made its English-language content unavailable, replaced with a
warning: “Right now, the U.S. Congress is considering legislation that could
fatally damage the free and open Internet.” Visitors to Reddit found the site
offline in protest. Google’s home page was scarred by a black swatch that
covered the search engine’s label.
Phone calls and e-mail messages poured in to Congressional offices against the
Stop Online Piracy Act in the House and the Protect I.P. Act in the Senate. One
by one, prominent backers of the bills dropped off.
First, Senator Marco Rubio of Florida, a rising Republican star, took to
Facebook, one of the vehicles for promoting opposition, to renounce a bill he
had co-sponsored. Senator John Cornyn of Texas, who leads the G.O.P.’s Senate
campaign efforts, used Facebook to urge his colleagues to slow the bill down.
Senator Jim DeMint, Republican of South Carolina and a Tea Party favorite,
announced his opposition on Twitter, which was already boiling over with
anti-#SOPA and #PIPA fever.
Then trickle turned to flood — adding Senators Mark Kirk of Illinois and Roy
Blunt of Missouri, and Representatives Lee Terry of Nebraska and Ben Quayle of
Arizona. At least 10 senators and nearly twice that many House members announced
their opposition.
“Thanks for all the calls, e-mails, and tweets. I will be opposing #SOPA and
#PIPA,” Senator Jeff Merkley, Democrat of Oregon, wrote in a Twitter message.
Late Wednesday, Senator Charles E. Grassley of Iowa, the senior Republican on
the Senate Judiciary Committee, withdrew his support for a bill he helped write.
The existing bill “needs more due diligence, analysis and substantial changes,”
he said in a statement.
Few lawmakers even now question the need to combat pirates at Web sites in
China, Russia and elsewhere who have offered free American movies, television
shows, music and books almost as soon as they are released. Heavyweights like
the Walt Disney Company secured the support of senators and representatives
before the Web companies were even aware the legislation existed.
“A lot of people are pitching this as Hollywood versus Google. It’s so much more
than that,” said Maura Corbett, spokeswoman for NetCoalition, which represents
Google, Amazon.com, Yahoo, eBay and other Web companies. “I would love to say
we’re so fabulous, we’re just that good, but we’re not. The Internet responded
the way only the Internet could.”
For the more traditional media industry, the moment was menacing. Supporters of
the legislation accused the Web companies of willfully lying about the
legislation’s flaws, stirring fear to protect ill-gotten profits from illegal
Web sites.
Mr. Dodd said Internet companies might well change Washington, but not
necessarily for the better with their ability to spread their message globally,
without regulation or fact-checking.
“It’s a new day,” he added. “Brace yourselves.”
Citing two longtime liberal champions of the First Amendment, Senator Patrick
Leahy and Representative John Conyers Jr. of Michigan, Mr. Dodd fumed, “No one
can seriously believe Pat Leahy and John Conyers can be backing legislation to
block free speech or break the Internet.”
For at least four years, Hollywood studios, recording industry and major
publishing houses have pressed Congress to act against offshore Web sites that
have been giving away U.S. movies, music and books as fast as the artists can
make them. Few lawmakers would deny the threat posed by piracy to industries
that have long been powerful symbols of American culture and have become engines
of the export economy. The Motion Picture Association of America says its
industry brings back more export income than aerospace, automobiles or
agriculture, and that piracy costs the country as many as 100,000 jobs.
The House response, SOPA, was drafted by a conservative Republican,
Representative Lamar Smith of Texas, with the backing of 30 co-sponsors, from
Representative Debbie Wasserman Schultz of Florida, the chairwoman of the
Democratic National Committee, to mainline Republican Peter King of New York.
The Senate’s version, written by Mr. Leahy, the Vermont Democrat who is chairman
of the Senate Judiciary Committee chairman, attracted 40 co-sponsors from across
the political spectrum and cleared his committee unanimously.
Then the Web rose up. Activists said the legislation would censor the Web, force
search engines to play policemen for a law they hate and cripple innovation in
one of the most vibrant sectors of the American economy.
Mr. Smith, the House Republican author, said opposition Web sites were spreading
“fear rather than fact.”
“When the opposition is based upon misinformation, I have confidence in the
facts and confidence that the facts will ultimately prevail,” Mr. Smith said.
Google, Facebook and Twitter have political muscle of their own, with in-house
lobbying shops and trade associations just like traditional media’s. Facebook
has hired the former Clinton White House press secretary Joe Lockhart. Google’s
Washington operations are headed by Pablo Chavez, a former counsel to Senator
John McCain, Republican of Arizona, and a veteran of the Senate Commerce
Committee.
And for all the campaign contributions, Washington parties and high-priced
lobbyists the old economy could muster, nothing could compare to the tentacles
the new economy can reach into Americans’ everyday lives through sites like
Wikipedia. Aides to Senator Harry Reid, the majority leader, say he will press
forward with a vote Tuesday to open debate on the Protect I.P. bill. Negotiators
from both parties are scrambling for new language that could assuage the
concerns of the Internet community, but expectations are that the bill will now
fail to get the 60 votes to move forward — a significant setback.
“The problem for the content industry is they just don’t know how to mobilize
people,” said John P. Feehery, a former House Republican leadership aide who
previously worked at the motion picture association. “They have a small group of
content makers, a few unions, whereas the Internet world, the social media world
especially, can reach people in ways we never dreamed of before.”
In Fight Over Piracy Bills, New Economy
Rises Against Old, NYT, 18.1.2012,
http://www.nytimes.com/2012/01/19/technology/web-protests-piracy-bill-and-2-key-senators-change-course.html
Online Piracy and Political Overreach
January 18, 2012
The New York Times
For months, it seemed as if Congress would pass an online
antipiracy bill, even though its main weapons — cutting off the financing of
pirate Web sites and making them harder to find — risk censoring legitimate
speech and undermining the security of the Internet. But the unmovable
corporations behind those bills have run into an unstoppable force: an outcry by
Internet companies led by Google and Wikipedia that culminated in an
extraordinary online protest on Wednesday.
Lawmakers have begun peeling away from the bills, notably Senators Marco Rubio,
the Florida Republican who cosponsored the Senate version, and John Cornyn, the
powerful Texas conservative. They dropped out after Wikipedia’s English language
site went dark and Google put a black bar on its homepage on Wednesday.
The Protect I.P. Act would have easily passed the Senate last summer if not for
a hold placed by Senator Ron Wyden, a Democrat of Oregon. The Stop Online Piracy
Act, introduced in the House in October, has also lost some of its initial
backers. And on Saturday, the White House released a statement warning that it
would “not support legislation that reduces freedom of expression, increases
cybersecurity risk, or undermines the dynamic, innovative global Internet.”
Though we are encouraged by legislators’ newfound caution about the potential
consequences of the bills, Congress must keep working on ways to curtail the
growing business of foreign rogue Web sites trafficking in counterfeit goods and
stolen intellectual property.
The Internet industry was pitted against some of the best-honed lobbying groups,
including Hollywood and the recording studios, the United States Chamber of
Commerce and the A.F.L.-C.I.O. The industry has made a good case that some of
the definitions of wrongdoing — like “facilitating” intellectual property
infringement — were overly broad. They said allowing property rights owners to
direct payment companies like Visa and ad networks like Google’s to stop doing
business with sites they deemed infringing — with no penalties if they were
proved wrong— could stymie legitimate online expression.
They made the case that the proposal to make infringing Web sites “disappear”
from the Internet by forbidding search engines from finding them or redirecting
their Web addresses to other Internet domains was easy to get around and could
potentially undermine efforts to stop hackers from doing exactly the same thing.
The Internet companies now have the responsibility to come up with a workable
alternative that gives owners of intellectual property rights better tools to
stop piracy by Web sites located in faraway countries. These sites get some 53
billion visits a year, more than Google or Wikipedia. Yet they are outside the
grasp of American law.
The focus on cutting the financing of online pirates, which features in the
House and Senate bills, is the right way to go. Sponsors of both bills have
moved to delete, at least temporarily, provisions to make rogue Web sites
disappear. The legislation could be further amended to narrow the definition of
criminality and clarify that it is only aimed at foreign sites. And it could
tighten guarantees of due process. Private parties must first get a court order
to block business with a Web site they deem infringing on their copyrights.
We are happy that the drive to pass antipiracy legislation has slowed enough
that Congress might actually consider all its implications carefully. Lawmakers
can now act wisely to create tools that can help combat the scourge of online
piracy without excessive collateral damage.
Online Piracy and Political Overreach, NYT,
18.1.2012,
http://www.nytimes.com/2012/01/19/opinion/online-piracy-and-political-overreach.html
The False Ideals of the Web
January 18, 2012
The New York Times
By JARON LANIER
Berkeley, Calif.
WE who love the Internet love the fact that so many people contribute to it.
It’s hard to believe that skeptics once worried about whether anyone would have
anything worthwhile to say online.
There is, however, an outdated brand of digital orthodoxy that ought to be
retired. In this worldview, the Internet is a never-ending battle of good guys
who love freedom against bad guys like old-fashioned Hollywood media moguls. The
bad guys want to strengthen copyright law, and make it impossible to post
anonymously copied videos and stories.
The proposed Stop Online Piracy Act, or SOPA, which is being considered in the
House while the Senate looks at a similar bill, is deemed the worst thing ever.
Popular sites like Wikipedia staged a blackout on Wednesday to protest the
bills. Google put a black banner over its name. Nothing quite like that has ever
happened before. This is extraordinary, because it shows that belief in the
priority of fighting SOPA is so absolute as to trump the stated nonpartisan
missions of these sites.
The legislation has indeed included draconian remedies in various drafts, so I
join my colleagues in criticizing the bills. But our opposition has become so
extreme that we are doing more harm than good to our own cause. Those rare tech
companies that have come out in support of SOPA are not merely criticized but
barred from industry events and subject to boycotts. We, the keepers of the
flame of free speech, are banishing people for their speech. The result is a
chilling atmosphere, with people afraid to speak their minds.
Our melodrama is driven by a vision of an open Internet that has already been
distorted, though not by the old industries that fear piracy.
For instance, until a year ago, I enjoyed a certain kind of user-generated
content very much: I participated in forums in which musicians talked about
musical instruments.
For years, I was warned that old-fashioned control freaks like media moguls
might separate me from my beloved forums. Perhaps a forum would be shut down
because it was hosted on some server with pirated content.
While acknowledging that this is a possible scenario, a very different factor —
proprietary social networking — is ending my freedom to participate in the
forums I used to love, at least on terms I accept. Like many other forms of
contact, the musical conversations are moving into private sites, particularly
Facebook. To continue to participate, I’d have to accept Facebook’s philosophy,
under which it analyzes me, and is searching for new ways to charge third
parties for the use of that analysis.
At the moment that wouldn’t bother me much, because I know a lot of people at
Facebook and I know they are decent. But I’ve seen what happens to companies
over time. Who knows who will be using my data in 20 years?
You might object that it’s all based on individual choice. That argument ignores
the consequences of networks, and the way they function. After a certain point
choice is reduced.
And it’s not Facebook’s fault! We, the idealists, insisted that information be
able to flow freely online, which meant that services relating to information,
instead of the information itself, would be the main profit centers. Some
businesses do sell content, but that doesn’t address the business side of
everyday user-generated content.
The adulation of “free content” inevitably meant that “advertising” would become
the biggest business in the open part of the information economy. Furthermore,
that system isn’t so welcoming to new competitors. Once networks are
established, it is hard to reduce their power. Google’s advertisers, for
instance, know what will happen if they move away. The next-highest bidder for
each position in Google’s auction-based model for selling ads will inherit that
position if the top bidder goes elsewhere. So Google’s advertisers tend to stay
put because the consequences of leaving are obvious to them, whereas the
opportunities they might gain by leaving are not.
The obvious strategy in the fight for a piece of the advertising pie is to close
off substantial parts of the Internet so Google doesn’t see it all anymore.
That’s how Facebook hopes to make money, by sealing off a huge amount of
user-generated information into a separate, non-Google world. Networks lock in
their users, whether it is Facebook’s members or Google’s advertisers.
This belief in “free” information is blocking future potential paths for the
Internet. What if ordinary users routinely earned micropayments for their
contributions? If all content were valued instead of only mogul content, perhaps
an information economy would elevate success for all. But under the current
terms of debate that idea can barely be whispered.
To my friends in the “open” Internet movement, I have to ask: what did you think
would happen? We in Silicon Valley undermined copyright to make commerce become
more about services instead of content — more about our code instead of their
files. The inevitable endgame was always that we would lose control of our own
personal content, our own files. We haven’t just weakened Hollywood and
old-fashioned publishers. We’ve weakened ourselves.
Jaron Lanier is the author of “You Are Not a Gadget: A Manifesto”
and a researcher at Microsoft Research, but these views are his
alone.
The False Ideals of the Web, NYT,
18.1.2012,
http://www.nytimes.com/2012/01/19/opinion/sopa-boycotts-and-the-false-ideals-of-the-web.html
With Twitter, Blackouts and Demonstrations,
Web Flexes Its Muscle
January 18, 2012
The New York Times
By JENNA WORTHAM
The Web buzzed with protests large and small on Wednesday as
the tech industry rallied against Congressional legislation to curb Internet
piracy.
Some sites blacked out — among them, the English-language Wikipedia, though it
was possible to access the encyclopedia through several clever workarounds —
while others, including Google and Craigslist, draped their pages with
information about the bills, or restricted access.
Many start-ups quickly cobbled together tech solutions to support their cause.
HelloFax, for example, created a tool that let people send their representatives
faxes voicing their opinions through the Web.
The effort was an unusual orchestration that began gathering steam online late
Tuesday night and escalated early Wednesday morning, eventually whipping the Web
into a frenzy.
Google said 4.5 million people signed its online petition to Congress, voicing
displeasure at the legislation; Twitter said more than two million posts on the
subject flowed through the site by early afternoon, nearly four times as many as
usual.
Engine Advocacy, a service that helps people call their local members of
Congress, said on Twitter that it was averaging roughly 2,000 calls per second,
while Wikimedia Foundation, the nonprofit organization that oversees Wikipedia,
said four million people used its blacked-out site to look up contact
information for their local representative.
Opponents of the legislation also took their demonstrations into the real world
in New York, San Francisco and Seattle, but drew relatively modest numbers of
protesters. Still, for a group that tends to be more comfortable showing
solidarity from behind the warm glow of a computer screen — by changing a
profile picture or reposting a favorite motto — it was a considerable showing.
The New York rally, organized by a tech industry trade group, attracted about a
thousand protesters in Midtown Manhattan.. Sebastian Delmont, 38, who works at
StreetEasy, a real estate search site, said about half of his co-workers
attended the protest. “Our worry is that they are building something like a
Great Firewall, like in China and the Middle East,” he said.
In Washington by Wednesday morning, several lawmakers had reconsidered their
support of the bills — one in the House, one in the Senate. The legislation is
intended to curtail copyright abuses by preventing American search engines and
Web sites from directing users to the mostly foreign sites that allow for the
distribution of stolen materials like music, movies, television shows, software
and other content.
The tech industry has argued that the bills are too broad, threaten free speech,
stifle innovation and most likely will not even effectively eliminate piracy.
A freshman senator, Marco Rubio of Florida, a rising Republican star, announced
that he would no longer back the Senate bill, the Protect Intellectual Property
Act, or PIPA, which he had co-sponsored. Senator John Cornyn, the Texas
Republican who heads the campaign operation for his party, urged Congress take
more time to study the measure.
“Concerns about unintended damage to the Internet and innovation in the tech
sector require a more thoughtful balance, which will take more time,” he posted
on his Facebook page at 9 a.m.
Supporters of the bills, like major media and entertainment companies, struggled
to get their message out, but found the going rough. “It’s very difficult to
counter the misinformation when the disseminators also own the platform," said
Cary H. Sherman, chairman and chief executive of the Recording Industry
Association of America, a trade group that represents the United States music
industry, referring to Google and Facebook.
Mike Nugent, executive director of Creative America, a coalition of major
entertainment companies and industry unions, said he was taking the long view on
the issue and not focusing on the Internet protests this week. “We’re digging in
for a tough fight over the next week and in the longer term,” he said.
On Wednesday, the corporate group began its second nationwide advertising
campaign in print, radio and television to push the legislation. A banner ad
with the headline “What to Do During an Internet Blackout” appeared on select
Web sites and on a Times Square billboard. Suggestions included: “Read a book.
Listen to music. Go to a movie. Watch the game. Tune into a show” — all
copyrighted content the legislation intends to protect.
The group will also hold town hall meetings and place robo-calls in certain
districts to educate constituents on the need for these bills, Mr. Nugent said.
“It really comes down to ‘Don’t steal our stuff,’ ” he said.
But the issue is difficult for some in the entertainment industry. Andy Samberg
of "Saturday Night Live,” for example, and his colleagues in the video comedy
group the Lonely Island, as well as a number of musicians and authors, wrote a
letter to Congress saying they had serious concerns about the legislation as
written.
“Online piracy is harmful and it needs to be addressed, but not at the expense
of censoring creativity, stifling innovation or preventing the creation of new,
lawful digital distribution methods,” they said in the letter.
The activity on the Web touched many different kinds of sites. More than 25,000
blogs on the popular platform WordPress chose to go black to support the cause,
and 12,500 others added a “Stop Censorship” ribbon to their sites. Fight for the
Future, a nonprofit group helping coordinate efforts around the Web, said 50,000
sites had promised their allegiance and pledged participation in the online
demonstration.
I Can Has Cheezburger, a hub for humorous pictures of cats, and Etsy, a
marketplace for crafts, greeted users with banners of information about the
bills. Reddit, a community discussion site; Boing Boing, the culture blog; and
the comedy video site My Damn Channel were blacked out.
The mobile restaurant finder UrbanSpoon and some news organizations, including
Wired.com, blacked out some content.
Mark Zuckerberg, chief executive of Facebook who had previously remained silent
about the bills, weighed in by late Wednesday afternoon. He posted on his own
Facebook page, saying: “The world today needs political leaders who are
pro-Internet. We have been working with many of these folks for months on better
alternatives to these current proposals.”
Within an hour, more than 200,000 Facebook users had clicked the Like button on
his post.
Even a few in Congress joined in the online efforts. Representatives Anna G.
Eshoo, Democrat of California who represents part of Silicon Valley, and Earl
Blumenauer, Democrat of Oregon, blacked out their Congressional sites for the
day. And by late Wednesday afternoon, Senator Kirsten Gillibrand, a Democrat in
New York who was a co-sponsor of the PIPA bill, posted this message on her
Facebook page: “I agree there are real concerns with the current legislation &
I’m working to make important changes to the bill. We must work to strike a
balance between ending online piracy to protect New York jobs & ensuring
Internet freedom so our tech community can continue to flourish.”
In San Francisco, 60 people gathered at the stairs of City Hall to join the
protest.
"I don’t go to rallies,” said Anis Salvesen, 34, the marketing manager for
Tripping, a travel start-up based in San Francisco. “I’ve been to one other
rally in my life. But this legislation is bad, it would directly impact our
company." He added, “We’ve made our point. The next move is on them and if they
don’t respond, then we will keep at them.”
Brian Chen, Amy Chozick and Jonathan Weisman contributed
reporting.
With Twitter,
Blackouts and Demonstrations, Web Flexes Its Muscle, NYT, 18.1.2012,
http://www.nytimes.com/2012/01/19/technology/protests-of-antipiracy-bills-unite-web.html
Behold the Power of Google
January 18, 2012
2:35 pm
The New York Times
By ANDREW ROSENTHAL
The Loyal Opposition - From the Desk of Andrew Rosenthal
Talk about instant gratification.
Big Internet companies such as Google and Firefox, and the English-language
version of Wikipedia, are holding a one-day protest today against anti-piracy
bills moving through Congress. Many people (including the members of the Times
editorial board) have been fighting these bills for months, without much visible
success. But within hours of the black bar appearing on Google’s home page, D.C.
reacted.
Marco Rubio of Florida started things off. He announced this morning that he was
no longer backing the Protect Intellectual Property Act. This was interesting
not just because he’s a right-wing favorite who is talked about as White House
material, but because Senator Rubio actually co-sponsored that bill.
Later, Senator John Cornyn of Texas also said he would no longer back the bill
and said Congress should slow down on this sweeping legislation. He said on his
Facebook page that it was better to get this bill right, rather than “fast and
wrong.” That was refreshing because I can’t remember the last time Mr. Cornyn
acted sensibly. His voice matters, because he heads the Senate campaign
committee, which controls millions of dollars in re-election funds.
Congress should certainly take more time on the Senate bill, and on the House
version, the Stop Online Piracy Act, but it shouldn’t abandon the issue
entirely.
There’s a lot of hysteria on both sides of this debate. The current legislation
does go too far, and could cause real harm to free speech and innovation on the
Web. It would give copyright holders too much power, allowing Internet service
providers to block sites that seem to enable intellectual property infringement,
without legal oversight. But online piracy is a gigantic problem. Millions of
people routinely steal other people’s intellectual property every day without a
moment’s hesitation.
We’re written about these issues in detail on the editorial page and will have
more to say on the subject. With patience and political courage, the two sides
could find middle ground. Requiring court orders in lieu of pre-emptive strikes
against sites suspected of wrongdoing would go a long way
But the fact is, Google and Wikipedia did everyone a big service, and the swift
reaction of lawmakers was gratifying. Now, if Mr. Cornyn and Mr. Rubio would pay
as much attention to the Occupy protesters and the pain of the middle class, the
country would be even better off.
This blog post has been revised to reflect the following
correction:
Correction: January 17, 2012
An earlier version of this post stated that the Protect Intellectual Property
Act
is a House bill. It’s actually a Senate bill.
Behold the Power of Google, NYT, 18.1.2012,
http://loyalopposition.blogs.nytimes.com/2012/01/18/behold-the-power-of-google/
Young, in Love and Sharing Everything,
Including a Password
January 17, 2012
The New York Times
By MATT RICHTEL
Young couples have long signaled their devotion to each other
by various means — the gift of a letterman jacket, or an exchange of class rings
or ID bracelets. Best friends share locker combinations.
The digital era has given rise to a more intimate custom. It has become
fashionable for young people to express their affection for each other by
sharing their passwords to e-mail, Facebook and other accounts. Boyfriends and
girlfriends sometimes even create identical passwords, and let each other read
their private e-mails and texts.
They say they know such digital entanglements are risky, because a souring
relationship can lead to people using online secrets against each other. But
that, they say, is part of what makes the symbolism of the shared password so
powerful.
“It’s a sign of trust,” Tiffany Carandang, a high school senior in San
Francisco, said of the decision she and her boyfriend made several months ago to
share passwords for e-mail and Facebook. “I have nothing to hide from him, and
he has nothing to hide from me.”
“That is so cute,” said Cherry Ng, 16, listening in to her friend’s comments to
a reporter outside school. “They really trust each other.”
We do, said Ms. Carandang, 17. “I know he’d never do anything to hurt my
reputation,” she added.
It doesn’t always end so well, of course. Changing a password is simple, but
students, counselors and parents say that damage is often done before a password
is changed, or that the sharing of online lives can be the reason a relationship
falters.
The stories of fallout include a spurned boyfriend in junior high who tries to
humiliate his ex-girlfriend by spreading her e-mail secrets; tensions between
significant others over scouring each other’s private messages for clues of
disloyalty or infidelity; or grabbing a cellphone from a former best friend,
unlocking it with a password and sending threatening texts to someone else.
Rosalind Wiseman, who studies how teenagers use technology and is author of
“Queen Bees and Wannabes,” a book for parents about helping girls survive
adolescence, said the sharing of passwords, and the pressure to do so, was
somewhat similar to sex.
Sharing passwords, she noted, feels forbidden because it is generally
discouraged by adults and involves vulnerability. And there is pressure in many
teenage relationships to share passwords, just as there is to have sex.
“The response is the same: if we’re in a relationship, you have to give me
anything,” Ms. Wiseman said.
In a 2011 telephone survey, the Pew Internet and American Life Project found
that 30 percent of teenagers who were regularly online had shared a password
with a friend, boyfriend or girlfriend. The survey, of 770 teenagers aged 12 to
17, found that girls were almost twice as likely as boys to share. And in more
than two dozen interviews, parents, students and counselors said that the
practice had become widespread.
In a recent column on the tech-news Web site Gizmodo, Sam Biddle called password
sharing a linchpin of intimacy in the 21st century, and offered advice to
couples and friends on how to avoid missteps.
“I’ve known plenty of couples who have shared passwords, and not a single one
has not regretted it,” said Mr. Biddle in an interview, adding that the practice
includes the unspoken notion of mutually assured destruction if somebody
misbehaves. “It’s the kind of symbolism that always goes awry.”
Students say there are reasons, beyond a show of trust, to swap online keys. For
instance, several college students said they regularly shared Facebook passwords
— not to snoop on or monitor each other, but to force themselves to study for
finals. A student would give her password to a friend to change it — and not
disclose the new password — thereby temporarily locking out the Facebook account
holder and taking away a big distraction to studying.
Alexandra Radford, 20, a junior at San Francisco State University, said she had
done this for friends several times during exams. One friend wanted to know the
new password before finals ended, but Ms. Radford held firm.
“Once finals were over, I gave it to her,” she said. “She was, like, ‘Oh, my
gosh, thank you.’ She knew I was good about not giving her the password back.”
But Ms. Radford is more sheepish about the passwords she shared a few years ago
in high school with her boyfriend. They even changed their passwords to reflect
their relationship. Hers: ILoveKevin. His: ILoveAly.
“We did it so I could check his messages because I didn’t trust him, which is
not healthy,” she conceded.
Counselors typically advise against the practice, and parents often preach the
wisdom of password privacy. Winifred Lender, a child psychologist in Santa
Barbara, had her three sons sign “digital contracts” that outline terms for how
much media they will consume, how they will behave online and that they will not
share passwords. Still, Ms. Lender said, her 14-year-old was recently asked by a
friend for his password.
“He said: ‘You give me yours and I’ll give you mine.’ ”
Her son was taken aback but then relied on a tried-and-true excuse for saying
no. “He blamed it on his parents,” Ms. Lender said of her son. “He said, ‘If I
give you my password, my mom will have a cow.’ ”
Emily Cole, 16, a high school junior in Glastonbury, Conn., felt the sting of
password betrayal in seventh grade, when she gave her e-mail password to her
first boyfriend.
Then she started to develop feelings for another student, she said, and sent an
e-mail to her. Her boyfriend read the e-mail and started spreading it around the
school, calling Ms. Cole a “pervert.”
Ms. Cole said it was deeply hurtful. And yet, despite what happened, she said
she would not have reservations about sharing her password with her new
boyfriend.
“I know this sounds kind of weird, but we have a different relationship,” she
said. “We’re not in seventh grade. I trust him in a different way, I suppose.”
Ms. Cole’s mother, Patti, 48, a child psychologist, said she believed her
daughter would be more judicious now about sharing a password. But, more
broadly, she thinks young people are sometimes drawn to such behavior as they
might be toward sex, in part because parents and others warn them against doing
so.
“What worries me is we haven’t done a very good job at stopping kids from having
sex,” she said. “So I’m not real confident about how much we can change this
behavior.”
Young, in Love and Sharing Everything,
Including a Password, NYT, 17.1.2012,
http://www.nytimes.com/2012/01/18/us/teenagers-sharing-passwords-as-show-of-affection.html
Protest on Web Uses Shutdown to Take On Two Piracy
Bills
January 17, 2012
The New York Times
By JENNA WORTHAM
With a Web-wide protest on Wednesday that includes a 24-hour
shutdown of the English-language Wikipedia, the legislative battle over two
Internet piracy bills has reached an extraordinary moment — a political coming
of age for a relatively young and disorganized industry that has largely steered
clear of lobbying and other political games in Washington.
The bills, the Stop Online Piracy Act in the House and the Protect IP Act in the
Senate, are backed by major media companies and are mostly intended to curtail
the illegal downloading and streaming of TV shows and movies online. But the
tech industry fears that, among other things, they will give media companies too
much power to shut down sites that they say are abusing copyrights.
The legislation has jolted technology leaders, venture capitalists and
entrepreneurs, who are not accustomed to having their free-wheeling online world
come under attack.
One response is Wednesday’s protest, which directs anyone visiting Google and
many other Web sites to pages detailing the tech industry’s opposition to the
bills. Wikipedia, run by a nonprofit organization, is going further than most
sites by actually taking material offline — no doubt causing panic among
countless students who have a paper due.
It said the move was meant to spark greater public opposition to the bills,
which could restrict its freedom to publish.
“For the first time, it’s very clear that legislation could have a direct impact
on the industry’s ability to do business,” said Jessica Lawrence, the managing
director of New York Tech Meetup, a trade organization with 20,000 members that
has organized a protest rally in Manhattan on Wednesday. “This has been a
wake-up call.”
Tim Wu, a professor at Columbia Law School, said that the technology industry,
which has birthed large businesses like Google, Facebook and eBay, is much more
powerful than it used to be.
“This is the first real test of the political strength of the Web, and
regardless of how things go, they are no longer a pushover,” said Professor Wu,
who is the author of “The Master Switch: The Rise and Fall of Information
Empires.” He added, “The Web taking a stand against one of the most powerful
lobbyers and seeming to get somewhere is definitely a first.”
Under the proposed legislation, if a copyright holder like Warner Brothers
discovers that a foreign site is focused on offering illegal copies of songs or
movies, it could seek a court order that would require search engines like
Google to remove links to the site and require advertising companies to cut off
payments to it.
Internet companies fear that because the definitions of terms like “search
engine” are so broad in the legislation, Web sites big and small could be
responsible for monitoring all material on their pages for potential violations
— an expensive and complex challenge.
They say they support current law, which requires Web sites with
copyright-infringing content to take it down if copyright holders ask them to,
leaving the rest of the site intact. Google, which owns YouTube and other sites,
received five million requests to remove content or links last year, and it says
it acts in less than six hours if it determines that the request is legitimate.
The major players supporting the legislation, including the United States
Chamber of Commerce and the Motion Picture Association of America, say those
measures are not enough to protect intellectual property. They emphasize that
their primary targets are foreign Web sites that sell counterfeit goods and let
people stream and download music and video at no charge — sites that are now
largely out of reach of United States law enforcement. And they are fighting
against what they characterize as gimmicks and distortions by Internet companies
opposed to the bills.
With talk of censorship and loss of Internet freedom, “the current debate has
nothing to do with the substance of the bills,” David Hirschmann, who leads the
Chamber of Commerce’s initiative on intellectual property, said in an interview.
“We will certainly use every tool in our toolbox to make sure members of
Congress know what’s in these bills.”
With financial resources that few other groups can match, the chamber is one of
Washington’s most powerful lobbying forces and has shown the ability to alter
Congressional debate on its own.
Senator Patrick J. Leahy, Democrat of Vermont and author the Protect IP Act,
accused opponents Tuesday of trying to “stoke fear” through tactics like the
Wikipedia blackout. “Protecting foreign criminals from liability rather than
protecting American copyright holders and intellectual property developers is
irresponsible, will cost American jobs, and is just wrong,” he said in a
statement.
Opponents of the legislation have clearly seized the momentum in the debate.
Their protests have gained traction in that key provisions were stripped out of
one bill and the Obama administration has raised concerns. Legislators have
already agreed to delay or drop one ire-inducing component of the bills, Domain
Name System blocking, which would prevent access to sites that were found to
have illegal content.
A total of 115 companies and organizations have lobbyists working on the
antipiracy bills, spending millions of dollars to sway the outcome, according to
federal disclosure records. They include corporate and technology giants on both
sides of the legislation, with entertainment groups like News Corporation and
the Recording Industry Association of America backing it and Internet firms like
Google and Facebook raising concerns about it.
The largest advocates for the bills disagree with the tech industry’s main
rallying cry, which is the notion that they will hurt the average Internet user
or interfere with their online activities.
“The bill will not harm Wikipedia, domestic blogs or social network sites,” said
Representative Lamar Smith, Republican of Texas and a primary sponsor of the
House bill.
Most people in the tech world agree that the problem of piracy needs to be
addressed. But they say their main concern is that the tech industry had little
influence on the language of the legislation, which is still in flux and so
broadly worded that it is not entirely clear how Internet businesses will be
affected. Big Internet companies say the bills could prevent entire Web sites
from appearing in search results — even if the sites operate legally and most
content creators want their videos or music to appear there.
“It shouldn’t apply to U.S. Web sites, but any company with a server overseas or
a domain name overseas could be at risk,” said Andrew McLaughlin, vice president
at Tumblr, a popular blogging service.
Mr. McLaughlin said the fear is that on large and diverse Web communities like
Tumblr, any user who uploads an unauthorized clip from a movie or an unreleased
track from an album is putting the whole company in the line of fire.
In November, Tumblr rigged a tool that “censored” the page its users see when
they log into the site, explained the legislation and routed them to contact
information for their representatives in Congress. The stunt resulted in 80,000
calls to legislators in a three-day period. Mr. McLaughlin said the company was
planning a similar approach for Wednesday.
Some who oppose the bill, including the Electronic Frontier Foundation, an
online rights group, see a bright spot in a potential compromise called the OPEN
Act, which would provide for the International Trade Commission to judge cases
of copyright or trademark infringement. If the commission found that a foreign
site was largely devoted to piracy, it could compel payment processors and
online advertising companies to stop doing business with it.
Silicon Valley has championed companies that provide alternatives to piracy,
like Spotify and Netflix. And the industry says that the problem could be solved
by letting it do what it does best — innovating.
“It’s something that could be solved using technology through collaboration with
these start-ups,” said Ms. Lawrence of New York Tech Meetup.
Reporting was contributed by Eric Lichtblau, Edward Wyatt and Claire Cain
Miller.
Protest on Web Uses Shutdown to Take On Two
Piracy Bills, NYT, 17.1.2012,
http://www.nytimes.com/2012/01/18/technology/web-wide-protest-over-two-antipiracy-bills.html
Web Gang Operating in the Open
January 16, 2012
The New York Times
By RIVA RICHMOND
Five men believed to be responsible for spreading a notorious
computer worm on Facebook and other social networks — and pocketing several
million dollars from online schemes — are hiding in plain sight in St.
Petersburg, Russia, according to investigators at Facebook and several
independent computer security researchers.
The men live comfortable lives in St. Petersburg — and have frolicked on luxury
vacations in places like Monte Carlo, Bali and, earlier this month, Turkey,
according to photographs posted on social network sites — even though their
identities have been known for years to Facebook, computer security
investigators and law enforcement officials.
One member of the group, which is popularly known as the Koobface gang, has
regularly broadcast the coordinates of its offices by checking in on Foursquare,
a location-based social network, and posting the news to Twitter. Photographs on
Foursquare also show other suspected members of the group working on Macs in a
loftlike room that looks like offices used by tech start-ups in cities around
the world.
Beginning in July 2008, the Koobface gang aimed at Web users with invitations to
watch a funny or sexy video. Those curious enough to click the link got a
message to update their computer’s Flash software, which begins the download of
the Koobface malware. Victims’ computers are drafted into a “botnet,” or network
of infected PCs, and are sent official-looking advertisements of fake antivirus
software and their Web searches are also hijacked and the clicks delivered to
unscrupulous marketers. The group made money from people who bought the bogus
software and from unsuspecting advertisers.
The security software firm Kaspersky Labs has estimated the network includes
400,000 to 800,000 PCs worldwide at its height in 2010. Victims are often
unaware their machines have been compromised.
The Koobface gang’s freedom underscores how hard it is to apprehend
international computer criminals, even when identities are known. These groups
tend to operate in countries where they can work unmolested by the local
authorities, and where cooperation with United States and European law
enforcement agencies is poor. Meanwhile, Western law enforcement is awash in
computer crime and lacks the resources and skilled manpower to tackle it
effectively, especially when evidence putting individuals’ fingers on keyboards
must be collected abroad.
On Tuesday, Facebook plans to announce that it will begin sharing information
about the group and how to fight them with security researchers and other
Internet companies. It believes public namings can make it harder for such
groups to operate and send a message to the criminal underground.
None of the men have been charged with a crime and no law enforcement agencies
have confirmed they are under investigation.
The group investigators have identified has adopted the tongue-in-cheek name,
Ali Baba & 4: Anton Korotchenko, who uses the online nickname “KrotReal”;
Stanislav Avdeyko, known as “leDed”; Svyatoslav E. Polichuck, who goes by
“PsViat” and “PsycoMan”; Roman P. Koturbach, who uses the online moniker
“PoMuc”; and Alexander Koltysehv, or “Floppy.” )
Efforts to contact members of the group for comment have been unsuccessful.
Weeks after early versions of the Koobface worm began appearing on Facebook,
investigators inside the company were able to trace the attacks to those
responsible. “We’ve had a picture of one of the guys in a scuba mask on our wall
since 2008,” said Ryan McGeehan, manager of investigations and incident response
at Facebook.
Since then, Facebook and several independent security researchers have provided
law enforcement agencies, including the Federal Bureau of Investigation, with
information and evidence. Most notably, Jan Droemer, a 32-year-old independent
researcher in Germany, has provided important information and leads, including a
password-free view inside Koobface’s command-and-control system, known as the
“Mothership.” Mr. Droemer spent nights and weekends for four months in late 2009
and early 2010 unmasking the gang members using only information available
publicly on the Internet.
The F.B.I. declined to comment.
That computer crime pays is fueling a boom that is leaving few Internet users
and businesses unscathed. The toll on consumers alone is estimated at $114
billion annually worldwide, according to a September 2011 study by the security
software maker Symantec.
Russia, in particular, has a reputation as a hacker haven, although it has
pursued several prominent cases against spammers recently. The Soviet education
system’s emphasis on math and science combined with post-Communist economic
collapse and weak private industry meant there were many highly trained
engineers, but few legitimate outlets for their skills, said Vsevolod Gunitskiy,
an assistant professor at the University of Toronto.
“Russia is sort of a perfect storm for cybercrime,” he said. The proliferation
of organized crime and official corruption created “this very strong legacy of
contempt for the laws and general culture of criminality.”
The Russian Embassy in Washington said it does not have any information
regarding this group and that American law enforcement officials had never
contacted the embassy on this issue.
The men investigators believe are behind Koobface look a lot like ordinary
software enthusiasts, albeit with more tattoos and an outlaw persona. Mr.
Avdeyko, who is two decades older than the other men and has been tied to an
infamous spyware program dating to 2003 called CoolWebSearch, appears to hold a
leadership role.
He and at least two of the other men have worked in the world of online
pornography, said Mr. Droemer. Mr. Korotchenko and several of the other men
apparently tried to run a legitimate mobile software and services business,
colorfully named MobSoft Ltd. They did not reply to e-mails requesting
interviews.
Mr. Droemer said the gang’s success was more attributable to workaday
persistence and willingness to adapt than technical sophistication. They could
have spread Koobface to many more PCs, he said. “They could have done a lot more
technical things to make it more perfect, more marvelous. But there was just no
need to do it. They were just investing as much to get the revenue they wanted
to get.”
The group cleverly harnessed the infrastructures of powerful online services —
from Facebook and Twitter to Google’s search engine and Blogger — to do the
heavy lifting, and may have run its enterprise with just a few computers.
Koobface will probably earn its place in history for pioneering and leading the
criminal exploitation of social networks, rather than the size of its profits.
Data found in the botnet’s command-and-control system suggests the group has
earned at least $2 million a year for the 3 1/2 years of its existence, although
the actual total is very likely higher, Mr. Droemer said.
Experts say the gang could have further enriched itself through identity fraud,
since it has had access to millions of PCs and social-network profiles, but that
there is no evidence it has done so.
Indeed, in a 2009 Christmas e-card to security researchers left inside victim
computers, the gang vowed it would never steal credit card or banking
information. It called viruses “something awful.” Its tactics have been less
ruthless than those of many other hacker groups, experts said. For instance, it
has never deployed malicious programs that install automatically, and rather has
required its victims to make several unwise clicks.
While the Koobface gang operates freely, Facebook has focused on building
elaborate defenses against the worm, which relentlessly struck the site again
and again until disappearing in March. The gang abandoned the site after
Facebook mounted a major counteroffensive, which included an effort to dismantle
the command-and-control system of the botnet and a simultaneous push to scrub
its network of the worm and clean up infections in users’ PCs.
“We fired all the different guns at the same time,” said Joe Sullivan, chief
security officer at Facebook. “If we could literally shut down the
command-and-control, all the infections, and just make them have to start over
from scratch in all contexts, we figured they might decide to move on.” He hoped
they would conclude Facebook was unprofitable, he said.
But Facebook’s effort and two earlier takedown efforts by security researchers —
including one by the Bulgarian researcher Dancho Danchev, who revealed the name
of one Koobface member on his blog last week — have failed put an end to
Koobface, and smaller sites continue to suffer.
“People who engage in this type of stuff need to know that their name and real
identity are going to come out eventually and they’re going to get arrested and
they’re going to be targeted,” Mr. Sullivan said. “People are fighting back.”
Web Gang Operating in the Open, NYT,
16.1.2012,
http://www.nytimes.com/2012/01/17/technology/
koobface-gang-that-used-facebook-to-spread-worm-operates-in-the-open.html
Internet Access Is Not a Human Right
January 4, 2012
The New York Times
By VINTON G. CERF
Reston, Va.
FROM the streets of Tunis to Tahrir Square and beyond, protests around the world
last year were built on the Internet and the many devices that interact with it.
Though the demonstrations thrived because thousands of people turned out to
participate, they could never have happened as they did without the ability that
the Internet offers to communicate, organize and publicize everywhere,
instantaneously.
It is no surprise, then, that the protests have raised questions about whether
Internet access is or should be a civil or human right. The issue is
particularly acute in countries whose governments clamped down on Internet
access in an attempt to quell the protesters. In June, citing the uprisings in
the Middle East and North Africa, a report by the United Nations’ special
rapporteur went so far as to declare that the Internet had “become an
indispensable tool for realizing a range of human rights.” Over the past few
years, courts and parliaments in countries like France and Estonia have
pronounced Internet access a human right.
But that argument, however well meaning, misses a larger point: technology is an
enabler of rights, not a right itself. There is a high bar for something to be
considered a human right. Loosely put, it must be among the things we as humans
need in order to lead healthy, meaningful lives, like freedom from torture or
freedom of conscience. It is a mistake to place any particular technology in
this exalted category, since over time we will end up valuing the wrong things.
For example, at one time if you didn’t have a horse it was hard to make a
living. But the important right in that case was the right to make a living, not
the right to a horse. Today, if I were granted a right to have a horse, I’m not
sure where I would put it.
The best way to characterize human rights is to identify the outcomes that we
are trying to ensure. These include critical freedoms like freedom of speech and
freedom of access to information — and those are not necessarily bound to any
particular technology at any particular time. Indeed, even the United Nations
report, which was widely hailed as declaring Internet access a human right,
acknowledged that the Internet was valuable as a means to an end, not as an end
in itself.
What about the claim that Internet access is or should be a civil right? The
same reasoning above can be applied here — Internet access is always just a tool
for obtaining something else more important — though the argument that it is a
civil right is, I concede, a stronger one than that it is a human right. Civil
rights, after all, are different from human rights because they are conferred
upon us by law, not intrinsic to us as human beings.
While the United States has never decreed that everyone has a “right” to a
telephone, we have come close to this with the notion of “universal service” —
the idea that telephone service (and electricity, and now broadband Internet)
must be available even in the most remote regions of the country. When we accept
this idea, we are edging into the idea of Internet access as a civil right,
because ensuring access is a policy made by the government.
Yet all these philosophical arguments overlook a more fundamental issue: the
responsibility of technology creators themselves to support human and civil
rights. The Internet has introduced an enormously accessible and egalitarian
platform for creating, sharing and obtaining information on a global scale. As a
result, we have new ways to allow people to exercise their human and civil
rights.
In this context, engineers have not only a tremendous obligation to empower
users, but also an obligation to ensure the safety of users online. That means,
for example, protecting users from specific harms like viruses and worms that
silently invade their computers. Technologists should work toward this end.
It is engineers — and our professional associations and standards-setting bodies
like the Institute of Electrical and Electronics Engineers — that create and
maintain these new capabilities. As we seek to advance the state of the art in
technology and its use in society, we must be conscious of our civil
responsibilities in addition to our engineering expertise.
Improving the Internet is just one means, albeit an important one, by which to
improve the human condition. It must be done with an appreciation for the civil
and human rights that deserve protection — without pretending that access itself
is such a right.
Vinton G. Cerf, a fellow at the Institute of Electrical and
Electronics Engineers,
is a vice president and chief Internet evangelist for Google.
Internet Access Is Not a Human Right, NYT,
4.1.2012,
http://www.nytimes.com/2012/01/05/opinion/internet-access-is-not-a-human-right.html
PayPal Executive Named Chief of Yahoo
January 4, 2012
The New York Times
By STEVE LOHR
Yahoo, the struggling consumer media company, announced on
Wednesday that its new chief executive would be Scott Thompson, the president of
PayPal, the online payment service.
Mr. Thompson, analysts say, has a background mainly as a technologist instead of
being an expert in digital media or corporate turnarounds. While PayPal, a
division of eBay, is a consumer service, analysts said that is very different
from a media company.
But in a conference call on Wednesday morning, Roy J. Bostock, the chairman of
Yahoo’s board, said that at PayPal Mr. Thompson had proved he could take a
company with solid assets and build the business. That is the central challenge
at Yahoo, Mr. Bostock said, noting that the company has a wealth of strong media
and advertising assets, and an online audience of more than 700 million visitors
a month.
The problem, he said, was that Yahoo had been floundering — “treading water,” as
he put it. “You can call it a turnaround, if you want to,” Mr. Bostock said.
Under Mr. Thompson, PayPal expanded its number of users to more than 104
million, from 50 million, and increased its revenue to more than $4 billion,
from $1.8 billion. “That, to me, is a track record of building,” Mr. Bostock
said.
Mr. Thompson said it was too soon to discuss any strategic shifts he might make.
But he said Yahoo has to innovate and improve its offering for both consumers
and advertisers. “That balancing is what we need at Yahoo,” Mr. Thompson said.
“That is how big businesses with network effects are built on the Internet.”
The chief executive job at Yahoo, Mr. Thompson said, represents a daunting
challenge, but also a major opportunity. “The core business assets are stronger
than people believe at this point,” he said.
Mr. Thompson replaces Carol Bartz, who was dismissed in September. The company
has been run by Tim Morse since Ms. Bartz left. He will now return to his former
post as chief financial officer.
Yahoo shares were down 2.1 percent in early trading Wednesday.
PayPal Executive Named Chief of Yahoo, NYT,
4.1.2012,
http://www.nytimes.com/2012/01/05/technology/paypal-executive-named-ceo-of-yahoo.html
Google Bases a Campaign on Emotions, Not Terms
January 1, 2012
By CLAIRE CAIN MILLER
Google, one of the biggest advertising companies in the world,
has finally embraced advertising for itself.
The search giant made its first push into advertising with a Super Bowl ad in
2010 about a young couple falling in love. But through last year it began a more
focused national television campaign, as well as taking on other efforts, like
hosting Google-themed conferences in an effort to represent its online brand in
the offline world.
“This past year has really been a remarkable transformation for Google,” said
Peter Daboll, chief executive of Ace Metrix, a firm that evaluates TV and video
ads.
Though Google is a household name, it needs to tell its story now for a few
reasons. It needs new businesses like the Chrome browser and the Google Plus
social network to succeed if it is going to find sources of revenue beyond
search ads.
The ads are also part of Google’s mission, led by Larry Page, its co-founder and
chief executive, to pare down its product offering and make Google products more
attractive, intuitive and integrated with one another.
Lorraine Twohill, Google’s vice president for global marketing, would not
disclose how much the company had increased its advertising spending, but said
there had been a shift in strategy.
“As we got bigger, we had more competition, more products, more messages to
consumers, so we needed to do a bit more to communicate what these products are
and how you can use them,” she said.
Also as Google comes under attack from antitrust regulators, it can’t hurt to
tell heartwarming stories about Google to wide audiences.
“If we don’t make you cry, we fail,” Ms. Twohill said. “It’s about emotion,
which is bizarre for a tech company.”
Some viewers may be hard-pressed to keep their eyes dry after watching “Dear
Sophie,” Google’s ad for Chrome in which a father sends multimedia messages to
his baby daughter, or to hold back a smile watching grandmothers and children
dancing to Lady Gaga.
But that is not to say that Google, where data is religion, does not back up
sentimental branding efforts with cold, hard data.
Before showing the Super Bowl ad, Google tested a dozen versions on YouTube and
chose to broadcast the one that received the most views.
And Google events, which also fall under the marketing division, require immense
spreadsheets, like one to choose a location for Google Zeitgeist, its annual
conference for wooing its biggest advertisers. The spreadsheet charted 140
hotels from Manhattan to Phoenix, with color-coded tabs and columns for ballroom
size, room rates and the number of layovers to fly there.
The winner was Paradise Valley, Ariz., where Google’s event planner, Lorin
Pollack, brought the company headquarters’ preschool motif to the desert.
“Google’s an online brand,” Ms. Pollack said. “You can’t experience the brand
except for typing keys. It’s a huge responsibility to actually bring that brand
to life outside of the computer.”
The lanterns lining the steps at the nighttime parties were Google colors — red,
yellow, blue and green — and oversized stuffed ottomans mimicked the office’s
beanbags, where engineers sit with laptops perched on their knees. Attendees
could climb on the giant tricycle that Google Street View engineers ride to take
photos or design their own Android robot T-shirts. A vending machine dispensed
primary-colored juggling balls, bought by swiping Android cellphones.
Even the tablecloths had to evoke Google, which meant no billowy linen, Ms.
Pollack said.
“Google is a very clean, simple brand,” she said. “Linen gets sloppy. It gets
dirty; it’s hard to sit under. I take a lot of inspiration from our home page.
It’s just simple.”
Like Google’s events, its TV ads are light on details about products’ features.
Instead, they are meant to evoke curiosity and emotion, Ms. Twohill said.
The first ads for Chrome, aimed at frequent Web users, were online and discussed
the browser’s speed and security. But when it came time to take Chrome
mainstream, she said, Google turned to television to reach those “who don’t get
out of bed in the morning and think, ‘I’ll get a new browser today.’ ”
Google broke the recent trend of 15-second television ads to tell stories in a
minute or two.
An ad for Google Plus shows the arc of a couple’s courtship without spoken
words. The man places the woman in a social circle titled “love of my life,” but
he starts out in her circle called “creepers.” Over time, though, he graduates
to “book club,” “ski house” and eventually “keepers.”
Another, which was broadcast just before Christmas, shows the Muppets in a
Google Plus Hangout video chat singing along to Queen and David Bowie. A
newspaper ad for Google Plus featured the Dalai Lama joining Desmond Tutu by
Hangout after he was denied a visa to visit South Africa.
Google is also advertising its search engine, even though, with two-thirds
market share in the United States, it is hardly an unknown brand to anyone.
“I still think it’s important to remind people why Google matters, how it’s had
an impact on people’s lives, what life was like before this,” Ms. Twohill said.
An added incentive is that Google’s main rival, Microsoft’s Bing, also has a new
ad campaign.
One search ad shows a surfer finding the perfect wave, a teenager becoming the
youngest person to discover a supernova and a man installing solar panels.
“We’re all searching for a different thing, even if we’re all trying to get to
the same endpoint,” a voice says.
Google’s strategy has connected with viewers, Mr. Daboll said, because they
would rather view a story than have products pushed at them. Google ads took
five of the top 10 spots on Ace Metrix’s list of the most effective TV ads for
Web sites last year.
“Google has been so dominant in its usefulness,” he said. “Now they want to make
you feel something about search, as opposed to just relying on it as a useful
tool.”
Google Bases a Campaign on Emotions, Not
Terms, NYT, 1.1.2012,
http://www.nytimes.com/2012/01/02/technology/google-hones-its-advertising-message-playing-to-emotions.html
|