Friday, December 31, 2010

Hackers crack open mobile network

Mobile calls and texts made on any GSM network can be eavesdropped upon using four cheap phones and open source software, say security researchers.

Karsten Nohl and Sylvain Munaut demonstrated their eavesdropping toolkit at the Chaos Computer Club Congress (CCC) in Berlin.

The work builds on earlier research that has found holes in many parts of the most widely used mobile technology.

The pair spent a year putting together the parts of the eavesdropping toolkit.

"Now there's a path from your telephone number to me finding you and listening to your calls," Mr Nohl told BBC News. "The whole way."

He said many of the pieces in the eavesdropping toolkit already existed thanks to work by other security researchers but there was one part the pair had to create themselves.

"The one piece that completed the chain was the ability to record data off the air," he said.

In a demonstration at the CCC, the pair took attendees through all the steps that led from locating a particular phone to seizing its unique ID, then leap-frogging from that to getting hold of data swapped between a handset and a base station as calls are made and texts sent.

Key to grabbing the data from the air were cheap Motorola phones which can have their onboard software swapped for an open source alternative.

"We used the cheap Motorola telephones because a description of their firmware leaked to the internet," he said.

This led to the creation of open source alternative firmware that, he said, has its "filters" removed so it could see all the data being broadcast by a base station.

This allows attackers to home in on the data they need to eavesdrop, said Mr Nohl. The encryption system that scrambles this data can be defeated using a huge list of encryption keys, called a rainbow table, that Mr Nohl generated in a separate research project.

"Any GSM call is fair game," he said.

GSM is the name of the technology used on the vast majority of mobile phone networks around the world. The GSMA, which represents operators and phone makers, estimates that there are more than five billion GSM mobiles in use around the world.

The GSMA has not responded to requests for comment about the research.

Playing around

Simeon Coney, a spokesman for mobile security firm Adaptive Mobile, said the work looked fairly thorough.

"Especially interesting is how the attack is aimed at a specific target phone, which could lead to malicious interest of high value targets," he added.

"This isn't an attack that is today readily repeatable yet by the anyone unfamiliar with the underlying technology," he said. "However, it does illustrate the manners in which the mobile phone system could be compromised in a focussed attack in less protected markets."

Mr Nohl said that before now commercial equipment that could spy on calls cost upwards of �35,000. The kit demonstrated at the Berlin event cost far less than that, he said. For instance, the Motorola phones used to grab data cost only 10 euros (�9) each.

Despite showing off the entire eavesdropping kit, there were no plans to release all of it for others to use, said Mr Nohl.

However, recreating the missing parts would not be difficult for a tech savvy amateur, he added.

"I expect people to do it for the fun of doing it."

Mr Nohl said the motivation for carrying out the research was to create awareness around the problem and perhaps prompt operators to improve security.

A few simple steps could make it much harder for eavesdroppers, he said.

"Raising their awareness is the most likely outcome, but the technical changes would be better."



Online Business Consulting | Internet Business Consulting

Thursday, December 30, 2010

Software bug behind Skype crash

Server overloads and a bug in Skype for Windows caused the two-day outage for the net phone firm.

Details of what caused the service to be unusable for millions of users prior to Christmas have been posted on the firm's blog.

The two events combined to create a cascade of problems that managed to knock out much of the network underpinning the phone service.

Skype is assessing how its network is built to stop the problem recurring.

Traffic cascade

Writing on the Skype blog, Lars Rabbe, chief information officer at the company, said the problems started on 22 December, when some of its servers that handle instant messaging started getting overloaded.

This meant that the responses they sent to Windows machines running Skype were slightly delayed. Unfortunately, a bug in one version of Skype for Windows meant this delay caused the program to crash.

About 50% of all Skype users ran the buggy 5.0.0.152 version of the software, said Mr Rabbe.

This caused problems for Skype because of the way the network supporting it is organised. Some of the data travelling round Skype's network are passed through all those machines logged on to the service.

Those participating machines act as what Skype calls "supernodes" and carry out some of the administrative tasks of the global network and help to ensure calls get through.

With a huge number of these machines offline because of the crash, the rest of the network quickly became overloaded.

Mr Rabbe wrote that the disappearance of the supernodes meant the remaining ones were swamped by traffic.

"The initial crashes happened just before our usual daily peak-hour and very shortly after the initial crash," wrote Mr Rabbe, "which resulted in traffic to the supernodes that was about 100 times what would normally be expected at that time of day."

Traffic levels were so high that they blew through the safe operating specifications supernodes usually use. As a result, more supernodes shut down.

Compensation offer

The "confluence of events", said Mr Rabbe, led to Skype being offline for about 24 hours as engineers put in place hundreds of dedicated supernodes and gradually brought the service back to life.

To ensure the outage does not happen again, Mr Rabbe said Skype would look at its update policy, to see if it should automatically move users to newer versions of its software.

A version of Skype for Windows that is free of the bug already exists, but is not automatically given to users.

It said it would also look at its network to improve capacity and get on with an investment programme that would boost this resilience.

Mr Rabbe apologised again on behalf of the company and added: "We know that we fell short in both fulfilling your expectations and communicating with you during this incident."

Skype has offered compensation to customers in the form of vouchers for pre-pay users and a free week of service for subscribers.



Online Business Consulting | Internet Business Consulting

Phone firms back common chargers

Keeping a smartphone fully powered could soon be easier as manufacturers back common standards for chargers.

Technical specifications for chargers drawn up by the European Commission have won the backing of 14 phone firms.

Firms that have pledged to make chargers to the common standard include Nokia, Research In Motion, Apple and Samsung.

The first chargers produced to the specifications are expected to be available in early 2011.

The common chargers will be based around micro-USB technology and could see the end of proprietary power ports on handsets.

The process to create common chargers began in June 2009 when the Commission won pledges from phone firms to back any standards it drew up.

Following that agreement it started work on the specifications that have now been completed and sent out to handset makers.

The EU said many Europeans wanted to be able to use chargers for different smartphones and resented the inconvenience incompatible chargers caused.

Also, it said in a statement, eliminating the need to get a new charger when a phone was replaced had environmental benefits as it reduced the need to dispose of an old, but probably fully functional, charger.

The specifications only cover chargers for smartphones because, said the Commission, these are likely to be the most widely used type of phone in Europe within the next two years.

Antonio Tajani, European Commissioner for industry and entrepreneurship, welcomed the publication of the standards and said: "Now it is time for industry to show its commitment to sell mobile phones for the new charger."

The Commission is also talking to regulators with a view to getting the European specifications adopted worldwide.



Online Business Consulting | Internet Business Consulting

Ariane 5 makes final 2010 flight

Europe's heavy-lift rocket, the Ariane 5, has completed its sixth and final mission of 2010, putting two satellites high above the Earth.

The launcher powered skyward from its Kourou spaceport in French Guiana at 1827 local time (2127 GMT).

Ariane's biggest "passenger" was Hispasat-1E, a 5.3-tonne platform that will deliver a range of video and data services to Europe and the Americas.

The 2.7t Koreasat-6 will handle TV and telecoms services for South Korea.

"It's the 41st consecutive success of Ariane 5 and in 2010 we will have launched a total of 12 large telecommunications satellites out of a world total of 20," said Jean-Yves Le Gall, the chairman and CEO of the rocket's operator, Arianespace. "This gives us a market share of 60%."

The vehicle's first outing of 2011 is likely to be a re-supply mission to the International Space Station (ISS).

Ariane will be used to put Europe's 20-tonne space freighter, ATV-Johannes Kepler, in a low-Earth orbit. The flight is scheduled for 15 February.

After separating from the Ariane, the freighter will use its own thrusters to get to the orbiting outpost.

It will be carrying more than six tonnes of fuel, air, food and equipment for the station's astronauts.



Online Business Consulting | Internet Business Consulting

Wednesday, December 29, 2010

Apple sued over app 'data leaks'

Two groups of iPhone and iPad users are suing Apple saying apps for the gadgets leak personally identifiable data.

The groups want to stop personal data being passed around without owners being notified or compensated.

Apple is just one of six application makers being pursued by the two groups of consumers.

The legal firm putting together one class action lawsuit said it might also take action against Google over data leaking from Android applications.

Backflip Studios, the Weather Channel, Dictionary.com and others were named in court papers supporting the lawsuits.

The papers allege that many applications collect so much personal data that users can be individually identified. This is despite Apple operating a policy that allows data to be shared with third parties only if an app requires the information to keep running.

The complainants said many firms, including advertisers, were managing to track and identify individuals via the unique device ID Apple assigns to every gadget. Apple does not do enough to enforce its privacy policy or restrict use of unique IDs, they allege.

Apple has yet to respond to requests for comment.

The law firm behind one of the class action lawsuits said it was considering whether to prepare a case against Google, saying that many Android applications leak personal data too.

Despite the filing of separate lawsuits, some experts suggest the court cases will not succeed.

"If this were a major issue, all web browsers would have to shut down and there would not be any advertising on the internet," Trip Chowdhry, Global Equities research analyst, told Reuters.



Online Business Consulting | Internet Business Consulting

Attack hits Anonymous activists

The notorious message board 4Chan has been taken offline by an overwhelming web attack.

Thanks to the attack, the discussion boards of the site have been hard to reach or offline for almost 24 hours.

The attack might be retaliation for similar attacks that some 4Chan members, as part of the Anonymous group, mounted in support of Wikileaks.

It is not yet clear who is carrying out the attacks and no-one has come forward to claim responsibility.

News about the large-scale web attack, known as a Distributed Denial of Service (DDoS) attack, came to light via a message posted on Twitter by Moot, the founder of 4Chan.

He wrote: "Site is down due to DDoS. We now join the ranks of Mastercard, Visa, Paypal, et al - an exclusive club!"

A DDoS attack involves bombarding a server behind a website with data in an attempt to knock it offline.

Many members of 4Chan work together in the guise of a group called Anonymous to carry out attacks on websites they deem to be enemies of freedom of speech.

Most recently, Anonymous members took action in support of whistle-blowing site Wikileaks. Anonymous used a DDoS tool to hit the corporate websites of Mastercard, Visa and Paypal because the firms had cut off payment connections to Wikileaks.

Paul Mutton, a security analyst at site watching firm Netcraft, said the attack on 4Chan was ongoing.

"For most of the past 24 hours, the site has either been very slow to respond or has been completely unreachable," he said.

Statistics gathered by Netcraft show 4Chan was hit hard early on Wednesday but that it recovered towards the afternoon.

A blog showing the status of the various elements of 4Chan suggests the image boards, the most heavily used part of the site, have been down for hours.

Early reports suggested that a hacktivist known as the Jester was behind the attack. Before now, some members of Anonymous said they would target the Jester with DDoS attacks after he declared an ambition to knock Wikileaks offline.

However, in a Twitter message, the Jester denied any involvement in the attack.



Online Business Consulting | Internet Business Consulting

Tuesday, December 28, 2010

Scientists aim to simulate Earth

It could be one of the most ambitious computer projects ever conceived.

An international group of scientists are aiming to create a simulator that can replicate everything happening on Earth - from global weather patterns and the spread of diseases to international financial transactions or congestion on Milton Keynes' roads.

Nicknamed the Living Earth Simulator (LES), the project aims to advance the scientific understanding of what is taking place on the planet, encapsulating the human actions that shape societies and the environmental forces that define the physical world.

"Many problems we have today - including social and economic instabilities, wars, disease spreading - are related to human behaviour, but there is apparently a serious lack of understanding regarding how society and the economy work," says Dr Helbing, of the Swiss Federal Institute of Technology, who chairs the FuturICT project which aims to create the simulator.

Knowledge collider

Thanks to projects such as the Large Hadron Collider, the particle accelerator built by Cern, scientists know more about the early universe than they do about our own planet, claims Dr Helbing.

What is needed is a knowledge accelerator, to collide different branches of knowledge, he says.

"Revealing the hidden laws and processes underlying societies constitutes the most pressing scientific grand challenge of our century."

The result would be the LES. It would be able to predict the spread of infectious diseases, such as Swine Flu, identify methods for tackling climate change or even spot the inklings of an impending financial crisis, he says.

But how would such colossal system work?

For a start it would need to be populated by data - lots of it - covering the entire gamut of activity on the planet, says Dr Helbing.

It would also be powered by an assembly of yet-to-be-built supercomputers capable of carrying out number-crunching on a mammoth scale.

Although the hardware has not yet been built, much of the data is already being generated, he says.

For example, the Planetary Skin project, led by US space agency Nasa, will see the creation of a vast sensor network collecting climate data from air, land, sea and space.

In addition, Dr Helbing and his team have already identified more than 70 online data sources they believe can be used including Wikipedia, Google Maps and the UK government's data repository Data.gov.uk.

Drowning in data

Integrating such real-time data feeds with millions of other sources of data - from financial markets and medical records to social media - would ultimately power the simulator, says Dr Helbing.

The next step is create a framework to turn that morass of data in to models that accurately replicate what is taken place on Earth today.

"Start Quote

We don't take any action on the information we have"

End Quote Pete Warden OpenHeatMaps

That will only be possible by bringing together social scientists and computer scientists and engineers to establish the rules that will define how the LES operates.

Such work cannot be left to traditional social science researchers, where typically years of work produces limited volumes of data, argues Dr Helbing.

Nor is it something that could have been achieved before - the technology needed to run the LES will only become available in the coming decade, he adds.

Human behaviour

For example, while the LES will need to be able to assimilate vast oceans of data it will simultaneously have to understand what that data means.

That becomes possible as so-called semantic web technologies mature, says Dr Helbing.

Today, a database chock-full of air pollution data would look much the same to a computer as a database of global banking transactions - essentially just a lot of numbers.

But semantic web technology will encode a description of data alongside the data itself, enabling computers to understand the data in context.

What's more, our approach to aggregating data stresses the need to strip out any of that information that relates directly to an individual, says Dr Helbing.

That will enable the LES to incorporate vast amounts of data relating to human activity, without compromising people's privacy, he argues.

Once an approach to carrying out large-scale social and economic data is agreed upon, it will be necessary to build supercomputer centres needed to crunch that data and produce the simulation of the Earth, says Dr Helbing.

Generating the computational power to deal with the amount of data needed to populate the LES represents a significant challenge, but it's far from being a showstopper.

If you look at the data-processing capacity of Google, it's clear that the LES won't be held back by processing capacity, says Pete Warden, founder of the OpenHeatMap project and a specialist on data analysis.

While Google is somewhat secretive about the amount of data it can process, in May 2010 it was believed to use in the region of 39,000 servers to process an exabyte of data per month - that's enough data to fill 2 billion CDs every month.

Reality mining

If you accept that only a fraction of the "several hundred exabytes of data being produced worldwide every year… would be useful for a world simulation, the bottleneck won't be the processing capacity," says Mr Warden.

"Getting access to the data will be much more of a challenge, as will figuring out something useful to do with it," he adds.

Simply having lots of data isn't enough to build a credible simulation of the planet, argues Warden. "Economics and sociology have consistently failed to produce theories with strong predictive powers over the last century, despite lots of data gathering. I'm sceptical that larger data sets will mark a big change," he says.

"It's not that we don't know enough about a lot of the problems the world faces, from climate change to extreme poverty, it's that we don't take any action on the information we do have," he argues.

Regardless of the challenges the project faces, the greater danger is not attempting to use the computer tools we have now - and will have in future - to improve our understanding of global socio-economic trends, says Dr Helbing.

"Over the past years, it has for example become obvious that we need better indicators than the gross national product to judge societal development and well-being," he argues.

At it's heart, the LES is about working towards better methods to measure the state of society, he says, which would account for health, education and environmental issues. "And last but not least, happiness."



Online Business Consulting | Internet Business Consulting

1m children 'without computers'

More than a million school children in the UK still lack access to a computer at home, research suggests.

And almost 2m are unable to go online at home, according to leading digital education charity, the E-Learning Foundation.

It also claims those from the poorest families are two-and-a-half-times less likely to have the internet at home than children from the richest homes.

The government would not comment on the findings.

The E-Learning Foundation, which works to ensure that all children have access to the internet and a computer at home, has analysed the latest government spending survey.

It found that while computer access is growing in better-off households, those from low-income families are being left behind.

'Get worse'

It is warning that many of the UK's poorest children face being severely educationally disadvantaged by their lack of access to technology as a result.

In November more than half of teachers who took part in a survey for the Times Education Supplement said pupils without access to internet or a computer at home were hampered in their learning.

The foundation's chief executive, Valerie Thompson, said: "With so many children swamped with gifts from family and friends over the Christmas period it is important we reflect on the fact that millions of children live in poverty in this country.

"For those at school, this translates into very tangible disadvantages when it comes to completing homework, researching topics, independent learning, and communicating with teachers and classmates on the school learning platform.

"Without the use of a computer and the ability to go online at home the attainment gap that characterises children from low income families is simply going to get worse."

The Department for Education was not prepared to comment on the findings.



Online Business Consulting | Internet Business Consulting

Sunday, December 26, 2010

Net satellite ready for lift-off

Europe is about to get a second satellite dedicated to delivering broadband internet connections.

The six-tonne Ka-Sat will be launched atop a Proton rocket from Baikonur in Kazakhstan in a flight expected to last nine hours and 12 minutes.

The Eutelsat-operated spacecraft will concentrate its services on customers in the so-called "not-spots" of Europe.

It is estimated that tens of millions of households in these areas cannot get a decent terrestrial connection.

Ka-Sat will provide homes with speeds generally up to 10Mbps.

Lift-off from Baikonur is timed for 0351 local time on Monday (2151 GMT on Sunday).

The spacecraft follows the Hylas-1 platform into orbit. This satellite, operated by Avanti Communications of London, was launched just last month.

Ka-Sat, however, is considerably bigger, and has a notional capacity to serve up to two million households compared with Hylas's 300,000.

Nevertheless, such is the scale of the under-served market in Europe that both platforms should be very profitable ventures, the two companies believe.

"As many as 30 million households in Europe are not served at all or get high mediocrity of service," said Eutelsat CEO Michel de Rosen.

"These could be people in the countryside or in the mountains, sometimes not very far from large cities. Ka-Sat is an answer to that problem," he told BBC News.

Paris-based Eutelsat is one of the world's big three Fixed Satellite Services (FSS) companies, and transmits thousands of TV channels across its fleet of spacecraft.

It already provides some internet capability on its existing platforms, but Ka-Sat is its first broadband-dedicated endeavour.

High throughput

Ka-Sat will be positioned about 36,000km above the equator at nine degrees east.

Its communications payload, structure and propulsion system were prepared by EADS Astrium at its UK facilities in Stevenage and Portsmouth.

Final testing of the spacecraft took place at Astrium's factory in Toulouse, France, before shipment to Baikonur.

Ka-Sat has a total throughput of some 70Gbps.

This will be channelled via 82 spot beams on to different market areas stretching from North Africa to southern Scandinavia. A very small segment of the Middle East will also be reached.

Eutelsat has signed about 70 deals with distributors across the satellite's "footprint", and more would be signed over the next year, said Mr de Rosen.

"It takes normally a few weeks for a satellite to become operational after launch," he explained.

"In this case, it is more likely to be a few months. Expect Ka-Sat to be operational in the second half of the second quarter of 2011."

Previous failure

Ka-Sat's Proton rocket will be under the spotlight for this launch.

The Russian vehicle failed on its last outing four weeks ago, dumping three Glonass satellite-navigation spacecraft in the Pacific Ocean.

An inquiry found the Proton's new Block DM-03 upper-stage had been over-fuelled, making it too heavy to achieve its required performance.

International Launch Services (ILS), which runs the commercial operations of the Proton vehicle, will be using a different upper-stage for the Ka-Sat mission.

This Breeze M stage has a good recent record.

It will be the eighth and last ILS-organised Proton mission of 2010.



Powered by WizardRSS | Work At Home Jobs

Friday, December 24, 2010

New solar fuel machine unveiled

A prototype solar device has been unveiled which mimics plant life, turning the Sun's energy into fuel.

The machine uses the Sun's rays and a metal oxide called ceria to break down carbon dioxide or water into fuels which can be stored and transported.

Conventional photovoltaic panels must use the electricity they generate in situ, and cannot deliver power at night.

Details are published in the journal Science.

The prototype, which was devised by researchers in the US and Switzerland, uses a quartz window and cavity to concentrate sunlight into a cylinder lined with cerium oxide, also known as ceria.

Ceria has a natural propensity to exhale oxygen as it heats up and inhale it as it cools down.

If as in the prototype, carbon dioxide and/or water are pumped into the vessel, the ceria will rapidly strip the oxygen from them as it cools, creating hydrogen and/or carbon monoxide.

Hydrogen produced could be used to fuel hydrogen fuel cells in cars, for example, while a combination of hydrogen and carbon monoxide can be used to create "syngas" for fuel.

It is this harnessing of ceria's properties in the solar reactor which represents the major breakthrough, say the inventors of the device. They also say the metal is readily available, being the most abundant of the "rare-earth" metals.

Methane can be produced using the same machine, they say.

Refinements needed

The prototype is grossly inefficient, the fuel created harnessing only between 0.7% and 0.8% of the solar energy taken into the vessel.

Most of the energy is lost through heat loss through the reactor's wall or through the re-radiation of sunlight back through the device's aperture.

But the researchers are confident that efficiency rates of up to 19% can be achieved through better insulation and smaller apertures. Such efficiency rates, they say, could make for a viable commercial device.

"The chemistry of the material is really well suited to this process," says Professor Sossina Haile of the California Institute of Technology (Caltech). "This is the first demonstration of doing the full shebang, running it under (light) photons in a reactor."

She says the reactor could be used to create transportation fuels or be adopted in large-scale energy plants, where solar-sourced power could be available throughout the day and night.

However, she admits the fate of this and other devices in development is tied to whether states adopt a low-carbon policy.

"It's very much tied to policy. If we had a carbon policy, something like this would move forward a lot more quickly," she told the BBC.

It has been suggested that the device mimics plants, which also use carbon dioxide, water and sunlight to create energy as part of the process of photosynthesis. But Professor Haile thinks the analogy is over-simplistic.

"Yes, the reactor takes in sunlight, we take in carbon dioxide and water and we produce a chemical compound, so in the most generic sense there are these similarities, but I think that's pretty much where the analogy ends."

Daniel Davies, chief technology officer at the British photovoltaic company Solar Century, said the research was "very exciting".

"I guess the question is where you locate it - would you put your solar collector on a roof or would it be better off as a big industrial concern in the Sahara and then shipping the liquid fuel?" he said.

Solar technology is moving forward apace but the overriding challenges remain ones of efficiency, economy and storage.

New-generation "solar tower" plants have been built in Spain and the United States which use an array of mirrors to concentrate sunlight onto tower-mounted receivers which drive steam turbines.

A new Spanish project will use molten salts to store heat from the Sun for up to 15 hours, so that the plant could potentially operate through the night.



Powered by WizardRSS | Work At Home Jobs

Thursday, December 23, 2010

Microsoft warns on IE browser bug

Microsoft has issued a warning about a serious vulnerability in all versions of its Internet Explorer (IE) browser.

If exploited by a booby-trapped webpage the bug would allow attackers to take control of an unprotected computer.

Code to exploit the bug has already been published though Microsoft said it had no evidence it was currently being used by hi-tech criminals.

A workaround for the bug has been produced while Microsoft works on a permanent fix.

Code injection

The bug revolves around the way that IE manages a computer's memory when processing Cascading Style Sheets - a widely used technology that defines the look and feel of pages on a website.

Hi-tech criminals have long known that they can exploit IE's memory management to inject their own malicious code into the stream of instructions a computer processes as a browser is being used. In this way the criminals can get their own code running and hijack a PC.

Microsoft has produced updates that improves memory management but security researchers discovered that these protection systems are not used when some older parts of Windows are called upon.

In a statement Microsoft said it was "investigating" the bug and working on a permanent fix. In the meantime it recommended those concerned use a protection system known as the Enhanced Mitigation Experience Toolkit.

Installing and applying the toolkit may require Windows XP users to update the version of the operating system they are using. But even if they do that some of the protection it bestows on Windows 7 and Vista users will not be available.

"We're currently unaware of any attacks trying to use the claimed vulnerability or of customer impact," said Dave Forstrom, the director of Microsoft's Trustworthy Computing group, in a statement.

"As vulnerabilities go, this kind is the most serious as it allows remote execution of code," said Rik Ferguson, senior security analyst at Trend Micro, "This means the attacker can run programs, such as malware, directly on the victim's computer."

He added: "It is highly reminiscent of a vulnerability at the same time two years ago which prompted several national governments to warn against using IE and to switch to an alternative browser."



Powered by WizardRSS | Work At Home Jobs

Wednesday, December 22, 2010

Skype apology for global blackout

Millions of people around the globe have been hit by an outage at the popular internet phone service Skype.

Users as far afield as Japan, Europe and the US have all reported problems.

The company which prides itself on providing relatively reliable service last suffered a major outage in 2007.

"We take outages like this really seriously and apologise for the inconvenience users are having," Tony Bates, Skype chief executive officer told BBC News.

"Right now it looks like clients are coming on and offline and sometimes they are crashing in the middle of calls. We are deep in the middle of investigating the cause of the problem and have teams working hard to remedy the situation," Mr Bates said.

On Skype's Twitter account, the company said their "engineers and site operations team are working non-stop to get things back to normal".

The news blog ReadWriteWeb said they have monitored complaints from users who reported that they are unable to log into the service and that the programme is crashing across all platforms, whether on their mobile device or PC.

Mr Bates did not rule in or rule out the possibility of a malicious attack and said "all avenues" were being explored.

He estimated that as a result of the outage, Skype has lost around 10 million calls.

Mr Bates told the BBC that normal call volume for the time of day would be 20m.

Om Malik, an industry commentator and editor of the Gigaom.com website, is not impressed.

"Skype is one of the key applications of the modern web," he said.

"It is already a hit with consumers, and over the past few years it has become part of the economic fabric for startups and small businesses around the world. I am not sure we can comprehend the productivity cost of this outage.

"The outage comes at a time when Skype is starting to ask larger corporations for their business. If I am a big business, I would be extremely cautious about adopting Skype for business, especially in light of this current outage," added Mr Malik.



Powered by WizardRSS | Work At Home Jobs

Web attacks plague rights sites

Human rights groups and campaigners are being hit hard by huge web attacks launched by those opposed to their views, finds research.

Many web-based campaigning groups are being knocked offline for weeks by the attacks, it found.

The researchers expect the tempo of attacks to increase as the tools and techniques become more widespread.

It urged human rights groups and independent media groups to beef up their defences to avoid falling victim.

Flash flood

The research by the Berkman Center for Internet and Society at Harvard University tried to get a sense of how often human rights groups and independent media organisations are hit by what is known as Distributed Denial of Service (DDoS) attacks.

DDoS attacks try to knock a site offline by overwhelming it with data.

In the 12 months between August 2009 and September 2010 the research found evidence of 140 attacks against more than 280 different sites. The report acknowledged that these were likely to be the most high profile attacks and that many more had probably gone unreported.

"These attacks do seem to be increasingly common," said Ethan Zuckerman, one of the authors of the report.

While some attacks were triggered by specific incidents such as elections others had no obvious cause, he said.

The report cites a sustained DDoS attack on Novaya Gazeta, the website of Russia's most liberal indepedent newspaper.

Deputy executive editor Sergey Sokolov isn't sure who attacked his website but suspects government-sponsored Kremlin Youth organisations.

The report finds that DDoS is increasingly being used as a political tool.

Attacks that recruit participants in so-called volunteer DDoS are proving popular

The report gives the example of the organisation 'Help Israel Win' which recently invited individuals to install a software package, dubbed Patriot DDos, on their computers so the machine could be used to launch attacks, on what the authors assume would be Palestinian targets.

The most recent example of a volunteer DDoS comes from Anonymous, a loose-knit group of activisits, who used the method to launch attacks on the websites of firms it perceived to be anti-Wikileaks.

DDoS attacks could hit small media groups and campaigners hard because the organisations have such limited resources, said Mr Zuckerman.

"If you are a human rights organisation or independent media organisation you might be using an account you are paying �20 a month for and its very hard at that level of hosting to fend off DDoS," he told the BBC.

The attacks did not have to be prolonged, he said, to cause real problems for small campaigning groups.

"Start Quote

There are certain attacks that seem to work if you have only one or two machines"

End Quote Ethan Zuckerman

"They just have to do it long enough to annoy their ISP and they will kick them off and then they have to find another place to host," said Mr Zuckerman.

Easy tools

The work of some groups only appears on the web, said Mr Zuckerman, so knocking them offline effectively silences the campaigners. It can take a long time for some to find a new host, upload content and re-build a site.

He said: "We see sites that do not come back online for two to three weeks."

The report also found that DDoS attacks are often only the most visible element of a much broader attack against a site or group.

"There's a very good chance that if you are experiencing DDoS you are being filtered, sent targeted e-mail to get access to your system or to snatch your passwords," he said.

Mr Zuckerman said some DDoS attacks logged in the report used hundreds or thousands of PCs in a botnet - networks of hijacked home computers - but others had just as big an effect with far fewer resources.

"There are certain attacks that seem to work if you have only one or two machines," he said.

What might cause problems in the future, he suggested, would be easy-to-use tools like those employed by Anonymous activists in support of Wikileaks.

"It seems like DDoS has become easier for more people to engage in," he said. "The threats do seem to be increasing."

In response, he said, rights groups needed to work hard to understand the threats and prepare in case they were hit.

"This community needs to get much, much smarter and much more knowledgeable," he said.



Powered by WizardRSS | Work At Home Jobs

Tuesday, December 21, 2010

US backs net traffic regulations

US regulators have approved new rules meant to prohibit broadband companies from interfering with internet traffic.

The Federal Communications Commission (FCC) voted 3-2 on the principle known as net neutrality; a tenet that ensures all web traffic is treated equally.

The rules have been criticised for setting different standards for fixed line broadband and mobile operators.

Officials said the regulations are "the first time the commission has adopted enforceable rules" to govern the web.

The FCC's three Democrats voted to pass the regulations, while the agency's two Republicans opposed them, arguing that they were unnecessary.

Tuesday's vote is the culmination of five years of fighting over how best to ensure the free flow of information in all its forms over the internet.

The FCC vote also comes at a time when consumers are increasingly accessing the web via smart phones and turning to the internet to watch TV shows.

'Rules of the road'

The commission's ability to regulate the internet was thrown into doubt following an appeals court decision earlier this year that said the agency lacked the authority to stop cable firm ComCast from blocking bandwidth-hogging applications.

The FCC said the vote addressed "basic rules of the road to preserve the open internet as a platform for innovation, investment, competition and free expression".

That is a view backed by chairman Julius Genachowski.

"We're adopting a framework that will increase certainty for businesses, investors and entrepreneurs," Mr Genachowski said in remarks prior to the vote.

"We're taking an approach that will help foster a cycle of massive investment, innovation and consumer demand both at the edge and in the core of our broadband networks."

Michael Copps, a Democrat, said in a written statement ahead of the vote that rules represented "an important milestone in the ongoing struggle to safeguard the awesome opportunity-creating power of the open internet".

The regulations are expected to be challenged in court.

'Squandered'

A number of interested parties including internet providers, developers and companies like Google have said the rules could provide some regulatory certainty going forward. Many have acknowledged that the regulations could have been much worse.

"Start Quote

I think today is a tremendously important day in the fight to preserve a free and open internet"

End Quote Aparna Sridhar Free Press

The new rules prohibit telecommunications companies that provide high-speed internet service from blocking access by customers to any legal content, applications or service.

But, for the first time, there is now a policy that will allow for what has been termed "paid-prioritisation", where companies will be able to pay for a faster service.

The FCC regulations place tougher restrictions on wired services from cable and phone companies than on wireless carriers, which have more limited bandwidth.

The vote comes amid increases in the amount of smart phones and tablet devices that are being used to access the web and watch TV shows.

The rules allow mobile firms to block access to sites or applications that specifically compete with a carrier's voice or video services.

Supporters of net neutrality feel the new regulations should have gone further and have slammed them as "fake net neutrality".

"I think today is a tremendously important day in the fight to preserve a free and open internet," Aparna Sridhar of advocacy group the Free Press, told BBC News.

"Chairman Genachowski has completely squandered a golden opportunity to make this vote meaningful. Until now we have had a certain amount of regulatory uncertainty, and the carriers have had an incentive to stay on their best behaviour.

Ms Sridhar added that the rules endorse "bad practices in the wireless space".

In an opinion piece for the Huffington Post, Al Franken, US Senator for Minnesota, earlier called the FCC vote "the most important free speech issue of our time".



Powered by WizardRSS | Work At Home Jobs

Patent spat threatens photo sites

The fallout from a patent dispute between Kodak and web photo site Shutterfly could embroil many online image sites, says patent experts.

Kodak claimed it owns patents regarding the display of online images that is being infringed by Shutterfly.

The photo-sharing site disputes these claims and has launched a counter suit.

But the landmark case could have ramifications for other popular online photo sites such as Yahoo's Flickr and Google's Picassa.

The past two years have seen a number of cases launched that claim online photo sites have breached patents.

But this is the first time such a large, established technology company has sought to assert its rights over online images, said Deborah Bould, a specialist in intellectual property at law firm Pinsent Masons.

Genuine innovation

Kodak's decision to start legal proceedings against Shutterfly will have put scores of web-based photo companies such as Flickr and Google, on high alert, she told BBC News.

"The patents Kodak holds are incredibly broad, effectively covering images that are stored centrally and can be ordered online," she said.

That's likely to mean Kodak will go after other online image sites it believes also infringe its patents, she added.

Kodak said it has over 400 similar patents.

"We are committed to protecting these assets from unauthorised use," it said in a statement.

Given the expense of patent cases, many smaller firms may choose to licence Kodak's technology rather than fight claims, said Theo Savvides, head of intellectual property at Osborne Clarke.

But firms such as Google and Yahoo "have deep pockets" that would allow them to challenge Kodak's claims, he added.

Such challenges would likely focus on the validity of Kodak's patents, said Ms Bould.

The case may hinge on Kodak's ability to show that when it filed the patents they covered technology that was genuinely innovative, she added.

Kodak has been hit hard by the shift towards digital photography, but has recently shown a greater willingness to assert its rights for technology it believes impinge on its patents.

Earlier this year Kodak said it would sue Apple and BlackBerry maker, Research in Motion, over technology used in their handsets.



Powered by WizardRSS | Work At Home Jobs

Monday, December 20, 2010

Porn blocking plan 'not possible'

Government plans to block pornography "at source" are unlikely to prove effective, say ISPs.

The proposal to cut off access to pornographic material was floated by Culture Minister Ed Vaizey in an interview with the Sunday Times.

The government is talking to ISPs to set up a meeting at which the proposal will be discussed.

But, say experts, technical challenges mean any large scale filtering system is doomed to failure.

Legal issues

A spokesman for the Department of Business, Innovation and Skills, confirmed Mr Vaizey's plan to talk to ISPs about setting up an age verification scheme to govern access to pornographic sites.

"This is a very serious matter," said Mr Vaizey. "I think it's very important that it's the ISPs that come up with solutions to protect children."

"I'm hoping they will get their acts together so we don't have to legislate, but we are keeping an eye on the situation and we will have a new communications bill in the next couple of years."

<!-- Embedding the audio player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- end of the embedded player component --> <!-- Player embedded -->

In response to the government proposal, Nicholas Lansman, secretary general of the Ispa industry body, said: "Ispa firmly believes that controls on children's access to the internet should be managed by parents and carers with the tools ISPs provide, rather than being imposed top-down."

Mr Lansman said its members provided parents with many different means of controlling what is accessible via the computers in their homes.

"Online safety is a priority issue for the internet industry and ISPA will be discussing the options available to protect children with Government," he said.

"ISPs currently block child abuse content which is illegal and widely regarded as abhorrent," said Mr Lansman. "Blocking lawful pornography content is less clear cut, will lead to the blocking of access to legitimate content and is only effective in preventing inadvertent access."

BT, the UK's largest ISP, said it would be "happy" to take part in any discussion of the issues, but added: "There are many legal, consumer rights and technical issues that would need to be considered before any new web blocking policy was developed."

Filter failure

"Unfortunately, It's technically not possible to completely block this stuff," said Trefor Davies, chief technology officer at ISP Timico.

"Start Quote

If we take this step it will not take very long to end up with an internet that's a walled garden of sites the governments is happy for you to see"

End Quote Trefor Davies Timico

He said the sheer volume of pornographic material online and the number of ways that people access it, via the web, file-sharing networks, news groups, discussion boards and the like, made the job impossible.

While some proponents of a national pornographic filtering scheme cite the Internet Watch Foundation (IWF) as an example of how such a scheme might work, Mr Davies said it was not a good guide.

The IWF circulates a list to ISPs of sites found to be hosting illegal images of child sexual abuse.

However, said Mr Davies, the IWF draws up its list largely using information passed to it by the public. In addition it only tackles illegal content found on websites.

Such a system would not work if it was used to deal with millions of porn sites, chat rooms and bulletin boards, he said.

Experience with filtering systems, he said, shows that they are a very blunt tool that often blocks access to sites that could be useful.

"You end up with a system that's either hugely expensive and a losing battle because there are millions of these sites or it's just not effective," he said.

"The cost of putting these systems in place outweigh the benefits, to my mind," he said.

"Start Quote

What we are talking about is censorship to protect our children"

End Quote Miranda Suit Safer Media

Mr Davies also feared that any wide-scale attempt to police pornographic content would soon be expanded to include pirated pop songs, films and TV shows.

"If we take this step it will not take very long to end up with an internet that's a walled garden of sites the governments is happy for you to see," he said.

'Child protection'

His comment was echoed by Jim Killock, chair of the Open Rights Group which campaigns on digital liberties issues.

"This is not about pornography, it is about generalised censorship through the back door," said Mr Killock.

"This is the wrong way to go," he said. "If the government controlled a web blacklist, you can bet that Wikileaks would be on it."

Miranda Suit, co-chair of Safer Media, which campaigns to make media safe for children, told the BBC that the pornography available on the internet was "qualitatively and quantitatively" different from any that has gone before.

Ms Suit cited a report compiled by the US conservative think tank The Witherspoon Institute which suggested that easy access to pornography was damaging some young people.

"Children are becoming addicted in their teens to internet pornography," she said. "They are being mentally damaged so they cannot engage in intimate relationships."

Safer Media backed the government call to block pornography "at source", said Ms Suit.

"What we are talking about is censorship to protect our children," she said.



Powered by WizardRSS | Work At Home Jobs

Anti-Islamist group&#39;s site hacked

A controversial anti-Islamist group has told its members to be "vigilant" after their details leaked online.

Hundreds of names and addresses linked to the English Defence League have been circulated on the web after hackers broke in to one of the organisation's websites.

In a warning to members, the group said it feared the potential for reprisals.

Those affected should "remain extra vigilant where their home and personal safety is concerned," it said.

The security breach began last weekend, when a clothing website linked to the organisation was accessed by hackers.

The attackers, who claimed to be part of a group called the "Mujahideen Hacking Unit", obtained lists of those who had recently bought items from the site or donated money to the group.

The EDL has risen to prominence in the last year by staging a number of protests against what it calls the "Islamification" of Britain. While it says it is not racist or anti-Muslim, opponents such as United Against Fascism say the group's agenda is blatantly Islamophobic.

The case has been referred to the police, but in a statement the EDL apologised to members concerned about their safety.

"We don't anticipate any problems as these types of data theft are usually committed to cause annoyance rather than having any other ulterior motive," the group said.

"If, however, anyone does feel threatened or in any way unsafe we would urge you to contact the police immediately and explain the situation."

Despite such assurances, some members remain concerned that the leak could expose them - or their families - to actions by those who dispute the group's claims.

'Vulnerable'

On the EDL's web forum, one poster suggested that the breach had exposed "vulnerable people", while another said that there was serious cause for concern.

"It's not a case of just being scared for yourself," they wrote. "What about our families? People could lose their jobs because of this."

The EDL hit the headlines earlier this month after suggestions that a controversial American minister would be invited to speak at a rally in Luton.

Pastor Terry Jones, who runs the Dove World Outreach Center in Florida, threatened to burn the Koran on the anniversary of 9/11.

Home Secretary Theresa May came under pressure to ban Jones from entering the UK - but eventually the EDL said he would not be attending because the group held "some reservations" about his activities.

It is not the first time that controversial groups have been targeted by hackers online. Last summer, a number of EDL sites were hacked by pro-Palestinian protesters. In 2008, meanwhile, a membership list belonging to the British National Party was leaked online.



Powered by WizardRSS | Work At Home Jobs

Google&#39;s UK wi-fi data &#39;deleted&#39;

Personal data collected by Google's UK Street View cars has been deleted.

The UK Information Commissioner's Office (ICO), which has been criticised for not taking a more hardline stance against Google, confirmed the deletion.

The first batch of wi-fi data, which included snippets of e-mails, URLs and passwords, was deleted in November.

But legal wrangles in other countries meant that the remaining data, all of which the firm said was collected in error, took more time to erase.

"We can confirm that the UK data has now been deleted, and that this has been independently certified," said Google.

The deletion was carried out by US forensics firm Stroz Friedberg.

The ICO welcomed the announcement and said that it had been sent a copy of the report confirming the deletion.

"This is inline with the requirements of the undertaking issued by the ICO and signed by Google last month," said a spokesperson.

The ICO has come under fire for not taking action against the firm, which first admitted to collecting information from unsecured wireless networks in more than 30 countries in May 2010.

But deputy information commissioner David Smith told the BBC in November that it had no grounds for fining Google.

He also admitted that the the UK had conducted a much more basic investigation than other countries, such as Canada, which concluded that the search giant "seriously violated" its privacy laws.

"We spent less time searching than others did. If we had searched for days and days we would have found more," Mr Smith said at the time.

A spokesperson said that the ICO would not change any of its procedures, despite the condemnation.

'Data disturbance'

A Freedom of Information request submitted to the ICO, and published on 17 December, details the correspondence between the firm and the watchdog.

It also explains why, despite the bulk of the data being deleted by 26 November, it has taken until now to delete the rest.

"There is some data from the UK which we haven't been able to delete yet," wrote Google's global privacy counsel Peter Fleischer in November, describing the obstacle as a "wrinkle to the process".

"This relates to data that was still on Street View car disks at the time we discovered our mistake in May. Because these disks could contain data from countries where we have received preservation requests from the authorities, we must make sure that in deleting the UK data we don't disturb the surrounding data.

"In the meantime, the data on these disks was never uploaded to our servers, and these disks have been and will remain securely stored as we work to complete the task."

The firm has faced a series of global investigations into how it came to collect the data, some of which are ongoing.

Last week Google told Connecticut's attorney general's office, which is leading a multi-state US probe, that it would not comply with requests to hand over the data it collected.

"I am disappointed by Google's failure to comply with my information demands," Attorney General Richard Blumenthal said in a statement.

"We will review any information we receive and consider whether additional enforcement steps - including possible legal action - are warranted."



Powered by WizardRSS | Work At Home Jobs

Older teenagers &#39;unsafe&#39; online

Teenager using PC Laws targeting grooming only cover people up until the age of 16. <!-- Empty - Wide embedded hyper -->

The mother of a murdered teenager who was groomed online by a stranger, says not enough is being done to protect older teens on the web.

Ashleigh Hall was 17 when she was killed by Peter Chapman, who was dubbed the Facebook Murderer, in 2009.

He had used a fake photo to pose as a teenage boy online.

Her mum Andrea says there's not enough help for teenagers once they turn 16.

"There isn't enough safety online," she said.

"If there is any it's just there for people who are under 16. What about keeping over 16s safe?" she said.

Potential offenders

"Grooming doesn't just happen to young people, it happens to older teenagers and adults as well," she added.

Laws targeting grooming were first brought in under the 2003 Sexual Offences Act but they only cover people up until the age of 16.

Once children reach that age the level of protection and deterrent for potential offenders is not the same.

Ashleigh Hall Ashleigh Hall, 17, was murdered by a man posing as a teenage boy

John Carr, who advises the government about how to keep children safe online, thinks the law needs changing.

"We tend to think as soon as a child is 16 and they can consent to have sex they're old enough to make their own decisions about this thing," he said.

"But, as we know, not all young people can detect some of the really bad guys there on the internet looking for them.

"I think the police need new powers to cover 16 and 17 year olds.

"We shouldn't just cut them off at the age of 16 and leave them to swim in that dark sea of the internet all on their own".

His comments come as a new storyline in teen soap Hollyoaks looks at how older teenager stay safe online.

The character of 19-year-old India gets into online dating, arranges to meet a stranger and ends up being killed.

'Simple message'

Series producer Paul Marquess says: "It's a dark and intense, long running story.

"But at the heart of it is the most simple message which is be really, really careful.

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- caption -->

Hollyoaks' India on 'shocking' plotline

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

"It seems to be particularly relevant for people once they're past the age of 16 where there doesn't seem to be the same level of protection".

A government spokesperson said it was committed to making the internet a safer place.

He added that police and law enforcement agencies already have a broad range of tools and powers available to help them investigate sexually motivated crimes, whatever the age of the victim.

Follow our technology reporter Dan Whitworth on Twitter



Powered by WizardRSS | Work At Home Jobs

Sunday, December 19, 2010

Major US bank cuts off Wikileaks

Bank of America has stopped handling payments for whistle-blowing website Wikileaks, joining several other major financial institutions.

It said it acted because "Wikileaks may be engaged in activities that are... inconsistent with our internal policies for processing payments".

In response, Wikileaks urged its supporters to stop doing business with the bank - one of the world's largest.

MasterCard, PayPal and other companies earlier cut off Wikileaks' payments.

The financial institutions acted after Wikileaks - together with several major media organisations - began publishing thousands of secret US diplomatic cables, causing tension between Washington and some of its allies.

Wikileaks founder Julian Assange was earlier this week freed on bail in the UK while facing extradition proceedings to Sweden over sexual assault allegations.

Mr Assange, 39, dismissed the claims as part of a "smear" campaign.

He also said he was worried about an attempt to extradite him to the United States, adding that Washington was conducting an "aggressive" and "illegal" investigation into him and the website.

'Unethical practices'

In a statement, the North Carolina-based Bank of America said it would "not process transactions of any type that we have reason to believe are intended for Wikileaks".

The statement provided no further details.

Wikileaks responded in a message on Twitter, urging "all people who love freedom close out their accounts at Bank of America".

The website also called for businesses to "place your funds somewhere safer".

Wikileaks has recently said it will soon release documents that will point to "unethical" practices" at some US banks.

There has been speculation that the Bank of America could be one of the institutions mentioned in the US diplomatic cables.



Powered by WizardRSS | Work At Home Jobs

Friday, December 17, 2010

US to target fake pill web sales

Online stores that sell fake drugs or pills without prescriptions are being targeted by the US government.

It has set up an initiative that will try to shut down the web stores and educate people about the dangers of buying drugs from such places.

Search firms, payment providers and net hosting firms have all pledged to help the crackdown.

Research suggests about 36 million Americans have bought medicines from unlicensed web pharmacies.

"Those who sell prescription drugs online without a valid prescription are operating illegally, undercutting the laws that were put in place to protect patients, and are thereby endangering the public health," said Victoria Espinel, US intellectual property enforcement co-ordinator, in a statement.

"It is a real wake-up call that so many Americans have engaged in this dangerous behaviour," she said.

Web firms joining the initiative include search giant Google, domain registration firm Network Solutions, hosting companies as well as payment processors Paypal, Visa and Mastercard.

Together, the firms hope to tackle every link in the chain that keeps unlicensed pharmacies operating by stopping them showing up in search results, taking their websites offline, delisting the domains they use and stopping payments reaching them.

Many spammers align with online pharmacies and direct those who click on links in junk mail to the pedlars of fake pills.

The commercial partners in the initiative will also share information with law enforcement agencies and fund public awareness campaigns of the dangers of buying drugs from unlicensed pharmacies.

"The abuse of prescription medications is one of the most troubling public health problems in our country today," said Steve Pasierb, president of the non-profit Drugfree.org which runs education campaigns about drug abuse.

Drugfree and the Alliance for Safe Online Pharmacies are planning research to find out why one in six Americans have bought drugs from web pharmacies. They will also look into what they buy and try to uncover the reasons some people see the practice as risky and others do not.

The initiative was announced at a White House summit on intellectual property and is one result of a plan the Obama administration submitted to Congress in mid-2010 that committed to tackling counterfeit medicines.



Powered by WizardRSS | Work At Home Jobs

Assange tells of &#39;smear campaign&#39;

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- companion banner --> <!-- END - companion banner --><!-- caption -->

Julian Assange spoke to Newsnight's Kirsty Wark after being released on bail

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

Wikileaks founder Julian Assange has said attempts to extradite him to Sweden over sexual assault allegations are part of a "smear" campaign.

Mr Assange is staying at a house near Bungay, Suffolk, after being freed on bail by the High Court in London while awaiting extradition proceedings.

He said more information would be published by the whistle-blowing website following his release.

Mr Assange denies the allegations made by Swedish prosecutors.

'Disturbing aspects'

Speaking to BBC Newsnight, the 39-year-old Australian said of the case against him: "My feeling is in fact that there's a number of different interests - personal, domestic and international - that are all feeding from this process and encouraging it and pushing it along.

"But it is revealing some important things. It's revealing some disturbing aspects of Europe.

"For example, that any person in any European country can be extradited to any other European country without the provision of any evidence whatsoever."

Referring to the Wikileaks website, he said: "Now that I am back to assist the directing of our ship, our work will proceed in a faster manner.

"But as we have seen with my absence, things are well set up to proceed even without my direct involvement."

BBC Newsnight presenter Kirsty Wark asked Mr Assange if he would give his word of honour that he would not try to abscond before the next hearing.

He replied: "We have done everything by the book. We have tried as hard as possible to set up a situation where we can clear my name of these allegations.

"But what we have not seen is the provision of any evidence or material to allow us to do that."

'Continuing vendetta'

Mr Justice Ouseley ordered Mr Assange be bailed on payment of �240,000 in cash and sureties.

The judge imposed strict bail conditions including wearing an electronic tag, reporting to police every day and observing a curfew.

Mr Assange must also reside at a manor home on the Norfolk-Suffolk border owned by Vaughan Smith, a Wikileaks-supporting journalist and owner of the Frontline Club in London. Mr Assange had spent the previous eight nights in prison.

Mr Assange's solicitor Mark Stephens said after the court appearance that the bail appeal was part of a "continuing vendetta by the Swedes".

Speaking to the BBC after his release, Mr Assange said there was a rumour from his lawyers in the US that there had been an indictment made against him there.

A spokeswoman from the US Department of Justice would only confirm there was "an ongoing investigation into the Wikileaks matter".

Mr Assange has received the backing of a number of high-profile supporters, including human rights campaigners Jemima Khan and Bianca Jagger, and film director Ken Loach.

Sex allegations

Wikileaks has published hundreds of sensitive American diplomatic cables, details of which have appeared in the Guardian in the UK and several other newspapers around the world.

He has been criticised in the US, where former Republican vice-presidential candidate Sarah Palin has said he should be hunted down like the al-Qaeda leadership.

Mr Assange argues the allegations against him are politically motivated and designed to take attention away from the material appearing on Wikileaks.

Mr Assange is accused of having unprotected sex with a woman, identified only as Miss A, when she insisted he use a condom.

He is also accused of having unprotected sex with another woman, Miss W, while she was asleep.

A full extradition hearing should normally take place within 21 days of the arrest. Mr Assange was arrested on 7 December, so this should be by 28 December.

However, in such a high profile case, it is possible that a full extradition hearing will not take place for several months.

At that hearing Mr Assange will be able to challenge the warrant and raise any defences to the extradition request.



Powered by WizardRSS | Work At Home Jobs

Facebook suffers brief shut down

Facebook was forced to take itself offline after a staff member accidentally leaked internal product prototypes.

The social network was unreachable for about 20-30 minutes while the mess was cleared up.

The outage happened as the site introduced redesigned brand pages, a revamped photos section and a new page management feature.

In a statement on its blog, Facebook apologised for the brief downtime.

"For a brief period of time, some internal prototypes were made public to a number of people externally." read the message. "As a result, we took the site down for a few minutes. It's back up, and we apologise for the inconvenience."

The BBC understands that the problem arose when code for a number of new products was exposed to the public before they were ready to be launched. This included a feature called "memories" that indexed what people have done on Facebook chronologically.

"They're not pleased that they had to shut the website down for 30 minutes," said Sam Gustin at Wired.com.

"But it comes with the territory when you have a culture of iterative innovation, they say," he said. "Sometimes code gets pushed out before it's ready."

"There's probably an engineer at Facebook who is feeling pretty sheepish that he or she caused the world's biggest online social network to shut itself down for a half an hour," added Mr Gustin.

The news blog ReadWriteWeb saw the funny side of things by listing five things to do during a Facebook outage. They included resorting to instant messaging, using the phone to connect with people and reading a book.

On Twitter, one widely circulated tweet doing the rounds read "Facebook is down. Half the world population had suddenly become productive. The other half of the population is using Twitter."



Powered by WizardRSS | Work At Home Jobs

Thursday, December 16, 2010

Wikileaks activists go analogue

Online activist group Anonymous has once again changed tactics in its campaign to support Wikileaks, eschewing web-based attacks.

At least one faction of the group has urged supporters to plaster the streets with pro-Wikileaks propaganda on 18 December.

The group had earlier attacked websites of firms they accused of colluding with governments to censor Wikileaks.

The Metropolitan Police has confirmed it is investigating the web incidents.

Now Operation Paperstorm, as it is known, aims to get volunteers to print pro-Wikileaks posters and plaster them across towns and cities.

It has asked supporters to distribute the material on Saturday - when many people will be in town centres finishing off their Christmas shopping.

Volunteers have been translating the posters in to different languages.

Low tech attacks

The campaign is another example of Anonymous going low-tech.

Earlier this week, people associated with the group began a campaign to flood the fax machines of PayPal, Mastercard and Amazon with copies of secret memos published by Wikileaks.

The firms were targeted after refusing Wikileaks' custom and had previously had their websites attacked.

Within Anonymous there has been a growing consensus to change tactics, Phill Midwinter, who describes himself as an active member of the collective, told BBC News.

"We don't want to annoy or make life difficult for internet users," he said.

Paperstorm was one of "about 10" initiatives that would enable Anonymous to publicise the leaked cables and the case of Bradley Manning, the US Army intelligence specialist being held in conjunction with the leaks, said Mr Midwinter.

"They're examples of how we can use crowd-sourcing to get our message across, without doing anything illegal," he added.

But while some connected with Anonymous seek less inflammatory options to express their opinion other than attacking websites, others may be about to launch new ones.

Several programmers have posted updated versions of the tool, LOIC, used to launch the initial denial-of-service attacks.

These bombard websites with page requests until the servers are unable to cope, effectively taking the page offline. The group has had mixed success with its efforts to take websites offline.

One of the new tools, Hive Mind LOIC, has been adapted so that it can be controlled from a central source, such as a Twitter feed.

Meanwhile, the Metropolitan Police has confirmed that it was investigating a string of attacks, which Anonymous claimed to have carried out.

A Met spokesman confirmed that earlier this year it "received a number of allegations of 'denial-of-service' cyber attacks against several companies by a group calling themselves Anonymous".

Earlier this year a series of attacks hit the websites of organisations that targeted web pirates.

"The Metropolitan Police Service is monitoring the situation relating to recent and ongoing denial of service attacks and will investigate where appropriate," it said.



Powered by WizardRSS | Work At Home Jobs