Wednesday, March 23, 2011

Digital Act heads to High Court

Parts of the Digital Economy Act that deal with illegal file-sharing are being challenged in the High Court.

Internet providers BT and TalkTalk demanded the judicial review, arguing that the legislation was rushed through parliament without proper debate.

They claim that the measures unnecessarily impact users' privacy and force ISPs to police copyright infringement on the net.

If the court finds in their favour, the act would no longer be enforceable.

"It is a big deal to be judicially reviewing primary legislation but we took advice and there were very clearly were some real problems," said Simon Milner, BT's head of industry policy.

"It might find that it is all fine - I'd be surprised if it was - but we are going to court to get legal clarity," he added.

Letter campaign

"Start Quote

Peer-to-peer file-sharing is yesterday's game. People now are going off the network where they won't be detected - swapping hard-drives, and getting music via blogs and upload sites"

End Quote Mark Mulligan Forrrester Research

The courts will consider whether the act is in line with European legislation, in particular as it relates to users' privacy and the role of ISPs.

The previous government brought in the tough measures to deal with the growing issue of internet piracy.

Under the current legislation, content providers will have to monitor peer-to-peer networks for illegal activity and collate the IP addresses - the numerical code that links a particular computer network to an illegally downloaded file.

They can then apply to a court to force ISPs to surrender the real world address that is connected to that IP address.

Letters could then be sent to alleged net pirates, advising them that their computer connection has been used in illegal activity.

The creative industry is keen that the emphasis will be on education initially, although people will go on a blacklist which could in future be used to take individual infringers to court.

Other penalties, such as slowing down net connections or even cutting people off from the net entirely have not been ruled out, but would need additional legislation.

The letter-writing strategy bears similarities to the tactics of discredited law firm ACS: Law, which sent over 10,000 letters to alleged net pirates.

Unlike content providers, which will not be levying fines, ACS: Law collected some �300,000 from people - who were charged an average of �500 per infringement.

Not everyone paid up and 27 cases recently went to court in highly controversial circumstances.

Lead solicitor Andrew Crossley attempted to discontinue the cases shortly before the hearing was due and was accused of obstructing the court process.

In the middle of the case, Mr Crossley said he no longer wanted to be in the business of chasing net pirates and the cases were eventually thrown out.

But he faces an investigation for his conduct from the Solicitors' Regulation Authority and could be hit with legal costs for the cases he brought.

Yesterday's game

During the court case, doubt was cast over whether an IP address was suitable evidence of wrong-doing as it does not identify the individual user - only the location of their connection.

Consumer watchdog Which? highlighted several cases where people claimed to have been wrongly accused.

Charles Dunstone, chairman of TalkTalk, thinks the same thing will happen if the government's measures go ahead.

"Innocent broadband customers will suffer and citizens will have their privacy invaded," he said.

Jim Killock, director of the Open Rights Group, said that he is particularly worried about how the legislation will affect public wi-fi hotspots.

"We need to start again and find a new policy settlement which embraces, rather than tramples on, the exciting possibilities that the digital age offers," he said.

John McVay, chief executive of PACT (Producers Alliance for Cinema and TV), who will represent the UK's creative industries at the judicial review, defended the act.

"The Digital Economy Act is the result of many years of consultation and presents a reasonable and balanced solution," he said.

But Mark Mulligan, an analyst with Forrester Research, warned that even if the act remains intact, the measures won't work because they are already out-of-date.

"Peer-to-peer file-sharing is yesterday's game. People now are going off the network where they won't be detected - swapping hard-drives, and getting music via blogs and upload sites," he said.



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Tuesday, March 22, 2011

Play.com warns of security breach

Play.com has warned its customers to "be vigilant" after a security breach led to some personal information being compromised.

The retailer, which sells music, videos and games, blamed another company that it employs to do marketing.

It said that no payment details were stolen, but asked users to beware of spam e-mails containing harmful links.

The company has apologised saying it had "taken every step to make sure this doesn't happen again".

In a statement, Play.com's chief executive John Perkins said: "On Sunday 20 March some customers reported receiving a spam e-mail to e-mail addresses they only use for Play.com."

"We believe this issue may be related to some irregular activity that was identified in December 2010 at our e-mail service provider, Silverpop.

"Investigations at the time showed no evidence that any of our customer e-mail addresses had been downloaded.

"We reacted immediately by informing all our customers of this potential security breach in order for them to take the necessary precautionary steps."

The retailer, which operates out of Jersey, said that all of its customers had now been warned to be cautious of e-mails appearing to come from Play.com.

It has also requested that any suspicious messages be forwarded to privacy@play.com.

Cyber attack

US-based firm Silverpop was employed by the site in 2008 to manage e-mail marketing and communications.

Silverpop's manager of corporate communications, Stacy Kirk, told the BBC that the only security issue it had been affected by happened last year, and that it had notified all affected clients at the time.

"Silverpop was among several technology providers targeted as part of a broader cyber attack that occurred in the fall of 2010," she said.

"At that time, we very quickly stopped the attack, notified all customers impacted by the activity and began working with the FBI, law enforcement and third party security experts to help identify those responsible and take any additional steps necessary to ensure this did not happen again.

"Start Quote

On behalf of Play.com, I would like to once again apologise to our customers for any inconvenience due to a potential increase in spam that may be caused by this issue."

End Quote John Perkins CEO, Play.com

"We are confident that the breach last year remains an isolated incident."

Ms Kirk would not confirm that Play.com was among those contacted due to client confidentiality.

Some users on Twitter and in discussion forums have reported an increase in spam e-mail to accounts signed up to Play.com, with some of these e-mails containing links to websites containing malware.

Phishing scams are designed to trick users into believing they are sharing data with a company that they trust, and giving out personal information such as a credit card details.

However, it cannot be confirmed that the e-mails were sent as a result of the data breach at Play.com.

No notice

Some customers who received Play.com's warning e-mail questioned its validity as it did not refer to them by name.

Play.com's website currently contains no notice or guidance about the breach.

Many users have also complained that it is currently not possible to manually remove credit card details from the site.

Paul Vlissidis, technical director of IT security firm NGS Secure, said that such situations are a major concern for retailers and their customers.

"Online businesses, even those of Play.com's size, cannot afford the loss of reputation and customer trust that negligence of this type causes," he said.

"While it is a weakness in the security of a third party that has allowed this data breach, it is the responsibility of all organisations dealing with personal customer data to ensure comprehensive security audits have been carried out in all areas of outsourced work."

Mr Perkins has moved to re-assure customers that other data kept with Play.com is safe.

"We would also like to reassure our customers that all other personal information (i.e. credit cards, addresses, passwords, etc.) are kept in the very secure Play.com environment.

"Play.com has one of the most stringent internal standards of e-commerce security in the industry.

"On behalf of Play.com, I would like to once again apologise to our customers for any inconvenience due to a potential increase in spam that may be caused by this issue."



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

China rejects Google allegations

China's foreign ministry has rejected claims by Google that Beijing is disrupting access to its e-mail service in the country.

"This is an unacceptable accusation," ministry spokeswoman Jiang Yu told a regular news conference on Tuesday.

Google said on Monday that difficulties faced by users of its Gmail service was the result of government blocks.

Users say the interference coincided with an internet campaign calling for protests like those in the Middle East.

Google said it had found no technical issues, and blamed "a government blockage carefully designed to look like the problem is with Gmail".

Last year, Google said it had suffered cyber-attacks from China-based organisations intent on hacking into the Gmail accounts of Chinese rights activists.

The incident caused tensions between China and the United States, and led to Google reducing its presence in the Chinese market.

Beijing has always denied any state involvement in the cyber-attacks, and has in the past called such accusations "groundless".



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Monday, March 21, 2011

China blamed for Gmail disruption

Google has blamed the Chinese government for problems accessing its e-mail service in the country.

Internet users have complained that the authorities have stepped up disruption of its Gmail service in recent weeks.

Google said it had found no technical issues, and blamed "a government blockage carefully designed to look like the problem is with Gmail".

Users say the interference coincided with an internet campaign calling for protests like those in the Middle East.

Last year, Google said it suffered cyber-attacks from China-based organisations intent on hacking into the Gmail accounts of Chinese rights activists.

The incident caused tensions between China and the United States, and led to Google reducing its presence in the Chinese market.

Beijing has always denied any state involvement in the cyber-attacks, and has in the past called such accusations "groundless".



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Sex domain given final approval

Internet overseer Icann has given final approval to the creation of an internet domain dedicated to pornography.

The move to create a top level ".xxx" domain - similar to ".com" and ".org" - ends a 10-year battle over the virtual red-light district.

Icann gave initial approval last year, but carried out further consultation checks over the application.

It is now poised to sign an agreement with the ICM Registry, which is backing the domain, to make .xxx a reality.

Supporters say the domain will make it easier to filter out inappropriate content.

But many pornographers worry that the move could ghettoise their content. Religious groups have argued that giving pornography sites their own domain legitimises the content.

Icann, the Internet Corporation for Assigned Names and Numbers, said in a draft paper ahead of approving the decision: "The Icann community has engaged in extensive debate as well, with this single issue generating higher volumes of community comment than nearly any other issue ever faced within Icann."

The organisation oversees the internet's addressing system and demands that new top level domains, such as .biz, must be "sponsored" in that they must serve the needs of a defined community.

ICM said last year that it had more than 110,000 pre-reservations for .xxx domains.

Initial approval for .xxx was given in 2005 but this was rescinded following protests from politically conservative groups. Icann also said it was worried that it would be asked to police content - a role it was not created for.

In February 2010, a panel of US judges said Icann erred in denying the approval of the domain.

Icann accepted that ruling and began a public consultation process on whether the domain should be approved.



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Friday, March 18, 2011

ISPs defend plan for two-tier net

ISPs have defended their right to operate a two-speed internet, at a key debate into the future of the web.

The debate was organised by the government, which is keen to see the principles of a free and equal net maintained.

ISPs are increasingly looking to prioritise some traffic on their networks and block some.

After the meeting the BBC called for the creation of a broadband content group to represent content providers.

It, along with content providers such as Google, Yahoo, Facebook and Skype, is growing increasingly concerned about how the issue of net neutrality is being dealt with.

Net neutrality - the principle that all net traffic should be treated equally - has been challenged in recent years as ISPs look to make a return on their increasingly expensive networks.

They argue that if content providers want to pay to get their traffic prioritised on the network, then they should be allowed to do so.

But some content owners and digital activists such as Open Rights Group argue that such a policy would do long-term damage to the internet, which was always conceived as a platform for everyone - not just those with deep pockets.

Net neutrality has been a key issue in Europe and a raft of legislation comes into force in May which will force ISPs to be more open about how they manage the traffic on their networks.

Free net

After the debate, Ed Vaizey, communications minister, made his views clear.

"Internet traffic is growing," he said. "Handling that heavier traffic will become an increasingly significant issue so it was important to discuss how to ensure the internet remains an open, innovative and competitive place.

Commenting about a code of practise drawn up by the Broadband Stakeholders' Group earlier in the week, he said the agreement should be guided by three principles.

"The first is users should be able to access all legal content," he said. "Second, there should be no discrimination against content providers on the basis of commercial rivalry and finally traffic management policies should be clear and transparent."

While Mr Vaizey is reluctant to regulate the industry, he has appointed world wide web inventor Sir Tim Berners-Lee to bang heads together.

But he could struggle to persuade ISPs that all the traffic on their networks should be treated equally.

Jim Killock, director of the ORG, said ISPs were in no mood for compromise at the debate.

"They weren't willing to make any concessions on their ability to manage traffic," he said. "BT even said that if people want to block things they should be able to."

"If people are blocking large sections of the internet and promoting a handful of service then they shouldn't be able to claim that they sell internet access," he added.

Enhanced service

A spokesman for ISPA, the body that represents UK internet service providers told the BBC that ISPs "should be free to manage their networks as they see fit".

He added that it would make no sense to throttle popular services such as the iPlayer. "That is just going to annoy your customers and they will leave," he said.

The code of practice drawn up by the BSG this week is aimed at making it easier for consumers to see how traffic is managed on different networks.

The ORG argues that it should go further

"In some countries, such as Norway, ISPs have said that they will only do traffic management to deal with congestionm" said Mr Killock. "But the UK code allows ISPs to prioritise and discriminate as they like as long as they are transparent."

Simon Milner, head of policy at BT, said the ISP had no intention of blocking anything other than illegal traffic, but he defended the right of others to do so.

"In our view if someone wants to offer a service in which things are blocked - for example the Church of England might want to deliver Christian-friendly broadband - then they should be allowed to do that. It is no different from the walled gardens we used to have," he said.

And in the "multi-channelled" internet of the future, he said, firms should be allowed to prioritise certain traffic.

"If someone came to us - for example a Russian TV mogul - and wanted enhanced delivery, then that shouldn't be regulated against. It wouldn't mean that other content would be of low quality," he said.

But, he added, so far "content providers aren't beating down our door" for such a service.

Traffic lights

The BBC has always maintained that it won't pay to have its popular iPlayer service prioritised over other traffic.

John Tate, the BBC's director of policy and strategy said: "People should be able to access the internet without the blocking or throttling of certain content due to commercial rivalry."

The BBC is currently developing a traffic-light system to let users see how different ISPs treat its iPlayer service.

The details of the system, due for release in the spring, are not fully decided but it is likely ISPs will be rated simply: Red for poor, amber for OK, and green for acceptable.

The debate also looked at how mobile operators are managing traffic as more people access the web via mobile devices.

Traffic management in mobile is already routine, said Mr Killock.

"The levels of blocking on phones is enormous," he said. "Most phones block peer-to-peer traffic while most degrade the quality of Skype calls because they don't want Skype to be taking revenue away from them."



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Hackers tackle secure ID tokens

Hackers have stolen data about the security tokens used by millions of people to protect access to bank accounts and corporate networks.

RSA Security told customers about the "extremely sophisticated cyber attack" in an open letter posted online.

The company is providing "immediate remediation" advice to customers to limit the impact of the theft

It also recommended customers take steps, such as hardening password policies, to help protect themselves.

Proof positive

In the open letter, written by RSA boss Art Coviello, the company said that the data stolen would not help a "direct" attack on the the SecurID tokens.

It did not disclose exactly what had been purloined and only said that the information "specifically related to RSA's SecurID two-factor authentication products".

RSA's SecurID tokens are used by millions of people alongside passwords to beef up security.

As its name suggests, two-factor authentication involves improving security using two methods of identifying a user. The first factor is usually the traditional login ID and password combination.

The second factor can be a SecurID token that is paired with back-end software that generates a new six digit number every minute.

A token paired with this software generates the same numbers so only the holder will be able to type in the right digits and get access.

RSA said the information stolen could reduce the effectiveness of this two-factor authentication system if a company came under a broader attack by malicious hackers.

This could potentially put a lot of people at risk as RSA claims to have millions of people using its security technology to secure online accounts and access to corporate systems.

RSA recommended that firms monitor social network sites to spot if hackers were trying to capitalise on what they now know about RSA's systems.

This could be because hackers have got information about who has which token and might try to exploit that to trick employees into giving them access.

RSA also recommended reminding users about the dangers of responding to suspicious e-mails, to limit who can access critical infrastructure systems and to reinforce all policies surrounding SecurID token use.

There could be "tremendous repercussions" if criminals piggy-backed on what they know to stealthily get at corporate and other critical systems, said Richard Stiennon, chief research analyst at security firm IT-Harvest.

"You'd never have a sign that you've been breached," he said.



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Thursday, March 17, 2011

Twitter boss on application snub

Twitter founder Biz Stone has rejected suggestions that the site is shunning developers in order to make money.

He told BBC News that attempts to dissuade companies from writing Twitter client applications were about improving the user experience.

Twitter has come under fire for suggesting that it did not want developers creating software which replicates its own interface.

Critics claimed the dispute was about ensuring users view adverts its site.

Since Twitter's creation, scores of third-party applications have appeared that allow users to write, read and respond to tweets.

However, in a recent blog posting, Twitter's coding chief Ryan Sarver suggested that companies should consider stopping making such software.

The move was condemned by developers who feel they are partly responsible for Twitter's success and are concerned about how they will make money in the future.

But Mr Stone insisted that the company's focus is about providing a consistent experience for the user, no matter how they access the service.

"Historically the best way to do that is not necessarily to create or recreate apps that could be confusing or do the things we are already doing," he said.

"Developers extend our ability to help users, and our end goal is to serve users. Part of that goal can by helped by giving developers opportunities to create new, interesting and innovative ways to help them get more value out of Twitter."

"Start Quote

the best way to do that is not necessarily to create or recreate apps that could be confusing or that already do the things we are doing"

End Quote Biz Stone Twitter co-founder
Too many apps

As an example of the confusion that he believes exists, Mr Stone pointed to the number of Twitter apps available for the iPhone.

They include Twittelator, Twitterific, TweetDeck, Echofon, Tweetcaster, La Twit, Tweetaholic, TweetList, TweetBird and TweetBoard.

Mr Stone explained that since Twitter had brought out its own official clients the number of users had skyrocketed.

However, research carried-out by media analytics firm Sysomos suggests that third-party applications are still widely used.

The company looked at 25 million tweets, sent on the day that Twitter unveiled its new policy. It found that 42% were sent from unofficial apps.

"The question for developers is to ask themselves is how they can best serve the users," said Mr Stone.

"By another app that pretty much does the same thing as Twitter? Or by creating new and innovative ways to get value out of Twitter that we are not necessarily doing ourselves," he said.

New policy

In the blog posting that sparked the controversy, Ryan Sarver wrote: "Developers ask us if they should build client apps that mimic or reproduce the mainstream Twitter consumer client experience. The answer is no."

He suggested that they should look to build other services that complement the Twitter experience such as mining data to help with brand management, customer relations and enterprise solutions.

While existing applications are fine for the moment, Mr Sarver said they would be closely policed.

Learning curve

Developers vented their fury on Twitter's discussion board and various blogs calling the decision everything from appalling to chilling.

RSS pioneer Dave Winer told technology blog GigaOm.com that the new roadmap for developers underscored the need for them to look at building new businesses directly on the internet instead of on other services where the owner is too active.

"The Internet remains the best place to develop because it is the Platform With No Platform Vendor. Every generation of developers learns this for themselves," he said.

Mr Stone said while he understood the frustration and concern emanating from the developer community, Twitter had to do what is best for its users.

"There are going to be some growing pains but I think the most important thing we can do is communicate as best we can, even if it is bad news people don't want to hear or we are not comfortable saying.

"It is important because people can get the clarity they need," he said.



Powered By WizardRSS.com | Full Text RSS Feed | WordPress PluginHud 1

Wednesday, March 16, 2011

Judge considers costs for ACS Law

Controversial law firm ACS: Law returned to court on Wednesday as the cases it brought against alleged file-sharers were officially closed.

Andrew Crossley, the solicitor at the heart of the controversy, was absent from court but could still face heavy fines.

Judge Birss is considering whether ACS: Law should pay the defendant's costs.

Ralli, the law firm which represents five of the accused, is seeking �90,000.

It is unusual for a judge to impose so-called wasted costs and only happens when legal representatives are considered to have acted improperly.

ACS: Law was heavily criticised by Judge Birss in an earlier judgement on the case.

The normal procedures for apportioning costs may not apply, he warned at Wednesday's hearing.

"If ever there was a case with conduct out of the norm it was this one," he said.

Speculative invoicing

Mr Crossley has faced a barrage of media scrutiny since he began sending letters to alleged file-sharers in June 2009.

Consumer watchdog Which? highlighted several cases where people claimed to have been wrongly accused.

Critics increasingly accused Mr Crossley of pursuing a letter-writing campaign against alleged net pirates as a way of making money - so-called speculative invoicing - with no intention of ever bringing them to court.

People receiving letters were offered the chance to pay a fine of around �500 per infringement.

This view was given validity when Mr Crossley brought 27 cases to court but sought to discontinue them at the last minute.

A frustrated Judge Birss refused to allow the cases to be dropped and instead put the methods of ACS: Law under the spotlight.

He accused the firm of seeking "to avoid judicial scrutiny".

At a hearing in January, Mr Crossley dramatically withdrew from the cases, saying he no longer wanted to pursue illegal file-sharers because of the "immense hassle" it was causing him and his family.

Bleak House

His barrister Paul Parker argued in Wednesday's court hearing that he should not be liable for costs.

He said that Mr Crossley's file-sharing case load had operated at a loss, with Mr Crossley claiming to have spent �750,000 on pursuing net pirates while making �300,000 from people paying fines.

Guy Tritton, barrister for Ralli, countered that the way ACS: Law had conducted the cases amounted to "an abuse of process" and drew parallels with Charles Dickens famous courtroom drama Bleak House.

"Dickens view that the one great business of British law is to make money for itself is apposite in this case. The primary purpose of the letters was to make money for ACS: Law," he said.

As well as proving to be a fascinating courtroom drama, the case has wider implications as governments around the world grapple with how to deal with the issue of copyright theft.

The cases have brought into question whether an IP address - the numerical code which identifies an individual computer - can be used as evidence in court.

The UK's Digital Economy Act, set up in part to deal with illegal downloading, is facing its own judicial review next month, with ISPs BT and TalkTalk claiming that the measures introduced to chase illegal file-sharers "simply won't work".

A group of MPs will hear evidence next week as it takes its own look at the Act.

Meanwhile Mr Crossley is under investigation by the Solicitor's Regulation Authority.

The Information Commissioner is also considering whether ACS: Law should be fined for a data breach, which saw the details of the people who had received letters and the pornographic films they are accused of downloading exposed online.

Law firm Ralli is considering pursuing a group action for harassment against ACS: Law.



Powered By WizardRSS.com | Full Text RSS Feeds | WordPress PluginHud 1

Apple delays Japan iPad 2 launch

Apple has postponed the launch of the iPad 2 tablet in Japan, as the country struggles to recover from the recent earthquake and tsunami.

Originally planned for 25 March, the company said its launch had been delayed indefinitely.

Many technology firms are facing supply problems after factories in Japan shut down in the wake of the disaster.

However, an Apple spokesperson said the announced delay was unrelated to any supply shortages.

"We are delaying the launch of the iPad 2 in Japan while the country and our teams focus on recovering from the recent disaster," said Natalie Kerris.

Apple has been using its iTunes store to accept donations for the American Red Cross' (ARC) Japan earthquake and tsunami relief fund.

According to the company, 100% of the proceeds will go directly to the Red Cross.

While the country's main focus is on the human cost of the disaster, many businesses are also facing challenges.

Sony, Panasonic, Toshiba and Canon had all been forced to halt production in the immediate aftermath, in order to carry out safety checks.

The prospect of rolling power blackouts means further interruptions are likely over the coming weeks.

US launch

The updated version of the Apple's iPad first appeared in stores across the US last Friday.

Many retailers reported running out of stock within hours, and analysts estimated sales to hit 1m units during the weekend.

Buyers in 24 other countries, including the UK, will be able to get their hands on the iPad 2 next week.

Apple CEO Steve Jobs has unveiled the tablet computer at an event in San Francisco on 1 March.

The iPad 2 is said to be twice the speed of its predecessor; it has cameras on the front and back and also features improved graphics.

The first version of the iPad was released in April 2010, and went on sale in Japan in May 2010.



Powered By WizardRSS.com | Full Text RSS Feeds | Best Amazon WordPress PluginHud 1