Wednesday, September 14, 2011

Hunt outlines anti-piracy plans

UK Culture Secretary Jeremy Hunt has delivered a hard-hitting speech, calling on net firms, advertisers and credit card companies to cut ties with websites that link to unlawful content.

In a speech to the Royal Television Society, he said he wanted to make it harder for such sites to prosper.

Ideally the government would like to see Google remove pirate sites from its search engine completely.

But Google's response suggested this was unlikely.

"Without a court order, any copyright owner can already use our removals process to inform us of copyright infringing content and have it removed from Google Search," the firm said in a statement.

More difficult

It may not be enough for Mr Hunt, who appeared to be on an anti-piracy crusade.

In his speech, he denied that blocking access to pirated content was an attack on net neutrality.

"Unlawfully distributing copyrighted material is theft - and a direct assault on the freedoms and rights of creators of content to be rewarded fairly for their efforts," he said.

"We do not allow certain products to be sold in the shops on the High Street, nor do we allow shops to be set up purely to sell counterfeited products. Likewise we should be entitled to make it more difficult to access sites that are dedicated to the infringement of copyright," he added.

Many of the changes mooted by Mr Hunt are destined for the new Communications Act which is due to become law towards the end of the current Parliament in 2015.

Suggested measures include:

  • A cross-industry body, perhaps modelled on the Internet Watch Foundation, to be charged with identifying infringing websites against which action could be taken
  • A streamlined legal process to make it possible for the courts to act quickly
  • A responsibility on search engines and ISPs to take reasonable steps to make it harder to access sites that a court has deemed contain unlawful content or promote unlawful distribution of content
  • A responsibility on advertisers to take reasonable steps to remove their advertisements from these sites
  • A responsibility on credit card companies and banks to remove their services from these sites.

The hope is that the tough new measures will sit alongside the already controversial anti-piracy legislation outlined in the Digital Economy Act (DEA).

The DEA remains in a state of suspended animation as the government waits for the European Parliament to approve changes to it.

For its part, Google said that it felt that its current anti-piracy policies were sufficient.

It operates a takedown process in which it removes links identified as infringing copyright. Last year it removed three million items from its search engine.

The company said that it had improved takedown times with an average response of four hours. It is also set to change its auto-complete tool to eradicate terms associated with piracy.

Expensive nightmare

Jim Killock, chief executive of the Open Rights Group, said the proposals set a dangerous precedent.

"It is pretty dangerous to ask credit card companies or Google to decide who is guilty," he said.

"Once again Mr Hunt has listened to the lobbyists and has made no attempt to work out the scale of the problem. We are back where we were with the DEA, which is proving unworkable and an expensive nightmare," he said.

Other measures announced in Mr Hunt's speech included a promise to establish a new regulatory framework for the newspaper industry.

He said a cross-media approach to regulation was vital, as broadcasters, newspapers and internet companies developed new products for smartphones, tablet computers and web TV.

In the wake of the phone-hacking scandal, the public would demand a "robust" solution and he called on the industry to come up with one.

"Our free press has served us incredibly well. So we don't want any changes to result in the back-door imposition of statutory broadcast-style regulation. But if we are to avoid this, the public will insist on a system of robust, independent regulation with credible sanction-making power," he said.

He also spoke about the broadband landscape. He said the government's ambition to make the UK the best place for broadband in Europe by 2015 was on track. But, with countries such as Singapore introducing speeds of up to 1 gigabit per second as standard, it wasn't enough.

He said that plans for other firms to share BT's poles and ducts were "taking too long" and pledged to speed up the process.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Tuesday, September 13, 2011

Microsoft shows off next Windows

Microsoft has taken the wraps off the next generation of its Windows operating system.

Windows 8 is designed to run on tablet computers, as well as desktop and laptop PCs.

The software, which is due to be released in 2012 will work on the popular ARM-designed low power processors for the first time.

Microsoft has been under pressure to come up with an answer to Apple's iOS and Google's Android platforms.

Unveiling Windows 8 at the Build developers' conference in California, Windows division president Steven Sinofsky declared: "We re-imagined Windows. From the chipset to the user experience."

The system will function through one of two interfaces; a traditional desktop, similar to that seen in previous editions of Windows, and a tablet version, known as Metro.

Metro features larger, chunky controls of the sort that best suit touchscreen use. The current lack of such an input method is widely seen as the reason why few Windows 7 tablets exist.

Microsoft said that it would also be launching its own online marketplace - the Windows Store - to sell downloadable applications.

Chip changes

One of the biggest innovations for Windows 8 will be its compatibility with processors designed by ARM holdings.

Chips based around the ARM architecture typically use very little power, and as a result are found in the vast majority of smartphones and tablets currently available.

To date, Windows devices have required Intel or Intel-compatible processors, with the exception of Microsoft's Windows Phone range.

ARM chips are likely to be predominantly used on Windows 8 Metro devices, and will require ARM-specific versions of applications.

The company has not given details on the chips that will be integrated into desktop and laptop machines.

Tapping into any section of the Windows market will be seen as a huge boost for Cambridge-based ARM Holdings.

The company faces growing competition in the mobile device sector since Intel launched its tablet and smartphone-focused Oak Trail chipset in April 2011.

Tapping into that particular market is seen as vital for hardware manufacturers, and software-makers, such as Microsoft, as the market for traditional computers continues to be eroded.

Industry analysts Gartner predicted in April that the global market for tablets would reach 70 million this year, and grow to 300 million in 2015.

Sales of desktops and laptops are expected to continue growing, but at a much slower rate than in the past.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Skynet seeks idle computer power

Idle home computers are being sought to help search through mountains of astronomical data.

The Skynet project involves using the spare processing capacity of computers as a giant, distributed supercomputer.

PC's joining Skynet will scour the data for sources of radiation that reveal stars, galaxies and other cosmic structures.

People who process the most data could win a visit to one of the observatories gathering data for the project.

Star searchers

The Skynet project is being run by the International Centre for Radio Astronomy Research (ICRAR) and it is seeking the help of thousands of PCs to analyse data.

One of the sources of data will be the Square Kilometre Array (SKA) that will use thousands of dish antennas to create the most sensitive sky watching instrument ever made.

A decision about where to build the �1.5bn SKA will be made in February 2012 and it will be sited in either Australia or South Africa.

While it will have its own cadre of supercomputers to analyse data, the SKA is expected to produce so much information that a system to filter this down to the most interesting samples will be needed. Skynet will be part of that large-scale filtering system.

"As we design, develop and switch on the next generation of radio telescopes, the supercomputing resources processing this deluge of data will be in increasingly high demand," said Professor Peter Quinn, director of ICRAR in a statement.

"SkyNet aims to complement the work already being done by creating a citizen science computing resource that radio astronomers can tap into and process data in ways and for purposes that otherwise might not be possible," he added.

Prior to the SKA being built and switched on, the computers joining ICRAR's Skynet will crunch data from current radio astronomy research projects.

Those signing up to help will download a small program that will get a computer looking through data when that PC is not being used for anything else.

ICRAR said the Skynet program was small and should not slow down any PC it is running on. Also, it said, data would be split into small packets to ensure it did not swamp a participant's net connection.

Distributed computing projects that harness idle machines are a well-established way of scouring through research data. One of the earliest looked through radio signals for evidence of extra-terrestrial intelligence.

More recent projects simulate protein folding and help physicists search for the Higgs boson - the missing piece of what is known as the Standard Model, the most widely accepted theory of particle physics.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Legal action on college book plan

Writers from Australia, Britain and Canada are suing five US universities for creating online libraries made up of millions of books scanned by Google.

They argue that the books were digitised without authorisation.

The lawsuit accuses the universities of "engaging in one of the largest copyright infringements in history".

The case could have implications for the long-running court battle between Google and publishers.

Abducted?

The lawsuit centres on the HathiTrust repository, set up by the University of Michigan to allow students and university staff members access to so-called orphan works.

Orphan works are defined as out-of-print books whose writers could not be located.

The other universities named in the lawsuit are the University of California, the University of Wisconsin and the universities of Indiana and Cornell.

Paul Courant, the dean of libraries at Michigan University, told the AP newswire he was surprised by the lawsuit.

"I'm confident that everything we're doing and everything we're contemplating doing is lawful use of these works," he said.

He said that Google had so far digitised about five million books from Michigan's library, with several million more to scan.

But authors are convinced that the project is a massive infringement of copyright.

"This group of American universities has no authority to decide whether, when or how authors forfeit their copyright protection. They aren't orphaned books, they're abducted books," Angelo Loukakis, executive director of the Australian Society of Authors told the AP news service.

His views were echoed by Daniele Simpson, the president of Canadian authors guild the Union Des Ecrivaines et des Ecrivains Quebecois.

"How are authors from Quebec, Italy or Japan to know that their works have been determined to be 'orphans' by a group in Ann Arbor, Michigan? If these colleges make up their own rules, then won't every college and university, in every country, want to do the same?" she asked.

Unfair advantage

Alongside the US Authors Guild and eight individual authors, the groups aim to prevent the first release of 27 works by French, Russian and American authors scheduled for October.

The authors said books from nearly every nation have been digitised, including thousands of works published in 2001 in China, France, Germany, India, Italy, Japan, Spain and the UK.

"This is an upsetting and outrageous attempt to dismiss authors' rights," said Mr Loukakis.

Mr Loukakis and Ms Simpson are among the authors involved in the lawsuit. Others include UK author Fay Weldon, poet Andre Roy and Shakespeare scholar James Shapiro.

The lawsuit comes ahead of the next hearing in the six-year battle between Google, the Authors Guild and the Association of American Publishers.

Lawyers for authors and publishers are due to go back to court in 10 days time to see if a new deal can be done with the search giant.

A $125m (�79m) royalties settlement was rejected by Judge Denny Chin who argued that the deal would give Google an unfair advantage.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Monday, September 12, 2011

Bad spelling opens security hole

A missing dot in an email address might mean messages end up in the hands of cyber thieves, researchers have found.

By creating web domains that contained commonly mistyped names, the investigators received emails that would otherwise not be delivered.

Over six months they grabbed 20GB of data made up of 120,000 wrongly sent messages.

Some of the intercepted correspondence contained user names, passwords, and details of corporate networks.

About 30% of the top 500 companies in the US were vulnerable to this security shortcoming according to researchers Peter Kim and Garret Gee of the Godai Group.

The problem arises because of the way organisations set up their email systems. While most have a single domain for their website, many use sub-domains for individual business units, regional offices or foreign subsidiaries.

Dots or full stops are used to separate the words in that sub domain.

For example a large American financial group may take bank.com as its corporate home but internally use us.bank.com for staff email.

Usually, if an address is typed with one of the dots missing, ie usbank.com, then the message is returned to its sender.

But by setting up similar doppelganger domains, the researchers were able to receive messages that would otherwise be bounced back.

"Start Quote

It's striking that the researchers managed to capture so much information by focusing on just one common mistake"

End Quote Mark Stockley Sophos

"Doppelganger domains have a potent impact via email as attackers could gather information such as trade secrets, user names and passwords, and other employee information," wrote the researchers in a paper detailing their work.

Only one of the companies being impersonated noticed that spoofing was taking place and tracked down the researchers.

Man in the middle

A clever attacker could cover their tracks by passing on the message to its correct recipient and relaying back any reply.

By acting as a middleman the likelihood of more messages being mis-sent using the "reply" function increases.

Follow-up work by the researchers revealed that some cyber criminals may already be exploiting keyboard errors.

A search uncovered many addresses resembling corporate sub-domains which were owned by individuals in China or linked to sites associated with malware or phishing.

Writing on the blog of security firm Sophos, Mark Stockley said: "It's striking that the researchers managed to capture so much information by focusing on just one common mistake.

"A determined attacker with a modest budget could easily afford to buy domains covering a vast range of organisations and typos," he said.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Friday, September 9, 2011

Supercomputer predicts revolution

Feeding a supercomputer with news stories could help predict major world events, according to US research.

A study, based on millions of articles, charted deteriorating national sentiment ahead of the recent revolutions in Libya and Egypt.

While the analysis was carried out retrospectively, scientists say the same processes could be used to anticipate upcoming conflict.

The system also picked up early clues about Osama Bin Laden's location.

Kalev Leetaru, from the University of Illinois' Institute for Computing in the Humanities, Arts and Social Science, presented his findings in the journal First Monday.

Mood and location

The study's information was taken from a range of sources including the US government-run Open Source Centre, and the Summary of World Broadcasts (now known as BBC Monitoring), both of which monitor local media output around the world.

News outlets which published online versions were also analysed, as was the New York Times' archive, going back to 1945.

In total, Mr Leetaru gathered more than 100 million articles.

Reports were analysed for two main types of information: mood - whether the article represented good news or bad news, and location - where events were happening and the location of other participants in the story.

Mood detection, or "automated sentiment mining" searched for words such as "terrible", "horrific" or "nice".

Location, or "geocoding" took mentions of specific places, such as "Cairo" and converted them in to coordinates that could be plotted on a map.

Analysis of story elements was used to create an interconnected web of 100 trillion relationships.

Predicting trouble

Data was fed into an SGI Altix supercomputer, known as Nautilus, based at the University of Tennessee.

The machine's 1024 Intel Nehalem cores have a total processing power of 8.2 teraflops (trillion floating point operations per second).

Based on specific queries, Nautilus generated graphs for different countries which experienced the "Arab Spring".

In each case, the aggregated results of thousands of news stories showed a notable dip in sentiment ahead of time - both inside the country, and as reported from outside.

For Egypt, the tone of media coverage in the month before President Hosni Mubarak's resignation had fallen to a low only seen twice before in the preceding 30 years.

Previous dips coincided with the 1991 US aerial bombardment of Iraqi troops in Kuwait and the 2003 US invasion of Iraq.

Mr Leetaru said that his system appeared to generate better intelligence than the US government was working with at the time.

"Start Quote

If you look at this tonal curve it would tell you the world is darkening so fast and so strongly against him that it doesn't seem possible he could survive."

End Quote Kalev Leetaru University of Illinois

"The mere fact that the US President stood in support of Mubarak suggests very strongly that that even the highest level analysis suggested that Mubarak was going to stay there," he told BBC News.

"That is likely because you have these area experts who have been studying Egypt for 30 years, and in 30 years nothing has happened to Mubarak.

The Egypt graph, said Mr Leetaru, suggested that something unprecedented was happening this time.

"If you look at this tonal curve it would tell you the world is darkening so fast and so strongly against him that it doesn't seem possible he could survive."

Similar drops were seen ahead of the revolution in Libya and the Balkans conflicts of the 1990s.

Saudi Arabia, which has thus far resisted a popular uprising, had experienced fluctuations, but not to the same extent as some other states where leaders were eventually overthrown.

Mapping Bin Laden

In his report, Mr Leetaru suggests that analysis of global media reports about Osama Bin Laden would have yielded important clues about his location.

While many believed the Al Qaeda leader to be hiding in Afghanistan, geographic information extracted from media reports consistently identified him with Northern Pakistan.

Only one report mentioned the town of Abbottabad prior to Bin Laden's capture in April 2011.

However, the geo-analysis narrowed him down to within 200km, said Mr Leetaru.

Real time analysis

The computer event analysis model appears to give forewarning of major events, based on deteriorating sentiment.

However, in the case of this study, its analysis is applied to things that have already happened.

According to Kalev Leetaru, such a system could easily be adapted to work in real time, giving an element of foresight.

"That's the next stage," said Mr Leetaru, who is already working on developing the technology.

"It looks like a stock ticker in many regards and you know what direction it has been heading the last few minutes and you want to know where it is heading in the next few.

"It is very similar to what economic forecasting algorithms do."

Mr Leetaru said he also hoped to improve the resolution of analysis, especially in relation to geographic location.

"The next iteration is going to city level and beyond and looking at individual groups and how they interact.

"I liken it to weather forecasting. It's never perfect, but we do better than random guessing."



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

German court upholds Samsung ban

A German court has upheld a ban on the sale of Samsung's Galaxy Tab, saying it did infringe Apple patents.

It was asked to reconsider a previous ruling that elements of the tablet's design were copied from the iPad.

That decision led to a Europe-wide ban, which was later lifted amid concerns about the court's power to impose such a broad embargo.

The latest hearing went in Apple's favour and means the Galaxy Tab 10.1 is again banned from sale across Germany.

Dusseldorf regional court judge Johanna Brueckner-Hoffmann said that the "minimalist, modern form" of the two products gave a "clear impression of similarity".

In the early stages of the dispute, Apple had won the right for the ban to be imposed continent-wide. However, that was lifted following a challenge by Samsung.

Its re-imposition, albeit only within one country, marks yet another round in the ongoing patent battle between Apple and Samsung.

The two electronics giants currently face each other in courtrooms in Australia, North America and Asia.

Apple has also been successful in winning a sales ban of several Samsung phones across Europe following court action in the Netherlands.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Mozilla calls for security checks

Web certificate authorities have been told to audit their security or risk being dumped from Firefox by the browser's developer Mozilla.

The demand follows a breach at Dutch certificate issuer DigiNotar which lead to scores of bogus authentications being created.

Belgian security firm GlobalSign also stopped issuing new certificates amid fears it too may have been compromised.

Mozilla wants proof that other companies have protected their systems.

Attack pattern

Security certificate issuers have been given until 16 September to demonstrate to Mozilla that their internal networks have not been compromised.

It also wants to know what steps the issuers take when certificates are issued to make sure fakes are not being generated.

The security certificates issued by DigiNotar and many others act as an identity guarantee so people can be sure that the site or service they are connecting to is what it claims to be.

Typically users will notice that a certificate is being used by the appearance of a padlock icon, or the https prefix.

By penetrating DigiNotar's network and issuing fake certificates, hackers could pose as anyone they want and get at confidential messages or steal saleable data.

The attack on DigiNotar seems to have originated in Iran and put at risk about 300,000 people who use Gmail in that country, according to an interim report into the breach.

The hacker who carried out the DigiNotar attack, plus one on another security certificate firm, Comodo, earlier in 2011, bragged that he had access to four other CAs. This led to security checks at GlobalSign, one firm mentioned in the message.

In issuing its demand for audits, Mozilla said it reserved the right to revoke certificates recognised by Firefox.

Kathleen Wilson, head of Mozilla's security certificate group, said that working with Firefox was at its "sole discretion".

"We will take whatever steps are necessary to keep our users safe," wrote Ms Wilson.

If a certificate issuer is boycotted it could mean many users see pop-up warnings when trying to securely buy goods online or send messages.

Mozilla has already issued updates for Firefox to revoke DigiNotar certificates. Microsoft and Google have taken similar action with Chrome. Apple has yet to issue an update for Safari.

Google has also moved to contact those who may have had their email communications spied upon as a result of the DigiNotar hack.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Microsoft services hit by outage

Millions of Microsoft users were left unable to access some online services overnight because of a major service outage.

Hotmail, Office 365 and Skydrive were among the services affected.

Microsoft was still analysing the cause of the problem on Friday morning, but said it appeared to be related to the internet's DNS address system.

Such a major failure is likely to raise questions about the reliability of cloud computing versus local storage.

Especially embarrassing is the temporary loss of Office 365, the company's alternative to Google's suite of online apps.

The service also went offline briefly in mid-August, less than two months after it launched.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Waterstone's to launch e-reader

Waterstone's is to launch a digital e-reader to rival Amazon's Kindle next year.

The company's managing director, James Daunt, told the BBC he had been inspired by Barnes & Noble's successful Nook device.

The US bookseller is one of the few high street retailers to have challenged Amazon's growing dominance in both physical and electronic sales.

Amazon customers now buy more Kindle titles than paper versions.

Waterstone's is currently in the midst of a shake-up after being bought from HMV Group by Russian businessman Alexander Mamut.

James Daunt was brought in by the new owner in an attempt to reverse its declining sales.

Entering the hardware market would be an ambitious move for Waterstone's and likely involve it partnering with a major electronics company.

Barnes & Noble teamed-up with Taiwanese manufacturer Foxconn - best known for making the iPhone - in 2009 to create the Nook.

The American retailer predicted last month that it would sell around $1.8bn (�1.1bn) in Nook e-books by the end of the financial year.

Amazon does not provide a detailed breakdown of e-book sales and has never revealed the number of Kindle devices sold, other than to say it is in the millions.

<!-- Embedding the audio player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- end of the embedded player component --> <!-- Player embedded -->

However, Mr Daunt believes that Barnes and Noble has managed to claw back market share from its online rival by linking the electronic product with its high street stores.

Nook owners are allowed to read for free in Barnes and Noble stores for up to one hour each day.

"We in Waterstone's need to offer you a digital reader which is at least as good, and preferably substantially better, than that of our internet rival, and you will have a much better buying experience purchasing your books through us," Mr Daunt told BBC Radio 4's You and Yours programme.

Waterstone's e-reader project was "well down the planning line", according to Mr Daunt, and would launch in Spring 2012.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials