Copy Link
Add to Bookmark
Report
Atari Online News, Etc. Volume 13 Issue 17
Volume 13, Issue 17 Atari Online News, Etc. April 29, 2010
Published and Copyright (c) 1999 - 2011
All Rights Reserved
Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor
Atari Online News, Etc. Staff
Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"
With Contributions by:
Fred Horvat
To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.
To download A-ONE, set your browser bookmarks to one of the
following sites:
http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org
Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/
=~=~=~=
A-ONE #1317 04/29/10
~ Web Security Questions ~ People Are Talking! ~ Net Survives Royals!
~ MS: Go and Sin No More ~ PlayStation Net Outage ~ PSN Outage Update!
~ Wii Successor in 2012! ~ Sony Shows S1 Tablets! ~ FBA Probes Troubles!
~ Computer Mouse Hits 30 ~ Twitter Blast Hits Sox ~ New Firefox 4 Add-Ons!
-* Amazon Apologizes for Outage *-
-* ICANN Names Hacker As Security Chief *-
-* NY Case Underscores Wi-Fi Privacy Dangers! *-
=~=~=~=
->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""
Well, nothing that I could say tonight could come close to being as
entertaining as what occurred earlier today, the Royal Wedding of
Prince William and Kate Middleton. Now, I'm not usually a person who
pays a whole lot of attention to the British monarchy, but I do have to
admit that they do pique my interest from time to time.
Whether we like it or not, most of us have grown up with the British
royalty, especially Charles and Diana some 30 years ago. It's hard to
ignore the growing up of their sons, up to this joyous event.
So, while the partying continues into the wee hours of the night and next
morning in England, we still have to take care of business here!
Until next time...
=~=~=~=
->In This Week's Gaming Section - Wii Successor Coming in 2012!
""""""""""""""""""""""""""""" PlayStation Network Outage!
PS Network Update!
=~=~=~=
->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""
Nintendo Says Successor to Wii Coming in 2012
The successor to Nintendo's hit Wii console will arrive next year.
In disclosing its plans Monday, Nintendo Co. didn't say what the new
system will do. The Japanese company plans to show a playable model of
the new console at the Electronic Entertainment Expo, which runs June
7-9 in Los Angeles.
Nintendo has dominated sales of video game consoles and sold 86 million
Wiis since launching it in 2006. The Wii caused a splash with its
innovative motion-sensing controller. Sports-style games such as
baseball and boxing let players move their arms to simulate the pitching
of a ball or the throwing of a punch. Nintendo also makes a step-board
accessory, the Wii Fit, that allows players to try dance steps or yoga.
The Wii setup has been copied and elaborated on by the other major
console makers since then.
But the Wii is showing its age. Even when it launched, it was behind the
other consoles of the era, Sony Corp.'s PlayStation 3 and Microsoft
Corp.'s Xbox 360, in not offering a high-definition image.
The modest hardware of the Wii has also meant that while Sony and
Microsoft have been able to update their consoles with new capabilities,
the Wii has seen only relatively minor updates, such as addition of the
optional Wii Fit and the ability to play Netflix movies.
Microsoft launched its Kinect game-control system last fall. Using a 3-D
camera, depth sensors and voice-recognition software, it recognizes your
face, voice and gestures as you move around and talk, without requiring
you to hold a controller or wear a headset. Sony, meanwhile, began
selling a Move controller that is essentially a higher-tech version of
the Wii remote.
Nintendo announced plans for the Wii successor as part of its financial
results Monday. Nintendo said its annual earnings dropped for the second
straight year as sales declined. It's expecting sales to increase again
in the fiscal year that just started, thanks to its new handheld 3DS
device, which launched last month.
PlayStation Network Outage Blamed on 'External Intrusion'
Sony's PlayStation Network and its Qriocity music service were still
down Monday afternoon, with no word on when they will be back online. On
Friday, the company reported that the downtime was caused by "an
external intrusion" to both services.
Patrick Seybold, senior director of corporate communications and social
media, posted on the company's PlayStation Blog on Friday that, "in
order to conduct a thorough investigation and to verify the smooth and
secure operation of our network services going forward," both
PlayStation Network and Qriocity were turned last Wednesday. Sony has
noted that it doesn't know the degree to which personal data might have
been compromised.
On Monday, Seybold posted that he knows users are "waiting for
additional information on when PlayStation Network and Qriocity services
will be online." He added that, "unfortunately, I don't have an update
or time frame."
With several major new game titles coming out this week, the timing of
the outage is particularly suspicious. Many observers have speculated
that the "external intrusion" was caused by the Anonymous hacker group.
But Anonymous denies involvement, while simultaneously posting updates
to its Facebook page that suggest it could have been involved. On its
AnonNews web site, where anyone can post, there is a notice dated Friday
titled For Once We Didn't Do It. The posting noted that, while some
individual Anons could "have acted by themselves," AnonOps was not
involved and "does not take responsibility for whatever has happened."
The posting added that the "more likely explanation is that Sony is
taking advantage of Anonymous' previous ill will toward the company to
distract users from the fact that the outage is actually an internal
problem with the company's servers."
However, on Anonymous' Facebook page, the page owner posted in a
discussion of the outage last week that "we have no qualms about our
actions."
In early April, several Sony sites were brought down by members of
Anonymous, the hacker group known for its politically oriented online
attacks. The sites included Sony.com, Style.com and the U.S. site for
PlayStation.
Before the attacks on the Sony sites, Anonymous had announced it would
target the company because of Sony's lawsuit against a user named George
Hotz. Sony had filed and received a restraining order against Hotz and
other hackers for allegedly jailbreaking the PlayStation 3 game console
in order to run unauthorized software such as pirated games, and for
providing software tools for others to do the same.
Sony had also sought and received access to Hotz' social-media accounts,
and the IP addresses of visitors to his web site. The company also
obtained access to his PayPal account to see donations in support of his
jailbreaking efforts.
In an open letter to Sony, Anonymous said Sony "abused the judicial
system in an attempt to censor information on how your products work."
It added that the company "victimized your own customers merely for
possessing and sharing information," and said these actions meant Sony
had "violated the privacy of thousands."
Sony and Hotz reached a settlement several weeks ago. The terms of the
agreement were not made public, although Hotz agreed to a permanent
injunction.
Update on PlayStation Network and Qriocity
Thank you for your patience while we work to resolve the current outage of
PlayStation Network & Qriocity services. We are currently working to send
a similar message to the one below via email to all of our registered
account holders regarding a compromise of personal information as a result
of an illegal intrusion on our systems. These malicious actions have also
had an impact on your ability to enjoy the services provided by
PlayStation Network and Qriocity including online gaming and online access
to music, movies, sports and TV shows. We have a clear path to have
PlayStation Network and Qriocity systems back online, and expect to
restore some services within a week.
Were working day and night to ensure it is done as quickly as possible. We
appreciate your patience and feedback.
Sony Customer Notification US States (excluding Puerto Rico and Massachusetts)
Valued PlayStation Network/Qriocity Customer:
We have discovered that between April 17 and April 19, 2011, certain
PlayStation Network and Qriocity service user account information was
compromised in connection with an illegal and unauthorized intrusion into
our network. In response to this intrusion, we have:
Temporarily turned off PlayStation Network and Qriocity services;
Engaged an outside, recognized security firm to conduct a full and
complete investigation into what happened; and
Quickly taken steps to enhance security and strengthen our network
infrastructure by re-building our system to provide you with greater
protection of your personal information.
We greatly appreciate your patience, understanding and goodwill as we do
whatever it takes to resolve these issues as quickly and efficiently as
practicable.
Although we are still investigating the details of this incident, we
believe that an unauthorized person has obtained the following information
that you provided: name, address (city, state, zip), country, email
address, birthdate, PlayStation Network/Qriocity password and login, and
handle/PSN online ID. It is also possible that your profile data, including
purchase history and billing address (city, state, zip), and your
PlayStation Network/Qriocity password security answers may have been
obtained. If you have authorized a sub-account for your dependent, the
same data with respect to your dependent may have been obtained. While
there is no evidence at this time that credit card data was taken, we
cannot rule out the possibility. If you have provided your credit card
data through PlayStation Network or Qriocity, out of an abundance of
caution we are advising you that your credit card number (excluding
security code) and expiration date may have been obtained.
For your security, we encourage you to be especially aware of email,
telephone, and postal mail scams that ask for personal or sensitive
information. Sony will not contact you in any way, including by email,
asking for your credit card number, social security number or other
personally identifiable information. If you are asked for this information,
you can be confident Sony is not the entity asking. When the PlayStation
Network and Qriocity services are fully restored, we strongly recommend
that you log on and change your password. Additionally, if you use your
PlayStation Network or Qriocity user name or password for other unrelated
services or accounts, we strongly recommend that you change them, as
well. To protect against possible identity theft or other financial loss,
we encourage you to remain vigilant, to review your account statements
and to monitor your credit reports. We are providing the following
information for those who wish to consider it:
U.S. residents are entitled under U.S. law to one free credit report
annually from each of the three major credit bureaus. To order your free
credit report, visit www.annualcreditreport.com or call toll-free
(877) 322-8228.
We have also provided names and contact information for the three major
U.S. credit bureaus below. At no charge, U.S. residents can have these
credit bureaus place a "fraud alert" on your file that alerts creditors to
take additional steps to verify your identity prior to granting credit in
your name. This service can make it more difficult for someone to get
credit in your name. Note, however, that because it tells creditors to
follow certain procedures to protect you, it also may delay your ability
to obtain credit while the agency verifies your identity. As soon as one
credit bureau confirms your fraud alert, the others are notified to place
fraud alerts on your file. Should you wish to place a fraud alert, or
should you have any questions regarding your credit report, please contact
any one of the agencies listed below.
Experian: 888-397-3742; www.experian.com; P.O. Box 9532, Allen, TX 75013
Equifax: 800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA
30374-0241 TransUnion: 800-680-7289; www.transunion.com; Fraud Victim
Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
You may wish to visit the web site of the U.S. Federal Trade Commission
at www.consumer.gov/idtheft or reach the FTC at 1-877-382-4357 or
600 Pennsylvania Avenue, NW, Washington, DC 20580 for further information
about how to protect yourself from identity theft. Your state Attorney
General may also have advice on preventing identity theft, and you should
report instances of known or suspected identity theft to law enforcement,
your State Attorney General, and the FTC. For North Carolina residents, the
Attorney General can be contacted at 9001 Mail Service Center, Raleigh,
NC 27699-9001; telephone (877) 566-7226; or www.ncdoj.gov. For Maryland
residents, the Attorney General can be contacted at 200 St. Paul Place,
16th Floor, Baltimore, MD 21202; telephone: (888) 743-0023; or
www.oag.state.md.us.
We thank you for your patience as we complete our investigation of this
incident, and we regret any inconvenience. Our teams are working around the
clock on this, and services will be restored as soon as possible. Sony
takes information protection very seriously and will continue to work to
ensure that additional measures are taken to protect personally
identifiable information. Providing quality and secure entertainment
services to our customers is our utmost priority. Please contact us at
1-800-345-7669 should you have any additional questions.
Sincerely,
Sony Computer Entertainment and Sony Network Entertainment
=~=~=~=
A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson
Internet Survives Royal Wedding, Scammers Still Lurking
The royal wedding went off without a hitch Friday morning, and the Internet
appeared to survive the event as well. Web traffic was high during the
nuptials, but YouTube was able to stream the event live to millions around
the world without choking (much). Twitter's fail whale managed to stay off
the royal guest list, but online scammers are just getting started with
their royal wedding scams and shenanigans. Here's a breakdown of the
online highs and lows during Prince William's marriage to Catherine
Middleton on Friday.
Global Web usage was big during the royal wedding, but it appears most
of the United States decided to stay in bed during the event, or watch
in on TV.
The highest Web usage at the time was in the United Kingdom and Western
Europe, while United States Web traffic remained normal. That may be the
reason why the highly-anticipated event at London's Westminster Abbey
didn't appear to be having the same impact online that other major
events have had, such as June 24, 2010, the day World Cup qualifying
matches and the longest ever Wimbledon match happened at the same time.
News consumption was also high during the ceremony, with a peak of more
than 4.5 million page views per minute according to data from Akamai's
Net Usage Index. Royal wedding news consumption Friday was higher than
when the news of Michael Jackson's death broke in 2009. Akamai reported
a high of 4.2 million page views per minute when the King of Pop passed.
Twitter was joking when the company snapped this photo of co-founder Biz
Stone dedicating a company server to royal wedding traffic. But Twitter
must have done something right, because the company's infamous fail
whale was a no-show during the wedding.
And Twitter users were definitely obsessed with the British Monarchy
early Friday. Every Twitter trending topic in the USA was
wedding-related, as were the network's worldwide topics.
One big discussion was about the similarities between Catherine
Middleton's wedding dress and the dress worn by Grace Kelly when the
actress married the Prince of Monaco in 1956.
Security firm Sophos uncovered an interesting royal wedding-themed game
on social networks that could lead you to revealing important
information about yourself. The game asked you to put your "royal
wedding guest name" into your status update. You did this by taking the
first name of one of your grandparents and then creating a hyphenated
last name by merging the name of your first pet with the name of the
street you grew up on.
See the problem? Those are all typical answers to security questions
used to verify your identity online for Webmail accounts and other
services. "The few seconds worth of amusement you may get by telling
people your royal wedding guest name are not worth the potential pain of
having your identity stolen," Sophos warns.
Now that the nuptials are over, people all over the world will be
searching for royal wedding information, including images of Catherine
Middleton's dress.
But F-Secure is warning would-be dress hunters to tread carefully online
today. Since the dress is likely to be a hot topic of online discussion
and Web searches, it's a prime target for black hat search engine
optimization pirates trying to lure unsuspecting royal watchers into their
traps.
F-Secure already uncovered a scareware attack site when doing a Google
Image search for the query "royal wedding coverage." Scareware sites
attempt to rip you off by convincing you to buy and install a rogue
antivirus program on your computer. Google and Bing do a pretty good job
of protecting you from malware, but the best way to keep yourself safe is
to only visit sites you trust when looking for royal wedding information.
Google also got into the royal wedding festivities with a Google Doodle
on Google UK depicting wedding-themed sites in London.
Recent Incidents Call Web Security Into Question
Its been a busy few weeks in the world of Web security. We saw the
computer virus turn 40, a sophisticated cyberattack on a security firm and
a major data breach on an email marketer that put millions of customers at
risk.
These events have caused considerable chatter among security analysts.
Some have pondered whether the security firms we all count on to guard
the Internets infrastructure are capable of protecting themselves. And,
if not, what does that mean for everyones personal security?
The data breach at e-mail marketer Epsilon last month reportedly put
millions of users at risk and was possibly the largest breach ever.
Customers of big companies such as Citibank, JPMorgan Chase, Target and
Walgreens were affected, and now may be at increased risk of e-mail
swindles. An increased number of e-mail spam and phishing attacks are
expected on victims of the Epsilon breach, according to PC World.
Last months sophisticated cyberattack on RSA's SecurID product for
two-factor authentication has been referred to as an Advanced Persistent
Threat attack. The phrase is often used to describe stealthy and long-term
breaches by a foreign country or rival organization designed to obtain
valued corporate information such as customer data and intellectual
property.
Anup Ghosh, founder and chief scientist of browser security firm Invincea,
told PC World that recent events point to a need by security firms to
re-evaluate their approach to protecting themselves and their valuable
intellectual property.
"We have to worry whether we are going to be targeted next - we, as in the
royal we," Ghosh says. "And all we're really doing is doubling down on the
technologies that (were) built in the late '90s and address yesterday's
problems rather than the way that these attacks are actually perpetrated."
Much has changed since that decade, when only 1,300 viruses were infecting
PCs. And its a completely different technological universe from when the
first virus popped up on computer screens in 1971. More than 200 million
viruses exist today. Email spam and phishing attacks are on the rise.
Theres no sign of cybercrime slowing down. At the same time, arming oneself
with information, exercising caution and skepticism and taking advantage of
PC security products can go a long way in ensuring ones safety on the
Internet.
Several analysts expressed concern about the recent security breaches
impact on the general public, particularly novice Internet users. Some
worried novice users affected by the Epsilon incident might not go through
the trouble of examining the header of each potentially suspicious e-mail.
And several sources admitted that details were scarce and specific threats
or subsequent precautions couldnt be determined.
In the absence of such information, experts instead reiterated several
recommendations for optimizing safety on the Internet. If possible, experts
recommend avoiding clicking on links or opening attachments placed in
unsolicited emails. The link can take you to a nefarious website, which can
infect your computer and the attachment may download software that will
track your computer keystrokes, including the passwords you type.
Otherwise, they offer the following tips:
Open a new browser and visit the website that supposedly sent the email;
check to see if it's promoting the same offer that has been sent to you
unsolicited.
Mouse over the link contained in the email and look at the lower left corner
of the screen to see if the domain name matches the company that is
purportedly sending the email.
If you must click on the link, once it's open it should still show the same
domain name. If it doesn't - and it asks you for financial information like
a bank account number or social security number, do not provide the
information. If the opened link now has a different domain name, although
it's not requesting financial information, the identity thief may have
opted to infect your computer with a virus.
Experts also say keeping security software updated is crucial in arming
yourself against cybercrime. Several additional products can also offer a
layered approach to Web security. For example, ID Vault complements
existing security software by protecting your online transactions. ID Vault
prevents users from inadvertently signing in to fraudulent sites or being
victimized by phishing, pharming, keystroke logging or other cybercrimes.
It helps secure online transactions, locking out hackers and identity
thieves, while stopping you from accidentally giving away your personal
information.
In addition, LifeLock can add another layer of protection should your
information be compromised and misused as the result of a security breach.
LifeLock identity theft protection is a proactive defense system that
monitors your identity and alerts you whenever it detects your personal
information being used. If an application is fraudulent, the remediation
team will work to help protect your name.
Finally, experts suggest best Web security practices call for a focus on
security for social media applications and the use of those applications
and Web sites, strong passwords and PINs and avoiding e-mail or phone-based
requests for personal information.
FBI Probes of Some Cyber Attacks Face Troubles
FBI agents have had trouble investigating cyber attacks involving national
security because they lack the needed technical expertise or are often
transferred or diverted to other cases, according to a government report
released on Wednesday.
Sensitive government computer networks are under regular attack from
hackers seeking to steal classified material or to cripple critical
operations. About 19 percent of the FBI's cyber agents focus on national
security cases.
Some cyber agents complained they did not have the proper experience to
investigate such cases, were assigned to other matters or were rotated
between offices too often, according to a report by the Justice
Department's inspector general.
"Because national security intrusion cases are highly technical and
require a specific set of skills, new cyber agents are often not
equipped to assume responsibility of a national security intrusion
investigation," the report said.
Further, field agents do not have enough tactical analytical support for
those cases, "hampering their ability to connect the dots in an
investigation and to determine those responsible for intrusions," it said.
The FBI in 2007 issued a plan for agents to become experts for cyber
security investigations with 12 core courses and expected them to
complete it along with on-the-job training in five to seven years. The
number of agents who have completed the coursework was not made public
in the report.
The inspector general's office tested 36 cyber agents it interviewed to
see if they had the technical skills for national security cases and
found that 64 percent did.
Five of the 36 field agents interviewed said that they did not think
they were able to effectively investigate national security intrusions
and were not qualified to do so, according to the inspector general's
report.
The FBI told the inspector general that it was looking into the concerns
about transfers and that the cyber division has also begun realigning
its career path program to ensure "field offices had qualified agents to
investigate national security intrusion matters," the report said.
The inspector general also recommended that the FBI create regional hubs
with cyber agents who can deal with the national security cases, an idea
the agency said it was considering.
NY Case Underscores Wi-Fi Privacy Dangers
Lying on his family room floor with assault weapons trained on him, shouts
of "pedophile!" and "pornographer!" stinging like his fresh cuts and
bruises, the Buffalo homeowner didn't need long to figure out the reason
for the early morning wake-up call from a swarm of federal agents.
That new wireless router. He'd gotten fed up trying to set a password.
Someone must have used his Internet connection, he thought.
"We know who you are! You downloaded thousands of images at 11:30 last
night," the man's lawyer, Barry Covert, recounted the agents saying.
They referred to a screen name, "Doldrum."
"No, I didn't," he insisted. "Somebody else could have but I didn't do
anything like that."
"You're a creep ... just admit it," they said.
Law enforcement officials say the case is a cautionary tale. Their
advice: Password-protect your wireless router.
Plenty of others would agree. The Sarasota, Fla. man, for example, who
got a similar visit from the FBI last year after someone on a boat
docked in a marina outside his building used a potato chip can as an
antenna to boost his wireless signal and download an astounding 10
million images of child porn, or the North Syracuse, N.Y., man who in
December 2009 opened his door to police who'd been following an
electronic trail of illegal videos and images. The man's neighbor
pleaded guilty April 12.
For two hours that March morning in Buffalo, agents tapped away at the
homeowner's desktop computer, eventually taking it with them, along with
his and his wife's iPads and iPhones.
Within three days, investigators determined the homeowner had been
telling the truth: If someone was downloading child pornography through
his wireless signal, it wasn't him. About a week later, agents arrested
a 25-year-old neighbor and charged him with distribution of child
pornography. The case is pending in federal court.
It's unknown how often unsecured routers have brought legal trouble for
subscribers. Besides the criminal investigations, the Internet is full
of anecdotal accounts of people who've had to fight accusations of
illegally downloading music or movies.
Whether you're guilty or not, "you look like the suspect," said Orin
Kerr, a professor at George Washington University Law School, who said
that's just one of many reasons to secure home routers.
Experts say the more savvy hackers can go beyond just connecting to the
Internet on the host's dime and monitor Internet activity and steal
passwords or other sensitive information.
A study released in February provides a sense of how often computer
users rely on the generosity - or technological shortcomings - of their
neighbors to gain Internet access.
The poll conducted for the Wi-Fi Alliance, the industry group that
promotes wireless technology standards, found that among 1,054 Americans
age 18 and older, 32 percent acknowledged trying to access a Wi-Fi
network that wasn't theirs. An estimated 201 million households
worldwide use Wi-Fi networks, according to the alliance.
The same study, conducted by Wakefield Research, found that 40 percent
said they would be more likely to trust someone with their house key
than with their Wi-Fi network password.
For some, though, leaving their wireless router open to outside use is a
philosophical decision, a way of returning the favor for the times
they've hopped on to someone else's network to check e-mail or download
directions while away from home .
"I think it's convenient and polite to have an open Wi-Fi network," said
Rebecca Jeschke, whose home signal is accessible to anyone within range.
"Public Wi-Fi is for the common good and I'm happy to participate in
that - and lots of people are," said Jeschke, a spokeswoman for the
Electronic Frontier Foundation, a San Francisco-based nonprofit that
takes on cyberspace civil liberties issues.
Experts say wireless routers come with encryption software, but setting
it up means a trip to the manual.
The government's Computer Emergency Readiness Team recommends home users
make their networks invisible to others by disabling the identifier
broadcasting function that allows wireless access points to announce
their presence. It also advises users to replace any default network
names or passwords, since those are widely known, and to keep an eye on
the manufacturer's website for security patches or updates.
People who keep an open wireless router won't necessarily know when
someone else is piggybacking on the signal, which usually reaches
300-400 feet, though a slower connection may be a clue.
For the Buffalo homeowner, who didn't want to be identified, the tip-off
wasn't nearly as subtle.
It was 6:20 a.m. March 7 when he and his wife were awakened by the sound
of someone breaking down their rear door. He threw a robe on and walked
to the top of the stairs, looking down to see seven armed people with
jackets bearing the initials I-C-E, which he didn't immediately know
stood for Immigration and Customs Enforcement.
"They are screaming at him, 'Get down! Get down on the ground!' He's
saying, 'Who are you? Who are you?'" Covert said.
"One of the agents runs up and basically throws him down the stairs, and
he's got the cuts and bruises to show for it," said Covert, who said the
homeowner plans no lawsuit. When he was allowed to get up, agents
escorted him and watched as he used the bathroom and dressed.
The homeowner later got an apology from U.S. Attorney William Hochul and
Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.
But this wasn't a case of officers rushing into the wrong house. Court
filings show exactly what led them there and why.
On Feb. 11, an investigator with the Department of Homeland Security,
which oversees cybersecurity enforcement, signed in to a peer-to-peer
file sharing program from his office. After connecting with someone by
the name of "Doldrum," the agent browsed through his shared files for
videos and images and found images and videos depicting children engaged
in sexual acts.
The agent identified the IP address, or unique identification number, of
the router, then got the service provider to identify the subscriber.
Investigators could have taken an extra step before going inside the
house and used a laptop or other device outside the home to see whether
there was an unsecured signal. That alone wouldn't have exonerated the
homeowner, but it would have raised the possibility that someone else
was responsible for the downloads.
After a search of his devices proved the homeowner's innocence,
investigators went back to the peer-to-peer software and looked at logs
that showed what other IP addresses Doldrum had connected from. Two were
associated with the State University of New York at Buffalo and accessed
using a secure token that UB said was assigned to a student living in an
apartment adjacent to the homeowner. Agents arrested John Luchetti March
17. He has pleaded not guilty to distribution of child pornography.
Luchetti is not charged with using his neighbor's Wi-Fi without
permission. Whether it was illegal is up for debate.
"The question," said Kerr, "is whether it's unauthorized access and so
you have to say, 'Is an open wireless point implicitly authorizing users
or not?'
"We don't know," Kerr said. "The law prohibits unauthorized access and
it's just not clear what's authorized with an open unsecured wireless."
In Germany, the country's top criminal court ruled last year that
Internet users must secure their wireless connections to prevent others
from illegally downloading data. The court said Internet users could be
fined up to $126 if a third party takes advantage of their unprotected
line, though it stopped short of holding the users responsible for
illegal content downloaded by the third party.
The ruling came after a musician sued an Internet user whose wireless
connection was used to download a song, which was then offered on an
online file sharing network. The user was on vacation when the song was
downloaded.
ICANN Names Computer Hacker as Security Chief
Jeff Moss, a prominent computer hacker who founded the annual Black Hat and
DefCon security conferences in Las Vegas, has been hired as the chief
security officer for the organization that coordinates names of the world's
Web sites.
The organization, the Internet Corporation for Assigned Names and
Numbers, or ICANN, plays a vital role in making sure that when you type
a site name into a Web browser, your computer knows where to go to find
the site you're trying to reach. ICANN manages the domain name system
that underlies that chain of communication.
"I can think of no one with a greater understanding of the security
threats facing Internet users and how best to defend against them than
Jeff Moss," Rod Beckstrom, ICANN's CEO and formerly the director of the
U.S. National Cybersecurity Center, said in a statement. "He has the
in-depth insider's knowledge that can only come from fighting in the
trenches of the ongoing war against cyber threats."
Moss, who also serves on the U.S. Department of Homeland Security's
advisory council, takes on the new post Friday at ICANN's offices in
Washington, D.C.
Amazon Apologizes for EC2 Cloud Outage
Now that the dust has settled on the Amazon EC2 cloud outage, the
company is offering an apology and a credit for its role in making many
popular web sites, like FourSquare, Twitter, and Netflix, unavailable.
Amazon Elastic Book Store customers in regions affected at the time of
the disruption, regardless of whether their resources and application
were impacted or not, are getting an automatic 10-day credit equal to
100 percent of their usage.
"We know how critical our services are to our customers' businesses and
we will do everything we can to learn from this event and use it to
drive improvement across our services," Amazon said in a statement. "As
with any significant operational issue, we will spend many hours over
the coming days and weeks improving our understanding of the details of
the various parts of this event and determining how to make changes to
improve our services and processes."
Most anyone familiar with data center operations could sympathize with
Amazon - outages, even severe outages, happen, and companies are
usually judged according to how quickly they respond to the problem and
whether they are able to prevent similar events from occurring again,
said Charles King, principal analyst at Pund IT.
However, he added, while Amazon's cloud services are generally well
regarded, patience among affected companies and their clients wore thin
as the days stretched on. That was hardly surprising, he said, but it
created the opportunity to consider exactly how organizations have been
leveraging the EC2 cloud, and how well they've been doing it.
"Some, including Netflix and SmugMug, were hardly affected at all,
largely because they had designed their environments for high
availability - in line with Amazon's guidelines - using EC2 as merely
one of several IT resources," King said. "On the other hand, those that
had depended largely or entirely on Amazon for their online presence
came away badly burned."
King sees two key, albeit it not exactly new, lessons in the Amazon
cloud outage. First, systems that rely on single points of failure will
fail at some point. Second, companies whose services depend largely or
entirely on third parties can do little but complain, apologize, pray
and twiddle their thumbs when things go south.
As King sees it, the fact that disaster is inevitable is why good
communications skills are so crucial for any company to develop, and why
Amazon's anemic public response to the outage made a bad situation far
worse than it needed to be. While the company has been among the
industry's most vocal cloud services cheerleaders, King said, it seemed
essentially tone deaf to the damage its inaction was doing to public
perception of cloud computing.
"At the end of the day, we expect Amazon will use the lessons learned
from the EC2 outage to significantly improve its service offerings,"
King said. "But if it fails to closely evaluate communications efforts
around the event, the company's and its customers' suffering will be
wasted."
Go and Sin No More: DOJ Oversight of Microsoft Ending
Microsoft won't be under a microscope any more come May - at least not
from the Department of Justice. The software giant has been dealing with
regulators for 13 years, after the DOJ filed an antitrust lawsuit.
The DOJ accused Microsoft of using its market heft to roll over
competitors. Words like monopoly were used. But judges in the case seem
ready to allow that oversight to end, and the DOJ will stop scrutinizing
Microsoft's moves as of May 12.
"And so May 12 will close an important chapter in the history of
antitrust law," said Judge Colleen Kollar-Kotelly during the last
oversight hearing on Wednesday at the U.S. District Court for the
District of Columbia, according to Reuters.
The DOJ and attorneys general for 19 states plus the District of
Columbia filed suit against Microsoft in 1998 claiming violations of
antitrust laws.
After discussions ordered by the federal court, Microsoft reached a
settlement - often referred to as the consent decree - with the DOJ in
2001. Nine states joined in that agreement while seven others continued
to pursue their claims separately before accepting the District Court's
final judgment in 2002. One state appealed the ruling, but it was upheld
in 2004 by the U.S. Court of Appeals.
Following the antitrust action, Microsoft faced a number of class-action
lawsuits. But unlike the government case, which alleged that Microsoft
used its market position to harm competition by incorporating new
features into the Windows operating systems at no additional cost, the
private class-action suits claimed Microsoft overcharged consumers.
It was a nightmare for Microsoft that few in the technology industry
will soon forget. But now that it appears to be over, or at least almost
over, the market may see a bolder Microsoft. Indeed, the expiration of
DOJ oversight will allow the software giant more freedom to compete,
according to Rob Enderle, principal analyst at the Enderle Group.
"Any type of consent decree like the one that was over IBM and the one
that is over Microsoft limits significantly a company's ability to
move," Enderle said. "They have to always be worried that something they
are doing or considering or strategizing is going to cross the line or
get them in trouble by the folks providing the oversight. The fear of
that can tie a company up badly."
As Enderle sees it, Microsoft could not enter into certain discussions
or follow certain paths for fear it might offend the DOJ. Just the fear
that the DOJ is looking over your shoulder makes it easy to consider
almost any move controversial, he said.
"If a manager doesn't like an idea because it wasn't their idea, they
can raise this specter of regulatory oversight and be very effective at
killing it," Enderle said. "That just ties the company up. It changes
the company from a firm that's run by product managers to a firm that's
run by attorneys. Not only is that not a great place to work, it also
makes a firm overly rigid. It doesn't allow it to bring its A game."
Sony Shows Tablets To Compete with Apple Offerings
Sony is planning a tablet computer with a touch panel similar to
Apple's iPad for later this year that the Japanese manufacturer promises
will make the best of its gadgetry and entertainment strengths.
The product code-named S1, shown Tuesday in Tokyo, comes with a 9.4 inch
display for enjoying online content, such as movies, music, video games
and electronics books, and for online connections, including email and
social networking.
Sony, which boasts electronics as well as entertainment divisions, also
showed S2, a smaller mobile device with two 5.5 inch displays that can
be folded like a book.
It did not give prices. Sony Corp. Senior Vice President Kunimasa Suzuki
said the products will go on sale worldwide from about September. Both
run Google's Android 3.0 operating system.
The announcement of Sony's key net-linking offerings comes as it tries
to fix the outage of its PlayStation Network, which offers games and
music online.
It is unclear when that can start running again. Sony has blamed the
problem on an "external intrusion" and has acknowledged it would have to
rebuild its system to add security measures and strengthen its
infrastructure.
Suzuki said both of the latest tablets feature Sony's "saku saku," or
nifty, technology that allows for smooth and quick access to online
content and for getting browsers working almost instantly after a touch.
"We offer what is uniquely Sony," Suzuki said after demonstrating how
the S1 was designed with a tapered width for carrying around "like a
magazine."
The devices will connect to Sony's cloud-computing based library of
content such as movies and music, as well as to Sony PlayStation video
games adapted for running on Android and digital books from Sony's
Reader store, the company said.
Sony, which makes the Vaio personal computer and PlayStation 3 video
game console, has lost some of its past glory - once symbolized in its
Walkman portable music player that pioneered personal music on-the-go in
the 1980s, catapulting the Japanese company into a household name around
the world.
It has been struggling against flashier and more efficient rivals
including Apple Inc. of the U.S. with its iPhone, iPod and iPad
machines, as well as South Korea's Samsung Electronics Co., from which
Sony purchases liquid-crystal displays, a key component in flat-panel
TVs.
Sony has already promised a successor to its PlayStation Portable
machine for late this year, code-named NGP for "next generation
portable," promising the quality of a home console in an on-the-go
machine boasting a screen double the size of smart phones.
The popularity of smart phones including the iPhone has been another
threat to Sony.
Kazuo Hirai, promoted in March to head Sony's sprawling consumer
products and services division, said Sony's strategy has always been
about combining the benefits of hardware, software and networking to
make consumers happy, and that was the same goal for S1 and S2.
"There is no change to that approach," he said.
10 Must-Have Free Firefox 4 Add-Ons
The recently released Firefox 4 is a big improvement over previous versions
of the popular Web browser, but you can still teach it plenty of tricks.
We've rounded up ten great downloads to help you get more out of Firefox
4. Not all older add-ons work with Firefox 4, but every one in this roundup
does. Whether you want to enhance search, better manage the information you
find online, keep yourself safe, or perform other Web tasks, we have what
you need. And all of these picks are free.
*Power Up Search*
A good part of your browsing day consists of a single task: searching
the Web. These three add-ons can help make searching in Firefox better,
easier, and more productive.
Apture Highlights. With this add-on, you can highlight a word or phrase and
then click a 'Learn More' bubble to get information from Wikipedia, links
to YouTube, search results on Google and Bing, and photos related to the
words. If you've highlighted a location, you can see a map in Google Maps.
InstantFox solves the problem, allowing you to use Firefox's address bar to
perform searches. For example, to search Google for Android, type
*g Android* into the address bar. You can add other letters before a search
term to search other sites, such as *a* for Amazon, *yh* for Yahoo, and *y*
for YouTube.
KwiClick lets you highlight a word or phrase to obtain more information.
In this case highlighting produces a cloverleaf icon with four leaves - one
for each search and information provider, set by default as Google,
Wikipedia, YouTube, and Google Maps. Click any icon, and you'll see
information from that site in another window. You can customize the icon
with many other providers, as well.
Because Apture Highlights and KwiClick work the same way, they conflict
with each other when both are installed. If you'd like to keep both,
however, you can use a workaround. Apture Highlights takes precedence
over KwiClick; when you highlight a word or phrase and hover your mouse
over it, the Apture Highlights 'Learn More' bubble appears, while the
KwiClick cloverleaf remains hidden and inaccessible in the background.
But if you highlight a word or phrase and then right-click, you'll see a
KwiClick option on the menu. Choose that item to bring up the KwiClick
window.
*Manage Online Information*
Suffering from information overload? Who isn't? The following two
Firefox add-ons make gathering information--and keeping it organized
once you've found it - easier.
Feedly, you can create your own personalized online newspaper by gathering
stories and blog posts from news sources across the Web. It constantly
self-updates, so whenever you check it, the latest news is always
available. Feedly uses RSS technology and starts off with a prebuilt set
of feeds, but you can easily customize them. It also integrates with
Google Reader, so if you've already built up feeds there, it'll grab
those for you as well.
Read It Later is for you. When you're on a page that you want to save,
click the small icon to the right of the Firefox address bar. You can then
go back and read the item whenever you want, via the Firefox add-on, from
the Web itself, or on another computer or mobile device with a Read It
Later add-on.
To read saved articles and pages, you click a Read It Later icon that's
separate from the one you use to save the pages. There's a chance that
the icon won't initially appear, however. To make it show up in Firefox
4, click the orange Firefox button at the upper-left corner of the
screen, select /Options, Toolbar layout,/ and then drag the Read It
Later icon to the Firefox toolbar.
*Protect Yourself Online*
The Web can be dangerous, with malicious software and hackers targeting
you and trying to steal your private information. But you can combat
such threats with these two Firefox add-ons.
NoScript, you can block them from running, permit them to run just once,
or allow them to run every time you visit sites that you know and trust.
BetterPrivacy hunts them down and zaps them to erase your trail.
*Miscellaneous Add-Ons*
Check out these three handy tools to find out about the weather, block
ads, and more effectively manage multiple Web pages.
ForecastFox Weather delivers weather reports straight to Firefox. After you
install it and choose your area of interest, the appropriate weather
information appears at the bottom right of your browser. Just hover your
mouse over the display to see even more details.
Adblock Plus. It gives you control over what to block and what to let
through, so you can block ads on some sites and enable them on others.
You can also fine-tune the add-on so that it only blocks ads and doesn't
interfere with site functionality.
FoxTab, you can control browser tabs through a 3D interface. In addition to
being pretty, the interface gives you greater control and includes a
Safari-like feature that shows your favorite sites every time you open a
new tab.
Happy 30th Birthday, Computer Mouse!
Thirty years ago today, the first computer mouse to be used alongside a
personal computer appeared. On April 27, 1981, the integrated mouse made
its debut with the Xerox Star Information System.
First called "Computer-Aided Display Control," the term "mouse" referred
to the tool's rounded shape and wire "tail" protruding out the back of
the gadget that gave it a rodent-like look.
The mouse has come a long way in its 30 years. Most don't even have
wires any more, especially in an era where so many tech companies are
producing touch-screen technology with devices like Apple's iPhone or
other smartphones and tablets. Additionally, most laptops use some sort
of touchpad to navigate the screen, or a pointer stick.
The prototype for the first mouse was invented by Douglas Englebard in
1963 while he was working at Palo Alto's Stanford Research Institute.
Before it morphed into the mouse that is commonly seen today, it went
through many different forms. For example, one method was mounting a
device on the user's head or chin. In 1972, wheels on the bottom of the
mouse were replaced by a trackball, a feature that many mice don't even
use today.
The device went through many revisions before Xerox released it with
star in 1982. However, the mouse didn't get a lot of attention until it
appeared with Apple's Macintosh three years later.
Can you imagine the computer without the mouse? PCMag's John Dvorak
gives the mouse a lot of credit for the rise of the Internet.
Computer mice have been an integral part of the tech age, and evolved
quite a bit in the three decades since their debut.
Guillen Suspended for Twitter Blast
Major League Baseball slapped Ozzie Guillen with a two-game ban after the
Chicago White Sox manager used Twitter to complain about begin ejected
from a game.
Guillen, who was also fined, was tossed out of Wednesday's White Sox
game for arguing balls and strikes. MLB declined to release the amount
of the fine.
It marks the first time American baseball has suspended a manager or
player for using Twitter during a game.
Guillen, who was ejected by plate umpire Todd Tichenor during a game
against the New York Yankees, wrote on his Twitter page that the
ejection was "pathetic".
Guillen will miss two games against the Baltimore Orioles.
=~=~=~=
Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org
No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.
Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.