Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 15 Issue 18

eZine's profile picture
Published in 
Atari Online News Etc
 · 22 Aug 2019

  

Volume 15, Issue 18 Atari Online News, Etc. May 10, 2013


Published and Copyright (c) 1999 - 2013
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1518 05/10/13

~ Holder Denies 'Bowing' ~ People Are Talking! ~ Zero-day Trade!
~ Dutch Police Can Hack? ~ Common Windows8 Gripes ~ Ouya Is Delayed!
~ Man Linked to SpyEye! ~ Call of Duty: Ghosts! ~ Acer Aspire R7!
~ Cern Recreating First! ~ Cyberwar Strategies? ~ Teens vs. Adults?

-* New Law To Combat Cyber Theft *-
-* No Internet? Next Xbox Still Works! *-
-* Internet Sales Tax Bill, Tough House Sell! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



First off, I want to apologize for the lack of an issue last week. During
the entire week, I was tied up dealing with my father's estate which ended
up culminating in a trip to Maine which took up most of the day Friday.
It was a long week, and an extremely long day! There was no way that I was
going to complete the week's issue, nor even get tt done late. So, we're
back this week.

Until next time...



=~=~=~=



->In This Week's Gaming Section - Next Xbox Will Work Even When Your Internet Doesn’t!
""""""""""""""""""""""""""""" Ouya Delayed to End of June!
Call of Duty: Ghost Coming!
And much more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Microsoft: Next Xbox Will Work Even When Your Internet Doesn’t


Should single-player games, Blu-ray playback, and live TV viewing be
possible on a gaming console with no Internet connection? Most gamers
would say "yes," but they have been worried that Microsoft feels
differently; the next generation Xbox has been consistently rumored to
require a permanent network connection.

It won't.

According to an internal Microsoft e-mail sent to all full-time employees
working on the next Xbox, "Durango [the codename for the next Xbox] is
designed to deliver the future of entertainment while engineered to be
tolerant of today's Internet." It continues, "There are a number of
scenarios that our users expect to work without an Internet connection,
and those should 'just work' regardless of their current connection
status. Those include, but are not limited to: playing a Blu-ray disc,
watching live TV, and yes playing a single player game."

The quotation also implicitly confirms another rumor: the next Xbox will
sport an HDMI input, to allow cable boxes to be hooked up for live TV
viewing. Our sources tell us that the console will be able to provide TV
listings and similar information.

How far this offline support will extend still isn't clear. It could take
the form of a fully offline mode akin to that on the Xbox 360 (insert
optical disc, install game, play, all without an Internet connection) or
it could be more like Steam (install and activate online but enable
subsequent offline play once this has been done).

While one could argue that "installing a game" is one of the "scenarios"
that gamers "expect to work" when offline, a more Steam-like approach
would be consistent with rumors that the next Xbox will use its Internet
connection to block installation of secondhand games.

Still, though the next Xbox won't make everybody happy, it looks like
fears that the console will be useless when your broadband goes down have
been overblown.



Ouya Delayed to End of June, Snatches $15 Million in New Funding


The most visible of the Android-based micro-consoles with the name that
sounds like what Kool-Aid man says when he’s busting through painted
styrofoam walls will delay its $100 Ouya game cube until the end of June:
specifically June 25 — about two weeks after E3 wraps.

The reason for the delay? The company doesn’t say in a press release
that’s mostly about other stuff, burying the revised launch date at the
end (the system was originally due out June 4), but Joystiq managed to
speak with Ouya honcho Julie Uhrman, who explains the sudden pushback:

We’ve had incredibly positive reactions from our retail partners, and so
in order to meet their greater than expected demand, we decided to shift
the launch date by a couple of weeks — three weeks — which will allow us
to create more units and, basically, have more units on store shelves in
June.

You know all the worry about the controller feeling cheap? Complaints
about some of the buttons sticking under the top plate when hammered? It
sounds like Ouya’s already addressed this (well, the button-sticking part
anyway): Uhrman says the company’s made the holes for the face buttons a
trifle larger to rectify the problem. ”We made that change very early so
all the units are being produced with those larger button holes,” says
Uhrman. The revised controllers are already shipping to Kickstarter
backers.

As Gamasutra notes, the new launch date pits Ouya squarely against
GameStick, a flash drive-sized, Android-based game console designed to
plug directly into Smart TVs (or to a standard TV through an HDMI dock).
GameStick has a launch date of June 10, but the company’s said the first
units won’t be in the hands of those who preordered it until the final
week of June.

But what Ouya really wants everyone to know, is that it just secured $15
million in new funding led by Silicon Valley-based venture capital firm
Kleiner Perkins Caufield & Byers, with participation from Mayfield Fund,
NVIDIA, Shasta Ventures and Occam Partners. If KPCB rings some distant
game history bells, it may be because it’s the company EA Chief Creative
Officer Bing Gordon joined upon leaving Electronic Arts in 2008. Gordon
originally signed up with EA in 1982 (just a few months after its
inception), devoting over a quarter century to the game giant Trip
Hawkins started. As part of the Ouya funding deal, Gordon will join
Ouya’s board of directors alongside Uhrman as well as Roy Bahat, chairman
of the board (Gordon also serves on the board of directors at Amazon,
Klout, Lockerz, MEVIO, Zazzle and Zynga).

Ouya raised nearly $8.6 million last summer, with over 63,000 Kickstarter
backers throwing in to propel the conceptual console well beyond its
stated $950,000 goal. Preliminary reviews of initial “beta” systems
dispatched to backers in late March have been mixed, spawning a handful of
apologias. No, Kickstarter projects aren’t by necessity “grab something
and hang on!” beta pilgrimages — Nataly Dawn’s Kickstarter-funded album
How I Knew Her sounds like something that cost a lot more than $100k to
produce, and for my money, games column Tom vs. Bruce (also
Kickstarter-funded) is absolutely peerless — but yes, it’s true,
mass-manufactured technology with ergonomic variables and questionable
launch software lineups rarely arrive blemish-free.

In any event, Ouya’s real challenge isn’t pricing ($100 is plenty cheap)
or patching up gamepad glitches (already well in hand) or whether this
button should have been here or there, it’s about what this thing’s going
to let you do when you power it on. No one cares about the aesthetics
(it’s a grayish plastic cube, so what), and you have to try pretty hard
at this point to screw up a gamepad with conventional face buttons,
thumbsticks and triggers. But if Ouya launches with a stable of
been-there-played-that games, well…will gamers leap in for the fiddly
emulators and tiny handful of media services, all for the elusive promise
of better to come? That’s the $8.6 million dollar question.



Call of Duty: Ghost Coming to Xbox 360, PS3, PC and ‘Next-gen Platforms’


Activision on Wednesday announced that the latest installment of its
best-selling Call of Duty franchise, called Call of Duty: Ghost, will
launch later this year on the Xbox 360, PlayStation 3, PC and “next
generation platforms.” The latest Call of Duty game is being developed by
Infinity Ward, the studio behind the original Call of Duty and the
critically acclaimed Call of Duty: Modern Warfare series. Activision’s
first-person shooter has consistently shattered game sale records year
after year and its latest installment is expected to continue this trend.
Call of Duty: Ghost is scheduled to be released on November 5th. Starting
today, fans can pre-order the game at retail stores. Activision’s press
release follows below.

ACTIVISION ANNOUNCES THE NEXT GENERATION OF CALL OF DUTY WITH CALL OF DUTY:
GHOSTS

Call of Duty: Ghosts will set a new Benchmark for the Next Generation

All-New World, Story, Characters and Experience, All Powered by New,
Next Gen Call of Duty Engine from the Developer that started it all,
Infinity Ward

For an Exclusive First Look at the Game, Tune in to Xbox: The New
Generation Revealed, May 21 at 10AM PDT on Xbox.com, Xbox Live or SPIKE TV

Groundbreaking Title Lands on November 5

Santa Monica, CA – May 1, 2013 – Prepare for the next generation of
Call of Duty. The franchise that has defined a generation of gaming is set
to raise the bar once again with the all-new Call of Duty: Ghosts.
Published by Activision Publishing, Inc., a wholly owned subsidiary of
Activision Blizzard, and developed by Infinity Ward, the studio that
created the original Call of Duty and the seminal Call of Duty: Modern
Warfare series, Call of Duty: Ghosts ushers in the next generation of the
franchise. The new title delivers a riveting all-new gameplay experience
built on an entirely new story, setting and cast of characters, all
powered by a new, next generation Call of Duty engine that redefines the
series for the next generation.

“Infinity Ward set the gold standard for first-person action for a
generation, and they’re going to do it again with Call of Duty: Ghosts,”
said Eric Hirshberg, CEO of Activision Publishing, Inc. “Ghosts delivers
an all-new story, all-new characters, an all-new Call of Duty world, all
powered by a next generation Call of Duty engine, which is a leap forward
for the franchise. Infinity Ward is going all-in to create the next
generation of Call of Duty worthy of the world’s greatest fans.”

“Everyone was expecting us to make Modern Warfare 4, which would have
been the safe thing to do. But we’re not resting on our laurels,” said
Mark Rubin, executive producer of developer Infinity Ward. “We saw the
console transition as the perfect opportunity to start a new chapter for
Call of Duty. So we’re building a new sub-brand, a new engine, and a lot
of new ideas and experiences for our players. We can’t wait to share
them with our community.”

To see an exclusive first look at Call of Duty: Ghosts tune in to
Xbox: the Next Generation Revealed on May 21 at 10AM PDT on Xbox.com,
Xbox LIVE or SPIKE TV for the debut of the all-new game from Infinity Ward.

“We are consistently thrilled with the overwhelming response received
from critics and consumers alike to the Call of Duty series, which has
firmly established its home on the Xbox 360 with the game’s largest and
most engaged community,” said Don Mattrick, president of the interactive
entertainment business at Microsoft. “With Call of Duty: Ghosts, we have
no doubt that our longtime partners, Activision and Infinity Ward, will
raise the bar higher than ever before for this incredible franchise.”

Starting today, fans can begin pre-ordering their copy of Call of Duty:
Ghosts at retail outlets worldwide.

“There’s no other video game property like Call of Duty. It’s the
biggest game franchise on the planet that has had some of the biggest game
entertainment launches in history,” said Tony Bartel, president of
GameStop. “We are very excited for the launch of Call of Duty: Ghosts, as
we transition to next generation consoles.”

Call of Duty: Ghosts will release on Xbox 360 video game and
entertainment system from Microsoft, PlayStation®3 computer entertainment
system and PC on November 5. Call of Duty: Ghosts will also be available
for next generation platforms. For the latest intel, check out:
http://www.callofduty.com/ghosts, http://www.facebook.com/CODGhosts, or
follow on Twitter @InfinityWard. Call of Duty: Ghosts is not yet rated.



GameStop Ending PlayStation 2 Trade-Ins in June


GameStop has confirmed that it will no longer accept PlayStation 2
trade-ins as of June 1, 2013. In a statement provided to IGN, a GameStop
representative said the following:

“We can confirm that as of June 1st we will no longer be accepting the PS2
console or its related product for trades. We know that the 12 year old
system is a popular one and for many gamers, GameStop is the only place to
find a great selection of its games. We will still offer a wide selection
of the PS2 hardware, accessories and games in many of our stores and
online for several months, based on remaining stock from trades.

We are very excited about the upcoming PS4 and are making room in our
stores for it and other new platforms expected this fall.”

Earlier this year, Sony ceased production of the PlayStation 2, ending its
life as the best-selling home console of all time. Since its launch in
2000, more than 150 million PlayStation 2s have been sold worldwide, with
more than 1.5 billion software units sold.



Video Game Play Sharpens Elderly Minds


Wanna help grandma keep her mind sharp? Consider throwing out her crossword
puzzles and giving her a joystick. Because a study finds that elderly
people who played a video game for at least 10 hours gained three years of
protection from cognitive decline. Gamers also became quicker at processing
information. The research is in the journal PLoS ONE. [Fredric D. Wolinsky
et al, A Randomized Controlled Trial of Cognitive Training Using a Visual
Speed of Processing Intervention in Middle Aged and Older Adults]

Almost 700 subjects were divided into two groups: those between the ages of
fifty and sixty-four and people aged sixty-five and older. Members from
each age group were asked to either work on a crossword puzzle or play a
video game called Road Tour, which involves matching fleeting images of car
types and road signs.

In both age groups, those who played the video game showed improvements on
executive function—which includes memory, attention, problem solving skills
and perception—when tested a year later.

Some of the gamers were given four additional hours of training with the
game. And their cognitive improvement lasted an additional year. So video
games might help ward off cognitive decline. Just don’t play Road Tour
while actually driving.



Video Game Maker Drops Gun Makers, Not Their Guns


In the midst of the bitter national debate on gun violence, gun
manufacturers and videogame makers are delicately navigating one of the
more peculiar relationships in American business.

Violent "first-person shooter" games such as "Call of Duty" are the bread
and butter of leading video game publishers, and authenticity all but
requires that they feature brand-name weapons.

Electronic Arts licensed weapons from companies like McMillan Group
International as part of a marketing collaboration for "Medal of Honor:
Warfighter." Activision Blizzard gives "special thanks" to Colt, Barrett
and Remington in the credits for its "Call of Duty" titles.

Rifles by Bushmaster, which made the gun used in the Newtown, Connecticut
school shooting last December, have appeared in the hugely popular "Call
of Duty."

Yet, in the wake of the Newtown shooting, the biggest advocate for gun
ownership, the National Rifle Association, took aim at videogames to
explain gun violence. One week after 20 schoolchildren and six adults
were killed in the shooting, NRA chief executive Wayne LaPierre called
the videogame industry "a callous, corrupt and corrupting shadow industry
that sells, and sows, violence against its own people."

Now at least one game maker, the second largest by revenue in the United
States, is publicly distancing itself from the gun industry, even as it
finds ways to keep the branded guns in the games. Electronic Arts says it
is severing its licensing ties to gun manufacturers - and simultaneously
asserting that it has the right, and the intention, to continue to
feature branded guns without a license.

For the gunmakers, having their products in games is "free marketing, just
like having Coca-Cola" in a movie, said Roxanne Christ, a partner at
Latham & Watkins LLP in Los Angeles, who works with video game companies
on licensing, but has not personally done a gun deal.

Yet it is also a virtual double-edged sword. "It gives publicity to the
particular brand of gun being used in the video game," said Brad J.
Bushman, a professor at Ohio State University who has studied video game
violence. "On the other hand, it's linking that gun with violent and
aggressive behavior."

Gun makers, including the Freedom Group that owns brands like Remington
and Bushmaster, and the NRA, did not respond to repeated requests for
comment from Reuters.

First-person shooter games let players blast their way through
battlefields while looking down the barrel of a virtual gun, taking aim
with the flick of a controller.

Some of those guns - like the Colt M1911 pistol in "Call of Duty" - turn
sideways to face the screen during reloading, revealing the brand name.
Games also offer lists of branded weapons to choose from.

Licensed images of weapons in "Medal of Honor: Warfighter" - a game that
simulates military missions like fighting pirates in Somalia - offer what
EA spokesman Jeff Brown calls "enhanced authenticity."

Back in the late 90's, video game makers initially approached gun companies
for licenses to inoculate themselves from potential lawsuits, video game
industry lawyers say. Over the years, legal clearances were granted for
little or no money by gunmakers, these lawyers said.

Yet overt signs of cooperation between the video game and gun industries
had begun to draw criticism even before the December school shooting in
Connecticut.

In August, game fans and some video game news outlets vehemently objected
to EA putting links to weapons companies like the McMillan Group and gun
magazine maker Magpul, where gamers could check out real versions of
weapons featured in the game, on its "Medal of Honor: Warfighter" game
website.

"What kind of message is a video game publisher like EA sending when it
encourages its players to buy weapons?" asked Laura Parker, the associate
editor of gaming site GameSpot Australia in a post in August.

EA immediately removed the links and dropped the marketing tie-up, which
it said was part of a charity project to raise money for military
veterans. The company said it received no money from its gun company
partners.

"We won't do that again," said Brown. "The action games we will release
this year will not include licensed images of weapons."

EA said politics and NRA comments critical of game makers had nothing to
do with its decision. "The response from our audience was pretty clear:
they feel the comments from the NRA were a simple attempt to change the
subject," Brown said.

EA also says video game makers can have branded guns in their games
without getting licenses, meaning the industry could drop the gun
companies and keep their guns.

Activision, the industry leader, declined to comment on whether it
licenses gun designs from gun manufacturers or if it would stop doing so.
Branded guns have consistently been featured in its blockbuster shooter
games like the decade-old "Call of Duty."

"We're telling a story and we have a point of view," EA's President of
Labels Frank Gibeau, who leads product development of EA's biggest
franchises, said in an interview. "A book doesn't pay for saying the word
'Colt,' for example."

Put another way, EA is asserting a constitutional free speech right to use
trademarks without permission in its ever-more-realistic games.

Legal experts say there isn't a single case so far where gun companies
have sued video game companies for using branded guns without a license.

But EA's legal theory is now being tested in court. Aircraft maker Bell
Helicopter, a unit of Textron Inc, has argued that Electronic Arts'
depiction of its helicopters in "Battlefield" was beyond fair use and
amounted to a trademark infringement. EA preemptively went to court,
suing Bell Helicopter to settle the issue.

The U.S. District Court, Northern District of California, has set a jury
trial for the case in June.



Activision Warns of Rocky Second Half


Activision Blizzard Inc warned investors on Wednesday that it expects a
challenging second-half and holiday quarter because of heavy competition
and uncertainty around the launch of new video game consoles.

The shares of the largest U.S. video games publisher were down about 5
percent at $14.45 in after-hours trading from its $15.26 close on the
Nasdaq.

Subscribers to "World of Warcraft," a large source of steady
subscription-based revenue, dropped sharply by about 14 percent to 8.3
million last quarter from 9.6 million in the previous quarter, the company
said.

Activision executives told analysts they expect Warcraft subscriber
figures to dip further in coming months as the fantasy-action game
continues to lose users to similar, free-to-play games.

"No one understands what 'numbers to go lower' means and that's got
investors concerned," said Michael Pachter, an analyst at Wedbush
Securities. "Activision's going to have to stabilize that."

To arrest the loss of subscribers, the company will invest significantly
in the franchise and deliver new content to engage players, Chief
Executive Officer Bobby Kotick said in an interview.

The company, known for its "Call of Duty" and "Skylanders" games, slightly
raised its 2013 revenue and earnings forecast to $4.25 billion and 82
cents per share, compared with $4.18 billion and 80 cents provided at the
end of the last quarter ended January 30.

Its 2013 outlook was below the view of Wall Street analysts, who expected
the company to forecast revenue of $4.27 billion and earnings at 85 cents
per share.

In contrast, rival Electronic Arts Inc on Tuesday forecast fiscal 2014
earnings above Wall Street's expectations, triggering a 17 percent rally
in its shares on Wednesday.

The video game industry is grappling with flagging sales as players
migrate from to buying packaged games for consoles to free or
less-expensive offerings on mobile devices.

Moreover, consumers have held back from buying hardware and software as
they await new versions of Sony Corp's PlayStation and Microsoft Corp's
Xbox, which are expected later this year.

Nintendo Co Ltd's new Wii U console, which was launched in November, has
disappointed investors with its lackluster sales, casting doubt on the
industry's hope that new consoles could boost prospects.

This year, Activision will clash with a number of mega-franchises during
the coming holidays, a crucial period that often accounts for the bulk of
the industry's annual revenue.

Its top releases include shooter game "Call of Duty: Ghosts", which will
compete with EA's "Battlefield 4" over the holidays. Its "Skylanders SWAP
Force", a children's fantasy-adventure game sold with actual toys that
come to life onscreen, will battle Disney's "Infinity", based on a similar
concept, and is slated for release in August.

"Infinity is going to be supported by a large marketing budget so
obviously, it's something that's formidable," Pachter said.

To try and get a leg up on the competition, Kotick told analysts that
Activision will "further increase our sales and marketing investments,"
without offering specifics.

Activision's warnings about the competition overshadowed strong
first-quarter earnings.

The Santa Monica-based company said non-GAAP revenue, adjusted for the
deferral of digital revenue and other items, rose to $804 million,
surpassing Wall Street's average revenue forecast for $704.6 million and
up 37 percent from $587 million in the same quarter a year ago.

Non-GAAP income totaled $199 million, or 17 cents per share, in the fourth
quarter, compared with $67 million, or 6 cents per share a year earlier.
This beat Wall Street's average earnings estimate of 11 cents per share,
according to Thomson Reuters I/B/E/S.



Sony CEO, Executives Give Up Financial Bonuses


For years, Sony has suffered from lagging electronics sales and supporting
new proprietary technology that simply hasn’t panned-out on the market.
While the PlayStation brand has long been one of Sony’s strongest, and
while Sony is now finally in the black, that doesn’t mean the company
doesn’t want to become even more profitable following a significant
bloodletting over the last couple of years.

According to The Raw Story (via Nikkei), 40 Sony executives – including
well-known Sony CEO Kaz Hirai – are giving up their financial bonuses in a
move described by a Sony spokeswoman as “unprecedented.” The move will
only save Sony about $10 million (the company expects to make a profit of
$403 million in fiscal year 2013), and is likely a largely symbolic move
towards Sony’s shareholders. Either way, it’s a bigger move than last
year, when seven Sony executives gave up their financial bonuses.

Sony will report its fiscal year 2013 results, running from March 2012 to
March 2013, in early May.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Internet Sales Tax Bill Faces Tough Sell in House


Traditional retailers and cash-strapped states face a tough sell in the
House as they lobby Congress to limit tax-free shopping on the Internet.

The Senate voted 69 to 27 Monday to pass a bill that empowers states to
collect sales taxes from Internet purchases. Under the bill, states could
require out-of-state retailers to collect sales taxes when they sell
products over the Internet, in catalogs, and through radio and TV ads.
The sales taxes would be sent to the states where a shopper lives.

Current law says states can only require retailers to collect sales taxes
if the merchant has a physical presence in the state.

That means big retailers with stores all over the country like Wal-Mart,
Best Buy and Target collect sales taxes when they sell goods over the
Internet. But online retailers like eBay and Amazon don't have to collect
sales taxes, except in states where they have offices or distribution
centers.

"This bill is about fairness," said Sen. Mike Enzi, R-Wyo., the bill's
main sponsor in the Senate. "It's about leveling the playing field
between the brick and mortar and online companies and it's about
collecting a tax that's already due. It's not about raising taxes."

The bill got bipartisan support in the Senate but faces opposition in the
House, where some lawmakers regard it as a tax increase. Grover Norquist,
the anti-tax advocate, and the conservative Heritage Foundation oppose
the bill, and many Republicans have been wary of crossing them.

Supporters say the bill is not a tax increase. In many states, shoppers
are required to pay unpaid sales tax when they file their state tax
returns. However, states complain that few taxpayers comply.

"Obviously there's a lot of consumers out there that have been accustomed
to not having to pay any taxes, believing that they don't have to pay any
taxes," said Rep. Steve Womack, R-Ark., the bill's main sponsor in the
House. "I totally understand that, and I think a lot of our members
understand that. There's a lot of political difficulty getting through
the fog of it looking like a tax increase."

On Tuesday morning, House Speaker John Boehner, R-Ohio, declined to say
whether the House would take up the bill. Later, he told Bloomberg
Television in an interview that he would "probably not" support the bill.
But he said he would refer it to the House Judiciary Committee and
"we'll see what they think."

Rep. Bob Goodlatte, R-Va., chairman of the Judiciary Committee, said there
are problems with the bill, but he did not reject it outright.

"While it attempts to make tax collection simpler, it still has a long way
to go," Goodlatte said in a statement. Without more uniformity in the
bill, he said, "businesses would still be forced to wade through
potentially hundreds of tax rates and a host of different tax codes and
definitions."

Goodlatte said he's "open to considering legislation concerning this topic
but these issues, along with others, would certainly have to be
addressed."

Internet giant eBay led the fight against the bill in the Senate, along
with lawmakers from states with no sales tax and several prominent
anti-tax groups. The bill's opponents say it would put an expensive
obligation on small businesses because they are not as equipped as
national merchandisers to collect and remit sales taxes at the multitude
of state rates.

Businesses with less than $1 million in online sales would be exempt. EBay
wants to exempt businesses with up to $10 million in sales or fewer than
50 employees.

"The contentious debate in the Senate shows that a lot more work needs to
be done to get the Internet sales tax issue right, including ensuring
that small businesses using the Internet are protected from new burdens
that harm their ability to compete and grow," said Brian Bieron, eBay's
senior director of global public policy.

Some states have sales taxes as high as 7 percent, plus city and county
taxes that can push the combined rate even higher.

Many governors — Republicans and Democrats — have been lobbying the
federal government for years for the authority to collect sales taxes from
online sales.

The issue is getting bigger for states as more people make purchases
online. Last year, Internet sales in the U.S. totaled $226 billion, up
nearly 16 percent from the previous year, according to government
estimates.

States lost a total of $23 billion last year because they couldn't collect
taxes on out-of-state sales, according to a study done for the National
Conference of State Legislatures, which has lobbied for the bill. About
half of that was lost from Internet sales; half from purchases made
through catalogs, mail orders and telephone orders, the study said.

Supporters say the bill makes it relatively easy for Internet retailers to
comply. States must provide free computer software to help retailers
calculate sales taxes, based on where shoppers live. States must also
establish a single entity to receive Internet sales tax revenue, so
retailers don't have to send it to individual counties or cities.

Opponents worry the bill would give states too much power to reach across
state lines to enforce their tax laws. States could audit out-of-state
businesses, impose liens on their property and, ultimately, sue them in
state court.



Senators Propose Law To Combat Cyber Theft


A group of senior Republican and Democratic senators proposed a new law
on Tuesday to combat computer espionage and the theft of valuable
commercial data from U.S. companies.

The four powerful senators - Democrats Carl Levin and Jay Rockefeller and
Republicans John McCain and Tom Coburn - joined together to launch the
Deter Cyber Theft Act.

The proposed law aims to combat the theft of intellectual property from
U.S. companies, which spend billions in research and development only to
be targeted by foreign firms and countries that illegally access their
data and use it to compete against them.

General Keith Alexander, head of the U.S. National Security Agency and
commander of the U.S. Cyber Command, has called the growing problem the
"greatest transfer of wealth in history."

China is accused of being the biggest culprit in theft attempts against
U.S. companies. American lawmakers have said U.S. companies suffered
estimated losses in 2012 of more than $300 billion due to trade-secret
theft, much of it due to Chinese cyber espionage.

Levin, chairman of the Armed Services Committee, said the new law would
help protect American businesses and innovation.

"We need to call out those who are responsible for cyber theft and
empower the president to hit the thieves where it hurts most - in their
wallets, by blocking imports of products or from companies that benefit
from this theft," Levin said in a statement.

McCain, a powerful voice in the Senate on armed services and foreign
affairs issues, said the bill would give President Barack Obama
authority to target those who try to benefit from cyber crime.

A divided U.S. Congress has not approved much legislation in recent years,
given a string of partisan fiscal battles.

But with lawmakers on both sides of the political aisle acknowledging that
cyber security is a rising concern, this bipartisan measure - sponsored by
leading senators - will likely draw plenty of interest.

A senior Democratic aide described cyber security as a "huge priority,"
for Senate Majority Leader Harry Reid.

The proposed act would require the Director of National Intelligence to
compile an annual report that includes a list of nations that engage in
economic or industrial espionage in cyberspace against U.S. firms or
individuals. It would include a priority watch list of the worst
offenders.

The report would also include a list of U.S. technologies targeted by the
espionage, details of what had been stolen and a list of items produced
using the stolen information.

The DNI's report would also list countries that had benefited from the
theft and the action taken by the U.S. government to combat cyber
espionage.

Under the proposed law, the president would be required to block imports
of products containing stolen U.S. technology or products made by
state-owned enterprises of nations on the DNI's priority watch list that
are similar to items identified as being made using stolen technology.



Special Report: U.S. Cyberwar Strategy Stokes Fear of Blowback


Even as the U.S. government confronts rival powers over widespread
Internet espionage, it has become the biggest buyer in a burgeoning gray
market where hackers and security firms sell tools for breaking into
computers.

The strategy is spurring concern in the technology industry and
intelligence community that Washington is in effect encouraging hacking
and failing to disclose to software companies and customers the
vulnerabilities exploited by the purchased hacks.

That's because U.S. intelligence and military agencies aren't buying the
tools primarily to fend off attacks. Rather, they are using the tools to
infiltrate computer networks overseas, leaving behind spy programs and
cyber-weapons that can disrupt data or damage systems.

The core problem: Spy tools and cyber-weapons rely on vulnerabilities in
existing software programs, and these hacks would be much less useful to
the government if the flaws were exposed through public warnings. So the
more the government spends on offensive techniques, the greater its
interest in making sure that security holes in widely used software
remain unrepaired.

Moreover, the money going for offense lures some talented researchers away
from work on defense, while tax dollars may end up flowing to skilled
hackers simultaneously supplying criminal groups. "The only people paying
are on the offensive side," said Charlie Miller, a security researcher at
Twitter who previously worked for the National Security Agency.

A spokesman for the NSA agreed that the proliferation of hacking tools
was a major concern but declined to comment on the agency's own role in
purchasing them, citing the "sensitivity" of the topic.

America's offensive cyber-warfare strategy - including even the broad
outlines and the total spending levels - is classified information.
Officials have never publicly acknowledged engaging in offensive
cyber-warfare, though the one case that has been most widely reported -
the use of a virus known as Stuxnet to disrupt Iran's nuclear-research
program - was lauded in Washington. Officials confirmed to Reuters
previously that the U.S. government drove Stuxnet's development, and the
Pentagon is expanding its offensive capability through the nascent Cyber
Command.

Stuxnet, while unusually powerful, is hardly an isolated case. Computer
researchers in the public and private sectors say the U.S. government,
acting mainly through defense contractors, has become the dominant player
in fostering the shadowy but large-scale commercial market for tools
known as exploits, which burrow into hidden computer vulnerabilities.

In their most common use, exploits are critical but interchangeable
components inside bigger programs. Those programs can steal financial
account passwords, turn an iPhone into a listening device, or, in the
case of Stuxnet, sabotage a nuclear facility.

Think of a big building with a lot of hidden doors, each with a different
key. Any door will do to get in, once you find the right key.

The pursuit of those keys has intensified. The Department of Defense and
U.S. intelligence agencies, especially the NSA, are spending so heavily
for information on holes in commercial computer systems, and on exploits
taking advantage of them, that they are turning the world of security
research on its head, according to longtime researchers and former top
government officials.

Many talented hackers who once alerted companies such as Microsoft Corp to
security flaws in their products are now selling the information and the
exploits to the highest bidder, sometimes through brokers who never meet
the final buyers. Defense contractors and agencies spend at least tens of
millions of dollars a year just on exploits, which are the one essential
ingredient in a broader cyber-weapons industry generating hundreds of
millions annually, industry executives said privately.

Former White House cybersecurity advisors Howard Schmidt and Richard
Clarke said in interviews that the government in this way has been putting
too much emphasis on offensive capabilities that by their very nature
depend on leaving U.S. business and consumers at risk.

"If the U.S. government knows of a vulnerability that can be exploited,
under normal circumstances, its first obligation is to tell U.S. users,"
Clarke said. "There is supposed to be some mechanism for deciding how they
use the information, for offense or defense. But there isn't."

Acknowledging the strategic trade-offs, former NSA director Michael Hayden
said: "There has been a traditional calculus between protecting your
offensive capability and strengthening your defense. It might be time now
to readdress that at an important policy level, given how much we are
suffering."

The issue is sensitive in the wake of new disclosures about the breadth
and scale of hacking attacks that U.S. intelligence officials attribute to
the Chinese government. Chinese officials deny the allegations and say
they too are hacking victims.

Top U.S. officials told Congress this year that poor Internet security has
surpassed terrorism to become the single greatest threat to the country
and that better information-sharing on risks is crucial. Yet neither of
the two major U.S. initiatives under way - sweeping cybersecurity
legislation being weighed by Congress and President Barack Obama's
February executive order on the subject - asks defense and intelligence
agencies to spread what they know about vulnerabilities to help the
private sector defend itself.

Most companies, including Microsoft, Apple Inc and Adobe Systems Inc, on
principle won't pay researchers who report flaws, saying they don't want
to encourage hackers. Those that do offer "bounties", including Google
Inc and Facebook Inc, say they are hard-pressed to compete financially
with defense-industry spending.

Some national-security officials and security executives say the U.S.
strategy is perfectly logical: It's better for the U.S. government to be
buying up exploits so that they don't fall into the hands of dictators or
organized criminals.

When a U.S. agency knows about a vulnerability and does not warn the
public, there can be unintended consequences. If malign forces purchase
information about or independently discover the same hole, they can use
it to cause damage or to launch spying or fraud campaigns before a
company like Microsoft has time to develop a patch. Moreover, when the
U.S. launches a program containing an exploit, it can be detected and
quickly duplicated for use against U.S. interests before any public
warning or patch.

Some losses occur even after a patch.

That happened to Microsoft and its customers with a piece of malicious
software known as Duqu. Experts say it was designed to steal
industrial-facility designs from Iran and that it used an exploit that
tricked computers into installing malicious software disguised as a font
to render type on the screen.

Those who dissected the program after its discovery in 2011 believe it was
created by a U.S. agency. Though Duqu resembled Stuxnet in some respects,
they couldn't say for sure how it was assembled, or whether the spying
tool had accomplished its mission.

What's certain is that criminal hackers copied Duqu's previously
unheard-of method for breaking into computers and rolled it into "exploit
kits," including one called Blackhole and another called Cool, that were
sold to hackers worldwide.

Microsoft had by then issued a patch for the vulnerability. Nevertheless,
hackers used it last year to attack 16 out of every 1,000 U.S. computers
and an even greater proportion in some other countries, according to
Finland-based security firm F-Secure.

The flaw became the second-most frequently tried among tens of thousands
of known vulnerabilities during the second half of 2012, F-Secure said.
Hackers installed a variety of malicious software in cases when the
exploit worked, including copies of Zeus, a notorious program for
stealing financial login information that has been blamed for hundreds of
millions of dollars in bank thefts. Microsoft won't say whether it has
confronted U.S. officials about Duqu and other programs, but an executive
said the company objects "to our products being used for malicious
purposes."

Former NSA Director Hayden and others with high-level experience have
boasted that U.S. offensive capabilities in cyberspace are the best in
the world. But few outsiders had any idea what was possible before 2010,
when a small laboratory discovered the worm called Stuxnet.

It took teams of security experts in several countries months to dissect
the program. They discovered that it had been meticulously engineered to
launch invisibly from a portable flash drive and spread through connected
Windows-based personal computers in search of machines running a specific
piece of industrial control software made by Siemens AG of Germany.

If Stuxnet found that software and a certain configuration, it changed
some of the instructions in the program and hid its tracks. Eventually,
the truth came out: The only place deliberately affected was an Iranian
nuclear facility, where the software sped up and slowed down
uranium-enriching centrifuges until they broke.

Stuxnet was unique in many ways, one of them being that it took advantage
of four previously unknown flaws in Windows. In the industry, exploits of
such vulnerabilities are called "zero-days," because the software maker
has had zero days' notice to fix the hole before the tool's discovery.

It can take months for security patches to be widely installed after a
vulnerability is reported, so even a "two-day" exploit, one released two
days after a warning, is valuable.

But exploits can't be counted on to work once the holes they rely on are
disclosed. That means contractors are constantly looking for new ones that
can be swapped in to a particular program after the original vulnerability
is fixed. Some security firms sell subscriptions for exploits,
guaranteeing a certain number per year.

"My job was to have 25 zero-days on a USB stick, ready to go," said a
former executive at a defense contractor that bought vulnerabilities from
independent hackers and turned them into exploits for government use.

Zero-day exploits will work even when the targeted software is up to
date, and experts say the use of even a single zero-day in a program
signals that a perpetrator is serious. A well-publicized hacking campaign
against Google and scores of other companies in early 2010, attributed by
U.S. officials and private experts to Chinese government hackers, used
one zero-day.

Many zero-day exploits appear to have been produced by intelligence
agencies. But private companies have also sprung up that hire programmers
to do the grunt work of identifying vulnerabilities and then writing
exploit code. The starting rate for a zero-day is around $50,000, some
buyers said, with the price depending on such factors as how widely
installed the targeted software is and how long the zero-day is expected
to remain exclusive.

It's a global market that operates under the radar, often facilitated by
other companies that act as brokers. On the buy side are U.S. government
agencies and the defense contractors that fold the exploits into
cyber-weapons. With little or no regulation, it is impossible to say who
else might be purchasing zero-days and to what end, but the customers are
known to include organized crime groups and repressive governments spying
on their citizens.

Even one of the four exploits used by Stuxnet may have been purchased.
Swedish Defense Research Agency expert David Lindahl said the same trick
employed by the exploit in question was used in a piece of Russian crime
software called Zlob prior to Stuxnet's discovery. The same person may
have sold the exploit to both the United States and to Russian criminals.
However, Lindahl and other experts said simultaneous invention can't be
ruled out.

The issue of rival countries or gangs using a flaw that U.S. officials
have known about but decided to keep secret is a big concern. The National
Security Agency declined to say whether or how often that happens, but
researchers said simultaneous security discoveries occur often.

"It's pretty naïve to believe that with a newly discovered zero-day, you
are the only one in the world that's discovered it," said Schmidt, who
retired last year as the White House cybersecurity coordinator. "Whether
it's another government, a researcher or someone else who sells exploits,
you may have it by yourself for a few hours or for a few days, but you
sure are not going to have it alone for long."

China is thought to do a lot of its work on exploits in-house, relying on
its own programmers, though Reuters has reviewed email from self-declared
Chinese buyers offering large sums. "I really need some 0days,if you have
some remote exploit 0days of windows system, I think I can buy it. you
know, money is not the problem," one hopeful wrote in 2006.

Cesar Cerrudo, a researcher in Argentina and the recipient of the 2006
email, was among the first to sell zero-days in the open, targeting
experts who wanted to test the security of networks for their employers
or clients.

Cerrudo said he ignored some requests from China that seemed suspiciously
detailed, such as one for an exploit for an out-of-date version of
Microsoft Office. Cerrudo said he regrets selling to a research
institution in Europe he won't name that he later realized received a
great deal of funding from a national government. Now Cerrudo works at
IOActive Inc, a Seattle-based consulting firm that advises corporate
clients on security.

"Fewer people are publishing details about vulnerabilities and exploits,"
Cerrudo said, and that hurts overall safety. "People are trying to keep
their techniques and exploits private so they can make a lot of money."

A Paris-based security company called Vupen sells tools based on exploits
to intelligence, law-enforcement and military authorities in most of the
world. It refrains from selling to countries such as Iran or North Korea,
and says it voluntarily follows European and U.S. rules limiting arms
exports, though others say it isn't clear whether exploits are subject
to the most restrictive U.S. rules.

Until 2010, Vupen often notified software vendors for free when it found
vulnerabilities, said chief executive Chaouki Bekrar. That has now
changed. "As our research costs became higher and higher, we decided to
no longer volunteer for multi-billion-dollar companies," Bekrar said.
When software makers wouldn't agree to a compensation system, he said,
Vupen chose to sell to governments instead. "Software vendors created
this market by not decently paying researchers for their hard work."

In Bekrar's estimation, Vupen is doing good. "Exploits are used as part
of lawful intercept missions and homeland security operations as legally
authorized by law," he said, "to protect lives and democracies against
both cyber and real world threats."

The company is one of the most visible players in the business. Vupen sent
a dozen researchers to an elite April conference on offensive hacking
techniques at the luxury Fontainebleau Hotel in Miami Beach, where
attendees eschewed nametags, dined on stone crab and heard such talks as
"Advanced Heap Manipulation in Windows 8." The only larger contingents
were one from the conference's organizer, zero-day reseller Immunity Inc,
and one from the U.S. government.

A newer entrant to the market is ReVuln, based in Malta. ReVuln says it
specializes in crafting exploits for industrial control systems that
govern everything from factory floors to power generators.

This is a major concern for governments because such systems are
considered prime targets for terrorists and enemy nations, with the
potential for high loss of life. Additionally, the software that controls
them is much harder to patch than something like Windows, which Microsoft
frequently fixes with updates over the Internet. Employees at several
large makers of control systems say they don't know how to reach all
their users, let alone convince them to make changes when holes are
discovered.

ReVuln's founders, Italian researcher Luigi Auriemma and former Research
in Motion vulnerability hunter Donato Ferrante, declined to say anything
about their customers. In an email interview, they said they sold some
exploits exclusively and others more widely. Asked if they would be
troubled if some of their programs were used in attacks that caused death
or destruction, they said: "We don't sell weapons, we sell information.
This question would be worth asking to vendors leaving security holes in
their products."

Much of the work on offensive cyber-warfare is done by publicly traded
U.S. defense contractors, now joined by a handful of venture
capital-backed start-ups seeking government buyers for a broad array of
cyber-weapons that use exploits. Defense contractors both buy exploits and
produce them in-house.

Major players in the field include Raytheon Co, Northrop Grumman Corp and
Harris Corp, all of which have acquired smaller companies that specialize
in finding new vulnerabilities and writing exploits. Those companies
declined to discuss their wares. "It's tough for us, when you get into
the realm of offensive," said Northrop spokesman Mark Root.

Reuters reviewed a product catalogue from one large contractor, which was
made available on condition the vendor not be named. Scores of programs
were listed. Among them was a means to turn any iPhone into a room-wide
eavesdropping device. Another was a system for installing spyware on a
printer or other device and moving that malware to a nearby computer via
radio waves, even when the machines aren't connected to anything.

There were tools for getting access to computers or phones, tools for
grabbing different categories of data, and tools for smuggling the
information out again. There were versions of each for Windows, Apple and
Linux machines. Most of the programs cost more than $100,000, and a solid
operation would need several components that work together. The vast
majority of the programs rely on zero-day exploits.

Intelligence agencies have a good reason to leave a lot of the spyware
development work to outsiders, said Alex Stamos, chief technology officer
at an Internet security unit of NCC Group Plc. "It's just like munitions
development," he said. "They don't purchase it until the vendors can
demonstrate it works."

Another newcomer with U.S. agencies as clients is Atlanta-based Endgame
Inc, which in March raised $23 million in a second round of funding led by
the blue-chip Silicon Valley venture capital firm Kleiner Perkins Caufield
& Byers. Endgame is chaired by the chief executive of In-Q-Tel, a venture
capital firm set up in 1999 at the request of the CIA to fund private
companies developing technology that could be useful to the intelligence
community.

Some of Endgame's activities came to light in purloined emails published
by hackers acting under the banner Anonymous. In what appear to be
marketing slides, the company touted zero-day subscriptions as well as
lists of exactly which computers overseas belonged to specific criminal
"botnets" - networks of compromised machines that can be mobilized for
various purposes, including stealing financial passwords and knocking
websites offline with traffic attacks.

The point was not to disinfect the botnet's computers or warn the owners.
Instead, Endgame's customers in the intelligence agencies wanted to
harvest data from those machines directly or maintain the ability to
issue new commands to large segments of the networks, three people close
to the company told Reuters.

Endgame declined to comment.

Ted Schlein, a Kleiner partner who sits on Endgame's board, said he
couldn't comment on the company's classified business. But he defended the
idea of captive botnets.

"If you believe that wars are going to be fought in the world of cyber in
the future, wouldn't you want to believe you would have a cyber-army at
your disposal? Why wouldn't you want to launch a cyber-army if needed?"



Booming 'Zero-day' Trade Has Washington Cyber Experts Worried


The proliferation of hacking tools known as zero-day exploits is raising
concerns at the highest levels in Washington, even as U.S. agencies and
defense contractors have become the biggest buyers of such products.

White House cybersecurity policy coordinator Michael Daniel said the trend
was "very worrisome to us."

Asked if U.S. government buying in the offensive market was adding to the
problem, Daniel said more study was needed. "There is a lot more work to
be done in that space to look at the economic questions...so we can do a
better job on the cost-benefit analysis," he said.

Some security experts say the government's purchasing power could help
instead of hurt. They argue the U.S. government should bring the market
into the open by announcing it will pay top dollar for zero-days and then
disclosing all vulnerabilities to the companies concerned and their
customers.

"Given that people are now buying vulnerabilities, the U.S. should simply
announce that it is cornering the market, that they will pay 10 times
anyone else," said Dan Geer, chief information security officer at
In-Q-Tel, the U.S. intelligence community's venture capital firm. He said
he was speaking outside of his official capacity.

Richard Clarke, who served as counter-terrorism chief in the White House
before becoming a cybersecurity advisor there a decade ago, said the
government should at least review the exploits it has and disclose the
vast majority.

"In some rare cases, perhaps the government could briefly withhold that
information in order to run a high-priority collection mission," he said.
"Even then, however, the government should closely monitor to see if
anyone else has discovered the vulnerability and begun to use it."

Howard Schmidt, who served as White House cybersecurity czar under Obama,
said he agreed with Clarke's approach. Asked if he had made the same
argument during his recent two and a half years in the White House, he
said he couldn't betray confidences by going into detail.

But Schmidt added: "The entire discussion on cascading effects and the sort
of unintended consequences of any type of malware was had more than once...
That's the discussion that needs to continue to take place."



Here's One Way to Try to Avoid the FBI's Internet Wiretapping Proposal


If The New York Times is to be believed, the Obama administration is "on
the verge of" signing off on a proposal from the FBI that would make it
easier for the agency's to intercept online communications. Please allow
us to offer a tip that may help you avoid the Feds' steely gaze.

We should first explain what is being proposed. For some time, the FBI has
sought a way to observe information that passes through internet service
providers in the same way they can (with a warrant) listen in on phone
conversations. The problem is that while it's relatively easy for the FBI
to deal with the handful of companies that operate telephone networks,
there are many, many platforms on the Internet which people use to
communicate: Gchat, Facebook, Twitter direct messages, Snapchat, etc. And
as people — specifically, the people who the FBI wants to listen in on —
use phones less and the Internet more, less and less communication is
visible to their wiretapping. In testimony before Congress in 2011, the
FBI's general counsel described what she called the "Going Dark" problem.

[S]ome providers are currently obligated by law to have technical
solutions in place prior to receiving a court order to intercept
electronic communications, but do not maintain those solutions in a
manner consistent with their legal mandate. Other providers have no such
existing mandate and simply develop capabilities upon receipt of a court
order. In our experience, some providers actively work with the
government to develop intercept solutions, while others do not have the
technical expertise or resources to do so. As a result, on a regular
basis, the government is unable to obtain communications and related
data, even when authorized by a court to do so.

The problem isn't really encryption, as such. While communications over
Facebook and GMail and Apple's iMessage are encrypted, what the FBI really
wants is a way for those companies — and others that don't use encryption
— to let it peek in on what is being said.

Not always, mind you — just after they get a court order. The FBI
presents it as a natural evolution of its existing ability to eavesdrop
on phone calls once a judge signs a warrant. In those cases, the FBI
approaches a phone company, which allows access to communications
involving a party. What the FBI wants to do, it assures those asking, is
simply to allow that same sort of ability if it goes and knocks on
Facebook's front door, warrant in-hand. The Times quotes another of the
FBI's attorneys.

“This doesn’t create any new legal surveillance authority,” [Andrew
Weissmann] said. “This always requires a court order. None of the ‘going
dark’ solutions would do anything except update the law given means of
modern communications.”

Late last month, The Washington Post reported on the proposal being
developed by a government task force which would need to be passed by
Congress. The amendment to the existing wiretapping law — the
Communications Assistance to Law Enforcement Act — would allow a court to
impose a series of increasing fines if a firm won't or can't comply with
an FBI request to allow it to observe communications. (In the past, the
Feds would apparently back off from companies that resisted.) In addition
to indicating the president's likely support, The Times clarified how it
would work in practice:

Under the proposal, officials said, for a company to be eligible for
the strictest deadlines and fines — starting at $25,000 a day — it must
first have been put on notice that it needed surveillance capabilities,
triggering a 30-day period to consult with the government on any technical
problems. …

Foreign-based communications services that do business in the United
States would be subject to the same procedures, and would be required to
have a point of contact on domestic soil who could be served with a
wiretap order, officials said.

That notice

  
that begins the 30-day requirement for compliance could, for
example, be in the form of the signed warrant from the judge.

It sounds simple. It is not.

For one thing, internet communications are not like phone calls. While the
FBI's goal isn't to break encryption directly, that's its effect in
practice. This is not a trivial endeavor. Internet traffic is encrypted at
various levels of difficulty, some of which are far harder to access than
others. In some cases, the encryption takes place between users and isn't
done by the company. Coming up with systems to allow the FBI access to
communication could theoretically be very time- and resource-consuming.
Because that cost is borne differently by companies of different sizes,
The Times points out a strategy for those looking to evade observation.

The difference [in the latest proposal], officials say, means that
start-ups with a small number of users would have fewer worries about
wiretapping issues unless the companies became popular enough to come to
the Justice Department’s attention.

Which brings us to the most obvious way for terrorists or drug dealers or
law-breakers or, yes, privacy puritans to avoid the FBI's proposed
wiretapping ability: if you want to reduce the likelihood that your
communications will be observed, check out what will hereafter be known as
"burner" companies — new shops that enable the sort of communications you
want to do but are unlikely to have enough users that one draws the
attention of the FBI. Become a TechCrunch afficianado! When a company
announces it's "a new way to connect people," that's your best bet, as
long as it doesn't become too popular. (The "burner" analogy to cheap cell
phones — you've seen The Wire, right? — is flawed, of course; that would
be more like creating new Facebook accounts to send messages for a day or
so.)

But of course, the FBI is not the only who might have an easier time
observing your communications if the proposal goes forward. Opponents
argue that placing backdoors into online platforms, these companies will
necessarily be creating a way for anyone with enough savvy and access
(i.e. hackers) to discover and break in. The Verge quotes a professor
from Columbia University: "I think it’s a disaster waiting to happen.”

There is a tiny chance that all of this is moot. The Guardian's Glenn
Greenwald pointed to a CNN interview last week with a former FBI agent who
claimed that the federal government was already storing all digital
communication. All as in all. This is highly unlikely, if only because of
the infrastructure that would be required. But if it is the case: Go
ahead and use Facebook.



U.S. Top Lawman Denies Bowing to Hollywood in Megaupload Case


The United States' chief prosecutor has denied that its investigation into
the Megaupload file-sharing site on charges of online piracy is an example
of Washington bowing to Hollywood pressure.

During a visit to New Zealand, U.S. Attorney General Eric Holder also said
that he saw no reason why Kim Dotcom, the founder of the defunct site who
lives in New Zealand, should not be extradited to the United States to
face charges of facilitating massive piracy of copyrighted music and
movies.

"That's not true," Holder told Radio New Zealand, when asked to respond to
Dotcom's claims that Hollywood moguls are pressuring Washington to target
file-sharing sites, which can house pirated content uploaded and
downloaded by individual users.

"(The case) was brought on the basis of facts, on the basis of law, and it
is consistent with the enforcement priorities that this administration has
had," he said.

The United States began a criminal copyright case against Dotcom in
January 2012. At Washington's request, New Zealand law enforcement
officers conducted a dramatic raid on his mansion outside Auckland.

Attempts to have him sent to the United States for trial were delayed
after a New Zealand court last year found that New Zealand used unlawful
warrants in his arrest and illegally spied on him in the lead-up to the
raid.

An extradition hearing is scheduled for August, although it could be
delayed by further appeals. Holder said he expected Dotcom to be
extradited to the United States, adding that he was happy with the level
of cooperation with New Zealand authorities on the case.

"There are things which are working their way through the New Zealand
court system, but we've had good communications, and I think at the end of
the day, there will be an appropriate result," he said.

Dotcom and six associates face U.S. charges that they conspired to
infringe copyrights, launder money and commit racketeering and fraud.

The copyright case could set a precedent for internet liability laws and,
depending on its outcome, may force entertainment companies to rethink
their distribution methods.

Dotcom maintains that Megaupload, which housed everything from family
photos to Hollywood blockbusters, was merely a storage facility for online
files, and should not be held accountable if content stored on the site
was obtained illegally.

The U.S. Justice Department counters that Megaupload encouraged piracy by
paying money to users who uploaded popular content and by deleting content
that was not regularly downloaded.

Holder is visiting New Zealand this week for a meeting of attorneys
general from the United States, New Zealand, Australia, Britain, and
Canada.



Dutch Ponder Giving Police The Right To Hack


The Dutch government has unveiled the draft of a law that would give
police investigating online crimes the right to hack into computers in
the Netherlands or abroad and install spyware or destroy files.

Justice Minister Ivo Opstelten said Thursday that such actions would
carried out only after the approval of a judge. The bill would also make
it a crime for a suspect to refuse to decipher encrypted files during a
police investigation.

Spokesman Wiebe Alkema said the bill will undergo revisions and be put to
parliament by the end of the year.

Simone Halink of the digital rights group Bits of Freedom says the law
would set a bad precedent, giving a "green light" to oppressive
governments to hack into civilian computers.



Man Facing Charges Linked to SpyEye Virus


An Algerian man accused of helping to develop and market a computer
program that drained millions of dollars from bank accounts around the
world pleaded not guilty Friday to nearly two dozen charges.

A 23-count indictment charges Hamza Bendelladj, 24, with wire fraud, bank
fraud, computer fraud and conspiracy. U.S. Attorney Sally Yates said the
man was extradited to Atlanta from Thailand on Thursday and was arraigned
in federal court Friday afternoon. A second person is also charged in the
indictment but has not been identified. Investigators could not disclose
whether the person was in the U.S. or abroad. Officials also could not
disclose what information led them to Bendelladj.

Bendelladj, whose nickname is "Bx1," is accused of developing and
marketing SpyEye, a banking Trojan. However, federal authorities have not
said exactly how Bendelladj helped develop the software. Court records
don't indicate whether he had a lawyer.

The malware was implanted onto computers to secretly collect financial
information and drain bank accounts. Authorities say the malware impacted
253 different financial institutions and is responsible for untold
amounts of financial theft.

"We're talking millions," Yates said Friday. "We don't have the precise
number quantified at this point."

Trojans such as SpyEye can be profitable for cybercriminals. A small group
of hackers in Eastern Europe arrested in 2010 was able to steal about $70
million from companies, municipalities and churches in Europe and the U.S.

SpyEye was designed to automatically steal sensitive information — such
as bank account credentials, credit card information, passwords and PIN
numbers — after being implanted in victims' computers. After the program
took control of a computer, it allowed hackers to use a number of covert
techniques to trick victims into giving up their personal information —
including data grabbing and presenting victims with a fake bank account
page. The information was then relayed to a command and control server,
which was used to access bank accounts.

Bendelladj was indicted in December 2011 and was on a trip from Malaysia
to Egypt when he was arrested during a layover at an airport in Bangkok
on Jan. 5, 2013. Police there seized two laptops, a tablet computer, a
satellite phone and external hard drives.

Although authorities say he never set foot on U.S. soil, Bendelladj is
accused of leasing a virtual server from an unidentified Internet company
in Atlanta to control computers that were impacted by SpyEye. The company
was unaware the man was allegedly using the server for illegal purposes,
Yates said.

"The federal indictment and extradition of Bendelladj should send a very
clear message to those international cybercriminals who feel safe behind
their computers in foreign lands that they are, in fact, within reach,"
Mark F. Giuliano of the FBI's Atlanta field office said in a news
release.

Bendelladj and others allegedly developed and sold various versions of
SpyEye and its components on the Internet between 2009 and 2011.
Cybercriminals were able to customize their purchases to choose specific
methods of gathering personal information from victims. Bendelladj and
others also allegedly advertised SpyEye on Internet forums focused on
cybercrime and other criminal activity.

Yates said that Bendelladj is not accused of being part of a specific
criminal organization, and that he and his associates are not accused of
carrying out cyberterrorism.

While the arrest does show that authorities are vigilant about trying to
fight cybercrime, cybersecurity experts said there is still a vast network
of cybercriminals finding more sophisticated ways to remain anonymous and
create malware resistant to antivirus programs.

"At the end of the day, this one arrest, unfortunately, won't cause a lot
of reduction in online fraud attempts," said George Tubin, senior security
strategist at Boston-based Trusteer, a provider of cybercrime prevention
programs. "Hopefully it sends a message maybe to the fraudsters that you
can be caught and you need to think twice."

Investigators say SpyEye is still active, and authorities are trying to
track down computer hackers who are still using the virus. Hackers have
developed a mobile version of SpyEye called Spitmo, which targets victims'
smartphones, Tubin said. Cybercriminals can steal personal information
through victims' computers and forward themselves text messages from the
victims' cellphones to fraudulently verify the person's identity and lock
them out of bank accounts and other personal accounts. That method is more
widely used in Europe, Tubin said.

If convicted, Bendelladj faces up to 30 years in prison for conspiracy to
commit wire and bank fraud, and up to five years for conspiracy to commit
computer fraud. The 21 counts of wire and computer fraud carry maximum
sentences of between five and 20 years each. The man may also be fined up
to $14 million.



Acer Aspire R7: Windows 8 Laptop-Tablet In One Crazy Package


Ever since Windows 8 was announced last year a slew of crazy-looking
computers have been introduced. Take Lenovo's IdeaPad Yoga laptop, which
has a screen that rotates all the way around to turn into a tablet. Or
Asus' Taichi with its two screens, which allow you to use the device as a
laptop and then close the lid to make it a tablet.

But Acer has just upped the ante in the funky Windows 8 computer game.
Today, at an event in New York City, the company introduced the Aspire R7,
a full-fledged 15.6-inch laptop with a "floating" screen. The screen hinge
allows the touchscreen to be propped up and then angled, like a desktop
monitor or all-in-one computer. You can then even flip the touchscreen
around, so if a person is sitting across the table they can see it. The
idea, Acer says, is that all the touchscreen Windows 8 laptops are awkward
to use - you have to reach out over the keyboard and trackpad. This brings
the screen closer to you.

Speaking of the keyboard and trackpad, Acer decided that putting the
trackpad below the keyboard was just a bit too traditional. On the R7 it
put the trackpad above of the keyboard so that when the screen is folded
down you can still use the keyboard.

Acer will begin selling the R7 on May 17 for $1,000. Best Buy will carry
a special "Star Trek Into Darkness" version, which will come with a free
download of the "Star Trek: The Video Game." The laptop comes standard
with a 15.6-inch 1920 x 1080-resolution screen, a Core i5 processor, 6GB
of RAM, and a combo 500 GB hard drive with a 24 GB solid-state drive.

Last month it was reported that the PC market has seen the steepest
decline in its history. Research firm IDC's data showed that shipments of
PCs plunged 14 percent in the first quarter of this year. That's the
sharpest decline in sales of personal computers since the firm started
tracking the industry in 1994. Technology experts and pundits have
hypothesized about the causes of the ailing personal computer market.
IDC, specifically, cited Windows 8, Microsoft's new computer and tablet
operating system, as one of the main reasons people turned away from
buying computers.

"While some consumers appreciate the new form factors and touch
capabilities of Windows 8, the radical changes to the UI, removal of the
familiar Start button, and the costs associated with touch have made PCs
a less-attractive alternative to dedicated tablets and other competitive
devices," Bob O'Donnell, IDC Program Vice President, said in a statement
last month.

Acer, however, doesn't seem to be too worried about that. In addition to
the Aspire R7, it released the Aspire P3, an "ultrabook convertible," or
a Windows 8 tablet with a detachable keyboard dock. It is available now,
starting at $799.99.



Common Windows 8 Gripes and Possible Solutions


Microsoft is preparing an update to Windows 8 for release later this
year. It says the changes are designed to address complaints and
confusion with the new operating system.

Windows 8 is the most radical overhaul of Microsoft's operating system
since Windows 95 came out nearly two decades ago. It was revamped to
embrace the types of touch-screen controls popular on smartphones and
tablet computers, devices that are siphoning sales from the desktop and
laptop PCs that have been Microsoft's traditional stronghold. Windows 8
was released with much fanfare in October, but got a lukewarm reception
from consumers.

Part of the problem is that Windows 8 tries to be all things to all
people. It's designed to respond to touch-screen controls, but it also
works with traditional mouse and keyboard commands. It offers a new layout
that resembles tablet computers, but it also has a desktop mode that looks
like previous versions of Windows. What results is confusion.

In addition, many of the controls to launch programs and change settings
have been tucked away. That gives Windows 8 a cleaner look, but it also
requires people to do more work finding all the controls.

Microsoft Corp. isn't saying much about what the new Windows 8 will have.
Nor will it say whether it will charge for the upgrade. What the Redmond,
Wash., company will say is that it's responding to customer feedback in
developing the update.

Here's a look at some of that feedback and possible solutions in the coming
update:

The problem: There's no central place for launching programs and changing
settings.

Windows 8 features a new start page that takes over the entire screen. The
page is filled with boxes, or tiles, for accessing your favorite programs.
But to get to programs you use less often, you need to slide up a menu
from the bottom, click on "All apps" and find the one you want. When
you're already using a program, such as a Web browser, you have to switch
back to this start page to launch a different one, even if it's one of
your favorites. To access settings, you need to slide over a set of
icons, known as charms, from the right of the screen.

By contrast, past versions of Windows have a "start" button on the lower
left corner, which allowed quick access to programs and settings without
interrupting your workflow. That button is always there as you move from
program to program.

The solution: Restore the "start" button. Don't make people figure out
where everything is. Make it easy for them to see where to "start."

The problem: Microsoft is encouraging people to use the new tablet-style
layout filled with tiles, but many programs are designed for the older,
desktop mode. That's the case even with Microsoft's popular Office suite
of business tools, despite the fact that the latest version of Office
came out months after Windows 8 comes out.

As a result, using Windows 8 feels like running two different computers on
the same machine, as the tile and desktop modes don't communicate well
with each other. Consider Microsoft's Internet Explorer 10 browser. Web
pages you open in desktop mode won't appear when you switch to the browser
in the tile mode. Because many popular programs run only in desktop mode,
it would make sense to do most of your computing there, but Windows 8
always forces you into tile mode when you start the machine.

The solution: Allow people to enter the desktop mode automatically when
they start their machines. Over time, people may get more comfortable with
tile mode and may want to switch, but don't force it on them and make them
resent it before they are ready.

The problem: Those charms on the right are useful for restarting your
machine, configuring your wireless connection and changing other
settings. But you're left to figure out how to access them. On touch
screens, you have to know to swipe a menu from the right, like opening a
sock drawer. If you're using a mouse, you need to drag the cursor to the
top or bottom right of the screen, then drag it to the appropriate charm.

The solution: Besides restoring the "start" button and having those
settings instantly accessible, offer an option to have that sock drawer
continually appear. It's similar to how the Taskbar is always present on
older versions of Windows, usually at the bottom. It's also similar to
how the Dock is always there on Mac computers (though once you're used to
it, you can hide the Dock until you move your cursor there).

The problem: There's no obvious way to close programs, the way you can by
hitting an "x'' at the corner of the program in older versions of Windows.
You need to figure out how to drag the app to the bottom of the screen,
and the way you do it depends on whether you are using touch or a mouse.
Stray too far to the left or the right, and your computer will enter a
multi-window mode instead.

The solution: Restore the "x." Don't force people to do gestures that
don't seem intuitive to the task at hand.

The problem: In making it easy for touch screens, mouse and keyboard
commands are more complex to use and figure out.

The solution: Don't try to be a one-size-fits-all operating system. Apple
and Google have kept their systems separate for touch-screen mobile
devices and for traditional computers that use mouse or trackpad
controls.

Microsoft can improve usability by designing the operating system for one
or the other. Don't expect this to change in the promised update, though.



IT Industry Backs Software Patent Change


The Government has announced a change to planned new patent rules today
which has put an end to fears that computer software might be covered by
new patent protection.

Industry sources have welcomed the decision and the Labour Party has
called it "a humiliating back down".

Commerce Minister Craig Foss has released a supplementary order paper to
clarify issues around the patentability of computer programmes in the
Patents Bill.

"These changes ensure the Bill is consistent with the intention of the
Commerce Select Committee recommendation that computer programs should
not be patentable," Foss said.

The Patents Bill is designed to replace the Patents Act 1953 and update
the New Zealand patent regime.

The Commerce Select Committee recommended in 2010 that software should not
be patentable, which led to lobbying from patent lawyers and others.

Foss then released a supplementary order paper (SOP) which changed some
wording in the bill and caused industry concern that he might be
reversing his decision.

Ongoing consultation with the New Zealand software and IT sector had led
to today's announcement, Foss said.

"I'm confident we've reached a solution where we can continue to protect
genuine inventions and encourage Kiwi businesses to export and grow."

The Labour Party said Foss had been forced into "a humiliating back down"
over the software patent system.

"Last year Craig Foss gave in to patent lawyers and multinational software
players and sought to impose a software patents system on our IT sector,"
said communications and IT spokesperson Clare Curran.

"He overrode the advice of the Commerce Select Committee that copyrighting
software would smother innovation."

Foss said there had been "a lot of noise" about the SOP when he released
it and today's move was not a back-down.

"There were some concerns out there but that was a misconception about
what we intended from the first SOP."

His intention was always that devices such as digital cameras or washing
machines, that make use of a computer program, would be patentable, but
not the software itself, Foss said.

Internet New Zealand welcomed today's tabling of the SOP, saying it made
clear that computer software was not patentable in New Zealand.

Foss' decision to amend the Patents Bill drew to a close "years of
wrangling between software developers, ICT players and multinational
heavyweights over the vexed issue of patentability of software", said
spokesperson Susan Chalmers

"Patenting software would not only make the continued development of the
Internet more difficult, it would reduce innovation and could well stymie
interoperability of various software platforms," she said.

New Zealand's largest IT representative body, the Institute of IT
Professionals, expressed relief and said a major barrier to software-led
innovation had been removed.

Chief executive Paul Matthews said although there were varied opinions on
the matter, the consensus amongst professionals was that the patent
system simply did not work for software.

"If you look at the New Zealand market, you would be hard pressed to find
many people that were thinking patents would be a good idea."

It was in New Zealand's best interests for software to continue to be
covered through the provisions of copyright - "a far more appropriate
mechanism" - in the same way movies and books were, Matthews said.

"We believe it's near impossible for software to be developed without
breaching some of the hundreds of thousands of software patents awarded
around the world, often for 'obvious' work.

"Thus many software companies in New Zealand, creating outstanding and
innovative software, live with a constant risk that their entire business
could be threatened due to litigious action by a patent holder."

Patenting software would give large overseas firms the opportunity to
monopolise a concept and crush smaller competitors through the legal
system, he said.

New Zealand's biggest software exporter, Orion Health, also welcomed Foss'
decision.

Chief executive Ian McCrae said obvious things were being patented under
the current regime.

"You might see a logical enhancement to your software, but you can't do it
because someone else has a patent.

"In general, software patents are counter-productive, often used
obstructively and get in the way of innovation."

Matthews said a recent poll of more than 1000 Kiwi IT professionals found
94 per cent wanted to see software patents gone.

A petition launched by the industry against software patents received over
1,000 signatures in under a week, he said.



Tavi Leads the Teens-Are-Dumb-on-Twitter Revolt Against Dumb Adults


Today the teens are giving adults a taste of their own medicine on
Twitter. In response to the ongoing #followateen movement, in which
grownups examine the tweets of kids to discover how silly most of Twitter
is, teens on the social platform are rising up and asking their brethren
to #followanadult — because, as the team behind one prominent teems
claims, adults are lame, too. If this all sounds like a bunch of
gibberish — it kind of is! — we're here to explain.

The idea for #followateen goes back to 2011 and is credited to Boston
Phoenix music writer David Thorpe, a.k.a. @Arr. And the concept is pretty
simple: Go on Twitter. Follow a teen who uses Twitter. Tweet about what
they do on Twitter with the hashtag #followateen. Thorpe explained all of
this in an email to BuzzFeed's Katie Notopolous back in April: "If you
get below the surface, Twitter is like 99% teens who are mad at their
moms and think English class is total bullshit (and don't even get me
started about Keighlinn, who is being a TOTAL bitch). It's a lot of fun
to find a random one and casually keep tabs on their stupid teen life.
It's not a stalky thing, it's just about tuning in to the weird secret
worldwide teenosphere and seeing what's up with today's youth."

In April Thorpe tweeted:

By request of @katienotopoulos, let's bring back #followateen for
2013. Here's how it works: find a teen, follow it, and report on its
life.
— Lucrative Trillion (@Arr) April 12, 2013

So Notopolous, quite a few BuzzFeed employees, and other Internet
denizens have been keeping tabs on teens. Just yesterday, Notopolous
published an update on #followateen, with some examples of what various
young people have been up to on social media. Said young people, it
seems, have pretty mundane lives:

My teen wants a smoothie and hates everyone.#followateen
— Juston Payne (@justonpayne) May 2, 2013

My teen got asked to prom by dude texting "prom??".. It was very cute
#followateen
— Cam Cam (@squidvstractor) April 30, 2013

The #followateen movement has not gone without criticism. An essay in The
New Inquiry by Helena Fitzgerald focused on the creepiness of it all:

Besides the comments on proms and crushes and parents and school and
#yolo, the most common theme on #followateen is people pointing out that
#followateen is creepy. It’s a good point. Of course it’s creepy. It’s
really creepy. If you haven’t yet noticed, Twitter is, itself, creepy.

But today some Internent-dwelling teens are trying to turn the tables.
This morning, Rookie, the website aimed at teenage girls that is the
brainchild of teenage wunderkind fashion blogger/Internet celebrity Tavi
Gevinson, tweeted:

Growns who think teen tweets are dumb (#followateen) should see their
fellow adults'. Today we dare to #followanadult. Join us won't you?
— Rookie (@RookieMag) May 3, 2013

Now of course Gevinson is a particularly Internet-savvy teenager, and not
exactly #followateen's target audience. Anaheed Alani, Rookie's editorial
director (and an adult herself) told The Atlantic Wire in an email that
the the idea for #followanadult came from a discussion on Facebook last
night: "Something about it felt off to us — mostly that the tweets the
people who took part in that were mocking were no lamer than most adults'
tweets. A writer of ours, Hazel Cills, came up with the idea for
#followanadult and made the first tweet about it." Cills, who has been
tweeting things like "My adult works in media and hates New York
#followanadult," explained her reasoning in an email to the Wire as well:

I remember seeing a lot of #followateen tags on my Twitter feed and
thinking that was kind of weird and sort of mocking teens. The
#followanadult tag is kind of like teens saying "Okay adults, we see you,
we'll let you know how unintentionally hilarious you are too." I follow
mostly adults already, so all of my tweets are composites of a bunch of
adults I follow. I don't think the tag is really a parody, rather it's
turning that followateen tag back on its creators in a really funny way.

Gevinson, herself, has also been participating:

my adult is making yet another hilarious joke about google vs bing
#followanadult
— Tavi Gevinson (@tavitulle) May 3, 2013

my adult is offended by alleged misuse of the word "literally"
#followanadult
— Tavi Gevinson (@tavitulle) May 3, 2013

And others have joined in:

my adult is having anxiety because Joran van der Sloot will be out of
jail in 28 years. #followanadult
— rahima (@afdalxrahima) May 3, 2013

Given that this is all very insular, there are also some adults who just
want to be followed.

So what is all this? It's part social experiment, part inside joke, part
amusing Internet ephemera turned on its head. Here's what it looks like,
if your head isn't spinning:



Cern Re-creating First Web Page To Revere Early Ideals Comments


A team at the European Organisation for Nuclear Research (Cern) has
launched a project to re-create the first web page.

The aim is to preserve the original hardware and software associated with
the birth of the web.

The world wide web was developed by Prof Sir Tim Berners-Lee while
working at Cern.

The initiative coincides with the 20th anniversary of the research centre
giving the web to the world.

I want my children to be able to understand the significance of this
point in time: the web is already so ubiquitous - so, well, normal - that
one risks failing to see how fundamentally it has changed”

According to Dan Noyes, the web manager for Cern's communication group,
re-creation of the world's first website will enable future generations to
explore, examine and think about how the web is changing modern life.

"I want my children to be able to understand the significance of this
point in time: the web is already so ubiquitous - so, well, normal - that
one risks failing to see how fundamentally it has changed," he told BBC
News.

"We are in a unique moment where we can still switch on the first web
server and experience it. We want to document and preserve that".

The hope is that the restoration of the first web page and web site will
serve as a reminder and inspiration of the web's fundamental values.

At the heart of the original web is technology to decentralise control and
make access to information freely available to all. It is this
architecture that seems to imbue those that work with the web with a
culture of free expression, a belief in universal access and a tendency
toward decentralising information.
Subversive

It is the early technology's innate ability to subvert that makes
re-creation of the first website especially interesting.

While I was at Cern it was clear in speaking to those involved with the
project that it means much more than refurbishing old computers and
installing them with early software: it is about enshrining a powerful
idea that they believe is gradually changing the world.

I went to Sir Tim's old office where he worked at Cern's IT department
trying to find new ways to handle the vast amount of data the particle
accelerators were producing.

I was not allowed in because apparently the present incumbent is fed up
with people wanting to go into the office.

But waiting outside was someone who worked at Cern as a young researcher
at the same time as Sir Tim. James Gillies has since risen to be Cern's
head of communications. He is occasionally referred to as the
organisation's half-spin doctor, a reference to one of the properties of
some sub-atomic particles.
Amazing dream

Mr Gillies is among those involved in the project. I asked him why he
wanted to restore the first website.

"One of my dreams is to enable people to see what that early web
experience was like," was the reply.

"You might have thought that the first browser would be very primitive but
it was not. It had graphical capabilities. You could edit into it
straightaway. It was an amazing thing. It was a very sophisticated thing."
Continue reading the main story

One of my dreams is to enable people to see what that early web
experience was like... It was an amazing thing”

Those not heavily into web technology may be sceptical of the idea that
using a 20-year-old machine and software to view text on a web page might
be a thrilling experience.

But Mr Gillies and Mr Noyes believe that the first web page and web site
is worth resurrecting because embedded within the original systems
developed by Sir Tim are the principles of universality and universal
access that many enthusiasts at the time hoped would eventually make the
world a fairer and more equal place.

The first browser, for example, allowed users to edit and write directly
into the content they were viewing, a feature not available on present-day
browsers.
Ideals eroded

And early on in the world wide web's development, Nicola Pellow, who
worked with Sir Tim at Cern on the www project, produced a simple browser
to view content that did not require an expensive powerful computer and
so made the technology available to anyone with a simple computer.

According to Mr Noyes, many of the values that went into that original
vision have now been eroded. His aim, he says, is to "go back in time and
somehow preserve that experience".

"This universal access of information and flexibility of delivery is
something that we are struggling to re-create and deal with now.

"Present-day browsers offer gorgeous experiences but when we go back and
look at the early browsers I think we have lost some of the features that
Tim Berners-Lee had in mind."

Mr Noyes is reaching out to ask those who were involved in the NeXT
computers used by Sir Tim for advice on how to restore the original
machines.
Awe

The machines were the most advanced of their time. Sir Tim used two of
them to construct the web. One of them is on show in an out-of-the-way
cabinet outside Mr Noyes's office.

I told him that as I approached the sleek black machine I felt drawn
towards it and compelled to pause, reflect and admire in awe.

"So just imagine the reaction of passers-by if it was possible to bring
the machine back to life," he responded, with a twinkle in his eye.

The initiative coincides with the 20th anniversary of Cern giving the web
away to the world free.

Keeping the web free and freely available is almost a human right”

There was a serious discussion by Cern's management in 1993 about whether
the organisation should remain the home of the web or whether it should
focus on its core mission of basic research in physics.

Sir Tim and his colleagues on the project argued that Cern should not
claim ownership of the web.

Management agreed and signed a legal document that made the web publicly
available in such a way that no one could claim ownership of it and that
would ensure it was a free and open standard for everyone to use.

Mr Gillies believes that the document is "the single most valuable
document in the history of the world wide web".

He says: "Without it you would have had web-like things but they would
have belonged to Microsoft or Apple or Vodafone or whoever else. You
would not have a single open standard for everyone."

The web has not brought about the degree of social change some had
envisaged 20 years ago. Most web sites, including this one, still tend
towards one-way communication. The web space is still dominated by a
handful of powerful online companies.

But those who study the world wide web, such as Prof Nigel Shadbolt, of
Southampton University, believe the principles on which it was built are
worth preserving and there is no better monument to them than the first
website.

"We have to defend the principle of universality and universal access,"
he told BBC News.

"That it does not fall into a special set of standards that certain
organisations and corporations control. So keeping the web free and
freely available is almost a human right."



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT