Great Firewall of China, Olympic version

From Technology Review

At the Beijing Olympics, foreign journalists may encounter systems designed to give the false appearance that Chinese Internet controls are minimal, according to Ronald Deibert, an associate professor of political science and director of the Citizen Lab at the Munk Centre for International Studies at the University of Toronto. Today, Deibert, whose research group makes the censorship-circumvention tool Psiphon, will address the Beijing Olympics and other issues related to Chinese censorship in testimony to the U.S. China Economic and Security Review Commission in Washington, DC, as part of a hearing on access to information and media control in China…

Security mania targets amateur snappers

Extraordinary story on BBC News Magazine.

Misplaced fears about terror, privacy and child protection are preventing amateur photographers from enjoying their hobby, say campaigners.

Phil Smith thought ex-EastEnder Letitia Dean turning on the Christmas lights in Ipswich would make a good snap for his collection.

The 49-year-old started by firing off a few shots of the warm-up act on stage. But before the main attraction showed up, Mr Smith was challenged by a police officer who asked if he had a licence for the camera.

After explaining he didn’t need one, he was taken down a side-street for a formal “stop and search”, then asked to delete the photos and ordered not take any more. So he slunk home with his camera…

This is ludicrous. It’s also unlawful.

“If you are a normal person going about your business and you see something you want to take a picture of, then you are fine unless you’re taking picture of something inherently private,” says Hanna Basha, partner at solicitors Carter-Ruck. “But if it’s the London Marathon or something, you’re fine.”

There are also restrictions around some public buildings, like those involved in national defence.

But other than that, you’re free to click.

There’s some very helpful advice in the comments on this post:

Take some photos of the police who are trying to stop you taking photos. Then tell them you are within your rights to do so and you will not delete them and if they arrest you then you will pursue a case of wrongful arrest. They really hate that.

Thanks to James Miller for spotting it.

Swiss bank sees reason? Surely not

It’s the next stage in the WikiLeaks story. According to the New York Times Blog today,

A Swiss bank on Wednesday moved to withdraw a lawsuit that it had filed against a Web site that it claimed had displayed stolen documents revealing confidential information about the accounts of the bank’s clients.

Lawyers involved in the case said the move by Bank Julius Baer most likely ends its battle against Wikileaks, a Web site that allows people to post documents anonymously “to be of assistance to people of all regions who wish to reveal unethical behavior in their governments and corporations.”

The bank last month obtained an order from U.S. District Judge Jeffrey S. White in San Francisco that obstructed, but did not absolutely prevent, access to material posted on Wikileaks by turning off the domain name wikileaks.org. The judge’s action drew a flurry of media attention and a barrage of legal filings by media and other organizations arguing that the order violated the freedom of speech protected by the First Amendment.

After a hearing on Friday, Judge White withdrew that order, saying that he was worried about its First Amendment implications and that he thought it might not be possible to prevent viewing of the documents once they had been posted on the Web anyway.

It’s been a huge PR disaster for them — and succeeded mainly in convincing people that there might be something fishy going on. Talk about shooting yourself in the foot!

Russian ‘democracy’

Interesting — though unsurprising — piece in this morning’s New York Times…

A new autocracy now governs Russia. Behind a facade of democracy lies a centralized authority that has deployed a nationwide cadre of loyalists that is not reluctant to swat down those who challenge the ruling party. Fearing such retribution, many of the people interviewed for this article asked not to be identified.

The government has closed newspapers in St. Petersburg and raided political party offices in Siberia. It was hardly unusual when in Samara, in the nation’s center, organized crime officers charged an opposition campaign official with financial crimes shortly before the December parliamentary elections and froze the party’s bank accounts.

Here in this historic region on the Volga River, Mr. Putin’s allies now control nearly all the offices, and elections have become a formality. And that is just as it should be, they said.

“In my opinion, at a certain stage, like now, it is not only useful, it is even necessary — we are tired of democratic twists and turns,” said the leader of Mr. Putin’s party in Nizhny Novgorod, Sergei G. Nekrasov. “It may sound sacrilegious, but I would propose to suspend all this election business for the time being, at least for managerial positions.”

Er, the UK is now dependent for its gas on this new model state.

Look before you censor

There’s been a sudden surge of interest in the activities of a hitherto-unknown Cayman Islands bank named Julius Baer ever since the bank persuaded a dozy judge to shut down the Wikileaks whistleblowing site. Bob Cringeley has some interesting things to say about the debacle.

Personally, I don’t think Baer was overly concerned the world would know its Cayman branch (allegedly) exists to launder money and avoid taxes. I think the bank didn’t want its rich, extremely powerful, allegedly money laundering/tax evading clientele to be exposed. Bad for business, you know.

But the bank’s solution is so mind-bogglingly stupid, you have to wonder if these guys need help getting their pants on each morning.

First, this is exactly the kind of story bloggers and Net-centric journos crave. Big nasty corporation stomps all over plucky public-serving underdog. Who can resist that plot line?

Second, the equation Bank Julius Baer = Money Laundering is now firmly cemented in the minds of everyone who has encountered this story, regardless of whether it’s true.

Trois: The documents in question, which might have been quickly forgotten alongside the 1.2 million others on the site, are now hotter than the Paris Hilton sex video. Dozens of mirror sites have sprung up, and Cryptome.org and PirateBay have squirreled away copies of the docs for any interested parties.

Oh, and by the way, the judge’s order failed to shut down the site. The IP numbers (88.80.13.160) still work, as do its Belgian and Christmas Island domains. Or they would, only last time I checked the sites were overwhelmed with traffic from people with a sudden keen interest in Cayman Islands banking…

Federal Court decides that cease-and-desist letters are protected by copyright

Interesting decision.

Glen Allen, VA (PRWEB) January 24, 2008 — The US District Court for the District of Idaho has found that copyright law protects a lawyer demand letter posted online by the recipient … The copyright decision… is the first known court decision in the US to address the issue directly. The Final Judgment calls into serious question the practice of posting lawyer cease and desist letters online, a common tactic used and touted by First Amendment groups to attack legal efforts at resolving everything from defamation to intellectual property disputes.

In September 2007, Dozier Internet Law, a law firm specializing exclusively in representing business interests on the web, was targeted online by “free speech” and “public participation” interests for asserting copyright ownership rights in a confidential cease and desist letter sent to a “scam reporting site”. The issue generated online buzz in the US with commentators such as Google’s lead copyright counsel and Ralph Nader’s Public Citizen attacking the practice as unlawful, and Dozier Internet Law responding. Bloggers from around the world soon joined the debate, reeling at the thought of losing a valuable counter-attack tool.

The Court, in its decision, found that a copyright had been adequately established in a lawyer’s cease and desist letter. The unauthorized publication of the letter, therefore, can expose the publisher to liability. Statutory damages under the US Copyright Act can be as much as $150,000 per occurrence plus attorneys’ fees that can average $750,000 through trial. The publisher of the letter raised First Amendment and “fair use” arguments without success.

Has AT&T lost its marbles?

Tim Wu has an intriguing piece in Slate Magazine in which he ponders the implications of AT&T’s announcement that it is seriously considering plans to examine all the traffic it carries for potential violations of U.S. intellectual property laws. (A similar idea is about to be foisted on UK ISPs by Gordon Broon & Co.)

“No one knows exactly what AT&T is proposing to build”, he writes. “But if the company means what it says, we’re looking at the beginnings of a private police state. That may sound like hyperbole, but what else do you call a system designed to monitor millions of people’s Internet consumption? That’s not just Orwellian; that’s Orwell.”

That’s just the civil libertarian aspect of the idea. The interesting thing is that the commercial downsides could be catastrophic — for AT&T.

The most serious problems for AT&T may be legal. Since the beginnings of the phone system, carriers have always wanted to avoid liability for what happens on their lines, be it a bank robbery or someone’s divorce. Hence the grand bargain of common carriage: The Bell company carried all conversations equally, and in exchange bore no liability for what people used the phone for. Fair deal.

AT&T’s new strategy reverses that position and exposes it to so much potential liability that adopting it would arguably violate AT&T’s fiduciary duty to its shareholders. Today, in its daily Internet operations, AT&T is shielded by a federal law that provides a powerful immunity to copyright infringement. The Bells know the law well: They wrote and pushed it through Congress in 1998, collectively spending six years and millions of dollars in lobbying fees to make sure there would be no liability for “Transitory Digital Network Communications”—content AT&T carries over the Internet. And that’s why the recording industry sued Napster and Grokster, not AT&T or Verizon, when the great music wars began in the early 2000s.

Here’s the kicker: To maintain that immunity, AT&T must transmit data “without selection of the material by the service provider” and “without modification of its content.” Once AT&T gets in the business of picking and choosing what content travels over its network, while the law is not entirely clear, it runs a serious risk of losing its all-important immunity. An Internet provider voluntarily giving up copyright immunity is like an astronaut on the moon taking off his space suit. As the world’s largest gatekeeper, AT&T would immediately become the world’s largest target for copyright infringement lawsuits….

Tim Wu is a great commentator on this stuff, and this is an especially good piece.

Italian bloggers to be officially registered?

Hmmm… This is one of those cases wehre the cock-up theory of history probably provides the best explanation. But here’s The Register’s take on the story so far:

Italian bloggers may be required to register with a national database, unless an ambiguously-worded new law is amended before it comes into force.

Widespread outrage among bloggers and IT-savvy journalists has reached the mainstream press, and the government now appears to be keen to revise a draft law which has led politician Francesco Caruso to remark: “This is Italy, not Burma.”

The law got its initial approval from Mr Prodi’s Cabinet of Ministers in mid-October, as part of a package attempting to tidy up Italy’s publishing-related regulations, and requires further approvals before coming into force.

According to many legal experts, the murky text of the law (pdf) can be construed to include non-professional, not-for-profit blogs and websites among “editorial products”, giving them the same duties and liabilities as magazines and newspapers.

This would require even the lowliest Italian blogger or MySpace account holder to go through the hassle of filing personal details with the national registry of “communication operators” currently reserved for professionals of the publishing sector.

And The Register’s conclusion?

The chances of this law becoming effective in its current form are exceedingly slim, so there is no immediate cause for concern. The blog brouhaha may turn out to be another storm in a teacup, but it has certainly shown Italian netizens once again that their government is remarkably out of touch with the realities of the internet age.

Neat work, AP

Associated Press have done a really neat piece of detective work to investigate rumours of dirty tricks by Comcast, a US ISP.

NEW YORK (AP) – To test claims by users that Comcast Corp. was blocking some forms of file-sharing traffic, The Associated Press went to the Bible.

An AP reporter attempted to download, using file-sharing program BitTorrent, a copy of the King James Bible from two computers in the Philadelphia and San Francisco areas, both of which were connected to the Internet through Comcast cable modems.

We picked the Bible for the test because it’s not protected by copyright and the file is a convenient size.

In two out of three tries, the transfer was blocked. In the third, the transfer started only after a 10-minute delay. When we tried to upload files that were in demand by a wider number of BitTorrent users, those connections were also blocked.

Not all Comcast-connected computers appear to be affected, however. In a test with a third Comcast-connected computer in the Boston area, we were unable to test with the Bible, apparently due to an unrelated error. When we attempted to upload a more widely disseminated file, there was no evidence of blocking.

The Bible test was conducted with three other Internet connections. One was provided by Time Warner Inc.’s Time Warner Cable, and the other came from Cablevision Systems Corp. The third was the business-class connection to the AP’s headquarters, provided by AT&T Inc. and Cogent Communications Group Inc.

No signs of interference with file-sharing were detected in those tests.

Further analysis of the transfer attempt from the Comcast-connected computer in the San Francisco area revealed that the failure was due to ”reset” packets that the two computers received, carrying the return address of the other computer.

Those packets tell the receiving computer to stop communicating with the sender. However, the traffic analyzer software running on each computer showed that neither computer actually sent the packets. That means they originated somewhere in between, with faked return addresses…

It seems that Comcast uses Sandvine traffic-shaping hardware to limit the effectiveness of BitTorrent seeding. The goal is to manage BitTorrent traffic without tipping off mainstream users that it’s being done. This source cites Robb Topolski’s explanation of how it’s achieved:

“The Sandvine application reads packets that are traversing the network boundary. If the application senses that outbound P2P traffic is higher than a threshold determined by Comcast, Sandvine begins to interrupt P2P protocol sequences that would initiate a new transfer from within the Comcast network to a peer outside of the Comcast network. The interruption is accomplished by sending a perfectly forged TCP packet (correct peer, port, and sequence numbering) with the RST (reset) flag set. This packet is obeyed by the network stack or operating system which drops the connection.”

I love the idea of using the Bible as the test file. Reminds me of Larry Lessig’s report of coming into his office in Stanford one morning to find the network police waiting for him, grimly announcing that it had been discovered that he had P2P software installed on his computer. Larry explained that he used P2P as a way of distributing his own publications — intellectual property that he owned. The idea that there might be legitimate uses for P2P had clearly never occurred to the management.

And that’s in Stanford!

Later: Ed Felten has also commented on Comcast’s traffic shaping practices.