To exact their revenge, gamers have turned their vitriol on Cooper Lawrence, an author who appeared to mischaracterize the game when she said: “Here’s how they’re seeing women: They’re seeing them as these objects of desire, as these, you know, hot bodies. They don’t show women as being valued for anything other than their sexuality. And it’s a man in this game deciding how many women he wants to be with.”
[…] Irate gamers have flooded the page on Amazon.com selling Ms. Lawrence’s most recent book, “The Cult of Perfection: Making Peace With Your Inner Overachiever,” sending its user-generated rating into oblivion.
By Friday afternoon 412 of the book’s 472 user reviews were the lowest possible rating, one star. Another 48 ratings were for two stars. Only 12 of the ratings were for three stars or higher. In addition, 929 Amazon users had tagged the book with the keyword “ignorant.” Tied for second place with 744 tags were “garbage” and “hypocrisy,” while “hack” and “hypocrite” tied for fourth place with 710 votes. Gamers have also attacked the book on the Barnes & Noble Web site.
Just in case you were wondering which political party is always ready to take the lead in the race to the gutter — and I know plenty of otherwise prudish folks who will happily snigger when talking about this 527: Citizens United Not Timid [via BroadSheet]
Later: More from Broadsheet — Life’s a bitch, and so are all the anti-Hillary slogans
For months, Mr. Murdoch, who took control of the paper in December, has vacillated publicly over whether to maintain its subscription firewall. But officials at his company, News Corporation, say that this time, a decision has actually been made to keep it — for now, at least.
Speaking at the World Economic Forum in Davos, Switzerland, Mr. Murdoch said that the pages on WSJ.com “giving the greatest insights, that will still be a subscription service,” according to Reuters.
People at News Corporation who have been briefed on the matter confirmed that the policy had been settled, in general terms.
Well, in general terms, I’m sure lots of things can be said. The real question is what, specifically, is going to happen, and that seems to be up in the air still.
Some activist groups say Dr. Venter is going too far, too fast, this time, and that the entire field of synthetic biology needs outside regulation to prevent the introduction of dangerous organisms, created either by evil intent or by innocent error.
“The fact that he’s pushing ahead with this without any societal oversight is very worrying,” said Jim Thomas, a program manager at the ETC Group, an activist group based in Canada. He also said it was worrisome that Dr. Venter was applying for very broad patents that could give him a near monopoly over the field of synthetic organisms.
Dr. Venter said the synthetic biology field has been discussing ethics and safety steps since it started and that his work had been reviewed by ethicists.
Any connection between The Washington Post putting this article on its front page and Dick Cheney bullying Congress into capitulating over telecom amnesty? (pdf): Terrorism Probe Points to Reach Of Web Networks — pdf
Analysts said it also provides a glimpse of the growing threat posed by radical networks that have sprung up as a result of the Internet. One of the men, Syed Haris Ahmed, told authorities that they got to know extremists through Web forums and chat rooms, and they uploaded their D.C. surveillance video to “Jihadi people” online.
For a terrorist organization, “it doesn’t matter anymore where your location is, and how many visa requirements” a country has, said Rita Katz, director of the SITE Intelligence Group, which researches Muslim extremists and their online activity. “Being on the virtual network, [terrorists] have people virtually all over the world.”
[…] The heart of the government’s case became clear last week: 12 hours of FBI interviews with Ahmed. During the questioning, agents informed Ahmed that they had e-mails, videos and other materials linking him to suspicious activity, according to transcripts released in court. The Pakistani-American college student acknowledged that he and his friend had been in contact with foreign extremists and had discussed attacking targets in the D.C. area and elsewhere, transcripts of the interviews revealed.
Record companies’ revenue from digital music sales rose 40 percent to $2.9 billion over the past year, but the growth is still failing to cover losses from collapse of international CD sales, the music industry’s global trade body said Thursday.
The International Federation of the Phonographic Industry, or IFPI, said the increase in legitimate music sales did not come close to offsetting the billions of dollars being lost to music piracy, with illegal downloads outnumbering the number of tracks sold by a factor of 20-to-1.
But the trade group said it welcomed efforts by French President Nicholas Sarkozy, who has proposed a clampdown on those who violate copyright laws.
Sarkozy called in November for Internet service providers in France to automatically disconnect customers involved in piracy.
Later: The NYTimes version raises an interesting angle — Digital Music Sales Grow, but at Slower Rate
In the meantime, the recording industry is broadening its search for revenue. The trade group plans to step up a campaign to hold Internet providers responsible for stopping piracy over their networks, Mr. Kennedy said. It is lobbying the United States government to recognize a form of copyright that has provided musicians with a steady royalty stream in Europe and elsewhere.
The IFPI Digital Music Report for 2008 [local copy] makes the Sarkozy plan a centerpiece of its argument that ISPs should “take responsibility” (shades of AT&T, which is cited for its position!) for illegal content on their networks. However, there doesn’t seem to be any discussion of this US lobbying cited in the NYTimes article.
But we do get to see this sort of thing, repeated throughout:
After years of prevarication in this discussion, the French government’s decision to “seize the day” is deeply refreshing. It shows an urgency of approach that is badly needed in every market where music is today being massively devalued by piracy.
In Europe, we look to the European Union to capitalise on the momentum created by the Sarkozy Agreement. The moment for EU legislation to be drawn up has already arrived. There must be obligations on the ISPs to warn, suspend and eventually disconnect infringing users and to apply filtering measures. This should be achieved by agreements, backed by legislation where necessary. At the same time, we as an industry will not be shy to use legal action to force ISPs to act when dialogue fails but I would like to think that they now understand that meaningful voluntary action is a more attractive option than coercion – we have always advocated that!
A story that brings back Larry Lessig’s characterization of a “threatening” collection of Internet innovators: Va. Student’s Snow-Day Plea Triggers an Online Storm — pdf
[A] phone call to a Fairfax County public school administrator’s home last week about a snow day — or lack of one — has taken on a life of its own. Through the ubiquity of Facebook and YouTube, the call has become a rallying cry for students’ First Amendment rights, and it shows that the generation gap has become a technological chasm.
It started with Thursday’s snowfall, estimated at about three inches near Lake Braddock Secondary School in Burke. On his lunch break, Lake Braddock senior Devraj “Dave” S. Kori, 17, used a listed home phone number to call Dean Tistadt, chief operating officer for the county system, to ask why he had not closed the schools. Kori left his name and phone number and got a message later in the day from Tistadt’s wife.
“How dare you call us at home! If you have a problem with going to school, you do not call somebody’s house and complain about it,” Candy Tistadt’s minute-long message began. At one point, she uttered the phrase “snotty-nosed little brats,” and near the end, she said, “Get over it, kid, and go to school!”
Not so long ago, that might have been the end of it — a few choice words by an agitated administrator (or spouse). But with the frenetic pace of students’ online networking, it’s harder for grown-ups to have the last word. Kori’s call and Tistadt’s response sparked online debate among area students about whether the student’s actions constituted harassment and whether the response was warranted.
Kori took Tistadt’s message, left on his cellphone, and posted an audio link on a Facebook page he had created after he got home from school called “Let them know what you think about schools not being cancelled.” The Web page listed Dean Tistadt’s work and home numbers.
The real estate investors packing the Renaissance Hollywood Hotel in Los Angeles this week dont have to worry about interest rates, exploding mortgages and foreclosures. The addresses they buy and sell are on the Internet, where a good name might attract millions of people and pull in big bucks from advertising.
As with real-world property speculation, the Internet domain name business is built on limited supply and high hopes. It has booms and busts, rising corporate powers and rookies who wished theyd bought in the 1990s. Two of the biggest practitioners, Oversee.net and Demand Media Inc., are based in the Los Angeles area and have collectively received more than $450 million in venture capital investment to fuel domain name buying sprees.
The bidding paddles flew Tuesday and Wednesday in the hotel ballroom at DomainFest, a yearly gathering of participants in this highly specialized and lucrative business.
Individual speculators and deep-pocketed companies snapped up domains such as Porn.net for $400,000, Bookmarks.com for $300,000, Alimony.com for $75,000, Butcher.com for $50,000 and Satinpanties for $10,000.
Readers of the Comics Curmudgeon will recognize this article’s author, which is certainly related: Five ho-hum domain names and their curious stories (pdf)
From MIT’s student paper, The Tech: RIAA Sends Institute 19 Settlement Letters Alleging Infringement — pdf
The RIAA identified alleged infringers by looking at their IP addresses. Since the RIAA cannot obtain the names of people connected with the IP addresses without a court order, it instead sent its demand letters directly to MIT and requested that the Institute forward the letters to the community members. MIT complied with the RIAA’s request and has forwarded the letters to the computer users corresponding to those addresses.
These requests come as part of the latest wave of 407 RIAA letters sent to college students from universities across the country this month. The RIAA has sent thousands of such letters in batches since February 2007. This is the third time that the RIAA has sent letters to groups of MIT affiliates: 23 letters were sent in May 2007, and 30 were sent in September 2007.
By asking for settlements in these letters, the RIAA avoids ordering costly subpoenas that force universities to release the identities of alleged infringers and following up on those subpoenas with copyright infringement lawsuits. The letters also, according to the RIAA, “provide students the opportunity to resolve copyright infringement claims against them at a discounted rate before a formal lawsuit is filed.” […]
A provocative little article [via Machinist], suggesting that, under current precedent, an iPhone may be considered a container (see also the Boucher postings here): The iPhone Meets the Fourth Amendment by Adam Gershowitz
Imagine that Dan Defendant is stopped by the police for driving through a stop sign. The officer thinks that Dan looks suspicious, but has no probable cause to believe he has done anything illegal, other than driving recklessly. Nevertheless, because running a stop sign is an arrestable offense and the officer is suspicious that Dan might be involved in more serious criminal activity, the officer arrests Dan for the traffic violation.
Under the search incident to arrest doctrine, officers are entitled to search the body of the person they are arresting to ensure that he does not have weapons or will not destroy any evidence. The search incident to an arrest is automatic and allows officers to open containers on the person, even if there is no probable cause to believe there is anything illegal inside of those containers. For instance, a standard search incident to arrest often turns up drugs located in a small container such as a cigarette pack. Yet, Dan does not have a cigarette pack in his pocket; instead, like millions of other technophiles, Dan is carrying an iPhone.
The officer removes the iPhone from Dan’s pocket and begins to rummage through Dan’s cell phone contacts, call history, emails, pictures, movies, and, perhaps most significantly, the browsing history from his use of the internet. In addition to finding Dan’s personal financial data and embarrassing personal information, the police also discover incriminating pictures of stolen contraband, emails evidencing drug transactions, and internet surfing of websites containing child pornography. Is all of this evidence admissible even though Dan has only been arrested for a traffic infraction and there was no probable cause (not to mention no warrant) to search the contents of his iPhone? When one considers the breadth of information located in Dan’s iPhone, it would seem shocking that officers need no suspicion whatsoever in order to search through that information. Yet, that conclusion appears to follow from longstanding Supreme Court precedent laid down well before handheld technology was even contemplated.
This essay demonstrates how the full contents and multiple applications of iPhones can be searched without a warrant or probable cause under existing Supreme Court precedent. The essay also offers approaches courts and legislatures might adopt to ensure greater protection for the soon to be pervasive iPhone devices.