Blog

  • Hacker and Security System

    If you see the title above will be remembered by the term Hacker, Cracker or even Carder. Many movies, novels or articles in magazines / newspapers that they will be reviewing it, actually who are they? Why now we need to concern about their eye out? Bbrp coincidence last week I was asked to fill out a seminar you know about Hacking & Networking on Linux in Jogja Expo Center.
    The word itself is often caused hacking means different, although the original is an activity to find out the weaknesses of a system and even how to improve the ability of a good system software or hardware. So take a particular skill, such as good programming skills or understanding of electronic hardware ttg great. Whereas in the film and the novel is described only as an activity to be breaking into a system to take an advantage. Perhaps the most appropriate description for the hacking is in the movie The Matrix Reloaded, where Trinity is using a tool nmap (Network Mapper). In addition, many movies are just playing with the animation for describing hackers. Too many do-just use another tool for artificial people through a system, without great effort, we often categorize them as just œScript Kiddiesâ â € €?? or children who play with a script someone else. Actually, to be a good hacker, many hrs do business better understand TCP / IP, learn programming etc..

    So why now we need to protect information systems in your company / organization we? Used at the time of the information system is still Closed Network and technology used its proprietary (pd specific certain companies), security threats are not so worry. Once we use the standard protocol TCP / IP (yg notebene elderly and simple), a network connected to the Internet, that’s when our system becomes an easy target for mischievous orang2 out there. But such conditions it requires, for example banks hrs open Internet Banking services, hotels or travel agents to provide Online Reservation, a company must provide an e-commerce site for customer convenience, etc..

    For that, I could not help the company must prepare a Security System (Security System) which according to the needs. One example is the firewall, such as self-employed security guard. Every guest went into an office, the guard will ask for the purpose, ask ID Card, then they will be recording our presence. The firewall will check every incoming access and compare with the policy, whether access is allowed or not. But it was not enough, then in the company must have installed CCTV Camera for supervising the activities inside. So although guests are allowed in, not necessarily that he did not do aneh2, for example, plant the bomb inside, steal something for take out, etc.. Usually Firewal addition, we will install IDS (Intrusion Detection System) which will oversee the data traffic, if any anomalies / peculiarities the IDS will alert could even get close the firewall for access connections at tsb.

    Also, still needed more Authentication system ensures access to-be who, whatever may be inside, and recording their activity. For securing the line in order not bugged, required encryption technologies (encryption) so that the data are not easily read by anyone. And also required a centralized system for supervising / configure all security systems, such as space-equipped security guard monitors and Button2 lot for various activities.

    Even more important is to teach to every user on the system for our company always careful when accessing a service exit. Type of attack-called Social Engineering Attack is an attack that utilizes user weaknesses. For example an email with the sender address for all users [email protected] request for to reply with include username and password, the reason will be upgraded to the new system. Or email asking us click to a website for downloading the latest antivirus demo, pdhl it is a virus or worm.

    So in securing a system, many things must be considered reply. Not just buying software or security devices and then just installed. Wow, so busy is also yes if a connected system exit. Hence there is a mantra in the world that the Security â € œThe most secure system is unconnected Systema €?? Â € |. or even if ya want to secure all follow his motto of Andrew S. Intel’s Grove is the founder of â € œOnly The Paranoid Surviveâ €??, Although it is actually more to the business strategy. Udahan dulu deh, meet again in another story.

    source : dagdigdug.com


  • Basic Computer System Security

    Written by Carter McNamara, MBA, PhD, Authenticity Consulting, LLC. Copyright 1997-2008.

    There are two kinds of security: data and break-in. Data security is addressed by having a good backup system (see next section on computer security). Break-in security is often a matter of using passwords to files or systems where possible, locking systems in offices and managing modem dial-in. Have the modem on only when sending or receiving.

    1. To avoid losing information stored on your computers when, e.g., a disk breaks (or “crashes”), ensure that computer files are regularly backed up to another media, e.g., backed up onto magnetic tapes, “zip” disk, CD-ROM, etc. Store the media offsite, that is, in a facility other than at your organization. If a disk crashes, you can repair the disk or get a new one and then restore the information from the backup media onto the new disk.Or, if backup media cannot be afforded (most are only a few hundred dollars), ensure files are stored on at least two different media devices, e.g., stored on an internal hard disk and then also on a diskette. Using a diskette as backup simply requires the computer user to occasionally save away his or her file to the diskette in addition to the hard disk. The same diskette can be used to backup files. Label the diskette with the time period during which files were backed up to it. Note that the major software applications themselves (Word, Excel, etc.) do not have to be backed up because the organization usually has the software application’s master diskettes. The most important items to backup are usually database files, spreadsheet files and large documents written by users. Conducting regular backups is more a matter of managerial policy than technical limitations.

    2. Use electrical surge protectors to ensure your computers will not experience sudden surges of electricity, e.g., during storms, if the quality of your electricity in your building is poor, or is the computer is turned off and on.

    3. Protect unauthorized access to computer files by using passwords to log-on to your system, if possible. Critical files can be copied onto two different diskettes (with one as a backup for the other) and both stored in locked drawers. Be sure to label the diskettes such that you’ll recognize them later by the name on the diskette label.

    4. Ensure that computers remain working as much as possible (that is, maximum their uptime) by recording and testing detailed procedures for all routine, but critical, tasks performed by staff on the computers and associated peripherals, e.g., for computer backups and restores, fixing recurring problems, etc. Locate and label the procedures in a central location of which all staff are aware.

    5. Develop competent internal technical support personnel who can help others to conduct basic activities on the computers and who can call outside consultants for troubleshooting when needed. Have one or two internal people who are designated as technical support contacts for other staff members.

    6. Instruct staff to report all problems to the internal technical support people. That way, the internal people are aware of all problems and are more likely to detect oncoming problems as early as possible. They also become better trained at detecting and diagnosing problems.

    7. Record all important phone numbers for technical support consultants or contacts, and ensure staff can find these numbers when needed.

    8. Keep all software documentation, such as manuals and guides, stored in a central location where staff can find them. Post a sheet on the wall so they can check documents out and for control to ensure they are returned.

    9. Promptly register all new software with the vendor to ensure you receive notification of regular software version updates and your eligibility to call the vendors for technical support if needed.

    10. Keep the serial numbers of all software packages in a clearly visible place for ease of reference when calling the software vendor’s technical support. (The vendor usually will ask you for the serial number to verify that you indeed purchased the software.)

    11. Note that if you dissemble your computer hardware, you risk losing coverage of your warranty. During your warranty period (which often covers labor during the first 90 days and hardware during the first one or two years), always call the vendor as soon as you suspect any problems. Problems usually occur during the first several weeks if they occur at all.

    12. Be sure to install a virus detector on your system. The detector should automatically check any new data brought into your system, for example, from diskettes, downloaded from the Internet, etc.

    13. Develop a disaster recovery plan. The plan should address contingencies. It should include procedures to respond to, e.g., if a disk crashes, if the computer quits working, if the network is down, if the building is somehow destroyed, etc.

    source : http://managementhelp.org


  • Brazil E-Voting Machines Not Hacked… But Van Eck Phreaking Allowed Hacker To Record Votes

    Last week, we noted that an attempt to let hackers crack e-voting machines in Brazil failed, but Slashdot points out that someone did use some Van Eck phreaking to figure out who people voted for. While that’s not quite the same as hacking the results of an election, it could lead to questions about privacy and how anonymous voting really is. Of course, to some extent, this has always been a risk with e-voting systems, but it hasn’t received that much attention.

    Permalink | Comments | Email This Story





  • New iPhone Ads From Apple Jab at Verizon

    AT&T wasn’t the only company that took offense to Verizon’s “There’s a Map for That” ad campaign and responded in kind. Monday night, Apple premiered two new iPhone ads that are actually aimed at pointing out the downsides of Verizon’s network, though they don’t state that outright.

    The two new ads, posted by BusinessWeek ahead of their U.S. television debut, depict different scenarios in which you want to access data-using features of your iPhone while also remaining on a call. This is something you can do on AT&T’s HSDPA/UMTS 3G network, but not something you can do using Verizon’s CDMA-based one.

    In the first ad, three different scenarios where you might want to check something without leaving your call are depicted. They include a client call, talking to a friend and changing a reservation, and talking to your wife and ordering flowers for your anniversary.

    The second ad depicts a single call with a friend, during which you can check movie times, location, and restaurant details. Both ads follow this post.

    The ads are clearly aimed at Verizon customers. I was actually completely unaware that the ability to use both voice calling and data access at the same time was even a feature. I do it constantly without even thinking about it. Would I miss it if I’d never had it to begin with? Hard to say.

    There’s another question the ads bring up. Does network reliability trump multitasking when it comes to cell phone usage? As convenient as it is to be able to pop in and out of the phone app to check on showtimes and other little luxuries, does it really matter if there are huge blackout zones where you can’t even take a call to begin with, let alone take one and use your network data simultaneously?

    In my opinion, these ads fare very poorly when compared to their Mac counterparts. The “Get a Mac” series of ads manages to target an Apple competitor cleverly, and in an entertaining fashion. Apple’s iPhone ads have never been anywhere near as good, but so far, they haven’t had to be. I’d expect more from Cupertino in response to the first real challenge to the iPhone’s market domination, Verizon’s Droid, than this sort of middle-of-the-road effort that doesn’t address the main concern customers wary of AT&T still have.

    Apple’s clearly doing this for AT&T, but both companies need to get their acts together if they want to counteract the clever work coming out of Verizon’s camp. Here’s a tip: A little Hodgman goes a Long way.


  • Check out the upcoming “Zombie Island DLC” trailer of Borderlands

    Gearbox Software’s upcoming downloadable content for Borderlands is said to add around six more hours of new gameplay. Titled “The Zombie Island of Dr…

  • Don’t Worry About Interest Rates — They’re A Phantom Menace

    PaulKrugman-0909-1

    A funny thing happened on the way to a new New Deal. A year ago, the only thing we had to fear was fear itself; today, the reigning doctrine in Washington appears to be “Be afraid. Be very afraid.”

    What happened? To be sure, “centrists” in the Senate have hobbled efforts to rescue the economy. But the evidence suggests that in addition to facing political opposition, President Obama and his inner circle have been intimidated by scare stories from Wall Street.

    Keep reading at NYT >

    Join the conversation about this story »

    See Also:

  • Economy and Forecasting: Bernanke, Plosser, U6 Unemployment, Velocity of Money, Zero Rates, Depression or Not?

    Bill-Coppedge original content selection by MortgageNewsClips.com

     

    fedresboard   and

    frb-philadelphia

    Speech – On the Outlook for the Economy and Policy – Chairman Ben S. Bernanke – At the Economic Club of New York, New York, New York – FRB Board

    and
    Bernanke hints low-rate period may get even longer – Bloomberg – Federal Reserve chairman Ben Bernanke’s diagnosis of a weak US economy and labour market signalled that the central bank’s extended period of low borrowing costs may get even longer.  Bernanke said that “significant economic challenges remain”, with lending constrained and the jobless rate above 10 per cent. – The Economic Times of India

    Speech: Food or Commodity Price Shocks and Inflation: A Central Banker’s Perspective –
    President Charles I. Plosser
    gives a central banker’s perspective on the challenges that volatility in food prices or other relative prices poses for monetary policy. He will discuss three approaches central bankers can take to protect their credibility to control inflation in the face of these price shocks. – Philadelphia FRB

    ————

    surlyU3U6to1900 surly-trader

    U6 Unemployment during the Great Depression – …  Unlike U3, U6 unemployment levels are a more complete  and broad picture of unemployment in the United States.  U6 includes U3, plus discouraged workers,  those working part time who want a full time position, plus marginally attached workers. U6 unemployment levels currently reside at 17.5% … – Surly Trader

    ————

    prieurvelocity-5

    prieur

    Velocity of US money supply at long last edging up – Posted by Prieur du Plessis – … Velocity of MZM is at long last picking up after it started falling in the first quarter of 2007 – six quarters before economic growth slumped. The increase in MZM velocity effectively points to increased economic activity. Further increases in this velocity are essential for sustained economic growth. … – Investment Postcards from Cape Town

    ————

    yahoo-news

    Americans save more but earn less as rates fall – By STEVENSON JACOBS – … Rates are falling near zero this time because of prudence, not panic. …  The dive in interest rates comes as Americans sock away more money. Today’s personal savings rate of 3 percent is nearly double that of a year ago. Economists say it could rise as high as 8 percent as households try to rebuild savings shredded by the recession. … – AP Yahoo

    ————

    seeking-alpha1

    25 Reasons We Will Not Have a Depression – Kimball Corson – Seeking Alpha

    vs
    10 Reasons to Believe That We’re in a Depression  – Marvin Clark – Seeking Alpha

  • DVD Customers are Not DVD Pirates

    I’ve published an op-ed over at The Wrap, a leading blog for Hollywood insiders. It makes the point that Hollywood’s attacks on DVD innovators (RealDVD, Kaleidescape, Redbox) amount to an attack on legitimate DVD customers who are trying to pay for content that they could almost as easily download for free from unauthorized sources. So, when Hollywood complains about “piracy,” some of that is a self-inflicted wound:

    But much of what Hollywood calls “piracy” may actually be consumer demand going unmet by legitimate supply. All too frequently, it is Hollywood’s own stubborn unwillingness to give law-abiding customers what they want that drives many of them to search out unauthorized alternatives. Consider Hollywood’s attitude toward DVDs. … Hollywood has been working overtime to make the DVD less attractive, less convenient and more expensive for law-abiding customers.

  • FCC Doesn’t Think The Lack Of Competition Is A Major Barrier To Broadband?

    Reader Kasey Krehbiel alerts us to some news coverage of the FCC’s recently released list of seven “critical gaps” in reaching universal broadband (pdf) and is rightfully surprised to note that a lack of competition in the marketplace is not on the list. Such an absence makes you wonder if the FCC is really paying attention. Most of the other “gaps” would quickly disappear if there were meaningful competition in the market — but we’ve never had a real policy of encouraging broadband competition in the US. Instead, policy has mostly been driven by incumbents who have lobbied hard for exactly the opposite.

    Permalink | Comments | Email This Story





  • Fesler-Moss shows off new line of tuned 2010 Camaros

    Filed under: , , ,


    2010 Fesler-Moss Camaros – Click above for high-res image gallery

    Back in April, we told you about the new partnership between Chris Fesler’s custom car shop and Jon Moss, the former director of General Motors’ specialty vehicles division. At that time, we only had renderings of the proposed Fesler-Moss Camaro, but these fresh photos of a pair of completed cars is evidence that the duo has been hard at work since then.

    The Fesler-Moss Camaro is currently available in two flavors. First up is the Competition Package, which commands a $50,000 price tag in addition to a donor car, and it mainly focuses on a variety of carbon fiber or billet body components, but it also features performance upgrades like a supercharger and six-piston brakes. For customers who want the ultimate Fesler-Moss Camaro, they can opt for the Limited Edition Package. This adds even more carbon fiber items, color-matched leather seating surfaces, a custom sound system, and best of all, swaps out the LS3 for a supercharged LS9 V8. Just sixty will be built at a daunting price tag of $150,000. Follow the jump for a full list of upgrades for each package.

    [Source: Fesler-Moss via SeriousWheels.com]

    Continue reading Fesler-Moss shows off new line of tuned 2010 Camaros

    Fesler-Moss shows off new line of tuned 2010 Camaros originally appeared on Autoblog on Mon, 23 Nov 2009 20:00:00 EST. Please see our terms for use of feeds.

    Read | Permalink | Email this | Comments

  • Prechter: Everyone Is Bullish Now, So 2010 Will Be A Year Of Horrible Market Declines

    Chart guru Robert Prechter was on Fast Money this evening, reiterating his comments about extreme declines. He states that bullishness has gone from 2% to 90% (though we’re not sure where that comes from), and that volume and breadth are down.

    Interestingly, when he was asked about gold, he demurred and said he was “very, very bullish” on the dollar.

    Join the conversation about this story »

    See Also:

  • Government Influences: Second Stimulus, Grass Fine$, Fed Scrutiny, Fed Warrant Sales, Ron Paul Bill on Fed

    Bill-Coppedge original content selection by MortgageNewsClips.com

     

    money-morning

    Is a Second U.S. Stimulus Package Headed Our Way? – By Jon D. Markman – Money Morning

    ————

    palm-beach-post

    revenue source? – Fines for too-tall grass could rise to $1,000 a day in Jupiter – By BILL DIPAOLO – Palm Beach Post  

    ————

    bloomberg

    Fed Makes Monitoring Capital Foremost Concern Amid Bubble Talk – By Craig Torres and Michael McKee – Federal Reserve officials are stepping up scrutiny of the biggest U.S. banks to ensure the lenders can withstand a reversal of soaring global-asset prices, according to people with knowledge of the matter. – Bloomberg

    ————

    nyt1

    Treasury to Auction Off Big-Bank Warrants – By ERIC DASH – … The Treasury will sell warrants that the government received as part of the taxpayer-financed rescue via auctions next month. The sales could raise $1.3 billion to $3.1 billion. The move will free the three banks — JPMorgan Chase, Capital One Financial and TCF Financial — from the Troubled Asset Relief Program, or TARP. … – NY Times 

    ————

    nyt-dealbook nyt1

    Panel Votes to Broaden Oversight of the Fed – … The House Financial Services Committee approved a measure proposed by Representative Ron Paul of Texas that would allow Congress to order audits of all the Fed’s lending programs as well as of its basic decisions to set monetary policy by raising or lowering interest rates, Edmund L. Andrews writes in The New York Times. … Fed officials have adamantly opposed the measure, saying it would undermine the central bank’s political independence and gravely threaten its credibility as a bulwark against inflation.  The vote on Thursday occurred despite the opposition of Representative Barney Frank, … – NYT Dealbook

  • Autoline on Autoblog with John McElroy

    Filed under:

    How to Raise the Gas Tax

    Raising taxes on gasoline is political suicide in the United States. Any politician foolish enough to propose raising the gas tax would be hounded out of office, or never elected in the first place. We, the American people, will see to that.

    You see, we don’t like taxes of any sort. And we especially hate gas taxes. Owning a car in America isn’t so much of a privilege as it is a necessity. Most our communities don’t have public transportation. So we need our wheels to get to work, or school, or going out for fun, or whatever else we want to do with them. In America, even the poorest among us drive cars. And none of us want the government taxing our mobility out of our reach.

    But maybe the problem is that the American people have never been properly sold on the need to raise the gas tax. Here’s my pitch.

    ____________________________________________________________________________________

    John McElroy
    is host of the TV program “Autoline Detroit” and daily web video “Autoline Daily”. Every week he brings his unique insights as an auto industry insider to Autoblog readers.
    ____________________________________________________________________________________

    Continue reading Autoline on Autoblog with John McElroy

    Autoline on Autoblog with John McElroy originally appeared on Autoblog on Mon, 23 Nov 2009 19:26:00 EST. Please see our terms for use of feeds.

    Permalink | Email this | Comments

  • Daily U-Turn: What you missed on 11.23.09

    First Drive: 2011 Buick Regal prototype looks to be a good sport

    GM’s batting average for selling rebadged Opels in the U.S. is practically nil, but the 2011 Buick Regal may be the exception that disproves the rule.

    Spy Shots: Next-gen Buick Excelle for China snapped

    Buick’s product renaissance is in full effect and the latest addition to the tribe is a Cruze-based compact spied in near-production guise.

    Daily U-Turn: What you missed on 11.23.09 originally appeared on Autoblog on Mon, 23 Nov 2009 19:20:00 EST. Please see our terms for use of feeds.

    Permalink | Email this | Comments

  • I See A Chiropractor, But My Neck Still Hasn’t Improved?

    This can often happen if heor she hasn’t prescribed you with any traction or exercises. The key to getting rid of the neck pain is taking pressure off the nerves.

    Essential to relieving nerve pressure is putting the spine in alignment. The chiropractic adjustments often do this temporarily, but without stretching the ligaments and strengthening certain muscles, it won’t hold.

    So the best bet to not only relieve the pain, but also correct the alignment, is to utilize some adjustments but also have a regimen of cervical traction. My recommendations for best results are to 1) use the traction pillow at night, 2) work up to 10 minutes – 20 minutes of the posture pump home neck traction 3-5 times per week in the beginning and 3) see your chiropractor periodically or as recommended.

    There are some other options out there as well. You may find one chiropractor works better for you than another, you may discover another doctor that helps you correct the spine, reduce stress, and improve your health. But the two best tools I have found thus far to help hold your adjustments and/or maintain your neck alignment are the cervical traction pillow and the cervical traction posture pump.

    Visit Arc4life.com for your online selection of cervical support neck pillows, orthopedic pain relief products and Home traction units. Products for pain relief.

    Add to Technorati Favorites Delicious
    Bookmark this on Delicious

    Stumble It!


  • SAIC-owned MG launches MG 6, first all-new car in 14 years

    Filed under: , ,

    2010 MG 6 – Click above for high-res image gallery

    The last new MG was the MGF sportscar way back in 1995, and oh, what a difference 14 years makes. The MG6 is the first new MG by the company’s new owner, Shanghai Automotive Industry Corp. (SAIC), and they’ve chosen a four-door liftback for their coming out party. About the size of a VW Golk/Skoda Octavia, the MG6 will be powered by either a naturally aspirated 1.8-litre four-cylinder with 133 brake horsepower and 135 pound-feet of torque, or a turbocharged 1.8-liter with 160 bhp and 158 lb-ft. Shifting is said to be via five-speed automatic.

    The MG 6 will go on sale in China first, but it has reportedly been engineered to meet global safety standards and is expected to be exported. SAIC hasn’t given any numbers or even locations for export yet, but the company president said they plan to produce it in the UK by the end of next year.

    Gallery: 2010 MG6

    [Source: Autoblog China (translated)]

    SAIC-owned MG launches MG 6, first all-new car in 14 years originally appeared on Autoblog on Mon, 23 Nov 2009 19:00:00 EST. Please see our terms for use of feeds.

    Read | Permalink | Email this | Comments

  • Carving down the slopes, puppy style

    Sympathy for skiing Ryder

    Editor, The Times:

    At first glance, prior to reading the caption of the photo of Bob Wenger and his 7-year-old dog Ryder, I was amused to see Ryder being carried by his owner like a piece of luggage [“Doggy Ryder rides show’s bunny slope,” NWSunday, Nov. 22]. But my amusement turned to pity for poor Ryder when I read Ryder was just a pawn and part of his owner’s idea of entertainment for a display at the convention center.

    I had to read it twice before I realized it was for SkiFever, a ski and snowboard show.

    Still, photos like this only encourage pet owners to believe animals are here for the owner’s entertainment. Ryder is a 7-year-old, which means he is entering his senior years. To be restricted and attached to doggy skis and forced down a grade of any length is cruel and dangerous for the elderly pooch.

    Would Wenger think it was entertaining if we took an elderly relative of his, strapped skis on this unsuspecting person, brought him or her to the top of a grade and pushed?

    — Barb Felts, Shoreline

  • Google Books Settlement 2.0: Evaluating Privacy

    This is the fourth in a series of posts about the proposed Google Book Search settlement.

    We have now examined the chief promised benefit (increased public access) of the proposed Google Books settlement, as well as one of the chief potential drawbacks (impaired competition). Another down-side to the proposed settlement is its lack of adequate protections for reader privacy. And although EFF has repeatedly written about the privacy problem and outlined specific steps that could be taken to address it, as have the ACLU, CDT, EPIC, library associations, and academic authors, the revised Settlement 2.0 still does nothing new to address the serious privacy concerns raised by the Google Book Search services.

    [Note: EFF represents a groups of authors and publishers who have filed an objection to the proposed settlement on privacy grounds, arguing that the lack of reader privacy protections is also a threat to the interests of authors and publishers, particularly of books on controversial or sensitive topics. This post, however, will focus on the interests of readers, rather than authors and publishers.]

    The Reader Privacy Problem

    The products and services envisioned by the proposed settlement will give Google not only an unprecedented abililty to track our reading habits, but to do so at an unprecedented level of granularity. Because the books will be accessed on Google’s servers, Google will not only know what books readers search for and access, but will also know which pages they read, how long they stayed on each page, what book they read before, and which books they access next. This is a level of reader surveillance that no library or bookstore has ever had.

    Readers who feel surveilled will be chilled in their freedom of inquiry. As Supreme Court Justice William O. Douglas observed in 1953, “Once the government can demand of a publisher the names of the purchasers of his publications . . . [f]ear of criticism goes with every person into the bookstall . . . [and] inquiry will be discouraged.” Or as Author Michael Chabon put it: “If there is no privacy of thought — which includes implicitly the right to read what one wants, without the approval, consent or knowledge of others — then there is no privacy, period.”

    And it’s not just Google that might want records about your reading habits. A core concern EFF has with the proposed settlement is that under it Google need not insist on a warrant before turning over this sensitive reader information to governmental authorities or private third parties. This is hardly a hypothetical risk: between 2001 and 2005, libraries were contacted by law enforcement seeking information on patrons at least 200 times. And in 2006 alone, AOL received almost 1,000 requests each month for information in civil and criminal cases.

    This lack of protections for reader privacy stands in sharp contrast to the privacy protections that librarians and bookstores have been fighting for in connection with physical books for decades. Nearly every state has laws protecting the privacy of library patrons. Yet when Google scans books it got from libraries, privacy protections could be left behind at the digital threshold if Google doesn’t stand up for them.

    Google’s Privacy Policy for Book Search

    Google has announced a privacy policy for Google Books. While it addresses some of the privacy concerns EFF and others had raised, it does not go nearly far enough. As we’ve previously explained, the privacy policy can be changed at any time, is not an enforceable obligation tied to the proposed settlement agreement, and:

    • as noted above, fails to commit to a “come back with a warrant” standard before disclosing reader information to the government;

    • fails to require Google to delete logging information about users within 30 days, or any other reasonably short period of time;
    • allows (albeit upon opt-in consent) Google to aggregate the information it learns about readers with other information it knows about readers from other sources, including its other services and its DoubleClick product that places cookie-traced advertising on millions of non-Google websites across the Internet;
    • fails to ensure that readers will always be able to use anonymity services like the Tor network, proxy servers and anonymous VPN providers to access Google Books;
    • does not offer registered users who purchase texts any equivalent of a “hiding books under their bed” to protect against parents, family members or other local users who might scrutinize their reading (we have suggested several ways that Google might implement a feature like this, and hope that Google will eventually do so);
    • does not allow purchasers to cover their reading tracks by anonymously transferring or giving purchases to accounts that do not have Google Checkout or other identifying features (we’ve also discussed technical methods for this with Google and believe they are seriously considering it);
    • fails to provide a robust, easy-to-read notice of and link to the Google Books privacy provisions on the Google Books pages themselves, rather than tucked away in a privacy policy;
    • fails to promise to annually publish online, in a conspicuous and easily accessible area of its website, the type and number of requests it receives for information about Google Book Search users from government entities or third parties; and
    • fails to require Google to store information about readers, who must be in the U.S. under the terms of the settlement, in the U.S. so that they will be protected by U.S. privacy laws.

    For all of these reasons, in its present form and without further affirmative steps by Google either in the context of the settlement or outside it, the proposed Settlement 2.0 makes Google Books a threat to reader privacy, which in turn is a serious a down-side that must be weighed against the settlement’s potential benefits.

  • The Times kicks off its annual Fund For The Needy

    Should have left Salvation Army in the cold

    It is unfortunate that The Seattle Times has once again included the Salvation Army as one of its Fund For The Needy recipients [“When times are tough, finding a way to give,” page one, Nov. 22]. This is inappropriate for two reasons.

    First, the primary mission of the Salvation Army, which describes itself as evangelical, is to preach the gospel of Jesus Christ. For example, hungry men who want a meal must first sit through Christian sermons.

    The Salvation Army is certainly free to push its religion on the vulnerable, but it’s offensive for The Times to ask a diverse community — including Jews, Hindus, atheists, and other non-Christians — to support Christian proselytizing. There are many organizations, such as Northwest Harvest, that help those in need without also trying to convert them.

    Second, the Salvation Army discriminates. In 2001, it agreed to back former President George W. Bush’s faith-based initiative if Bush pushed for regulations allowing the Salvation Army to discriminate against gays when filling taxpayer-funded jobs and providing domestic-partner benefits. In 2005, the Salvation Army won a court case that allowed it to fire non-Christian employees, even though those positions were publicly funded.

    Finally, The Times article never mentioned the evangelical nature of the Salvation Army when asking for donations. Just slipped your mind?

    — Matthew J. Barry, Issaquah

  • Education issues rain on the Emerald City, Evergreen State

    B minus warrants a bonus in Seattle Public Schools

    One can’t fault Superintendent Maria Goodloe-Johnson [“Bonus for supe with a B minus?,” NWSunday, Nov. 22], the contract and job evaluation is the doing of the board. The voters who elected them are ultimately responsible.

    The superintendent’s job is an impossible one. She must be crazy, as she must know that an enterprise cannot be managed when the workers union is in charge.

    Columnist Danny Westneat was right, in part —teachers aren’t in it just for the money but for the security, tenure, the right to sit on their butts and complain.

    The only way out of this mess is to give parents and their children choice —what school to attend. People have a choice in where to worship or not where to shop, whom to love. Why not a choice of an environment that makes it possible to learn?

    — Jim Ewins, Seattle

    Lower standards, scores, expectations. What’s next?

    Let’s see. The achievement standards have been lowered to suit the scores of the students. Teachers can’t even teach to the test. And now we’re giving students even longer to learn how to add and what an animal is [“Finally getting it right on math and science,” Opinion, Randy Dorn guest commentary, Nov. 19].

    Could our standards and expectations get any lower? So far, when in doubt, we make the test fit our scores.

    Why don’t we just give the kids the answers in the back of the test and see if they can find them?

    — Lucy Stimmel, Kirkland

    State’s superintendent of instruction weighed in

    The Nov. 19 Seattle Times had two articles, by and about State Superintendent of Public Instruction Randy Dorn, in which we find a proposed way to continue to delay meeting the required level of student learning [“State school chief seeks later dates for passing tests,” NWThursday].

    Dorn says he is concerned about how few students are passing state tests in math and science.

    His solution is to do the same thing that the education system has been doing, then wait a couple years and things will be better.

    It sometimes is forgotten that the education-reform bill was passed in 1993, and by now they should have their act together. The object was to define the knowledge and skills required of our high-school graduates, then tune the teaching and testing accordingly.

    It isn’t satisfactory to have them almost good enough by using a second-tier test. If the WASL can be considered to be the filter that students go through to show they have the knowledge and skills for success in life, then use it.

    Our students and our nation are at risk.

    The change needs to be in the education system. Students can learn math and science and they must. No excuses.

    — Robert J. Feutz, Redmond

    Bullying, violence must stop in Seattle high schools

    My nephew is mentally handicapped, socially. He has been diagnosed with Asperger’s syndrome, a form of Autism. He is now 16 years old, and although my sister repeatedly begged for assistance from the state for this disease of the mind, her cries for help fell on deaf ears.

    He is now a sophomore at a Seattle high school and has been bullied, laughed at, taunted and even teased by older girls at his school, so that others would laugh at him. My sister had argued repeatedly to the school officials to have her son transferred, but they would not accommodate her wishes. Recently, a female senior at this high school played a prank on him, teasing him into thinking she wanted to be his girlfriend. Naturally he reacted, and she then charged him with assault.

    If we are dealing with a normal sophomore, a case can be made for bullying, since this not only involved her, but a large group of kids at this high school. Since this was done to a mentally handicapped kid, with school officials ignoring repeated requests for special treatment and/or transferring from this school, we are looking at possible criminal charges being filed at the Seattle school district.

    Sarah Palin has a mentally handicapped son, Jim Carrey is helping raised Jenny McCarthy’s autistic son. Many families have children who are potential victims to bullies at school.

    When will we recognize that this violent behavior must end, and that special attention be paid to those who are mentally handicapped and therefore prone to a type of bullying children without mental handicaps could or could not overcome?

    — David Martin, Lynnwood