Sunday, December 30, 2007

Holiday Spam Scams Increases

With online holiday shopping already breaking records and predicted to increase an overall 20 percent through December*, cyber-crooks have been hard at work spreading their own brand of holiday cheer -- holiday spam. This year marks an all time high for spam, accounting for 10.8 trillion messages, according to industry market researcher IDC. With the start of the holiday season Nov. 23, holiday spam has spiked, representing an initial 6 percent increase over pre-Thanksgiving levels—with more to come, warns SPAMfighter http://www.spamfighter.com/, an international spam security and filtering company. Consumers need to take more precautions this season and update their spam protection now to combat spam growth expected through the end of the year.

"Spammers are banking on the fact that millions of less cyber-savvy consumers are spending more time online to get the best deals and gifts, but haven't taken the time to secure their PCs or update their spam protection," said Alix Aranza, Managing Director, SPAMfighter North America. "This year consumers need to be especially careful and guard against more advanced techniques and aggressive spam offers."

To ensure a safe and secure holiday shopping experience, SPAMfighter recommends consumers keep the following tips in mind:

• Never make a purchase or donate money through an unsolicited e-mail offer. If the offer sounds too good to be true, it probably is a scam. Holiday charity scams are a favorite technique of spammers and crooks. Donate through the trusted organization's Web site directly. Consumers should create a separate free e-mail account for online shopping to avoid potential spam and to keep track of online purchases.

• Before you shop online, download the latest spam filter protection – don't rely on a PC program from last year or the PC manufacturer to send you a reminder. Spam and virus filtering protection should be upgraded, at a minimum, once a year or more, depending upon Web visits. SPAMfighter, for example, is constantly monitoring new spam scams and automatically offers new upgrades to customers.

• Don't open holiday e-cards from unknown senders. This is a primary way for spammers to replicate and send malicious malware such as the Storm Worm, to hijack unprotected PCs and turn these into spam machines.

• Watch out for higher levels of phishing e-mails. These are legitimate-looking e-mails from what appears to be a trusted, well-known brand, such as your bank or popular sites, like eBay and Amazon. In reality, this spam seeks to steal personal or financial information by redirecting the e-mail user to a fake, but very real-looking Web site, that asks for confidential or personal information. When in doubt, call the bank or company supposedly sending the e-mail and verify the request.

• Social networking phishing spam is on the rise. Phishers are using social networking sites, such as MySpace, to target specific groups of e-mail users with free gift offers and ads. Check your privacy settings on these sites to restrict who can access your information and never click on a link posted by an unknown source.

• Be cautious with hyperlinks to other Web sites and don't open hyperlinks in an unsolicited e-mail. Clicking on the link is a confirmation to the spammer that an e-mail address is active and to whom it belongs, and more importantly, opens the door to new malware and viruses or a phishing site.

Twenty-Six Arrest Orders Issued for Copyright Violations

In May 2007, U.S. Immigration and Customs Enforcement (ICE) agents, working in conjunction with U.S. Secret Service (USSS), the Puerto Rico Bureau of Special Investigations, and officials of the Motion Picture Association of America (MPAA) and the Recording Industry of America (RIAA), launched the first phase of an operation dubbed "Operation Digital Pirates." The first phase of the operation led to the seizure of more than 53,000 counterfeit music CDs and DVDs. The operation was launched in several flea markets throughout the island of Puerto Rico. The seizure was part of an ICE initiative into the identification of intellectual property rights (IPR) violators.

As part of ICE's "Operation Digital Pirates," ICE agents teamed up with other federal and local law enforcement officers and arrested 21 individuals indicted by a federal grand jury in November 2007 for violations to federal intellectual property rights statutes. The arrests took place in the municipalities of Bayamon, Vega Baja, Morovis, Mayaguez, Hatillo, Quebradillas, Ponce, Guayanilla and Carolina, Puerto Rico.

According to the indictment, the defendants infringed copyright laws by reproducing and distributing works such as music CDs and DVDs, for the purpose of commercial advantage or private financial gain.

Between fiscal years 2002 and 2006, ICE agents arrested more than 700 individuals for IPR violations and dismantled several large scale criminal organizations that distributed counterfeit merchandise to nations around the globe. At the same time, ICE investigations into these networks resulted in 449 criminal indictments and 425 convictions. Together, ICE and CBP seized more than $750 million worth of counterfeit goods from fiscal year 1998 through fiscal year 2006.

The criminal infringement of a copyright has a penalty up to five years imprisonment if it is a first offense, and ten years imprisonment if the offense is a second or subsequent offense, a fine up to $250,000, and a supervised release term. Trafficking in counterfeit labels affixed to the illegal copies of the motion picture DVDs or music CDs has a penalty of up to five years imprisonment.

Vivid Entertainment Group Sues PornoTube.com for Copyright Infringement

This summary is not available. Please click here to view the post.

Sunday, December 23, 2007

Symantec Awarded $21 Million in Judgments Against Counterfeit Software Piracy Rings

Symantec Corp. was awarded $21 million in damages against a large network of distributors selling counterfeit Symantec software.

The judgments were handed down by the United States District Court for the Central District of California in Los Angeles, CA in favor of Symantec against ANYI, SILI Inc., Mark Ma, Mike Lee, John Zhang, Yee Sha, and related defendants.

In civil cases filed in November 2006, Symantec included claims alleging that ANYI, SILI, Yee Sha, and their affiliates engaged in trademark infringement, copyright infringement, fraud, unfair competition, and false advertising. Symantec's investigations into these piracy rings coincided with and supported other investigations initiated by various law enforcement agencies such as the FBI and the Chinese Ministry of Public Security, ultimately leading to the arrest of Mark Ma in Shenzhen by Chinese authorities in July 2007.

Website: http://www.symantec.com/

Global 'Fake Check' Seizures Continue

In a continuing effort to crack down on international scammers who are looking to fatten their own wallets while draining the bank accounts of American consumers, law enforcement partners of the United States Postal Inspection Service have seized additional tens of thousands of mailings bound for the U.S. containing counterfeit checks.

Today, a team of Canadian and U.S. fraud investigators based in Montreal, Quebec announced the seizure of over 50,000 pieces of mail containing fake checks, with a face value of nearly $195 million. The announcement was made by the Royal Canadian Mounted Police (RCMP), who spearhead "Project COLT," a cross-border partnership aimed at disrupting and preventing fraud. Postal Inspectors have been members of this partnership since its inception in 1998, along with other federal agencies in the U.S. and Canada. Most of the letters were addressed to U.S. recipients. The seizures were made by Canada Post in coordination with the RCMP. No arrests have yet been made, and the investigation is continuing.

The mail contains a letter telling the recipient they've won a cash prize of up to $50,000 in an international promotional campaign, and includes a $2,000 to $5,000 check. To collect the full amount of their "prize," the recipient is asked to cash the check and quickly return all or part of the proceeds, usually via wire transfer, to pay for some kind of international administration fee. By the time the check has been found to be fake, the scammer has the money and the recipient is on the hook to their bank to repay the amount sent back.

"Even though over 600,000 fake checks have been seized since the global initiative to stop these scams began earlier this year, the scammers have not stopped trying," said Alexander Lazaroff, Chief Postal Inspector. "We are grateful to the RCMP for continuing to lead this cross-border partnership, which aims to keep these scams from reaching U.S. and Canadian consumers and maintain their confidence in the mail."

Postal Inspectors warn there is no legitimate reason for any contest promoter, business or organization to send you a check and ask that it be cashed and wired back to them ... especially for a promotional campaign or contest you never entered. Learn more about check scams by visiting the website http://www.fakechecks.org/. If you receive a letter containing a check and you suspect fraud, don't cash the check, report it to Postal Inspectors through the website http://www.fakechecks.org/, or by telephoning 1-800-372-8347.

Saturday, December 22, 2007

Five Steps to Improve PC Security

With a strong increase in PC sales predicted for the holiday season, many consumers will be encountering Microsoft's Windows Vista operating system, which first shipped in January 2007, for the first time. To provide these consumers with guidance on the simple, yet crucial ways they can ensure they are protected against threats to their new PC's security, BeyondTrust, a leading provider of enterprise security software for Windows, has created a list of five key steps new Vista users should take:

1. Do not log into Windows Vista as an administrator.

This is a critical step home users must take when they first start their new computers to protect their family from malware. Malicious software cannot install and users won't be able to install programs that might be unsavory.

2. Use separate accounts for all family members.

Using separate, non-administrator accounts for multiple users ensures that each person's data is better protected. Try to avoid giving family members the password for the administrator account. This will prevent them from installing whatever they choose, from who knows where that does who knows what.

3. Vista introduces a new security feature called User Account Control (UAC). Keep it turned on, even if you find it annoying.

A prominent new feature in Vista, UAC prompts users to enter a password whenever they encounter tasks that require full administrator privileges, such as installing software or running certain applications. Because most viruses and other malicious software require administrative rights to install and run, UAC will make it possible for you to view and stop them before they can harm your computer.

4. Set each family member's e-mail to read incoming e-mails as plain text only, not HTML.

While HTML may make for more desirable display capabilities for viewing e-mail, its benefits are far outweighed by its potential for security compromise. HTML is often used to carry out attacks on your computer, and you should avoid using it.

5. Be sure to log off of the computer when you are finished with your session.

This one step is simple but important. You want to keep your data protected and make sure that other users in the household don't have access to a privileged account.

Source: BeyondTrust CEO John Moyer

A more detailed list of tips is available for consumers and media at: http://www.beyondtrust.com/5_Security_Tips.aspx

$1.7 Million to Help Victims of Identity Theft and Fraud

The Department of Justice's Office of Justice Programs (OJP) announced $1.7 million in grant funds to provide direct assistance to victims of identity theft and financial fraud. The awards will expand existing services and strengthen law enforcement's response to victims of identity theft and financial fraud nationwide.

"The financial toll exacted by identity theft can be as devastating and emotionally traumatic as violent crime," said Cybele Daley, Acting Assistant Attorney General for OJP. "The Department of Justice recognizes the tragic consequences to those affected by identity theft and is committed to tackling this problem by giving victim service organizations and local law enforcement the resources to provide a measure of relief to victims."

The funding, awarded through OJP's Office for Victims of Crime (OVC) earlier this year, is being given to existing national, regional, state and local victim service organizations that are currently providing direct assistance to victims and will collaboratively expand their efforts to help identify additional theft and fraud victims. The award recipients are:

-- The Identity Theft Resource Center, a national organization that provides free identity theft victim assistance, is receiving $500,000 to improve and expand its current identity theft victim counseling and individual case work while expanding staff at its identity theft call center.

-- The Texas Legal Services Center, a state support office and regional victim services provider, is receiving $500,000 for operation of the Victims Initiative for Counseling, Advocacy, and Restoration of the Southwest (VICARS) project. VICARS provides free legal assistance to victims of identity theft and financial fraud living in Texas, Oklahoma, New Mexico and Colorado and provides step-by-step coaching on how to reacquire their identity and credit.

-- The Maryland Crime Victims' Resource Center is receiving $500,000 to enhance its existing practice to provide free assistance to victims of identity theft and financial fraud through increasing direct victim services; self-advocacy and pro bono attorney development. The Center will partner with a variety of national programs to assist victims of identity theft and fraud nationwide including the National Center for Victims of Crime, the Identity Theft Assistance Center, and the National Crime Victim Law Institute.

-- The Atlanta Victim Assistance Inc., a non-profit organization serving the needs of both victims and witnesses, will receive $200,000 to carry out a public education campaign aimed at stopping identity theft and financial fraud in Atlanta, Georgia. The "Stop Atlanta Fraud Empower (SAFE)" campaign consists of a three-prong innovative approach of education, advocacy, and training to help reduce the incidences of fraud in Atlanta and increase city resident awareness of their rights if victimized.

The awards are a direct outcome of efforts made by the President's Task Force on Identity Theft. The Task Force, co-chaired by the Attorney General and the FTC Chairman, was established by Executive Order of the President on May 10, 2006, and is comprised of 17 federal agencies and departments. The Task Force's strategic plan, released in April 2007, can be found at http://www.idtheft.gov/.

Sunday, December 16, 2007

Kid Rock Wins New Orleans Copyright Infringement Case

This week, Atlantic Recording artist Kid Rock won a dismissal of a copyright infringement action brought against him and several codefendants by a New Orleans man. The lawsuit, filed by local musician Troy Landry in 2004, contained allegations that Kid Rock and co-writers Uncle Kracker, John Travis and Kenny Olson copied portions of two songs written by the Plaintiff when the Defendants wrote the hit recording Somebody's Gotta Feel This.

In a sweeping vindication for Kid Rock, Louisiana's United States District Judge Mary Ann Vial Lemmon issued a 14-page Opinion dismissing Landry's lawsuit in its entirety.

Among the Court's findings were the following:


-- Landry presented no evidence to contradict the Defendants' affidavits
that they had not heard Landry's music and that they independently
created the song in 1997.

-- Landry failed to meet the "access" requirement of a copyright case.

-- One of the Plaintiff's expert witnesses, Tulane University Associate
Professor of Music John Joyce, conceded that the two songs as a whole
were different. He also said the hook of Landry's song was copied
based on a "hunch."

-- Both of Kid Rock's expert witnesses, musicologists Gerald Eskelin and
Anthony Ricigliano, opined that the songs in question were distinctly
different.

-- The Court concluded that the works are not so similar as to preclude
independent creation.
Kid Rock's trial attorney, William Horton of Troy, Michigan, expressed his enthusiasm with the Court's decision: "There was no copying here. Kid Rock is a one-of-a-kind original."

Kid Rock's personal attorney, Michael Novak, says: "Judge Lemmon did the right thing in dismissing this case. It was utterly meritless. Unfortunately the way our justice system works, anybody can sue anyone for any reason, and successful artists tend to attract these groundless claims. But we are elated the system worked here. Justice is served."

Comcast, Cablevision and Ebay Sued for Patent Infringement

Klausner Technologies, Inc. has filed patent lawsuits under its visual voicemail patents against Comcast Corporation, Cablevision Systems Corp., and eBay Inc.'s Skype with damages and future royalties estimated at $300 million.

The lawsuit asserts that the above companies' VOIP voicemail products and services infringe Klausner Technologies' U.S. Patent 5,572,576. The patent has already been licensed to various other companies which provide the same visual voice messaging services, including Time Warner's AOL for its AOL Voicemail services, Vonage Holdings for its Vonage Voicemail Plus services as well as others, under the Klausner Patents.

Cablevision's Optimum Voicemail, Comcast's Digital Voice Voicemail and eBay's Skype Voicemail each violate Klausner's intellectual property rights by allowing users to selectively retrieve and listen to voice messages via message inbox displays.

The suit has been filed by the California law firm of Dovel & Luner in a federal court in the Eastern District of Texas. “We have litigated this patent successfully on two prior occasions, said Greg Dovel of Dovel & Luner, counsel for Klausner Technologies. "With the signing of each new licensee, we continue to receive further confirmation of the strength of our visual voicemail patents.”

Ten Tips to Prevent Identity Theft during the Holidays

With the holiday season in full swing, millions of Americans are hitting the malls and shopping on-line to find the perfect gift for every family member. However, in the confusion and bustle of the season, it's easy to let your guard down, which is why the winter holiday season is one of the prime times for identity theft to occur. Every year, according to the Federal Trade Commission (FTC), almost ten million Americans are victims of some sort of identity theft, and experts suggest that identify theft increases during the winter holiday season, when there are a greater number of opportunities for theft to occur. Surprisingly, the majority of cases do not result in out-of-pocket expenses for victims—what most victims lose is time and their sense of personal security.

"Clearing your name after an identity theft can be a very complicated and disruptive process," said Mark LaPenta, chief technology officer of MetLife Bank. "There are a lot of people to notify, including creditors, credit bureaus, and law enforcement. It can take months—or possibly years—before you get your life back in order, and clear your name. Fortunately, there are steps that can be taken to avoid becoming a victim in the first place, and also services that can help you restore your name should you become a victim."

To reduce the likelihood of being a victim of identity theft:


Be careful with your social security number, which is one of the most valuable
pieces of information that you have to "prove" who you are. Avoid carrying your
social security card in your wallet, and don't print the number on personal
checks.

Only release your social security number when it's absolutely
necessary, such as when required by a government agency (e.g., the Department of
Motor Vehicles or Social Services).

If a merchant asks for your social
security number, ask why it's necessary, and what safeguards they have in place
to protect your information. Although there are instances where it is necessary
to have this information (such as, in order to extend credit), you should feel
confident with the safeguards that are in place to protect your privacy.

Minimize the number of credit cards you have, and only carry one or two
in your wallet. It's a good idea to keep a list of all your credit cards, bank
accounts, and investments in a safe place.
Never leave envelopes containing
bills and checks in places where there's a danger of their being stolen.
Consider mailing your bills at the post office, rather than leaving them for
your letter carrier at your front door or mailbox.

Think about computer
safety—never use obvious or easily guessed passwords or PINs, and always create
passwords that combine letters and numbers.

Be wary of "phishing"
schemes. Phishing is a type of fraud that usually starts as an email or pop-up
designed to trick you into revealing personal financial details. Never reply to
emails asking for personal details, or even click on links in emails that appear
suspicious.

Be careful what you throw away! Trash is a prime target for
identity thieves, so take the time to shred all paperwork containing sensitive
information, including pre-approved credit offers. The most secure shredders are
"cross cut" shredders, because they ensure that the documents cannot be
reassembled.

Carefully review financial statements each month for
unauthorized use, including your credit cards, bank statements, and phone bills.
Alert your creditors immediately, in the event that you notice a discrepancy.

Do a "check up" on your credit history once every year. Securing this
information is easy—simply visit www.annualcreditreport.com or call
877-322-8228. You'll be able to get one free credit report each year from each
of the three major credit bureaus.

Another important consideration:
determine whether you have protection in the event that you are victimized. Many
credit card companies offer protection against identity theft, so ask your
credit card agent or company representative if yours does.

In addition, a few banking institutions now offer the convenience of identity theft resolution services. This assistance can prove invaluable, because it can help guide victims through the arduous process of reclaiming their good names.

For additional information on the threat of identity theft, visit http://www.metlifebank.com/, and select "Security Center."

Sunday, December 9, 2007

Con Man's Blog, by Legal Thriller Author Jack Payne, Tracks and Exposes New Scams

No one wants to be the victim of a con man. And no one knows the con man's methods better than Jack Payne, author of the legal thriller Six Hours Past Thursday (ISBN 1-59113-502-8, Impact Books, http://www.sixhrs.com/). Now through his Con Man's Blog (http://legalthriller.blogspot.com/), Payne is helping readers protect their money - and ultimately their sense of security - from scam artists.

"It's all about educating yourself," Payne explained. "A con man can't pull a scam on a person who checks him out. The Internet and e-mail have given rise to a new breed of con man, but they're also the two most effective weapons in the war against those same scam artists. If you think something doesn't seem quite right, it usually takes just a few minutes of research online to confirm your suspicions."

The Con Man's Blog can be a good starting point for that research. Payne, who has spent 45 years studying scam artists, keeps readers abreast of the latest cons, scams and dirty deals and frequently answers questions through his blog's comments feature.

With Six Hours Past Thursday, Payne wrote the book on the art of the barely legal con game. In that legal thriller, he drew on his extensive knowledge of the con man as well as on his decades of business experience. The same is true at Con Man's Blog, where at http://legalthriller.blogspot.com/, Payne outs all the shady business opportunities, ultra-low-cost vacation deals and other too-good-to-be-true come-ons he finds.

"The public needs to know about the classic scams that are still being used, as well as the brand-new cons that put personal information - and bank accounts - in jeopardy," said Payne. "At The Con Man's Blog, I frequently write about the con man's favored techniques from the perspective of the scammer. I think it's important for my readers to know how con men think, because that provides the insight they need to steer clear of people who would otherwise view them as nothing more than a mark."

Payne maintains that until countries worldwide take the necessary steps to prosecute con men, scams will continue to proliferate on the Internet. But thanks to The Con Man's Blog, their pool of potential victims is shrinking.

Saturday, December 8, 2007

Multi-Million Dollar Pyramid Scheme -- BUSTED!

The operators of a pyramid scheme which took in approximately $27 million from roughly 500 victims, most from the Cambodian-American community, have been sentenced to prison terms of 35 years and 20 years apiece.

Hon. Richard G. Stearns, of the U.S. District Court for Massachusetts, sentenced JAMES BUNCHAN, age 57 of Quincy and Attleboro, Massachusetts and North Miami Beach, Florida to 35 years in federal prison and BUNCHAN's wife, SENG TAN, age 61, of Quincy and Attleboro, Massachusetts and Burnsville, Minnesota, to 20 years in federal prison. The two were convicted of conspiracy, mail fraud and money laundering.

"The defendants ran a large pyramid scheme that preyed primarily on ethnic Cambodians," stated U.S. Attorney Sullivan. "The victims are hard working people who were led to believe that they were making safe and responsible investments. Sadly a number of these victims are now facing the loss of their homes and financial ruin."

"IRS CI will vigorously investigate individuals who defraud others in this manner," stated Douglas Bricker, IRS Special Agent in Charge. "This type of crime impacts not only the government but also the victims who believed they were making responsible investments. The prosecution of individuals who are involved in these types of schemes serves as an example that complex financial transactions will be investigated by the IRS and those who violate the law will be brought to justice."

The evidence at trial showed that BUNCHAN, TAN and a third individual, CHRISTIAN ROCHON, age 54, of Warwick, Rhode Island were principals of two companies, WMDS, Inc., a/k/a World Marketing Direct Selling Inc., and One Universe Online Inc., also known as 1UOL. The companies had offices based in Canton, Attleboro, and Boston, Massachusetts.

From October 2000 through November 2005, BUNCHAN, TAN, and ROCHON solicited investments in WMDS and 1UOL and took the investors' money for their own personal use. BUNCHAN, TAN and ROCHON falsely represented that WMDS and 1UOL were companies that marketed and distributed health supplements and other consumer products. They promised investors that a lump sum investment (typically in units of approximately $26,000) would yield a monthly payout ($300 per $26,000 invested) for the rest of the investors' lives and the lives of the investors' children. BUNCHAN and TAN often solicited higher lump sum investments by promising higher returns to large investors.

In many instances, BUNCHAN and TAN persuaded investors to mortgage their homes to get money to invest. In particular, they preyed on ethnic Cambodians living in various communities around the United States, gaining their victims' trust by emphasizing their shared experiences during the genocidal Pol Pot regime in Cambodia.

In pronouncing sentence, Judge Stearns, noted the enormity of the harm inflicted by BUNCHAN and TAN. By encouraging victims to mortgage their homes, the fraud not only stripped hard-working families of their savings but, in many instances, left them homeless.

At first, BUNCHAN, TAN and ROCHON made the promised payments, leading the original investors to unwittingly recruit additional victims of the scam. But, for the most part, the defendants simply spent the money. BUNCHAN used the investors' money to finance a lavish personal lifestyle which included luxury cars, trips to Las Vegas and the Bahamas, and over 6 million dollars gambling at casinos. TAN and ROCHON also profited from the scheme.

As the scheme collapsed, BUNCHAN, TAN, and ROCHON stalled investors by claiming that payments had been delayed due to technical problems. Then BUNCHAN orchestrated a campaign to intimidate investors -- including threatening lawsuits -- to keep them from going to the authorities. At the sentencing hearing, the prosecutor noted that BUNCHAN ultimately went further, attempting to hire a hit-man to murder potential witnesses. BUNCHAN has been charged separately for that scheme.

ROCHON will be sentenced separately. A hearing date for ROCHON has not yet been set.

Online and offline habits may make consumers susceptible to identity thieves

Out shopping with a bag full of receipts? Piles of special end-of year credit card promotions filling your mailbox? Leaving home on vacation? All of these situations provide a prime opportunity for identity thieves to strike.

Rick Kam, president of identity theft protection and personal identity recovery company ID Safeguards, warns, "The holiday season is ripe for identity thieves to do their dirty work, and whether you realize it or not, you may be helping them. By taking a few simple steps, you can protect yourself from the efforts of fraudsters."

By following a few simple online and offline tips, consumers can decrease the odds of becoming a victim this holiday. Top tips for protecting yourself are:

-- Keep your whereabouts online a mystery: Your e-mail message should NOT
state you are on vacation, nor should you state on your blog or social
networking site that you are going out of town. Instead, say you are
out of the office spending time with family or you are going to take a
rest from your blog updates during the holiday.

-- New Year, New Passwords: Out with the old and in with the new. Make it
your yearly time to give new passwords to your online accounts.

-- Watch for the double swipe: Don't let yourself get distracted while
checking out. Sales assistants have been known to use devices called
skimmers to quickly swipe customer credit card numbers.

-- Shop, save and compare: Save all your online and physical shopping
receipts. As much as you don't want to look at those credit card
statements after the holidays, make sure they match your receipts. Call
your credit card company to report any unfamiliar purchases.

-- Going to Grandma's? Prepare your home: Place a hold on your mail with
the post office and stop newspaper delivery. A full mailbox is a gold
mine of information for identity thieves and a pile of newspapers
signals that your home is vacant.

-- Shop with one: Use only one credit card this season and store the rest.
Debit cards should never be used for online shopping as it provides
online thieves with direct access to your bank account.

-- When in doubt, keep it personal: You should only buy from known and
reputable sources on the Internet. You would never give a stranger on
the street your credit card information. Practice the same logic
online.

To learn more about current identity theft issues, visit the company blog at http://www.idsafeguards.blogspot.com/.

How to Take a Copyright Thief to Court

If all else fails, you can file a copyright infringement lawsuit. This remedy has some drawbacks.

Litigation can be costly. In many cases, the likely value of the misappropriated material and any damages received will be less than the amount obtainable in a judgment.

You also have to deal with the very real problem of collecting a judgment. In many cases, the offending party will be unable to pay if you prevail, and collecting via wage attachment or other options may be inefficient and impractical.

If the case crosses into a foreign country, things become even more complicated. Enforcing a judgment against a foreign entity can be remarkably problematic.

Copyright infringement cases are governed by federal statute and case law and must be filed in a Federal District Court.

If you own a copyright and can successfully prove a violation, you may be able to win damages that approximate the profits lost from the infringement and the profit generated by the offender during the period of violation. You can also receive statutory damages that may reach as much as $150,000 per violation.

During the case itself, you may also be able to get a restraining order requiring the offending party to remove the material until the matter is resolved.

Fighting copyright infringement in the courts can make sense in the right situations. When the value of the content is significant and you can prove your case effectively, it may be sufficiently lucrative to pursue. A willingness to litigate may also signal that you take copyright infringement seriously, acting as a deterrent to other would-be thieves.

Pursuing a copyright infringement case does require a high level of specialized skill. Thus, anyone considering a case of this sort is advised to seek representation from appropriately qualified legal counsel. This is not a do-it-yourself project.

In most cases, litigation just doesn't make sense. However, it may be necessary when all other remedies are exhausted and a violating party refuses to take appropriate action.

Before instigating legal action, make sure you have clearly assessed the merits of your case with your attorney and that you are prepared to see the matter through. If you aren't ready to take that kind of action, it may make more sense to do your best to seek other remedies.

ABOUT THE AUTHOR
Brian Scott is a freelance journalist who covers copyright law for http://www.researchcopyright.com/. Download his free e-book, "Copyright Basics" at ResearchCopyright.com.

Sunday, December 2, 2007

Access Copyright Sues Staples/Business Depot for Copyright Infringement

Access Copyright, an organization representing the copyright of almost 9,000 Canadian writers and publishers, is suing Staples/The Business Depot for copyright infringement.

The lawsuit, filed by Access Copyright, contains the largest claim to arise from copyright infringement of published works in Canada.

The lawsuit seeks $10 million in damages, including a claim for punitive damages.

Staples/Business Depot is a sizeable, for-profit organization that has built part of its business through a lucrative service that exploits the published works of authors, photographers and publishers. Companies that photocopy illegally are effectively taking money directly out of the pockets of creators and publishers who depend on book sales and copyright royalties for their livelihood.

"Companies that profit from illegal photocopying are undermining the work of others," said Maureen Cavan, Executive Director of Access Copyright. "Staples/Business Depot is no different from those organizations that profit from illegally downloading copyright protected music or the unauthorized sharing of videos and published works on the internet."

Access Copyright (http://www.accesscopyright.ca/) has been continuously investigating Staples/Business Depot since 1998 in response to concerns raised by creators and publishers over infringement activities. Despite repeated attempts by Access Copyright to reach a settlement and come to an amicable resolution, Staples/Business Depot has made no perceivable changes to their business practices.

Private Detective Spam Floods Inboxes with Malware Threat

Cyberoam announced that a new email-borne malware threat has emerged, where messages claim to be from a private detective hired to monitor the email recipient. According to Cyberoam partner Commtouch, the outbreak was first identified on Saturday, November 17th and sample subject lines include, "I'm monitoring you"; "You’re being watched"; "Your phone is monitored"; and, "The tape of your conversation".

The malware distributors have attached a "recording" of the recipient's phone call in an effort to convince the recipient of their surveillance capabilities, which is actually an executable .scr malware file. The attachment names are numerical variations on "call1105-10.rar." and are password-protected, compressed files. The malware inside the attachment is activated when the recipient opens the file with the password provided in the body of the email.

"These techniques indicate the malware author's ability to successfully launch new variants of malware on the Internet, which is why signature-less protection against these types of attacks is critical," said Joshua Block, VP of North American Operations, Cyberoam. "Traditional signature-based protection methods are unable to provide zero-hour protection. Cyberoam’s unique identity-based UTM appliances provide organizations of all sizes with a proactive virus detection technology that protects against spam and new email-borne virus outbreaks hours before signatures are released and updated in signature-based solutions."

Commtouch research shows that global spam levels recently reached an all-time high of 95 percent, increasing a spammer or virus author’s ability to launch a successful attack. To help combat this, Cyberoam’s fully integrated gateway antivirus and anti-spam engines provide reliable web and e-mail security at the gateway for enterprises.

Website: http://www.cyberoam.com/

Online Merchants...Naughty or Nice?

Rising gas prices, a soft economy and sheer convenience will attract a record number of Santa's helpers to online retailers this holiday season. According to the National Retail Federation's 2007 Consumer Intentions and Actions Survey, consumers plan to do more than 30 percent of their holiday shopping online.

As more people do their holiday shopping online, the risk of the Grinch stealing holiday cheer -- and identities -- is at an all-time high. Last year, the Federal Trade Commission reported more than 674,000 victims of identity theft and fraud totaling an estimated $1.1 billion in losses -- Internet-related complaints accounted for nearly half.(i)

"The online world can be a dangerous place and online shoppers need to be more vigilant than ever," said Dave Morrow, EDS chief security and privacy officer. "There are an overwhelming number of good, decent retailers mixed in with a few bad ones, so it's important online shoppers take the proper precautions to shop wisely and protect their personal information."

EDS security and privacy experts have identified EDS' eight tips for jolly and worry-free online shopping:

1. Know the online merchant. It is always best to know the reputation of the companies you choose to do business with. If you are not familiar with the online retailer, be sure to check the Web site for contact details, including a physical address and phone number. Also, look to see if the site is a member of a trust mark or trust seal program. This certifies the business meets certain business standards set in place by the program.

2. Ensure you are shopping at a secure Web site. A secure Web site uses encryption technology to scramble the information you send, such as your credit card number, in order to prevent identity thieves from gaining access to it as it travels through the Internet. Secure Web site addresses also include "https://" at the beginning of the address -- the "s" indicates the Web site is secure. Also, look for a closed padlock displayed in your browser's toolbar or on at the bottom of your screen. If the lock is open or not present, this may be a sign that the site is not secure. Even on a secure site, do not send any more financial information than is necessary to complete the transaction. Always keep a paper copy of the transaction for your records.

3. Review privacy and security policies for the companies you do business with online. All reputable companies post a privacy and security policy or statement on their Web site. This should tell you what information the company collects, how it is used and what is shared. If you are concerned about your information being shared with other companies, make sure there is an option to keep your information confidential.

4. Be proactive in protecting your security. Install commonly available security tools such as anti-virus software, anti-spyware software and a personal firewall. These programs and the computer's operating system must be maintained with the most recent patches or updates. Probably the most common -- and most easily remedied -- security problem in home computers is out-of-date software.

5. Do not use personal information for passwords. Using information such as Social Security numbers, birth dates, names, common words, e-mail addresses or telephone numbers as passwords can make you an easy target. Be sure your passwords contain at least eight characters and include numbers or symbols. To avoid misuse, do not write down passwords.

6. Monitor online activity regularly. If you conduct business online, review your account statements regularly and consider using a separate credit card for online purchases or payments to ensure all transactions are in order. By reviewing online statements, transactions and your credit report frequently, you could detect a theft and limit its damage. Identity thieves typically use stolen information for only a short period of time to avoid being caught. If you suspect a security breach, act quickly by contacting the companies you do business with immediately. The Federal Trade Commission's identity theft Web site http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html is a great resource for information on identity theft, including advice and guidance if your identity is stolen.

7. Be aware that international security and privacy standards may be different. When you shop in the United States, you are protected by state and federal consumer laws. These laws may not apply if you place an order internationally. If it is not a reputable merchant and there is a problem, it may be difficult for you to resolve the issue. You should print out and date a copy of terms, conditions, warranties, item description, company information and even confirming e-mails, and save them with the records of your purchase. Also, look at your purchase as soon as you receive it and contact the seller as soon as possible if you discover a problem.

8. Beware of "phishing" e-mails that appear to be from trusted merchants. Phishing is one of the fastest-growing forms of online fraud for identity thieves. Phishing e-mails appear legitimate, often addressing you by name, which makes them even more convincing. Thieves sending these e-mails usually ask you to click on a link in the email that takes you to a phony Web site -- if you are interested, it is best to go to the site yourself by typing the Web site name directly into your browser rather than clicking on the link provided in the e-mail. A skeptical attitude toward unsolicited e-mails is always the best policy, especially if you have never done business with a company before receiving an e-mail solicitation from it.

Learn more at http://eds.com/

Saturday, December 1, 2007

What is Grinch.exe and What Should I Do about It?

Chances are, if you work in an office, you're using your company-issued PC or laptop to do a little online shopping in advance of the holidays. You're not alone. Of the $116 billion expected to be spent on online retail purchases this year, $39 billion of that will be spent during the holiday season, an increase of 20 percent over last year, according to Jupiter Research. Nearly half of that shopping will be done during work hours; in fact, a recent Bill Me/Ipsos Insight survey revealed that 12 million Americans admitted to shopping online during work-related conference calls!

If you are surfing the web, such shopping might inadvertently take you to web sites loaded with spyware, key loggers, and other malicious software, making your credit or identity information vulnerable to theft and / or creating havoc on your operating system. But by the time your PC is infected with malware or unknown files such as Grinch.exe, it's too late. In fact, every time an employee shops online, they increase their risk, says Brian Gladstein, director of product marketing for Bit9, a leading application control and device control solution provider.

"As we launch into the holiday shopping season, employees will inadvertently expose their company PCs and laptops to potential security threats," Gladstein noted. "It's critical that IT professionals proactively protect their endpoints by stopping unknown software from ever executing."

For example, Gladstein observed that employees are very likely to have vulnerable applications running on their systems, which are easily exploited by the latest attacks. He recently authored a research brief on the top popular vulnerable applications for 2007.

Fortunately there are easy and efficient methods that will help IT professionals guard against these online threats. Gladstein advises a simple five-step approach, including:

1) Define an appropriate application control policy

This policy should answer questions such as: What applications will we authorize users to install and/or run on their own? What software will not be authorized? Are unknown files that could potentially be malware, such as Grinch.exe, authorized to run in our environment?

2) Monitor your PCs

Not sure what's being copied onto the computers you manage? Use a software identification service to understand the true nature of that software. Free services such as FileAdvisor (http://fileadvisor.bit9.com/) let you look up and identify unknown files like Grinch.exe.

3) Understand where the vulnerable applications are in your network.

A complete picture of where the vulnerabilities are on your network is required to ensure you are addressing them. After all, if you do not know a user is running a vulnerable application and they connect their laptop to a public wi-fi spot, you risk a possible intrusion and / or loss of data on that computer.

4) Be aware of new vulnerabilities

Stay on top of new vulnerabilities by visiting resources such as the National Vulnerability Database (http://nvd.nist.gov/), the SANS Institute (http://www.sans.org/), and the U.S. Computer Emergency Readiness Team (http://www.us-cert.gov/).

5) Stop unwanted software before it executes

Consider using application control and device control products such as Bit9 Parity™ to help you control what applications and devices can and can not operate. Stopping unwanted software before it can execute will always be your best defense in protecting desktops, laptops, and servers from malware, spyware, zero-day attacks, and any unknown, unwanted, or unauthorized software.

"The bottom line is that you can't be careful enough," Gladstein summarized. "We recommend everyone implement application controls to ensure that unknown, unauthorized, or unwanted software that is downloaded, either on purpose or inadvertently, never gets a chance to run."

Sunday, November 25, 2007

The Simple Facts About Plagiarism

Copyright Laws protect copyright holders from having their works plagiarized. The word plagiarism is derived from the word "kidnapper" in Latin. If a person uses another person's words without permission, they have stolen or kidnapped something owned by somebody else. This violates copyright law. Plagiarism is a menacing word in the writing world. Crediting the author of the work will not keep someone immune from violating copyright law. Plagiarism is plagiarism.

The academic world is one of the most common areas which violates plagiarism. Many students will copy and paste information they need for their research papers and essays straight off the Internet and turn it in to their professors. However, these days professors can use special programs to detect this type of cheating. Plagiarism is unethical, not only in the writing world, but in the academic world, as well.

You could plagiarize a work but not violate the copyright. Let's say you are using Abraham Lincoln's exact words in a paper and you did not cite him as the source or give him credit. Well, Lincoln's words aren't copyrighted because they are in the public domain. But, you did plagiarize because you tried to pass off his words as your own.

Alternatively, if you use a picture in a book and you did not gain permission to use the book, you have violated copyright law because you did not source the artist and you did not get permission from the artist to use the picture.

If you are in school, the best way to avoid plagiarism is to list your sources. If you use someone's word, list it in an endnote or in a footnote. List the resource in the bibliography. Another way to avoid plagiarism is to take notes when you are reading. Take notes in your own words; and write your paper from your own words.

No one wants to be singled out for plagiarism, especially a student who is concerned about his or her reputation at school, and writers who need to keep their credibility in good standing. With today's technological advances, it is not too hard to pinpoint plagiarized work. Even webmasters who run websites actively check their content for plagiarized material. They can run their entire sites through a special program to see if their content has been stolen and duplicated elsewhere on the Internet.

If you are writer, either academically or as a profession, it is a good idea that you only use your own words. It was probably easier to get away with plagiarism 20 years ago, but it is not that easy today. The chances are high that if you are plagiarizing, you will be caught. Not only is it embarrassing, but it can cost you a bundle in a lawsuit.

When you hear about people caught of plagiarism, many different things can happen to them. First of all, plagiarism can be both a civil and criminal crime, so people caught of plagiarism are likely to get both sued and tried in criminal court. Because of the nature of copyright laws, if and when people are caught of plagiarism, it’s likely they will get repercussions from far and wide.

ABOUT THE AUTHOR
Brian Scott is a freelance journalist who covers copyright law for http://www.researchcopyright.com/. Download his free e-book, "Copyright Basics" at ResearchCopyright.com.

Don’t Bring Fraud Home for the Holidays

The Identity Theft Assistance Center (ITAC) urges consumers to safeguard their personal data while shopping this holiday season and to monitor online and paper account statements for suspicious activity.

"Criminals consider your personal data the ultimate gift," said Anne Wallace, Executive Director of ITAC. "Taking a few easy precautions while shopping during the holidays will help keep you from being a victim."

"Don't wait for your paper statement to check for suspicious activity," said ITAC board member Terry Nichols, VP-Chief Risk Officer, State Farm Bank®. "Check your account statements by calling your credit card company or bank, or by visiting their websites. You can minimize damage by acting quickly."

ITAC offers the following advice to holiday shoppers:

Don't volunteer any personal information when you use your credit card, other than by displaying personal ID as requested by a merchant.

Don't lend your card to anyone. You are responsible for its use. Some credit card misuse can be traced directly to family and friends.

Guard your PIN when using your debit card. Keep a lookout for suspicious activity. Always guard your PIN and transaction amount, and immediately cancel your transaction and leave if you see something suspicious.

Take your receipt. Always take your receipt. It contains personal information that could be helpful to thieves.

Shop only at Internet merchants you know and trust. If in doubt, check with the Better Business Bureau.

Never share your Internet passwords with anyone. Use different passwords for different Web sites.

Do not provide your social security number, birth date, or mother's maiden name in an email or within a Web site.

Install the latest anti-virus software on your computer before shopping online.

The Identity Theft Assistance Center (ITAC) (http://www.identitytheftassistance.org/) is a nonprofit that fights identity theft through victim assistance, research and law enforcement partnerships.

Online Merchants Can Reduce Fraud

Telecentrex LLC has launched a new website, http://www.reducefraud.com/, that aims to help online merchants reduce the number of fraudulent transactions occurring on their websites.

Tim Paulino, Co-Founder and CEO of Telecentrex said, "With $3 billion dollars in online revenue being lost due to online fraud in 2006, as well as over $200 million lost by consumers, reducing Internet fraud benefits everyone. Everyone except the crooks, that is."

Among the services that ReduceFraud.com offers is a televerification solution that allows online merchants to confirm that the telephone number that a user provides is a legitimate, working telephone number before they can complete their transaction. Brandi Cummings, Co-Founder and Chief Content Officer of Telecentrex, stated, "Thieves are leery about providing a legitimate phone number that can be traced back to them. This solution weeds out fraudulent users before they get a chance to do any damage."

Sunday, November 18, 2007

Spam Reaches All-Time High of 95% of All Email

Commtouch® has released its Email Threats Trend Report for the third quarter of 2007, based on the automated analysis of billions of email messages weekly. The report examines the appearance of new kinds of attachment spam such as PDF spam and Excel spam together with the decline of image spam, as well as the growing threat of innocent appearing spam containing links to malicious web sites.

Highlights of the report include:

Global spam levels reached an all-time high of 95% of all emails at its peak during the quarter.


Blended threat messages -- or spam messages with links to malicious URLs -- accounted for up to 8% of all global email traffic during the peaks of various attacks during the quarter.

One massive outbreak mid-quarter utilized over 11,000 dynamic zombie IP addresses to host malicious web sites. Leading zombie locations included the United States (36%) and Russia (8%).
Image spam declined to a level of less than 5% of all spam, down from 30% in the first quarter of 2007; also, image pump-and-dump spam has all but disappeared, with pornographic images taking its place.

PDF Spam represented 10-15% of all spam in early July and then dropped significantly, however a steady stream of PDF spam is still being maintained at 3-5% of all spam messages.

Pharmaceuticals and sexual enhancers were the most popular spam topics, at 30% and 23%, respectively.
Blended Threats: Spam with Malware Hyperlinks Inside

One technique which reached a new high during the quarter was innocent-appearing spam messages that contained hyperlinks to malware-sites. This type of spam utilizes vast zombie botnets to launch ‘drive-by downloads’ and evade detection by most anti-virus engines.

Several blended spam attacks of this type focused on leisure-time activities, such as sports and video games. Messages invited consumers to download "fun" software such as NFL game-tracking and video games from what appeared to be legitimate websites. Instead, consumers voluntarily downloaded malware onto their computers.

"Blended spam demonstrates the ingenuity of spammers to attempt to evade detection," said Amir Lev, Commtouch President and CTO. "Most anti-virus and anti-spam technologies are not capable of blocking these types of messages, so the malware threats are allowed to penetrate the users’ computers."

New Spam Tricks

Spammers experimented with several new techniques to slip past anti-spam engines and into inboxes throughout the quarter. For example, they disguised messages in PDF, Excel, and other popular file formats. This simple trick fools many anti-spam technologies and end users alike, whose guards may be down when they see the popular file attachment ending.

"Spammers and malware distributors are the ultimate in test marketers," Lev continued. "They keep trying different techniques to bypass spam filters and ensure that their messages have high response rates. In the future, I expect to see other file formats such as Word and Powerpoint used for a similar purpose."

More details, including samples of PDF spam and spam messages containing malware, are presented in the Commtouch Q3 2007 Email Threats Trends Report, available from Commtouch Labs at: http://www.commtouch.com/downloads/Commtouch_2007_Q3_Email_Threats.pdf

Saturday, November 17, 2007

Taking A Copyright Thief To Court

If all else fails, you can file a copyright infringement lawsuit. This remedy has some drawbacks.

Litigation can be costly. In many cases, the likely value of the misappropriated material and any damages received will be less than the amount obtainable in a judgment.

You also have to deal with the very real problem of collecting a judgment. In many cases, the offending party will be unable to pay if you prevail, and collecting via wage attachment or other options may be inefficient and impractical.

If the case crosses into a foreign country, things become even more complicated. Enforcing a judgment against a foreign entity can be remarkably problematic.

Copyright infringement cases are governed by federal statute and case law and must be filed in a Federal District Court.

If you own a copyright and can successfully prove a violation, you may be able to win damages that approximate the profits lost from the infringement and the profit generated by the offender during the period of violation. You can also receive statutory damages that may reach as much as $150,000 per violation.

During the case itself, you may also be able to get a restraining order requiring the offending party to remove the material until the matter is resolved.

Fighting copyright infringement in the courts can make sense in the right situations. When the value of the content is significant and you can prove your case effectively, it may be sufficiently lucrative to pursue. A willingness to litigate may also signal that you take copyright infringement seriously, acting as a deterrent to other would-be thieves.

Pursuing a copyright infringement case does require a high level of specialized skill. Thus, anyone considering a case of this sort is advised to seek representation from appropriately qualified legal counsel. This is not a do-it-yourself project.

In most cases, litigation just doesn’t make sense. However, it may be necessary when all other remedies are exhausted and a violating party refuses to take appropriate action.

Before instigating legal action, make sure you have clearly assessed the merits of your case with your attorney and that you are prepared to see the matter through. If you aren’t ready to take that kind of action, it may make more sense to do your best to seek other remedies.

ABOUT THE AUTHOR
Brian Scott is a freelance journalist who covers copyright law for http://www.researchcopyright.com/. Download his free e-book, "Copyright Basics" at ResearchCopyright.com.

Sunday, November 11, 2007

Free Guide to Identity Theft

Independent online financial website, fairinvestment.co.uk, has launched a free online guide about identity theft - how to prevent it and what to do if you become a victim.

According to statistics released by the Home Office, despite the increased publicity surrounding identity fraud, 79% of people are still being careless with their personal details – getting hold of documents that contain personal details is one of the easiest ways for a potential fraudster to steal an identity.

Government research shows that 19 million households put sensitive materials in their household waste and recycling bins, with a third of people throwing away everything a fraudster needs in order to steal an identity – passports, driving licenses, CVs and utility bills. Furthermore, an alarming 11 per cent of people throw away whole credit and debit card numbers, presenting thieves with the perfect opportunity to start using their card.

In response to the statistics, and in support of National Identity Fraud Awareness Week, fairinvestment.co.uk has produced a Free Guide to Identity Fraud. The guide has information on what identity theft actually is, how to detect identity fraud, simple measures that people can take to protect themselves, and what to do if it happens to them.

It also contains real life stories from people who have been victims of identity fraud, who talk about the stress and inconvenience it has caused them to help highlight the enormity of the issue.

Download Free Guide to Identity Theft

Commtouch Unveils New Online Malware Outbreak Center

Commtouch has launched a new online tool that publicizes data about global virus outbreaks. The Commtouch Malware Outbreak Center– available on Commtouch's public web site – provides ongoing updates on the latest virus variants and how quickly anti-virus solutions can defend against them.

"Broad zombie distribution networks spread new virus variants across the Internet so quickly that many anti-virus technologies have trouble keeping up," said Haggai Carmon, vice president and head of the Commtouch Virus Outbreak Detection Lab. "Commtouch's unique bird's-eye view of global email traffic allows us to detect new outbreaks from the moment they emerge."

The Commtouch Malware Outbreak Center displays a sample of email-borne malware that has recently been detected and blocked by Commtouch's Zero-Hour™ Virus Outbreak Protection solution. It also incorporates data from AV-Test.org, an independent third-party organization that tests most of the commercially available anti-virus scanners.

This data enables the Center to publish comparative detection times for leading AV vendors, a first in this comprehensive format which includes malware variant checksum. Detection times are critical, since individual virus variants often peak and then nearly disappear, all in under three hours. IT managers now have access to an online tool that allows them to verify their AV vendor's performance for each new outbreak, and to download comparative data per malware variant.

MDFS Law Answers Questions Regarding Writer's Strike

With the writer's strike in full swing, attorney, Peter Davidson, a specialist in the field of bankruptcy/receivership law, says if the strike is not resolved soon, the duration of the strike and its far-reaching impact could prove an economic disaster for more than just the entertainment industry's cadre of writers.

Davidson, managing partner at Moldo Davidson Fraioli Seror & Sestanovich in Century City, California (more commonly known as MDFS Law) can answer the following questions or provide commentary, upon request. To reach Mr. Davidson, contact Cherie Kerr at 714 550-9900 (office); 714 271-2140 (cell) or email: cheriekerr@aol.com. You may also contact Jennifer Lee at Jennifer@kerrpr.com

1. In addition to writers, what other entertainment industry professionals and businesses are likely to suffer the most financially?

2. What can writers (and others) do to stave off a bankruptcy if the strike lingers?

3. If writers or those whose income is largely dependent upon the entertainment industry are forced to file bankruptcy, when will that impact be seen?

4. What are the hidden dangers entertainment professionals may be surprised by if they should file bankruptcy?

5. How will a long strike affect the Los Angeles economy?

Saturday, November 10, 2007

The Fine Line Between Plagerism And Copyright Violation

The terms "plagiarism" and "copyright violation" are often used interchangeably. Although that may work well for most dinner table conversations, it's actually incredibly incorrect. Not all acts of plagiarism are copyright violations and the two concepts are actually quite distinct.

Copyright violation refers to the use of protected material without the appropriately expressed consent of the owner. If you take a poem I have written and to which I hold copyright and then place it on your website, you are violating my copyright. You are breaking the law.

Are you plagiarizing? Maybe. If you indicate that I am the author (attribution) you aren't really plagiarizing. You have certainly stolen my poem and you are in violation of copyright law, but you aren't passing it off as your own.

Plagiarism refers to stealing the work or ideas of another person for your own use without properly attributing the source. Being a plagiarist can get you in trouble in academic and professional settings, but it isn't necessarily illegal.

Illegality only enters the picture at the point of a copyright violation.

Plagiarism is, primarily, an ethical issue. It involves whether it is right or wrong to copy or to steal the ideas of another and pretend as if it is your own.

Copyright, on the other hand, is a legal matter. It involves whether your use of someone else's work infringes their intellectual property rights.

All copyright violations aren't plagiarism. Not all plagiarism rises to the level of copyright violation. However, the two phenomena do overlap a great deal. In many cases, the plagiarist will be a copyright infringer. Quite often, the person violating a copyright will be in the process of plagiarizing.

Nonetheless, it does make sense to understand the difference between the two acts. If someone plagiarizes you, you may or may not have recourse. It will usually depend upon whether the act also constitutes an infringement of copyright.

ABOUT THE AUTHOR
Brian Scott is a freelance journalist who covers copyright law for http://www.researchcopyright.com/. Download his free e-book, "Copyright Basics" at ResearchCopyright.com.

Sunday, November 4, 2007

430 Organizations Speak Out Against Proposed Patent Reform Act

Senate leaders today received a letter bearing the names of more than 430 organizations and companies united in opposition to the Patent Reform Act of 2007 as currently written. Spanning a vast range of industries and including every size of entity from startups to the nation's largest corporations, the signatories are based in all 50 states and the District of Columbia.

Sean Murdock, Executive Director of the NanoBusiness Alliance, expressed his concerns about the bill. "The American economy is a knowledge-based economy and American jobs depend upon continuous innovation. Patent reform should strengthen, not weaken, protection for intellectual property and incentives for innovation. That's why nanotech companies have joined with others from a wide variety of industries including high-tech, financial services, manufacturing, med-tech, green-tech, and pharmaceuticals to express opposition to this bill as drafted."

His concerns were shared by others who endorsed the letter, including William Jones, Chairman of Cummins-Allison Corporation, "Core provisions of the Patent Reform Act imperil the ability of U.S. businesses -- large and small -- to create jobs and protect fundable innovation in every sector of the economy. Any argument that patent reform is a debate between a few special interests has been washed away by the 430+ signatories of this letter. When opposition to a bill is so broad-based that it unites the range of American innovation from large manufacturers to small technology startups across all 50 states and DC, you know that the bill has tremendous capacity to damage the entire American economy."

The letter is signed by innovation leaders from every U.S. state and the District of Columbia in fields as far ranging as agriculture; alternative energy; biotechnology; chemicals; computer hardware, software, networking; cosmetics; entertainment; financial services; food/beverage; health care; heavy industry; life sciences; manufacturing; medical devices; material science; nanotechnology; optics; security; semiconductors; space systems; startup incubation; telecommunications, venture capital and Web-based businesses.

The letter unequivocally states that the bill as passed by the House and under consideration by the Senate "contains provisions that will create uncertainty and weaken the enforceability of validly issued patents."

Opposition to weakening patent protection has continued from prior Congresses to the current one. Among many others, Dean Kamen, President of DEKA Research and inventor of the Segway human transporter, testified against a similar bill in 2005 and 2006. Since introduction of the Patent Reform Act of 2007, opposition has stepped up dramatically. Dozens of executives have traveled to Washington D.C. to meet with lawmakers and personally express the concerns reflected in this letter. Earlier this month, the Innovation Alliance sponsored a Congressional briefing in which Jones, Kamen, Steve Perlman, CEO of Silicon Valley-based startup incubator Rearden and a former executive at Microsoft and principal scientist at Apple, and Richard Faubert, President and CEO of AmberWave Systems expressed their opposition to the bill in its current form. More briefings are planned in the coming weeks.

"If we want to improve the patent system, let's first make sure our changes do no harm, and then craft solutions that advance the interests of all businesses and industries, not just a few," Bryan Lord of the Innovation Alliance and Vice President of AmberWave Systems concluded. "The US patent system has been dramatically altered in the last several months by major Supreme Court decisions and new patent rules. Enacting a radical patent system overhaul before there has been time to understand the full impact of changes already made would be irresponsible and risky. America, backed by a strong patent system, leads the world in innovation. Even in the wake of globalization, this has kept the US at the head of the economic food chain. As this letter shows, large sectors of the American economy have significant concerns with this bill -- concerns that need to be addressed if America is to remain the leader in innovation."

The Innovation Alliance is a coalition of entrepreneurial companies seeking to enhance America's innovation environment by improving the quality of patents granted and protecting the integrity of the U.S. patent system. To learn more, visit http://www.innovationalliance.net/.

Spammers Redirecting Links in Spam Messages to Avoid Detection

Mail-Filters.com, Inc. reported that spammers have escalated their use of redirection techniques to try to get around many anti-spam filters. The latest flurry started about 10:00 AM PDT and by 11:00 AM represented an estimated 4.3% of the spam on the Internet. The technique, most commonly found with pharmaceutical spam in this latest flurry, sends a user to a webpage and the user is then automatically redirected to another webpage. This technique is specifically designed to get around databases of destination URLs that many anti-spam technologies rely upon. Mail-Filters anti-spam/anti-phishing technology is successfully detecting these spam messages.

"Spammers are constantly looking for solutions to avoid detection by anti-spam technologies so that they can reach more eyeballs. We have seen a substantial increase in spam messages being sent where the hyperlinks contained in the messages are actually links to legitimate sites that are then redirected to the spammer sites," explained Ben Westbrook, CTO of Mail-Filters.

Mr. Westbrook continued by explaining, "Because the hyperlink appears to be to a legitimate site, most anti-spam technologies will determine it is a legitimate message or create false-positives by misidentifying legitimate email messages that contain links to these same sites. Mail-Filters technology is correctly blocking the spam messages without causing false-positives. This latest technique is coming in a flurry of messages that sometimes has breaks in the sending -- implying the spammer is evaluating techniques to see what message receives the highest response rate."

Another byproduct of this new spammer technique is that legitimate websites are seeing increased traffic to their websites during the redirect process. This increased traffic could create significant load problems for the sites, potentially even temporarily crashing a site from the increased traffic. In addition, unassuming websites that are being targeted by the spammers find themselves in the embarrassing situation of being associated with spammers.

Source: http://www.mail-filters.com/

Friday, November 2, 2007

International Copyright Protection: Fact Or Myth?

There are many myths surrounding the issue of copyright. One of the most common is the idea that there is some sort of universally accepted international copyright protection.

As nice as it would be in our global economy to have some sort of clear international regime in place to govern copyrights and their violations, there is none. There is no international copyright protection.

Generally speaking, protection is governed by the country in which a copyright is claimed or in which a violation is alleged. Most countries do have copyright regulations in place, but their terms may vary considerably.

Some nations actively cooperate with the U.S. on copyright relations and the U.S. Copyright Office provides information about those agreements and methods for handling international copyright disputes.

As mentioned in the introduction to this ebook, there are resources available regarding copyright considerations in other countries. If you have an issue with potential infringement and are willing to do your homework, you may be able to come to grips with the intricacies of international copyright laws and how to apply them to your specific case.

More often than not, however, international copyright issues are too complicated (and often, too costly) for the average person to pursue. This is a particular problem in today’s global economy when a competing website could steal materials from another one without any real fear of legal repercussions.

Widgets.com could steal from GoodWidgets.com without too much concern, it might seem, if one site is ran from England and the other from Azerbaijan.

It is worth noting, however, that many web site hosts that aren’t located in the U.S. are still willing to voluntarily enforce the provisions of the DMCA (which we’ll soon discuss in greater detail). One should not, however, assume that a non-U.S. entity will ever bend to U.S. law. They don’t need to do so and they probably won’t absent an international agreement to the contrary.

Fortunately, many international agreements are in place. The Berne Convention, for instance, has more than one hundred signatories to the treaty who are obliged to provide copyright protections to authors.

The General Agreement on Trades and Tariffs (GATT) treaty also contains some copyright protection provisions.

These treaties have successfully allowed many authors to enforce their rights in other jurisdictions. However, when it comes to copyright, the key factors are often very detailed and differences in laws can result in outcomes one may not anticipate.

Additionally, even though various treaty regimes do assist in copyright protection, the rapidly changing nature of online communication has left some gaps in the system, complicating matters for online copyright holders.

About the Author:
Brian Scott is a freelance journalist who covers copyright law for http://www.researchcopyright.com/. Download his free e-book, "Copyright Basics" at ResearchCopyright.com.