Share This

Wednesday 24 March 2010

Google in hot water

Google has recently been warned by several foreign authorities over its controversial services including Google news, Google street view, as well as the latest social network service Google buzz.

Last month, the European Union Commission said it had received various requests for anti-monopoly investigations regarding the Internet search giant.
Last month, the European Union Commission said it had received various requests
for anti-monopoly investigations regarding the Internet search giant.

Last month, the European Union Commission said it had received various requests for anti-monopoly investigations regarding the Internet search giant. They claim Google has been filtering out its competitors on purpose in order to keep more advertisement profits.

In France, the government has formed a special team to investigate lawsuits filed by local media companies against Google. They accuse the company of profiting from their products without reimbursement. Another lawsuit was filed by Louis Vutton. The luxury bagmaker said it has found links on Google's website to pirated products. Italian authorities have also launched an anti-trust investigation against Google filed by the country's print media.

Meanwhile, Google street view, which was introduced in 2007, has challenged privacy laws in Britain and Germany. Though the company has begun to obscure search results for human faces and car license plates, it is still frequently taken to court for violating privacy rights. Its latest social web service, Google Buzz, has also been accused of a privacy breach. The company was ordered by the Canadian government to explain privacy bugs, which have already triggered widespread complaints.

Google's trouble seems to be everywhere. Recently Spanish telecom operator Telofonica accused the company of using free bandwidth for its own benefit. The company said it is considering charging Google for network use.


Tuesday 23 March 2010

'Good fat' cuts heart risk by a fifth, study shows

Minced beef
Red meat is a source of animal fats
Replacing saturated fats with healthier options can cut the risk of heart disease by a fifth, a US study says.
The Harvard Medical School reports adds weight to the growing evidence about polyunsaturated fats, found in some fish and vegetable oils.

The team analysed the findings from eight previous studies, covering more than 13,000 people, in their research.
Experts said cutting down on saturated fats, found in butter and meat, was just one part of a healthy diet.

It is recommended that adults get no more than 11% of their energy from saturated fats.
Our findings suggest that polyunsaturated fats would be a preferred replacement for saturated fats for better heart health
Dariush Mozaffarian, lead researcher
This is because the fats raise the levels of bad cholesterol that block the arteries to the heart.

In comparison, polyunsaturated fats have the opposite effect by increasing the levels of good cholesterol.

The Harvard analysis suggested that for every 5% increase in polyunsaturated fat consumption there was a 10% fall in heart disease.

The average rise in uptake of such fats was 10% giving the overall figure of a fifth lower risk over a period of just over four years.

Replacement

Lead researcher Dariush Mozaffarian said there was always a risk cutting down on saturated fats meant they were replaced with other bad options such as trans-fats which are found in processed foods such as biscuits and cakes.

He added: "Our findings suggest that polyunsaturated fats would be a preferred replacement for saturated fats for better heart health."

Victoria Taylor, from the British Heart Foundation, said the research reinforced existing recommendations to reduce saturated fats.

But she added: "What this study doesn't consider is whether substitution with monounsaturated fats, such as olive and rapeseed oils, would have similar benefits so more research is needed to understand this area fully.


"While the fat content and profile of your diet is clearly important, it must also be seen as just one part of a heart healthy diet where a low saturated fat and salt intake is combined with the consumption of oily fish and at least five portions of fruit and vegetables a day."



US law enforcement agencies stake out social networks

US law enforcement agencies stake out social networks

LONG ARM OF THE LAW: Assistant US Attorney Michael Scoville displaying part of the Facebook page of a fugitive in Seattle. US law enforcement agents are following the rest of the Internet world into social-networking services, going undercover with false online profiles to communicate with suspects and gather private information, according to an internal Justice Department document. — AP
 
WASHINGTON: US law enforcement authorities have signed up for Facebook, MySpace, LinkedIn and Twitter.

Justice Department and Internal Revenue Service (IRS) documents obtained by the Electronic Frontier Foundation (EFF) reveal some of the ways the FBI and tax agents are allowed to use social networks for investigative purposes.

The documents were posted this week on the website of the EFF after being obtained through a lawsuit filed under the Freedom of Information Act by the San Francisco-based electronic rights group and the Samuelson Clinic of the University of California, Berkeley.

The key documents are from a 2009 training course for IRS employees and an August 2009 Justice Department presentation on “Obtaining and Using Evidence from Social Networking Sites.”

The IRS documents clearly state that employees are not allowed to use false identities to scour social networking accounts while conducting a probe into a taxpayer.

The Justice Department presentation on the other hand includes a slide on “undercover operations” and asks “Why go undercover on Facebook, MySpace etc?”

Among the reasons cited may be to “communicate with suspects/targets,” to “gain access to non-public info” or to “map social relationships/networks,” it says.

The presentation also asks “if agents violate terms of service, is that ‘otherwise illegal activity.’”
The terms of use of most social networks bar the use of fake identities or impersonation.

The Justice Department document lists a number of ways in which evidence from social networking sites can be useful including to “reveal personal communications” or “establish motives and personal relationships.”
Social networks can also be used to “provide location information,” to “prove and disprove alibis” or to “establish crime or criminal enterprise.”

The Justice Department said Facebook is “often cooperative with emergency requests” while Twitter has a “stated policy of producing data only in response to legal process.”

MySpace “requires a search warrant for private messages/bulletins less than 181 days old,” the Justice Department said, while LinkedIn’s “use for criminal communications appears limited.”

Andrew Noyes, a Facebook spokesman, outlined the company’s policies in an e-mail to AFP.

“Like other companies holding personal records — from phone records to medical history — Facebook works with law enforcement to the extent required by law and where appropriate to ensure the safety of Facebook users,” he said.

“Our goal is to respect the balance between law enforcement’s need for information and the privacy rights of our users, and as a responsible company we adhere to the letter of the law,” Noyes said.

“We scrutinise every single law enforcement request; require a detailed description of why the request is being made; and if it is deemed appropriate, share only the minimum amount of information,” he said.

Regarding emergency requests, Noyes said “in rare instances our policies and the law allow for emergency sharing.

“One hypothetical is the case of a kidnapped child where every minute counts. In instances like this, where we’ve verified an emergency, we feel a responsibility to quickly share information that could save someone’s life.” — AFP/Relaxnews

Staking out social networks


NEW FRIENDS: Assistant US Attorney Michael Scoville displaying part of the Facebook page and an enlarged profile photo of fugitive Sopo. US law enforcement agents are following the rest of the Internet world into popular social-networking services to nab suspects and gather private information. — AP
 
Break the law in the United States and your new ‘friend’ may just be the FBI. 

The Feds are on Facebook. And MySpace, LinkedIn and Twitter, too.

US law enforcement agents are following the rest of the Internet world into popular social-­networking services, going ­undercover with false online profiles to communicate with suspects and gather private ­information, according to an ­internal Justice Department ­document that offers a tantalising glimpse of issues related to privacy and crime-fighting.

Think you know who’s behind that “friend” request? Think again. Your new “friend” just might be the FBI.
The document, obtained in a Freedom of Information Act lawsuit, makes clear that US agents are already logging on surreptitiously to exchange messages with suspects, identify a target’s friends or ­relatives and browse private ­information such as postings, personal photographs and video clips.

Among other purposes: Investigators can check suspects’ alibis by comparing stories told to police with tweets sent at the same time about their whereabouts. Online photos from a suspicious spending spree — people posing with jewellery, guns or fancy cars — can link suspects or their friends to robberies or burglaries.

Going undercover

The Electronic Frontier Foundation, a San Francisco-based civil liberties group, obtained the Justice Department document when it sued the agency and five others in federal court. The 33-page document underscores the importance of social networking sites to US authorities.

With agents going undercover, state and local police coordinate their online activities with the Secret Service, FBI and other federal agencies in a strategy known as “deconfliction” to keep out of each other’s way.
“You could really mess up ­someone’s investigation because you’re investigating the same person and maybe doing things that are counterproductive to what another agency is doing,” said Detective Frank Dannahey of the Rocky Hill, Connecticut, Police Department, a veteran of dozens of undercover cases.

A decade ago, agents kept watch over AOL and MSN chat rooms to nab sexual predators. But those text-only chat services are old-school compared with today’s social media, which contain mountains of personal data, photographs, videos and audio clips — a potential ­treasure trove of evidence for cases of violent crime, financial fraud and much more.

The Justice Department ­document, part of a presentation given in August by top cybercrime officials, describes the value of Facebook, Twitter, MySpace, LinkedIn and other services to government investigators. It does not describe in detail the ­boundaries for using them.

“It doesn’t really discuss any mechanisms for accountability or ensuring that government agents use those tools responsibly,” said Marcia Hoffman, a senior attorney with the civil liberties foundation.

The group sued in Washington to force the government to disclose its policies for using social networking sites in investigations, data ­collection and surveillance.

Covert investigations on social-networking services are legal and governed by internal rules, ­according to Justice Department officials. But they would not say what those rules are.

Different purposes

The Justice Department document raises a legal question about a social-media bullying case in which US prosecutors charged a Missouri woman with computer fraud for creating a fake MySpace account — effectively the same activity that undercover agents are doing, although for different purposes.

The woman, Lori Drew, helped create an account for a fictitious teen boy on MySpace and sent ­flirtatious messages to a 13-year-old neighborhood girl in his name. The girl hanged herself in October 2006, in a St Louis suburb, after she received a message saying the world would be better without her.

A jury in California, where MySpace has its servers, convicted Drew of three misdemeanour counts of accessing computers without authorisation because she was accused of violating MySpace’s rules against creating fake accounts. But last year a judge overturned the verdicts, citing the vagueness of the law.

“If agents violate terms of service, is that ‘otherwise illegal activity’?” the document asks. It doesn’t provide an answer.

Facebook’s rules, for example, specify that users “will not provide any false personal information on Facebook, or create an account for anyone other than yourself without permission.”

Twitter’s rules prohibit its users from sending deceptive or false information. MySpace requires that information for accounts be ­“truthful and accurate.”

Social stakeout
 
A former US cybersecurity ­prosecutor, Marc Zwillinger, said investigators should be able to go undercover in the online world the same way they do in the real world, even if such conduct is barred by a company’s rules. But there have to be limits, he said.

In the face-to-face world, agents can’t impersonate a suspect’s spouse, child, parent or best friend. But online, behind the guise of a social-networking account, they can.

“This new situation presents a need for careful oversight so that law enforcement does not use social networking to intrude on some of our most personal relationships,” said Zwillinger, whose firm does legal work for Yahoo! and MySpace.

Undercover operations aren’t necessary if the suspect is reckless. Federal authorities nabbed a man wanted on bank fraud charges after he started posting Facebook updates about the fun he was having in Mexico.

Maxi Sopo, a native of Cameroon living in the Seattle area, apparently slipped across the border into Mexico in a rented car last year after learning that federal agents were investigating the alleged scheme. The agents initially could find no trace of him on social media sites, and they were unable to pin down his exact location in Mexico. But they kept checking and ­eventually found Sopo on Facebook.

While Sopo’s online profile was private, his list of friends was not. Assistant US Attorney Michael Scoville began going through the list and was able to learn where Sopo was living. Mexican ­authorities arrested Sopo in September. He is awaiting ­extradition to the United States.

Levels of cooperation

The Justice document describes how Facebook, MySpace and Twitter have interacted with federal investigators: Facebook is “often cooperative with emergency requests,” the government said. MySpace preserves information about its users indefinitely and even stores data from deleted accounts for one year. But Twitter’s lawyers tell prosecutors they need a warrant or subpoena before the company turns over customer information, the document says.

“Will not preserve data without legal process,” the document says under the heading, “Getting Info From Twitter ... the bad news.” Twitter did not respond to a request for comment for this story.

The chief security officer for MySpace, Hemanshu Nigam, said MySpace doesn’t want to be the company that stands in the way of an investigation.

“That said, we also want to make sure that our users’ privacy is protected and any data that’s disclosed is done under proper legal process,” Nigam said.

MySpace requires a search warrant for private messages less than six months old, according to the company.
Facebook spokesman Andrew Noyes said the company has put together a handbook to help law enforcement officials understand “the proper ways to request ­information from Facebook to aid investigations.”

The Justice document includes sections about its own lawyers. For government attorneys taking cases to trial, social networks are a ­“valuable source of info on defense witnesses,” they said. “Knowledge is power. ... Research all witnesses on social networking sites.”

But the government warned prosecutors to advise their own witnesses not to discuss cases on social media sites and to “think carefully about what they post.”

It also cautioned federal law enforcement officials to think prudently before adding judges or defence counsel as “friends” on these services.

“Social networking and the ­courtroom can be a dangerous combination,” the government said. — AP


Ernst & Young: Lehman accounting in accordance with US's GAAP

Auditors at Ernst & Young [ERNY.UL] are firing back at allegations that the "Big Four" auditor failed to detect accounting tricks at collapsed investment bank Lehman Brothers Holdings Inc

Following are excerpts from a letter sent by Ernst & Young partners to client audit committees in the past few days.
--------------------------------------------------------
The concept of an examiner's report is a feature of U.S. bankruptcy law. It does not represent the views of a court or a regulatory body, nor is the Report the result of a legal process. Instead, an examiner's report is intended to identify potential claims that, if pursued, may result in a recovery for the bankrupt company or its creditors.

EY is confident we will prevail should any of the potential claims identified against us be pursued.
We wanted to provide you with EY's perspective on some of the potential claims in the Examiner's Report. We also wanted to address certain media coverage and commentary on the Examiner's Report that has at times been inaccurate, if not misleading.

A few key points are set out below. General Comments:

-- EY's last audit was for the year ended November 30, 2007. Our opinion stated that Lehman's financial statements for 2007 were fairly presented in accordance with U.S. GAAP, and we remain of that view. We reviewed but did not audit the interim periods for Lehman's first and second quarters of fiscal 2008.

-- Lehman's bankruptcy was the result of a series of unprecedented adverse events in the financial markets. The months leading up to Lehman's bankruptcy were among the most turbulent periods in our economic history. Lehman's bankruptcy was caused by a collapse in its liquidity, which was in turn caused by declining asset values and loss of market confidence in Lehman. It was not caused by accounting issues or disclosure issues.

-- The Examiner identified no potential claims that the assets and liabilities reported on Lehman's financial statements (approximately $691 billion and $669 billion respectively, at November 30, 2007) were improperly valued or accounted for incorrectly.



Accounting and Disclosure Issues Relating to Repo 105 Transactions:

-- There has been significant media attention about potential claims identified by the Examiner related to what Lehman referred to as "Repo 105" transactions. What has not been reported in the media is that the Examiner did not challenge Lehman's accounting for its Repo 105 transactions.

-- As recognized by the Examiner, all investment banks used repo transactions extensively to fund their operations on a daily basis; these banks all operated in a high-risk, high-leverage business model. Most repo transactions are accounted for as financings; some (the Repo 105 transactions) are accounted for as sales if they meet the requirements of SFAS 140.

-- The Repo 105 transactions involved the sale by Lehman of high quality liquid assets (generally government-backed securities), in return for which Lehman received cash. The media reports that these were "sham transactions" designed to off-load Lehman's "bad assets" are inaccurate.

-- Because effective control of the securities was surrendered to the counterparty in the Repo 105 arrangements, the accounting literature (SFAS 140) required Lehman to account for Repo 105 transactions as sales rather than financings.

-- The potential claims against EY arise solely from the Examiner's conclusion that these transactions ($38.6 billion at November 30, 2007) should have been specifically disclosed in the footnotes to Lehman's financial statements, and that Lehman should have disclosed in its MD&A the impact these transactions would have had on its leverage ratios if they had been recorded as financing transactions.

-- While no specific disclosures around Repo 105 transactions were reflected in Lehman's financial statement footnotes, the 2007 audited financial statements were presented in accordance with US GAAP, and clearly portrayed Lehman as a leveraged entity operating in a risky and volatile industry. Lehman's 2007 audited financial statements included footnote disclosure of off balance sheet commitments of almost $1 trillion.

-- Lehman's leverage ratios are not a GAAP financial measure; they were included in Lehman's MD&A, not its audited financial statements. Lehman concluded no further MD&A disclosures were required; EY did not take exception to that judgment.

-- If the Repo 105 transactions were treated as if they were on the balance sheet for leverage ratio purposes, as the Examiner suggests, Lehman's reported gross leverage would have been 32.4 instead of 30.7 at November 30, 2007. Also, contrary to media reports, the decline in Lehman's reported leverage from its first to second quarters of 2008 was not a result of an increased use of Repo 105 transactions. Lehman's Repo 105 transaction volumes were comparable at the end of its first and second quarters.

Handling of the Whistleblower's Issues:

-- The media has inaccurately reported that EY concealed a May 2008 whistleblower letter from Lehman's Audit Committee. The whistleblower letter, which raised various significant potential concerns about Lehman's financial controls and reporting but did not mention Repo 105, was directed to Lehman's management. When we learned of the letter, our lead partner promptly called the Audit Committee Chair; we also insisted that Lehman's management inform the Securities and Exchange Commission and the Federal Reserve Bank of the letter. EY's lead partner discussed the whistleblower letter with the Lehman Audit Committee on at least three occasions during June and July 2008.

--In the investigations that ensued, the writer of the letter did briefly reference Repo 105 transactions in an interview with EY partners. He also confirmed to EY that he was unaware of any material financial reporting errors. Lehman's senior executives did not advise us of any reservations they had about the company's Repo 105 transactions.

-- Lehman's September 2008 bankruptcy prevented EY from completing its assessment of the whistleblower's allegations. The allegations would have been the subject of significant attention had EY completed its third quarter review and 2008 year-end audit.

Should any of the potential claims be pursued, we are confident we will prevail.

Rio Tinto Executives Plead Guilty to Bribery in China

Tom Connor, Australia's Consul-General in Shanghai, center, speaks  to journalists after the trial of an Australian citizen outside of the  Shanghai's No. 1 People's Intermediate Court, 22 Mar 2010
  Tom Connor, Australia's Consul-General in Shanghai, center, speaks to journalists after the trial of an Australian citizen outside of the Shanghai's No. 1 People's Intermediate Court, 22 Mar 2010
Four mining executives on trial in Shanghai have pleaded guilty to taking bribes in a case that has raised international concern about doing business in China.

Lawyers for the executives from the Australian mining giant Rio Tinto told reporters outside the courtroom Monday that their clients admitted receiving bribes, but are challenging the amounts they are accused of accepting.

Australian Stern Hu and his Chinese colleagues Liu Caikui, Ge Minqiang and Wang Yong were arrested last July during negotiations with Chinese officials over the price of iron ore.

They are accused of obtaining inside information that helped Rio Tinto during the talks, and will face charges of corporate espionage in a separate, closed-door trial this week.

Australia has called for transparency in the case.

The trial has raised concerns among international investors about China's judicial system, which is not fully independent and does not always meet international standards.

China has said all four defendants will have their rights protected.

Rio Tinto chief executive Tom Albanese said Monday that the case is a "great concern" to the company. But he said he would respectfully await the outcome of the Chinese legal process.

Some information for this report provided by AFP, AP and Reuters.