iPhone market share jumps in July

For those who don't know, Net Applications is a web metrics firm that collects data from an "exclusive on-demand network of live stats customers" compiled from some "160 million visitors per month." While the company clams "web sites in our population represent dozens of countries in regions including North America, South America, Western Europe, Australia / Pacific Rim and Parts of Asia," it sure seems like the US is favored. At least that would explain the Mac's numbers, although those numbers dropped off slightly in July. HangZhou Night Net

Source: Net Applications

Dropping from 7.94 percent in June to 7.77 percent in July may leave Appleologists scratching their heads, especially since Apple reported record Mac sales last quarter. Not to cast blame, but in May, Net Applications had to rework its numbers due to a "massive marketing campaign that only worked on Internet Explorer." Perhaps something like that happened in July. If not, by platform, Intel Macs were flat at 5.24 percent, while PPC graybeards dropped from to 2.7 percent last month to 2.53 percent this month. No wonder Snow Leopard is Intel-only. By the time it's released, PPC users will probably represent fewer than one out of four Mac users.

Source: Net Applications

Like Mac OS X, Safari also saw a drop from 6.31 to 6.14 percent. Safari for Windows remained flat at 0.29 percent, the one-time Software Update trick having worked its magic. There are still a few people running Safari 1 & 2, about 0.5 percent, as well as a few developers and daredevils, 0.01 percent, running Safari 4 in Snow Leopard.

Source: Net Applications

As for the iPhone, the good news is that market share has roughly quadrupled in just over a year. The bad news is that four times nothing is still nothing, or 0.19 percent in this case. Still, there can be no doubt that the introduction of the iPhone 3G gave a big boost to that nothing in just a few weeks during July. Again, it's important to keep in mind that the iPhone is listed as an operating system, and it is growth that matters. Linux has doubled its insignificant status in the last year, going from 0.4 to 0.8 percent, but that growth loses out to the iPhone's rate, and things will only get better. Apple is on record as projecting 10 million iPhones sold in—don't even say "through"—2008, and 10 million is roughly double the number sold so far. Assuming Apple makes its goal, iPhone market share should be at least 0.4 percent by early next year.

Overall, this was a mixed month for market share news according to Net Applications. However, if we choose only to believe the numbers we like, it was a stellar month for Apple and the iPhone.

Geometry Wars 2: how to add complexity to a classic

It has taken me quite a while to determine what I think of Geometry Wars 2. While the overall feel and concepts of the game stay close to the original, much of the core game play has been changed, and this dramatically changes how the game feels. First, your gun doesn't level up, so there is only one type of fire through the entire experience. Two, you don't get multipliers for killing enemies. Now you have to kill enemies, and grab the little green balls they drop before they disappear. This is very reminiscent of Everyday Shooter, and forces you to move in a much more aggressive manner. HangZhou Night Net

There is also the matter of the different game modes. In the first game you were simply racing for the high score, but now the game includes six different game modes. Some of them are rather obvious—Deadline simply gives you a limited time to get as many points as possible—but others are genius; King and Pacifism will have you playing round after round until you're a sweaty mess.

In King, you can only fire while inside circular shields that keep the enemies out, but each shield only lasts a little while. You get a warning alarm, and have to rush to the next one without crashing into an enemy, while also trying to pick up as many multipliers as possible. It's frantic, and the risk vs. reward is a struggle as you try to make it to safety while also understanding you will never take down your friends' high scores without a huge multiplier. The best scores from your friends list stay on the upper right-hand side of the screen, taunting you. In an inspired touch, the music gets muffled as you move from circle to circle; you really don't feel comfortable moving without the protection of those shields.

In Pacifism you can't fire at all. You have to pass through exploding barriers to take out the enemies around you. The poles at each end of the barriers will kill you. The enemies will kill you. You have no way to attack that doesn't put you directly in harm's way. By leading huge groups of enemies through the barriers, you can rack up some major points, and again, it's all risk vs. reward.

Other modes, such as Waves and Evolved, are fun to play, but don't have quite the brain-grabbing addictive quality of the King and Pacifism. That's fine though, as Evolved is simply the updated mode from the first game, and it's still a blast to play. Between the six modes, and it will unfortunately take you an hour or so to unlock all of them, everyone will find something they love.

Unfortunately, the four-play multiplayer, which features co-op, competitive play, and team-based play for both, is a blast with a dedicated group of games, but it's also offline only. You won't be taking this game online anytime soon, except to challenge the scores of others.

No matter. The game is worth your $10. I've already put more time into the game than I have some full-priced titles. The new menus, improved music and special effects, and the built-in challenge of chasing your personal best and measuring it against the leader boards will keep you playing for a long time. I'm not sure what can be done with a Geometry Wars 3, but if the sequels continue to be this good, I'm looking forward to seeing even more modes and ideas. I had middling expectations going into this title, but I have been very impressed with how fresh everything feels. Bravo.

China opens crack in Great Firewall for Olympic press

It's closed! It's open! It's closed! It's open again! The Chinese government has once again agreed to open the Internet for press during the Olympic Games, apparently after being pressured by the International Olympic Committee, which in turn was pressured by the international journalism community. The IOC announced today that the press would, again, be able to report on the Games as freely as they have in other countries, and declared the issue "solved." HangZhou Night Net

The news comes just days after furor over China's continued Internet censorship reached fever pitch, as journalists began to arrive in Beijing in preparation for the Games' commencement August 8. China had originally promised, as part of its host city agreement, that it would open the Internet so that the press could report on the Games freely, but journalists quickly found that was not the case. This week, they complained of extremely slow Internet connections in the Main Press Centre (which some theorized was a deterrent from using the Internet altogether), completely inaccessible international web sites, and even "harassment" from Chinese law enforcement.

At the time, the IOC seemed to be both alarmed at the news and resigned to it. The IOC had told certain news outlets that it was looking into the issue and that the press would still need unfettered Internet access. On the other hand, the organization admitted that certain web sites and topics would continue to be censored thanks to an agreement with the Beijing Organizing Committee for the Games (BOCOG). This drew the ire of journalists everywhere, many of whom excoriated the IOC for not trying harder to hold China to its promises.

Now, however, things are magically solved. The IOC said in a statement issued today that the Committee met with BOCOG and the issues are in the process of being fixed. "Already we put a team together in the IOC to work with BOCOG to begin to open up sites which we believe are absolutely necessary to comply with noncensored reporting of the Games," IOC Press Commission chairman Kevan Gosper told Reuters. "We are in the process of getting web sites which were previously blocked unblocked."

Indeed, it seems as if web sites that the press had previously complained about not being accessible, such as Amnesty International's website and the BBC's Chinese version, are now accessible through Beijing—at least according to WebSitePulse's Great Firewall test. But the IOC warned that while these sites may be accessible to journalists in Beijing, the rest of the country would still be subject to China's filtered version of the Internet. Additionally, certain types of sites will remain blocked across all of China, including porn and those that are considered "subversive" or against national interests (such as sites related to the Falun Gong and many Tibetan organizations). Gosper attempted to justify this by adding, "That's normal in most countries in the world." Um, yeah… right.

Some organizations that previously criticized China and the IOC cautiously applauded today's progress, although they remained somewhat skeptical. Reporters Without Borders, whose web site has been blocked by the Chinese government since 2003, found that its web site is now not only accessible in various parts of Beijing, but also in some areas of Shanghai. "This is good news, of course," the organization noted, "but it continues to be unacceptable that the Chinese government can decide, according to its mood, which web sites are censored and which are accessible. And how long will these sites be available to the 253 million Chinese Internet users, who continue to be subject to massive online censorship?"

An animal model that doesn?t match humans

Mice are one of the most commonly used vertebrates in medical research, and their role as an animal model for humans could be called invaluable. However, in an early release paper from Science, researchers point out a case where mice are not ideal models for a protein deficiency that predisposes patients to suffer from specific infections in their first ten or so years of life. HangZhou Night Net

Streptococcus Pneumoniae

MyD88 (Myeloid Differentiation primary response gene 88) is a protein that mediates the interactions of Toll-like receptors and interleukin-1 receptors. The two receptors are significant participants in immunity, as they are both involved in recognizing invading microbes, inducing fevers, and activating cells of the immune system.

A deficiency in MyD88 is detrimental to children because it interferes with important signaling processes that are necessary for fighting specific strains of bacteria. As people grow older, the consequences of MyD88 deficiency lessen as the immune system compensates for this flaw. Although MyD88 deficiency can be overcome with age, it is still dangerous, as most affected children would not survive without the help of antibiotics. Out of the nine children investigated by the researchers, three died before their first birthday.

One issue that could hinder research in MyD88 is that mice and humans react differently to its deficiency. At the immunological level, mice and humans are similar, meaning that comparable signaling processes are disrupted. However, in terms of infectious symptoms, there are huge differences between humans and mice that lack MyD88.

Humans with MpD88 deficiencywere predisposed to be susceptible to Streptococcus pneumonia (pneumonia, meningitis, brain abscess, etc.), Staphylococcus aureus (pneumonia, toxic shock syndrome, meningitis, boils, etc.), and Pseudomonas aeruginosa (urinary tract infections, pneumonia, dermatitis, etc.). But, in addition to the above, mice that lacked this gene were vulnerable to nearly all the pathogens that the researchers tested, which included 19 bacteria, seven viruses, four fungi, and five parasites.

Since mice and humans respond differentlyto MyD88 deficiency, the mostpopular animal model would not be an ideal choice for this line of medical research. That means researchers will be limited to alternatives such as cell culture techniques or possibly other animal models.

Science, 2008. DOI: 10.1126/science.1158298

Latest Apple Security patch addresses DNS flaw, other issues

HangZhou Night Net

Apple has released Security Update 2008-005. In addition to several other security issues, it most notably addresses a serious flaw in the DNS server included in Mac OS X. BIND is updated to version 9.4.2-P1, the same version that was recommended by TidBITS's Glenn Fleishman in his how-to that we mentioned yesterday. Also, a flaw has been fixed in Open Scripting Architecture that allowed applications with elevated privileges to execute arbitrary scripts and commands as root. This fix addresses previously-reported security issues with ARDAgent, part of Apple Remote Desktop.

The update addresses potentially serious security issues with several components of Mac OS X, including CoreGraphics, Carbon long-filename handling, Data Detectors, Disk Utility, and an issue with QuickLook and certain Microsoft Word files. For security reasons, several open-source components included in Mac OS X have also been updated to the latest stable versions, including OpenLDAP, OpenSSL, PHP, and rsync.

Yesterday, Macworld's John C. Welch took Apple to task for taking so long to address the DNS flaw, especially since Apple had been notified about the issue two months before the flaw was made public on July 8. By then, Apple was the only OS vendor that had not issued a patch. Whatever the reason for the delay, Welch rightfully criticized Apple for not communicating its plans to address the problem. "Even if the patch is released today, that’s not going to be enough," he wrote. Apple has come a long way in improving its response to security issues in its software, but this incidence demonstrates that Apple still has a long way to go to earn the trust of IT professionals.

FCC spanks Comcast for P2P blocking: no fine, full disclosure

The Federal Communications Commission has sanctioned Comcast for "secretly degrading peer-to-peer applications," as the agency put it today. The Commission has issued a decision arguing that its Internet Policy Statement gives it the power to regulate Internet network management, and that Comcast's management was unreasonable. The FCC's Order will require Comcast to "disclose the details of its discriminatory network management practices to the Commission," set up a compliance plan to fix the problem, and fully outline its new practices to the FCC and consumers by the end of this year. HangZhou Night Net

At today's Open Commission hearing, FCC Wireline Bureau chief Dana Schaffer announced the division's conclusions. Comcast network management practices "discriminate against network management protocols rather than treating them equally," Schaffer said. The company has deployed network management technology that "selectively terminates" P2P connections. Schaffer called Comcast's practices "invasive," charging that the firm essentially prioritizes digital mail, not based on the address on the envelope, "but on the type of letter."

"Will the Internet evolve out in the open?" asked FCC Commissioner Michael Copps. "Or will network operators bring it under their control for their own purposes?" A majority of three agency Commissioners voted today for an Order that they hope will preserve openness: Copps, his fellow Democrat Jonathan Adelstein, and, most significantly, FCC Chair Kevin Martin, who continued Shaffer's mail metaphor in his public comments.

"Would anyone here actually be OK if the Post Office was opening your mail and deciding that they didn't want to bother delivering it and hiding that fact by sending it back to you stamped 'address unknown, return to sender'?" Martin asked the audience. "Or would anyone here be OK if someone sent them a First Class letter, and the Post Office decided that they would open it, and deciding that because the mail truck was full sometimes, they would make the determination that your letter could wait, and then they would hide that fact from you, the fact that they had read your letter and opened it, and that they decided to delay it?"

"Unfortunately, this was exactly the practice that Comcast was engaging in with their own subscribers' Internet traffic," Martin declared.

Two of the agency's five members dissented: Republicans Robert M. McDowell and Deborah Taylor Tate. Tate argued that the matter would be better resolved via private negotiations. McDowell contended that the FCC lacks the authority to enforce the issue, and that "the truth is that the FCC does not know what Comcast did or did not do."

The agency responded to complaints filed last year from Free Press, Public Knowledge, and a petition from the Vuze Corporation, charging that Comcast has chronically interfered with P2P traffic. Through 2008 the Commission received well over 30,000 statements, comments, and studies on the matter. It also held two full hearings at Harvard Law School and Stanford University.

Comcast sent Ars a response to Martin's comments even before he finished making his public statement at today's hearing. The cable giant said it was grateful that the agency's decision did not include a fine. "On the other hand, we are disappointed in the Commission's divided conclusion because we believe that our network management choices were reasonable, wholly consistent with the industry practices and that we did not block access to Web sites or online applications, including peer-to-peer applications," declared Comcast Senior Director Sena Fitzmaurice.

Comcast also warned that it is pondering its legal options. Many observers expect the ISP provider to take this ruling to court.

Further reading

The FCC's news release on its decision

Reactions to FCC’s Comcast decision come fast and furious

Hope, indignation, and outrage greeted the Federal Communications Commission's enactment of sanctions against Comcast for throttling P2P applications. Much of the response came before today's ruling, following FCC Chair Kevin Martin's disclosure last week of the impending decision. HangZhou Night Net

A "historic test," complainant Free Press called the move. "If the commission decisively rules against Comcast, it will be a remarkable victory for organized people over organized money." Today's decision confirmed the advocacy group's hopes. "Defying every ounce of conventional wisdom in Washington, every-day people have taken on a major corporation and won an historic precedent for an open Internet."

Jay Monahan

Jay Monahan, General Counsel of Vuze, told Ars yesterday that when the hi-res video content company filed its net neutrality petition, he didn't expect the explosion of passionate support that followed. "When I saw the thousands of submissions to the Commission by consumers and the standing room only FCC field hearings that we attended and in some cases testified at, that part surprised me," Monahan confided in an interview. "That there were that many people paying this much attention to this."

The FCC's action may also be a global precedent. Ars asked Columbia law professor Tim Wu whether any other country has taken similar steps. It's a tricky call, he responded, because, unlike the United States, some countries have retained their common carrier powers over the Internet.

"However, in terms of enforcement, this is a first in the world as far as I know," Wu said.

Comcast and its allies

Meanwhile, Comcast, the recipient of today's punitive FCC Order, has been serving up a steady stream of clenched jaw rhetoric. "The Commission's order raises significant due process concerns and a variety of substantial legal questions," the company warned today. "We are considering all our legal options and are disappointed that the commission rejected our attempts to settle this issue without further delays."

The rest of the cable industry has resolutely stood by Comcast's side. On Tuesday, a senior VP of Time Warner cable met with the FCC, warning that "government intrusion into broadband providers' traffic management practices would have a chilling effect on investment and innovation." Four days earlier, the National Cable and Telecommunications Association sent the agency a chart of the network management practices of the nation's top colleges and universities. "If there is to be regulation, therefore, it must apply equally to all providers," NCTA's filing grimly advised.

But the undisguised outrage has come from the hardcore right, which views with horror the spectacle of Republican FCC Chair Martin delivering what it sees as the broadband equivalent of the Fairness Doctrine. The Wall Street Journal's editorial writers—who must surely sign a pact never to read the newspaper's excellent articles about telecommunications—lambasted Martin on Wednesday as a self-appointed "Master of the Media Universe," a chump for Moveon.org, and worse.

"Mr. Martin is also greasing the skids for a potential Barack Obama Administration to take an Internet industrial policy who knows where," the Journal warned. Ditto, declared House Republican Minority leader John Boehner, who the next day sent an angry letter to Martin, denouncing his efforts to "hijack the evolution of the Internet to everyone's detriment."

One senses in these frantic protests legitimate fears that Martin's move represents yet another sign that these are the End Days of the Reagan Era. It is very unlikely that the FCC's 42-year-old chief parties with the Free Press crowd. But with today's ruling, he has clearly sided not just with the FCC's "two Democrats," as the Journal bitterly calls them, but with a younger, technology-loving generation that sees government as an ally rather than The Problem.

Net neutrality isn't a slippery slope

In Ars' interview with Jay Monahan, the attorney bristled at the Wall Street Journal's insistence that "net neutrality is a slippery slope toward interventions of all kinds." It is the opposite, he insisted. "What Martin has proposed, and what the Commission is about to do, is exactly designed to protect innovation, and to protect competition," Monahan argued. "If net neutrality means anything, it means not that each of us is made equal in the marketplace, but that at least we have an equal set of rules that are transparent to all of us in order to compete."

Nobody, least of all Vuze, thinks this fight is over. Monahan says he fully expects Comcast to "appeal the Commission's order"—which means a lawsuit against the FCC, a Congressional counterattack, or both. Still, he sees today as a day to celebrate.

"We do view this as a first step," Monahan concluded. "A first step towards helping to build an open and free Internet. And we're grateful to the Commission for having the courage to adopt this order so that we can move forward and go back to our Palo Alto office and continue to compete in this marketplace."

40 million stolen credit cards later, DoJ charges 11 hackers

A group of hackers who perpetrated numerous credit card and personal identification thefts are being charged with numerous crimes ranging from conspiracy, computer intrusion, fraud, and identity theft. Altogether, this constitutes the largest hacking and identity theft case ever prosecuted by the Department of Justice. HangZhou Night Net

Eleven perpetrators from around the world are being charged with the theft and illegal sales of credit card numbers and personal information stolen from retail stores like TJ Maxx, Office Max, Boston Market, Barnes & Noble, Sports, Authority, Forever 21, DSW, and more. After obtaining the data, the perpetrators stored it in an encrypted format (a step that others could learn from) on servers in Eastern Europe and the US, then sold the data to customers in those countries. Credit card numbers were typically imprinted onto blank cards, then used to withdraw tens of thousands of dollars from ATMs.

One perpetrator, Albert Gonzalez, had previously been arrested by the Secret Service in 2003 for access device fraud. Gonzalez was acting as a confidential informant for the agency during the course of this most recent investigation, but was found out to be criminally involved with another case of stealing credit card data from the Dave & Buster's chain. Because of this, he faces a maximum penalty of life in prison if he is convicted of all charges.

Courts in various cities will hear the charges brought against this retail hacking ring. For example, a San Diego indictment against Hung-Ming Chiu and Zhi Zhi Wang, both of the People's Republic of China, and a person known only by the online nickname "Delpiero" (a real name and origin are unknown) charges the three with conspiracy to possess unauthorized access devices, trafficking in unauthorized access devices, trafficking in counterfeit access devices, possession of unauthorized access devices, aggravated identity theft, and aiding and abetting.

With the help of Sergey Pavolvich, of Belarus, and Dzmitry Burak and Sergey Storchak of Ukraine, these eight perpetrators are charged with operating an international stolen credit and debit card distribution ring, and selling these cards for personal gain. As an example, the indictment cites Yastremskly alone as receiving over $11 million from these activities. Suvorov and Yastremskiy were charged in May with accompanying Gonzalez when hacking the Dave & Buster's chain.

"So far as we know, this is the single largest and most complex identity theft case ever charged in this country," said Attorney General Mukasey in the DoJ press release. "It highlights the efforts of the Justice Department to fight this pernicious crime and shows that, with the cooperation of our law enforcement partners around the world, we can identify, charge and apprehend even the most sophisticated international computer hackers." It also highlights the risk to consumers when retailers are lax with data they collect on consumers in the ordinary course of business.

Brazilian hackers stalk Twitter, try to wax the unwary

Social websites like Facebook and MySpace have attracted a great deal of attention as targets of opportunity for phishing scams, but they are scarcely the only two social networking sites. New information suggests that hackers have tuned in to the newfound popularity of microblogging, and are at the very least evaluating Twitter as a potential target. HangZhou Night Net

In a blog post at Kaspersky Labs' Viruslist, Dmitry Bestuzhev describes the attack and how it functions. The Twitter profile itself was created specifically for the attack; profile information is posted in Portuguese. There's nothing on the page but a link to a video promising hot girl action, actually clicking on the file redirects the browser and instructs the user to download a new version of Adobe Flash that's supposedly required to watch the "film."

By this point, alarm bells should've been ringing if they haven't already gone off; end-users who install the fake Flash update end up with what Dmitry describes as 10 banker Trojans, all disguised as MP3 files. Based on information in the profile, the location of the web servers, and the e-mail the malware program sends, he believes this attack originated in Brazil—though it's virtually impossible to be 100 percent sure.

The actual payload is nothing new, and delivery requires little more than a web server and some Trojans. The threat, as is typical with phishing schemes, lies within the attack vector itself. The current structure of Twitter, according to Bestuzhev, leaves the service vulnerable to abuse. Unprotected Twitter profiles are indexed by Google, which could allow an infected profile to bounce to the top of a search index, and Twitter is currently vulnerable to an exploit that allows an attacker to force his victim to follow him on Twitter. The more followers attached to an infected page, the better the chances that the infection could spread. As the infection spreads, the profile's number of followers on Twitter rises, which increases the chance of infection…you get the idea.

Dmitry notes that this type of attack hasn't surfaced as a full-blown assault in the wild—at least not yet—but hackers are obviously taking a proactive approach to new delivery systems. Today's viability test can become next week's viral explosion, making it all the more important to patch flaws as they are discovered. As for Twitter itself, the very nature of the service could make it amenable to certain attack vectors. The best way to discover if an e-mail or website is genuine or not is to read it; the vast majority of phishing lures are written in lousy English, and a little context goes a long way towards classifying an e-mail. Twitter, by definition, is all about removing that context and cutting straight to the point in 140 characters or less.

There are still plenty of ways to tell a real Twitter user from a fake one, and the company has committed to patching the auto-follow vulnerability I mentioned earlier, so these loopholes will hopefully be closed before anyone manages to take advantage of them. Phishers, however, will probably follow the money trail, keen to present their wares to anyone they can convince to click in just one sentence or less.

2 IP addresses, 40 matches: Tufts tries to cut RIAA driftnet

One of the problems with the RIAA's lawsuit campaign is that it's heavily reliant on the assumption that tying an IP address to a person sitting at a PC at a particular time is a trivial matter. The reality is much messier, as a case involving 11 students at Tufts University in Massachusetts demonstrates. A vice president at the school has written to a federal judge, pointing out the difficulty of tying the 11 IP addresses logged by MediaSentry to specific MAC addresses (and users). HangZhou Night Net

Under a March court order, Tufts (and other schools and ISPs in that particular district) are supposed to provide the court with a list of all possible matches when unable to determine the identity of the user sought by the RIAA to a "reasonable degree of technical certainty." The judge then reviews the list and makes a determination on how to proceed. In the case of Zomba Recording v. Does 1-11, Tufts argues that there are just too many possible users involved, which has implications for this particular RIAA fishing expedition.

While Tufts can tie three IP addresses to particular MAC addresses with reasonable certainty, two of the other IP addresses fingered by MediaSentry could have been used by as many as forty users during the time in question. "It is therefore difficult to conclude with any reasonable level of certainty that any one of those users was actually using the IP address in question at the relevant time," writes the university. "We believe, in these two instances, that it would be unfair to identify all possible individuals meeting the plaintiffs' criteria, given the low likelihood of identifying the guilty party."

Tufts keeps data on MAC addresses—all of which are registered to particular users—for a period of years. The IP addresses assigned to those MAC addresses via DHCP, however, are only kept for 10 days before being overwritten. The school also uses Address Resolution Protocol to grab entries from routers around the campus at various intervals, but as it only records the first and last times a particular user is assigned an IP address, it is an imprecise and incomplete record.

In other cases where a school is only able to narrow down the list of possible P2P users to a dorm room with two or more residents, the RIAA has typically sought to obtain the names of all possible infringers in an attempt to discover the identity of the P2P user in question. With 40 possible users for two IP addresses, such an approach is impractical. Moreover, there are privacy implications for the at least 38 innocent students involved. We asked the RIAA how it would handle the situation with the two Tufts IP addresses. "As we do in all of our cases when issues are presented, we will work with the school to determine the most reasonable course of action to prevent further abuse of its network," an RIAA spokesperson told Ars.

One way to solve this problem from the RIAA's perspective would be tighter record-keeping and networking monitoring by the schools themselves. Tufts even admits that it could do a better job with data retention: "We recognize the inherent limitations of the network data retention system that we are currently using, and are actively looking at possible adjustments." The RIAA has joined the MPAA in pushing for legislation on the federal and state level that would require colleges to crack down on P2P use on campus, which would presumably involve longer retention times for network data. The recently passed College Opportunity and Affordability Act will require colleges to start working on formal piracy deterrence plans, and Big Content has also been lobbying states to pass more stringent antipiracy laws.

Further readingTufts University's letter to Judge Nancy Gertner (PDF) Found via Recording Industry vs The People