Search This Blog

Monday, December 27, 2010

Playboy founder Hugh Hefner engaged

Story photo: Hugh Hefner, 84, Engaged to Playmate, 24Brian To/FilmMagicUs Magazine

Hugh Hefner's Christmas was extra, extra jolly this year: He's engaged again!

The Playboy founder, 84, is engaged to Crystal Harris, his 24-year-old girlfriend and Playmate, a Playboy rep confirms to UsMagazine.com.

PHOTOS: See Hugh and Crystal's Christmas card!

Hefner first Tweeted about it on Sunday. "When I gave Crystal the ring, she burst into tears," the Girls Next Door star wrote. "This is the happiest Christmas weekend in memory...I got what I was hoping for for Christmas...Crystal's love."

PHOTOS: The year's biggest engagements

To make his news absolutely clear, the mogul then added: "Yes, the ring I gave Crystal is an engagement ring. I didn't mean to make a mystery out of it. A very merry Christmas to all."

PHOTOS: Can you believe these couples' age differences?

It will be the third marriage for famous bachelor Hefner. He wed first wife Mildred in 1949 (they have grown children Christie, 58, and David, 55) before divorcing in 1959. In 1989, he walked down the aisle with Playmate of the Year Kimberley Conrad, and they went on to have sons Marston, 10, and Cooper, 9. The duo's divorce was finalized last year.

Monday, December 20, 2010

World's Best New Boutique Hotels

We scoured the globe for the 20 best new boutique hotels. You'll meet the owners; you'll kick back on your own private balcony; you'll eat homemade granola each morning; you'll never want to leave.


Acapulco, Mexico

Hotel Boca Chica

Long before Cancún or Cabo, Acapulco was the king of Mexican resort towns—and the Hotel Boca Chica was its crown jewel, drawing everyone from Elvis to the Rat Pack. Now, after a three-year remodel, the Boca Chica has regained its former sparkle. The 36 rooms are lacquered white and flooded with light, and all have private balconies. Meanwhile, old Hollywood touches throughout—like lamps made from conch shells and latticed brickwork—serve as ever-present reminders of its storied past.

hotelbocachica.com, from $95.


Adams, Massachusetts

Topia Inn

When owners Nana Simopoulos and Caryn Heilman set out to restore a 19th-century brick boardinghouse in the Berkshires, they didn't just strive for eco-conscious design—it was more like eco-perfection. Nearly everything in the eight-room Topia Inn is organic, from the breakfast of banana bread, spinach quiche, and fair-trade coffee to the plush mattresses made of chemical-free cotton. Even the walls are plastered with bright, earth-friendly clay, which makes them cooler in the summer, warmer in the winter, and inviting all year long.

topiainn.com, from $125.


Uvita, Costa Rica

Oxygen Jungle Villas

The 12 cabins at Oxygen Jungle Villas were constructed with a singular goal: to make you feel like you're the only person for miles. Blissfully isolated among barriers of tropical plants and vines, the one-bedroom villas come off like Swiss Family Robinson tree houses. Each has a private sun-deck, a sharply angled roof, and glass walls to maximize views of the Pacific Ocean a mile away. And considering the adults-only hotel never takes more than 24 guests at a time, it's hardly a stretch to believe the jungle is yours and yours alone.

oxygenjunglevillas.com, from $139.


Brussels, Belgium

The Pantone Hotel

What's so weird about this pint-size property in Sweden? At first glance, the one-room hotel appears to be a cheery red house in the middle of the lake—yes, it's in the middle of a body of water but how strange is that, really? Don't be fooled: The room isn't actually in the house; it's 10 feet underwater. It's also the only functioning underwater hotel that started out as an art installation. Designed by artist Mikael Genberg, the 10-year-old inn's sole room consists of two twin beds with panoramic windows on all sides. There is no electricity, but there is lighting and a portable gas heater. When ready to come up for air, guests can relax on the deck or take the dinghy out to one of the nearby uninhabited islands.


Prague, Czech Republic

The Mosaic House

Part stylish hotel, part traditional hostel, the Mosaic House is an experience all its own. Inside the six-story 1935 building, guests can opt for one of 64 private rooms (from $26) or one of 30 shared spaces—for nearly half the cost (from $15). While the atmosphere skews toward the casual (think board games and beanbag chairs in the lounge), the decor is more upscale: Each room is done up in chocolate brown, burgundy, and gold, and is accented with quirky touches like closet rods made of tree branches and tables fashioned from salvaged-wood beams.

mosaichouse.com, from $15.


Cornwall, U.K.

The Nearwater

Cornwall's rugged cliffs, manicured gardens, and 300-plus public beaches have drawn British vacationers since the 1800s. Now the seaside retreat, four and a half hours west of London, has one more draw to add to the list: the Nearwater. At this whitewashed B&B in the town of St. Mawes, owners Tim and Amelia Whitaker have transformed a simple home into one of the area's sweetest small hotels. Bamboo floors, Danish teak furniture, and a mirror made from driftwood give Nearwater a light, nautical look, while the three rooms' beds are covered in sailor-striped wool blankets. Added to that, Amelia's homemade granola and pancakes are the perfect start to a day spent taking one of Tim's famous guided walks along the coast.

nearwaterstmawes.co.uk, from $131 with breakfast.


Ho Chi Minh City, Vietnam

Ma Maison

The last thing you'd expect to find in Vietnam's hyper-kinetic capital is a tranquil French retreat, but such is the pleasant surprise of Ma Maison. Run by Natasha Long, a Saigon local, the inn is housed in a 70-year-old colonial villa remodeled to evoke French country life. Walls are painted in soft yellows and greens, while the 12 rooms have blond-wood beds and desks with gold-leaf details. The hotel's bistro completes the vibe, with a menu full of French fare such as braised chicken with mushrooms. Add to that thoughtful touches like the complimentary mobile phones with free local service and an affable cat, Mr. Sushi, and you'll be feeling like family in no time.

mamaison.vn, from $70 with breakfast. 20. Siem Reap, Cambodia


Siem Reap, Cambodia

Sojourn Boutique Villas

TThe Sojourn Boutique Villas is the rare resort that soothes your body and soul all at once. The 10 red-and-white bungalows are just a few miles from the iconic temples of Angkor, so guests can spend their days wandering among 12th-century Buddhist ruins and their evenings soaking in the palm-tree-fringed saltwater pool. All that relaxing comes with the peace of mind that Sojourn donates a portion of its proceeds to clean-water initiatives and English lessons for residents of the nearby Treak Village.

sojournsiemreap.com, from $100 with breakfast.


Granada, Nicaragua

Hotel Spa Granada

It's one thing to stay in the heart of a Spanish colonial city—and quite another to stay in a Spanish-colonial mansion. Located smack in the middle of Granada's historic district, the sprawling 19th-century Hotel Spa Granada has five garden courtyards, a lagoon-like swimming pool in the center, and 15 expansive guest rooms (some with ceilings as high as 18 feet) that are decorated with handicrafts from a local artisan. A free spa treatment is included with every night of your stay, but the rates are so shockingly affordable—a 60-minute massage is $20, an aloe facial is $10—that a full day of pampering hardly qualifies as a splurge.

hotelspagranada.com, from $49 with breakfast.

Abu Dhabi hotel regrets $11M Christmas 'overload'


A Christmas tree which has been decked out with US$11 million U.S. (euro14.3 million) worth of gold and precious stones, stands at the lobby of the Em AP – A Christmas tree which has been decked out with US$11 million U.S. (euro14.3 million) worth of gold and …

ABU DHABI, United Arab Emirates – An Abu Dhabi luxury hotel that boasted an $11 million Christmas tree decorated with gold and gems admitted Sunday it may have taken the holiday spirit a bit too far.

A statement from the Emirates Palace hotel said it regretted "attempts to overload" the Christmas tree tradition by adorning it with premium bling including gold, rubies, diamonds and other precious stones from a hotel jeweler.

[Closer to home: Local guides to the best holiday lights near you]

The statement was a rare bit of reflection on the Gulf's ethos of excess. The tree was unveiled last week with full fanfare in a hotel that features its own gold bar vending machine and a one-week $1 million package that includes private jet jaunts around the Middle East.

But the hotel management apparently had second thoughts after questions arose about whether the opulent tree was innocent good cheer or unfortunate bad taste.

The hotel regrets "attempts to overload the tradition followed by most hotels in the country with meanings and connotations that do not fall in line with the (hotel's) professional standards," said a statement carried on the state-run news agency WAM.

The hotel even tried to distance itself from the 43-foot (13-meter) faux fir in one of its rotundas, saying a hotel-based jeweler was solely responsible for creating and decorating the tree.

"The hotel is just a venue for exhibiting the tree," the statement said.

The hotel also claimed the tree was not a stunt, but rather an effort to boost the holiday mood for its guests based on the United Arab Emirates' "values of openness and tolerance."

Although officially Muslim, the UAE features many signs of Christmas for its huge foreign population. Lights, carolers and Santas are fixtures in nearly every mall.

Kanye, Diddy, Lil Wayne, Pharrell's Multi-Million-Dollar Homes

If you had a $14 million budget for a real estate purchase, how would you spend it? If you live a hip-hop lifestyle, you might first consider how rap luminaries Pharrell Williams, Sean "Diddy" Combs, Lil Wayne, and Kanye West have spent their riches.

This week's photos of Williams' Miami high-rise prompted Curbed National to do a wrap-up of some of the year's news making hip-hop cribs.

IT PAYS TO BE A N.E.R.D. Considering N.E.R.D. frontman Pharrell Williams is known for his colorful Ice Cream brand outfits, it makes sense that his Miami penthouse also has a playful decor. He has a painting of "Family Guy" character Stewie, as well as oversized cartoon figures and a Perspective chair (which he designed) with human-like legs, toes, and all. But these are just the accessories. The massive $14 million abode, photographed by Todd Selby, has an arrowhead-shaped pool, spiral staircase, and view of the coastal shore. It is definitely fit for the head of an entity called the Billionaire Boys Club. (See more pictures at The Selby.)

KANYE'S BEAUTIFUL FANTASY COMES TRUE Kanye West also displayed cartoon elements in the decorations of a Hollywood apartment he put up for sale last spring for $4 million, New York Magazine reported. The room photographed is lined with Jetsons art, and, like the futuristic cartoon, is heavy on the remote-controlled features. But West did not let the designers finish the place without adorning the dining room ceiling with a depiction of himself as an angel.

WHEN DIDDY'S NOT ON THE LAST TRAIN TO PARIS Sean "Diddy" Combs opted for a sleeker and more serious feel for a lounging area of his newest New York City property. Designed by Benjamin Noriega-Ortiz, the clean, modern look relied on neutral colors -- silver, smoke, cream, and glass -- mirrored tables and vases.

LIL WAYNE'S YOUNG MONEY GOES A LONG WAY Surprisingly, animated hip-hop superstar Lil Wayne has the most conservative design for his home. Like Diddy, Wayne used a light palette in one of the rooms. One of the most striking features of the $14 million home located in La Gorce Island, Miami Beach is a wall lined with floor-to-ceiling windows. Click here to see more photos in Business Insider.

AN APARTMENT FOR THE COMMON MAN If you live in Chicago and aspire to live like a rapper but don't quite have the budget, you might one day be able to rent one of Common's high-rise apartments. One of the Coldwell Banker listings, a two-bedroom, 1,200 square foot home, was recently available for rent for $2,200 per month. That's a good deal, considering that it comes with granite countertops in the kitchen, stainless steel appliances, floor-to-ceiling windows, and a view of a museum.

Sunday, December 5, 2010

How much money a model really makes

Polish supermodel Anna Jagodzinska claims her former agency, Next, owes her $320,000. Photo: David Yurman

Polish supermodel Anna Jagodzinska claims her former agency, Next, owes her $320,000. Photo: David Yurman

This week Jezebel ran an article about three models who are suing Next management for stealing their money. Anna Jagodzinska, Karmen Pedaru, and Anna Cywinska, claim their agency owes them a collective $750,000, and though they left Next back in April, the company has refused to pay the models the money they are owed. Each of them are seeking these back payments plus $1 million in damages.

While we empathize with anyone who's been ripped off, we were truly fascinated by Jagodzinska's April 23 account statement, which shows exactly how much she was supposed to earn for each of her modeling jobs. For any of you who have ever wondered just how much a model makes for striking a pose, prepare to be amazed:

  • French Vogue shoot - $125
  • Vogue shoot - $250
  • J.Crew campaign - $15,000
  • H&M campaign - $60,000
  • Laird & Partners productions - $35,000 (they produce ads for luxury companies like Donna Karan and Bottega Veneta)
  • Grey Paris productions - $172,500 (they also produce ad campaigns)

Anna Jagodzinska's April 23 account statement from Next modeling agency. Photo courtesy of Jezebel

Anna Jagodzinska's April 23 account statement from Next modeling agency. Photo courtesy of Jezebel

Check out the full invoice on the right.

So while appearing in Vogue may boost a model's status or seem really fancy, the big bucks clearly come from mainstream ad campaigns. And while this statement shows Jagodzinska raking in $231,372, Next took $56,675 of her pay as commission. What's leftover for standing around looking pretty sure isn't bad, but it's chump change when compared with the 10 highest earning models, according to Forbes. Below, the most gorgeous ladies with the fattest paychecks this year:

1. Gisele Bündchen- $25 million
2. Heidi Klum - $16 million
3. Kate Moss - $9 million-
4. Adriana Lima - $7.5 million
5. Doutzen Kroes - $6 million
6. Alessandra Ambrosio - $5.5 million
7. Natalia Vodianova - $5.5 million
8. Daria Werbowy - $4.5 Million
9. Miranda Kerr - $4 million
10. Carolyn Murphy - $3.5 million

Don't hate them because they're beautiful. Hate them because they get paid so much to be beautiful.

Monday, November 29, 2010

WikiLeaks reveals more sensitive U.S. data

AFP/Getty Images/File – WikiLeaks released 250,000 diplomatic cables to The New York Times Sunday, most from the last three years, …

The publication of the secret cables on Sunday amplified widespread global alarm about Iran's nuclear ambitions and unveiled occasional U.S. pressure tactics aimed at hot spots in Afghanistan, Pakistan and North Korea. The leaks also disclosed bluntly candid impressions from both diplomats and other world leaders about America's allies and foes.

In the wake of the massive document dump by online whistleblower WikiLeaks and numerous media reports detailing their contents, Secretary of State Hillary Rodham Clinton was expected to address the diplomatic repercussions on Monday. Clinton could deal with the impact first hand after she leaves Washington on a four-nation tour of Central Asia and the Middle East — a region that figures prominently in the leaked documents.

The cables unearthed new revelations about long-simmering nuclear trouble spots, detailing U.S., Israeli and Arab world fears of Iran's growing nuclear program, American concerns about Pakistan's atomic arsenal and U.S. discussions about a united Korean peninsula as a long-term solution to North Korean aggression.

None of the disclosures appeared particularly explosive, but their publication could become problems for the officials concerned and for any secret initiatives they had preferred to keep quiet. The massive release of material intended for diplomatic eyes only is sure to ruffle feathers in foreign capitals, a certainty that already prompted U.S. diplomats to scramble in recent days to shore up relations with key allies in advance of the leaks.

At Clinton's first stop in Astana, Kazakhstan, she will be attending a summit of officials from the Organization for Security and Cooperation in Europe, a diplomatic grouping that includes many officials from countries cited in the leaked cables.

The documents published by The New York Times, France's Le Monde, Britain's Guardian newspaper, German magazine Der Spiegel and others laid out the behind-the-scenes conduct of Washington's international relations, shrouded in public by platitudes, smiles and handshakes at photo sessions among senior officials.

The White House immediately condemned the release of the WikiLeaks documents, saying "such disclosures put at risk our diplomats, intelligence professionals and people around the world who come to the United States for assistance in promoting democracy and open government."

U.S. officials may also have to mend fences after revelations that they gathered personal information on other diplomats. The leaks cited American memos encouraging U.S. diplomats at the United Nations to collect detailed data about the U.N. secretary general, his team and foreign diplomats — going beyond what is considered the normal run of information-gathering expected in diplomatic circles.

State Department spokesman P.J. Crowley played down the diplomatic spying allegations. "Our diplomats are just that, diplomats," he said. "They collect information that shapes our policies and actions. This is what diplomats, from our country and other countries, have done for hundreds of years."

The White House noted that "by its very nature, field reporting to Washington is candid and often incomplete information. It is not an expression of policy, nor does it always shape final policy decisions."

"Nevertheless, these cables could compromise private discussions with foreign governments and opposition leaders, and when the substance of private conversations is printed on the front pages of newspapers across the world, it can deeply impact not only U.S. foreign policy interests, but those of our allies and friends around the world," the White House said.

On its website, The New York Times said "the documents serve an important public interest, illuminating the goals, successes, compromises and frustrations of American diplomacy in a way that other accounts cannot match."

Le Monde said it "considered that it was part of its mission to learn about these documents, to make a journalistic analysis and to make them available to its readers." Der Spiegel said that in publishing the documents its reporters and editors "weighed the public interest against the justified interest of countries in security and confidentiality."

WikiLeaks founder Julian Assange claimed the administration was trying to cover up alleged evidence of serious "human rights abuse and other criminal behavior" by the U.S. government. WikiLeaks posted the documents just hours after it claimed its website had been hit by a cyberattack that made the site inaccessible for much of the day.

But extracts of the more than 250,000 cables posted online by news outlets that had been given advance copies of the documents showed deep U.S. concerns about Iranian and North Korean nuclear programs along with fears about regime collapse in Pyongyang.

The Guardian said some cables showed King Abdullah of Saudi Arabia repeatedly urging the United States to attack Iran to destroy its nuclear program. The newspaper also said officials in Jordan and Bahrain have openly called for Iran's nuclear program to be stopped by any means and that leaders of Saudi Arabia, the United Arab Emirates and Egypt referred to Iran "as 'evil,' an 'existential threat' and a power that 'is going to take us to war,'" The Guardian said.

Those documents may prove the trickiest because even though the concerns of the Gulf Arab states are known, their leaders rarely offer such stark appraisals in public.

The Times highlighted documents that indicated the U.S. and South Korea were "gaming out an eventual collapse of North Korea" and discussing the prospects for a unified country if the isolated, communist North's economic troubles and political transition lead it to implode.

The Times also cited diplomatic cables describing unsuccessful U.S. efforts to prod Pakistani officials to remove highly enriched uranium from a reactor out of fear that the material could be used to make an illicit atomic device. And the newspaper cited cables that showed Yemen's president, Ali Abdullah Saleh, telling Gen. David Petraeus that his country would pretend that American missile strikes against a local al-Qaida group had come from Yemen's forces.

The paper also cited documents showing the U.S. used hardline tactics to win approval from countries to accept freed detainees from Guantanamo Bay. It said Slovenia was told to take a prisoner if its president wanted to meet with President Barack Obama and said the Pacific island of Kiribati was offered millions of dollars to take in a group of detainees.

It also cited a cable from the U.S. Embassy in Beijing that included allegations from a Chinese contact that China's Politburo directed a cyber intrusion into Google's computer systems as part of a "coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws."

Le Monde said another memo asked U.S. diplomats to collect basic contact information about U.N. officials that included Internet passwords, credit card numbers and frequent flyer numbers. They were asked to obtain fingerprints, ID photos, DNA and iris scans of people of interest to the United States, Le Monde said.

The Times said another batch of documents raised questions about Italian Prime Minister Silvio Berlusconi and his relationship with Russian Prime Minister Vladimir Putin. One cable said Berlusconi "appears increasingly to be the mouthpiece of Putin" in Europe, the Times reported.

Italy's Foreign Minister Franco Frattini on Sunday called the release the "Sept. 11 of world diplomacy," in that everything that had once been accepted as normal has now changed.

Der Spiegel reported that the cables portrayed German Chancellor Angela Merkel and Foreign Minister Guido Westerwelle in unflattering terms. It said American diplomats saw Merkel as risk-averse and Westerwelle as largely powerless.

Libyan leader Moammar Gadhafi, meanwhile, was described as erratic and in the near constant company of a Ukrainian nurse who was described in one cable as "a voluptuous blonde," according to the Times.

WikiLeaks' action was widely condemned.

Pakistan's foreign ministry said it was an "irresponsible disclosure of sensitive official documents" while Iraq's foreign minister, Hoshyar Zebari, called the document release "unhelpful and untimely."

In Australia, Assange's home country, Attorney General Robert McClelland said law enforcement officials were investigating whether WikiLeaks broke any laws.

The State Department's top lawyer warned Assange late Saturday that lives and military operations would be put at risk if the cables were released. Legal adviser Harold Koh said WikiLeaks would be breaking the law if it went ahead. He also rejected a request from Assange to cooperate in removing sensitive details from the documents.

___

Associated Press writers Anne Gearan in Washington; Juergen Baetz in Berlin; Don Melvin in London; Angela Doland in Paris; Robert H. Reid in Cairo; Brian Murphy in Dubai, United Arab Emirates; Mark Lavie in Jerusalem and Nicole Winfield in Rome contributed to this report.

___

All Rights Reserved: Copyright of AP & Yahoo! Inc.

Online:

http://cablegate.wikileaks.org/

Monday, November 1, 2010

US officials: Bombmaker in Yemen a key suspect

Ibrahim Hassan al-Asiri
AP – This undated image released Sunday Oct. 31, 2010, by Yemen's Interior Ministry, in a combination of two …


CAIRO – He is suspected of packing explosives into the underwear of a Nigerian accused of trying to blow up a Detroit-bound airliner last Christmas and sent his own brother on a suicide mission against a top Saudi official.

Ibrahim Hassan al-Asiri, considered a key figure in al-Qaida's most active franchise, is now the chief suspect behind the mail bombs sent from Yemen and bound for the United States, according to U.S. intelligence officials.

Together with a U.S.-born preacher, Yemeni militants, and former Saudi inmates of Guantanamo, al-Asiri makes up the leadership of Al-Qaida in the Arabian Peninsula.

Forensic analysis indicates that al-Asiri, who is living in Yemen, built all three devices and is believed to have a fair degree of skill and training, although all the operations have been unsuccessful.

British Home Secretary Theresa May said the bomb discovered on the plane that landed in England was powerful enough to bring down the aircraft. A U.S. official and a British security consultant said the device, hidden in a printer cartridge, was sophisticated enough that it nearly slipped past British investigators even after they were tipped off.

Yemeni security officials said they are searching for al-Asiri, who is believed to be in Marib province.

His most effective operation was the attack on top Saudi counterterrorism official Prince Mohammed bin Nayef, in which he recruited his younger brother, Abdullah, to pose as a repentant militant.

Al-Asiri and his brother abruptly left their Mecca home three years ago, said their father, a four-decade veteran of the Saudi military. Aside from a brief phone call to say they had left the country, he never heard from them again.

With the bomb hidden in a body cavity, Abdullah approached the prince and blew himself up. The prince was only wounded.

All three bombs contained a high explosive known as PETN, or pentaerythritol tetranitrate, which was also used by convicted shoe bomber Richard Reid when he tried to destroy a trans-Atlantic flight in 2001.

In a September 2009 issue of Sada al-Malahem, or Voice of Battles, an Arabic-language online magazine put out by al-Qaida in the Arabian Peninsula, al-Asiri described how he recruited his brother and they made the journey to Yemen.

He said he and his friends were originally planning to go fight the Americans in Iraq, but Saudi police raided the apartment where they were hiding and arrested them.

"They put me in prison and I began to see the depths of (the Saudis) servitude to the Crusaders and their hatred for the true worshippers of God, from the way they interrogated me," he is quoted as saying.

Abdullah, who visited him in prison, was horrified by the stories of torture and also came to believe that the government is "infidel," al-Asiri said.

Upon his release, al-Asiri tried to create a new militant cell inside Saudi Arabia but was once again discovered. Six of his colleagues were killed and he and his brother fled south to the Asir mountains where they holed up for weeks.

They entered Yemen on Aug. 1, 2006, and met with Yemeni militant Nasser al-Wahishi, who had escaped from prison just months earlier, and became the nucleus of the new al-Qaida affiliate, said the account, which could not be independently confirmed.

Al-Qaida's presence in Saudi Arabia and Yemen has been distinguished by its tenacious ability to regroup after severe setbacks, having been nearly wiped out in both countries just five years ago.

The group's battered Saudi and Yemeni branches merged in January 2009 to form al-Qaida in the Arabian Peninsula under the leadership of al-Wahishi, a former aide to Osama bin Laden who staged a dramatic jail break from a Yemeni prison with 22 others in 2006. In the past year, the organization has emerged as "one of the most dangerous branches of al-Qaida," according to a U.S. assessment.

Al-Wahishi's deputy, Saeed al-Shihri, is a Saudi who fought in Afghanistan and spent six years in Guantanamo Bay as inmate No. 372, before being released and going through Saudi Arabia's famous "rehabilitation" institutes. The experiences didn't prevent him from heading south to Yemen on his release.

The organization calls for the overthrow of the Saudi and Yemeni governments and has carried out a string of brazen attacks against local security forces before melting away into the rugged mountains of Yemen's inhospitable hinterlands.

It has been its attempts to take the fight to the West, however, that have attracted attention, especially through the propaganda efforts of Yemeni cleric Anwar al-Awlaki.

Born in New Mexico, al-Awlaki has used his website to encourage Muslims around the world to kill U.S. troops in Iraq and has been tied by U.S. intelligence to the 9/11 hijackers, underwear bomber Umar Farouk Abdulmutallab, as well as Maj. Nidal Malik Hasan, the Army psychiatrist accused of killing 13 people in November at Fort Hood, Texas.

Al-Awlaki's growing involvement in planning operations by al-Qaida in the Arabian Peninsula has prompted the Obama administration to place him on a target list for terrorists to be killed or captured.

All these militants were believed to be hiding in the remote and rugged mountains of Yemen's Shabwa province, helped by tribesmen disaffected with the government.

Just a day before the attempted bombing of the jet bound for Detroit last year, Yemeni warplanes raided a site where the top leadership had gathered, only missing al-Wahishi, al-Shihri and al-Awlaki by hours.

Of all of al-Qaida's affiliates, the Arabian branch has distinguished itself by its English-language outreach, mainly through al-Awlaki's writings and a new English-language online magazine.

Issues include an "Open Jihad" forum with tips for Muslims living in the West to carry out terrorist operations, such as building a bomb in the kitchen or equipping a pickup truck with metal blades to mow down pedestrians.

The last issue also included a testimonial from Samir Khan, describing how he turned against America to fight with militants in Yemen.

Although the number of hard core al-Qaida fighters in Yemen is only believed to number in the low hundreds, they are aided by sympathetic local tribes who see the central government as corrupt and oppressive.

Heavy-handed tactics by the Yemeni military have often only further inflamed tribal animosity.

Yemen is also wracked by a number of rebellions and secessionist movements, including one throughout much of the south that has provided fertile ground to al-Qaida's recruiting efforts.

The poorest country in Arab world, Yemen has 35 percent unemployment and a literacy rate of only 50 percent. It is also threatened by declining water and oil resources and an exploding population of 22 million.

___

Associated Press writers Lee Keath in Cairo and Ahmed al-Haj in San'a, Yemen, contributed to this story.

Sunday, October 31, 2010

Soft-spoken 18-year-old American wins Miss World

AP/Alexander F. Yuan

BEIJING – The newest Miss World is from the United States.

Alexandria Mills, a soft-spoken 18-year-old, was named the winner in Saturday night's contest in southern China. The tall blonde was a relative surprise winner after speculation focused on other contestants.

Second place went to Emma Wareus of Botswana, and Adriana Vasini of Venezuela came third.

The host country's own contestant, Tang Xiao, also was among the final five.

According to a brief biography on the Miss World website, Mills calls Louisville, Kentucky, her hometown, and she recently graduated from high school. She would like to become a teacher.

"I've never met a stranger and enjoy meeting new people," she says in the bio.

For the final, she was wearing a shimmering ivory-colored dress slit up the leg.

Mills takes over the title from Kaiane Aldorino of Gibraltar, who was named Miss World 2009 at a ceremony in South Africa last December.

Women from more than 100 countries participated in the contest, organizers said.

This is the 60th year of the Miss World Competition, and organizers brought back contestants from past decades to give the night a retrospective theme.

Rihanna Genuinely Happier With Matt Kemp

http://a323.yahoofs.com/ymg/thatsreallyweek__5/thatsreallyweek-431650466-1288421396.jpg?ymUQVAEDew_1n5QORihanna is the poster girl for bouncing back. It's been 20 months since her heated verbal exchange with former beau Chris Brown turned violent, and she is already preparing the release of her second post-incident album, "Loud." Romantically, she is blissfully happy in a relationship with her Los Angeles Dodgers boyfriend Matt Kemp.

Rihanna is genuinely giddy this time around, she reveals in a cover story in the December 2010 issue of Marie Claire UK. Access Hollywood reported that she told the magazine, "I feel like I smile for real this time. The smiles come from inside, and it exudes in everything I do. People feel my energy is different. When I smile they can tell that it's pure bliss and not just a cover up."

The "Only Girl (In The World)" singer said she knew when her tumultuous relationship with Brown had come to an end.

"One day, I remember I was in New York at the Trump Hotel and I woke up and I just knew I was over it," she said.

http://a323.yahoofs.com/ymg/thatsreallyweek__5/thatsreallyweek-751322860-1288421396.jpg?ymUQVAEDWZxjhuBxBut Rihanna believes the altercation happened for a reason. "God has a crazy way of working, and sometimes when stuff happens you feel like, 'What did I do to deserve this? Why was it backfiring on me?'" she said, according to an Us magazine report. "But, I needed that wake-up call in my life. I needed a turning point, and that's what God was giving to me. All [of] this terrible stuff they say to you, it breaks you down."

Brown, on the other hand, has also experienced his own turning point. Since the felony assault, his career has plummeted until recently. His introspective ballad "Deuces" reached No. 1 on Billboard's R&B/Hip-Hop Songs chart and was recently remixed with guest vocals from hip-hop elite Kanye West, T.I., Andre 3000, and Drake.

Brown is feeling better these days, he told Access Hollywood. "Everything [is] good, I'm definitely - me personally and mentally - I'm a great guy now," he said. "Definitely just a person who's promoting positivity all the time, so that's just me," he said.

Brown added that he is also working on recording music. "The new album is called ‘F.A.M.E.': Forgiving All My Enemies. Basically, just being able to witness my success, failure and success again," he said. "Being able to see me going from my best times to my worst times and being able to overcome it and growing [in]to a man, as I was doing it."

Last Saturday, Celine Dion gave birth to twin boys, but fans were saddened to learn that Dion actually lost a third child during her pregnancy with multiples. Mariah Carey and Nick Cannon shared their good news, that they were expecting a baby this spring. And Billy Ray Cyrus and wife Tish filed for divorce.

There's been so much baby and couple news over the last few weeks. Let's cross our fingers that next week will yield a good-old fashioned rock star feud. See you then.

Friday, October 29, 2010

China boasts world's fastest supercomputer


China boasts world's fastest supercomputer
AFP/Getty Images/File – Hundreds of ethernet cables are connected to rows of laptops for Flashmob 1, the first flashmob supercomputer, …

BEIJING (AFP) – China is set to trump the US to take the number one spot for the fastest supercomputer ever made in a survey of the world's zippiest machines, it was reported Thursday.

Tianhe-1, meaning Milky Way, has a sustained computing speed of 2,507 trillion calculations per second, making it the fastest computer in China on a list published Thursday.

But it is also 1.4 times faster that the world's current fastest ranked supercomputer in the US, housed at a national laboratory in Tennessee, according to the New York Times.

[Related: Fast train, big dam show China's engineering might]

Tianhe-1 does its warp-speed "thinking" at the National Center for Supercomputing in the northern port city of Tianjin -- using mostly chips designed by US companies.

The Tianjin Meteorological Bureau and the National Offshore Oil Corporation data centre have both started trials using the computer.

"It can also serve the animation industry and bio-medical research," Liu Guangming, the supercomputing centre's director, told state news agency Xinhua.

According to Jack Dongarra, a University of Tennessee computer scientist who maintains the official supercomputer rankings which are due to be released next week, the Chinese beast "blows away the existing number one machine".

"We don't close the books until November 1, but I would say it is unlikely we will see a system that is faster," he told the New York Times.

It is not the first time, however, that the US has had its digital crown stolen by an Asian upstart. In 2002, Japan made a machine with more power than the top 20 American computers put together.

Japan is also working on a new machine called "K Computer" in a bid to take the supercomputing crown.

Computer designer Steven J. Wallach is not overly worried by China's rise to computing superpower.

"It's interesting, but it's like getting to the four-minute mile," he told the New York Times. "The world didn't stop. This is just a snapshot in time.

"They want to show they are number one in the world, no matter what it is."

Thursday, October 28, 2010

Jessica Simpson Admits She Often Think About Suicide

Jessica SimpsonJESSICA Simpson admits she often wants to “surrender and give up”.

The singer/actress and TV host talked to USA Today about her love life, self-esteem and the endless scrutiny surrounding her weight.

“Many times I wanted to surrender and give up,” she said.

“But I have a calling in my life. And if I have to go through that scrutiny, I will.

“I went through a really hard time a couple years back with people just harping on the pressure of how to look perfect, obviously using me and my weight. It was a tabloid frenzy.

“I feel like people are constantly curious as to how much I weigh or what I look like or what I wear…There’s no way you’re not going to be affected by the ugly things people say about you. It’s very hurtful. It definitely brings up a lot of your own insecurities. It takes a great family and wonderful friends—and love definitely helps, too—to get through it.”

Simpson — who started dating NFL football player Eric Johnson in June — recently admitted she’s an emotional eater.

“When I’m sad, I want to eat, but when I’m happy, I don’t really think about it,” she said.

“When I’m hungry I’ll eat. When I’m not hungry, I won’t.

“I’m not that much of a calorie counter, but I do think about it. I’m from Texas, so I love everything fried. I’ll give myself a cheat day every week.

“I believe it’s important to not say, ‘I can’t have this’. I think there’s ways to do things in moderation … you definitely have to eat things you love.”

Monday, October 25, 2010

The sneakiest new shopping scams

Easy ways to avoid the biggest rip-offs online and in stores



By the editors of Shop Smart Magazine

Just as important as knowing how to sniff out great buys is understanding what it takes to avoid rip-offs. And with Internet fraud on the rise, it's getting tougher to outsmart the criminals. Complaints to the Internet Crime Complaint Center, a joint operation of the FBI and the National White Collar Crime Center, jumped 22 percent last year. The complaints include plenty of run-of-the-mill scams, like sellers who steal credit-card numbers or take the money and run. But those are child's play compared with what else is brewing.

More from ConsumerReports.org

Store brands vs. name brands

Get the best price on anything

Consumer Reports has no relationship with any advertisers or sponsors on Yahoo!

Think you're too savvy to get taken? OK, maybe you don't fall for those e-mails from Nigerian royalty asking you to wire money, but digital criminals are getting sneakier every year. One scam that can trip up even the most cautious consumers involves "skimmers" attached to ATMs. Those devices record account numbers and passwords so that thieves can clean out your bank account.

"These guys are constantly thinking of new ways to swindle you, some of which are quite sophisticated," says Brian Krebs, a computer security expert and author of "Krebs on Security" at Krebsonsecurity.com.

Think you're safer shopping at the mall? Official purse-snatching statistics show there's been a downward trend, but many of those crimes aren't reported to law enforcement officials. And pickpocket activity always jumps around holiday time, says Bob Arno, co-author of "Travel Advisory! How to Avoid Thefts, Cons and Street Scams While Traveling" (Bonus Books, 2003). But you can outsmart even the craftiest swindlers if you know what's in their bag of nasty tricks. Here's a guide to the latest, sneakiest scams, and simple tips that can help you protect yourself.

'Smishing'

How it works "Phishing" is when you get an e-mail from a supposedly trustworthy source, such as your bank or PayPal, claiming a problem with your account and asking for your user name and password. When you respond, your information is stolen and your account is siphoned. "Smishing" is the latest twist on that scam—instead of getting an e-mail, you get a text message. (The word is a combination of "SMS," for short message service, aka text messaging, and "phishing.") You're told to call a toll-free number, which is answered by a bogus interactive voice-response system that tries to fool you into providing your account number and password.

"It works because people don't give their cell-phone numbers out," Krebs says. "If someone has my cell number, I figure it's someone I know." Thieves can use random-dialing telemarketing services to hit on your number, says Rod Rasmussen, president and CTO of IID, an Internet security firm. If you belong to a credit union, be especially wary—members are targets because often the call-back number has a local area code, not an 800 number, which makes victims less likely to suspect a hoax, Rasmussen says.

Prevent it If you get a text alert about an account, don't respond before you verify that it's legitimate. You can do a Google search on the number to see whether it matches your financial institution. Even better, call the customer-service number at your bank or other service provider to give any needed information to a representative.

Teeny, tiny charges

How it works Thieves get hold of your credit- or debit-card number and make very small charges of 20 cents to $10. The charges appear on your bill with an innocuous-sounding corporate name, and a toll-free number may appear next to the charge. But when you call the number, it's either disconnected or you're instructed to leave a message and your call is never returned.

That was precisely the scam that the Federal Trade Commission broke up in June, according to spokesman Frank Dorman. "We don't know where the thieves got the card numbers, but we're looking into that," he says. The scam was successful because most consumers either didn't notice the charges or didn't bother to correct them because the amounts were so small. In all, the crime ring racked up more than $10 million in bogus charges, the FTC estimates.

Prevent it Scrutinize every item on your bill every month, and question those you don't recognize. (Some charges, but not all, will list a phone number.) If you think a charge is fraudulent, notify your card company as soon as possible but no later than 60 days after the charge appears. By law, the card company must remove the disputed amount from your account while it investigates. Worst case, by law you're liable for only the first $50 on a credit card. (In most cases, Visa and MasterCard will cover the full amount.) Debit cards offer fewer protections: You must report the problem two days after you notice it. If you don't, you could be liable for the first $500 in fraudulent charges. If you wait more than 60 days after your statement is mailed, you could lose all the money in your account.

Skimmers

How it works Skimmers, devices that thieves attach to ATMs or gas pumps to steal your debit account number and password, have been around for years—and they're not going away. They're getting even more sophisticated.

The devices are placed at the mouth of the card-acceptance slot and record the data off of the magnetic strip on the back of your ATM card when you slide it into the machine. Crooks will usually plant a second device, such as a hidden camera or a transparent plastic PIN pad overlay, that's used to record your PIN when you type it in. In the early days of skimming, the thief had to return to the ATM or gas pump to retrieve the apparatus. But now, Krebs says, wireless technology enables the devices to be rigged to send account information via text message to the thief's cell phone. "The thief can be down the street in a coffee house or halfway around the world," he says. "As long as he's got a working phone signal, he can get the information sent to him right away and start using it."

Prevent it Use credit cards and avoid using non-bank ATMs. Those machines are generally located in areas that are less secure, making it easier for thieves to tamper with them. And check the card slot: If there's a plastic strip or plastic film sticking out, or anything glued to the card reader, go elsewhere. If your card is stuck inside the card slot, do not leave the machine. Use your cell phone to call your bank branch or the 24-hour service number to report the problem.

Membership programs

How they work You're buying from a large, reputable website but just before you click the "confirm" button on your purchase, you see a pop-up window or banner ad with an offer such as "$10 Cash Back on Your Next Purchase!" Here's the catch. By accepting that so-called deal, you're agreeing to enroll in a Web discount program that's run by a completely separate company. Those programs, which have innocuous names such as "Reservation Rewards," "Travel Values Plus," or "Great Fun," often provide a 30-day trial period during which you get discounts on a variety of merchandise and services. After that, a monthly membership fee, usually $10 to $20, will appear on your credit-card bill—even though you never gave that outside company your card number.

Sounds dicey, doesn't it? A Senate committee headed by Jay Rockefeller, D-W.Va., thought so, too. Last year, the committee launched an investigation into three large companies that sell memberships to those discount clubs: Affinion Group, Vertrue, and Webloyalty. The committee's report was issued last November and alleged, among other things, that "misleading 'Yes' and 'Continue' buttons cause consumers to reasonably think they are completing the original transaction, rather than entering into a new, ongoing financial relationship with a membership club operated by Affinion, Vertrue, or Webloyalty."

The problem is so ubiquitous that in May, Rockefeller introduced a bill to ban that and other misleading sales practices. Meanwhile, the three companies mentioned in the report have pledged to change their ways. Previously, customers' credit-card numbers were provided to the discount company by the original site without the consumer's knowledge. After the investigation began, all three companies started to require consumers to type in, at a minimum, the last four digits of their card number to make it clear that they are entering into a separate transaction. We'll be on the lookout for whether those changes are enough to keep consumers from being duped.

Prevent it Be wary of pop-up windows or banner ads that promise an additional discount before you complete a transaction. If you do click on an offer, take the time to read the fine print. Scrutinize your credit-card statement every month and question any unfamiliar charges, no matter how small. Check your e-mail inbox and spam folder because Web loyalty programs often send a notification e-mail before they start charging your credit card, when you still have time to cancel.

Stripped gift cards

How it works Thieves look for gift cards that are displayed on grab-and-go racks, such as in grocery and department stores. They use a handheld scanner—which you can buy online for just a few hundred dollars—to read the code behind the magnetic or scratch-off strip on the back of the card. That, combined with the card number on the front, gives them everything they need to steal the value of the card. Then they put the card back on the rack. Later an unsuspecting buyer purchases the worthless gift card. Even if a card isn't preloaded, a thief can steal the card number and security code, then call the 800 number shown on the card every few days to check the balance. Once a shopper has purchased the card and loaded it with a dollar amount, the thief can spend it before the purchaser does.

Prevent it Buy cards that are behind a customer-service desk, says Tom Browning, vice president of corporate compliance and chief security officer for AlliedBarton Security Services. Inspect the card; if the magnetic or peel-off strip on the back isn't pristine, the card might have been tampered with. When buying a preloaded card, ask the cashier to scan it to make sure the full value is on it. If you're buying from a third-party gift-card site, look at the refund policy. And always hang on to the receipts. If something goes wrong, it can help you—or the gift recipient—get a refund.

Counterfeit electronics

How it works Counterfeiting might seem like old news, but it's still going strong—in fact, stronger than ever. Last year, U.S. Customs and Border Protection made 14,841 seizures of fake and pirated goods worth $261 billion, an all-time high. The counterfeits seized included the usual suspects—footwear, apparel, and accessories—plus a huge number of electronics. "A knockoff handbag may not present a direct risk to consumers," says Anthony Toderian, spokesman for CSA International, which tests and certifies products, "but counterfeit electronics certainly do." Fake goods could have substandard wiring, faulty fuses, flammable plastic casings, and harmful chemicals such as lead and mercury. All kinds of electronics have been illegally copied, including computers, phones, and handheld gaming devices, he says. Although online shopping and auction sites and deep-discount stores are the most likely places those fakes will pop up, some have made their way onto the shelves of major retailers. "Buyers for stores can be fooled just as easily as regular consumers can," Toderian says.

Prevent it Look for a label stating that the product has been certified by CSA International or Underwriters Laboratory. (Go to CSA -International. org and click on "Certification Marks" to see what genuine labels look like. At UL.com, go to the search box and type in "How to spot fakes.") Look at the product, too. Are there misspellings on the package? If the box is see-through, does it contain all of the listed components, including batteries, cases, and power cords? Is the manufacturer's contact information, including address and phone number, clearly displayed? When in doubt, buy from well-known retailers that offer a full refund.

3 simple ways to protect yourself

Get the right security software In recent tests, we found two great, downloadable programs that protect against viruses, spyware, and other online threats at no charge. Try Avira, at www.free-av.com, or Microsoft Security Essentials, at www.microsoft.com/security_essentials.

Fight fraud There are several useful resources for ensuring your online safety. Bookmark these!

FTC.gov The Federal Trade Commission's site has lots of fact sheets that tell you what to do you if you've been scammed. Under the Consumer Protection tab, click on "Consumer Information" and then "Shopping for Products & Services." Don't miss the helpful primers on what to do if you're billed for merchandise you never receive and "How to right a wrong."

Safeshopping.org This site is sponsored by the American Bar Association and is packed with advice on safe payment methods, protecting your privacy when you shop, and other need-to-know topics.

OnGuardOnline.gov This site has tips on Internet shopping and is sponsored by government agencies. Quizzes test your knowledge of spyware, online auctions, ID theft, and more.

Antiphishing.org The Anti-Phishing Working Group, an industry-sponsored association, has a tip sheet on how to avoid being scammed. Click on "Consumer Advice," then "How to Avoid Phishing Scams."

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

Hang on to your handbag!

Bob Arno, an author and anti-theft consultant, has traveled the world secretly filming pickpockets. So he knows their tricks and how to thwart them. Here's his advice:

Get a grip Thieves are just as likely to snatch your purse as to slip a hand inside it to grab a wallet. So keep your handbag tight against your body and in front of you at all times. And when you're sitting down in the food court at the mall, don't sling your purse behind you on the chair. Even if you think you're maintaining physical contact with your bag, leaning forward for just a second is all the opportunity a thief needs to grab it. And never put it on the floor, even if it's in front of you.

Nix knapsacks They're back in style, but any bag that's not within your view is a juicy target for skilled pickpockets, no matter how securely it's fastened. And avoid purses with open compartments. Bags with zippers are best.

Keep your focus A classic ploy of purse thieves is to create a diversion—pointing at something, talking loudly, holding open a map and asking for directions, or spilling something on your coat then offering to clean it up. It can happen in a restaurant or a busy mall. Whenever anyone approaches you, be sure to firmly hold your purse and keep it in front of you.

Pare down your wallet Do you really need to bring all of your credit cards and ID cards with you? Leave everything except the necessities at home. And never routinely carry around anything with your Social Security number on it. (Photocopy all of the cards in your wallet, just in case.)

Be smart with your car Park in well-lit areas. If it's still daylight but you plan to shop for a while, park under a street lamp or in a well-lit garage. Always put up your windows and lock the car. If you go back to your car to stow packages, put them in the trunk—visible boxes and bags are magnets for thieves. Don't load up with so many packages that your purse dangles from your arm, out of your sight. Take advantage of curbside pickup or ask the store to hold bags for you. If someone tries to grab your purse, don't resist. "It's not worth losing your life over," Arno says. Also, if you have a GPS device in your car, program it so that your "home" setting isn't your home address. Instead, use the school or church down the street, or crooks will know how to get to your house while you're out. GPS thefts are also on the rise, so don't leave any visible trace of one in your car, including the mount.

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

ShopSmart;) the unique shopping magazine, offers unbiased, easy-to-read advice on the best brands of household appliances, kitchenware, electronics, and more. Subscribe today!

Copyright © 2006-2010 Consumers Union of U.S., Inc. No reproduction, in whole or in part, without written permission.

Monday, October 18, 2010

Facebook in Privacy Breach

[facebook jump1]
Kim White Bloomberg

Facebook founder and CEO Mark Zuckerberg addressed the F8 developer conference this spring.


Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found.

The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. The practice breaks Facebook's rules, and renews questions about its ability to keep identifiable information about its users' activities secure.


The problem has ties to the growing field of companies that build detailed databases on people in order to track them online—a practice the Journal has been examining in its What They Know series. It's unclear how long the breach was in place. On Sunday, a Facebook spokesman said it is taking steps to "dramatically limit" the exposure of users' personal information.

Many top applications on Facebook have been transmitting identifying information to Internet tracking and ad companies. Emily Steel discusses. Also, Michael Ramsey discusses skepticism about the auto industry's big bet that battery-powered cars will become big sellers.

"A Facebook user ID may be inadvertently shared by a user's Internet browser or by an application," the spokesman said. Knowledge of an ID "does not permit access to anyone's private information on Facebook," he said, adding that the company would introduce new technology to contain the problem identified by the Journal.

"Our technical systems have always been complemented by strong policy enforcement, and we will continue to rely on both to keep people in control of their information," the Facebook official said.

"Apps" are pieces of software that let Facebook's 500 million users play games or share common interests with one another. The Journal found that all of the 10 most popular apps on Facebook were transmitting users' IDs to outside companies.

The apps, ranked by research company Inside Network Inc. (based on monthly users), include Zynga Game Network Inc.'s FarmVille, with 59 million users, and Texas HoldEm Poker and FrontierVille. Three of the top 10 apps, including FarmVille, also have been transmitting personal information about a user's friends to outside companies.

Facebook says it is taking steps to "dramatically limit" the exposure of users' personal information, after a WSJ investigation showed that personal IDs were being transmitted to third parties via Facebook apps. But how hard is it to fix such a breach - and how concerned should users be about the sharing of these IDs? Julia Angwin joins Digits to discuss.

Most apps aren't made by Facebook, but by independent software developers. Several apps became unavailable to Facebook users after the Journal informed Facebook that the apps were transmitting personal information; the specific reason for their unavailability remains unclear.

The information being transmitted is one of Facebook's basic building blocks: the unique "Facebook ID" number assigned to every user on the site. Since a Facebook user ID is a public part of any Facebook profile, anyone can use an ID number to look up a person's name, using a standard Web browser, even if that person has set all of his or her Facebook information to be private. For other users, the Facebook ID reveals information they have set to share with "everyone," including age, residence, occupation and photos.

The apps reviewed by the Journal were sending Facebook ID numbers to at least 25 advertising and data firms, several of which build profiles of Internet users by tracking their online activities.

Defenders of online tracking argue that this kind of surveillance is benign because it is conducted anonymously. In this case, however, the Journal found that one data-gathering firm, RapLeaf Inc., had linked Facebook user ID information obtained from apps to its own database of Internet users, which it sells. RapLeaf also transmitted the Facebook IDs it obtained to a dozen other firms, the Journal found.

Name Games

All 10 of the top Facebook apps transmitted users' IDs, The Journal found

RapLeaf said that transmission was unintentional. "We didn't do it on purpose," said Joel Jewitt, vice president of business development for RapLeaf.

Facebook said it previously has "taken steps ... to significantly limit Rapleaf's ability to use any Facebook-related data."

Facebook prohibits app makers from transferring data about users to outside advertising and data companies, even if a user agrees. The Journal's findings shed light on the challenge of policing those rules for the 550,000 apps on its site.

The Journal's findings are the latest challenge for Facebook, which has been criticized in recent years for modifying its privacy rules to expose more of a user's information. This past spring, the Journal found that Facebook was transmitting the ID numbers to advertising companies, under some circumstances, when a user clicked on an ad. Facebook subsequently discontinued the practice.

"This is an even more complicated technical challenge than a similar issue we successfully addressed last spring on Facebook.com," a Facebook spokesman said, "but one that we are committed to addressing."

The privacy issue follows Facebook's effort just this month to give its users more control over its apps, which privacy activists had cited as a potential hole in users' ability to control who sees their information. On Oct. 6, Facebook created a control panel that lets users see which apps are accessing which categories of information about them. It indicates, for example, when an application accesses a user's "basic information" (including a user ID and name). However, it doesn't detail what information friends' applications have accessed about a user.

Video From 'What They Know' Series

It's rarely a coincidence when you see Web ads for products that match your interests. WSJ's Christina Tsuei explains how advertisers use cookies to track your online habits.

A new report in the Wall Street Journal's "What They Know" series illustrates how companies like Microsoft must balance conflicting interests: helping people surf the Web with its browser to keep their mouse clicks private, and helping advertisers who want to see those clicks. WSJ's Julia Angwin, Nick Wingfield, and Jessica Vascellaro join host Simon Constable as panelists on this special Digits live show.

Facebook apps transform Facebook into a hub for all kinds of activity, from playing games to setting up a family tree. Apps are considered an important way for Facebook to extend the usefulness of its network. The company says 70% of users use apps each month.

Applications are also a growing source of revenue beyond advertising for Facebook itself, which sells its own virtual currency that can be used to pay for games.

Following an investigation by the Canadian Privacy Commissioner, Facebook in June limited applications to accessing only the public parts of a user's profile, unless the user grants additional permission. (Canadian officials later expressed satisfaction with Facebook's steps.) Previously, applications could tap any data the user had access to, including detailed profiles and information about a user's friends.

It's not clear if developers of many of the apps transmitting Facebook ID numbers even knew that their apps were doing so. The apps were using a common Web standard, known as a "referer," which passes on the address of the last page viewed when a user clicks on a link. On Facebook and other social-networking sites, referers can expose a user's identity.

The company says it has disabled thousands of applications at times for violating its policies. It's unclear how many, if any, of those cases involved passing user information to marketing companies.

Facebook also appeared to have shut down some applications the Journal found to be transmitting user IDs, including several created by LOLapps Media Inc., a San Francisco company backed with $4 million in venture capital. LOLapp's applications include Gift Creator, with 3.5 million monthly active users, Quiz Creator, with 1.4 million monthly active users, Colorful Butterflies and Best Friends Gifts.

Since Friday, users attempting to access those applications received either an error message or were reverted to Facebook's home screen.

"We have taken immediate action to disable all applications that violate our terms," a Facebook spokesman said.

Data From 'What They Know'

[wtkkids2]

The Wall Street Journal analyzed the tracking files installed on people's computers by the 50 most popular websites, plus WSJ.com. Explore the data here and see separate analysis of the files on popular children's sites.

A spokeswoman for LOLapps Media declined to comment.

The applications transmitting Facebook IDs may have breached their own privacy policies, as well as industry standards, which say sites shouldn't share and advertisers shouldn't collect personally identifiable information without users' permission. Zynga, for example, says in its privacy policy that it "does not provide any Personally Identifiable Information to third-party advertising companies."

A Zynga spokeswoman said, "Zynga has a strict policy of not passing personally identifiable information to any third parties. We look forward to working with Facebook to refine how web technologies work to keep people in control of their information."

The most expansive use of Facebook user information uncovered by the Journal involved RapLeaf. The San Francisco company compiles and sells profiles of individuals based in part on their online activities.

The Journal found that some LOLapps applications, as well as the Family Tree application, were transmitting users' Facebook ID numbers to RapLeaf. RapLeaf then linked those ID numbers to dossiers it had previously assembled on those individuals, according to RapLeaf. RapLeaf then embedded that information in an Internet-tracking file known as a "cookie."

RapLeaf says it strips out the user's name when it embeds the information in the cookie and shares that information for ad targeting. However, The Wall Street Journal found that RapLeaf transmitted Facebook user IDs to a dozen other advertising and data firms, including Google Inc.'s Invite Media.

All 12 companies said that they didn't collect, store or use the information.

Ilya Nikolayev, chief executive of Familybuilder, maker of the Family Tree application, said in an email, "It is Familybuilder's corporate policy to keep any actual, potential, current or prior business partnerships, relationships, customer details, and any similar information confidential. As this story relates to a company other than Familybuilder, we have nothing further to contribute."

Write to Emily Steel at emily.steel@wsj.com and Geoffrey A. Fowler at geoffrey.fowler@wsj.com