Steal These Policies: Strategies for Reducing Digital Piracy

Total Page:16

File Type:pdf, Size:1020Kb

Steal These Policies: Strategies for Reducing Digital Piracy THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON Steal These Policies: Strategies for Reducing Digital Piracy BY DANIEL CASTRO, RICHARD BENNETT AND SCOTT ANDES | DECEMBER 2009 We need to open a broad Executive Summary dialogue that engages all stakeholders, including he rise of broadband Internet access and cheap storage, along government, content with the growth of digital content, has enabled digital pi- owners, website racy to flourish around the world. Piracy enables the unau- operators, technolog y T thorized distribution of music, movies, television programs, software, developers, and ISPs video games, books, photos, and periodicals quickly and easily, to the and other intermediaries, detriment of creative artists and legitimate rights holders. These prac- on how to improve the global response to piracy. tices threaten not only the robust production of digital content in the future, but U.S. jobs in the present. Unfortunately, many advocates, believing that information should be free, would have government not only turn a blind eye to digital piracy, but actively tie the hands of companies who seek to limit digital piracy. This report makes the case that digital piracy is a serious problem with significant ramifica- tions for the U.S. economy, that a number of approaches, including technical solutions such as content identification, are needed to reduce piracy, and that governments should support legitimate industry ef- forts to reduce digital piracy, including those that focus on the revenue streams of those engaging in piracy. There is no “silver bullet” that will solve controls such as locks, closed-circuit the piracy problem—no single technical TV, and anti-theft packaging as well or legislative proposal will completely as a government-funded system of law solve such a complex issue—but there enforcement, digital piracy requires a are many “lead bullets” that can help coordinated approach. Much of this ef- reduce piracy. Just as preventing theft fort will likely come from industry, but ITIF in the offline world requires a combi- government has an important role to nation of industry-backed technical play in protecting the intellectual prop- erty of copyright holders as a strong legal system is the As the leading global producer of digital content, the bedrock of commerce in both the digital and analog impact of piracy on the United States is substantial, world. In addition, government should not preclude with U.S. companies annually losing billions of dollars those impacted by digital piracy, including copyright and eliminating or never creating tens of thousands holders and ISPs, from taking steps to limit digital pi- of jobs. Although piracy is a serious problem in the racy. United States, it is even more serious in many other parts of the world, especially emerging markets. The Not every effort to reduce digital piracy should be em- Business Software Alliance found, for example, that braced, of course, but there should be no doubt that although software piracy declined or remained the efforts clearly directed at digital piracy can be and same in over eighty percent of countries, global piracy usually are different from the over-broad, ineffective still increased by 3 percent in 2008 because of rapidly methods that are often held up for criticism. In fact expanding growth in PC ownership in high piracy re- there are many technologies available to confront digi- gions such as Asia and Eastern Europe. tal piracy that are cost-effective and only impinge on the “freedom” to steal. Much more can and should Digital piracy will never be completely stamped out, be done to limit digital piracy and we need to open a but it can be dramatically reduced. To do so, though, broad dialogue that engages all stakeholders, including requires the implementation of a wide array of means, government, content owners, website operators, tech- including education of consumers, a range of technical nology developers, and ISPs, on how to improve the solutions, and of course, more aggressive enforcement global response to the problem of piracy. Toward that of the legal rights of copyright holders. end, this report recommends that policymakers: To change social behavior, some content owners have Support, rather than impede, anti-piracy inno- tried to educate users on the impact of piracy through vation, including the development of new marketing campaigns. These tactics work in parallel technical means. with efforts to provide users legal means to access con- tent, such as developing new forms of distribution like Encourage coordinated industry action to take the iTunes store or Hulu. steps to fight digital piracy, including steps like ISP implementation of graduated response sys- Technical controls, including digital rights manage- tems. ment (DRM), network management, and content identification systems, can also be used to make piracy More actively pursue international frameworks more difficult. DRM technology prevents unauthor- and action to protect intellectual property, in- ized use, such as enforcing licensing requirements on cluding digital content. software or preventing content from being duplicated. Network management techniques, including bit caps Widespread piracy over the Internet seriously harms and traffic shaping, can help reduce piracy and at the artists, the famous and struggling alike, who create same time the load on broadband networks, reduc- content, as well as the technicians who produce it. It ing costs and improving the quality of Internet access ultimately also hurts law-abiding consumers who must for the vast majority of law-abiding broadband users. pay higher prices for content, enjoy less content, or pay Content identification systems recognize copyrighted higher prices for Internet access to compensate for content so that copyright owners can take steps to re- the costs of piracy. Moreover, digital piracy not only duce digital piracy. Using these systems, copyrighted results in the unauthorized distribution of content, it content can be detected by automated means if oth- hurts the ability of content producers to create legiti- ers try to share it on filesharing networks or websites. mate business models for selling digital content; as the The technology can be deployed at various locations, saying goes, “It’s hard to compete with free.” While including on peer computers on file sharing networks, many companies have rallied to the challenge and cre- on the servers of user-generated content websites, ated compelling businesses to sell content legally, on on consumer electronics, and at the ISP level as data the whole, digital content is more profitable to distrib- passes through networks into and out of network end- ute illegally than legally and always will be. points. THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | DECEMBER 2009 PAGE II Some advocacy groups aligned with the information Supreme Court made clear that owners of applications commons movement have condemned the use of many or services designed to enable file sharing of copy- of these technical controls largely because they believe righted content could be held liable for infringement that copyright holders should have fewer rights and by third-parties. Some individuals establishing such that piracy is not a problem. They argue that such tools piracy tools or websites have responded by trying to are ineffective, costly and destructive to the rights of find shelter to continue this activity in countries with Internet users. These criticisms, however, are flawed weak enforcement regimes. and inaccurate. Anti-piracy solutions, including con- tent identification technology such as watermarking Content owners have also begun to send notices of and fingerprinting, are mature, highly accurate and copyright infringement to Internet users so they be- widely available. The cost of these systems varies by come aware that they are responsible for their actions implementation, but if the benefit in reduced piracy online and can take steps to prevent unauthorized use, outweighs the cost of implementation, then it makes such as securing a wireless router or supervising a teen- strategic sense to use the technology. These systems ager, before facing more serious consequences for mis- can easily be implemented with safeguards to ensure use. Content owners can identify individual Internet user privacy and protect free speech while still protect- users suspected of illegal file sharing and then ask the ing the rights of copyright owners. user’s ISP forward on the notice to the user. ISPs can provide a graduated response to continued violations These advocates also express fears that anti-piracy of copyrighted content by the same user, by providing measures would somehow violate the Internet archi- additional warnings, and incremental punishment, up tecture. The Internet architecture is no more friendly to and including a termination of the service. A num- to piracy than to law-abiding uses; the Internet was de- ber of countries, including France, the United King- signed to serve as a testbed for experimentation with dom, South Korea, and Taiwan have implemented or legitimate network applications, protocols, and ser- are in the process of implementing this type of “three vices, not as a monument to technology as it existed strikes” system with safeguards in place to ensure citi- at a particular moment in time. If the Internet has a zens’ rights are protected. Such legal regimes and co- central principle, it is one of continual improvement. operative agreements
Recommended publications
  • Understanding Digital Content and Services Ecosystems the Role of Content and Services in Boosting Internet Adoption
    Understanding digital content and services ecosystems The role of content and services in boosting Internet adoption Strategy& is part of the PwC network Contacts Beirut Düsseldorf Madrid Seattle Chady Smayra Dr. Roman Friedrich José Arias Mathias Herzog Partner Partner Partner Principal, PwC US +961-1-985-655 +49-211-38900 +34-91-411-8450 +1-206-398-3000 chady.smayra roman.friedrich j.arias mathias.herzog @strategyand.ae.pwc.com @strategyand.de.pwc.com @strategyand.es.pwc.com @strategyand.us.pwc.com Rami Maalouf Frankfurt Milan Shanghai Manager +961-1-985-655 Olaf Acker Luigi Pugliese Sarah Butler rami.maalouf Partner Partner Partner @strategyand.ae.pwc.com +49-69-97167-0 +39-02-72-50-91 +86-21-2323-2020 olaf.acker luigi.pugliese butler.sarah Delhi @strategyand.de.pwc.com @strategyand.it.pwc.com @strategyand.au.pwc.com Ashish Sharma Helsinki Paris Vienna Partner +91-124-499-8700 Santeri Kirvelä Pierre Péladeau Klaus Hölbling sharma.ashish Partner Partner Partner @strategyand.pwc.com +358-20-787-7000 +33-1-5657-58590 +43-1-518-22-900 santeri.kirvela pierre.peladeau klaus.hoelbling Doha @strategyand.fi.pwc.com @strategyand.fr.pwc.com @strategyand.at.pwc.com Bahjat El-Darwiche Jakarta Riyadh Partner +974-44026-777 Abhijit Navalekar Hilal Halaoui bahjat.eldarwiche Partner Partner @strategyand.ae.pwc.com +62-21-521-2901 +966-11-249-7781 abhijit.navalekar hilal.halaoui Dubai @strategyand.ae.pwc.com @strategyand.ae.pwc.com Jayant Bhargava London São Paulo Partner +971-4-390-0260 Hugo Trepant Nuno Gomes jayant.bhargava Partner Partner @strategyand.ae.pwc.com +44-20-7583-5000 +55-11-3674-8736 hugo.trepant nuno.gomes Jad Hajj @strategyand.uk.pwc.com @strategyand.br.pwc.com Partner +971-4-390-0260 jad.hajj @strategyand.ae.pwc.com 2 Strategy& About the authors Bahjat El-Darwiche is a partner with Strategy&, part of the PwC network, and is based in Doha.
    [Show full text]
  • Testimony of Authors Guild President Scott Turow Before the Senate
    My name is Scott Turow. I’m the president of the Authors Guild, the largest society of published authors in the U.S., representing more than 8,500 book authors and freelance writers. Our members represent the broad sweep of American authorship, including literary and genre fiction, nonfiction, trade, academic, and children’s book authors, textbook authors, freelance journalists and poets.1 Guild members have won countless honors and all major literary awards, including the Nobel Prize for Literature.2 The Authors Guild promotes the professional interests of authors: we’re advocates for effective copyright protection, fair contracts, and free expression. It’s a pleasure and an honor to be here this morning. I’d like especially to thank this committee for recognizing the severity of the problem we all face and getting the ball rolling with COICA in the fall, which recognized this central and unavoidable truth: any serious attempt to address online piracy must address the third-party enablers of infringement. Anything that doesn’t address those enablers is, frankly, a pretend solution to a real problem. Our Copyright Policy Inadvertently Encourages Investments in Technologies and Services That Promote Trafficking in Stolen Books, Music, and Movies After 300 years as one of history's greatest public policy successes, copyright is coming undone. As we meet here this morning, our well-intended policy toward copyright online is 1 The Guild had its beginnings as the Authors League of America, which was founded in 1912 by a group of book authors (including Theodore Roosevelt, who served as the League’s founding vice president), short story writers, freelance journalists and a smattering of dramatists.
    [Show full text]
  • Digital Distribution
    HOW DIGITAL DISTRIBUTION AND EVALUATION IS IMPACTING PUBLIC SERVICE ADVERTISING Aggressive Promotion Yields Significant Results By Bill Goodwill & James Baumann It is no surprise to see that digital distribution of all media products is fast becoming the de facto standard for distribution of media content, particularly for shorter videos such as PSA messages. First let’s define the terms. Digital distribution (also called digital content delivery, online distribution, or electronic distribution), is the delivery of media content online, thus bypassing physical distribution methods, such as video tapes, CDs and DVDs. In additional to saving money on tapes and disks, digital distribution eliminates the need to print collateral materials such as storyboards, newsletters, bounce-back cards, etc. Finally, it provides the opportunity to preview messages online, and offers media high- quality files for download. The “Pull” Distribution Model In the pre-digital world, the media was spoiled because they had all the PSA messages they could ever use delivered right to their desktop, along with promotional materials explaining the importance of the campaigns. Today, the standard way for stations to get PSAs in the digital world is to go to a site created by the digital distribution company and download them from the “cloud.” Using a dashboard that has been created for PSAs, the media can preview the spots and download both the PSAs, as well as digital collateral materials such as storyboards, a newsletter and traffic instructions. This schematic shows the overall process flow for digital distribution. To provide more control over digital distribution, Goodwill Communications has its own digital distribution download site called PSA Digital™, and to see how we handle both TV and radio digital files, go to: http://www.goodwillcommunications.com/PSADigital.aspx.
    [Show full text]
  • Illegal P2P File Sharing on College Campuses – What's the Solution? Antionette D
    College of William & Mary Law School William & Mary Law School Scholarship Repository Student Award Winning Papers Student Publications and Awards 2008 Illegal P2P File Sharing on College Campuses – What's the Solution? Antionette D. Bishop Repository Citation Bishop, Antionette D., "Illegal P2P File Sharing on College Campuses – What's the Solution?" (2008). Student Award Winning Papers. 4. https://scholarship.law.wm.edu/awardwinning/4 Copyright c 2008 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/awardwinning Illegal P2P File Sharing on College Campuses—What’s the Solution? Antionette D. Bishop* TABLE OF CONTENTS I. THE MUSIC INDUSTRY’S RESPONSE TO ILLEGAL P2P FILE SHARING............................................................................. 517 II. COLLEGE–STUDENT RELATIONSHIP .......................................... 518 III. PUBLIC POLICY CONCERNS ........................................................ 519 A. Efficient Use of College Funds ............................................ 519 B. Academic Freedom............................................................... 520 IV. ALTERNATIVE PROPOSED SOLUTION: COLLECTIVE LICENSING .................................................................................. 521 V. CONCLUSION............................................................................... 522 Since the introduction of Napster in 1999, illegal peer-to-peer (P2P) file sharing1 has been a continuously growing problem for
    [Show full text]
  • How to Get the Daily Stormer Be Found on the Next Page
    # # Publishing online In print because since 2013, offline Stormer the (((internet))) & Tor since 2017. is censorship! The most censored publication in history Vol. 97 Daily Stormer ☦ Sunday Edition 23–30 Jun 2019 What is the Stormer? No matter which browser you choose, please continue to use Daily Stormer is the largest news publication focused on it to visit the sites you normally do. By blocking ads and track- racism and anti-Semitism in human history. We are signifi- ers your everyday browsing experience will be better and you cantly larger by readership than many of the top 50 newspa- will be denying income to the various corporate entities that pers of the United States. The Tampa Tribune, Columbus Dis- have participated in the censorship campaign against the Daily patch, Oklahoman, Virginian-Pilot, and Arkansas Democrat- Stormer. Gazette are all smaller than this publication by current read- Also, by using the Tor-based browsers, you’ll prevent any- ership. All of these have dozens to hundreds of employees one from the government to antifa from using your browsing and buildings of their own. All of their employees make more habits to persecute you. This will become increasingly rele- than anyone at the Daily Stormer. We manage to deliver im- vant in the years to come. pact greater than anyone in this niche on a budget so small you How to support the Daily Stormer wouldn’t believe. The Daily Stormer is 100% reader-supported. We do what Despite censorship on a historically unique scale, and The we do because we are attempting to preserve Western Civiliza- Daily Stormer becoming the most censored publication in his- tion.
    [Show full text]
  • Understanding Digital Content and Services Ecosystems
    CHAPTER 1.3 Internet adoption continues to vary widely across countries. The average Internet penetration rate in Africa is 14 percent—vastly lower than the 85 percent rate in Understanding North America, according to the World Bank. Given the well-recognized role that wider Internet adoption plays in Digital Content and accelerating economic growth, raising Internet adoption rates is an imperative, particularly for developing Services Ecosystems: countries. Barriers to Internet adoption also vary across countries. Although the lack of affordable infrastructure The Role of Content is considered to be a major obstacle, a lack of local, relevant digital content and services is equally important. and Services in Boosting According to a Pew Research Center survey, 34 percent of offline individuals in the United States mentioned that Internet Adoption the Internet was not relevant to them.1 Eighty percent of the Wikipedia articles are written in just 28 languages, BAHJAT EL-DARWICHE whereas 80 percent of the world’s population speaks MATHIAS HERZOG one of 80 languages. Even the quantum of content MILIND SINGH available per user continues to be widely uneven. RAMI MAALOUF Akamai data show that in the United States, page views Strategy& in the media and entertainment category peak at 282 (formerly Booz & Company) per Internet user, while in Africa this number dips to 32 per user—highlighting the dearth of content relevant to African users.2 Ensuring a sustainable supply of local, relevant digital content creates incentives and reasons for subscribers to get online; such content is an imperative for driving Internet adoption for the 60 percent of the population not currently connected.
    [Show full text]
  • Cyber Laws for Dark Web: an Analysis of the Range of Crimes and the Level of Effectiveness of Law Over It
    An Open Access Journal from The Law Brigade Publishers 1 CYBER LAWS FOR DARK WEB: AN ANALYSIS OF THE RANGE OF CRIMES AND THE LEVEL OF EFFECTIVENESS OF LAW OVER IT Written by Sanidhya Mahendra 5th Year B.A.LL.B.(Hons.) Student, Uttaranchal University, Dehradun, India ABSTRACT In the 21st century, when we say “The future is now”, we mean that everything is possible, everything is accessible, everything is on our fingertips. This is because our entire world today is connected and controlled by the internet. This world wide connectivity offers us everything to use, like from shopping to travelling, from eating to feeding, and even for connecting to the people virtually, however the internet is not just limited to the millions of websites available for our daily use, rather it is far beyond that. We just access the 5 per cent of the entire internet and the rest of it is what may be a true horror for those who have been affected by it. This domain of internet is popularly known as the Dark Web. In this article the author has described the disturbing truths of the Dark Web. The author has described about its history and has pointed out the usage of the same by the criminals. The author further discusses the types of crime that are committed behind the veil of internet. The article thereafter defines the remedies available in various laws of India for the victims of cyber crimes. The author concludes the article with suggestions of improvement in the present laws. KEYWORDS: Dark Net, Dark web, Deep Web, TOR, Onion, Cryptocurrency, privacy, anonymous, VPN, ARPANET, Crawlers, Silk Road, Phishing INTRODUCTION Today the most significant invention is the invention Internet, and it has taken the eyes of all the generation in one go.
    [Show full text]
  • Customer Brand Engagement on Snapchat
    Faculty of Economy and Business Msc. in Business Administration Track Digital Business Customer brand engagement on Snapchat A conceptual model and empirical analysis Master Thesis Author: Pien Uittenbogaard 11152435 Supervisor: Nick van der Meulen June 22th, 2017 Final version University of Amsterdam Academic year 2016-2017 Statement of originality This document is written by Pien Uittenbogaard who declares to take full responsibility for the contents of this document. I declare that the text and the work presented in this document is original and that no sources other than those mentioned in the text and its references have been used in creating it. The faculty of Economics and Business is responsible solely for the supervision of the completion of the work, not for the contents. 2 Abstract This research has the purpose to shed more light onto the field of customer engagement through social media platform Snapchat. It focuses on exploring the relationship between customer engagement and different types of digital marketing content, on Snapchat. The research question states: “What is the effect of different brand related content types on customer engagement for beauty brands on Snapchat?” A survey with an experimental design was conducted for three conditions, representing three different types of digital marketing content. Snapchat stories were shown to the participants were after their customer engagement level was measured. The results show that digital marketing content including remuneration on Snapchat scored the highest on two of three customer engagement dimensions, namely on cognitive processing and intention to buy. This insight is not supported by existing academic literature which states that entertainment and information based content should yield higher customer engagement.
    [Show full text]
  • Causes, Effects and Solutions of Piracy in the Computer Software Market
    Review of Economic Research on Copyright Issues, 2006, vol. 4(1), pp. 63-86 CAUSES,EFFECTSANDSOLUTIONSOFPIRACYINTHE COMPUTER SOFTWARE MARKET AMY MARSHALL Abstract. Much literature has been devoted to exploring the protection of computer programs. The decreasing effectiveness of copyright and patents has been extensively examined and alternative forms of protection, both phys- ical and market-based, have been laid out. A large proportion of writings is dedicated to describing the significant network externalities that exist in thesoftwaremarket,andtheeffect that these have on the optimal level of protection. A large number of surveys have been undertaken to analyse the characteristics of software pirates and their incentives to pirate. This paper attempts to provide an overview of this literature. 1. Introduction The widespread incidence of unauthorised use and copying of computer software has had a devastating impact on the software industry in recent years. Significantly costly time and effort is invested by software programmers in developing a program and with software piracy preventing these developers from recouping remuneration from users, the incentives existing to produce new software may not be sufficient enough for any further development, causing the industry to stagnate. This would be costly to not only computer programmers but also to the government who would miss out on a significant amount of taxation revenue and society as a whole, whose software choices would be diminished. The traditional protector of intellectual property is copyright, defining the rights of ownership of creators and allowing for the enforcement of these rights. The basis behind copyright law is to provide the means for a creator to receive sufficient remuneration for development to occur.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Stream-Ripping: Its Role in the UK Music Piracy Landscape Three Years On
    Stream-ripping: Its role in the UK music piracy landscape three years on September 2020 PRS for Music Foreword Stream-ripping: its role in the UK music piracy landscape three years on builds on research we published with the Intellectual Property Office three years ago. The initial research, Stream-ripping: How it works and its role in the UK music piracy landscape, came at a time when little work had been done to understand the size of problem posed by stream-ripping. The previous report allowed us to map the landscape of online music piracy and to gain insight into the functioning and the business model of stream-ripping services. We found evidence to support our assumption that stream-ripping was on course to become the dominant mode of online infringement. This second wave of research shows that our expectation is now the reality: stream-ripping services account for more than 80% of the top 50 music specific piracy sites. We can see that the services are becoming more sophisticated, offering better quality downloads, evolving their revenue streams, and becoming more adept at operating beneath the radar, with many using the popular content delivery network Cloudflare to obfuscate the location of their servers. But what we can also see is that concerted efforts by the industry do work: a reduction of more than 50% of BitTorrent sites can be attributed to increased geo-blocking and enforcement efforts over the past three years. Since this research was conducted, the world has changed beyond what anyone could have imagined. Amidst the massive societal changes, the almost global lockdown caused by the COVID-19 pandemic has also accelerated the acculturation of digital services.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]