Tilburg University Breaking and Remaking Law and Technology Dizon

Total Page:16

File Type:pdf, Size:1020Kb

Tilburg University Breaking and Remaking Law and Technology Dizon Tilburg University Breaking and remaking law and technology Dizon, Michael Publication date: 2016 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Dizon, M. (2016). Breaking and remaking law and technology: A socio-techno-legal study of hacking. [s.n.]. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. sep. 2021 B REAKING AND R EMAKING L AW AND TECHNOL OGY A Socio-Techno-Legal Study of Hacking MICHAEL ANTHONY C. DIZON B REAKING AND R EMAKING L AW AND TECHNOL OGY A Socio-Techno-Legal Study of Hacking Proefschrift ter verkrijging van de graad van doctor aan Tilburg University op gezag van de rec- tor magnificus, prof.dr. E.H.L. Aarts, in het openbaar te verdedigen ten overstaan van een door het college voor promoties aangewezen commissie in de aula van de Universiteit op dinsdag 28 juni 2016 om 16.15 uur door MICHAEL ANTHONY CO DIZON geboren op 13 juni 1975 te Quezon City, Filipijnen Promotores: prof.dr. R.E. Leenes prof.dr. E.J. Koops Overige leden van de Promotiecommissie: prof.dr. P.J.A. de Hert prof.dr. N. Helberger prof.dr. B.P.F. Jacobs prof.dr. T. Swierstra ACKNOWLEDGMENTS Researching and writing this book would not have been possible without the help of the following persons, groups and institutions. I would like to extend my gratitude to them for their contribution and assistance in making this book: my supervisors, Professor Ronald Leenes and Pro- fessor Bert-Jaap Koops, for their guidance and feedback throughout the entire process; Tilburg University for granting me the opportunity to con- duct this research as a PhD candidate; the faculty and staff of Tilburg Law School for their help and advice on academic and administrative matters; my colleagues at the Tilburg Institute for Law, Technology, and Society (TILT) for their camaraderie and useful comments on my research, par- ticularly Dr Maurice Schellekens, Dr Bryce Newell and Dr Tjerk Timan for their detailed notes on specific chapters; the administrators and staff of the International Institute for the Sociology of Law for the grant to conduct research at their excellent library and documentation center; the organizers and students of Netherlands Graduate Research School of Science, Technology and Modern Culture (WTMC) Summer School 2014 for an informative week learning about science and technology studies; the faculty, staff and students of the Oxford Internet Institute’s Summer Doctoral Programme 2015 for sharing their research and expertise with me; Val Datu and VJ Graphic Arts for the design and layout, and my fam- ily and friends for their encouragement and support. I would especially like to express my appreciation to the members of the Dutch hacker com- munity for their openness and generosity in agreeing to interviews, chat- ting with me, listening and reacting to presentations about my research at hacker conferences, and allowing me to observe and participate at various hackerspaces and hacker events. I hope that I was able to capture the es- sence of hacker culture as much as possible and to see the world through your eyes. Most of all, I would like to thank my wife who is always with me every step of the way. S U M M A R Y In an increasingly digital and connected world, technological groups like hackers play a significant role in the workings and governance of soci- ety. This book examines the relations and interactions between hacking and the law by focusing on two types of hackers: makers, who are interested in hacking all kinds of technologies and regularly hang out at communal work- shops called hackerspaces to build, share and collaborate on projects, and hacktivists, those who engage in hacking activities for overtly socio-political purposes. In this research, hacking is defined as the creative, innovative and unexpected use of technology. The central research question of the book is: In relation to their technologies, norms and values, how do makers and hacktivists interact with and respond to technology laws and policies? Since the research lies at the intersection of law, technology and society, the book adopts an interdisciplinary socio-techno-legal approach that combines the fields of technology law, science and technology studies, and socio-legal studies. With regard to methods, it utilizes doctrinal legal research together with various types of qualitative research methods. In addition to the legal analysis of laws that are relevant to hacking, empirical data about makers and hacktivists was collected through interviews, participant observation at hackerspaces and hacker events, and content analysis of hacker manifestos, and subsequently analyzed through a qualitative, inductive and interpretivist approach. The book aims to contribute to a better understanding of the legal and normative impact of hackers and to improve approaches to the regula- tion and governance of technology. Makers and hacktivists are part of a longstanding and vibrant hacker culture that has its own distinguishing technologies, practices, norms and values. There are different types of hackers who preceded makers and hack- tivists. They include the original computer hackers, computer hobbyists, underground hackers, and FOSS developers. Hacker culture and these pre- vious hacker generations have a strong influence on makers and hacktivists. Like the other hacker types, makers and hacktivists are extremely passionate about technology and desire to use it in new and creative ways. Makers are especially enthusiastic about continuing the hacker tradition of creatively using technology to produce inventions and other technical advances. There is also a rebellious and non-conformist streak that runs through all types of hackers. But while hacktivists share the same anti-establishment attitude and countercultural goals of early computer hackers and computer hobbyists, they do not consider technology as an end in itself but as a powerful means for socio-political ends. With respect to their norms and values, makers and hacktivists share many things in common. The values of creativity and innovation, curiosity, and individual autonomy and liberty rank highest for both of them. Makers and hacktivists also place great importance on having free and open access to and use of information and technology. But there are differences between them as well. While they both highly prize community development and so- cial development, makers place greater emphasis on the former and hacktiv- ists the latter. Makers are also more concerned about the values of openness and transparency because they require full access to technologies and sys- tems so they can use them in new and interesting ways. Hacktivists, on their part, consider privacy and security to be of utmost importance. Computer crime, intellectual property, contract, and anti-circumven- tion rules and regulations are the laws that are most relevant to makers and hacktivists. What is common among these laws and what connects them to hacking is that, like hacking, they essentially deal with or concern access to and use of information and technology. Existing technology laws and policies tend to restrict rather than support makers and hacktivists. In general, com- puter crime laws are very broad and restrictive and over-criminalize hacking. Because of the vague and low legal thresholds for committing computer security crimes, many hacking activities, including those that are creative or innocuous, are subject to criminal prosecution. While intellectual property laws grant creators and inventors extensive rights over their creations, the corollary limitations and exceptions to these rights that could benefit hackers and ordinary users and preserve the intellectual property balance are few and far between. These problems are further exacerbated by the use of restrictive contracts and anti-circumvention technologies and rules that technically and legally preclude potentially creative and innovative uses of protected informa- tion and technology. Despite these conflicts, it is curious to see how hacking and the law share and seek to protect and promote essentially the same social interests and goals. Like intellectual property laws, the main goal of hacking is to produce creative works and innovative technologies and make them available to the public. Protecting the security of computer systems and data, which is the primary objective of computer crime laws, is considered an important value as well among makers and hacktivists. While they may have serious differences, hacking and the law are connected on a fundamental level and, through these areas of connection and intersection, the tensions between them may be resolved. The relations and interactions between hacking and law and public authorities can be characterized as complex and multifaceted. Makers’ and hacktivists’ general responses to law are: to ignore and avoid it; if it becomes impossible to keep the law away, to change or resist it; and, if it benefits the hacker community and society as a whole, to possibly work with, use or adapt the law. As seen in the campaign against electronic voting machines, hack- ers can strive to change technology laws and policies that they disagree with through technical means.
Recommended publications
  • Impact of the Maker Movement
    Impact of the maker movement Developed by Deloitte Center for the Edge and Maker Media from the Maker Impact Summit Dec. 2013 I AM A MAKER with my own two hands I forge the future from my imagining my work, my sweat with these tools i can build worlds here i put wire and foam transistor and plastic rubber metal and wood together to make something new what does it do where will this take us new places new worlds all from my workshop Malcolm S. Hoover, 2014 TABLE OF CONTENTS A Future of Potential 4 Overview 7 Letters from Conveners 10 How to Read This Document 14 How might the Maker Movement have an impact on… 15 • Manufacturing 16 • Education 19 • Government and Public Policy 22 • Citizen Science 25 • Retail 28 What Happens Next? 30 Participants 32 Other Images from the Summit 38 A FUTURE OF POTENTIAL We are on the cusp of an opportunity to more fully We are in a correction of sorts. Driven by the goal of scale tap into our creative potential, driven by significant efficiencies and low costs, the supply chain has been technological innovation that is democratizing the means stretched to the far extremes, like a bungee cord, and now of production and enabling connections between resources it’s starting to come back as the underlying economics and markets. Realizing this opportunity will require change. Where will we end up? We’ve learned in the last re-thinking and redesigning all of our major institutions, 15 years that experimentation is the key to innovation.
    [Show full text]
  • A Study of Android Application Security
    A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks.
    [Show full text]
  • The Fuzzy Software Patent Debate Rages On
    OPINION The Fuzzy Software Patent Debate Rages On By Heather J. Meeker LinuxInsider 02/23/05 5:00 AM PT Once upon a time, we intellectual property lawyers got to live peacefully in our ivory towers. Now it seems that intellectual property policy issues have become fraught with partisan rhetoric. Most open-source promoters are against software patents. Most corporate spokesmen side with patents, period, whether they cover software or not. But it is worth looking beyond the rhetoric. The European Commission recently tolled the death knell for the EU Software Patent Directive, or more precisely, the "Directive on the Patentability of Computer- Implemented Inventions." Like most Americans, I am fairly clueless about the EU political process, and I wouldn't presume to write about exactly how it was killed. But the decision may have been swayed by an eleventh-hour public relations pitch against the directive by open-source spokesmen from the United States. On that aspect, I will add my two cents. A delegation of open-source leaders, led by Linus Torvalds, published an "Appeal" at softwarepatents.com, calling software patents "dangerous to the economy at large, and particularly to the European economy." Look Beyond the Rhetoric Leaders of the open-source software movement have long been harsh critics of software patents. The GPL [license] itself says, "any free program is threatened constantly by software patents." The appeal contends that copyright provides adequate protection for the creations of software authors. The Appeal advocated reliance on copyright law, rather than patent law, for the protection of software. Not long afterward, in late January, the European Parliament's Legal Affairs Committee recommended scrapping the pending directive, extending the debate until at least the end From www.linuxinsider.com/story/40676.html 1 April 2011 of the year.
    [Show full text]
  • Greek Society in Crisis and in Motion: Building the Material Bases for an Alternative Society from the Bottom up Georgia Bekridaki and Antonios Broumas
    Interface: a journal for and about social movements Article Volume 9 (1): 230 – 255 (2017) Bekridaki and Broumas, Greek society in crisis Greek society in crisis and in motion: building the material bases for an alternative society from the bottom up Georgia Bekridaki and Antonios Broumas Abstract In the last six years, Greece has been hit by a vicious circle of relentless neoliberal restructuring programs. During the years of the crisis, throughout the country urban and rural communities of struggle have been formed, which tend to employ instituent practices and to acquire constitutive characteristics, in order to collectively address unmet social needs / desires and ensure their collective survival. In this context, socially reproductive commons in germ form have emerged with social and solidarity economy initiatives in their peripheries, alternative forms of life in common have been shaped and societies have been set in motion with the potential to establish the material foundations of their collective autonomy. Within this huge gap of social (re)production, the constituent power of social movements emerges in germ form as a resurgent force with the potential to address these needs and desires and, correspondingly, shape life in common. In the neoliberal era, it is this potential of a constituent counter - power that has the capacity to constitute the contending power to the dominant force of the capital - state complex. Keywords: Greece, social movements, mutual aid, commons, social and solidarity economy, constituent power. Introduction Greece is at the forefront of a social war raging throughout the south and, gradually spreading towards the north of Europe. On the one side, capital loots wealth and accumulates social power from vulnerable populations directly by dispossession of small property, public wealth and the commons and less by the traditional means of extracting value through exploitation (Harvey 2014: 65).
    [Show full text]
  • Review/Of/The/Research/ Literature
    Working/Paper/Series// SWPS/2014)08/ May,%2014% Community)based/digital/fabrica5on/ workshops:/A/review/of/the/research/ literature// Sabine/Hielscher// and/Adrian/Smith/ SPRU.Working.Paper.Series/ The/SPRU/Working/Paper/Series/aims/to/accelerate/the/public/availability/of/the/research/undertaken/ by/ SPRU)associated/ people/ of/ all/ categories,/ and/ excep5onally,/ other/ research/ that/ is/ of/ considerable/interest/within/SPRU./It/presents/research/results/that/in/whole/or/part/are/suitable/for/ submission/to/a/refereed/journal,/to/a/sponsor,/to/a/major/conference/or/to/the/editor/of/a/book./Our/ inten5on/is/to/provide/access/to/early/copies/of/SPRU/research./ Editors( Contact( Tommaso&Ciarli& [email protected]/ Daniele&Rotolo& [email protected]/ Associate(Editors& Area& Florian&Kern& Energy& [email protected]/ Paul&Nightingale&& Science,&&&Technology&Policy& [email protected]/ Matias&Ramirez& Development& [email protected]/ Joe&Tidd&&& Technology&Innovation&Management& [email protected]/ Carlos&Sato& [email protected]/ Maria&Savona&&& Economics&of&Technological&Change& [email protected]/ Mariana&Mazzucato& [email protected]/ Andrew&Stirling& Transitions& [email protected]/ Caitriona&McLeish& Civil&military&interface&& [email protected]/ Administrator( Jenny&Lieu& [email protected]/ Disclaimer/ The/works/available/here/are/the/responsibility/of/the/individual/author(s)/and/do/not/necessarily/ represent/the/views/of/other/SPRU/researchers./As/maLers/of/policy/and/prac5ce,/SPRU/does/not/
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Hackerspaces
    d WP4 | CASE STUDY Report: Hackerspaces Theme [ssh.2013.3.2-1][Social Innovation- Empowering People, changing societies] Project Full Title: “Transformative Social Innovation Theory project” Grant Agreement n. 613169 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 613169 Suggested citation: Sabine Hielscher, Adrian Smith, Mariano Fressoli (2015) WP4 Case Study Report: Hackerspaces, Report For the TRANSIT FP7 Project, SPRU, University oF Sussex, Brighton. Acknowledgements: We wish to thank everyone in the Hackerspace scene who helped us with our research, whether through interviews, welcoming us to Hackerspaces and events, or putting us in touch with others. We also thank our colleagues in the TRANSIT project, at SPRU, at UNQ and Fundación Cenit For their help and encouragement with the research. Finally, we thank the European Commission and their FP7 research programme For Funding the TRANSIT project. Date: 14 January 2015 Authors: Sabine Hielscher, Adrian Smith, Mariano Fressoli Contact person: Adrian Smith Table of contents 1 Introduction to Hackerspaces 2 Methodology 2.1 Researcher relations to the case 2.2 Methods 3 Analysis of transnational network(ing) 3.1 Transnational networking: Hackerspaces 3.2 Aspects of ‘innovation’ and ‘change’ of the transnational network(ing) 3.3 Aspects of empowerment and disempowerment of the transnational network(ing) 3.4 Other issues about the transnational networking 4 Local initiative
    [Show full text]
  • Wikileaks Advisory Council
    1 WikiLeaks Advisory Council 2 Hi everyone, My name is Tom Dalo and I am currently a senior at Fairfield. I am very excited to Be chairing the WikiLeaks Advisory Council committee this year. I would like to first introduce myself and tell you a little Bit about myself. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. First off, I have been involved with the Fairfield University Model United Nations Team since my freshman year when I was a co-chair on the Disarmament and International Security committee. My sophomore year, I had the privilege of Being Co- Secretary General for FUMUN and although it was a very time consuming event, it was truly one of the most rewarding experiences I have had at Fairfield. Last year I was the Co-Chair for the Fukushima National Disaster Committee along with Alli Scheetz, who filled in as chair for the committee as I was unaBle to attend the conference. Aside from my chairing this committee, I am currently FUMUN’s Vice- President. In addition to my involvement in the Model UN, I am a Tour Ambassador Manager, and a Beta Alpha Psi member. I love the outdoors and enjoy skiing, running, and golfing. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. Some of you may wonder how I got involved with the Model United Nations considering that I am a business student majoring in Accounting and Finance. Model UN offers any student, regardless of their major, a chance to improve their puBlic speaking, enhance their critical thinking skills, communicate Better to others as well as gain exposure to current events.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
    Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................
    [Show full text]
  • WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A
    WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A dissertation submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy with a Major in Criminal Justice August 2014 Committee Members: Brian L. Withrow, Chair Bob Edward Vásquez Jay D. Jamieson Matthew Draper Jose R. Agustina COPYRIGHT by Kevin W. Jennings 2014 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Kevin Jennings, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. DEDICATION To Hal Jennings, Judy Jennings, and Matthew Draper, for showing me the path. To Sara Jennings, for joining me on the journey. ACKNOWLEDGEMENTS This dissertation never would have been possible without the support of many people who have guided me and cheered me on throughout this process. Dr. Brian Withrow was an excellent chair, and Doctors Vasquez, Jamieson, Draper, and Agustina all did their part in making this paper possible. Thank you for helping me, but even more important, thank you for putting up with me. I also need to give a big thank you to my mentor Dr. Tomas Mijares, who could not be on my committee but helped and guided me throughout the process of learning, teaching, and growing at Texas State University.
    [Show full text]
  • Patenting Software Is Wrong
    Case Western Reserve Law Review Volume 58 Issue 2 Article 7 2007 Manuscript: You Can't Patent Software: Patenting Software is Wrong Peter D. Junger Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation Peter D. Junger, Manuscript: You Can't Patent Software: Patenting Software is Wrong, 58 Case W. Rsrv. L. Rev. 333 (2007) Available at: https://scholarlycommons.law.case.edu/caselrev/vol58/iss2/7 This Tribute is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. MANUSCRIPT* YOU CAN'T PATENT SOFTWARE: PATENTING SOFTWARE IS WRONG PeterD. Jungert INTRODUCTION Until the invention of programmable' digital computers around the time of World War II, no one had imagined-and probably no one could have imagined-that methods of solving mathematical . Editor'sNote: This article is the final known manuscript of Professor PeterJunger. We present this piece to you as a tribute to Professor Junger and for your own enjoyment. This piece was not, at the time of ProfessorJunger 's passing, submitted to any Law Review or legal journal.Accordingly, Case Western Reserve University Law Review is publishing this piece as it was last edited by Professor Junger, with the following exceptions: we have formatted the document for printing, and corrected obvious typographical errors. Footnotes have been updated to the best of our ability, but without Professor Junger's input, you may find some errors.
    [Show full text]