Captives of the Cloud, We Will Tweet Our Treating the Two Parties Differently Because Critiques of It, and Facebook-Broadcast Our

Total Page:16

File Type:pdf, Size:1020Kb

Captives of the Cloud, We Will Tweet Our Treating the Two Parties Differently Because Critiques of It, and Facebook-Broadcast Our We are the voluntary prisoners of the cloud; we are being watched over by governments we did not elect. ÊÊÊÊÊÊÊÊÊÊWael Ghonim, Google's Egyptian executive, said: “If you want to liberate a society just give them the internet.”1 But how does one liberate a society that already has the internet? In a society 01/14 permanently connected through pervasive broadband networks, the shared internet is, bit by bit and piece by piece, overshadowed by the “cloud.” The Coming of the Cloud The cloud, as a planetary-scale infrastructure, was first made possible by an incremental rise in Metahaven computing power, server space, and trans- continental fiber-optic connectivity. It is a by- product and parallel iteration of the global Captives of the (information) economy, enabling a digital (social) marketplace on a worldwide scale. Many of the Cloud: Part I cloud’s most powerful companies no longer use the shared internet, but build their own dark fiber highways for convenience, resilience, and speed.2 In the cloud’s architecture of power, the early internet is eclipsed. ÊÊÊÊÊÊÊÊÊÊA nondescript diagram in a 1996 MIT research paper titled “The Self-governing Internet: Coordination by Design,” showed a “cloud” of networks situated between routers linked up by Internet Protocol (IP).3 This was the first reported usage of the term “cloud” in relation to the internet. The paper talked about a “confederation” of networks governed by common protocol. A 2001 New York Times article reported that Microsoft’s .NET software programs did not reside on any one computer, n “but instead exist in the ‘cloud’ of computers e v a that make up the internet.”4 But it wasn’t until h a t 2004 that the notion of “cloud computing” was e M Ê defined by Google CEO Eric Schmidt: 2 1 0 2 r I don’t think people have really understood e b how big this opportunity really is. It starts I m e t t r with the premise that the data services and p a e P architecture should be on servers. We call it s : d u — cloud computing – they should be in a o 7 l 3 C “cloud” somewhere. And that if you have # e l h the right kind of browser or the right kind of t a f n r o access, it doesn’t matter whether you have u s o j e v a PC or a Mac or a mobile phone or a x i t u l p f BlackBerry or what have you – or new a - e C devices still to be developed – you can get access to the cloud. There are a number of companies that have benefited from that. Obviously, Google, Yahoo!, eBay, Amazon come to mind. The computation and the data and so forth are in the servers.5 The internet can be compared to a patchwork of city-states, or an archipelago of islands. User 09.17.12 / 12:42:29 EDT 02/14 A selection of the global US social media cloud, resorting under the Patriot Act. 09.17.12 / 12:42:29 EDT data and content materials are dispersed over cloud is like money in the bank, what happens to different servers, domains, and jurisdictions (i.e., it while it resides “conveniently” in the cloud? different sovereign countries). The cloud is more like Bismarck’s unification of Germany, sweeping The US Cloud and the Patriot Act up formerly distinct elements, bringing them Where and by whom sites are registered and data under a central government. As with most is hosted matters a great deal in determining technology, there is a sense of abstraction from who gains access to and control over the data. prior experiences; in the cloud the user no longer 03/14 For example, all data stored by US companies (or needs to understand how a software program their subsidiaries) in non-US data centers falls works or where his or her data really is. The under the jurisdiction of the USA Patriot Act, an important thing is that it works. anti-terrorism law introduced in 2001.10 This ÊÊÊÊÊÊÊÊÊÊIn the early 1990s, a user would operate a emphatically includes the entire US cloud – “personal home page,” hosted by an internet Facebook, Apple, Twitter, Dropbox, Google, Service Provider (ISP), usually located in the Amazon, Rackspace, Box, Microsoft, and many country where that user lived. In the early 2000s, others. Jeffrey Rosen, a law professor at George free online services like Blogspot and video sites Washington University, has established that the like YouTube came to equal and surpass the Patriot Act, rather than investigating potential services of local providers. Instead of using a terrorists, is mostly used to spy on innocent paid-for local e-mail account, users would Americans.11 But the people being watched need switch to a service like Gmail. In the late 2000s not even be Americans. Via the cloud, citizens and the early 2010s this was complemented, if across the world are subject to the same Patriot not replaced, by Facebook and other social Act powers – which easily lend themselves to media, which integrate e-mail, instant misuse by authorities. Matthew Waxman of the messaging, FTP (File Transfer Protocol), financial Council on Foreign Relations outlines the services, and other social interaction software situation: within their clouds. Cloud-based book sales, shopping, and e-reading have brought about the These kinds of surveillance powers have global dominance of Amazon, the world’s biggest historically been prone to abuse. Some of cloud storage provider and the “Walmart of the the legal restrictions on surveillance that Web.”6 By 2015, combined spending for public the Patriot Act was designed to roll back and private cloud storage will be $22.6 billion were actually the direct product of abuses worldwide.7 Given this transition, it is no by the FBI, the CIA, and other government exaggeration to proclaim an exodus from the agencies. During the 1960s and ‘70s, internet to the cloud. The internet’s dispersed national security intelligence powers were architecture gives way to the cloud’s central used by government agents to spy on model of data storage and management, handled political opposition [and] cast abusively and owned by a handful of corporations. n wide nets. That legacy of abuse has raised e v ÊÊÊÊÊÊÊÊÊÊThe coming of the cloud is spelled out by a a lot of concerns about whether there is h a Aaron Levie, founder and CEO of Box, one of t adequate oversight with respect to these e M 12 Silicon Valley's fastest growing cloud storage Ê new surveillance powers. 2 providers. As Levie states, the biggest driver of 1 0 2 the cloud is the ever-expanding spectrum of r The sociologist Saskia Sassen adds to this e mobile devices – iPhones, iPads, Androids, and b perspective: I m e t t such – from which users tap into the cloud and r p a e P flock around its server spine: Through the Patriot Act [...] the government s : d u — has authorized official monitoring of o 7 l 3 C If you think about the market that we're in, attorney-client conversations, wide- # e l and more broadly just the enterprise h ranging secret searches and wiretaps, the t a f n r o software market, the kind of transition collection of Internet and e-mail addressing u s o j e that's happening now from legacy systems v data [...] All of this can be done without x i t u l p to the cloud is literally, by definition, a f probable cause about the guilt of the a - once-in-a-lifetime opportunity. This is e C people searched – that is to say, the usual probably going to happen at a larger scale threshold that must be passed before the than any other technology transition we've government may invade privacy has been seen in the enterprise. Larger than client neutralized. This is an enormous accrual of servers. Larger than mainframes.8 powers in the administration, which has found itself in the position of having to Google, one of the world’s seven largest cloud reassure the public that it can be 'trusted' companies, has recently compared itself to a not to abuse these powers. But there have bank.9 That comparison is apt. If data in the been abuses.13 09.17.12 / 12:42:29 EDT 04/14 The Mubarak “kill switch” which took Egypt off the internet in January, 2011. 09.17.12 / 12:42:29 EDT Twitter played the role of subversive, Microsoft was the first cloud company to publicly uncensorable alternative media – in part confirm Patriot Act access to its data stored because the servers of these wildly popular outside the US.14 In August 2011, Google also services were beyond the reach of local confirmed that its data stored overseas is authorities. Indeed, Hosni Mubarak's best bet to subject to “lawful access” by the US fend off the power of the internet was to switch it government.15 A 2012 white paper by the law and off entirely. To do so, “just a few phone calls privacy firm Hogan Lovells examined these 05/14 probably sufficed.”19 While Mubarak's ultima findings, concluding that while the Patriot Act ratio as a sovereign ruler over Egyptian soil does give the US government access to the proved sufficient to wall the country off from the cloud, many other governments enjoy similar network, the violent crudeness of this act also forms of access under their own laws – and demonstrated the dictator's much more further, that using the “location” of a cloud substantial lack of power over the network's server to determine legal protection was a larger infrastructure.
Recommended publications
  • An Empirical Analysis of Errors with Automated Dmca Takedown Notices
    Santa Clara High Technology Law Journal Volume 37 Issue 2 Article 1 4-1-2021 COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES Seng, Daniel Follow this and additional works at: https://digitalcommons.law.scu.edu/chtlj Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Seng, Daniel, COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES, 37 SANTA CLARA HIGH TECH. L.J. 119 (2021). Available at: https://digitalcommons.law.scu.edu/chtlj/vol37/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES By Daniel Seng1 Under the Digital Millennium Copyright Act (DMCA), reporters issuing takedown notices are required to identify the infringed work and the infringing material and provide their contact information (functional formalities), attest to the accuracy of such information and their authority to act on behalf of the copyright owner, and sign the notices (non-functional formalities). Online service providers will evaluate such notices for compliance with these DMCA formalities before acting on them. This paper seeks to answer questions about the quality of takedown notices, especially those generated by automated systems, which are increasingly being used by copyright owners to detect instances of online infringement and issue takedown notices on their behalf.
    [Show full text]
  • Piracy, Privacy and Internet Openness: The
    I N S I D E T H E M I N D S Understanding Developments in Cyberspace Law Leading Lawyers on Analyzing Recent Trends, Case Laws, and Legal Strategies Affecting the Internet Landscape 2012 EDITION 2012 Thomson Reuters/Aspatore All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, except as permitted under Sections 107 or 108 of the U.S. Copyright Act, without prior written permission of the publisher. This book is printed on acid free paper. Material in this book is for educational purposes only. This book is sold with the understanding that neither any of the authors nor the publisher is engaged in rendering legal, accounting, investment, or any other professional service. Neither the publisher nor the authors assume any liability for any errors or omissions or for how this book or its contents are used or interpreted or for any consequences resulting directly or indirectly from the use of this book. For legal advice or any other, please consult your personal lawyer or the appropriate professional. The views expressed by the individuals in this book (or the individuals on the cover) do not necessarily reflect the views shared by the companies they are employed by (or the companies mentioned in this book). The employment status and affiliations of authors with the companies referenced are subject to change. For customer service inquiries, please e-mail [email protected]. If you are interested in purchasing the book this chapter was originally included in, please visit www.west.thomson.com.
    [Show full text]
  • Free Speech Anupam Chander  and Uyên P
    A3_CHANDER.DOCX (DO NOT DELETE) 12/15/2014 3:29 PM Free Speech Anupam Chander and Uyên P. Lê ABSTRACT: When civic engagement is increasingly mediated online, the law regulating cyberspace becomes the law regulating speech. Yet, free speech texts and free speech theorists pay scant attention to the ways that cyberlaw configures the principal mechanism for exercising free speech rights today— communication online. Conversely, while many have long observed that the Internet enables speech, scholars have failed to recognize the role that the First Amendment played in configuring the law of cyberspace. A strong normative commitment to free speech helped clear the legal hurdles for the development of history’s most powerful platforms for speech. Because of law, speech became free—free as in speech, and free as in beer. This is the First Amendment/ Cyberlaw Dialectic: the First Amendment constituted cyberlaw, and cyberlaw, in turn, constituted free speech. But this moment of free speech is fragile, threatened by mass electronic surveillance, mega-trade treaties with ever stricter intellectual property protections, and criminal copyright law. How we approach such issues will determine the extent of government censorship, private third-party censorship, and even self-censorship and sousveillance. The future of free speech hangs in the balance. Professor of Law, University of California, Davis; B.A., Harvard University; J.D., Yale Law School. Free Speech and Technology Fellow, University of California, Davis; B.A., Yale University; J.D., University of California, Davis. We thank Vik Amar, Ashutosh Bhagwat, Ken Bamberger, Alan Brownstein, Michael Froomkin, Jerry Kang, Carlton Larson, Vincent Polley, Saikrishna Prakash, Derek Slater, Madhavi Sunder, and William Wang, and the Berkeley law faculty, as well as the participants of a Berkeley law faculty workshop and Zachary Sanderson and other editors of the Iowa Law Review, for very helpful comments.
    [Show full text]
  • Comments of the Center for Democracy & Technology for The
    Comments of the Center for Democracy & Technology for the U.S. Intellectual Property Enforcement Coordinator Joint Strategic Plan for 2019-2021 November 13, 2018 The Center for Democracy & Technology respectfully submits these comments in response to the September 13, 2018 Federal Register notice requesting public input regarding the development of an updated Joint Strategic Plan on Intellectual Property Enforcement.1 CDT is a non-profit, public interest organization advocating for the digital rights of all. New digital technologies, services, and the internet have led to novel factual disputes, calls for new types of enforcement actions, and areas of legal uncertainty on copyright issues. At the same time, growing tensions between trading partners regarding the use of intellectual property and enforcement of IP rights have placed even greater weight on the need for a coordinated approach to both trade negotiations and IP enforcement. CDT shares the Coordinator’s interest in crafting a practical, workable, approach. Although these comments focus specifically on copyright, some of the more general principles set forth may also be useful for other areas of intellectual property. However, those areas raise distinct issues that the Intellectual Property Enforcement Coordinator (IPEC) must take into account when determining how best to craft enforcement strategies and devote resources to them. For example, some forms of counterfeiting pose serious risks to human health and safety that copyright infringement does not. CDT appreciates that, in 2017, the bulk of the enforcement actions taken by the Intellectual Property Task Force (IPTF) focused on the interception of counterfeit goods, many of which posed these health and safety risks.2 On copyright matters, CDT seeks pragmatic approaches to policy and enforcement that respect the rights of creators without curtailing the internet’s tremendous potential for fostering innovation and free expression.
    [Show full text]
  • Cyber-Takings by Larry Mcintyre
    Volume XIV – Spring 2014 Journal of Technology ISSN 2164-800X (online) DOI 10.5195/tlp.2014.148 Law & Policy http://tlp.law.pitt.edu Cyber-Takings: The War on Crime Moves into the Cloud Larry McIntyre This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. This site is published by the University Library System of the University of Pittsburgh as part of its D- Scribe Digital Publishing Program and is cosponsored by the University of Pittsburgh Press. Cyber-Takings: The War on Crime Moves into the Cloud Larry McIntyre [P]rocedural devices rooted in experience were written into the Bill of Rights not as abstract rubrics in an elegant code but in order to assure fairness and justice before any person could be deprived of “life, liberty, or property.”1 INTRODUCTION Recent advances in the reliability and availability of broadband Internet connections have allowed technology users to store vast amounts of data remotely.2 Cloud services now commonly sync photos, videos, emails, contacts, and other documents across multiple devices. Our craving for ubiquitous access to data, however, is not without limitation. At the forefront of the debate surrounding these services are concerns about privacy and security.3 The thought of a third party gaining access to our private data is understandably troubling. Yet, these concerns frequently overlook the possibility that our digital life may become collateral damage in the course of a criminal investigation. Such digital asset seizures are becoming increasingly prevalent4 as the Obama administration increases its use of existing civil forfeiture laws in an effort to deter cybercrime.5 Part I of this article discusses the scope of the federal government’s asset forfeiture authority under various statutes, and examines the social and political Larry McIntyre is a J.D.
    [Show full text]
  • 1 ,In the United States District Court for the Eastern
    Case 1:12-cr-00003-LO Document 51 Filed 03/30/12 Page 1 of 19 PageID# 449 ,IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION UNITED STATES OF AMERICA, ) ) The Honorable Liam O’Grady Plaintiff, ) ) Case No. 1:12-cr-00003-LO v. ) ) KIM DOTCOM, et al. ) ) Defendants. ) BRIEF OF INTERESTED PARTY KYLE GOODWIN IN SUPPORT OF EMERGENCY MOTION FOR PROTECTIVE ORDER BY NON-PARTY CARPATHIA HOSTING, INC. AND FOR ADDITIONAL RELIEF I. INTRODUCTION It is one thing to take legal action against an alleged copyright infringer. It is quite another to do so at the expense of entirely innocent third parties, with no attempt to prevent or even mitigate the collateral damage. That is what has happened here. When the government shut down Megaupload, it was one of the 100 most popular websites in the world, with reportedly 150 million registered users. One of those users, Kyle Goodwin, had recently started a business reporting on local high school sporting events across Ohio. In addition to backing up his files on a hard drive, Mr. Goodwin joined many others like him in placing his files on Megaupload’s servers, paying for a premium account, and taking advantage of the remote backup cloud-based system for storage and remote access to an unlimited number of files. When Mr. Goodwin’s hard drive crashed, he expected to be able to restore his files by drawing them from Megaupload’s servers. However, before he could do so, on January 19, 2012, federal agents shut down Megaupload with no prior notice to Mr.
    [Show full text]
  • Threat Modelling of Hacktivist Groups Organization, Chain of Command, and Attack Methods Master of Science Thesis in Secure and Dependable Computer Systems
    Threat modelling of hacktivist groups Organization, chain of command, and attack methods Master of Science Thesis in Secure and Dependable Computer Systems THOMAS CHOPITEA Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Göteborg, Sweden, Aug 2012 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Threat modelling of hacktivist groups Organization, chain of command, and attack methods THOMAS CHOPITEA © THOMAS CHOPITEA, Aug 2012. Examiner: ERLAND JONSSON Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 The logo of Anonymous, a large hacktivist group Department of Computer Science and Engineering Göteborg, Sweden Aug 2012 ACKNOWLEDGMENTS I would like to thank my colleagues at CEIS who all contributed to a very nice work environment during my stay there: Anastasia Rumyantseva, Alexandre Durand, Charles Ibrahim, Aurélien Della, Elena Vlasova, and Lucas Piferrer.
    [Show full text]
  • Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting
    Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting Tobias Lauinger,∗ Martin Szydlowski,y Kaan Onarlioglu,∗ Gilbert Wondracek,y Engin Kirda∗ and Christopher Kruegelz ∗Northeastern University, Boston, MA. Email: ftoby, onarliog, [email protected] yVienna University of Technology, Austria. Email: fmsz, [email protected] zUC Santa Barbara, CA. Email: [email protected] Abstract—Piracy is a mass phenomenon on the Internet The U.S. Digital Millennium Copyright Act (DMCA) today. Various file sharing platforms offer free access to unau- grants OCHs immunity from liability for copyright in- thorised copies of copyrighted works such as media content fringements committed by their users if they fulfil certain and software. Copyright holders are using a range of legal and technical methods to protect their rights, and they are conditions. One of its provisions allows copyright holders lobbying for legislation that would give them additional ways to request that infringing links be taken down. According to of enforcing their copyright online. However, little is known the criminal indictment1 against Megaupload, in September about how effective current forms of copyright enforcement 2009, Warner Bros. had 2,500 infringing links removed from are and how enduring the effect of proposed new measures Megaupload on a daily basis. Furthermore, trade associations can be. In this paper, we report on the results of a large- scale measurement study of the piracy ecosystem that has such as the Motion Picture Association of America (MPAA), emerged around One-Click Hosters or “cyberlockers” such the Recording Industry Association of America (RIAA) as Rapidshare, Megaupload, Mediafire, and Hotfile.
    [Show full text]
  • In Retrospect 2012
    A GLOBAL MULTI-STAKEHOLDER DIALOGUE PROCESS 20122012 IN RETROSPECT INTERNET & JURISDICTION PROJECT CASE COLLECTION VOLUME 1 I N T E R N E T & MORE INFORMATION ABOUT THE JURISDICTION INTERNET & JURISDICTIONMore information PROJECT AT about OBSERVATORY the Internet & Jurisdiction Project at: www.internetjurisdiction.net 1 k eepin g trac k O f trends twitter:www.internetjurisdiction.net @IJurisdiction TO S TAY UP-TO-DATE ON THE INTERNET & JURISDICTION PROJECT AND THE LATEST TRENDS W I T H R E g A R D TO T H E TENSION BETWEEN THE CROSS-BORDER INTERNET AND NATIONAL JURISDICTIONS, SUBSCRIBE TO OUR NEWSLETTER AT WWW.INTERNETJURISDICTION.NET A N D f OLLOW @IJURISDICTION ON TWITTER. 2012 IN RETROSPECT The Internet & Jurisdiction Project is an evidence- based global multi-stakeholder dialogue process. To inform its participants about emerging trends and high-level patterns, the Internet & Jurisdiction Project detected, curated and categorized over 420 cases around the world in a dedicated data- base between February and December 2012. They crowd-curation show the tension between the cross-border nature of the Internet with its transnational online spaces and the patchwork of geographically defined national jurisdictions. spotlIghT I & J DATABASE WITH The Internet & Jurisdiction Observatory supports CATEgORIZED CASES the Internet & Jurisdiction Project team in keeping track of the latest trends around the globe. This interdisciplinary network of selected international experts crowd-ranks every month all collected crowd-ranking cases in the Internet & Jurisdiction database via a progressive filtering process. The 20 most impor- tant cases are showcased in the monthly Internet & Jurisdiction Project newsletter Retrospect with retrospect concise summaries and links to relevant back- MONTHLY NEWSLETTER WITH TOP 20 CASES ground information.
    [Show full text]
  • Writ of Mandamus to the United States District Court for the Eastern District of Virginia in United States of America V
    Case No. ___________ _____________________________________________________________ IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT ____________________________________________________ IN RE: KYLE GOODWIN Petitioner. _______________________________ Petition for Writ of Mandamus to the United States District Court for the Eastern District of Virginia in United States of America v. Kim Dotcom, et al., No. 1:12-cr-00003-LO _____________________________________________________________ PETITION FOR WRIT OF MANDAMUS ON BEHALF OF KYLE GOODWIN ___________________________________________________________ John S. Davis Mitchell L. Stoltz WILLIAMS MULLEN Counsel of Record 200 So. 10th St. Corynne McSherry Richmond, VA 23218 ELECTRONIC FRONTIER FOUNDATION (804) 420-6296 815 Eddy Street [email protected] San Francisco, CA 94109 (415) 436-9333 [email protected] Abraham D. Sofaer THE HOOVER INSTITUTION Stanford University 434 Galvez Mall Stanford, CA 94305-6010 (650) 723-1754 [email protected] Attorneys for Petitioner Kyle Goodwin STATEMENT REGARDING ORAL ARGUMENT Petitioner Kyle Goodwin requests oral argument on this Petition. i CORPORATE DISCLOSURE STATEMENT Pursuant to Federal Rule of Appellate Procedure Rule 26.1 and Local Rule 26.1, Petitioner submits the following disclosures: Kyle Goodwin is a natural person. His business, OhioSportsNet, has no parent corporation and no publicly held corporation owns 10% or more of its stock. ii TABLE OF CONTENTS STATEMENT REGARDING ORAL ARGUMENT .....................................................................
    [Show full text]
  • Policing Access to Knowledge: an Analysis of The
    POLICING ACCESS TO KNOWLEDGE: AN ANALYSIS OF THE INTELLECTUAL PROPERTY PROHIBITION REGIME A Dissertation by PAUL LUCAS VACCARO LOGAN Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Chair of Committee, Patrick C. Burkart Committee Members, Randolph Kluver Gabriela Thornton Cara Wallis Head of Department, James Kevin Barge December 2014 Major Subject: Communication Copyright 2014 Paul Lucas Vaccaro Logan ABSTRACT This dissertation is an analysis of criminal enforcement of digital copyrights. I argue that an international prohibition regime to govern intellectual property rights (IPR) has emerged through systems of international trade and law enforcement. The regime, or international system of norms and decision­making procedures, is supported primarily by the United States, the European Union, and multinational intellectual property industries, and these stakeholders are consistently creating measures to strengthen intellectual property (IP) enforcement to include criminal sanctions. The question guiding the research is how the governance of IP enforcement through the international prohibition regime affects the legitimacy of intellectual property law enforcement. I engage the research question through case study analysis that adopts a critical legal methodology and relevant stakeholder analysis. The case studies occur in the European Union, where the standardization of copyright among member states takes place to strengthen the European Union’s common market. I conduct the case research through a critical legal analysis of policy documents, court cases, diplomatic cables, secondary sources and previous research on the cases. The two cases include the international police raid of the file sharing website OiNK’s Pink Palace and the formation of and protest against Spain’s Ley Sinde, a law created under U.S.
    [Show full text]
  • FUTURE of INTERNET Future of Internet Bit Bang 4 Bit Bang 4
    FUTURE OF INTERNET Future of Internet Bit Bang 4 Bit Bang 4 Bit Bang – Future of Internet: Societal, business, governance and technological aspects was the fourth multidisciplinary postgraduate course for Aalto University doctoral students. A total of 24 students from five Aalto University Schools participated in this two-semester course. The objective of the course was to teach the students teamwork, multidisciplinary collaboration, global perspective, industry and business foresight, and scenario building. In addition to normal class activities the students studied in six person teams factors that influence the future of Internet. Here the students were encouraged to take novel and even radical views. This joint publication contains the final reports of the teamwork assignments. Based on these chapters and other relevant information the course produced four eye opening scenarios on the future of Internet reaching up to 2025. Bit Bang post graduate courses are organised by Aalto University’s Multidisciplinary Institute of Digitalisation and Energy (MIDE). The earlier Bit Bang books are freely available from the MIDE web site. Yrjö Neuvo & Elina Karvonen (eds.) http://mide.aalto.fi ISBN 978-952-60-3610-6 Aalto University’s Multidisciplinary Institute of Digitalisation and Energy (MIDE) Bit Bang IV Future of Internet - Societal, business, governance and technological aspects ISBN 978-952-60-3610-6 (PDF) Cover: Petri Saarikko Layout: Unigrafia / Mari Soini Printed by: Unigrafia, 2012 Table of Contents FOREWORD 4 REFLECTIONS ON BIT BANG 4 7 FUTURE OF INTERNET - SOCIETAL, BUSINESS, GOVERNANCE AND TECHNOLOGICAL ASPECTS 9 Are We All Criminals? 10 Back to the Future – Prediction of Incremental and Disruptive Innovations 33 From Democratizing Innovation to Innovating Democracy 64 Proliferation of the Crowdsourcing Phenomenon 94 Internet, Find Me a Job! 111 Gamification of Life: the Rise of Gaming and Its Effects on Society 133 How to Control the Internet? – A Complexity Perspective 167 Education Reloaded: From Socrates to Udacity.
    [Show full text]