Open Code and Open Societies: Values of Internet Governance
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hal Abelson Education: Princeton AB (Summa Cum Laude)
Hal Abelson Education: Princeton A.B. (summa cum laude) 1969 MIT Ph.D. (Mathematics) 1973 Professional Appointments: 1994–present MIT Class of 1922 Professor MIT 1991–present Full Professor of Computer Sci. and Eng. MIT 1982–1991 Associate Professor of Electrical Eng. and Computer Sci. MIT 1979–1982 Associate Professor, Dept. of EECS and Division for Study and Res. in Education MIT 1977–1979 Assistant Professor, Dept. of EECS and DSRE MIT 1974–1979 Lecturer, Dept. of Mathematics and DSRE MIT 1974–1979 Instructor, Dept. of Mathematics and DSRE MIT Selected publications relevant to this proposal: 1. “Transparent Accountable Data Mining: New Strategies for Privacy Protection,” with T. Berners- Lee, C. Hanson, J, Hendler, L. Kagal, D. McGuinness, G.J. Sussman, K. Waterman, and D. Weitzner. MIT CSAIL Technical Report, 2006-007, January 2006. 2. “Information Accountability,” with Daniel J. Weitzner, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, MIT CSAIL Technical Report, 2007-034, June 2007. Available at http://hdl.handle.net/1721.1/37600. 3. “The Creation of OpenCourseWare at MIT,” J. Science Education and Technology, May, 2007. 4. Structure and Interpretation of Computer Programs, Hal Abelson, Gerald Jay Sussman and Julie Sussman, MIT Press and McGraw-Hill, 1985, (published translations in French, Polish, Chinese, Japanese, Spanish, and German). Second Edition, 1996. 5. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,” with Ross Ander- son, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter Neumann, Ronald Rivest, Jeffrey Schiller, and Bruce Schneier, in World Wide Web Journal, vol. 2, no. -
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic, -
What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions. -
Author and Activist Lawrence Lessig
Big Money Bulletin Author and reform activist Lawrence Lessig Inside to headline WDC annual meeting on May 2 Harvard University professor and campaign finance reform crusader Page 2 Lawrence Lessig will be the keynote speaker for the Democracy Supreme Court drops another bomb Campaign’s annual membership meeting to be held on Friday, May 2. Wisconsin communities move to amend Lessig is the author of Republic, Lost: How Money Corrupts Congress Page 3 — And a Plan to Stop It and founder of the national group Rootstrikers. Change in leadership coming at WDC He is the driving force behind the New Hampshire Rebellion that started Less for voters, more for lobbyists with a 185-mile walk across the state and now is working to make sure that every federal candidate in the 2016 primaries is asked one question: Page 4 “How are YOU going to end the system of corruption in Washington, Kissing the ring in Vegas D.C.?” Lessig also is well known for his dynamic TED talks. TED stands for Technology, Entertainment and Design and is a nonprofit devoted to spreading ideas, usually in the form of short, powerful talks of 18 minutes or less. Started in 1984, the group’s mission is promoted through conferences and videos in more than 100 languages that cover topics from science to April 2014 business to global issues. Edition No. 89 This year’s WDC membership meeting is being held at Madison’s Barrymore Theatre, located at 2090 Atwood Avenue on the city’s near east side. On the Web: Registration will begin at 5:30 p.m., with the evening’s program starting www.wisdc.org at 6. -
CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1
Conducted by the University of New Hampshire Survey Center Interviews with 914 adults in New Hampshire conducted by land line and cellular telephone on January 27-30, 2016 including 409 who say they plan to vote in the Republican presidential primary and 347 respondents who say they plan to vote in the Democratic presidential primary. The margin of sampling error for results based on Republican primary voters is plus or minus 4.8 percentage points and for results based on Democratic primary voters is plus or minus 5.3 percentage points. EMBARGOED FOR RELEASE: Sunday, January 31 at 6:00 p.m. CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1. (UNDECLARED / INDEPENDENT LIKELY VOTERS ONLY) “"Which Presidential primary election do you think you will vote in ... the Republican Primary or the Democratic Primary?" PROBE: “As of RIGHT NOW, which primary do you think you will vote in?” Dec. Jan. Jan. 2015 13-18 27-30 REPUBLICAN PRIMARY 48% 44% 47% DEMOCRATIC PRIMARY 38% 48% 42% UNDECIDED 14% 8% 11% CNN/WMUR/UNH Tracking Poll -2- January/February, 2016 2. (REPUBLICAN PRIMARY VOTERS ONLY:) “Have you definitely decided who you will vote for in the New Hampshire primary … are you leaning toward someone … or have you considered some candidates but are still trying to decide?” June Sept Dec Jan Jan. 2015 2015 2015 13-18 27-30 DEFINITELY DECIDED 8% 13% 18% 31% 39% LEANING TOWARD SOMEONE 17% 28% 26% 26% 24% STILL TRYING TO DECIDE 75% 59% 56% 43% 37% 3. (REPUBLICAN PRIMARY VOTERS ONLY:) "I’m going to read you the names of the candidates who are either running or considering running for the Republican nomination. -
THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson. -
Fostering Learning in the Networked World: the Cyberlearning Opportunity and Challenge
Inquiries or comments on this report may be directed to the National Science Foundation by email to: [email protected] “Any opinions, findings, conclusions and recommendations expressed in this report are those of the Task Force and do not necessarily reflect or represent the views of the National Science Foundation.” Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation1 Report of the NSF Task Force on Cyberlearning June 24, 2008 Christine L. Borgman (Chair), Hal Abelson, Lee Dirks, Roberta Johnson, Kenneth R. Koedinger, Marcia C. Linn, Clifford A. Lynch, Diana G. Oblinger, Roy D. Pea, Katie Salen, Marshall S. Smith, Alex Szalay 1 We would like to acknowledge and give special thanks for the continued support and advice from National Science Foundation staff Daniel Atkins, Cora Marrett, Diana Rhoten, Barbara Olds, and Jim Colby. Andrew Lau of the University of California at Los Angeles provided exceptional help and great spirit in making the distributed work of our Task Force possible. Katherine Lawrence encapsulated the Task Force’s work in a carefully crafted Executive Summary. Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation Science Foundation the National for A 21st Century Agenda Report of the NSF Task Force on Cyberlearning Table of Contents Executive Summary...............................................................................................................................................................................................................................5 -
A Critique of Abelson and Sussman Why Calculating Is Better Than
A critique of Abelson and Sussman - or - Why calculating is better than scheming Philip Wadler Programming Research Group 11 Keble Road Oxford, OX1 3QD Abelson and Sussman is taught [Abelson and Sussman 1985a, b]. Instead of emphasizing a particular programming language, they emphasize standard engineering techniques as they apply to programming. Still, their textbook is intimately tied to the Scheme dialect of Lisp. I believe that the same approach used in their text, if applied to a language such as KRC or Miranda, would result in an even better introduction to programming as an engineering discipline. My belief has strengthened as my experience in teaching with Scheme and with KRC has increased. - This paper contrasts teaching in Scheme to teaching in KRC and Miranda, particularly with reference to Abelson and Sussman's text. Scheme is a "~dly-scoped dialect of Lisp [Steele and Sussman 19781; languages in a similar style are T [Rees and Adams 19821 and Common Lisp [Steele 19821. KRC is a functional language in an equational style [Turner 19811; its successor is Miranda [Turner 1985k languages in a similar style are SASL [Turner 1976, Richards 19841 LML [Augustsson 19841, and Orwell [Wadler 1984bl. (Only readers who know that KRC stands for "Kent Recursive Calculator" will have understood the title of this There are four language features absent in Scheme and present in KRC/Miranda that are important: 1. Pattern-matching. 2. A syntax close to traditional mathematical notation. 3. A static type discipline and user-defined types. 4. Lazy evaluation. KRC and SASL do not have a type discipline, so point 3 applies only to Miranda, Philip Wadhr Why Calculating is Better than Scheming 2 b LML,and Orwell. -
The Computer As a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984)
DOCUMENT RESUME ED 295 g'6 IR 013 322 AUTHOR McDonald, Joseph P.; And Others TITLE The Computer as a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984). CR85-10. INSTITUTION Educational Technology Center, Cambridge, MA. SPONS AGENCY Education Collaborative for Greater Boston, Inc., Cambridge, Mass. PUB DATE Apr 85 NOTE 25p.; For a report of a related conference, see IR 013 326. PUB TYPE Collected Works - Conference Proceedings (021) -- Reports - Descriptive (141) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer Assisted Instruction; *Computer Literacy; Computer Simulation; Curriculum Development; Elementrry Secondary Education; *Language Arts; *Mathematics Instruction; Microcomputers; Professional Development; Research Needs; *Science Instruction; Teacher Education; Teacher Role IDENTIFIERS Reality ABSTRACT This report of a 1984 conference on the computer as a teaching tool provides summaries of presentations on the role of the computer in the teaching of science, mathematics, computer literacy, and language arts. Analyses of themes emerging from the conference are then presented under four headings: (1) The Computer and the Curriculum (the computer keeps learning connected to experience; the computer provides access to the underlying disciplines of subjects; the computer challenges the curricular status quo; and the computer aids implementation of the curriculum); (2) The Computer and Reality (computer-based models and simulations only imperfectly represent reality; a program may mask operations that students should experience to give depth and stability to their learning; and computers sometimes need to be used in conjunction with other, more concrete, experiences); (3) Perspectives on Teaching Practice (teaching is rooted in a teacher's own interests, need to understand, and social commitment; and teaching is, to a significant extent, a product of circumstance, not an entirely rational enterprise); and (4) Teachers' Professional Development (strategies and goals are needed for teacher training). -
Lawrence Lessig
TRANSCRIPT Money in Politics 2009 Conference Pre-Luncheon Keynote Presentation: Lawrence Lessig Susan Liss: I'm director of the Democracy Program at the Brennan Center and our campaign finance work falls under our side of the aisle called Democracy. I am incredibly thrilled to be working with fantastic colleagues and I really want to thank all of my colleagues who have put this program together today. My mind is just twirling on the things that we can do and we've only had one panel and two wonderful kickoff speakers. I'm here to introduce our keynote, and we are delighted and honored that professor Lawrence Lessig from Stanford Law School has been willing to fly across the country to share his knowledge with us. I know many of you are very familiar with his contributions to this field already. He is currently a professor of law at Stanford Law School and the founder of the school's Center for Internet and Society. He is one of the foremost intellectuals on intellectual property and intellectual property law and the Internet; from what I understand that tremendous knowledge base has seguewayed into a fascination and interest with these very important underlying issues involving campaign finance reform. He will be moving to Harvard to start a study on ethics and to start a center on ethics and institutional corruption in the fall. We are really very honored and so pleased to welcome him here and thank him for coming. Professor Lessig. Lawrence Lessig: Thank you very much. The advertisements for this conference said that the first keynote would provide some statistics and I, quote, "would provide slides" so here I am to provide the slides. -
Computer Science Logo Style Beyond Programming
Computer Science Logo Style Beyond Programming Brian Harvey Computer Science Logo Style SECOND EDITION Volume 3 Beyond Programming The MIT Press Cambridge, Massachusetts London, England 1997 by the Massachusetts Institute of Technology The Logo programs in this book are copyright 1997 by Brian Harvey. These programs are free software; you can redistribute them and/or modify them under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. These programs are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License (printed in the ®rst volume of this series) for more details. For information on program diskettes for PC and Macintosh, please contact the Marketing Department, The MIT Press, 55 Hayward Street, Cambridge, Massachusetts, 02142. Copyright credits for quoted material on page 349. This book was typeset in the Baskerville typeface. The cover art is an untitled mixed media acrylic monotype by San Francisco artist Jon Rife, copyright 1994 by Jon Rife and reproduced by permission of the artist. Library of Congress Cataloging-in-Publication Data Harvey, Brian, 1949± Computer Science Logo Style / Brian Harvey. Ð 2nd ed. p. cm. Includes indexes. Contents: v. 1. Symbolic computing. Ð v. 2. Advanced techniques Ð v. 3. Beyond programming. ISBN 0±262±58151±5 (set : pbk. : alk. paper). Ð ISBN 0±262±58148±5 (v. 1 : pbk. : alk. paper). Ð ISBN 0±262±58149±3 (v. -
Forbidden Feeds: Government Controls on Social Media in China
FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and