Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series

Total Page:16

File Type:pdf, Size:1020Kb

Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series VOLUME 7 Series Editors: POMPEU CASANOVAS, UAB Institute of Law and Technology, Bellaterra, Barcelona, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law-CIRSFID) and European University Institute, Florence, Italy Scienti fi c Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liverpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOURCIER, CERSA, France; TOM BRUCE, University of Cornell, USA; NURIA CASELLAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; G. CONRAD JACK, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRANCESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Arquitectura de Computadors, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, University of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF, The University of New South Wales, Australia; MARKO GROBELNIK, Josef Stefan Institute, Slovenia; JAMES HENDLER, Rensselaer Polytechnic Institute, USA; RINKE HOEKSTRA, Universiteit van Amsterdam, The Netherlands; ETHAN KATSH, University of Massachusetts Amherst, USA; MARC LAURITSEN, Capstone Practice Systems, Inc., USA; RONALD LEENES, TILT Institute, The Netherlands; ARNO LODDER, University of Amsterdam, The Netherlands; JOSÉ MANUEL LÓPEZ COBO, Playence, Austria; PIERRE MAZZEGA, LMTG - UMR5563 CNRS/IRD/UPS, France; MARIE-FRANCINEMOENS, Katholieke Universiteit Leuven, Belgium; PABLO NORIEGA, Edi fi ci IIIA-CSIC, Spain; ANJA OSKAMP, VU University Amsterdam, The Netherlands; SASCHA OSSOWSKI, Universidad Rey Juan Carlos, Spain; UGO PAGALLO, Università degli Studi di Torino, Italy; MONICA PALMIRANI, Università di Bologna, Italy; ABDUL PALIWALA, University of Warwick, UK; ENRIC PLAZA, Edi fi ci IIIA-CSIC, Spain; MARTA POBLET, Institute of Law and Technology, UAB, Spain; DANIEL POULIN, University of Montreal, Canada; HENRY PRAKKEN, Universiteit Utrecht, The Netherlands; HAI-BIN QI, Huazhong University of Science and Technology, P.R. China; DORY REILING, Amsterdam District Court, The Netherlands; PIER CARLO ROSSI, Italy; EDWINA L. RISSLAND, University of Massachusetts, Amherst, USA; COLIN RULE, University of Massachusetts, USA; MARCO SCHORLEMMER, IIIA-CSIC, Spain; CARLES SIERRA, IIIA-CSIC, Spain; MIGEL ANGEL SICILIA, Universidad de Alcalá, Spain; RUDI STUDER, Karlsruhe Institute of Technology, Germany; DANIELA TISCORNIA, ITTIG, Italy; JOAN-JOSEP VALLBÉ, Institute of Law and Technology, UAB, Spain; TOM VAN ENGERS, Universiteit van Amsterdam, The Netherlands; FABIO VITALI, Università di Bologna, Italy; MARY-ANN WILLIAMS, The University of Technology, Sydney, Australia; RADBOUD WINKELS, University of Amsterdam, The Netherlands; ADAMWYNER, University of Liverpool, UK; HAJIME YOSHINO, Meiji Gakuin University, Japan; JOHN ZELEZNIKOW, University of Victoria, Australia For further volumes: http://www.springer.com/series/8808 Giovanni Ziccardi Resistance, Liberation Technology and Human Rights in the Digital Age Giovanni Ziccardi Department “Cesare Beccaria” Faculty of Law University of Milan Milano , Italy ISBN 978-94-007-5275-7 ISBN 978-94-007-5276-4 (eBook) DOI 10.1007/978-94-007-5276-4 Springer Dordrecht Heidelberg New York London Library of Congress Control Number: 2012949676 © Springer Netherlands 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, speci fi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on micro fi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied speci fi cally for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a speci fi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Contents 1 Opening Remarks: Hacking and Digital Dissidence.............................. 1 1.1 Using Computers for the Pursuit of Political and Social Changes and for the Bene fi t of All Mankind ..................................... 1 1.2 From Early Hackers to Digital Resistance Activities ........................ 5 1.3 The So-Called Twitter Revolutions .................................................... 7 1.4 The Worldwide Scenario, and Some Preliminary Interpretative Questions ..................................................................... 9 References ................................................................................................... 22 2 Digital Resistance, Digital Liberties and Digital Transparency ........... 27 2.1 A Preliminary De fi nition of Digital Resistance and Digital Liberties .......................................................................... 27 2.1.1 Some Focal Aspects of Digital Dissidence ............................ 27 2.1.2 Preliminary Legal and Political Remarks .............................. 28 2.1.3 The Power of Technology in Critical Contexts and the New Public Sphere .................................................... 30 2.2 The Fundamental Role of a Secure (and Peer-Reviewed) Liberation Technology: The Haystack Case-History ......................... 32 2.3 Two Key Aspects of Digital Resistance Activities, and Several Case Studies ................................................................... 36 2.3.1 The Key Aspects of Dissident Activities ............................... 36 2.3.2 Digital Resistance Case-Studies ............................................. 41 2.4 Open Government, Collaborative Transparency and Civic Hacking as a Form of Digital Resistance .......................... 47 2.4.1 The Idea of Government as a Platform for Transparency..................................................................... 47 2.4.2 The Metaphor of Government 2.0 and the Idea of Collaborative Transparency ............................................... 49 v vi Contents 2.4.3 Citizen Engagement for the Oversight of Political Activity ................................................................ 51 2.4.4 Collaborative Mapping and Digital Resistance ...................... 59 References ................................................................................................... 68 3 Hacking and Digital Dissidence Activities .............................................. 73 3.1 The Role of Hackers in the Landscape of Digital Resistance .......... 73 3.2 A First Analysis of Common Threats to Digital Freedom and to Hacker Activities ................................................... 74 3.3 Being a Hacker in This Framework ................................................. 76 3.3.1 Thinking Like a Hacker ....................................................... 76 3.3.2 State Antagonism, Fear and Violence .................................. 79 3.4 A Brand New Playground ................................................................ 81 3.4.1 Liberation Technologies ....................................................... 81 3.4.2 Anonymity and Bloggers’ Rights ........................................ 84 3.4.3 Innovation ............................................................................ 86 3.4.4 Intellectual Property and Privacy ......................................... 86 3.4.5 EPIC Activities in the Field of Privacy ................................ 88 3.4.6 Transparency ........................................................................ 89 3.5 A New Perspective on Hacking ....................................................... 90 3.5.1 The Essence of hacking ....................................................... 90 3.5.2 The Hacker Spirit
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
    What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions.
    [Show full text]
  • Nation-State Cyber Surveillance Options: the Role of Suppliers
    Nation-State Cyber Surveillance Options: The role of suppliers Eirik Bae Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2014 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Nation-State Cyber Surveillance Options: The role of suppliers Abstract When Edward Snowden in 2013 leaked documents about U.S. surveillance, the focus shifted to how nation-states perform surveillance of Internet and telecom communications, and it was then a need for educated information about the topic. In this master thesis we investigate how nation-states can perform their cyber surveillance, how suppliers of products or services can sup- port the nation-states’ cyber surveillance, and how we can protect ourselves against it. We found that the most prominent way consists of collecting data from central points of communication, e.g. Internet and telecom providers. In some cases, it is necessary for the nation-state to perform targeted surveillance by installing surveillance software onto their suspects’ devices. The infor- mation they collect from centralized and targeted surveillance can lead to big data issues that relate to collecting, storing, and processing the massive amounts of data. A supplier can decide to help nation-states in their cyber surveillance, and by exploiting the trust we lay in the supplier it would result in that we would face a completely different threat landscape, where we find it difficult to protect our privacy and security.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • The University of Chicago Looking at Cartoons
    THE UNIVERSITY OF CHICAGO LOOKING AT CARTOONS: THE ART, LABOR, AND TECHNOLOGY OF AMERICAN CEL ANIMATION A DISSERTATION SUBMITTED TO THE FACULTY OF THE DIVISION OF THE HUMANITIES IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF CINEMA AND MEDIA STUDIES BY HANNAH MAITLAND FRANK CHICAGO, ILLINOIS AUGUST 2016 FOR MY FAMILY IN MEMORY OF MY FATHER Apparently he had examined them patiently picture by picture and imagined that they would be screened in the same way, failing at that time to grasp the principle of the cinematograph. —Flann O’Brien CONTENTS LIST OF FIGURES...............................................................................................................................v ABSTRACT.......................................................................................................................................vii ACKNOWLEDGMENTS....................................................................................................................viii INTRODUCTION LOOKING AT LABOR......................................................................................1 CHAPTER 1 ANIMATION AND MONTAGE; or, Photographic Records of Documents...................................................22 CHAPTER 2 A VIEW OF THE WORLD Toward a Photographic Theory of Cel Animation ...................................72 CHAPTER 3 PARS PRO TOTO Character Animation and the Work of the Anonymous Artist................121 CHAPTER 4 THE MULTIPLICATION OF TRACES Xerographic Reproduction and One Hundred and One Dalmatians.......174
    [Show full text]
  • Jobs and Education
    Vol. 3 Issue 3 JuneJune1998 1998 J OBS AND E DUCATION ¥ Animation on the Internet ¥ Glenn VilppuÕs Life Drawing ¥ CanadaÕs Golden Age? ¥ Below the Radar WHO IS JARED? Plus: Jerry BeckÕs Essential Library, ASIFA and Festivals TABLE OF CONTENTS JUNE 1998 VOL.3 NO.3 4 Editor’s Notebook It’s the drawing stupid! 6 Letters: [email protected] 7 Dig This! 1001 Nights: An Animation Symphony EDUCATION & TRAINING 8 The Essential Animation Reference Library Animation historian Jerry Beck describes the ideal library of “essential” books on animation. 10 Whose Golden Age?: Canadian Animation In The 1990s Art vs. industry and the future of the independent filmmaker: Chris Robinson investigates this tricky bal- ance in the current Canadian animation climate. 15 Here’s A How de do Diary: March The first installment of Barry Purves’ production diary as he chronicles producing a series of animated shorts for Channel 4. An Animation World Magazine exclusive. 20 Survey: It Takes Three to Tango Through a series of pointed questions we take a look at the relationship between educators, industry representatives and students. School profiles are included. 1998 33 What’s In Your LunchBox? Kellie-Bea Rainey tests out Animation Toolworks’ Video LunchBox, an innovative frame-grabbing tool for animators, students, seven year-olds and potato farmers alike! INTERNETINTERNET ANIMATIONANIMATION 38 Who The Heck is Jared? Well, do you know? Wendy Jackson introduces us to this very funny little yellow fellow. 39 Below The Digital Radar Kit Laybourne muses about the evolution of independent animation and looks “below the radar” for the growth of new emerging domains of digital animation.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Wikileaks Advisory Council
    1 WikiLeaks Advisory Council 2 Hi everyone, My name is Tom Dalo and I am currently a senior at Fairfield. I am very excited to Be chairing the WikiLeaks Advisory Council committee this year. I would like to first introduce myself and tell you a little Bit about myself. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. First off, I have been involved with the Fairfield University Model United Nations Team since my freshman year when I was a co-chair on the Disarmament and International Security committee. My sophomore year, I had the privilege of Being Co- Secretary General for FUMUN and although it was a very time consuming event, it was truly one of the most rewarding experiences I have had at Fairfield. Last year I was the Co-Chair for the Fukushima National Disaster Committee along with Alli Scheetz, who filled in as chair for the committee as I was unaBle to attend the conference. Aside from my chairing this committee, I am currently FUMUN’s Vice- President. In addition to my involvement in the Model UN, I am a Tour Ambassador Manager, and a Beta Alpha Psi member. I love the outdoors and enjoy skiing, running, and golfing. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. Some of you may wonder how I got involved with the Model United Nations considering that I am a business student majoring in Accounting and Finance. Model UN offers any student, regardless of their major, a chance to improve their puBlic speaking, enhance their critical thinking skills, communicate Better to others as well as gain exposure to current events.
    [Show full text]
  • A History of Rhythm, Metronomes, and the Mechanization of Musicality
    THE METRONOMIC PERFORMANCE PRACTICE: A HISTORY OF RHYTHM, METRONOMES, AND THE MECHANIZATION OF MUSICALITY by ALEXANDER EVAN BONUS A DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Department of Music CASE WESTERN RESERVE UNIVERSITY May, 2010 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of _____________________________________________________Alexander Evan Bonus candidate for the ______________________Doctor of Philosophy degree *. Dr. Mary Davis (signed)_______________________________________________ (chair of the committee) Dr. Daniel Goldmark ________________________________________________ Dr. Peter Bennett ________________________________________________ Dr. Martha Woodmansee ________________________________________________ ________________________________________________ ________________________________________________ (date) _______________________2/25/2010 *We also certify that written approval has been obtained for any proprietary material contained therein. Copyright © 2010 by Alexander Evan Bonus All rights reserved CONTENTS LIST OF FIGURES . ii LIST OF TABLES . v Preface . vi ABSTRACT . xviii Chapter I. THE HUMANITY OF MUSICAL TIME, THE INSUFFICIENCIES OF RHYTHMICAL NOTATION, AND THE FAILURE OF CLOCKWORK METRONOMES, CIRCA 1600-1900 . 1 II. MAELZEL’S MACHINES: A RECEPTION HISTORY OF MAELZEL, HIS MECHANICAL CULTURE, AND THE METRONOME . .112 III. THE SCIENTIFIC METRONOME . 180 IV. METRONOMIC RHYTHM, THE CHRONOGRAPHIC
    [Show full text]
  • Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
    Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................
    [Show full text]
  • Unintended Consequences: Twelve Years Under the DMCA
    Unintended Consequences: Twelve Years under the DMCA By Fred Von Lohmann, [email protected] February 2010 ELECTRONIC FRONTIER FOUNDATION eff.org Unintended Consequences: Twelve Years under the DMCA This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate compet- itors. It will be updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary Since they were enacted in 1998, the “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. 1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Profes- sor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, stu- dents, program¬mers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally elimi- nate the public’s fair use rights.
    [Show full text]