Threats to Internet Freedoms (consolidation thread)

Moderators: Elvis, DrVolin, Jeff

Re: Threats to Internet Freedoms (consolidation thread)

Postby wintler2 » Wed Mar 07, 2012 12:01 am

crikkett wrote:.. The kicker was Megabox would cater to unsigned artists and allow anyone to sell their creations while allowing the artist to retain 90% of the earnings. Or, artists could even giveaway their songs and would be paid through a service called Megakey. “Yes that’s right, we will pay artists even for free downloads. The Megakey business model has been tested with over a million users and it works,” Kim Dotcom told TorrentFreak in December. Megabox was planning on bypassing the labels, RIAA, and the entire music establishment.

Megaupload was likely large enough to actually find success. Other services have tried what Megabox was set to do, but Megaupload was massive. Prior to its closure last week, the site was estimated to be the 13th most visited site on the Internet, accounting for 4% of all worldwide Internet traffic. It boasted 180 million registered users with over 50 million visiting the site daily. Megaupload was already a seemingly trusted service for artists to distribute their work. Megabox would have a monetized that popularity by passing on the bulk of the earnings back to the artists. ..


Thats plenty of motive you got there crikkett! its a damn shame if the megauploads arrests slow the arrival of megabox, but it or something like it is coming. In short term, this article suggests peer2peer is the big winner ..
Culture
The Return of Peer-To-Peer
The dramatic shuttering of Megaupload exposed the weaknesses in a streaming system that stored information in one place. After the panic, users have begun to return to an old favourite, peer-to-peer sharing, and its robust, decentralized structure.

Back in 2009, Arbor Networks, a company specializing in network management, announced that the peer-to-peer model of file sharing, wherein each client acts as a server, was in decline. Users were turning more and more towards streaming.

On January 19 of this year the FBI ordered the shuttering of Megaupload, the Internet’s largest direct downloads platform. The Internet, in turn, panicked. Cogent and Carpathia Hosting, hosting companies which handled some of the site’s traffic, lost 30% of their business. Fearing the great purge, sites like VideoBB and Fileserve raced to empty their servers. Rapidshare and MediaFire in turn decided to police themselves, taking action against their own customers. ...

According to Ipoque’s online observatory, which measures such things, the level of P2P traffic around the world spiked suddenly in Europe after January 20. The resurrection of peer-to-peer.

In the week following the closure of Megaupload, graphics posted by Ipoque showed peaks reaching 15% of total European bandwidth traffic. Those curves have now stabilized somewhat. Bittorrent and eDonkey are the two most widely used exchange protocols. According to the site Peerates.net, which publishes statistics on the use of eMule servers, the number of searches on eDonkey increased from 110,000 in early January to 200,000 after the shuttering of Megaupload. ...
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby fruhmenschen » Wed Mar 07, 2012 2:19 am

Doxed: how Sabu was outed by former Anons long before his arrest
By Peter Bright |see link for full story
http://arstechnica.com/tech-policy/news ... mpaign=rss
Doxed: how Sabu was outed by former Anons long before his arrest

When the FBI arrested LulzSec leader Hector "Sabu" Monsegur, they did so in a hurry—hours before the arrest, Sabu was doxed, his identity posted to the Internet. With his name public, federal agents feared that he would start destroying evidence to protect himself, so they ended their covert surveillance and moved in, according to Fox News.

Efforts to name and shame the LulzSec crew during its 50-day rampage were common. Many of these doxings were inaccurate, a result of faulty inferences or deliberate attempts to mislead on the part of the LulzSec hackers.

But not all were wrong. In fact, the game of doxing Sabu was over before it had even started. He was correctly doxed more than two months before his arrest—in fact, more than a month before LulzSec had even started publicly operating.

This first doxing happened after a group of former Anonymous members, displeased at the moralizing direction that Anonymous had taken and at Sabu's leadership role, decided to take action. Speaking to Gawker almost one year ago, the dissident group calling itself Backtrace Security announced that it was going to post chat transcripts and information about the identies of Anonymous members.

Several days later, it followed through on its promise, releasing IRC logs called "consequences.pdf" (MD5 checksum: a4084efa1713447d295919b4670769da) and a file called"namshub.pdf" (MD5 checksum: 042a645a1bf4cdfb433887424455234e) that showed a spreadsheet of online names, real names, locations, and other evidence about Anonymous members. (The files have now been pulled, allegedly at the "request of the Federal Bureau of Investigation.")

While at least some of the information in namshub.pdf is incorrect—subsequent arrests have established the real identities of Topiary and Kayla, and they don't match Backtrace's claims—one name stands out. Sabu is identified as "Hector Xavier Montsegur." This is slightly misspelled, but it's the right name nonetheless. The document also claimed, correctly, that Sabu lives on New York City's Lower East Side.

The PDFs garnered some attention at the time—they even resulted in Backtrace Security being doxed—but apparently not enough attention to force the FBI's hand.

Backtrace then decided to out Sabu again. Early in the evening of June 7, the day of Sabu's arrest, the Twitter account belonging to Backtrace Security wrote: "Hector Xavier Montsegur -aka Xavier de Leon - aka (Sabu)." The same misspelling, but the same correct name.
fruhmenschen
 
Posts: 5977
Joined: Thu Aug 12, 2010 7:46 pm
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Stephen Morgan » Tue Mar 13, 2012 2:45 pm

http://legaltimes.typepad.com/blt/2012/ ... e-nsa.html

The Justice Department is defending the government's refusal to discuss—or even acknowledge the existence of—any cooperative research and development agreement between Google and the National Security Agency.

The Washington based advocacy group Electronic Privacy Information Center sued in federal district court here to obtain documents about any such agreement between the Internet search giant and the security agency.

The NSA responded to the suit with a so-called “Glomar” response in which the agency said it could neither confirm nor deny whether any responsive records exist. U.S. District Judge Richard Leon in Washington sided with the government last July.

A three-judge panel of the U.S. Court of Appeals for the D.C. Circuit is scheduled to hear the dispute March 20.

EPIC filed a Freedom of Information Act request in early 2010, noting media reports at the time that the NSA and Google had agreed to a partnership following the cyber attacks in China that year against Google.

EPIC asked for, among other things, communication between the NSA and Google about Gmail and Google’s “decision to fail to routinely encrypt” messages before Jan. 13, 2010.
Those who dream by night in the dusty recesses of their minds wake in the day to find that all was vanity; but the dreamers of the day are dangerous men, for they may act their dream with open eyes, and make it possible. -- Lawrence of Arabia
User avatar
Stephen Morgan
 
Posts: 3736
Joined: Thu Apr 19, 2007 6:37 am
Location: England
Blog: View Blog (9)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Thu Mar 15, 2012 11:10 am

.

Noting the fine new thread that has appeared, thanks to elfismiles.
http://rigorousintuition.ca/board2/view ... =8&t=34236

elfismiles wrote:ImageThe Googlization of Everything
How one company is disrupting commerce, culture, and community
http://www.googlizationofeverything.com

Perhaps this should go here:

Threats to Internet Freedoms (consolidation thread)
viewtopic.php?f=8&t=32101

Does Google Know Too Much?
viewtopic.php?f=8&t=21197

Fascinating White Paper from Google/CIA Project
viewtopic.php?f=8&t=32964

Google Octopus: Street View logs WiFi networks/Mac addresses
viewtopic.php?f=8&t=27987

Facebook And Google Filtering Secrets
viewtopic.php?f=8&t=33241

http://www.youtube.com/watch?v=WLXa1kEMooU


ORAL ARGUMENT SCHEDULED FOR MARCH 20, 2012
IN THE UNITED STATES COURT OF APPEALS
DISTRICT OF COLUMBIA CIRCUIT
__________________________________________
THE ELECTRONIC PRIVACY INFORMATION CENTER
Appellant,
v.
UNITED STATES NATIONAL SECURITY AGENCY
Appellee.
__________________________________________
OPENING BRIEF FOR APPELLANT ELECTRONIC PRIVACY
INFORMATION CENTER

http://epic.org/privacy/nsa/foia/EPIC-v ... -FINAL.pdf



Department Of Justice Wants Court To Keep Google/NSA Partnership Secret
Court hearing scheduled for next week in ongoing effort by privacy group to expose details of working relationship

Steve Watson
Infowars.com
March 13, 2012


The Department of Justice will ask a federal court to uphold the secrecy that surrounds the working relationship between Google and the National Security Agency in a hearing that is scheduled for next week.

Privacy watchdog group The Electronic Privacy Information Center (EPIC) is returning to court once again in an effort to disclose more information regarding the widely publicized partnership between the spy agency and the search engine giant.

EPIC is suing to obtain documents that detail the relationship, and will appeal against the NSA’s so-called “Glomar” response, claiming it “could neither confirm nor deny” the existence of any information about its relations with Google, because “such a response would reveal information about NSA’s functions and activities.”

The NSA’s response stated that the agency “works with a broad range of commercial partners and research associations” in order to oversee the security of important information systems, but did not provide any further detail.

The issue rose to prominencein January 2010 following a highly sophisticated and targeted cyber attack on the corporate infrastructure of Google and some twenty other large US companies.

The attack was blamed on the Chinese government, prompting Google to embrace a collaboration with the federal agency in charge of global electronic surveillance.

Anonymous sources informed The Washington Post at the time that “the alliance is being designed to allow the two organizations to share critical information”, adding that the agreement will not allow the NSA access to users’ search details or e-mails.

The DOJ is backing NSA’s Glomar response, as The Legal Times reports:

DOJ’s legal team said that acknowledging whether NSA and Google formed a partnership from a cyber attack would illuminate whether the government “considered the alleged attack to be of consequence for critical U.S. government information systems.”

DOJ said media reports about the alleged Google partnership with NSA do not constitute official acknowledgement.

“If NSA determines that certain security vulnerabilities or malicious attacks pose a threat to U.S. government information systems, NSA may take action,” DOJ Civil Division lawyers wrote in a brief.

In its own opening brief, EPIC argues that records the NSA holds on the subject are not exempt from public disclosure under FOIA request.

“Communications from Google to the NSA do not implicate the agency’s functions and activities, and are therefore not exempt from disclosure.” the brief states.

“Further, some records responsive to EPIC’s FOIA Request concern NSA activities that may fall outside the scope of the agency’s authority. These records are not exempt from disclosure.” it continues.

EPIC believes that any burgeoning partnership between Google and the government spy force responsible for warrantless monitoring of Americans’ phone calls and e-mails in the wake of 9/11 raises significant privacy concerns.

“Google provides cloud-based services to consumers, not critical infrastructure services to the government,” EPIC attorney Marc Rotenberg said, noting that the group’s records request does not seek documents about NSA’s role to secure government computer networks.

A three-judge panel of the U.S. Court of Appeals for the D.C. Circuit will preside over the hearing, scheduled for March 20.

Google’s partnership with the intelligence network is not new. As we reported in late 2006, An ex-CIA agent Robert David Steele has claimed sources told him that CIA seed money helped get the company off the ground

Speaking to the Alex Jones Show, Steele elaborated on previous revelations by making it known that the CIA helped bankroll Google at its very inception. Steele named Google’s CIA point man as Dr. Rick Steinheiser, of the Office of Research and Development.

“I think Google took money from the CIA when it was poor and it was starting up and unfortunately our system right now floods money into spying and other illegal and largely unethical activities, and it doesn’t fund what I call the open source world,” said Steele, citing “trusted individuals” as his sources for the claim.

“They’ve been together for quite a while,” added Steele.

The NSA’s involvement with Google should be treated as highly suspect, given the agency’s track record and its blatant disregard for the Fourth Amendment.

A set of documents obtained by the Electronic Frontier Foundation (EFF) in June 2007 revealed that US telco AT&T allowed the NSA to set up a ‘secret room’ in its offices to monitor internet traffic.

The discovering prompted a lawyer for an AT&T engineer to allege that “within two weeks of taking office, the Bush administration was planning a comprehensive effort of spying on Americans” That is BEFORE 9/11, before the nation was embroiled in the freedom stripping exercise commonly known as the “war on terror” had even begun.

In late 2007, reports circulated that the NSA had increasing control over SSL, now called Transport Layer Security, the cryptographic protocol that provides secure communications on the internet for web browsing, e-mail, instant messaging, and other data transfers.

In 2008, Google denied that it had any role in the NSA’s “terrorist” surveillance program, after first refusing to say if they have provided users private data to the federal government under the warrantless wiretapping initiative.

However, it is clear where Google’s interests lie given that the company is supplying the software, hardware and tech support to US intelligence agencies in the process of creating a vast closed source database for global spy networks to share information.

The government supply arm of Google has also reportedly entered into a number of other contracts, details of which it says it cannot share.

Google’s approach to privacy also came under scrutiny more recently when it was discovered that the company was essentially vacuuming up WiFi network data as it gathered images for its Streetview program.

Google insisted that the practice was a mistake, even though information published in January 2010 revealed that the data collection program was a very deliberate effort to assemble as much information as possible about U.S. residential and business WiFi networks.

http://www.infowars.com/department-of-j ... ip-secret/

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Stephen Morgan » Thu Mar 22, 2012 3:49 am

http://it.slashdot.org/story/12/03/21/1 ... y-exploits

"Forbes profiles Vupen, a French security firm that openly sells secret software exploits to spies and government agencies. Its customers pay a $100,000 annual fee simply for the privilege of paying extra fees for the exploits that Vupen's hackers develop, which the company says can penetrate every major browser, as well as other targets like iOS, Android, Adobe Reader and Microsoft Word. Those individual fees often cost much more than that six-figure subscription, and Vupen sells them non-exclusively to play its customers off each other in an espionage arms race. The company's CEO, Chaouki Bekrar, says Vupen only sells to NATO governments and 'NATO partners' but he admits 'if you sell weapons to someone, there's no way to ensure that they won't sell to another agency.'"
Those who dream by night in the dusty recesses of their minds wake in the day to find that all was vanity; but the dreamers of the day are dangerous men, for they may act their dream with open eyes, and make it possible. -- Lawrence of Arabia
User avatar
Stephen Morgan
 
Posts: 3736
Joined: Thu Apr 19, 2007 6:37 am
Location: England
Blog: View Blog (9)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Allegro » Sat Apr 21, 2012 8:07 pm

.
Since potential challenges within standards of international copyrights can be read in this thread, let’s reference kopimism in this one, too. Also see thread by foistlastus; and, view Plutonia’s reference.

Links, videos, references and images in original were not captured in here via the take and place procedure :).

_________________
Kopimism | Know Your Meme®
— This submission is currently being researched & evaluated!

    About

    Kopimism is an online movement espousing the benefits of free file-sharing that is officially recognized as a religious community by the Swedish Legal, Financial and Administrative Services Agency. Kopimists consider copying information as a fundamental right and encourage piracy of all types of media including music, movies, TV shows and software. Although it is recognized as a religion, the belief system lacks deities and other supernatural beliefs.

    History

    The domain for the website kopime.com[11] was created and registered by the Swedish organization Piratbyrån on January 25th, 2005. The site encourages the use of kopimi, a copyright alternative designed to encourage copying for any purpose, and includes instructions on how to display the kopimi symbol on a website.

      kopimi (copyme), symbol showing that you want to be copied. use kopimi in your own fancy. kopimi may be put on homepages or blogs, in books, in software, as sound logos in music or whatever.

      1. copy one of these kopimi symbols, or make up your own
      2. put it on a homepage
      3. link the logotype to:
      Code: Select all
      http://www.kopimi.com/kopimi

    One of the earliest reports about Kopimism as a political movement was mentioned in an article from the “Solidarity with Ladonia! Stop the dirty war”[1] blog on July 25th, 2006. The post described “kopimist intellectuals” as a group fighting an ongoing war between copyright holders and the “Imperialist Coalition Forces of the Internets”, including Swedish torrent file-sharing site The Pirate Bay.

    A Wikipedia draft for “Kopimist”, created on January 28th, 2007, asserted that the term “Kopimist” had gained recognition from publicity surrounding The Pirate Bay’s attempt to buy Sealand, a man-made island that would serve as a micronation unrestricted by copyright laws.

    The first Urban Dictionary [4] definition was submitted on May 9th, 2007 and described “Kopimists” and “Kopimist intellectuals” as:

      […]a person who has the philosophical belief that all information should be freely distributed and unrestricted.

    The /r/Kopimism[5] subreddit was created on May 17th, 2011.

    Missionary Church of Kopimism

    The Missionary Church of Kopimism (in Swedish Missionerande Kopimistsamfundet) was founded by then 19-year-old Swedish philosophy student Isak Gerson in 2010. Advocating the free copying of information as a way of life and a sacred virtue, the church takes its philosophy from the New Testament Bible quote in 1 Corinthians 11:1 “Imitate me, just as I imitate Christ.” It was subsequently modified by Kopimists to “Copy me, my brothers, just as I copy Christ himself.”

    The religion uses a symbol containing the keyboard shortcuts for copying and pasting on a computer “Ctrl+C Ctrl+V” (Apple+C and Apple+V for mac users), and has also adopted the kopimi “K” symbol. According to Geekosystem[6], there were two unsuccessful attempts to have the Church of Kopimism recognized as a religious institution in Sweden. The third attempt resulted in being formally recognized as a religion by the Swedish government on January 5th, 2012.

    The story was reported on by a variety of news outlets including the BBC[8], the New Yorker[15] and BoingBoing.[16] In an interview with New Scientist[7], Gerson described the reasoning behind seeking official recognition:

      We have had this faith for several years and one day we thought, why not try and get it registered? It was quite difficult. The authorities were quite dogmatic with their formalities. It took us three tries and more than a year to get recognised.

    Reception

    According to the Appspot[20] Twitter sentiment analysis tool, tweets containing the work “kopimism” are 82% positive[.]

    Several YouTube response videos were uploaded after the church was officially recognized by the Swedish government. YouTuber pogobat claimed that the religious part of Kopimism seemed like a joke, citing a video titled “Al Tab – The Kopimist Preacher.”

    Several Twitter accounts related to Kopimism have been created including @KopimismNZ[17], @Kopimisme[18] and @KopimismTurkiye.[19] The Kopimism Facebook[12] page has 2,852 likes as of February 1st, 2012.

    Search Interest

    Search queries for “kopimism” rose dramatically following the January 2012 announcement that it had been officially recognized as a religion by the Swedish government.

    [MORE.]
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Sat May 26, 2012 12:31 am

Do we have a Pirate Party thread?

How about a Boosts to Internet Freedoms?


http://www.counterpunch.org/2012/05/15/ ... y-is/print

May 15, 2012

A New Player in German Politics
The Pirate Party Knows Where the Money Is


by DEAN BAKER

One of the oddities of recent election results in Germany and elsewhere in northern Europe is the rise of the Pirate Party. This party received 7.8 percent of the vote in North Rhine-Westphalia yesterday, making it the 4th state government in Germany in which it has enough support to get into the state parliament. It also won enough votes to get seats in the European Parliament. The Pirate Party is widely expected to cross the 5 percent threshold in the German national elections next year, allowing it to get into the national parliament.

Like many new and rapidly growing parties, the Pirate Party has only a partially formed agenda and undoubtedly means many different things to different supporters. However a general theme is clearly a support for freedom of the Internet. This means a rebellion against governmental efforts to track users and to limit the flow of material over the web.

Near the top of the list of the Pirate Party’s demons is copyright protection, and rightly so. Copyright protection is an antiquated relic of the late Middle Ages that has no place in the digital era. It is debatable whether such government-granted monopolies were ever the best way to finance the production of creative and artistic work, but now that the Internet will allow this material to be instantly transferred at zero cost anywhere in the world, copyrights are clearly a counter-productive restraint on technology.

As every graduate of an introductory economics class knows, the market works best when items sell at their marginal cost. That means we maximize efficiency when recorded music, movies, video games and software are available to users at zero cost. The fees that the government allows copyright holders to impose create economic distortions in the same way that tariffs on imported cars or clothes lead to economic distortions.

The major difference is that the distortions from copyright protection are much larger. While tariffs on cars or clothes would rarely exceed 20-30 percent, the additional cost imposed by copyright protection is the price of the product. Movies that would be free in a world without copyright protection can cost $20-$30. The same is true of video games, and the price of copyrighted software can run into the thousands of dollars.

In total, hundreds of billions of dollars a year flow from the rest of us to those with government-granted copyright monopolies, like Disney, Time-Warner, and Microsoft. This government-directed flow of money dwarfs the size of the items that gets Washington politicians hot, like the Bush tax cuts to the wealthy.

Of course we need to pay creative workers, but we should find more efficient mechanisms, where a higher percentage of the cost borne by the public ends up in the workers’ pockets. Some alternatives already exist. There is much creative work in the United States and around the world that is supported directly by governments or private non-profits. For this work, writers, musicians, and other creative workers are paid for their work at the time they do it. There is no need for copyright protection.

However, we would clearly need much more funding if the flow of money from copyright protection were to be lost. One possibility is an artistic freedom voucher. This is a refundable tax credit of around $100 that each person could use to support the creative worker(s) of their choice. It would be similar to the charitable tax deduction, except it would be a credit. The condition of getting the money is that a worker would not be allowed to get copyright protection for a period of time (e.g. five years).

A program like this should generate a vast amount of material that would be freely available to the whole world. The powers of the government would no longer be used to bottle up the Internet, and we would see the end of legislative disasters, like the Stop Online Piracy Act, which sought to make everyone into a copyright cop.

We would also need new mechanisms to support the development of software. Here also there is a vast amount of software developed each year that does not depend on copyright protection. Much of it is custom software for specific companies. Other software is explicitly developed to be freely available to the public.

Developing the best mechanisms for supporting creative work will take much thought and debate. But it is long past time that this process got started and that we move beyond a hopelessly antiquated copyright system.

The Pirate Party has made an enormously important contribution to this process. While it is unlikely that it will ever become a dominant party in Germany or elsewhere in Europe, it may help to reshape the political agenda in the same way that the German Green Party did more than three decades ago.


Dean Baker is the co-director of the Center for Economic and Policy Research (CEPR). He is the author of Plunder and Blunder: The Rise and Fall of the Bubble Economy and False Profits: Recoverying From the Bubble Economy.

This article originally appeared on Al Jazeera.

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Sun Jul 08, 2012 11:49 pm


http://www.nytimes.com/2012/07/09/us/ce ... nted=print

July 8, 2012

Wireless Firms Are Flooded by Requests to Aid Surveillance

By ERIC LICHTBLAU


WASHINGTON — In the first public accounting of its kind, cellphone carriers reported that they responded to a startling 1.3 million demands for subscriber information last year from law enforcement agencies seeking text messages, caller locations and other information in the course of investigations.

The cellphone carriers’ reports, which come in response to a Congressional inquiry, document an explosion in cellphone surveillance in the last five years, with the companies turning over records thousands of times a day in response to police emergencies, court orders, law enforcement subpoenas and other requests.

The reports also reveal a sometimes uneasy partnership with law enforcement agencies, with the carriers frequently rejecting demands that they considered legally questionable or unjustified. At least one carrier even referred some inappropriate requests to the F.B.I.

The information represents the first time data have been collected nationally on the frequency of cell surveillance by law enforcement. The volume of the requests reported by the carriers — which most likely involve several million subscribers — surprised even some officials who have closely followed the growth of cell surveillance.

“I never expected it to be this massive,” said Representative Edward J. Markey, a Massachusetts Democrat who requested the reports from nine carriers, including AT&T, Sprint, T-Mobile and Verizon, in response to an article in April in The New York Times on law enforcement’s expanded use of cell tracking. Mr. Markey, who is the co-chairman of the Bipartisan Congressional Privacy Caucus, made the carriers’ responses available to The Times.

While the cell companies did not break down the types of law enforcement agencies collecting the data, they made clear that the widened cell surveillance cut across all levels of government — from run-of-the-mill street crimes handled by local police departments to financial crimes and intelligence investigations at the state and federal levels.

AT&T alone now responds to an average of more than 700 requests a day, with about 230 of them regarded as emergencies that do not require the normal court orders and subpoena. That is roughly triple the number it fielded in 2007, the company said. Law enforcement requests of all kinds have been rising among the other carriers as well, with annual increases of between 12 percent and 16 percent in the last five years. Sprint, which did not break down its figures in as much detail as other carriers, led all companies last year in reporting what amounted to at least 1,500 data requests on average a day.

With the rapid expansion of cell surveillance have come rising concerns — including among carriers — about what legal safeguards are in place to balance law enforcement agencies’ needs for quick data against the privacy rights of consumers.

Legal conflicts between those competing needs have flared before, but usually on national security matters. In 2006, phone companies that cooperated in the Bush administration’s secret program of eavesdropping on suspicious international communications without court warrants were sued, and ultimately were given immunity by Congress with the backing of the courts. The next year, the F.B.I. was widely criticized for improperly using emergency letters to the phone companies to gather records on thousands of phone numbers in counterterrorism investigations that did not involve emergencies.

Under federal law, the carriers said they generally required a search warrant, a court order or a formal subpoena to release information about a subscriber. But in cases that law enforcement officials deem an emergency, a less formal request is often enough. Moreover, rapid technological changes in cellphones have blurred the lines on what is legally required to get data — particularly the use of GPS systems to identify the location of phones.

As cell surveillance becomes a seemingly routine part of police work, Mr. Markey said in an interview that he worried that “digital dragnets” threatened to compromise the privacy of many customers. “There’s a real danger we’ve already crossed the line,” he said.

With the rising prevalence of cellphones, officials at all levels of law enforcement say cell tracking represents a powerful tool to find suspects, follow leads, identify associates and cull information on a wide range of crimes.

“At every crime scene, there’s some type of mobile device,” said Peter Modafferi, chief of detectives for the Rockland County district attorney’s office in New York, who also works on investigative policies and operations with the International Association of Chiefs of Police. The need for the police to exploit that technology “has grown tremendously, and it’s absolutely vital,” he said in an interview.

The surging use of cell surveillance was also reflected in the bills the wireless carriers reported sending to law enforcement agencies to cover their costs in some of the tracking operations. AT&T, for one, said it collected $8.3 million last year compared with $2.8 million in 2007, and other carriers reported similar increases in billings.

Federal law allows the companies to be reimbursed for “reasonable” costs for providing a number of surveillance operations. Still, several companies maintained that they lost money on the operations, and Cricket, a small wireless carrier that received 42,500 law enforcement requests last year, or an average of 116 a day, complained that it “is frequently not paid on the invoices it submits.”

Because of incomplete record-keeping, the total number of law enforcement requests last year was almost certainly much higher than the 1.3 million the carriers reported to Mr. Markey. Also, the total number of people whose customer information was turned over could be several times higher than the number of requests because a single request often involves multiple callers. For instance, when a police agency asks for a cell tower “dump” for data on subscribers who were near a tower during a certain period of time, it may get back hundreds or even thousands of names.

As cell surveillance increased, warrants for wiretapping by federal and local officials — eavesdropping on conversations — declined 14 percent last year to 2,732, according to a recent report from the Administrative Office of the United States Courts.

The diverging numbers suggest that law enforcement officials are shifting away from wiretaps in favor of other forms of cell tracking that are generally less legally burdensome, less time consuming and less costly. (Most carriers reported charging agencies between $50 and $75 an hour for cellphone tower “dumps.”)

To handle the demands, most cell carriers reported employing large teams of in-house lawyers, data technicians, phone “cloning specialists” and others around the clock to take requests from law enforcement agencies, review the legality and provide the data.

With the demands so voluminous and systematic, some carriers have resorted to outsourcing the job. Cricket said it turned over its compliance duties to a third party in April. The outside provider, Neustar, said it handled law enforcement compliance for about 400 phone and Internet companies.

But a number of carriers reported that as they sought to balance legitimate law enforcement needs against their customers’ privacy rights, they denied some data demands because they were judged to be overreaching or unauthorized under federal surveillance laws.

Sometimes, the carriers said, they determined that a true emergency did not exist. At other times, police agencies neglected to get the required court orders for surveillance measures, left subpoenas unsigned or failed to submit formal requests.

C Spire Wireless, a small carrier, estimated that of about 12,500 law enforcement demands it received in the last five years, it rejected 15 percent of them in whole or in part. (Most carriers did not provide figures on rejections.)

At TracFone, another small carrier providing prepaid service, an executive told Mr. Markey that the company “shares your concerns regarding the unauthorized tracking of wireless phones by law enforcement with little or no judicial oversight, and I assure you that TracFone does not participate in or condone such unauthorized tracking.”

T-Mobile, meanwhile, said it had sent two law enforcement demands to the F.B.I. because it considered them “inappropriate.” The company declined to provide further details.

Requests from law enforcement officials to identify the location of a particular cellphone using GPS technology have caused particular confusion, carriers said. A Supreme Court ruling in January further muddled the issue when it found that the authorities should have obtained a search warrant before tracking a suspect’s movements by attaching a GPS unit to his car.

Law enforcement officials say the GPS technology built into many phones has proved particularly critical in responding to kidnappings, attempted suicides, shootings, cases of missing people and other emergencies. But Sprint and other carriers called on Congress to set clearer legal standards for turning over location data, particularly to resolve contradictions in the law.

While the carriers said they always required proper legal orders before turning over nonemergency information, their assurances were somewhat at odds with anecdotal evidence recently gathered by the American Civil Liberties Union from more than 200 law enforcement agencies nationwide.

The reports provided to the A.C.L.U. showed that many local and state police agencies claimed broad discretion to obtain cell records without court orders, and that some departments specifically warned officers about the past misuse of cellphone surveillance in nonemergency situations.

Chris Calabrese, a lawyer for the A.C.L.U., said he was concerned not only about officials gathering phone data on people with no real connection to crimes but also about the agencies then keeping those records indefinitely in internal databases.

“The standards really are all over the place,” Mr. Calabrese said. “Nobody is saying don’t use these tools. What we’re saying is do it with consistent standards and in a way that recognizes that these are tools that really can impact people’s privacy.”




And of course

Rand and Ron Paul Denounce Net Neutrality and the Public Domain
viewtopic.php?f=8&t=35071
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Mon Jul 16, 2012 1:57 am


http://www.nytimes.com/2012/07/15/us/fd ... nted=print

The New York Times

July 14, 2012

Vast F.D.A. Effort Tracked E-Mails of Its Scientists

By ERIC LICHTBLAU and SCOTT SHANE



WASHINGTON — A wide-ranging surveillance operation by the Food and Drug Administration against a group of its own scientists used an enemies list of sorts as it secretly captured thousands of e-mails that the disgruntled scientists sent privately to members of Congress, lawyers, labor officials, journalists and even President Obama, previously undisclosed records show.

What began as a narrow investigation into the possible leaking of confidential agency information by five scientists quickly grew in mid-2010 into a much broader campaign to counter outside critics of the agency’s medical review process, according to the cache of more than 80,000 pages of computer documents generated by the surveillance effort.

Moving to quell what one memorandum called the “collaboration” of the F.D.A.’s opponents, the surveillance operation identified 21 agency employees, Congressional officials, outside medical researchers and journalists thought to be working together to put out negative and “defamatory” information about the agency.

F.D.A. officials defended the surveillance operation, saying that the computer monitoring was limited to the five scientists suspected of leaking confidential information about the safety and design of medical devices.

While they acknowledged that the surveillance tracked the communications that the scientists had with Congressional officials, journalists and others, they said it was never intended to impede those communications, but only to determine whether information was being improperly shared.

The agency, using so-called spy software designed to help employers monitor workers, captured screen images from the government laptops of the five scientists as they were being used at work or at home. The software tracked their keystrokes, intercepted their personal e-mails, copied the documents on their personal thumb drives and even followed their messages line by line as they were being drafted, the documents show.

The extraordinary surveillance effort grew out of a bitter dispute lasting years between the scientists and their bosses at the F.D.A. over the scientists’ claims that faulty review procedures at the agency had led to the approval of medical imaging devices for mammograms and colonoscopies that exposed patients to dangerous levels of radiation.

A confidential government review in May by the Office of Special Counsel, which deals with the grievances of government workers, found that the scientists’ medical claims were valid enough to warrant a full investigation into what it termed “a substantial and specific danger to public safety.”

The documents captured in the surveillance effort — including confidential letters to at least a half-dozen Congressional offices and oversight committees, drafts of legal filings and grievances, and personal e-mails — were posted on a public Web site, apparently by mistake, by a private document-handling contractor that works for the F.D.A. The New York Times reviewed the records and their day-by-day, sometimes hour-by-hour accounting of the scientists’ communications.

With the documents from the surveillance cataloged in 66 huge directories, many Congressional staff members regarded as sympathetic to the scientists each got their own files containing all their e-mails to or from the whistle-blowers. Drafts and final copies of letters the scientists sent to Mr. Obama about their safety concerns were also included.

Last year, the scientists found that a few dozen of their e-mails had been intercepted by the agency. They filed a lawsuit over the issue in September, after four of the scientists had been let go, and The Washington Post first disclosed the monitoring in January. But the wide scope of the F.D.A. surveillance operation, its broad range of targets across Washington, and the huge volume of computer information that it generated were not previously known, even to some of the targets.

F.D.A. officials said that in monitoring the communication of the five scientists, their e-mails “were collected without regard to the identity of the individuals with whom the user may have been corresponding.” While the F.D.A. memo described the Congressional officials and other “actors” as collaborating in the scientists’ effort to attract negative publicity, the F.D.A. said that those outside the agency were never targets of the surveillance operation, but were suspected of receiving confidential information.

While federal agencies have broad discretion to monitor their employees’ computer use, the F.D.A. program may have crossed legal lines by grabbing and analyzing confidential information that is specifically protected under the law, including attorney-client communications, whistle-blower complaints to Congress and workplace grievances filed with the government.

Other administration officials were so concerned to learn of the F.D.A. operation that the White House Office of Management and Budget sent a governmentwide memo last month emphasizing that while the internal monitoring of employee communications was allowed, it could not be used under the law to intimidate whistle-blowers. Any monitoring must be done in ways that “do not interfere with or chill employees’ use of appropriate channels to disclose wrongdoing,” the memo said.

Although some senior F.D.A. officials appear to have been made aware of aspects of the surveillance, which went on for months, the documents do not make clear who at the agency authorized the program or whether it is still in operation.

But Stephen Kohn, a lawyer who represents six scientists who are suing the agency, said he planned to go to federal court this month seeking an injunction to stop any surveillance that may be continuing against the two medical researchers among the group who are still employed there.

The scientists who have been let go say in a lawsuit that their treatment was retaliation for reporting their claims of mismanagement and safety abuses in the F.D.A.’s medical reviews.

Members of Congress from both parties were irate to learn that correspondence between the scientists and their own staff had been gathered and analyzed.

Representative Chris Van Hollen, a Maryland Democrat who has examined the agency’s medical review procedures, was listed as No. 14 on the surveillance operation’s list of targets — an “ancillary actor” in the efforts to put out negative information on the agency. (An aide to Mr. Van Hollen was No. 13.)

Mr. Van Hollen said on Friday after learning of his status on the list that “it is absolutely unacceptable for the F.D.A. to be spying on employees who reach out to members of Congress to expose abuses or wrongdoing in government agencies.”

Senator Charles E. Grassley, an Iowa Republican whose former staff member’s e-mails were cataloged in the surveillance database, said that “the F.D.A. is discouraging whistle-blowers.” He added that agency officials “have absolutely no business reading the private e-mails of their employees. They think they can be the Gestapo and do anything they want.”

While national security agencies have become more aggressive in monitoring employee communications, such tactics are unusual at domestic agencies that do not handle classified information.

Much of the material the F.D.A. was eager to protect centered on trade secrets submitted by drug and medical device manufacturers seeking approval for products. Particular issues were raised by a March 2010 article in The New York Times that examined the safety concerns about imaging devices and quoted two agency scientists who would come under surveillance, Dr. Robert C. Smith and Dr. Julian Nicholas.

Agency officials saw Dr. Smith as the ringleader, or “point man” as one memo from the agency put it, for the complaining scientists, and the surveillance documents included hundreds of e-mails that he wrote on ways to make their concerns heard. (Dr. Smith and the other scientists would not comment for this article because of their pending litigation.)

Lawyers for GE Healthcare charged that the 2010 article in The Times — written by Gardiner Harris, who would be placed first on the surveillance program’s list of “media outlet actors” — included proprietary information about their imaging devices that may have been improperly leaked by F.D.A. employees.

F.D.A. officials went to the inspector general at the Department of Health and Human Services to seek a criminal investigation into the possible leak, but they were turned down. The inspector general found that there was no evidence of a crime, noting that “matters of public safety” can legally be released to the news media.

Undeterred, agency officials began the electronic monitoring operation on their own.

The software used to track the F.D.A. scientists, sold by SpectorSoft of Vero Beach, Fla., costs as little as $99.95 for individual use, or $2,875 to place the program on 25 computers. It is marketed mainly to employers to monitor their workers and to parents to keep tabs on their children’s computer activities.

“Monitor everything they do,” says SpectorSoft’s Web site. “Catch them red-handed by receiving instant alerts when keywords or phrases are typed or are contained in an e-mail, chat, instant message or Web site.”

The F.D.A. program did all of that and more, as its operators analyzed the results from their early e-mail interceptions and used them to search for new “actors,” develop new keywords to search and map out future areas of concern.

The intercepted e-mails revealed, for instance, that a few of the scientists under surveillance were drafting a complaint in 2010 that they planned to take to the Office of Special Counsel. A short time later, before the complaint was filed, Dr. Smith and another complaining scientist were let go and a third was suspended.

In another case, the intercepted e-mails indicated that Paul T. Hardy, another of the dissident employees, had reapplied for an F.D.A. job “and is being considered for a position.” (He did not get it.)

F.D.A. officials were eager to track future media stories too. When they learned from Mr. Hardy’s e-mails that he was considering talking to PBS’s “Frontline” for a documentary, they ordered a search for anything else on the same topic.

While the surveillance was intended to protect trade secrets for companies like G.E., it may have done just the opposite. The data posted publicly by the F.D.A. contractor — and taken down late Friday after inquiries by The Times — includes hundreds of confidential documents on the design of imaging devices and other detailed, proprietary information.

The posting of the documents was discovered inadvertently by one of the researchers whose e-mails were monitored. The researcher did Google searches for scientists involved in the case to check for negative publicity that might hinder chances of finding work. Within a few minutes, the researcher stumbled upon the database.

“I couldn’t believe what I was seeing,” said the researcher, who did not want to be identified because of pending job applications. “I thought: ‘Oh my God, everything is out there. It’s all about us.’ It was just outrageous.”

Andy Lehren contributed reporting.






http://latimes.com/news/nationworld/wor ... 7340.story
latimes.com

Russia's lower house OKs curbs on Internet, media and activists

The bills passed by Russia's State Duma are seen as the latest attempt to crack down on resistance to the rule of President Vladimir Putin.

By Khristina Narizhnaya, Los Angeles Times

July 14, 2012



MOSCOW — Russian lawmakers this week passed three measures to increase government control over the Internet, media and foreign-funded activist groups, despite widespread protests from Web professionals, journalists and human rights advocates.

A bill that criminalizes libel and imposes fines of up to $153,400 on violators, and a measure that requires nongovernmental organizations, or NGOs, that receive foreign funding to register as "foreign agents," were approved by the lower house of the parliament Friday, the last day of the legislative session.

On Wednesday, the lower house unanimously approved a bill that provides for a federal registry of websites that could face being shut down for carrying prohibited material.

The bills are the latest in what is seen as an attempt to crack down on resistance to the rule of President Vladimir Putin, dissent that became more pronounced with mass opposition rallies in December, when Putin was still prime minister.

The measures must still be approved by the upper house and signed by Putin, who in May began his third presidential term, but both moves are expected by the end of the month.

Lyudmila Alekseyeva, a Soviet-era dissident who heads the Moscow Helsinki Group, an influential rights group that receives grants from abroad, called the NGO bill "despicable" and said her group would stop accepting foreign funding.

"I am not a foreign agent. I protect our Russian citizens, their rights, from the Russian government and officials," Alekseyeva said. "They want to stop the activities of independent human rights organizations."

Critics of the bill had argued that its goal was to pressure already small and hard-pressed activist groups to reject contributions from overseas or lose credibility by acknowledging working with a foreign government. Russian officials had accused Western governments of trying to influence parliamentary elections in December by aiding election monitoring groups.

Journalists with leading Russian news organizations picketed outside the State Duma building Friday to protest the libel bill, holding signs that read "No to censorship" and "I'm against the libel law." Libel is often used as a way to shut down news organizations that express views at odds with the government, especially inRussia'soutlying regions.

Under the third bill, law enforcement authorities could shut down websites that exhibit child pornography or promote drug use and other harmful activities. Critics see potential for abuse.

Russian search engine Yandex, popular blog-hosting site LiveJournal and social networking service VKontakte condemned the bill. Wikipedia shut down its Russian site Tuesday and posted the warning, "Imagine a world without free knowledge."

"The bill invokes fear of censorship," said Anton Nossik, founder of Russian LiveJournal, whose media company owns Gazeta.ru, one of the leading online news sources in Russia.

The Internet has become an important platform for the opposition movement because the government controls most television and print media.

The bills follow other government moves to encumber its critics. A recently adopted law sharply increased fines for organizers of unsanctioned rallies and participants. A bill initiated by the ruling United Russia party this week and under consideration in the lower house would crack down on independent volunteers. It would require contracts and official approval for any donated resources or labor to any cause or event.

"They are afraid of any form of citizen action," said Ilya Ponomarev, an opposition deputy and member of the Just Russia party.

Devastating floods last weekend in southern Russia brought an unprecedented number of volunteers to the region, which only highlighted the failures of the government amid popular mistrust.

"The government is trying to scare civic society with all the power it has," said Sergei Buntman, deputy chief editor of Echo of Moscow radio station, which is often critical of the government.

"But look how many young people went to Krymsk to help," he said. "People are not sleeping. They are not looking for signals from the government. They are standing up for their rights."


Narizhnaya is a special correspondent.


Copyright © 2012, Los Angeles Times

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby wintler2 » Tue Oct 23, 2012 4:18 pm

http://news.techeye.net/security/pirate-bay-founder-locked-in-solitary

Pirate Bay founder locked in solitary
23 hours a day in Swedish prison

Pirate Bay founder Gottfrid Svartholm is being kept in solitary confinement, locked up for 23 hours a day, and only allowed to speak to his guards.

Svartholm was arrested by Cambodian police in Phnom Penh and deported to Sweden after the government signed an aid package with Cambodia.

It was initially presumed he was going back to Sweden to face a year's jail sentence for copyright infringement offences, but he does appear to be getting some rather unusual treatment.

According to his mum, Kristina, the Pirate Bay jail term is being used to hold him for a much more serious crime of hacking the Swedish taxman, TorrentFreak reports.

It is called the 'Logica case' for which two other persons were arrested earlier this year. However those two are not in custody and the case might not even come to a trial, according to Kristina.

She said that no one has been charged, there is no prosecution and the reason that Gottfrid is being kept in custody is that he 'might destroy evidence and disturb the investigation'.

The prosecutors also claim that Gottfrid would "continue with criminal activities" if they let him out. The court felt that reason was fairly dumb, so the prosecutors are using the Pirate Bay charge to hold him anyway. ...
http://news.techeye.net/security/pirate ... n-solitary

also
http://www.guardian.co.uk/commentisfree ... pirate-bay
https://torrentfreak.com/pirate-bay-fou ... ay-121020/
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Sat Nov 10, 2012 11:06 pm

Image
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Allegro » Thu Nov 15, 2012 1:48 pm

Highlights mine. Several links in original.

_________________
Behind the music | This column might be ending, but the fight continues
    After more than four years, Behind the Music is ending – but there will be no let up in the effort to get a fair deal for artists
The Guardian | Helienne Lindvall: Behind the Music
06AUG12

    After four and a half years and more than 200 columns Behind the Music is coming to an end. It’s been an interesting journey and many of the issues I grappled with still remain unsolved.

    The first ever Behind the Music asked why songwriters couldn’t get their act together and strike for better terms for online usage of music. Four and a half years later, they’re no closer to doing so—despite streaming rates being so low that one songwriter told me she recently got a royalty check for £26 for 2m plays on Pandora and £2.75 for 330,000 plays on YouTube.

    Yet there have been leaps forward for musicians and their fans. For one, there are now more ways than ever for them to connect. Direct-to-fan services such as PledgeMusic, which we featured back in 2009, and Kickstarter are giving fans the chance to support established and emerging artists.

    It’s now easier and more convenient to access music legally, at your fingertips, than ever before. In 2008 there were no unlimited free streaming services where one could arrange tracks into playlists and share with friends. MySpace was still the go-to place to discover new music. Facebook had a 10th of the users it has today, and Amazon had just started selling MP3 downloads, and was far from making a dent on iTunes’ hold on the market.

    I’ve reported on music services in their infancy. Some have expanded and become successful (notably Spotify)—others not so much (mFlow and Midge Ure’s Tunited). Back in 2009 I argued the case for launching an unlimited ISP-based downloading and streaming service. We’re still no closer to that dream coming true. To quote The Newsroom: progress is slow but I’m in it for the long haul.

    The idea of Behind the Music was to give readers insight into the industry—the issues music-makers grapple with, from writer’s block and the secret to writing a hit song (hint: there is no recipe) to getting out of record contracts—and survive being dropped.

    Yes, piracy has featured on a regular basis—it’s impossible to ignore something that’s played a part in halving revenue from record sales (and in turn the income of songwriters and artists) within a decade. I’ve covered the Pirate Bay for years, while trials have come and gone, and those behind the site have been convicted. Yet it’s still up and running, along with hundreds of other online businesses making millions from unlicensed copyrighted material. The Digital Economy Act was passed more than two years ago, yet it’s still far from being implemented, as letters to suspected copyright infringers aren’t expected to be sent out until 2014.

    I’ve always been a proponent of targeting the businesses peddling in illegal copyrighted material rather than music fans, and recently there have been positive signs of payment services, such as PayPal voluntarily refusing to work with such businesses.

    Many of you who disagreed with me were also the most faithful in commenting—an illustration of the Howard Stern effect (those who like him listen for an hour a day while those who don’t listen for two)—and I will miss the heated debates on the threads.

    So what does the future hold for those working in music? It looks like we’ll end up with just three major labels—one of them being more like a super major, if the Universal/EMI merger is approved in the US and Europe. No doubt Universal will then be able to dictate the kind of music services we’ll see to an ever greater degree, as well as which artists get the biggest marketing push and how much musicians will be able to earn from such services.

    Talent will always prevail and once in a while we’ll see exceptional artists break through—Frank Ocean being one of them—because music that reaches into your heart and makes you see the world in a different light cannot be contained.

    The end of Behind the Music does not spell the end of my writing for the Guardian, and you can follow me on Twitter to find out where I land next.
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Tue Nov 27, 2012 12:29 pm


Zuck: Yeah so if you ever need info about anyone at Harvard

Zuck: Just ask.

Zuck: I have over 4,000 emails, pictures, addresses, SNS

[Redacted Friend's Name]: What? How'd you manage that one?

Zuck: People just submitted it.

Zuck: I don't know why.

Zuck: They "trust me"

Zuck: Dumb fucks.

Read more: http://www.businessinsider.com/well-the ... z2DRR2kR6Y





http://www.forbes.com/sites/kashmirhill ... uspicious/

Beware, Tech Abandoners. People Without Facebook Accounts Are 'Suspicious'

Image




http://www.democraticunderground.com/?c ... id=1887985

Meet Ex Facebooker Max Schrems

What does the data that Facebook collects after about 1 year of "membership" look like?

Image

Austrian student takes on Facebook over privacy

In this photo taken Monday, Oct. 10, 2011, Austrian student Max Schrems holds files about his activities on his Facebook account that Facebook handed over to him, in Vienna, Austria. Schrems wasn't quite sure what information about himself Facebook would send him after he filed a request with the social networking giant to receive his personal data, as is required under European law.

It certainly wasn't the stack of 1,222 pages worth on a CD that inspired him to launch an online campaign aimed at forcing the social media behemoth to abide by European data privacy laws _ something the Palo Alto, California-based company insists it already does. Since August, some 350,000 people have visited the site, dubbed "Europe vs. Facebook," and flooded Facebook's European branch, based in Ireland, with requests for their personal data. (AP Photo/Ronald Zak)

One of Schrems' main complaints with Facebook, he says, is that company retains information far longer than allowed under European law, which it most cases is limited to a few months.

"I wondered, what are they doing with my data?" Schrems said, sitting with his laptop in a Viennese coffee house. "I thought through everything that one can do with that amount of information, all the marketing that is possible."

Under European law, consumers have the right to request a record of the personal information held by a company. The law further stipulates that to retain data beyond the limit of several months, a company must have a reason to do so...(more)

http://phys.org/news/2011-10-austrian-s ... ivacy.html

see the exact data collected
http://www.europe-v-facebook.org/EN/Dat ... _pool.html

Front page
http://www.europe-v-facebook.org/EN/en.html




http://www.europe-v-facebook.org/EN/Dat ... ticalViews

Facebook’s Data Pool

Introduction. Every person in the EU has the right to access all the data that a company is holding about him/her. You can find out how to access your facebook data on the page “your data...”. After we got the first response by facebook it was clear to us that we had to publish this information online. By doing so, we want to make facebook more transparent and show every user which data facebook is holding about us.

There is more Data. Many groups of data are not included in this first set of data we got from facebook. For example data concerning the “like”-function, tracking on other webpages, face recognition, videos, postings on other users walls, indicators for the intensity of relationships, tags that werde removes and many more were (so far) not disclosed by facebook.

Index. These groups of data were disclosed by facebook (click for more details):

00. Target
00. Date Range
-----------------
01. About Me
02. Account End Date
03. Account Status History
04. Address
05. Alternate Name
06. Applications
07. Chat
08. Checkins
09. Connections
10. Credit Cards
11. Currency
12. Current City


13. Date of Birth
14. Education
15. E-Mails
16. Events
17. Family
18. Favourite Quotes
19. Friend Requests
20. Friends
21. Gender
22. Groups
23. Hometown
24. Last Location
25. Linked Accounts
26. Locale
27. Logins


28. Machines
29. Messages
30. Minifeed
31. Name
32. Name Changes
33. Networks
34. Notes
35. Notification Settings
36. Notifications
37. Password
38. Phone Numbers
39. Photos
40. Physical Tokens
41. Pokes
42. Political Views


43. Privacy Settings
44. Profile Blurb
45. Realtime Activities
46. Recent Activities
47. Registration Date
48. Relationship
49. Religious Views
50. Removed Friends
51. Screen Names
52. Shares
53. Status Updates
54. Vanity
55. Wallposts
56. Website
57. Work



Note: Facebook is storing even more data categories. This is the (current) list of all data: PDF (485 KB)

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Duke Law Center for the Study of the Public Domain

Postby Allegro » Tue Jan 29, 2013 4:08 am

Numerous articles, reports, video lectures and webcasts can be perused in the Center for the Study of the Public Domain at Duke University. Refer Larry Lessig: Threats to Internet Freedoms.

Highlights mine in this report.

_________________
Public Domain Day: January 1, 2013 —
The Best Things in Life are NOT Free

Duke Law Center for the Study of the Public Domain

    Public Domain Day is January 1st of every year. If you live in Europe, January 1st 2013 would be the day when the works of painter Grant Wood, anthropologist Franz Boas, writer Robert Musil, and hundreds of others emerge into the public domain1 – where they are freely available for anyone to use, republish, translate or transform. In the EU, citizens can now freely copy, share, or incorporate thousands of works into digital archives. They can make versions of “European Gothic,” incorporating Wood’s art. They can do all of this and more, without asking permission or violating the law.

    On the first day of each year, Public Domain Day celebrates the moment when copyrights expire. The films, photos, books and symphonies whose copyright term has finished become, to quote Justice Louis Brandeis, “free as the air to common use.” The end of the copyright term on these works means that they enter the public domain, completing the copyright bargain. Copyright gives creators – authors, musicians, filmmakers, photographers – exclusive rights over their works for a limited time. This encourages creators to create and publishers to distribute – that’s a very good thing. But when the copyright ends, the work enters the public domain – to join the plays of Shakespeare, the music of Mozart, the books of Dickens – the material of our collective culture. That’s a good thing too! It’s the second part of the copyright bargain; the limited period of exclusive rights ends and the work enters the realm of free culture. Prices fall, new editions come out, songs can be sung, symphonies performed, movies displayed. Even better, people can legally build on what came before.

    [sidebar] “We are the first generation to deny our own culture to ourselves. Almost no work created during your lifetime will, without conscious action by its creator, become available for you to reproduce or build upon.”

    What is entering the public domain in the United States? Nothing. Once again, we will have nothing to celebrate this January 1st. Not a single published work is entering the public domain this year. Or next year. In fact, in the United States, no publication will enter the public domain until 2019. Even more shockingly, the Supreme Court ruled in 2012 that Congress can take back works from the public domain. Could Shakespeare, Plato, or Mozart be pulled back into copyright? The Supreme Court gave no reason to think that they could not be. And wherever in the world you live, you will likely have to wait a very long time for anything to reach the public domain.

    When the first copyright law was written in the United States, copyright lasted 14 years, renewable for another 14 years if the author wished. Jefferson or Madison could look at the books written by their contemporaries and confidently expect them to be in the public domain within a decade or two. Now? In the United States, as in most of the world, copyright lasts for the author’s lifetime, plus another 70 years. And we’ve changed the law so that every creative work is automatically copyrighted, even if the author does nothing. What do these laws mean to you? As you can read in our analysis here, they impose great (and in many cases entirely unnecessary) costs on creativity, on libraries and archives, on education and on scholarship. More broadly, they impose costs on our entire collective culture.

    We have little reason to celebrate on Public Domain Day because our public domain has been shrinking, not growing.

    What Could Have Been

    It didn’t have to be this way. As you can read in our analysis of the subject, if we had the laws that were in effect until 1978, thousands of works from 1956 would be entering the public domain. They range from the films The Best Things in Life are Free, Around the World in 80 Days, Forbidden Planet, and The Man Who Knew Too Much, to the Phillip K. Dick’s The Minority Report and Eugene O’Neill’s Long Day’s Journey into Night, to seminal articles on artificial intelligence. Have a look at some of the others. In fact, since copyright used to come in renewable terms of 28 years, and 85% of authors did not renew, 85% of the works from 1984 might be entering the public domain! Imagine what the great libraries of the world – or just internet hobbyists – could do: digitizing those holdings, making them available for education and research, for pleasure and for creative reuse. If we did not go back that far, but merely went back to the copyright law as it was before 1998, we would be getting works 50 years after the death of the author.

    For the works that are still commercially available, the shrinking public domain increases costs to citizens and limits creative reuse. But at least those works are available. Unfortunately, much of our cultural heritage, perhaps the majority of the culture of the last 80 years, consists of orphan works. They are not sold anywhere and they have no identifiable copyright holder. Though no one is benefiting from the copyright, they are unavailable: it is presumptively illegal to copy, redistribute, or publicly perform them.

    …And What Can Be Done About It

    Does all this mean that copyright is a bad system? Of course not. Copyright serves an important purpose in facilitating the creation and distribution of creative works. The basic principles of our copyright system are sound. But studies like the recent Hargreaves Review commissioned by the UK government, empirical comparisons of the availability of copyrighted works and public domain works and recent economic studies of the effects of copyright (another article is here) all suggest that lengthy copyright extensions impose costs that far outweigh their benefits. In fact, economists who have modeled the ideal copyright term have uniformly suggested that it should be far shorter than it is right now. Some have suggested that it should be as short as 14 years. And every economic study has concluded that if there are to be copyright term extensions, they should not be retroactive.

    What can be done about all this? One obvious first step is law reform that would give greater access to orphan works. The US Copyright Office has renewed its efforts to find solutions to the orphan works problem – comments on “the current state of play for orphan works” are due on February 4, 2013. Authors and creators can also choose to license their work under more generous terms than standard copyright through Creative Commons licenses (for works like books, movies, music and art) or free and open source licenses for software. These open licenses create a privately constructed commons in which all can share freely. Fundamentally, though, the key is public education about the delicate balance between intellectual property and the public domain. That is the goal of our Center.

    You can learn even more about the public domain by reading our Frequently Asked Questions page, from David Lange’s seminal 1981 article “Recognizing the Public Domain” or from James Boyle’s book The Public Domain: Enclosing the Commons of the Mind (Yale University Press, 2008). Naturally, you can read the full text of The Public Domain online at no cost and you are free to copy and redistribute it for non-commercial purposes. You can also read a short article in the Huffington Post celebrating last year’s Public Domain Day.

    1 One additional problem is that it is often very hard to determine if a particular work is in the public domain. The Communia list of public domain works to which we link is based on the assumption that the named author is the copyright holder and that the term is life plus seventy years.

    Special thanks to our tireless and talented research maven and website guru Balfour Smith.

    The Public Domain Day 2013 web pages by Duke University’s Center for the Study of the Public Domain are licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Tue Jan 29, 2013 10:11 pm

Nice article, Allegro! Apropos:


January 29, 2013

That Movie’s Too Expensive! Knock It Off!
Straight to Video


by JAMES McENTEER

Quito.

“I’d like to thank the members of the Academy. Or at least, one of them…”

You won’t hear that speech at the upcoming Oscar ceremonies. But movie fans in Ecuador, where I live, and in many other so-called “developing” countries, have reason to be grateful to certain members of the Academy of Motion Picture Arts and Sciences: the pirates among them.

Those of us residing off the reservation read about and see clips from the latest Hollywood – and some international – features and documentaries on the internet. But few of these films ever make it to local cinemas here in Quito. As in many U.S. cities, Quito theaters are mostly clustered in malls, where action blockbusters and animated confections tend to crowd out more provocative fare.

There are occasional exceptions. We were able to see Scorsese’s aesthetically splendid Hugo and Spielberg’s breathless Adventures of Tin-Tin here in 3-D last year. The Life of Pi is playing right now with the options of 3-D or cheaper 2-D, subtitled or dubbed. I managed to catch Argo as it sped through town. But I was the only human in the theater.

It’s frustrating to read about interesting films in The New York Times or Salon or The Guardian or other online venues, knowing that most of them will never get to our portion of the planet. Unless of course they are nominated for one or more Academy Awards.

DVDs of nominated films are sent to the several thousand members of the Academy for their
voting consideration. One or more of those members apparently markets his or her copies to pirates. And almost overnight, Quito video stores leap quantumly from their usual offerings of old or second-rate stuff to Oscar-level fare.

Several dozen films – all nominated for best picture, best director, best actor, etc. – have suddenly appeared in handsome cases with the highest quality cinematic reproduction. The only drawback, negligible really, is that occasionally throughout the course of the movie, a phrase such as “For Your Consideration” appears to remind Academy voters why they got their free copy.

Of course these movies are not free to us. We have to buy them. But the prices seem fair: two dollars each, three for five dollars or seven for ten. We’ve been buying fistfuls of films lately to sate our movie lust after many months of cinematic austerity. My son always enjoys the moment when the FBI anti-piracy warning appears on the screen since all our videos are pirated, from pirate stores.

Does this make us criminals? Copyright thieves? Video vampires? The USA makes a fetish of protecting intellectual property rights. Partly because entertainment is among the few products our country manufactures anymore. And partly because our government tends to represent corporate interests over those of individuals. Do they go too far? Ask the parents of Aaron Swartz.

Before Harvey Weinstein importunes some National Security types to come knocking on our door or to close down the pirate video stores of Quito (and many other cities worldwide), let’s talk money. The median income of Ecuadorian citizens is about ten percent that of USA residents. By law, the minimum wage here is $300 a month.

Should actors and producers be compensated for what they do? Absolutely. But how much? I’ll guess that Mr. Weinstein earns something beyond a decent living doing what he does. I don’t begrudge him a penny of it. I’m grateful for his production and dissemination of movies. But I’m not worried about his financial well-being. He’s living among the stars, not on the edge of an economic abyss.

Would Brad Pitt prefer more fame or more money? That’s the choice. I recently saw and enjoyed his performance in Killing Them Softly. He’s a terrific actor. Of course he did not earn any royalties from the copy I bought in Quito. But many of his films do not play local theaters. (Tree of Life? No way.) And most movie fans here would be unwilling or unable to pay non-pirated rates for a DVD.

Netflix streams to Latin America now. We tried them out for a free sample month. But their online selection to our zone is a fraction of what they offer in the USA. You’d almost think they were afraid someone might pirate their output.

I am willing and able to spend five or six dollars for a theater ticket here to watch a movie. But stimulating films at the mall are few and far between. Were it not for the pirate video stores – the only Blockbuster there is – I would not be able to indulge my pleasure in wonderful movies like Moonrise Kingdom or Beasts of the Southern Wild. A real Blockbuster would fail here, as many of their outlets are failing across the United States.

So I would like to thank the member or members of the Academy who are making extra cash by breaking the rules and letting many more millions of film fans around the world enjoy the current Oscar contenders.

May the force, but not the police force, be with you.

JAMES McENTEER is the author of Shooting the Truth: the Rise of American Political Documentaries (Praeger 2006). He lives in Quito, Ecuador.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 162 guests