For all of those thousands of years, most important communication in civilization has been vertical, and almost always from the top down.
Think of a church bell (or before that, and in other places, a drum or a gong): a means of communication far too expensive in a primitive society for an individual to own, one with extremely low bandwidth, conveying simple imperatives that individuals had been conditioned from earliest childhood to obey: wake up, serf! Come to prayer, serf! Go to work, serf! Come back to prayer, serf! Go to bed, serf!
There was no talking back to the commanding bells.
Over the centuries, nothing changed except the bandwidth. By turns we had Big Ben, Rudy Valee, D.W. Griffith, Arthur Godfrey, I Love Lucy; but there was no way to talk back to them, either. Nor to the “news” thrust upon us by media controlled or even owned outright by authority.
Then, suddenly, the whole situation, the entire 8000-year-old structure of human interaction, was pitched on its ear. The Internet landed with a crash and knocked communications sideways, making it an egalitarian — “peer-to-peer” — undertaking. Information traveled uncontrollably, in both directions, to the anger and distress of those who still believed that they were in authority. (One politician, a wealthy former governor and senator has recently announced that he’s leaving politics, having previously claimed society would be better off had the Internet never been invented.) And all the pus, 8000 years of dictatorial threats and dirty lies, burst out with the fall of power.
Humanity will never be the same again. This is change at the most fundamental level conceivable, barring the evolution of new limbs or individuals developing gills. As a student of history, I believe it to be more significant than Gutenberg’s invention of the printing press, possibly more important than the invention of writing itself. And authority, as it disintegrates, is striving hysterically to bring it all back under control. But it’s too late by at least a decade. We have the idea of laterality now, and it cannot be disinvented or unlearned.
L. Neil Smith, “‘And That’s the Way It Is…'”, Libertarian Enterprise, 2013-02-03
February 10, 2013
QotD: The internet really did change everything
February 7, 2013
Canadian companies lobby the government for the right to install rootkits on your electronic devices
Michael Geist reports on a recent lobbying attempt that should be thrown out with contempt if we lived in a just world:
The deadline for comments on Industry Canada’s draft anti-spam regulations passed earlier this week with a group of 13 industry associations — including the Canadian Chamber of Commerce, the Canadian Marketing Association, the Canadian Wireless Telecommunications Association and the Entertainment Software Association of Canada — submitting a lengthy document that, if adopted, would gut much of the law. The groups adopt radical interpretations of the law to argue for massive new loopholes or for the indefinite delay of several provisions. I will focus on some of the submissions shortly, but this post focuses on the return of an issue that was seemingly killed years ago: demands to permit surreptitious surveillance by the copyright owners and other groups for private enforcement purposes.
During the anti-spam law debates in 2009, copyright lobby groups promoted amendments that would have allowed for expansive surveillance of user computers. Coming on the heels of the Sony rootkit scandal, the government ultimately rejected those proposals (the Liberals had plans to propose such amendments but backed down), leaving in place an important provision that requires express consent prior to the installation of computer software.
[. . .]
The Canadian Chamber of Commerce and other business groups want to ensure that the anti-spam law does not block their ability to secretly install spyware on personal computers for a wide range of purposes. In doing so, these groups are proposing to turn the law upside down by shifting from protecting consumers to protecting businesses. The comment period on the draft regulations may have closed, but it is not too late to tell Industry Minister Christian Paradis or your local Member of Parliament to reject demands that would gut the anti-spam bill and legalize spyware for private enforcement purposes.
January 30, 2013
“The only people [DRM] annoys are the ones who have [acquired] legal copies”
At Techdirt, Glyn Moody explains why the attempt to add DRM to the HTML5 standard is doomed to failure:
You would have thought by now that people would understand that DRM is not only a bad idea, but totally unnecessary: Apple dropped DRM from music downloads in 2009 and seems to be making ends meet. Despite these obvious truths, the stupidity that is DRM continues to spread. Here, for example, is a particularly stupid example of DRM stupidity, as revealed by Manu Sporny:
A few days ago, a new proposal was put forward in the HTML Working Group (HTML WG) by Microsoft, Netflix, and Google to take DRM in HTML5 to the next stage of standardization at W3C.
After all, this is exactly what Web users have been crying out for: “just give us DRM for the Web, and our lives will be complete….”
[. . .]
That clearly implies that when people are not sharing their own content with family and friends, then they are indeed adversaries:
This “user is not an adversary” text can be found in the first question about use cases. It insinuates that people that listen to radio and watch movies online are potential adversaries. As a business owner, I think that’s a terrible way to frame your customers.
Thinking of the people that are using the technology that you’re specifying as “adversaries” is also largely wrong. 99.999% of people using DRM-based systems to view content are doing it legally. The folks that are pirating content are not sitting down and viewing the DRM stream, they have acquired a non-DRM stream from somewhere else, like Mega or The Pirate Bay, and are watching that.
This is the fundamental reason why DRM is doomed and should be discarded: the only people it annoys are the ones who have tried to support creators by acquiring legal copies. How stupid is that?

January 29, 2013
January 17, 2013
Borrowing from theoretical physics, we now have “Quantum Copyright”
At Techdirt, Tim Cushing explores the legal phase changes that introduce heretofore unknown states of copyright:
Eric Hellman tackles the ambiguous nature of copyright infringement, especially as it pertains to the “region-free” aspects of the internet, in a post amusingly titled, “Heisenberg’s Uncertain Copyright.” (via The Digital Reader)
Hellman turns his attention to F. Scott Fitzgerald’s The Great Gatsby, and using his skills in the area of “Quantum Copyright” (a term he threw into his LinkedIn profile for a bit of fun), determines that the question of whether or not copyright infringement has occurred might depend on where the copying occurred, something that is even harder to define when the copying takes place via the internet.
[. . .]
While Hellman exaggerates the repercussions of making a hypothetical copy (the highest statutory claims would apply only to willful infringement [which this could be, especially when infringing in order to prove a hypothesis] and the jail time only applies to criminal infringement — which this almost certainly would not be), the fact remains that one deterrent of infringement is the underlying threat of legal action (whether civil or criminal). No doubt F. Scott Fitzgerald’s estate is in no hurry to give up the American rights (and the attendant enforcement of those rights), seeing as The Great Gatsby earned its author all of $8,400 during his lifetime — but generates $500,000 per year for his daughter. This secondhand largesse enjoyed by many heirs is one of the motivators behind the ever-extending copyright lengths here in this country.
[. . .]
Certainly, copyright-centered entities like the MPAA would prefer to simply have our copyright laws exported to other countries with less stringent laws, especially any sections that extend the length of copyright protection and weaken fair use/fair dealing exceptions. Getting other nations to sync up with our copyright lengths would certainly eliminate these hypothetical discussions, along with many items in the public domain. Many aspects of current copyright laws were written years ago, long before the internet made “country of origin” a meaningless term and reproductions as simple as a right-click on a mouse. What it usually boils down to, after all the discussion, is this:
You could also be a cynic and say the only thing that matters is where the judge is sitting.
Much like fair use is often determined by a courtroom appearance, the “quantum” aspects of copyright are largely theoretical — right up to the point that someone finds themselves at the other end of an infringement lawsuit.
January 16, 2013
Prosecutorial abuse and the Swartz case
Writing in the Guardian, Glenn Greenwald calls for reform in the way prosecutors are immune from any consequences of their misdeeds:
To begin with, there has been a serious injustice in the Swartz case, and that alone compels accountability. Prosecutors are vested with the extraordinary power to investigate, prosecute, bankrupt, and use the power of the state to imprison people for decades. They have the corresponding obligation to exercise judgment and restraint in how that power is used. When they fail to do so, lives are ruined — or ended.
The US has become a society in which political and financial elites systematically evade accountability for their bad acts, no matter how destructive. Those who torture, illegally eavesdrop, commit systemic financial fraud, even launder money for designated terrorists and drug dealers are all protected from criminal liability, while those who are powerless — or especially, as in Swartz’s case, those who challenge power — are mercilessly punished for trivial transgressions. All one has to do to see that this is true is to contrast the incredible leniency given by Ortiz’s office to large companies and executives accused of serious crimes with the indescribably excessive pursuit of Swartz.
This immunity for people with power needs to stop. The power of prosecutors is particularly potent, and abuse of that power is consequently devastating. Prosecutorial abuse is widespread in the US, and it’s vital that a strong message be sent that it is not acceptable. Swartz’s family strongly believes — with convincing rationale — that the abuse of this power by Ortiz and Heymann played a key role in the death of their 26-year-old son. It would be unconscionable to decide that this should be simply forgotten.
[. . .]
In most of what I’ve written and spoken about over the past several years, this is probably the overarching point: the abuse of state power, the systematic violation of civil liberties, is about creating a Climate of Fear, one that is geared toward entrenching the power and position of elites by intimidating the rest of society from meaningful challenges and dissent. There is a particular overzealousness when it comes to internet activism because the internet is one of the few weapons — perhaps the only one — that can be effectively harnessed to galvanize movements and challenge the prevailing order. That’s why so much effort is devoted to destroying the ability to use it anonymously — the Surveillance State — and why there is so much effort to punishing as virtual Terrorists anyone like Swartz who uses it for political activism or dissent.
The law and prosecutorial power should not be abused to crush and destroy those who commit the “crime” of engaging in activism and dissent against the acts of elites. Nobody contests the propriety of charging Swartz with some crime for what he did. Civil disobedience is supposed to have consequences. The issue is that he was punished completely out of proportion to what he did, for ends that have nothing to do with the proper administration of justice. That has consequences far beyond his case, and simply cannot be tolerated.
Update: Radley Balko‘s latest column is also on the topic of the public prosecutor.
The death of Internet activist Aaron Swartz has generated a lot of discussion about the power of prosecutors — particularly federal prosecutors. This is a good thing. The conversation is long overdue. But the discussion needs to go well beyond on Swartz and the Computer Fraud and Abuse Act.
Prosecutors have enormous power. Even investigations that don’t result in any charges can ruin lives, ruin reputations, and drive their targets into bankruptcy. It has become an overtly political position — in general, but particularly at the federal level. If a prosecutor wants to ruin your life, he or she can. Even if you’ve done nothing wrong, there isn’t a whole lot you can do about it.
There are a number of factors that got us here, and it’s worth looking at them in turn.
January 13, 2013
“Please don’t pathologize this story”
A plea for understanding, not just for the late Aaron Swartz, but also for the ethically broken justice system:
No doubt it is a certain crazy that brings a person as loved as Aaron was loved (and he was surrounded in NY by people who loved him) to do what Aaron did. It angers me that he did what he did. But if we’re going to learn from this, we can’t let slide what brought him here.
First, of course, Aaron brought Aaron here. As I said when I wrote about the case (when obligations required I say something publicly), if what the government alleged was true — and I say “if” because I am not revealing what Aaron said to me then — then what he did was wrong. And if not legally wrong, then at least morally wrong. The causes that Aaron fought for are my causes too. But as much as I respect those who disagree with me about this, these means are not mine.
[. . .]
Here is where we need a better sense of justice, and shame. For the outrageousness in this story is not just Aaron. It is also the absurdity of the prosecutor’s behavior. From the beginning, the government worked as hard as it could to characterize what Aaron did in the most extreme and absurd way. The “property” Aaron had “stolen,” we were told, was worth “millions of dollars” — with the hint, and then the suggestion, that his aim must have been to profit from his crime. But anyone who says that there is money to be made in a stash of ACADEMIC ARTICLES is either an idiot or a liar. It was clear what this was not, yet our government continued to push as if it had caught the 9/11 terrorists red-handed.
Cory Doctorow has a heartfelt obituary up on Boing Boing.
January 3, 2013
Irish newspapers want to be paid when you link to them
Ireland is an odd place, if this little brainstorm from their newspaper industry is any indication:
This is not a joke.
I have started with that clarification, because as you read this you will find yourself asking “Is this some kind of a joke?” I thought I would be helpful and put the answer right up at the start, so you can refer back to it as often as you require.
This year the Irish newspaper industry asserted, first tentatively and then without any equivocation, that links -just bare links like this one- belonged to them. They said that they had the right to be paid to be linked to. They said they had the right to set the rates for those links, as they had set rates in the past for other forms of licensing of their intellectual property. And then they started a campaign to lobby for unauthorised linking to be outlawed.
These assertions were not merely academic positions. The Newspaper Industry (all these newspapers) had its agent write out demanding money. They wrote to Women’s Aid, (amongst others) who became our clients when they received letters, emails and phone calls asserting that they needed to buy a licence because they had linked to articles in newspapers carrying positive stories about their fundraising efforts.
These are the prices for linking they were supplied with:
1 – 5 €300.00
6 – 10 €500.00
11 – 15 €700.00
16 – 25 €950.00
26 – 50 €1,350.00
50 + NegotiableThey were quite clear in their demands. They told Women’s Aid “a licence is required to link directly to an online article even without uploading any of the content directly onto your own website.”
The rational response here is to honour their request … by pretending they’ve dropped off the internet altogether and never linking to any of the Irish newspaper websites.
December 20, 2012
Wikipedia’s funding model
At The Register, Andrew Orlowski looks at the way Wikipedia is funded and explains why they don’t actually need to pester you for donations (but do anyway):
It’s that time of year again. As the Christmas lights go up, Wikipedia’s donation drive kicks off. Wikipedia claims that the donations are needed to keep the site online. Guilt-tripped journalists including Heather Brooke and Toby Young have contributed to Wikipedia in the belief that donations help fund operating costs. Students, who are already heavily in debt, are urged to donate in case Wikipedia “disappears”.
But what Wikipedia doesn’t tell us is that it is awash with cash — and raises far more money each year than it needs to keep operating.
Donations are funding a huge expansion in professional administrative staff and “research projects”. Amazingly, this year for the first time Wikipedia — the web encyclopaedia anyone can edit — has even found the cash to fund a lobbyist.
All this has been met with dismay by the loyal enthusiasts who do all the hard work of keeping the project afloat by editing and contributing words — and who still aren’t paid. For the first time, Wikipedians are beginning to examine the cash awards — and are making some interesting discoveries.
First, let’s have a look at the finances.
December 19, 2012
The “digital divide” didn’t play out quite the way they thought
In Gregg Easterbrook‘s weekly NFL column, he often discusses non-football topics like this one:
A decade ago — perhaps as recently as five years ago — analysts and educators feared a “digital divide” in which the affluent have access to advancing electronics and the disadvantaged do not, granting the affluent yet another edge in life’s contest. But what if the reverse has happened?
[. . .]
That made this article striking, with research showing children from disadvantaged families now waste more time with video games and on the Internet than do children from affluent homes. Publicly subsidized programs to provide computers and Internet to the disadvantaged were rationalized as tools for education. How are they actually used? The article quotes Vicky Rideout, author of a study on the subject, saying, “Despite the educational potential of computers, the reality is that their use for education or meaningful content creation is minuscule compared to their use for pure entertainment.”
Video games are a really tempting way to avoid studying. If they had been around when I was a teen, there’s no way I would have read so many books or spent three or four hours after school each day at the high school, doing extracurriculars and sports. I might instead have wasted my time with electronics.
Girls and women are taking over college admissions; 57 percent of undergraduate students at four-year colleges are female. There are many reasons, and surely one is that teen girls waste less time on video games than teen boys do. If disadvantaged teen boys are wasting more time than affluent teen boys, that makes the picture worse.
Conservative commentators often “harrumph” about rising living standards for the disadvantaged, many of whom now have air conditioning, laptops and other items once associated with affluence. It’s good that living standards are rising, and it’s good that the digital divide is disappearing. The spread of computers and Internet service into disadvantaged homes creates equity in access to the information and services available on the Web. But society needs to be aware of the downsides of electronics. Those computer and software gifts being opened this holiday season might, especially for teen boys, backfire.
December 17, 2012
Kim Jong-Un is Time man of the year (with help from 4chan)
Tim Cushing on 4chan’s latest use of Time as a comedic sidekick:
4chan has returned to the limelight once again to torment reluctant sidekick TIME by voting early and often in its own particular idiom (read: bots, prolly) for Person of the Year. And the winner is none other than North Korean dictator and poster boy for evil, nepotism and ill-fitting grey smocks, Kim Jong-un. Here’s a portion of Time‘s statement on the poll results, which is good naturedly resigned, much in the way parents raising child 7+ are more concerned with keeping the cleaning products, bandages and fire extinguisher close at hand than preventing the feat of daredevilry that is currently being performed using Sharpies, a purloined Zippo and the second floor bannister.
Kim Jong Un is having a good year. After taking over the leadership of North Korea from his late father Kim Jong Il, at the end of 2011, he’s solidified his control over the country, appeared on TIME‘s cover and he was even named “Sexiest Man Alive.” (OK, that honor was actually bestowed as a spoof in the satirical newspaper, The Onion, but a Chinese news service mistook the Onion piece for real news and the story went global.)
Now, he’s gotten the most votes in TIME‘s completely unscientific reader Person of the Year Poll with 5.6 million votes. Not bad for a man who didn’t make an official public appearance until 2010.
December 13, 2012
The ITU’s latest attempt to hijack the internet
David Gewirtz has the details:
According to The Weekly Standard, the chairman of the International Telecommunication Union (ITU) decided to try an end-run around the U.S., Europe, and most freedom-loving nations by conducting a survey of nations and putting forth a resolution that gives governments control over Internet policy, which includes everything you and I send across the pipes.
Apparently, this wasn’t a binding policy, but it’s a political gambit designed to get the UN to continue the process of trying to wrest control of the Internet from those interested in freedom to those interested in control of freedoms.
I’m a strong believer in a global Internet, but I’m starting to think countries like China and Russia and Cuba and the various regressive Middle Eastern states are more trouble than they’re worth. Maybe it’s just time we pulled the Internet plug on them*.
December 6, 2012
NZ court allows Kim Dotcom to sue for illegal spying
This could get interesting quickly:
Details of the top secret international spy agency ring known as Echelon will have to be produced after a new judgment in the Kim Dotcom case.
The internet tycoon was also cleared to pursue a case for damages against the police and the Government Communications Security Bureau in a judgment which has opened the Government’s handling of the criminal copyright case for its harshest criticism yet.
[. . .]
Chief high court judge Helen Winkelmann said the GCSB would have to “confirm all entities” to which it gave information sourced through its illegal interception of Dotcom’s communications.
She said her order included “members of Echelon/Five Eyes, including any United States authority”. The Echelon network is an international intelligence network to which New Zealand and the United States are members, along with Australia, Canada and the United Kingdom.
The judgment also recorded Dotcom’s suspicions he had been spied on at least six weeks before the GCSB admitted to doing so, and sought details as to whether others had been swept up in the illegal operation.
Update: Moved the video below the fold to stop it auto-playing any time someone visited the blog main page.
December 4, 2012
ITU approves Deep Packet Inspection requirement to enable government snooping of internet traffic
The UN’s International Telecommunications Union continues its in-camera campaign to wrest control of the internet from all other organizations with a new policy designed to please intrusive and authoritarian governments worldwide:
The telecommunications standards arm of the U.N. has quietly endorsed the standardization of technologies that could give governments and companies the ability to sift through all of an Internet user’s traffic – including emails, banking transactions, and voice calls – without adequate privacy safeguards. The move suggests that some governments hope for a world where even encrypted communications may not be safe from prying eyes.
At the core of this development is the adoption of a proposed international standard that outlines requirements for a technology known as “Deep Packet Inspection” (DPI). As we’ve noted several times before, depending on how it is used, DPI has the potential to be extremely privacy-invasive, to defy user expectations, and to facilitate wiretapping.
[. . .]
The ITU-T DPI standard holds very little in reserve when it comes to privacy invasion. For example, the document optionally requires DPI systems to support inspection of encrypted traffic “in case of a local availability of the used encryption key(s).” It’s not entirely clear under what circumstances ISPs might have access to such keys, but in any event the very notion of decrypting the users’ traffic (quite possibly against their will) is antithetical to most norms, policies, and laws concerning privacy of communications. In discussing IPSec, an end-to-end encryption technology that obscures all traffic content, the document notes that “aspects related to application identification are for further study” – as if some future work may be dedicated to somehow breaking or circumventing IPSec.
Several global standards bodies, including the IETF and W3C, have launched initiatives to incorporate privacy considerations into their work. In fact, the IETF has long had a policy of not considering technical requirements for wiretapping in its work, taking the seemingly opposite approach to the ITU-T DPI document, as Germany pointed out in voicing its opposition to the ITU-T standard earlier this year. The ITU-T standard barely acknowledges that DPI has privacy implications, let alone does it provide a thorough analysis of how the potential privacy threats associated with the technology might be mitigated.
These aspects of the ITU-T Recommendation are troubling in light of calls from Russia and a number of Middle Eastern countries to make ITU-T Recommendations mandatory for Internet technology companies and network operators to build into their products. Mandatory standards are a bad idea even when they are well designed. Forcing the world’s technology companies to adopt standards developed in a body that fails to conduct rigorous privacy analysis could have dire global consequences for online trust and users’ rights.




