SHARE THIS BOOK / Intellectual property in the digital world; How corporations and politicians are manipulating our property rights in cyberspace.
2011
by DARIUS GARZA
by Darius Garza / Creative Commons Attribution License / 2011
SHARE THIS BOOK (scan code to download a copy of this book)
CONTENTS
CHAPTER 1: THE WEB // PG.14 Intellectual property goes digital CHAPTER 2: THREATS // PG.22 Your property rights are being exploited CHAPTER 3: RECOURSE // PG.46 Taking back our property rights
CHAPTER 1: //
THE WEB INTELLECTUAL PROPERTY GOES DIGITAL
THE WEB HAS SHAPED THE WAY THAT WE LOOK AT INTELLECTUAL PROPERTY AND HAS CHANGED THE DYNAMIC BETWEEN CONSUMER AND DISTRIBUTOR.
Technology has significantly lowered the costs of producing and distributing intellectual property and now most anyone with access to a computer can share a lot of information with lots of people for little or no cost. The origins of the world-wide web reach back to the 1960’s with both private and government agencies putting research into robust, fault-tolerant, and vastly distributed computer networks. The funding of a new U.S. internet backbone by the National Science Foundation, as well as private monies for commercial pipelines, led to worldwide participation in the development of new networking technologies, and the merger of many networks into what we now know as the world wide web.
06
CHAPTER 1 //: THE WEB
A WORLDWIDE WEB:
1.73 BILLION
25.8%
[1]
OF THE GLOBAL POPULATION IS ON THE INTERNET
INTERNET USERS WORLDWIDE
234,000,000
WEBSITES AVAILABLE ON THE INTERNET
07
GREATER THAN THE SUM OF ITS PARTS: // Because the internet makes it easier for people to give their time and knowledge - through blogs, discussion forums and the like - it allows for non-monetary, non-market activities that in the past were difficult to co-ordinate and benefit from. This, in turn, enables far greater media creation and consumption, and even more political participation, than before. This promises to bring about greater social justice - unless the reactionary forces of the establishment (be it big media or big government) misuse the law to protect their interests.
08
CHAPTER 1 //: THE WEB
1 +1 3
COLLABORATIVE CULTURE: // The internet is the perfect medium to encourage collaboration and sharing. It let’s others easily expand on the work of others and creates an energizing force that results in the creation of something that is far greater than its direct value.
09
10
CHAPTER 1 //: THE WEB
THE WEB HAS ENABLED AN ASTONISHING FLOWERING OF COMMUNICATION AND EXPRESSION, AN ASTOUNDING DEMOCRATIZATION OF CREATIVITY. —JAMES BOYLE AUTHOR OF THE PUBLIC DOMAIN
THE PUBLIC DOMAIN America’s founding fathers felt that having intellectual property rights are vital and necessary to promote the progress of the “sciences and useful arts”. Property rights were intended to fulfill a true public domain and promote the circulation of intellectual property and wealth. Scan here to download a free copy of James Boyle’s The Public Domain
[2]
in which the author delves into the
history of intellectual property and discusses the impact that the web has had on our property rights.
11
CHAPTER 2: //
THREATS YOUR PROPERTY RIGHTS ARE BEING EXPLOITED
INTELLECTUAL PROPERTY RIGHTS ARE CURRENTLY BEING MANIPULATED BY BIG CORPORATIONS AND POLITICIANS IN ORDER TO CONTROL OUR ACCESS TO THE WORLD WIDE WEB.
Currently the means of producing and exchanging information and culture are placed in the hands of hundreds of millions, and eventually billions of people around the world. This enables far greater new media creation and consumption than ever before and rids people of the normal boundaries to communication that we had before the web. This presents a threat to the old established media companies. In response to this new democratized medium, they are using their wealth and political influence to thwart the development of the internet by lobbying policy makers to apply overly strict copyright restrictions on new media.
14
CHAPTER 2 //: THREATS
Š
300%
COPYRIGHT OVER EXPANSION://
Copyright terms have expanded more
than ever during the past 50 years and now last nearly a century. Never before has more of our culture been owned than it is today.
[4]
15
COPYRIGHT TERM EXPANSION FROM 1709 - 2050: //
© CACHE GRAB
90 80 70
40 30 20 10 1970 ACT
1831 ACT
1910
1895
1880
1865
1850
1835
1820
0 1805
16
50
1790
DURATION OF COPYRIGHT TERM (YEARS)
60
The 1976 Copyright Act changed the measure of the default copyright term to life of the author plus fifty years. Recent amendments to the Copyright Act expanded the term yet again, letting it run for the life of the author plus seventy years. As the chart reveals, all but the first of these statutes extended copyright terms retroactively.
2050
2035
2020
1998 ACT
2005
1990
1976 ACT
1985
1970
1955
1909 ACT
1940
1925
The chart below illustrates the expansion of U.S. copyright law. The first federal copyright legislation, the 1790 Copyright Act, set the maximum term at fourteen years plus a renewal term of fourteen years. The 1831 Copyright Act doubled the initial term and retained the conditional renewal term, allowing a total of up to forty two years of protection. Lawmakers doubled the renewal term in 1909, letting copyrights run for up to fifty-six years. The interim renewal acts of 1962 through 1974 ensured that the copyright in any work in its second term as of September 19, 1962, would not expire before Dec. 31, 1976. [ 4]
17
THE DMCA: Signed into office by Bill Clinton in 1998: the DMCA provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement.
18
CONGRESS HAS LEVERAGED GREATER COPYRIGHT RESTRICTIONS ON THE WEB BUT HAVE NOT BEEN SUCCESSFUL IN PREVENTING © INFRINGEMENT.
Since they were enacted back in 1998, the original anticircumvention provisions within the Digital Millennium Copyright Act (“DMCA”), have not been used as Congress envisioned. They intended to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. In practice, the anti-circumvention provisions have been used to stifle a wide reaching array of legitimate activities, rather than to deter copyright infringement. Thus as result, the DMCA has developed into a serious threat to several important public policy priorities.
CHAPTER 2 //: THREATS
19
THE DMCA HURTS PEOPLE, NOT PIRATES: // Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public’s fair use rights. Already, the movie industry’s use of encryption on DVDs has curtailed consumers’ ability to make legitimate, personal-use copies of movies they have purchased.
20
CHAPTER 2 //: THREATS
“ The DMCA has done far more harm to fair use, free speech, scientific research, and competition than it has to digital piracy. “ —EFF
FAIL! 21
12 YEARS OF DMCA MISUSE: //
APPLE THREATENS BLUWIKI
MICROSOFT THREATENS SLASHDOT
In 2009, Apple threatened the free wiki hosting site BluWiki for hosting a discussion by hobbyists about reverse engineering iPods to interoperate with software other than Apple’s own iTunes. Without a work-around, iPod and iPhone owners would be unable to use third-party software, such as Winamp or Songbird, to “sync” their media collections between computer and iPod or iPhone device.
In spring 2000, Microsoft invoked the DMCA against the Internet publication forum Slashdot, demanding that the forum moderators delete materials relating to Microsoft’s proprietary implementation of an open security standard known as Kerberos
PROFESSOR FELTEN’S RESEARCH TEAM THREATENED
In September 2000, a multi-industry association referred to as the Secure Digital Music Initiative (SDMI) issued a public challenge encouraging skilled technologists to try to defeat certain watermarking technologies that are intended to protect digital music. Princeton computer science professor Edward Felten and a team of researchers at Princeton, Rice, and then Xerox took up the challenge and succeeded in removing the watermarks from the music and were then threatened with liabillity under the DMCA.
22
CHAPTER 2 //: THREATS
In the Slashdot forum, several individuals alleged Microsoft had changed the open, non proprietary version of Kerberos specification in order to prevent non Microsoft servers from interacting with Windows 2000. Many speculated that this move was intended to force users to purchase Microsoft server software technology.
GAMESPY MENACES RESEARCHER WITH DMCA
Luigi Auriemma of Italy attracted the attention GameSpy’s lawyers after publishing details on his website regarding security vulnerabilities in GameSpy’s online services. In November 2003, GameSpy’s lawyers sent a cease and desist letter to Auriemma, threatening civil and criminal penalties under the DMCA. According to GameSpy, Auriemma was publishing key generators and other piracy tools, rather than simply vulnerability research.
DMITRY SKLAROV ARRESTED
SONY SUES CONNECTIX AND BLEEM
In July 2001, techno programmer Dmitry Sklyarov was jailed for several weeks and detained for five months in the United States after speaking at the DEFCON conference in Las Vegas.
Sony has used DMCA to sue competitors who created emulation software that permits gamers to play PlayStation console games on PCs. In 1999, Sony sued Connectix, the maker of the Virtual Game Station, a PlayStation emulator for Macintosh computers. Sony also sued Bleem, the leading vendor of PlayStation emulator software for Windows PCs.
Sklyarov was never accused of infringing any copyright, nor of assisting anyone else to infringe copyrights. His alleged crime was working on a software tool with many legitimate uses, simply because other people might use the tool to copy an e-book without the publisher’s permission.
SCIENTISTS AND PROGRAMMERS WITHHOLD RESEARCH
Following the Felten and Sklyarov incidents, a number of prominent computer security experts curtailed their legitimate research activities for fear of potential DMCA liability. For example, when Dutch cryptographer and computer security systems analyst head Niels Ferguson, discovered a major big security flaw in Intel’s HDCP video encryption system, he declined to publish his results on his website on the grounds that he travels frequently to the U.S. and is fearful of “prosecution and/or liability under the U.S. DMCA law.”
Neither Connectix nor Bleem were able to bear the high costs of litigation against Sony and pulled their products off the market.
LEXMARK SUES OVER TONER CARTRIDGE REFILLS
Lexmark added authentication routines between its printers and cartridges explicitly to stymie aftermarket toner vendors. The Static Control Components (SCC) reverse-engineered these measures and sold “Smartek” chips that enabled refilled cartridges to work in Lexmark printers. Lexmark had then used the DMCA to obtain an injunction banning SCC from selling its chips to cartridge remanufacturers. SCC ultimately succeeded in getting the injunction overturned on appeal, but only after 19 months of expensive litigation while its product was held off the market; a crippling expense for the small company.
AND THE LIST GOES ON.................................... [5]
23
Apple Threatens BluWiki
In 2009, Apple threatened the free wiki hosting site BluWiki for hosting a discussion by hobbyists about reverse engineering iPods to interoperate with software other than App
between computer and iPod or iPhone.5The material on the public wiki was merely a discussion of the reverse engineering effort, along with some snippets of relevant code d
lawyers sent OdioWorks, the company behind BluWiki, a cease and desist letter threatening legal action under the DMCA.Bluwiki ultimately sued Apple to defend the free sp
DMCA Delays Disclosure of Sony-BMG “Rootkit” Vulnerability
Professor J. Alex Halderman, then a graduate student at Princeton University, discovered the existence of several security vulnerabilities in the CD copy-protection software
fans at risk longer than necessary.8 The security flaws inherent in Sony-BMG’s “rootkit” copy-protection software were subsequently publicized by another researcher who w
systems like the Sony-BMG rootkit, but their request was denied by the U.S. Copyright Office.9 In 2006, the Copyright Office granted an exemption to the DMCA for researche In 2009, Prof. Halderman was again forced to seek a DMCA exemption from the Copyright Office in order to continue his computer security research relating to DRM systems As of February 2010, the Copyright Office had not ruled on the proposed exemption.
Professor Felten’s Research Team Threatened In September 2000, a multi-industry group known as the Secure Digital Music Initiative (SDMI) issued a public challenge encouraging skilled technologists to try to defeat
and Xerox took up the challenge and succeeded in removing the watermarks.When the team tried to present their results at an academic conference, however, SDMI repr
After extensive discussions with counsel, the researchers grudgingly withdrew their paper from the conference. The threat was ultimately withdrawn and a portion of the r has decided to forgo further research efforts in this field.14
Censorware Research Obstructed
Seth Finkelstein conducts research on “censorware” software (i.e., programs that block websites that contain objectionable material), documenting flaws in such softwa a law requiring the use web filtering software by federally-funded public libraries. N2H2 claimed that the DMCA should block researchers like Finkelstein from examining
rulemakings. The exemption, however, was not renewed in 2006, leaving future researchers without protection from DMCA threats.19Benjamin Edelman has also conducted
Internet Protection Act (CIPA), which mandates the use of censorware by public libraries.In the course of his work for the ACLU, Edelman discovered that the DMCA might in
the list if it changed, Edelman could not rely on the limited DMCA regulatory exception in place at the time. Unwilling to risk civil and criminal penalties under Section 120 reprisals in order to have standing to challenge the DMCA. The case was therefore dismissed without addressing the DMCA’s chill on research.20
...AND ON Blackboard Threatens Security Researchers
In April 2003, educational software company Blackboard Inc. used a DMCA threat to stop the presentation of research on security vulnerabilities in its products at the Interz
university campus security systems but were blocked shortly before the talk by a cease-and-desist letter invoking the DMCA. Blackboard obtained a temporary restraining o
no opportunity to appear in court or challenge the order before the scheduled presentation. Despite the rhetoric in its initial cease and desist letter, Blackboard’s lawsuit d
SunnComm Threatens Researcher
In October 2003, then Princeton graduate student J. Alex Halderman was threatened with a DMCA lawsuit after publishing a report documenting weaknesses in a CD copy-
technology ineffective. Furious company executives then threatened legal action. The company quickly retreated from its threats in the face of public outcry and negativ results of their research.12
Hewlett Packard Threatens SNOsoft
Hewlett-Packard resorted to DMCA threats when researchers published a security flaw in HP’s Tru64 UNIX operating system. The researchers, a loosely-organized collective of for some time, but had not bothered to fix. After widespread press attention, HP ultimately withdrew the DMCA threat. Security researchers got the message, however—
Blackboard Threatens Security Researchers
In April 2003, educational software company Blackboard Inc. used a DMCA threat to stop the presentation of research on security vulnerabilities in its products at the Interz
university campus security systems but were blocked shortly before the talk by a cease-and-desist letter invoking the DMCA. Blackboard obtained a temporary restraining o
no opportunity to appear in court or challenge the order before the scheduled presentation. Despite the rhetoric in its initial cease and desist letter, Blackboard’s lawsuit d
24
CHAPTER 2 //: THREATS
ple’s own iTunes. Without a work-around, iPod and iPhone owners would be unable to use third-party software, such as Winamp or Songbird, to “sync” their media collections
drawn from Apple software. There were no “circumvention tools,” nor any indication that the hobbyists had succeeded in their interoperability efforts. Nevertheless, Apple’s
peech interests of its users.6In response, Apple dropped its threat, and BluWiki reinstated the deleted pages.
e on dozens of Sony-BMG titles. He delayed publishing his discovery for several weeks while consulting with lawyers in order to avoid DMCA pitfalls. This left millions of music
was apparently unaware of the legal risks created by the DMCA.Security researchers had sought a DMCA exemption in 2003 in order to facilitate research on dangerous DRM
ers examining the security threat posed by copy protection software on compact discs.10 This exemption, however, did not protect researchers studying other DRM systems. , including the protection mechanisms used on the Electronic Arts videogame, Spore, which has been the subject of class action lawsuits alleging security vulnerabilities.11
certain watermarking technologies intended to protect digital music. Princeton computer science professor Edward Felten and a team of researchers at Princeton, Rice,
resentatives threatened the researchers with liability under the DMCA. The threat letter was also delivered to the researchers’ employers and the conference organizers.
research was published at a subsequent conference, but only after the researchers filed a lawsuit. After enduring this experience, at least one of the researchers involved
are. Finkelstein’s research, for example, revealed that censorware vendor N2H2 blocked a variety of legitimate websites, evidence that assisted the ACLU in challenging its software. Finkelstein was ultimately forced to seek a DMCA exemption from the Librarian of Congress, who granted the exemption in both the 2000 and 2003 triennial
d extensive research into flaws in various censorware products. Edelman’s research also led to evidence used by the ACLU in its constitutional challenge to the Children’s
nterfere with his efforts to learn what websites are blocked by censorware products. Because he sought to create and distribute software tools to enable others to analyze
01, Edelman was forced to sue to seek clarification of his legal rights. Unfortunately, the court found that Edelman would have to undertake the research and hazard legal
AND ON AN
zOne II conference in Atlanta. Students Billy Hoffman and Virgil Griffith were scheduled to present their research on security flaws in the Blackboard ID card system used by
order against the students and the conference organizers at a secret “ex parte” hearing the day before the conference began, giving the students and conference organizer
did not mention the DMCA. The invocation in the original cease-and-desist letter, however, underscores the way the statute has been used to chill security research.16
-protection technology developed by SunnComm. Halderman revealed that merely holding down the shift key on a Windows PC would render SunnComm’s copy protection
ve press attention. Although Halderman was spared, the controversy again reminded security researchers of their vulnerability to DMCA threats for simply publishing the
THE EFF
known as Secure Network Operations (“SNOsoft”), received the DMCA threat after releasing software in July 2002 that demonstrated vulnerabilities that HP had been aware publish vulnerability research at your own risk.15
When our freedoms in the networked world come under attack, you bet the
Frontier (EFF)in is zOne II conference in Atlanta. Students Billy Hoffman and Virgil Griffith were scheduled toElectronic present their researchFoundation on security flaws the Blackboard ID card system used by
theday first linethe of conference defense. began, giving the students and conference organizer order against the students and the conference organizers at a secret “ex parte” hearing the before
did not mention the DMCA. The invocation in the original cease-and-desist letter, however, underscores the statute has been Scan here to the seewayeven more ways theused to chill security research.16
DMCA has been used to violate our freedom of expression and creativity in the digital world.
25
SONNY BONO COPYRIGHT ACT: the Sonny Bono Copyright Term Extension Act of 1998 extended the duration of U.S. copyrights by 20 years. Many feel this extension was unjustified and overreaching.
26
THE MUSIC INDUSTRY FIRST RESPONDED TO THE INTERNET BY SENDING OUT ITS LAWYERS IN HOPE OF SMOTHERING NEW TECHNOLOGIES.
Starting with the December 1999 lawsuit against Napster, the recording industry has sued major P2P technology companies one after the other: Scour, Aimster, AudioGalaxy, Morpheus, Grokster Kazaa, iMesh, LimeWire and more. Although these same technologies were additionally utilized for non-infringing purposes including the sharing of authorized songs, live recordings of concerts and works in the public domain, the record industry has won most of these lawsuits. The traditional music industry measures success using a bygone standard, leading to a lopsided perspective of how artists can achieve success in this digital day and age.
CHAPTER 2 //: THREATS
27
0 30,001 THE NUMBER OF PEOPLE SUED BY THE RIAA, AND COUNTING...
The recording industry has now filed,
settled, or threatened actions against well over 30,000 individuals, and there is no end in sight. Ordinary music fans must pay thousands of dollars in court and many of which may be innocent of copyright infringement. [5]
28
CHAPTER 2 //: THREATS
THE RIAA vs THE PEOPLE: // On September 8, 2003, the recording industry sued 261 American music fans for sharing songs with peer-to-peer (P2P) file sharing networks, kicking off an unprecedented legal campaign against alleged copyright infringers. Thousands of lawsuits are still being filed and there is no signs of these lawsuits ending soon. The RIAA’s lawsuit campaign against individual American music fans has failed. It has failed to curtail P2P downloading. It has not persuaded music fans that sharing is equivalent to shoplifting. It has not put a penny into the pockets of artists. It has done little to drive most filesharers into the arms of authorized music services. In fact, the RIAA lawsuits may well be driving filesharers to new technologies that will be much harder for the RIAA’s investigators to infiltrate and monitor.
29
JIM CICCONI, AT&T TOP POLICY EXEC. AT&T has put itself in the spotlight as the anti-net neutrality poster child. Head lobbyist for the company insists that regulation is “completely unnecessary�.
30
CORPORATIONS THAT PROVIDE ACCESS TO THE WEB WANT TO DISCRIMINATE BETWEEN THE TYPES OF CONTENT THAT THEY PROVIDE TO THEIR USERS.
When we log onto the Internet, we take lots of things for granted. We assume that we’ll be able to access whatever web site we want, whenever we want to go there. The freedoms we have online are not guaranteed however and the access we have now may not exist in the future. [6] The biggest cable and communications moguls would like to charge money for smooth access to Web sites, high-speed to run applications, and permission to plug in our devices. These network giants believe they should be able to charge Web site operators, application providers and device manufacturers for the right to use the network.
CHAPTER 2 //: THREATS
31
NET NEUTRALITY MEANS THAT INTERNET SERVICE PROVIDERS ARE NOT ALLOWED TO DISCRIMINATE BETWEEN DIFFERENT TYPES OF CONTENT ONLINE.
NEUTRAL WEB
SINGLE DATA CONNECTION
UNRESTRICTED DATA
USER
32
CHAPTER 2 //: THREATS
RESTRICTED WEB PROPRIETARY, TIERED-ACCESS DATA CONNECTIONS
RESTRICTED DATA UNRESTRICTED DATA
USER
33
“
THE INTERNET’S UNPRECEDENTED OPENNESS IS IN JEOPARDY. THE SUCCESS OF FUTURE INNOVATION DEPENDS ON AN OPEN INTERNET FOR EVERYONE.
—LAWRENCE LESSIG
AUTHOR OF FREE CULTURE
34
CHAPTER 2 //: THREATS
FREE CULTURE: // In FREE CULTURE, Larry Lessig argues that never before in human history has the power to control creative progress been so overconcentrated in the hands of the powerful few, the so-called Big Media. To lose our long tradition of free culture, Lessig describes us, is to lose our freedom to create, our freedom to build, and ultimately our freedom to imagine and dream. [3] Scan the QR code above to download a free copy of Lawrence Lessig’s epic FREE CULTURE work and learn more about his views toward society, culture and intellectual property.
35
CHAPTER 3: //
RECOURSE TAKING BACK OUR PROPERTY RIGHTS
WHY SHARING MATTERS
Sharing takes the control of intellectual property out of the hands of old media conglomerates and puts it back into the hands of the people.It allows for people to have greater access to a richer collection of intellectual property and enourages others to build and create new things. Sharing also discourages the creation of monopolies and prevents the concentration of power over media and information. So hey, RIP, BURN, MIX and SHARE that intellectual property and help to preserve the future of your rights on the internet.
38
The following pages suggest a few ways that we can promote the ideals of freedom in cyberspace and educate people about their digital intellectual property rights. Reform starts off with education and it’s important that people know what their rights are before they can defend them. “Success means something very different when your goal is freedom than it does when your goal is power” —Terry Hancock “Success means something very different when your goal is freedom than it does when your goal is power” —Terry Hancock
39
WEB. AN EDUCATIONAL WEBSITE THAT TEACHES PEOPLE ABOUT INTELLECTUAL PROPERTY AND ABOUT THE THINGS THAT GOVERNMENTS AND CORPORATIONS HAVE BEEN DOING TO ENCROACH ON OUR FREEDOM TO COMMUNICATE ONLINE. Cliché but true, reform starts off with education and people must be aware of the their rights and what is being done to them before things start to get better. This website will spread the gospel about intellectual property on the web and show people how and what they can do to protect the future of cyberspace.
40
CHAPTER 3 //: RECOURSE
41 27
42
FEST. A FESTIVAL THAT CELEBRATES THE FREEDOM THAT THE WEB BRINGS AND RAISES AWARENESS ABOUT THE POTENTIAL FUTURE OF AN INTERNET THAT IS RUN BY POLITICIANS AND CORPORATIONS. There will be a variety of tents and spaces in which people can teach and learn; studios, labs and playgrounds where people can connect and spread their love of knowledge. The Common Minds festival is for anyone who wants to lend their skills and creativity to the cause of keeping the internet open and free. The mission of the festival is the protect the openness of the web and keep it that way for generations to come.
CHAPTER 3 //: RECOURSE
43 53
DOC. A DOCUMENTARY THAT TALKS ABOUT THE HISTORY OF CYBERSPACE AND SHOWS HOW IT HAS SHAPED THE FACE OF INTELLECTUAL PROPERTY. This movie will guide viewers through a series of interviews talking to various people that are connected with the web in one way or another. It will cover major landmarks in the history of the web and tie in events that have also played a significant role in the progress of intellectual property rights.
54 44
CHAPTER 3 //: RECOURSE
45 27
46
MAG. A MAGAZINE THAT FOCUSES ON OUR INTELLECTUAL PROPERTY RIGHTS ON THE WEB. THIS MAGAZINE WILL AIM TO EDUCATE AND PROMOTE THE IDEALS OF FREEDOM IN CYBERSPACE. The name of the periodical is Internet Culture and will feature artists, musicians and scholars to talk about intellectual property and relate it to everyday topics and ideas. The magazine will strive to make the concept of intellectual property on the web “cool” and to get younger people thinking about their rights in cyberspace.
CHAPTER 3 //: RECOURSE
47 57
APP. A MOBILE APPLICATION THAT WILL MAKE IT EASIER FOR PEOPLE TO SHARE THINGS ON THE WEB USING CREATIVE COMMONS LICENSING. The application intends to demystify the licensing process and make people more aware of what they can do with their intellectual property rights. The app will be readily available on most popular smart phones and be accessible to a wide range of people that use the web.
48
CHAPTER 3 //: RECOURSE
49 27
50
CHAPTER 1 //: THE WEB
HE WHO RECEIVES AN IDEA FROM ME, RECEIVES INSTRUCTION HIMSELF WITHOUT LESSENING MINE; AS HE WHO LIGHTS HIS TAPER AT MINE RECEIVES LIGHT WITHOUT DARKENING ME. —THOMAS JEFFERSONON on the value of sharing and the public domain
THE FOUNDERS CONSTITUTION America’s founding fathers felt that having intellectual property rights are vital and necessary to promote the progress of the “sciences and usefull arts”. Property rights were intended to fufill a true public domain and promote the circulation of intellectual property and wealth. Scan here to read the entire manuscript written by Thomas Jefferson on the topic of intellectual property law and sharing ideas and knowledge.
51
CITATIONS
1 Internet Usage World Stats - Internet and Population Statistics. Web. 12 Dec. 2010. <http://www.internetworldstats.com/>. 2 Boyle, James. The Public Domain. Durham, NC: Duke University School of Law, 2003. Print. 3 Lessig, Lawrence. Free Culture. New York: Penguin, 2005. Print. 4 “Copyright Term Extension Act.” Wikipedia, the Free Encyclopedia. Web. 12 Dec. 2010. <http://en.wikipedia.org/wiki/Copyright_Term_ Extension_Act>.
52
COLOPHON
5 “Unintended Consequences: 12 Years Under the DMCA | Electronic Frontier Foundation.” Electronic Frontier Foundation | Defending Freedom in the Digital World. Web. 12 Dec. 2010. <http://www.eff.org/ deeplinks/2010/03/unintended-consequences-12-years-under-dmca>. 6 “Net Neutrality 101.” Savetheinternet.com. Web. <http://www. savetheinternet.com/net-neutrality-101>. 7 “Net Neutrality 101.” Savetheinternet.com. Web. <http://www. savetheinternet.com/net-neutrality-101>.
53
Share This Book Written and designed by Darius Garza Contact: e-mail: darius@clikburn.com Typography Trade Gothic Bold Condensed No. 20 Trade Gothic Condensed No. 18
54
COLOPHON