There used to be a time when one could show people a photograph and the image would have the weight of evidence—the “camera never lies.” Certainly photography always lied, but as a quotation from appearances it was something viewers counted on to reveal certain truths. The photographer’s role was pivotal, but constricted: for decades the mechanics of the photographic process were generally considered a guarantee of credibility more reliable than the photographer’s own authorship. But this is no longer the case.It is true that the “camera never lies” saying can no longer be sustained — the camera can and often does lie when the final product has been manipulated. Yet the crisis of truth that Ritchin and Newsweek predicted has not come to pass.Why? Because society caught on and adapted to the technology.Think back to June 1994, when Time magazine ran O.J. Simpson’s mugshot on the cover of its monthly issue. Time had drastically darkened the mugshot, making Simpson appear much darker than he actually was. What’s worse, Newsweek ran the unedited version of the mugshot, and the two magazines sat side-by-side on supermarket shelves. While Time defended this as an artistic choice with no intended racial implications, the obviously edited photograph triggered massive public outcry.Bad fakes were only part of the growing public awareness of photographic manipulation. For years, fashion magazines have employed deceptive techniques to alter the appearance of cover models. Magazines with more attractive models on the cover generally sell more copies than those featuring less attractive ones, so editors retouch photos to make them more appealing to the public. Unfortunately, this practice created an unrealistic image of beauty in society and, once this was discovered, health organizations began publically warning about the dangers this phenomenon caused — most notably eating disorders. And due to the ensuing public outcry, families across the country became aware of photo-editing technology and what it was capable of.Does societal adaptation mean that no one falls for photo manipulation anymore? Of course not. But instead of prompting the death of truth in photography, awareness of the new technology has encouraged people to use other indicators — such as trustworthiness of the source — to make informed decisions about whether an image presented is authentic. And as a result, news outlets and other publishers of photographs have gone on to establish policies and make decisions regarding the images they use with an eye toward fostering their audience’s trust. For example, in 2003, the Los Angeles Times quickly fired a reporter who had digitally altered Iraq War photographs because the editors realized that publishing a manipulated image would diminish their reader’s perception of the paper’s veracity.No major regulation or legislation was needed to prevent the apocalyptic vision of Photoshop’s future; society adapted on its own.Now, however, the same “death of truth” claims — mainly in the context of fake news and disinformation — ring out in response to deep fakes as new artificial-intelligence and machine-learning technology enter the market. What if someone released a deep fake of a politician appearing to take a bribe right before an election? Or of the president of the United States announcing an imminent missile strike? As Andrew Grotto, International Security Fellow at the Center for International Security and Cooperation at Stanford University, predicts, “This technology … will be irresistible for nation states to use in disinformation campaigns to manipulate public opinion, deceive populations and undermine confidence in our institutions.” Perhaps even more problematic, if society has no means to distinguish a fake video from a real one, any person could have plausible deniability for anything they do or say on film: It’s all fake news.But who is to say that societal response to deep fakes will not evolve similarly to the response to digitally edited photographs?Right now, deep fake technology is far from flawless. While some fakes may appear incredibly realistic, others have glaring imperfections that can alert the viewer to their forged nature. As with Photoshop and digital photograph editing before it, poorly made fakes generated through cellphone applications can educate viewers about the existence of this technology. When the public becomes aware, the harms posed by deep fakes will fail to materialize to the extent predicted.Indeed, new controversies surrounding the use of this technology are likewise increasing public awareness about what the technology can do. For example, the term “deep fake” actually comes from a Reddit user who began using this technology to generate realistic-looking fake pornographic videos of celebrities. This type of content rightfully sparked outrage as an invasion of the depicted person’s privacy rights. As public outcry began to ramp up, the platform publically banned the deep fake community and any involuntary pornography from its website. As with the public outcry that stemmed from the use of Photoshop to create an unrealistic body image, the use of deep fake technology to create inappropriate and outright appalling content will, in turn, make the public more aware of the technology, potentially stemming harms.Perhaps most importantly, many policymakers and private companies have already begun taking steps to educate the public about the existence and capabilities of deep fakes. Notable lawmakers such as Sens. Mark Warner of Virginia, and Ben Sasse of Nebraska, have recently made deep fakes a major talking point. Buzzfeed released a public service announcement from “President Obama,” which was in fact a deep fake video with a voice-over from Jordan Peele, to raise awareness of the technology. And Facebook recently announced that it is investing significant resources into deep fake identification and detection. With so much focus on educating the public about the existence and uses of this technology, it will be more difficult for bad actors to successfully spread harmful deep fake videos.That is not to say deep fakes do not pose any new harms or threats. Unlike Photoshop, anyone with a smartphone can use deep fake technology, meaning that a larger number of deep fakes may be produced and shared. And unlike during the 1990s, significantly more people use the internet to share news and information today, facilitating the dissemination of content across the globe at breakneck speeds.However, we should not assume that society will fall into an abyss of deception and disinformation if we do not take steps to regulate the technology. There are many significant benefits that the technology can provide, such as aging photos of children missing for decades or creating lifelike versions of historical figures for children in class. Instead of rushing to draft legislation, lawmakers should look to the past and realize that deep fakes are not some unprecedented problem. Instead, deep fakes simply represent the newest technique in a long line of deceptive audiovisual practices that have been used throughout history. So long as we understand this fact, we can be confident that society will come up with ways of mitigating new harms or threats from deep fakes on its own.Jeffrey Westling is a Technology and Innovation policy associate at the R Street Institute, a free-market think tank based in Washington, D.C.
Facebook encouraged game developers to let children spend money without their parents' permission - something the social media giant called “friendly fraud” - in an effort to maximize revenues, according to a document detailing the company's game strategy.Sometimes the children did not even know they were spending money, according to another internal Facebook report. Facebook employees knew this. Their own reports showed underage users did not realize their parents' credit cards were connected to their Facebook accounts and they were spending real money in the games, according to the unsealed documents.For years, the company ignored warnings from its own employees that it was bamboozling children.A team of Facebook employees even developed a method that would have reduced the problem of children being hoodwinked into spending money, but the company did not implement it, and instead told game developers that the social media giant was focused on maximizing revenues.Yes, they not only called it "friendly fraud," but in an internal memo, they explained "why you shouldn't try to block it" (i.e., why you should let game developers scam kids out of their parents' money).This reminds me so much of the early days of adware scammers, who pulled similar kinds of stunts -- and it's incredible to think that Facebook, which presented itself as a squeaky clean alternative to the open web where those kinds of scams piled up, was basically doing the same thing on a much larger scale. The Reveal article has much more on this, and is worth reading in full to see how the focus on revenue had the company deliberately look the other way as it scooped up cash from kids.But rather than focus on that, we already need to move on to the more recent Facebook privacy scandal, which also (partially) involves kids. Last summer, we wrote about how Apple had booted Facebook's Onavo app from its app store. Facebook had marketed it as a privacy protecting "VPN," but it was really pretty blatant spyware. Indeed, late last year when yet another Facebook privacy scandal broke, it was revealed that Facebook had been using Onavo data to determine what competitive apps were most popular -- including giving it ideas on what apps to buy or (much more damning) what apps to hinder or block from Facebook.Apparently, even having Apple boot the app didn't give Facebook the idea that maybe this spyware was going a bit too far. Instead, it now appears that Facebook "pivoted" into paying teens to install Onavo on iPhones in a way that routed around Apple's App Store blocks, by saying it was a part of "Facebook Research." And they hid this from Apple by using third party "beta testing" services:
The program is administered through beta testing services Applause, BetaBound and uTest to cloak Facebook's involvement, and is referred to in some documentation as “Project Atlas” — a fitting name for Facebook's effort to map new trends and rivals around the globe.Facebook appears to have desperately wanted all of this data, if it was willing to go these lengths even after Apple had booted Onavo. After TechCrunch broke this story, Facebook claimed that it would stop that program on iPhones, while Apple claims it banned the app before Facebook itself could pull it.For years, people like Jaron Lanier have argued that Facebook should pay its users for all the data they get -- but I think even people who wanted payment would balk a bit at how much access people were giving in exchange for $20/month in gift cards.
“By installing the software, you're giving our client permission to collect data from your phone that will help them understand how you browse the internet, and how you use the features in the apps you've installed . . . This means you're letting our client collect information such as which apps are on your phone, how and when you use them, data about your activities and content within those apps, as well as how other people interact with you or your content within those apps. You are also letting our client collect information about your internet browsing activity (including the websites you visit and data that is exchanged between your device and those websites) and your use of other online services. There are some instances when our client will collect this information even where the app uses encryption, or from within secure browser sessions.”And, of course, the setup required you to keep the app running and spying on everything if you wanted to keep getting paid.Facebook, in response to the TechCrunch story, did its standard PR tap dance, insisting that they weren't hiding anything (Apple's response suggests otherwise, as does the fact that Facebook specifically used these 3rd party services). But, once again, like with so many other Facebook privacy scandals, the reason why so many people get upset about this is because they were not open and transparent about what was going on, and that's why it's so surprising to everyone.The only "good" news is that on the same day all of this came out, it was announced that Facebook has just hired two of its biggest privacy critics to work on privacy issues at the company: EFF's Nate Cardozo and Open Technology Institute's Robyn Greene (*Disclosure: I know both Nate and Robyn, and Nate did, very helpfully, represent us on one issue while he was at EFF.) I know some may cynically see this as Facebook trying to co-opt some of its critics, but both Nate and Robyn have incredibly strong track records on privacy, including being vocally critical of Facebook and its policies. Hopefully this is a sign that the company is actually taking these issues seriously (better a decade too late than never).
There have been some pretty garbage responses to California's amendment of its open records laws, which rolls back the extreme level of opacity shielding police misconduct records. The City of Inglewood gave its police force a zero-accountability parting gift by granting it permission to destroy hundreds of officer-involved shooting files just prior to the new law taking effect.
Over in San Bernardino County, law enforcement -- or at least their union reps -- responded to the new law by petitioning the state Supreme Court for an injunction. The Sheriff's Employees' Benefit Association wanted the law blocked until it could be determined whether or not the law was retroactive. The union claimed making pre-2019 records available to the public would "violate [its] members' rights."
This ran contrary to the assessment of the actual Sheriff and the county's legal counsel, both of whom felt the law applied to old misconduct files.
“In anticipation of SB 1421 taking effect, the Sheriffs Department has been diligently reviewing the changes to the law and carefully considering how to implement these changes,” Blakemore wrote. “Based on this review, and on the advice of counsel, the Department intends to apply these changes retroactively.”
The union can't be thrilled about the new layer of accountability it will be facing going forward. But it seemed particularly aggrieved the new records law would affect old records it assumed would never be turned over to the public. The law doesn't state it only applies to records going forward, so it's reasonable to assume what was once considered non-public is now publicly-accessible.
The union has already heard back from the state's highest court and it's not getting the answer it wanted.
The California Supreme Court on Wednesday denied a sheriff union’s request to block a new state law that provides public access to past police-misconduct and use-of-force records.
The San Bernardino County sheriff’s deputies’ union sought an emergency intervention from the California Supreme Court to block the new law before the New Year.
This won't stop the legal challenges to the law -- not as long as it's not crystal clear whether retroactivity applies. But this at least allows the law to move forward, ensuring that any records generated past the point of enactment are truly public records. Anything prior to January 2019 is going to be hit-and-miss, as it appears state law enforcement agencies don't have a unified take on the law. This will probably be resolved sooner than later, as requests for these previously-secret records are already flowing in.
Permalink | Comments | Email This Story
Read more here]]>
One person in particular, Mike Pocopio, a development coach on the Mavs' staff, referred to Doncic as 'El Matador' and it stuck.Now, 'El Matador' and 'The Matador' have both been trademarked by the Mavs' after they registered the names with the United States Patent and Trademark Office.According to Josh Gerben, the Mavs want the exclusive rights to the name so, should Doncic leave the Mavs one day, he would no longer be able to call himself 'El Matador'.That seems... pretty shitty? We have a rookie athlete doing a great job for his team, building a reputation for himself that results in a nickname, and then his team goes out to lock that nickname up... for what? So that if Doncic goes elsewhere, the team can reapply that nickname to a new player? Come on. What sure seems more likely is that the Mavericks know that Doncic is a thing in basketball circles and want to be able to trade off of their newest star player's persona to the exclusion of him. Not a great look, honestly.So, if athletes now want to claim that they are trademarking all of the things because they're afraid team ownership will undercut them in doing so, that seems valid now. Thanks to the Mavs.
Beijing is speeding up the adoption of facial recognition-enabled smart locks in its public housing programmes as part of efforts to clamp down on tenancy abuse, such as illegal subletting.The face-scanning system is expected to cover all of Beijing's public housing projects, involving a total of 120,000 tenants, by the end of June 2019Although a desire to stop tenancy abuses sounds reasonable enough, it's important to put the move in a broader context. As Techdirt reported back in 2017, China is creating a system storing the facial images of every Chinese citizen, with the ability to identify any one of them in three seconds. Although the latest use of facial recognition with "smart" locks is being run by the Beijing authorities, such systems don't exist in isolation. Everything is being cross-referenced and linked together to ensure a complete picture is built up of every citizen's activities -- resulting in what is called the "citizen score" or "social credit" of an individual. China said last year that it would start banning people with "bad" citizen scores from using planes and trains for up to a year. Once the "smart" locks are in place, it would be straightforward to make them part of the social credit system and its punishments -- for example by imposing a curfew on those living at an address, or only allowing certain "approved" visitors.Even without using "smart" locks in this more extreme way, the facial recognition system could record everyone who came visiting, and how long they stayed, and transmit that data to a central monitoring station. The scope for abuse by the authorities is wide. If nothing else, it's a further reminder that if you are not living in China, where you may not have a choice, installing "smart" Internet of things devices voluntarily may not be that smart.Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+
In a complaint filed on Friday in Los Angeles federal court, MGA Entertainment Inc said no reasonable consumer would mistake Pooey Puitton, which retails for $59.99, for costlier Louis Vuitton handbags.“The use of the Pooey name and Pooey product in association with a product line of ‘magical unicorn poop’ is intended to criticize or comment upon the rich and famous, the Louis Vuitton name, the LV marks, and on their conspicuous consumption."All of which puts the Pooey Puitton bag squarely in the category of protected parody. Beyond that, any claim that the public is going to look at the bag as anything other than a joke played on upon LV, rather than having association with the company, is pretty laughable.But my interest is centered around LV's apparent thinking that anyone is going to mistake a literal piece-of-shit handbag, and think that it was made by Louis Vuitton. That doesn't seem to me to be the kind of claim a luxury handbag maker would want to make, yet here we sit. Or, more likely, the Louis Vuitton folks simply can't help themselves from failing to appreciate the joke and instead have to go the bullying route.
Gaming Like It's 1923: The Newly Public Domain Game JamOn New Year's Day, we launched a special celebration of this milestone year in which new works are finally exiting copyright and entering the US public domain: a public domain game jam.From now until the end of the month, we're accepting submissions of all sorts of games (video games, board games, tabletop RPGs, LARPs, and just about anything else you can dream up...) based on works from 1923 that have finally become free for all to use without fear of copyright issues. There's a bunch of high-profile material to consider, and of course a whole world of lesser-known works that we hope people will dig into for inspiration.At the end of the month, our growing panel of expert judges (including Cory Doctorow, Whitney "Strix" Beltran, Dan Bull, Rebecca Tushnet, Nicky Case, Mark Lemley, Daphne Keller, Jason Scott, Jason Morningstar, J Li, Eric Goldman, Carolyn Homer, Albert Kong) will select winners in six different categories, to receive prizes including Techdirt copyright swag and copies of our recently-Kickstarted card game, CIA: Collect It All:
A case that involves some shocking numbers has resulted in a lawsuit against the DOJ. An investigation into a raid that ended with law enforcement officers putting 59 bullets into the body of an Atlanta resident has dead-ended and it appears to be because the DOJ doesn't want to talk about it.
Jamarion Robinson, a 26-year-old student and football player at Clark Atlanta University, was shot and killed by a team of local and federal officers who broke down the door to his girlfriend’s apartment on Aug. 5, 2016, according to a lawsuit filed Thursday in Atlanta federal court by the office of Fulton County District Attorney Paul Howard.
The DA says he has repeatedly attempted to work with the DOJ to obtain the personnel files and training materials of the officers responsible for Robinson’s death, all to no avail.
“It has now been 875 days since the officers killed Mr. Robinson, and the DOJ has yet to provide any of the documents or evidence requested and has failed to provide any investigative reports relating to Mr. Robinson’s death,” the complaint states.
The opening of the DA's lawsuit [PDF] doesn't explain what Atlanta prosecutors did for the first 275 days, but it does point out the DOJ has been blocking this investigation for nearly two years at this point.
Having been stymied for more than 600 days from receiving any documents from the Department of Justice related to the shooting of Jamarion Robinson, Plaintiff Office of the Fulton County District Attorney (“Plaintiff” or “the District Attorney”) brings this action against Defendant United States Department of Justice (“Defendant” or “the DOJ”) to compel compliance with the Freedom of Information Act, 5 U.S.C. § 552 (“FOIA”).
This FOIA lawsuit is only part of the federal government's problems. The family of Jamarion Robinson has also sued the officers involved in the shooting, which includes the US Marshals Service. This lawsuit appears to be on hold at the moment as everyone suing over the shooting attempts to obtain documents related to Robinson's killing.
The numbers mentioned above -- 59 bullet holes, 600 days of DOJ stonewalling -- are just part of the picture. There's also the number of officers involved and the number of bullets expended to take the life of someone law enforcement apparently had little reason to suspect might respond violently.
On August 5, 2016, 14 law enforcement officers from eight separate local municipal police departments, along with at least one United States Marshal, traveled to the Parkside Camp Creek Luxury Apartments in Atlanta, Georgia to execute a State of Georgia arrest warrant for Jamarion Robinson (hereinafter “Mr. Robinson”). The state arrest warrant alleged that Mr. Robinson committed an aggravated assault in violation of Georgia Code Annotated 16-5-21, a state crime. Mr. Robinson was not charged with any federal crime, and there was not a federal arrest warrant pending for Mr. Robinson.
The DA's lawsuit notes Robinson's only legal problem up to this point was a traffic violation. It also points out Robinson suffered from schizophrenia, which might explain his uncharacteristic decision to allegedly point a gun at police officers (and three tenants of a nearby apartment) days before he was gunned down in his apartment. Supposedly, Robinson fired a shot (or three shots… depending on which statement you read) at the officers attempting to serve a warrant which apparently justified this response.
[T]he officers knocked down the door to the apartment and immediately commenced firing approximately 51 shots from outside into the apartment without any known provocation and with reckless disregard for the safety of anyone else in the apartment and surrounding apartment units.
The officers then entered the apartment and fired approximately 41 additional shots from weapons, including a 9mm submachine gun, a .40mm submachine gun, and a .40 Glock pistol.
After officers fired more than 90 bullets into Robinson's apartment, some claimed Robinson fired at them first. But statements made by other officers and the results of the ensuing search punch holes in this narrative.
At the conclusion of the shooting, a firearm was located, which the officers claimed that Mr. Robinson fired at them three times. However, when the firearm was recovered, it was damaged and inoperable. Moreover, in an investigative report completed by Officer Steve Schreckengost, he did not state that the officers entered the premises because Mr. Robinson was shooting. Rather, Officer Schreckengost claims they entered to protect others inside the apartment from Mr. Robinson, although it was clear from their surveillance no one else was in the apartment.
They wanted to "protect" others from Robinson, but no one involved was interested in Robinson's safety. The team of officers was aware of Robinson's mental health issues and had spoken to his family prior to the raid. But not a single member of the 14-person, multi-office "task force" did anything that might have resulted in a peaceful arrest, like ask for advice, assistance, or third-party search consent from Robinson's family or his current roommate.
Six hundred days of DOJ stonewalling roughly aligns with the agency's reshuffled priorities following Trump's presidential win. The incoming AG (Jeff Sessions) yanked funding from the DOJ's civil rights department and said the agency would no longer be investigating the actions of local law enforcement. If there are any documents to be obtained from the DOJ, they're likely in the process of being massaged into exonerative shape before being released.
The delightful dancing video of AOC that is being circulated right now* is actually part of a pretty storied, if now mostly forgotten, remix culture phenomenon. If you'll allow me...--
* apparently by numbskulls incapable of joy— Parker Higgins (@xor) January 3, 2019
NOT ONLY DO WE WELCOME THE ILLUSTRATIVE USE OF OUR MUSIC FOR EDUCATIONAL PURPOSES, BUT, MORE BROADLY, WE ENCOURAGE PEOPLE GETTING INSPIRED AND MAKING THEIR OWN VERSIONS OF OUR SONGS AND VIDEOS AND POSTING THE RESULT ONLINE.ONE OF THE GREAT BEAUTIES OF THE DIGITAL ERA IS TO LIBERATE SPONTANEOUS CREATIVITY - IT MIGHT BE A CHAOTIC SPACE OF FREE ASSOCIATION SOMETIMES BUT THE CONTEMPORARY EXPERIENCE OF DIGITAL RE-MEDIATION IS ENORMOUSLY LIBERATING.WE DON'T FEEL THE LEAST ALIENATED BY THIS; APPROPRIATION AND RECONTEXTUALIZATION IS A LONG-STANDING BEHAVIOR THAT HAS JUST BEEN MADE EASIER AND MORE VISIBLE BY THE UBIQUITY OF INTERNET.IN A FEW WORDS:WE ABSOLUTELY SUPPORT FAIR USE OF OUR MUSIC,AND WE CAN ONLY ENCOURAGE A NEW COPYRIGHT POLICY THAT PROTECTS FAIR USE AS MUCH AS EVERY CREATORS' LEGITIMATE INTERESTS.So, we have a copyright policy that pissed off the actual artists -- and only served to stifle or silence many people who were building off of it in truly creative ways that enabled a community endeavor. As Julian noted in his talk (and Lessig specifically called out), a big part of the question here is "what level of control copyright has over our social realities" and how copyright policy that is too locked down serves to limit our ability to express and share our social realities.In his big thread, almost as an aside, Parker made a key point in this discussion that is worth repeating (over and over and over again):
Sometimes copyright maximalists seem to live in a world where every use of culture can be enumerated, quantified, and licensed. But that's not how culture works. Not at all.— Parker Higgins (@xor) January 3, 2019
LMFAO - Party Rock Anthem pic.twitter.com/cIVWdFQFm7— AOC Dances To Every Song (@aoc_dances) January 4, 2019
C418 - Haggstrom (from Minecraft) pic.twitter.com/bxhJve6SUp— AOC Dances To Every Song (@aoc_dances) January 4, 2019
Selena - Bidi Bidi Bom Bom pic.twitter.com/p9VSYIGcs9— AOC Dances To Every Song (@aoc_dances) January 4, 2019
Kenny Loggins - Footloose pic.twitter.com/igyR1ixPqt— AOC Dances To Every Song (@aoc_dances) January 4, 2019
I hear the GOP thinks women dancing are scandalous.Wait till they find out Congresswomen dance too! 💃🏽Have a great weekend everyone :) pic.twitter.com/9y6ALOw4F6— Alexandria Ocasio-Cortez (@AOC) January 4, 2019
At this point, the issue could have been resolved without any fuss, but things quickly got out of hand. Thunderball Clothing wasn’t planning to pay and reached out to the band, accusing the photographer of making threats. The band and the singer sided with the clothing company and sponsor, arguing that a payment is not required. Apparently, the band’s management is under the impression that the band, fans, and sponsors can use the work of photographers free of charge. In return, they get exposure.“I would like to ask why you are sending discontent emails to people sharing the photo of Alissa? Alissa’s sponsors and fan clubs are authorized to share photos of her. Thunderball Clothing is a sponsor of Alissa and Arch Enemy,” they replied. “Generally speaking, photographers appreciate having their work shown as much as possible and we are thankful for the great photos concert photographers provide,” the band’s management added.Now, much of that is true. Photographers do get exposure through channels like this. Exposure for their work generally and, in the music space, exposure to other musical acts to use their services. On the other hand, it really isn't up to the band whether or not to authorize their partners' use of these photographs which are, unless otherwise stated in a contract somewhere, covered by copyright for the photographer. It also is the case that Salmeron's request wasn't exactly unreasonable in terms of the amount or the recipient. This, in other words, is pretty tame stuff in the world of copyright infringement. So... both sides of this equation have valid stances. And, one would imagine, something should have been easily worked out given that.Unfortunately, it seems every side decided to go full nuclear.
After some messages back and forth, the photo was eventually removed, but the band also made it very clear that Salmeron is no longer welcome at any future gigs.“By the way, we are sure you don’t mind that you are not welcome anymore to take pictures of Arch Enemy performances in the future, at festivals or solo performances,” the reply read. “I have copied in the label reps and booking agent who will inform promoters – no band wants to have photographers on site who later send such threatening correspondence to monetize on their images.”And then the responses from many of the band's fans, many of whom do photography work, was to hurl snark at the band and suggest that its stance on copyright for the photographer be applied to the band's work as well. A whole bunch of people tweeted at the band, suggesting that instead of buying their latest album, they would just download it and that the band should consider that free exposure for themselves. Now, that analogy doesn't really hold, of course, but the point is clear.And so basically everyone loses here. The band has pissed fans. The photographer isn't on the Arch Enemy beat any longer. The merch company had to take the photo down. And, again, all this over 100 euro? Come on.
Having gotten it into his head that teachers are "indoctrinating" the mushy minds of school students, an Arizona lawmaker has introduced a bill almost certainly headed for a Constitutional challenge.
State Rep. Mark Finchem wants to ban public and charter school teachers from spreading “controversial” political, racial and religious messages in their classrooms.
The Oro Valley Republican introduced House Bill 2002 in the Legislature last week. If it passes, teachers could face consequences as severe as losing their jobs for engaging in any “political, ideological or religious” advocacy or discussion with their students.
The bill [PDF] introduces, among other things, a requirement for teachers to attend three hours of annual "ethics training" and adopt a strict "ethics code" that prevents them from talking about a long list of things Rep. Finchem finds "controversial." The list begins with blocking teachers from advocating for political parties, candidates, and legislation, which already makes part of the bill redundant.
State law already bars public and charter school employees from using school resources, including personnel, to influence the outcome of an election.
But that's only part of the list of forbidden subjects. The bill also forbids teachers from:
Discussing any litigation making its way through the nation's courts.
Introducing "controversial issues" not related to the course being taught
Endorsing any activity that "hampers or impedes lawful access of military recruiters to the campus"
Endorsing or engaging in any activity that "hampers or impedes the actions" of law enforcement
"Singling out" one racial group as "being responsible" for the suffering of another race
It also introduces some weird form of "Fairness Doctrine" by demanding teachers provide resources supporting both sides of any controversial subject that somehow makes it way past Rep. Finchem's speech barrier. These multiple incursions on the First Amendment are followed by dubious "findings" Finchem wants to have codified as legislative facts.
A. The legislature finds and declares that:
1. The purpose of public education in Arizona is to produce knowledgeable and competent adults who are able to participate as informed citizens in the democratic process of selecting representation in our constitutional republic.
2. Education in a democracy is best served by teaching students how to think, not telling them what to think. Our country is divided over many issues affecting its citizens. It has been established through surveys that a majority of K-12 teachers discuss controversial issues in their classrooms.
3. It has been established that some teacher training institutions, teacher licensing agencies, state education departments and professional teacher organizations have condoned and even encouraged this behavior under the guise of "teaching for social justice" and other sectarian doctrines. Time spent on political or ideological indoctrination takes time away from instruction in the academic subjects taught by public educational institutions, including the foundational subjects of mathematics, science, English, history and civics, and prevents students from receiving the best possible public education as funded by the taxpayers of this state.
4. Parents and taxpayers have a right to expect that taxpayer resources will be spent on education, not political or ideological indoctrination.
Perhaps Mark Finchem will allow these many surveys supporting his indoctrination theory to be read into the state record along with the rest of his bullshit bill. Finchem claims a "stunning number" of calls from concerned parents has prompted this action, rather than the organized #RedForEd educator walkout that accompanied educators' demands for increased funding.
There's no chance this bill survives a Constitutional challenge if it somehow becomes law. Restrictions on speech -- even that of government employees -- demands a narrow crafting. Targeting speech with legislation requires a sniper's mentality. Finchem is carrying a shotgun loaded with birdshot and hoping it's enough to prevent speech he doesn't like from being spoken in the state's classrooms.
Permalink | Comments | Email This Story
Read more here]]>
While many PreDb-style sites monitor for ‘Scene’ releases using information culled from IRC, SweTracker monitors BitTorrent trackers and publishes information on who won the ‘race’ to put content online first. It does not link to any pirate content whatsoever but anti-piracy companies regularly report the site to Google.And, yet, SweTracker has been reported to Google hundreds of times in the past year alone as hosting illegal content. These reports have largely flooded in from antipiracy outfits, despite the simple fact that SweTracker hosts no infringing files and instead only reports on factual information. The site's operator mostly shrugs his shoulders at all of this, but also points the general impression he has that antipiracy outfits don't have a clue as to what they're doing.
“My personal experience with [anti-piracy companies] is that they don’t really know how stuff works. They often state that users can download or stream movies directly from SweTracker, but that’s simply not true,” he explains. “But, I try to make life easy and do remove the releases they ask me to remove. They have contacted me via email several times.”It almost goes without saying that SweTracker isn't some outlier in all of this. It's also worth noting that this sort of harassment doesn't typically end with a sternly worded email. Instead, Google often errs on the side of delisting the links in its search results, and antipiracy outfits often times go to site host providers and try to get the sites taken down entirely.
PreDb.org states clearly on its main page that “There are absolutely NO downloads of copyright-protected works, hyperlinks to downloads, torrent files, magnet links, nzb files or similar content on any part of this web site” but that doesn’t prevent complaints.Google’s Transparency Report indicates that at the time of writing, PreDb.org has had 2,204 URLs reported by content and anti-piracy companies, with Google removing the links from its indexes approximately 65% of the time.To be clear, antipiracy outfits are censoring simple factual data in the name of copyright. Whether or not you find the factual data in question interesting or useful is entirely besides the point and doesn't make a lick of difference in the validity of the takedowns. Here we are, fresh into 2019, with rightsholders and antipiracy groups waging a clusterbomb war against piracy as their precision in doing so goes largely unquestioned, all while very real collateral damage is endured by innocent sites.Keep that in mind whenever copyright maximalists ask for just a bit more power to censor the internet.
The prosecution of former NSA contractor Hal Martin continues. Martin somehow managed to exfiltrate sensitive documents and code for nearly 20 years without the NSA noticing. It finally started paying attention after its hacking tools and exploits made their way into the hands of the public via the "Shadow Brokers." These tools then made their way into the computers of the public, wreaking worldwide havoc and giving the leaky agency -- whose literal middle name is "Security" -- another PR black eye.
Hal Martin was suspected of handing over tools to the Shadow Brokers but the charges against him are solely related to the mishandling of classified info, indicating the feds no longer believe Martin was involved. But this original suspicion was apparently enough to justify the FBI raid of Martin's residence, according to the federal judge handling his case. The probable cause appears to have been generated by a tweet from Martin's Twitter account, at least according to what can be gleaned from the redacted order [PDF] handed down by Judge Richard Bennett. Josh Gerstein of Politico has the details.
Passages in the decision from U.S. District Court Judge Richard Bennett were deleted from a version made public by the court, but the remaining details suggest that investigators believed Martin was offering sensitive information to someone online shortly before a nebulous internet-based entity, the Shadow Brokers, released NSA hacking tools in August 2016 through the attention-grabbing technique of an online auction.
“In these messages, @HAL_999999999 asked for a meeting with the [redacted] and stated ‘shelf life, three weeks,’” Bennett wrote, describing the government’s assertions in court filings still under seal. “The Defendant’s Twitter messages … were sent just hours before what was purported to be stolen government property was advertised and posted on multiple online- content-sharing sites, including Twitter.”
These details have been made public as the result of Martin's attempt to suppress the evidence gathered against him. The court notes the tweet could have had a more innocuous meaning, but given the circumstances and the timing, it was not unreasonable for the FBI to believe Martin may have been involved in the leaking of classified NSA exploits.
That's not the only rejection handed to Martin. The court also denies his request to have cell-site location info obtained without a warrant suppressed, noting that the government obtained this data before the Supreme Court handed down its decision in Carpenter.
However, a key bit of evidence is no longer the government's to use: Martin's own statements. The court says the government illegally obtained these statements by not properly Mirandizing Martin prior to questioning him. There is no doubt Martin was in custody at the time he was questioned without a Miranda warning. The government denies Martin was ever taken into custody, but the court points out a person who doesn't feel they're free to go is being held against their will, which is all it takes to define "custody."
In this case, the facts demonstrate ~at a reasonable person in the Defendant's position would have perceived a police dominated atmosphere before and during the interrogation. The Defendant was initially approached by nine SWAT agents dressed in protective gear, some of whom had their guns drawn at the Defendant... Multiple other officers were also on the scene, including eight FBI agents and three State Trooper vehicles - a fact that "goes a long way towards making the suspect's home a police dominated atmosphere." The Defendant was immediately placed face down on the ground and handcuffed, "demonstrating that the officers sought out [the Defendant] and had physical dominion over him."
Although the Defendant's handcuffs were removed prior to the interrogation, "the experience of being singled out and handcuffed would color a reasonable person's perception of the situation and create a reasonable fear that the handcuffs could be reapplied at any time."
Further, after his initial detention, the Defendant was interrogated by three agents for approximately four hours.ll During the interrogation, the agents confronted the Defendant with incriminating evidence discovered on his property, which may certainly cause a reasonable person to feel compelled to cooperate with the police. Moreover, the Defendant's freedom of movement was significantly restricted during the interrogation. Indeed, he was only permitted to leave the interrogation space once -- i.e., when he went to his home office to help Hajeski access his computer equipment -- at which time he was accompanied by agents. In addition, the Defendant was isolated from his partner until the end of the interrogation -- a tactic that the Supreme Court has recognized as one of the distinguishing features of a custodial interrogation.
[...]
Taken together, these facts demonstrate that a reasonable person in the Defendant's position would have felt that he was not free to leave.
The government still records a win on most of the suppression motion. It's difficult to tell how solid the underlying warrant affidavit actually is since it -- along with several other filings -- are still under seal. It's also unclear how much ammo Martin's defense had when mounting this challenge. If the government was granted the opportunity to engage in ex parte presentations of evidence, Martin's team could be working blind.
His team may be working partially blind anyway. There's reason to believe the government is now a whole lot more cagier about its classified/sensitive evidence after accused CIA hacking tool leaker Josh Shulte was found to be leaking documents from prison -- documents he apparently obtained as part of the government's discovery obligations. It will likely be months before the public sees any part of the government's warrant affidavit. It may be years before anyone other than this court sees all of it. Still, an ambiguously-worded tweet seems like pretty thin probable cause, even if its timing seemed to align with the Shadow Brokers' actions at the time the warrant was sought.
Permalink | Comments | Email This Story
Read more here]]>
Gaming Like It's 1923: The Newly Public Domain Game JamHappy new year, everyone. Every year, soon after the new year, we post a somewhat disappointing post describing how, once again, no new works have gone into the public domain in the US, because various lobbying interests have continued to extend copyright over and over again, with the last such extension coming in 1998 (the last time old works automatically entered the public domain in the US), better known as the Sonny Bono Copyright Term Extension Act. It's been 21 years of nothing, and that's been quite sad. But this year is different. Thanks to public interest in copyright and people getting increasingly angry about our locked up culture, Hollywood didn't even make a serious attempt to extend copyrights again (to be fair, they put out some feelers, and when they realized it would be a total disaster, they let it go).So this year, we've been seeing tons of celebratory articles, highlighting how works from 1923 are finally entering the public domain (WAY later than they should have, but not much we can do about that now). So, it's time to celebrate. And what good is a public domain if you don't do anything with it? So, today, now that these works are in the public domain, we're announcing the Gaming Like It's 1923 Newly Public Domain Game Jam. We've teamed up, once again, with Randy Lubin from Diegetic Games, who was our partner on the (public domain) CIA: Collect It All card game, to run this game jam.If the idea of a game jam is new to you, it's pretty simple: it's just a month-long contest for you to create games: these can be video games, board games, card games, RPGs, interactive fiction, etc. The one key requirement: it must use something from 1923 that has just entered the public domain. Those works are free for anyone to use, and we should celebrate that by actually making use of them to do something fun. So go create a game and submit it. There are some more details on the rules/restrictions and some pointers on the game jam page. Go make Sonny Bono proud (despite the fact that he believed that, contrary to the Constitution, copyright should last forever). We're offering up copies of our CIA game and some of our copyright-related t-shirts as prizes.If you need some source material for inspiration, Duke's Center for the Study of the Public Domain already has a nice page of highlights of newly public domain material, as well as a nice spreadsheet with even more works. Also, there have been a ton of news articles in the lead up to this first US public domain day in twenty-one years, that might also get you thinking. Here's ones from the Smithsonian, the NY Times, BoingBoing, NPR, Quartz, Motherboard, The Stranger and Slate, so start hunting around for great cultural works to build on...We've already put together an all-star cast of judges, mixing folks from both the worlds of gaming and copyright/public domain, including folks like Cory Doctorow, Whitney "Strix" Beltran, Dan Bull, Rebecca Tushnet, Nicky Case, Mark Lemley, Daphne Keller, Jason Scott, Jason Morningstar, J Li, Eric Goldman, Carolyn Homer, Albert Kong and we'll likely be naming a few more judges over the course of the month. Stay tuned.
Permalink | Comments | Email This Story
Read more here]]>