![]() |
by Mike Masnick on (#3FZTX)
For the past few months, we've talked about how FBI Director Chris Wray has more or less picked up where his predecessor, James Comey, left off when it came to the question of encryption and backdoors. Using a contextless, meaningless count of encrypted seized phones, Wray insists that not being able to get into any phone the FBI wants to get into is an "urgent public safety issue."Of course, as basically every security expert has noted, the reverse is true. Weakening encryption in the manner that Wray is suggesting would create a much, much, much bigger safety issue in making us all less safe. Hell, even the FBI used to recommend strong encryption as a method to protect public safety.Last month, we wrote about a letter sent by Senator Ron Wyden to Wray, simply asking him to list out the names of encryption experts that he had spoken to in coming to his conclusion that it was possible to create backdoors to encryption without putting everyone at risk.
|
Techdirt
Link | https://www.techdirt.com/ |
Feed | https://www.techdirt.com/techdirt_rss.xml |
Updated | 2025-08-25 21:47 |
![]() |
by Karl Bode on (#3FZ9Z)
By now it's pretty apparent that the FCC doesn't much want to talk about who was behind the numerous bogus comments that flooded the agency's net neutrality repeal proceeding. When I asked the FCC for help after someone lifted my identity to support repealing the rules, the FCC responded with the policy equivalent of a ¯\_(ツ)_/¯. Similarly, when New York Attorney General Eric Shneiderman approached the FCC looking for help identifying the culprit (9 requests over 5 months, he said in an open letter), the FCC blocked the investigation.Most analysts believe the effort was a ham-fisted attempt to erode trust in the public comment proceeding in order to downplay massive public opposition to the FCC's plan (a tactic that has mysteriously plagued other government proceedings over the last year). The FCC could pretty quickly clear this all up by providing access to server logs and API key usage details to law enforcement. Its consistent refusal to do so quickly dismantles agency boss Ajit Pai's continued, breathless claims that he's a massive fan of transparency and would run a more transparent operation than his predecessor.This week, members of the House Committee on Energy and Commerce sent a letter to Pai again asking him to explain (pdf) why the FCC ignored the public and sat on its hands as millions of bogus comments (some of them from dead people) piled up. Included in the questions were inquiries regarding how the FCC (which says it ignored comments "devoid of substance") determined what public comments were worth paying attention to, if any:
|
![]() |
by Timothy Geigner on (#3FYWK)
We've had ongoing discussions on this site about the ham-fisted website censorship policy that Russia has undertaken over the past few years. While the country was never one to embrace free and open speech and communication to the same degree as Western nations, recent times have seen a severe uptick in outright censorship with a variety of excuses rolled out for public consumption: copyright laws, stifling political opposition, and the protection of the privacy of public figures. The funnel point for all of this censorship is Russian agency Rozcomnadzor, itself the subject of corruption allegations, with a track record for racking up collateral damage numbers that would make any nation's army blush.Through it all, there have been suggestions that entire sites with massive global followings would be blocked. YouTube and Twitter were previously found to be in the crosshairs of the Russian government, but nothing immediately came of the threat. Now, however, both YouTube and Instagram may face a very real choice: bow to the censorship demands of Rozcomnadzor or face full site-blocks in Russia. And, perhaps most strangely, this has all come to a head over a Russian billionaire's win in court to block the publication of photos and videos showing him on a yacht with what is reportedly an escort.
|
![]() |
by Glyn Moody on (#3FY71)
AI is hot, and nowhere more so than in China:
|
![]() |
by Mike Masnick on (#3FXNZ)
Well, that was incredibly quick. The district court judge hearing the case that Playboy filed against BoingBoing back in November has already dismissed it, though without prejudice, leaving it open for Playboy to try again. The judge noted that, given the facts before the court so far, it wasn't even necessary to hold a hearing, since BoingBoing was so clearly in the right and Playboy so clearly had no case. While the ruling does note that Playboy and its legal team can try again, it warns them that it's hard to see how there's a case here:
|
![]() |
by Timothy Geigner on (#3FXHC)
As some of you may be aware, Safer Internet Day just passed. Started in the EU, the day is supposed to be used to educate the masses on some dangers that are tangentially or directly connected to the internet, such as malware awareness, cyberbullying, or abuses on social media sites. It's also heavily supported by the Industry Trust for IP Awareness, which is a UK entertainment industry group that chiefly looks to "educate" the public on how super-awesome copyright is in every respect and how piracy and copyright infringement are the work of Satan.In a video titled... and I can't believe I'm going to actually type this... Meet the Malwares, viewers in Australia are "educated" on exactly zero specific malware threats, but they are told that filesharing sites should be avoided completely. And if you're thinking that there are a ton of other parts of the internet that are far riskier, rest assured that the video insists it's all about file sharing sites.
|
![]() |
by Tim Cushing on (#3FXAG)
When bad things happen, bad laws are sure to follow. The state of Georgia has been through some tumultuous times, electorally-speaking. After a presidential election plagued with hacking allegations, the Georgia Secretary of State plunged ahead with allegations of his own. He accused the DHS of performing ad hoc penetration testing on his office's firewall. At no point was he informed the DHS might try to breach his system and the DHS, for its part, was less than responsive when questioned about its activities. It promised to get back to the Secretary of State but did not confirm or deny hacking attempts the state had previously opted out of.To make matter worse, there appeared to be evidence the state's voting systems had been compromised. A misconfigured server left voter records exposed, resulting in a lawsuit against state election officials. Somehow, due to malice or stupidity, a server containing key evidence needed in the lawsuit was mysteriously wiped clean, just days after the lawsuit was filed.Rather than double down on efforts to secure state voting systems, the state legislature has decided to expand the definition of computer crime. A CFAA but for federalists has been introduced in the state Senate. And it could possibly lead to criminalizing a whole lot of benign computer use.
|
![]() |
by Karl Bode on (#3FX62)
If you've been around a while, you probably know that Verizon has an adversarial relationship with openness and competition. The company's history is rife with attempts to stifle competing emerging technologies that challenged Verizon's own business interests, from its early attempts to block GPS and tethering apps so users would have to subscribe to inferior and expensive Verizon services, to its attempts to block competing mobile payment services to force users (again) onto Verizon's own, inferior products. And that's before you get to Verizon's attempts to kill net neutrality and keep the broadband industry uncompetitive.In the earlier years, Verizon had a horrible tendency to lock down its devices to a crippling and comical degree. But with the rise of net neutrality, competition from carriers like T-Mobile, and open access conditions affixed to certain spectrum purchased by Verizon, the company slowly-but-surely loosened its iron grip on mobile devices. But let's be clear: the company had to be dragged, kicking and screaming, into the new, more open future we all currently enjoy, where (by and large) you can install whatever apps you like on your device, and attach most mainstream devices (with some caveats) to Verizon's network.That's why more than a few eyebrows were raised after Verizon gave CNET the early exclusive news (apparently in the hopes that they'd frame it generously, which they did) that the company will soon be locking down its smartphones as part of a purported effort to "combat theft." Carriers have been justly criticized (and sued) for doing too little to prevent theft, in part because they profit on both sides of the equation -- both when a customer comes crying to Verizon to buy a new phone, and when the user with the stolen phone heads to Verizon to re-activate it on a new line.On its surface, Verizon's plan doesn't seem to have much of an initial impact on traditional users, who'll still get to have their phone unlocked after an unspecified amount of time. The only initial problems that could arise involve users who buy a phone, then head overseas to insert a local SIM to get more reasonably-priced service. Those users may have to contact Verizon before that phone will work, something that may or may not be a pain in the ass in real-world practice.But it's more the precedent of the move that has people familiar with Verizon's handiwork on this front a little nervous. Especially given Verizon's recent successes in not only killing net neutrality, but gutting most state and federal oversight of ISPs entirely (something many haven't keyed into yet). For one, locking down its devices technically violates the "Carterfone" open access rules affixed to the 700MHz spectrum used in Verizon's network. Verizon was quick to insist to CNET that this shift back toward locking down devices does not violate the "spirit of the agreement":
|
![]() |
by Daily Deal on (#3FX3E)
Whether you run your own website or build sites professionally, it's extremely valuable to have a theme library at your disposal. The Dessign Premium WordPress Themes collection features more than 170 fully responsive, beautiful themes designed to make your sites stand out. With unlimited access to a continually updating library and a license that permits use on an unlimited number of sites, your future WordPress sites will never be short on style. The membership to Dessign is on sale for $29.Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.
|
![]() |
by Mike Masnick on (#3FWXG)
Back in 2016 we wrote about how Landis+Gyr, a large multinational company owned by Toshiba, completely freaked out when it discovered that documents about its smart energy meters, which the city of Seattle had contracted to use, were subject to a FOIA request. As we noted, Landis+Gyr went legal and did so in perhaps the nuttiest way possible. First it demanded the documents be taken down from Muckrock -- the platform that makes it easy for journalists and others to file FOIA requests. Then it demanded that Muckrock reveal the details of anyone who might have seen the documents in question. It then sued Muckrock and somehow got a court to issue a temporary restraining order (TRO) against Muckrock for posting these public records.Eventually, with help from EFF, Landis+Gyr agreed to a settlement that stated that these documents were (a) public records and (b) the company would no longer attempt to take down the copies that Muckrock had obtained. From the settlement agreement posted on the public docket in the case:
|
![]() |
by Karl Bode on (#3FWB8)
As we've been discussing, the rise of stealth cryptocurrency miners embedded on websites has become a notable problem. In some instances, websites are being hacked and embedded with stealth cryptocurrency miners that quickly gobble up visitors' CPU cycles without their knowledge. That's what happened to Showtime recently when two different domains were found to be utilizing the Coinhive miner to hijack visitor broswers without users being informed. Recent reports indicate that thousands of government websites have also been hijacked and repurposed in this fashion via malware.But numerous websites are also now exploring such miners voluntarily as an alternative revenue stream. One major problem however: many aren't telling site visitors this is even happening. And since some implementations of such miners can hijack massive amounts of CPU processing power while sipping a non-insubstantial amount of electricity, that's a problem.The Pirate Bay for example was forced to stop using visitor CPUs and browsers to mine Monero last fall after Reddit users complained the miner was slowing down their PCs and eating up 80% of their CPU cycles. The website stated that it was simply exploring new revenue streams to keep the website afloat:
|
![]() |
by Tim Cushing on (#3FVZX)
ICE has been instructed to make the nation safer by deporting the "worst of the worst." The nation will be made secure again, said the DHS, pointing to its report declaring three-quarters of those convicted for terrorism offenses were "foreign-born." Of course, to reach this ratio, the DHS had to count people the US government had extradited to the US to face trial for terrorism attacks committed in foreign countries, but whatever. The point is: foreigners are dangerous and ICE is going to remove them. An ongoing "challenge" for ICE has been finding enough dangerous immigrants to deport, so it's had to change its strategy a bit.So, if we're trying to root out would-be terrorists and MS-13 gang members and undocumented immigrants with long domestic criminal rap sheets, why is ICE targeting people for their First Amendment activities? That's what one rights activist wants to know, and he's taking ICE to court to force it to explain itself. Kevin Gosztola of ShadowProof has more details.
|
![]() |
by Timothy Geigner on (#3FV8T)
Now that we've covered a couple of stories about game companies, notably Blizzard, bullying the fans that run antiquated versions of MMO games on their own servers to shut down, it's as good a time as any to discuss a recent call for the DMCA anti-circumvention exemptions to include the curation of abandoned MMO games. A few weeks back, during the triennial public consultation period in which the U.S. Copyright Office gathers public commentary on potential exemptions to the DMCA's anti-circumvention provisions, a bunch of public comments came in on the topic of abandoned video games. Importantly, the Librarian of Congress already has granted exemptions for the purpose of preserving the art of video games so that libraries and museums can use emulators to revive classic games for the public.But what do you do if you're looking to preserve a massive multiplayer online game, or even single-player games, that rely on server connections with the company that made those games in order to operate? Those servers don't last forever, obviously. Hundreds of such games have been shut down in recent years, lost forever as the companies behind them no longer support the games or those that play them.Well, one non-profit in California, The Museum of Art and Digital Entertainment, wants anti-circumvention exemptions for running servers for these games to keep them alive as well.
|
![]() |
by Mike Masnick on (#3FTW6)
Last year, we wrote about how a relatively new patent trolling operation had pretty clearly picked the wrong target in suing internet infrastructure provider Cloudflare with a sketchy patent (US Patent 6,453,335 on "providing an internet third party data channel.") Cloudflare decided not only to fight the case, but to fight all of Blackbird's patents, crowdsourcing and funding searches into prior art on any patent held by Blackbird Technologies, and arguing that the company was engaging in questionable legal practices -- acting both as a patent holding company and a law firm, while sometimes pretending not to be a law firm (despite employing mostly lawyers) to avoid some serious ethics questions.On Monday, Cloudflare received a fairly complete victory, with the judge easily dismissing the case and pointing out that the '335 patent was clearly invalid:
|
![]() |
by Leigh Beadon on (#3FTM5)
A couple of weeks ago, Mike was in Washington, DC for the State Of The Net conference, where he participated in a panel called Internet Speech: Truth, Trust, Transparency & Tribalism. For this week's podcast, we've got the audio from that conversation with all sorts of interesting ideas about how people are dealing with fake news, trolls, propaganda and more.Follow the Techdirt Podcast on Soundcloud, subscribe via iTunes or Google Play, or grab the RSS feed. You can also keep up with all the latest episodes right here on Techdirt.
|
![]() |
by Karl Bode on (#3FTDF)
The rise of cryptocurrency mining software like Coinhive has been a decidedly double-edged sword. While many websites have begun exploring cryptocurrency mining as a way to generate some additional revenue, several have run into problems if they fail to warn visitors that their CPU cycles are being co-opted in such a fashion. That has resulted in numerous websites like The Pirate Bay being forced to back away from the software after poor implementation (and zero transparency) resulted in frustrated users who say the software gobbled upwards of 85% of their available CPU processing power without their knowledge or consent.But websites that don't inform users this mining is happening are just one part of an emerging problem. Hackers have also taken to using malware to embed the mining software into websites whose owners aren't aware that their sites have been hijacked to make somebody else an extra buck. Politifact was one of several websites that recently had to admit its website was compromised with cryptocurrency-mining malware without their knowledge. Showtime was also forced to acknowledge (barely) that websites on two different Showtime domains had been compromised and infected with Coinhive-embedded malware.While Bloomberg this week proclaimed that governments should really get behind this whole cryptocurrency mining thing, the reality is that numerous governments already have -- just not in the way they might have intended. Security researcher Scott Helme this week discovered that more than 4,000 U.S. and UK government websites -- including the US court system website -- have been infected with cryptocurrency mining malware, a number that's sure to only balloon.As Helme notes, attackers don't need to even attack each website individually, as they've found a way to compromise shared resources like Text Help, whose modified script files were then loaded by thousands of websites at a pop:
|
![]() |
by Mike Masnick on (#3FT8S)
Visit EveryoneCreates.org to read stories of creation empowered by the internet, and share your own! »Last week we announced our new site EveryoneCreates.org, featuring stories from many different creators of music, books, movies and more about how important the internet and fair use have been to their creations. As we noted, the reason for the site is that the legacy copyright gatekeepers at the MPAA and the RIAA have been using the Trump-requested NAFTA renegotiations to try to undermine both fair use and internet safe harbors by positing a totally false narrative that the internet has somehow "harmed" content creators.Yet, as we know, and as the stories from various artists show, nothing is further from the truth. For most artists and content creators, the internet has been a huge boon. It has helped them create new art, share it and distribute it to other people, build a fan base and connect with them, and make money selling either their work or related products and services. As we've discussed before, in the past, for most artists, if you did not find a giant gatekeeper to take you on, you were completely out of the market. There was very little "long tail" to be found in most creative industries, because you either were "chosen" by a gatekeeper or you went home and did something else. But the internet has changed that. It has allowed people to go directly to their audiences, or to partner with platforms that help anyone create, distribute, promote and monetize. Indeed, the internet has undoubtedly helped everyone reading this to create art -- whether for profit or just for fun. And if that's the case with you, please share your story.But it is worth taking a step back and asking an even larger question: how the hell did we get here? How did we get to the point that the MPAA and the RIAA are using NAFTA negotiations to try to undermine the internet. Rest assured: there's a long, long history at play here, and it's important to learn about it. The idea that you can or should regulate the internet or intellectual property in trade agreements should seem strange to most people -- especially as most trade agreements these days are about increasing free trade by removing barriers to trade, and copyright by its very nature is mercantile-style trade protectionism that places artificial limits and costs on trade that might otherwise be cheaper.An excellent history on this topic comes from the aptly named 2002 book Information Feudalism: Who Owns the Knowledge Economy by Peter Drahos and John Braithweaite. It tells the story of how a concerted effort by legacy copyright maximalist organizations laid the groundwork for making sure that copyrights and patents were always included in trade agreements, by getting them in as a key part of the World Trade Organization and by the creation of TRIPS -- Trade-Related Aspects of Intellectual Property Rights. The book details how the legacy industries turned "intellectual property" from a question of benefiting the public to a solely commercial arena of corporate ownership and trade.Once that was in place, these same industries wasted little time in exploiting the reframing of issues around copyright and patents. Famously, the DMCA itself was created in this manner. The record labels and movie studios had a friend in the Clinton White House in Bruce Lehman, who wrote a white paper in 1995 requesting draconian changes to copyright law targeting the internet. However, he found little support for it in Congress. Five years ago, Lehman himself admitted that when Congress refused to act he did "an end-run around Congress" by going to Geneva and pushing for a trade agreement via the World Intellectual Property Organization (WIPO) which required DMCA-like copyright rules.With that treaty in hand, Lehman and his Hollywood friends came back to Congress, insisting that our "international obligations" now required Congress to create and pass the DMCA, or we'd suddenly face all sorts of trade and diplomatic problems for failing to live up to those "international obligations" that they themselves had put into the trade agreement. Indeed, ever since then, nearly every international trade agreement has included some crazy provisions related to copyright and patents and other IP rights -- all designed to effectively launder these laws through the highly opaque international trade negotiation process, and then insist that legislatures in various countries simply must ratchet up their laws to meet those obligations.Given all that, there's at least some irony in the fact that these same groups that forced the DMCA on Congress through an international trade agreement back in the mid-1990s are now trying to use a different trade agreement 20 years later to force changes to that very same law (and others). Once again, the process is opaque. And once again, the industry is well connected and represented on a variety of the "Industry Trade Advisory Committees" (ITACs), giving them much greater access to the details of the negotiations while the public is kept in the dark.But the history here is clear. Moving copyright into trade agreements was a purposeful move, pushed for by legacy industries so they could promote their favored protectionist laws around the globe, in part by moving them away from being designed for the public's benefit and towards a world in which information and knowledge was considered to be privatized, owned, and locked up by default. It ignored the fact that, often, the public can benefit the most when information is open and widely shared. And, decades later, we're still dealing with the fallout from these bad decisions.And that's why it's so important for policy makers to understand that it's complete hogwash to argue that the RIAA and MPAA are "representing artists" in trying to undermine the internet this way. Most artists recognize that the internet and various platforms are a key part of their ability to create, distribute, share, and support their artwork these days -- and they are not being represented at the NAFTA negotiating table.Share your story at EveryoneCreates.org to let policymakers know how important an open internet and fair use is to your own creativity.
|
![]() |
by Daily Deal on (#3FT8T)
Although it can be confusing and overwhelming, it's absolutely essential that you have at least a basic knowledge of finance. Whether you're pursuing a career in the finance industry or you just need a solid refresher on important concepts, the eduCBA Finance and Investments Bundle can help you out. With access to 700+ courses, you'll develop an understanding of investment banking, financial modeling, project finance, private equity, accounting, and more. This bundle is on sale for $29.Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.
|
![]() |
by Tim Cushing on (#3FT1S)
In recent months, both Deputy Attorney General Rod Rosenstein and FBI Director Christopher Wray have been calling for holes in encryption law enforcement can drive a warrant through. Both have no idea how this can be accomplished, but both are reasonably sure tech companies can figure it out for them. And if some sort of key escrow makes encryption less secure than it is now, so be it. Whatever minimal gains in access law enforcement obtains will apparently offset the damage done by key leaks or criminal exploitation of a deliberately-weakened system.Cryptography expert Riana Pfefferkorn has released a white paper [PDF] examining the feasibility of the vague requests made by Rosenstein and Wray. Their preferred term is "responsible encryption" -- a term that allows them to step around landmines like "encryption backdoors" or "we're making encryption worse for everyone!" Her paper shows "responsible encryption" is anything but. And, even if implemented, it will result in far less access (and far more nefarious exploitation) than Rosenstein and Wray think.The first thing the paper does is try to pin down exactly what it is these two officials want -- easier said than done because neither official has the technical chops to concisely describe their preferred solutions. Nor do they have any technical experts on board to help guide them to their envisioned solution. (The latter is easily explained by the fact that no expert on cryptography has ever promoted the idea that encryption can remain secure after drilling holes in it at the request of law enforcement.)If you're going to respond to a terrible idea like "responsible encryption," you have to start somewhere. Pfefferkorn starts with an attempt to wrangle vague law enforcement official statements into a usable framework for a reality-based argument.
|
![]() |
by Karl Bode on (#3FSH9)
Given Verizon's long-standing animosity to net neutrality (and openness and healthy competition in general), the company's acquisition of Tumblr created some understandable tension. Tumblr has been on the front lines of net neutrality support since around 2014 or so, with CEO David Karp stating in 2015 that the service wouldn't exist without net neutrality:
|
![]() |
by Tim Cushing on (#3FS4E)
Digital cameras can store a wealth of personal information and yet they're treated as unworthy of extra protection -- both by courts and the camera makers themselves. The encryption that comes baked in on cellphones hasn't even been offered as an option on cameras, despite camera owners being just as interested in protecting their private data as cellphone users are.The Freedom of the Press Foundation sent a letter to major camera manufacturers in December 2016, letting them know filmmakers and journalists would appreciate a little assistance keeping their data out of governments' hands.
|
![]() |
by Timothy Geigner on (#3FRF6)
It's been a minute since we've had to cover some trademark nonsense in the beer industry. In fact, several recent stories have actually represented what might be mistaken for a clapback on aggressive trademark protectionism in the alcohol space. But, like all great things, it just couldn't last. The specific tomfoolery that has brought reality crashing down on us once again comes out of Iowa, where Confluence Brewing has filed a trademark suit against Confluence On 3rd, which is an apartment complex that does not serve or make beer.
|
![]() |
by Cathy Gellis on (#3FR45)
With the event at Santa Clara earlier this month, and the companion essays published here, we've been talking a lot lately about how platforms moderate content. It can be a challenging task for a platform to figure out how to balance dealing with the sometimes troubling content it can find itself intermediating on the one hand and free speech concerns on the other. But at least, thanks to Section 230, platforms have been free to do the best they could to manage these competing interests. However you may think they make these decisions now, they would not come out any better without that statutory protection insulating them from legal consequence if they did not opt to remove absolutely everything that could tempt trouble. If they had to contend with the specter of liability in making these decisions it would inevitably cause platforms to play a much more censoring role at the expense of legitimate user speech.Fearing such a result is why the Copia Institute filed an amicus brief at the Ninth Circuit last year in Fields v. Twitter, one of the many "how dare you let terrorists use the Internet" cases that keep getting filed against Internet platforms. While it's problematic that they keep getting filed, they have fortunately not tended to get very far. I say "fortunately," because although it is terrible what has happened to the victims of these attacks, if platforms could be liable for what terrorists do it would end up chilling platforms' ability to intermediate any non-terrorist speech. Thus we, along with the EFF and the Internet Association (representing many of the bigger Internet platforms), had all filed briefs urging the Ninth Circuit to find, as the lower courts have tended to, that Section 230 insulates platforms from these types of lawsuits.A few weeks ago the Ninth Circuit issued its decision. The good news is that this decision affirms that the end has been reached in this particular case and hopefully will deter future ones. However the court did not base its reasoning on the existence of Section 230. While somewhat disappointing because we saw this case as an important opportunity to buttress Section 230's critical statutory protection, by not speaking to it at all it also didn't undermine it, and the fact the court ruled this way isn't actually bad. By focusing instead on the language of the Anti-Terrorism Act itself (this is the statute barring the material support of terrorists), it was still able to lessen the specter of legal liability that would otherwise chill platforms and force them to censor more speech.In fact, it may even be better that the court ruled this way. The result is not fundamentally different than what a decision based on Section 230 would have led to: like with the ATA, which the court found would have required some direct furtherance by the platform of the terrorist act, so would Section 230 have required the platform's direct interaction with the creation of user content furthering the act in order for the platform to potentially be liable for its consequences. But the more work Section 230 does to protect platforms legally, the more annoyed people seem to get at it politically. So by not being relevant to the adjudication of these sorts of tragic cases it won't throw more fuel on the political fire seeking to undermine the important speech-protective work Section 230 does, and then it hopefully will remain safely on the books for the next time we need it.[Side note: the Ninth Circuit originally issued the decision on January 31, but then on 2/2 released an updated version correcting a minor typographical error. The version linked here is the latest and greatest.]
|
![]() |
by Timothy Geigner on (#3FQVH)
We should all know by now that Facebook's reliability to handle copyright takedown requests is... not great. Like far too many internet platforms these days, the site typically puts its thumbs heavily on the scales such that the everyday user gets far less preference than large purported rights holders. I say "purported" because, of course, many bogus takedown requests get issued all the time. It's one of the reasons that relying on these platforms, when they have shown no willingness to have any sort of spine on copyright matters, is such a mistake.But few cases are as egregious as that of Leo Saldanha, a well-known environmental activist in India. When I tell you that Saldanha had a Facebook post taken down over a copyright notice, you must certainly be thinking that it had something to do with environmental activism. Nope! Actually, Saldanha wrote an all-text mini-review of an Indian film, Padmaavat, which was taken down after the distributor for the film claimed the post infringed on its copyrights. Here is the entirety of his post that was taken down.
|
![]() |
by Karl Bode on (#3FQMP)
By now it has been pretty well established that the security and privacy of most "internet of things" devices is decidedly half-assed. Companies are so eager to cash in on the IOT craze, nobody wants to take responsibility for their decision to forget basic security and privacy standards. As a result, we've now got millions of new attack vectors being introduced daily, including easily-hacked "smart" kettles, door locks, refrigerators, power outlets, Barbie dolls, and more. Security experts have warned the check for this dysfunction is coming due, and it could be disastrous.Smart televisions have long been part of this conversation, where security standards and privacy have also taken a back seat to blind gee whizzery. Numerous set vendors have already been caught hoovering up private conversations or transmitting private user data unencrypted to the cloud. One study last year surmised that around 90% of smart televisions can be hacked remotely, something intelligence agencies, private contractors and other hackers are clearly eager to take full advantage of.Consumer Reports this week released a study suggesting that things aren't really improving. The outfit, which is working to expand inclusion of privacy and security in product reviews, studied numerous streaming devices and smart TVs from numerous vendors. What they found is more of the same: companies that don't clearly disclose what consumer data is being collected and sold, aren't adequately encrypting the data they collect, and still don't seem to care that their devices are filled with security holes leaving their customers open to attack.The company was quick to highlight Roku's many smart TVs and streaming devices, and the company's failure to address an unsecured API vulnerability that could allow an attacker access to smart televisions operating on your home network. This is one of several problems that has been bouncing around since at least 2015, notes the report:
|
![]() |
by Tim Cushing on (#3FQGD)
Eric Goldman has come across an amazing pro se lawsuit [PDF] being brought by Nicholas C. Georgalis, an aggrieved social media user who believes he's owed an open platform in perpetuity, no matter what awful things he dumps onto service providers' pages. Oh, and he wants Section 230 immunity declared unconstitutional.Georgalis -- who sidelines as a "professional training professionals" when not filing stupid lawsuits -- is suing Facebook for periodically placing him in social media purgatory after removing posts of his. The lawsuit is heady stuff. And by "heady stuff," I mean we're going to be dealing with a lot of arguments about "sovereign rights" and "common law" and other related asshattery.Here's the opening. And it only gets better/worse from there:
|
![]() |
by Daily Deal on (#3FQDT)
Give your IT career a boost with the Complete 2018 CompTIA Certification Training Bundle. 14 courses cover the most common hardware and software technologies in business, and the skills necessary to support complex IT infrastructures. The courses are designed to help you study for sitting the various CompTIA certification exams. The bundle is on sale for $59.Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.
|
![]() |
by Mike Masnick on (#3FQ84)
Back in December, right before the Waymo/Uber trial was supposed to begin (before it got delayed due to an unexpected bombshell about withholding evidence that... never actually came up at the trial), I had a discussion with another reporter about the case, in which we each expressed our surprise that a settlement hadn't been worked out before going to trial. It seemed as though part of the case was really about the two companies really disliking each other, rather than there being a really strong legal case.A year ago, when the case was filed, I expressed disappointment at seeing Google filing this kind of lawsuit. My concern was mainly over the patent part of the case (which were dropped pretty early on), and the fact that Google, historically, had shied away from suing competitors over patents, tending to mostly use them defensively. But I had concerns about the "trade secrets" parts of the case as well. While there does seem to be fairly clear evidence that Anthony Levandowski -- the ex-Google employee at the heart of the discussion -- did some sketchy things in the process of leaving Google, starting Otto, and quickly selling Otto to Uber, the case still felt a lot like a backdoor attempt to hold back employee mobility.As we've discussed for many years, a huge part of the reason for the success of Silicon Valley in dominating the innovation world has to do with the ease of employee mobility. Repeated studies have shown that the fact that employees can switch jobs easily, or start their own companies easily, is a key factor in driving innovation forward. It's the sharing and interplay of ideas that allows the entire industry to tackle big problems. Individual firms may compete around those big breakthroughs, but it's the combined knowledge, ideas, and perspective sharing that results in the big breakthroughs.And even though that's widely known, tech companies have an unfortunate history of trying to stop employees from going to competitors. While non-competes have been ruled out in California, a few years back there was a big scandal over tech companies having illegal handshake agreements not to poach employees from one another. It was a good thing to see the companies fined for such practices.However, the latest move is to use "trade secrets" claims as way to effectively get the same thing done. The mere threat of lawsuits can stop companies from hiring employees, and can limit an employee's ability to find a new job somewhere else. That should concern us all.However, in this lawsuit, everything was turned a bit upside down. Part of it was that there did appear to be some outrageous behavior by Levandowski. Part of it was that, frankly, there are few companies out there disliked as much as Uber. It does seem that if it were almost any other company on the planet, many more people would have been rooting against Google as the big incumbent suing a smaller competitor. But, in this case, many many people seemed to be rooting for Google out of a general dislike of Uber itself.My own fear was that this general idea of "Uber = bad" combined with "Levandowski doing sketchy things" could lead to a bad ruling which would then be used to limit employee mobility in much more sympathetic settings. Thankfully, that seems unlikely to happen. As Sarah Jeong (who's coverage of this case was absolutely worth following) noted, despite all the rhetoric, it wasn't at all clear that Waymo proved its case. Lots of people wanted Google/Waymo to win for emotional reasons, but the legal evidence wasn't clearly there.And now the case is over. As the trial was set to continue Friday morning, it was announced that the two parties had reached a settlement, in which Uber basically hands over a small chunk of equity to Waymo (less than Waymo first tried to get, but still significant). As Jeong notes in another article, both sides had ample reasons to settle -- but the best reason of all to settle is so that they can focus on just competing in the market, rather than the courtroom and in not setting bad and dangerous precedent concerning employee mobility in an industry where that's vital.
|
![]() |
by Karl Bode on (#3FPPW)
You might recall that just a few years ago, HBO had to be dragged kicking and screaming into the modern era. For years the company refused to offer a standalone streaming TV service, worried that it would jeopardize the company's cozy promotional relationship with existing cable providers (who often all but give away the channel in promotions). As recently as 2013 Time Warner CEO Jeff Bewkes was claiming that such an offering would make "no economic sense."Why? Bewkes was worried that offering a standalone option would upset cable partners. At the time, those partners were already offering an HBO streaming app named HBO Go, but only if you signed up for traditional TV. This was art of the industry's walled garden "TV Everywhere" initiative, a misguided attempt at stopping cord cutters by only giving them innovative streaming services -- if they signed up for bloated, traditional television bundles. Bewkes was clearly worried at the time that being too damn innovative would upset industry executives and skew the company's balance sheets:
|
![]() |
by Tim Cushing on (#3FPAT)
For years, Manhattan DA Cy Vance has been warning us about the coming criminal apocalypse spurred on by cellphone encryption. "Evil geniuses" Apple introduced default encryption in a move likely meant to satiate lawmakers hollering about phone theft and do-nothing tech companies. In return, DA Cy Vance (and consecutive FBI directors) turned on Apple, calling device encryption a criminal's best friend.Vance still makes annual pitches for law enforcement-friendly encryption -- something that means either backdoors or encryption so weak it can be cracked immediately. Both ideas would also be criminal-friendly, but Vance is fine with sacrificing personal security for law enforcement access. Frequently, these pitches are accompanied with piles of uncracked cellphones -- a gesture meant to wow journalists but ultimately indicative of nothing more than how much the NYPD can store in its evidence room. (How many are linked to active investigations? How many investigations continued to convictions without cellphone evidence? Were contempt charges ever considered to motivate cellphone owners into unlocking phones? So many questions. Absolutely zero answers.)Will Vance be changing his pitch in the near future? Will he want weakened encryption safeguarding the NYPD's new tools? I guess we'll wait and see. (h/t Robyn Greene)
|
![]() |
by Leigh Beadon on (#3FN4J)
This week, our first place winner on the insightful side comes in response to the FCC's refusal to release certain records to a FOIA request. David noted that their reason — "to prevent harm to the agency" — was a big problem:
|
![]() |
by Leigh Beadon on (#3FK92)
Five Years AgoThis week in 2013, the EU was taking a worryingly restrictive approach to trying to fix copyright licensing, France's Hadopi was trying to get the national library to use more DRM, and Japan was planning to seed P2P networks with fake files containing copyright warnings. The UK, on the other hand, rejected plans to create a new IP Czar, though a new copyright research center seeking to restore some balance to the overall debate was facing heavy opposition right out the gate. This was also the week that we wrote about the curious privacy claims about tweets from an investigative journalist named Teri Buhl, which quickly prompted a largely confused response and, soon afterwards, threats of a lawsuit.Ten Years AgoThis week in 2008, the recording industry was continuing its attempts to sue Baidu and floating fun ideas like building copyright filters into antivirus software, while we were taking a look at the morass of legacy royalty agreements holding back the industry's attempts at innovation. A Danish court told an ISP it had to block the Pirate Bay, leading the ISP to ask for clarification while it considered fighting back. And Microsoft was doing some scaremongering in Canada in pursuit of stronger copyright laws.Fifteen Years AgoThis week in 2003, Germany's patent office was seeking a copyright levy on all PCs, while the EU was mercifully pushing back on attempts to treat more infringement as criminal. One record label executive was telling the industry it had to embrace file sharing or die, but the company line was still the language of moral panic. Speaking of which, in an interview in the Harvard Political Review, Jack Valenti was asked about his infamous "Boston strangler" warning about VCRs — and proceeded to tell a bunch of lies to claim his warning was in fact apt.
|
![]() |
by Mike Masnick on (#3FHYP)
It is something of an unfortunate Techdirt tradition that every time the Olympics rolls around, we are alerted to some more nonsense by the organizations that put on the event -- mainly the International Olympic Committee (IOC) -- going out of their way to be completely censorial in the most obnoxious ways possible. And, even worse, watching as various governments and organizations bend to the IOC's will on no legal basis at all. In the past, this has included the IOC's ridiculous insistence on extra trademark rights that are not based on any actual laws. But, in the age of social media it's gotten even worse. The Olympics and Twitter have a very questionable relationship as the company Twitter has been all too willing to censor content on behalf of the Olympics, while the Olympic committees, such as the USOC, continue to believe merely mentioning the Olympics is magically trademark infringement.So, it's only fitting that my first alert to the news that the Olympics are happening again was hearing how Washington Post reporter Ann Fifield, who covers North Korea for the paper, had her video of the unified Korean team taken off Twitter based on a bogus complaint by the IOC:
|
![]() |
by Gus Rossi on (#3FHMD)
Online platforms have enabled an explosion of creativity — but the laws that make this possible are under attack in NAFTA negotiations. We recently launched EveryoneCreates.org to share the stories of artists and creators who have been empowered by the internet. This guest post from Public Knowledge's Gus Rossi explore's what's at stake.In the past few weeks, we at Public Knowledge have been talking with decision-makers on Capitol Hill about NAFTA. We wanted to educate ourselves on the negotiation process for this vital trade agreement, and fairly counsel lawmakers interested in its effects on consumer protection. And we discovered a thing or two in this process.It won’t surprise anyone that we don’t always agree with lobbyists for the big entertainment companies when it comes to creating a balanced copyright system for internet users. But some of the ideas these groups are advancing are widely misleading, brutally dishonest, and even dangerous to democracy. We wanted to share the two wildest ideas the entertainment industries are proposing in the new-NAFTA, so you can help us set the record straight before it’s too late:1) Safe harbors enable child pornography and human trafficking.Outside specialized circles, common wisdom is that “safe harbors†are free get-out-of-jail cards that internet intermediaries like Facebook can use to avoid all responsibility for anything that internet users say or do in their services. Leveraging this fallacy, entertainment industry lobbyists are arguing that safe harbors facilitate child pornography and human trafficking. Therefore, the argument follows, NAFTA should not promote safe harbors.This is highly misleading. Safe harbors are simply legal provisions that exempt internet intermediaries such as YouTube or Twitter, and broadband providers such as Comcast or AT&T, from liability for the infringing actions of their users under certain specific circumstances. Without safe harbors, internet intermediaries would be obligated to censor and control everything their users do on their platforms, as they would be directly liable for it. Everything from social media, to internet search engines, to comments section in newspapers, would be highly restricted without some limitations on intermediary liability.The Digital Millennium Copyright Act (DMCA) and Section 230 of the Communications Decency Act (CDA 230) establish the two most important limitations for online intermediaries in US law. According to the DMCA, internet access providers (such as Comcast, AT&T, and Verizon) are not liable for the alleged copyright infringement of users on their networks, so long as they maintain a policy of terminating repeat infringers. Content hosts (such as blogs, image-hosting sites, or social media platforms) on the other hand, have to remove material if the copyright holder sends a takedown notice of infringement.CDA 230 says that "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.†Online intermediaries that host or republish speech are protected against a range of laws that might otherwise be used to hold them directly responsible for what others say and do.The relevant safe harbor for the interests of the entertainment industries is the DMCA, not CDA 230. CDA 230 specifically excludes copyright from its umbrella. And DMCA is exclusively about copyright. It is incredible dishonest and shallow for these lobbyists to use the specter of child abuse to drum up support for their position on copyright in NAFTA. No one should try to obfuscate a complicated policy discussion by accusing their opponents of promoting child sex trafficking.2) Exceptions and limitations to copyright are unnecessary in trade agreements.According to none other than the World Intellectual Property Organization, exceptions and limitations to copyright -- such as fair use -- exist “[i]n order to maintain an appropriate balance between the interests of rights holders and users of protected works, [allowing] cases in which protected works may be used without the authorization of the rights holder and with or without payment of compensation.†Without exceptions and limitations, everything from using a news clip for political parody, to sharing a link to a news article in social media, to discussing or commenting on just about any work of art or scholarship -- all could constitute copyright infringement.Yet, the entertainment industries are arguing that exceptions and limitations are outdated and unnecessary in trade agreements. They say that copyright holders should be protected from piracy and unlawful use of their works, claiming that any exceptions and limitations are a barrier to the protection of American artists.This is also wildly inaccurate. American artists and creators remix, reuse, and draw inspiration from copyrighted works every single day. If our trade partners don’t adopt exceptions and limitations to copyright, then these creators could be subject to liability when exporting their work to foreign countries. Exceptions and limitations to copyright are necessary both in the US and elsewhere. Our copyright system simply wouldn’t work without them, especially in the digital age.Conclusion: We need to set the record straight.For its political and economic importance, NAFTA could be be the standard for future American-sponsored free trade agreements. But NAFTA could have dramatic and tangible domestic consequences if it undermines safe harbors and exceptions and limitations to copyright. In the next policy debate around copyright infringement or intermediaries liabilities, the entertainment industries will point to NAFTA as an example of the US Government’s stated policy and where the world is moving.Furthermore, these lobbyists will have already convinced many on Capitol Hill that safe harbors enable child abuse and that fair use is unnecessary. The entertainment industries knows how to walk through the corridors of power day after day -- they’ve been doing so for well over a century.It’s not too late to fight back, set the record straight, and defend a balanced approach to copyright and consumer protections in NAFTA. You can start by contacting your representative. But the clock is ticking. Join Public Knowledge in the fight to keep the internet open for everyone.Visit EveryoneCreates.org to read stories of creation empowered by the internet, and share your own! »
|
![]() |
by Colin Sullivan on (#3FHC4)
Last week, Santa Clara University hosted a gathering of tech platform companies to discuss how they actually handle content moderation questions. Many of the participants in the event have written essays about the questions that were discussed at the event. This is the last in the series for now. We hope you enjoyed them.Patreon occupies a unique space among platforms with user generated content, which allows us to take a less automated approach to content moderation. As a membership platform that makes it easy for creators to get paid directly by their fans, we both host user generated content and act as a payment provider for creators. As a result, Patreon must have a higher bar for moderation and removal. It is not just individual content that is at risk, but potentially the creator's entire source of income.Our goal is to have a moderation and removal process that feels like working with an enterprise SaaS provider that powers your business, instead of a distrustful content hosting platform. This is a challenge on a platform with no vetting before a creator is able to set up a page and with large number of active creators. To achieve this goal, we treat our creators like partners and work through a series of escalating steps as part of our moderation and removal process.Patreon's Moderation and Removal ProcessWe want to give creators on Patreon a kinder moderation experience, so our first step is to send them a personalized email to let them know that their content has violated our guidelines. This initial contact is primarily to establish a line of communication, educate the creator on guidelines that they may not have known about, and give them a sense of agency in dealing with our guidelines. The vast majority of the time this process results in a mutually beneficial outcome, as the creator wants to continue receiving their funding and we want to continue working with them. We sometimes even use this approach before a creator has violated our guidelines if we see them posting content or exhibiting behaviors that is likely to result in a violation. This early outreach helps to educate creators before it becomes a problem.When specific content poses an extreme risk, or when previous conversations fail to achieve the desired outcome, we then proceed to suspension. Our suspension state removes the page from public view and pauses all payment processing. It still allows the creator to log in to their page to make changes. The purpose of this feature is to give creators agency, because they can choose how to edit their pages to become compliant. We've heard from creators about how other moderation and removal processes are impersonal and inflexible. We want them to have the opposite experience when working with our team at Patreon. Creators are typically understanding of the requirement to change or remove specific content, but want to have control over how it is done and be part of the process. By disabling public access to the page we remove the risk the content poses to Patreon, and then allow the creators to control the moderation and removal process. We can be clear with creators what steps they need to take for the suspension to be lifted, but allow the creator to retain their agency.Sometimes we are forced to remove a page, cutting off funding of a creator. Typically this is reserved for the most egregious content risks or when we see repeated re-offense. Even in these situations, we provide a path forward for the creator by allowing them to create a new page. We give the creator a list of their patrons' emails and offer them the opportunity to start fresh. This gives creators the opportunity to create a page within our guidelines, but resets their page and their relationship with patrons.Permanent bans for individuals are the final possible step of this process, and the only bans we have issued so far have been for extreme situations where the creator's past behavior is a permanent risk, such as creators convicted of serious crimes.How Will it Work at Scale?Admittedly, Patreon has some unique advantages as a platform that allow us to spend much more time on our moderation and removal process than most platforms can on a per user basis.The first is that the value to the platform of each new user on a content hosting platform run by ads is lower compared to the value of each new Patreon creator with subscription payments. In fact the controversy of any individual creator is often a function of the amount of income they are making. If a creator isn't making much money on Patreon they represent a lower risk. It is often only when that creator's income becomes more significant that concerned individuals will report it and then we investigate to see whether it complies with our guidelines.The second is that Patreon isn't a discovery platform. Discovery platforms solve the problem of zero to fan, of introducing a creator's work to the world and getting fans as a result. Patreon solves the problem of fan to patron, of getting those fans engaged and willing to support a creator with direct-to-creator contributions, rather than generating user ad impressions that send a creator pennies from an ad-revenue share.This lack of focus on discovery means two things. First, we don't promote people landing on creator pages they don't already know about, massively de-risking the possibility that someone who is offended by any particular piece of content will be exposed to it. This means everyone landing on a Patreon page has generally already self selected to want to go there. Second, much of the actual content on Patreon lives behind a paywall, dramatically reducing the possibility of the content going viral, and again reinforcing the self selective nature of the people viewing that content on Patreon.These advantages mean we can continue to build and improve our moderation and removal process in a way that will scale without losing our human touch. We will always prioritize making sure creators can trust Patreon to run their creative business and have agency in the moderation and removal process.Colin Sullivan is Head of Legal for Patreon
|
![]() |
by Zach Graves on (#3FH5J)
Most people don't understand the nuances ofartificial intelligence (AI), but at some level they comprehend that it'll bebig, transformative and cause disruptions across multiple sectors. And even if AIproliferation won't lead to a robot uprising, Americans are worried about how AI and automation willaffect their livelihoods.Recognizing this anxiety, our policymakershave increasingly turned their attention to the subject. In the 115th Congress,there have already been more mentions of “artificial intelligence†in proposed legislation and in the Congressional Record than ever before.While not everyone agrees on how we shouldapproach AI regulation, one approach that has gained considerable interest isaugmenting the federal government's expertise and capacity to tackle the issue.In particular, Sen. Brian Schatz has called for a new commission on AI; and Sen.Maria Cantwell hasintroduced legislation setting up a new committee within the Department ofCommerce to study and report on the policy implications ofAI.This latter bill, the “FUTURE of Artificial Intelligence Act†(S.2217/H.4625), sets forth a bipartisan proposal thatseems to be gainingsome traction. Whilethe bill's sponsors should be commended for taking a moderate approach in theface of growing populist anxiety, it's not clear that the proposed advisorycommittee would be particularly effective at all it sets out to do.One problem with the bill is how it sets thedefinition of AI as a regulatory subject. For most of us, it's hard toarticulate precisely what we mean when we talk about AI. The term “AI†can describea sophisticated program like Apple's Siri, but it can also refer to Microsoft'sClippy, or pretty much any kind of computer software.It turns out that AI is a difficult thing to define, even for experts.Some even argue that it's a meaninglessbuzzword. While this is a fine debate to have in the academy, prematurelyenshrining a definition in a statute – as this bill does – is likely to be thebasis for future policy (indeed, another recent bill offers a totally different definition). Downthe road, this could lead to confusion and misapplication of AI regulations. Thisprovision also seems unnecessary, since the committee is empowered to changethe definition for its own use.The committee's stated goals are also overly-ambitious.In the course of a year and a half, it would set out to “study and assess†overa dozen different technical issues, from economic investment, to workerdisplacement, to privacy, to government use and adoption of AI (although,notably, not defense or cyber issues). These are all important issues. However,the expertise required to adequately deal with these subjects is likely beyondthe capabilities of 19 voting members of the committee, which includes onlyfive academics. While the committee could theoretically choose to focus on anarrower set of topics in its final report, this structure is fundamentally notgeared towards producing the sort of deep analysis that would advance thedebate.Instead of trying to address every AI-relatedpolicy issue with one entity, a better approach might be to build separate, specializedadvisory committees based in different agencies. For instance, the Departmentof Justice might have a committee on using AI for risk assessment, the GeneralServices Administration might have a committee on using AI to streamlinegovernment services and ITinfrastructure, and the Department of Labor might have a committee on worker displacementcaused by AI and automation or on using AI in employment decisions. While thisapproach risks some duplicative work, it would also be much more likely toproduce deep, focused analysis relevant to specific areas of oversight.Of course, even the best public advisorycommittees have limitations, including politicization, resource constraints andcompliance with the Federal Advisory Committee Act. However, notall advisory bodies have to be within (or funded by) government. Outsideresearch groups, policy forums and advisory committees exist within the privatesector and can operate beyond the limitations of government bureaucracy whilestill effectively informing policymakers. Particularly for those issues notdirectly tied to government use of AI, academic centers, philanthropies and other groupscould step in to fill this gap without any need for new public expenditures orenabling legislation.If Sen. Cantwell's advisory committee-focusedproposal lacks robustness, Sen. Schatz's call for creating a new “independent federalcommission†with a mission to “ensure that AI is adopted in the best interestsof the public†could go beyond the bounds of political possibility. To hiscredit, Sen. Schatz identifies real challenges with government use of AI, such as those posed by criminal justice applications,and in coordinating between different agencies. These are real issues thatwarrant thoughtful solutions. Nonetheless, the creation of a new agency for AIis likely to run into a great deal of pushback from industry groups and thepolitical right (like similar proposals in the past), making it a difficultproposal to move forward.Beyond creating a new commission or advisorycommittees, the challenge of federal expertise in AI could also besubstantially addressed by reviving Congress' Office of Technology Assessment(which I discuss in a recent paper withKevin Kosar). Reviving OTA has a number of advantages: OTA raneffectively for years and still exists in statute, it isn't a regulatory body,it is structurally bipartisan and it would have the capacity to produce deep-diveanalysis in a technology-neutral manner. Indeed, there's good reason tostrengthen the First Branch first, since Congress is ultimately responsible formaking the legal frameworks governing AI as well as overseeing governmentusage.Lawmakers are right to characterize AI as a big deal. Indeed, there are trillions ofdollars in potential economic benefits at stake. Whilethe instincts to build expertise and understanding first make for a commendableapproach, policymakers will need to do it the right way – across multiplefacets of government – to successfully shape the future of AI without hinderingits transformative potential.
|
![]() |
by Tim Cushing on (#3FH0G)
Another communications platform has published National Security Letters it has received from the FBI. Twilio -- a San Francisco-based cloud communications platform -- has published two NSLs freed from the confines of their accompanying gag orders.
|
![]() |
by Daily Deal on (#3FH0H)
Sid Meier's Civilization needs little introduction, but the newest entry to the saga offers entirely new ways to engage with your world. The turn-based strategy franchise has sold over 35 million units worldwide since its creation, creating an enormous community of players attempting to build an empire to stand the test of time. Advance your civilization from the Stone Age to the Information Age by waging war, conducting diplomacy, advancing your culture, and going head to head with history's greatest leaders. There are five ways to achieve victory in Civilization VI. Which will you choose? Get started for $29.99.Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.
|
![]() |
by Tim Cushing on (#3FGVG)
Officials at ICE are pitching a dangerous idea to an administration likely to give it some consideration. It wants a seat at the grown-up table where it can partake of unminimized intel directly.
|
![]() |
by Karl Bode on (#3FG8H)
We've noted repeatedly how ESPN has personified the cable and broadcast industry's tone deafness to cord cutting and TV market evolution. The company not only spent years downplaying the trend as something only poor people do, it sued companies that attempted to offer consumers greater flexibility in how video content was consumed. ESPN execs clearly believed cord cutting was little more than a fad that would simply stop once Millennials started procreating, and ignored surveys showing how 56% of consumers would ditch ESPN in a heartbeat if it meant saving the $8 per month subscribers pay for the channel.As the data began to indicate the cord cutting trend was very real, insiders say ESPN was busy doubling down on bloated sports licensing deals and SportsCenter set redesigns. By the time ESPN had lost 10 million viewers in just a few years, the company was busy pretending they saw cord cutting coming all the while. ESPN subsequently decided the only solution was to fire hundreds of longstanding sports journalists and support personnel, but not the executives like John Skipper (since resigned) whose myopia made ESPN's problems that much worse.Fast forward to this week, when Disney CEO Bob Iger suggested that Disney and ESPN had finally seen the error of their ways, and would be launching a $5 per month streaming service sometime this year. Apparently, Iger and other ESPN/Disney brass have finally realized that paying some of the least-liked companies in America $130 per month for endless channels of crap has somehow lost its luster in the streaming video era:
|
![]() |
by Tim Cushing on (#3FFWM)
Last spring, Mike Masnick covered a completely fake court order that was served to Google to make some unflattering information disappear. The court order targeted some posts by a critic of a local politician.Ken Haas, a member of the New Britain (CT) city commission got into an online argument with a few people. When things didn't go his way, Haas played a dubious trump card:
|
![]() |
by Glyn Moody on (#3FF70)
Techdirt has been exploring the important questions raised by so-called "fake news" for some time. A new player in the field of news aggregation brings with it some novel issues. It's called TopBuzz, and it comes from the Chinese company Toutiao, whose rapid rise is placing it alongside the country's more familiar "BAT" Internet giants -- Baidu, Alibaba and Tencent. It's currently expanding its portfolio in the West: recently it bought the popular social video app Musical.ly for about $800 million:
|
![]() |
by Timothy Geigner on (#3FEVV)
You will hopefully recall a post we did several years ago dealing with Blizzard's decision to shut down a fan-run "vanilla" World of Warcraft server that stripped the game's expansions out and let players play the game as it was originally released in 2004. As is so often the case in these kinds of disputes, we can at once stipulate that Blizzard was within its right to do this while still calling out whether it was the best decision it could make on the matter. The simple fact is that there were other avenues down which the company could travel other than threatening the fan-server into oblivion, such as working out a cheap licensing arrangement to make it official. The whole situation became all the more odd when you consider that Blizzard itself does not offer a competing experience with the fan-server, essentially ignoring what is clearly a desire within the fanbase for that kind of experience that Blizzard could monetize if it wanted. Instead, the fan-server shut itself down under the threat of a trademark lawsuit and Blizzard went on its merry way ignoring these customer desires.Fast forward to today, some two years later, and it's all happening again. Another fan-operated vanilla server, this one called Light's Hope, is under attack from Blizzard for all the same reasons.
|
![]() |
by Sarah Roberts on (#3FEMR)
Last week, Santa Clara University hosted a gathering of tech platform companies to discuss how they actually handle content moderation questions. Many of the participants in the event have written essays about the questions that were discussed at the event. Between last week and this week, we're publishing a bunch of these essays, including this one.After a difficult few weeks of media attention and criticism surrounding the discovery of a spate of disturbing, exploitative videos either aimed at or featuring young children, YouTube’s CEO Susan Wojcicki released a blog post on December 4, 2017 that described the platform’s recent efforts to combat the problem. Central to the proposed plan to remedy the issue of unwanted user-generated content, or UGC, on YouTube was Wojcicki’s announcement of the large-scale hiring of additional human content moderation workers to complement those already working for Google, bringing the total number of such reviewers in Google’s employ to over 10,000.Wojcicki also went on to refer to the platform’s development of its automated moderation mechanisms, artificial intelligence and machine learning as key to its plans to combat undesirable content, as it has in other cases when disturbing material was found on the platform in large amounts. Importantly, however, and as indicated by Wojcicki, the work of those thousands of human content moderators would go directly to building the artificial intelligence required to automate the moderation processes in the first place. In recent months, other major social media and UGC-reliant platforms have also offered up plans to hire new content moderators by the thousands in the wake of criticism around undesirable content proliferating within their products.These recent public responses that invoke large-scale content moderator hires suggest that social media firms who trade in UGC still need human workers to review content, now and into the foreseeable future, whether that activity is to the end of deleting objectionable material, training AI to do it, or some combination thereof. As most anyone familiar with the production cycle of social media content would likely stipulate, these commercial content moderators – paid, professional workers who screen at scale following internal norms and policies – perform critical functions of brand protection and shield platform and user alike from harm. CCM workers are critical to social media’s operations and yet, until very recently, have often gone unknown to the vast majority of the world’s social media users.The specifics of the policies and procedures that they follow have also been mostly inaccessible (beyond simplified public-facing community guidelines) and treated as trade secrets. There are several reasons for this, not the least of which being the very real concern on the part of platforms that having detailed information about what constitutes allowable, versus disallowed, content would give people intent on gaming the platform using its own rules ample ammunition to do so. There may be other reasons, however, including the fact that the existence of the problem of disturbing content circulating online is one that most mainstream platforms do not care to openly discuss due to the distasteful nature of the issue and the subsequent questions that could be asked about if, how, and by whom such material is addressed.CCM work is both rote and complex. It requires engagement with repetitive tasks that workers can come to perform in a routinized way, but often under challenging productivity metrics that require a high degree of both speed and accuracy in decision-making. The job calls on sophistication that cannot currently be fully matched by machines, and so a complex array of human cognitive functions (e.g., linguistic and cultural competencies; quick recognition and application of appropriate policies; recognition of symbols or latent meanings) is needed. A further challenge to CCM workers and the platforms that engage them is the fact that the job, by its very nature, exposes workers to potentially disturbing imagery, videos and text from which mainstream platforms wish to shield their user and remove from circulation, the latter which may even be a legal dictate in many cases.In other words, in order to make its platforms safe for users and advertisers, platforms must expose its CCM workers to the content that it considers unsuitable for anyone else. It is a paradox that illustrates a primary motivation behind the automation of moderation practices: under the status quo, CCM workers put their own sensitivity, skills and psyches on the line to catch, view it and delete material that may include images of pornography, violence against children, violence against animals, child sexual exploitation, gratuitously graphic or vulgar material, hate speech or imagery and so on. It is work that can lead to emotional difficulty for those on the job, even long after some have moved on.To this end, industry has responded in a variety of ways. Some workplaces have offered on-site counseling services to employees. The availability of such counseling is important, particularly when CCM workers are employed as contractors who may lack health insurance plans or might find mental health services cost-prohibitive. Challenges are present, however, when cultural barriers or concerns over privacy impede workers from taking full advantage of such services.When it comes to CCM worker wellness, firms have been largely self-guiding. Several major industry leaders have come together to form the self-funded “Technology Coalition,†whose major project relates to fighting child sexual exploitation online. In addition to this key work, they have produced the “Employee Resilience Guidebook,†now in a second version, intended to support workers who are exposed to child sexual exploitation material. It includes information on mandatory reporting and legal obligations (mostly US-focused) around the encountering of said material, but also provides important information about how to support employees who can be reasonably expected to contend emotionally with the impact of their exposure. Key to the recommendations is beginning the process of building a resilient employee at the point of hiring. It also draws heavily from information from the National Center for Missing and Exploited Children (NCMEC), whose expertise in this area is built upon years of working with and supporting law enforcement personnel and their own staff.The Employee Resilience Guidebook is a start toward the formation of industry-wide best practices, but in its current implementation it focuses narrowly on the specifics of child sexual exploitation material and is not intended to serve the broader needs of a generalist CCM worker and the range of material for which he or she may need support. Unlike members of law enforcement, who can call on their own professional identities and social capital for much-needed support, moderators often lack this layer of social structure and indeed are often unable to discuss the nature of their work due to non-disclosure agreements (NDAs) and stigma around the work they do. The relative geographic diffusion and industrial stratification of CCM work can also make it difficult for workers to find community with each other, outside of their immediate local teams, and no contracting or subcontracting firm is represented in the current makeup of the Technology Coalition, yet many CCM workers are employed through these channels. Finally, I know of no long-term publicly-available study that has established psychological baselines for or tracked CCM worker wellness over their period of employment or beyond. The Technology Coalition’s guidebook references information from a 2006 study on secondary trauma done on NCMEC staff. To be sure, the study contains important results that can be instructive in this case, but it cannot substitute for a psychological study done specifically on the CCM worker population in the current moment. Ethical and access concerns make such an endeavor complicated. Yet, as the ongoing 2016 Washington state lawsuit filed on behalf of two Microsoft content moderators suggests, there may be liability for firms and platforms that do not take sufficient measures to shield their CCM workers from damaging content whenever possible and to offer them adequate psychological support when it is not.Although the factors described above currently serve as challenges to effectively serving the needs of CCM workers in the arena of their health and well-being, they are also clear indicators of where opportunities lie for industry and potential partners (e.g., academics; health care professionals; labor advocates) to improve upon the efficacy, well-being and work-life conditions of those who undertake the difficult and critical role of cleaning up the internet on behalf of us all. Opening the dialog about both challenges and opportunities is a key step toward this goal.
|
![]() |
by Mike Godwin on (#3FEDX)
Earlier today we posted Mike Masnick's post about the passing of John Perry Barlow, but Mike Godwin, who was EFF's first lawyer among other things, sent over his memories of Barlow as well, which are well worth reading.It’s the nature of having known John Perry Barlow, and having been his friend, that you can’t write about what it means to have lost him Wednesday morning (he died in his sleep at the too-young age of 70) without writing about how he changed your life. So, I ask your forgiveness in advance if I say too much about myself here on the way to saying more about John.I can and will testify that I had a life before I met John Perry Barlow. At the beginning of 1990 I was finishing up law school in Texas (only one more semester and then the bar exam!) and was beginning to think about my professional future (how about being a prosecutor in Houston?) and my personal future (should my long-term girlfriend and I get married?).That was the glide path I was on before Grateful Dead lyricist John Perry Barlow, together with software entrepreneur Mitch Kapor and Sun Microsystems pioneering programmer John Gilmore, decided to start what would shortly be known as the Electronic Frontier Foundation (EFF). EFF disrupted all my inertial, half-formed plans and changed my life forever. (I didn’t, for example, become a prosecutor.) And John Perry Barlow was the red-hot beating heart of EFF.I’d been feeling tremors in the Force before EFF even had a name, though. For reasons I can’t quite explain, I’d found ways to persuade people, including my university, to give me access to internet-capable accounts and services so that I could see the rest of the digital world as it was then represented in Usenet. I’d been a BBS hobbyist in the 1980s, but I thought I’d exhausted the BBS scene in Austin and wanted to know more of the larger digital world. Thanks to Usenet, over the Christmas break before my last semester of law school I’d become friends online with Clifford Stoll, whose book “The Cuckoo’s Egg†detailed how he had detected and helped thwart a foreign plot to hack into U.S. academic and research computers. Cliff had included his email address in the book and, as we so often did in those days, I just fired off a note to him and got to know him.At about the same time, at my girlfriend’s urging, we spent a couple of days in San Francisco at MacWorld Expo, where I first met Mitch Kapor, who wore a Hawaiian shirt and demo’d what became for years my favorite Mac application, On Location. Other things were happening as well, and my computer-hobbyist nature— never too far in the background during my law-student years—kept me attuned to what seemed to be happening in the larger world which, as I would have framed it back then, seemed to reflect a convergence of my interests in constitutional law and cyberspace.Just a month or two later, I came across the March 1990 issue of Harper’s Magazine, and there on the cover was this colloquy edited by Jack Hitt and Paul Tough titled, “Is Computer Hacking a Crime? (Harper’s theoretically makes a download of that old article available, but the links don’t work. You can find a transcribed version here). I wasn’t a subscriber, but I knew I had to read this. And there was Barlow – whose name I didn’t recognize – along with luminaries like Stewart Brand (former Merry Prankster, later the founder of The Whole Earth Catalog and The Whole Earth Review), Richard Stallman (founder and chief visionary of the Free Software movement that gave birth to the Linux operating system) and my new friend Cliff Stoll. They all had lots of opinions about computer hacking, but the participant whose words spoke most clearly to me was Barlow:
|
![]() |
by Tim Cushing on (#3FE5N)
The Nunes Memo, capitalized to give it far more gravitas that it actually possesses, was released late last week to mixed reviews. Nunes had built it up to be a mind-blowing damnation of a politically corrupt Federal Bureau of Investigation, more interested in destroying Trump than performing its appointed duties. The memo showed the FBI had relied on questionable evidence from the Steele dossier while securing FISA warrants to surveill former Trump adviser Carter Page. This memo was composed by the House intelligence oversight head -- one who had rarely expressed concern about domestic surveillance prior to investigations of Trump officials.The memo showed the basis for the warrants may have been thin, but it didn't show it was nonexistent. In fact, the underlying warrants actually did inform the FISA court about the political background of Christopher Steele and his dossier. Nunes didn't know this because Nunes hadn't actually read the warrants. When he was finally apprised of this contradiction, he claimed the FBI disclosure didn't count because the disclosure was contained in a footnote.The memo's release has had some serious side effects, however. But it will be Congressional oversight taking the damage, rather than the FBI. The memo's release showed the dumping of sensitive, classified info could be motivated by political whims, rather than as the result of a thoughtful, deliberative process. It showed oversight committee members were willing to jeopardize law enforcement sources and methods to score political points -- ironically the same claim Nunes was making about the FBI's motivations.The damage will also be felt -- indirectly -- by the American public. Intelligence oversight is supposed to protect Americans from surveillance abuses. With this move, Nunes has destroyed its credibility, as Julian Sanchez points out.
|
![]() |
by Daily Deal on (#3FE3C)
SitePoint's $19 Ultimate Web Development eBook and Course Bundle will show you how to start your journey as a front-end web developer, giving you access to 7 best-selling ebooks and more than 21 hours of instructional video. You will learn about popular languages and frameworks like HTML5, CSS3, JavaScript, and Angular 2. You will be have your first websites up and running in no time.Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.
|
![]() |
by Mike Masnick on (#3FE03)
I was in a meeting yesterday, when the person I was meeting with mentioned that John Perry Barlow had died. While he had been sick for a while, and there had been warnings that the end might be near, it's still somewhat devastating to hear that he is gone. I had the pleasure of interacting with him both in person and online multiple times over the years, and each time was a joy. He was always, insightful, thoughtful and deeply empathetic.I can't remember for sure, but I believe the last time I saw him in person was a few years back at a conference (I don't even recall what conference), where he was on a panel that had no moderator, and literally seconds before the panel was to begin, I was asked to moderate the panel with zero preparation. Of course, it was easy to get Barlow to talk, and to make it interesting, even without preparation. But that day the Grateful Dead's Bob Weir (for whom Barlow wrote many songs -- after meeting as roommates at boarding school) was in the audience -- and while the two were close, they disagreed on issues related to copyright, leading to a public debate between the two (even though Weir was not on the panel). It was fascinating to observe the discussion, in part because of the way in which Barlow approached it. Despite disagreeing strongly with Weir, the discussion was respectful, detailed and consistently insightful.Lots of people are, quite understandably, pointing to Barlow's famous Declaration of the Independence of Cyberspace (which was published 22 years ago today). Barlow later admitted that he dashed most of that off in a bar during the World Economic Forum, without much thought. And that's why I'm going to separately suggest two other things by Barlow to read as well. The first was his Wired piece, The Economy of Ideas from 1994, the second year of Wired's existence, and where Barlow's wisdom was found in every issue. Despite being written almost a quarter of a century ago, The Economy of Ideas is still fresh and relevant today. It is more thoughtful and detailed than his later "Declaration" and, if anything, I would imagine that Barlow was annoyed that the piece is still so relevant today. He'd think we should be way beyond the points he was making in 1994, but we are not.The other piece is more recent I've seen a few people pointing to is his Principles of Adult Behavior, which are a list of 25 rules to live by -- rules that we should be reminded of constantly. Rules that many of us (and I'm putting myself first on this list) fail to live up to all too frequently. Update I stupidly assumed that was a more recent writing by Barlow, but as noted in the comments (thanks!) it's actually from 1977 when Barlow turned 30.Cindy Cohn, who is now the executive director of EFF, which Barlow co-founded, mentions in her writeup how unfair it is that Barlow (and, specifically his Declaration) are often held up as the kind of prototype for the "techno-utopian" vision of the world that has become so frequently mocked today. Yet, as Cohn points out, that's not at all how Barlow truly viewed the world. He saw the possibilities of that utopia, while recognizing the potential realities of something far less good. The utopianism that Barlow presented to the world was not -- as many assume -- him claiming these things were a sort of manifest destiny, but rather by presenting such a utopia, we might all strive and push and fight to actually achieve it.
|
![]() |
by Karl Bode on (#3FE04)
You might recall that right before the FCC voted to kill net neutrality at Verizon's behest, the agency thought it would be a hoot to joke about the agency's "collusion" with Verizon at a telecom industry gala. The lame joke was a tone-deaf attempt to mock very legitimate concerns that Pai, a former Verizon regulatory lawyer, is far too close to the industry he's supposed to be regulating. The FCC even went so far as to include a little video featuring Verizon executives, who chortled about their plans to install Pai as a "puppet" leader at the agency. Hilarious.While the audience of policy wonks and lobbyists giggled, the whole thing was tone deaf and idiotic from stem to stern. Especially given the fact that Pai's policies have been nothing short of a Verizon wish list, whether that involves protecting Verizon's monopoly over business data services (BDS), or the efforts to undermine any attempts to hold Verizon accountable for repeated privacy violations. Much like the other lame video Pai circulated at the time to make light of consumer outrage, it only served to highlight how viciously out of touch this FCC is with the public it's supposed to be looking out for.Gizmodo recently filed a FOIA request to obtain any communications between the FCC and Verizon regarding the creation of the video, arguing the records were well within the public interest given concerns over Pai's cozy relationship with the companies he's supposed to be holding accountable. But Gizmodo says the FCC refused the request under Exemption 5 of the FOIA (Deliberative Process Privilege). While the request revealed around a dozen pages of e-mails between the FCC and Verizon, the FCC refuses to release them, arguing they could harm the ability of the agency to do its job (read: kiss Verizon's ass):
|
![]() |
by Tim Cushing on (#3FE05)
The CIA is spectacularly terrible at responding to FOIA requests. It's so bad it's highly possible the perceived ineptness is deliberate. The CIA simply does not want to release documents. If it can't find enough FOIA exemptions to throw at the requester, it gets creative.A FOIA request for emails pertaining to the repeated and extended downtime suffered by the (irony!) CIA's FOIA request portal was met with demands for more specifics from the requester. The CIA wanted things the requester would only know after receiving the emails he requested, like senders, recipients, and email subject lines.The CIA sat on another records request for six years before sending a letter to the requester telling him the request would be closed if he did not respond. To be fair, the agency had provided him a response of sorts five years earlier: a copy of his own FOIA request, claiming it was the only document the agency could locate containing the phrase "records system."In yet another example of CIA deviousness, the agency told a requester the documents requested would take 28 years and over $100,000 to compile. Then it went even further. During the resulting FOIA lawsuit, the DOJ claimed the job was simply too impossible to undertake. Less than 2 months after MuckRock's successful lawsuit, the entire database went live at the CIA's website -- more than 27 years ahead of schedule.This is the CIA's antipathy towards the FOIA process on display. It takes a lawsuit to get it to produce documents. And what we have here is more CIA recalcitrance being undercut by an FOIA lawsuit.Journalist Adam Johnson sued the agency early last year for its refusal to produce correspondence between the CIA's Office of Public Affairs and prominent journalists. Johnson did receive copies of these emails, but the CIA redacted the emails they had sent to journalists. (The journalists' response were left unredacted.) Since the emails obviously weren't redacted when they were sent to journalists, Johnson challenged the redactions in court.The government argued it had a right to disclose classified information to journalists. And it certainly can. The CIA can waive classification if it so desires. But what it can't do is claim it has never released this classified info to the public -- not if it's handing it out to journalists.Daniel Novak is representing the journalist in his FOIA lawsuit. And he reports the judge is no more impressed by the CIA's arguments than his client is. The decision [PDF] is redacted but some very nice bench slaps have been left untouched... like this one, which sums up the ridiculousness of the CIA's arguments.
|