Radical media, politics and culture.

Technology

http://www.cnn.com/2003/TECH/internet/01/31/intern et.saint/index.html



(CNN) -- Fed up with hackers, a flood of spam and lousy connections, Italian Roman Catholics have launched a search for a patron saint of the Internet. And they hope their online poll will yield a holy Web protector by Easter.



So far, about 5,000 visitors are casting their votes daily on
http://www.santiebeati.it, something that delights Monsignor James P. Moroney, an expert on prayer and worship for the U.S. Conference of Catholic Bishops.

jim writes: from Rethinking Marxism Volume 13, Number 3/4 (Fall/Winter 2001)


Protocol, or, How Control Exists after Decentralization


Alex Galloway

So far there is no Marxist theory of the media.

-Hans Magnus Enzensberger

The basic question asked by Empire is this: How does control exist after decentralization?

In former times the answer was clear. In what Michel Foucault called the sovereign societies of the classical era, characterized by centralized power and sovereign fiat, control existed as an extension of the word and deed of the master, assisted by violence and other coercive factors. Later, the disciplinary societies of the modern era took hold, replacing violence with more bureaucratic forms of command and control. Gilles Deleuze has extended this periodization into the present day by suggesting that after the disciplinary societies come the societies of control. Hardt and Negri (2000) fundamentally agree with this periodization, calling it instead the move from the modern disciplinary societies to societies of imperial control.

State to Save Billions on Software:

Crippling Licence Fees Will Be Avoided by Using Free
Open-Source Programs

http://www.bday.co.za/bday/content/direct/1,3523,1 266306-6099-0,00.html>

Information Technology Editor

When Microsoft introduced a new licensing model for its
software late last year, simmering resentment within
government finally boiled over.

hydrarchist writes:

The Wireless Commons Manifesto


We have formed the Wireless Commons because a global wireless network is within our grasp. We will work to define and achieve a wireless commons built using open spectrum, and able to connect people everywhere. We believe there is value to an independent and global network which is open to the public. We will break down commercial, technical, social and political barriers to the commons. The wireless commons bridges one of the few remaining gaps in universal communication without interference from middlemen and meddlers.

Activist Network in New York City Evicted from Internet by Dow, Verio

Thing.net assistance page: Thing.net

Contact: Thing-group

Bowing to pressure from the Dow Chemical Corporation, the internet
company Verio has booted the activist-oriented Thing.net from the Web.

Internet service provider Thing.net has been the primary service
provider for activist and artist organizations in the New York area
for 10 years.

Anonymous Comrade writes "A San Jose, California jury on Tuesday cleared software firm ElcomSoft of charges it violated the Digital Millennium Copyright Act (DMCA) with its program that cracks the copyright protections in Adobe Systems eBooks.


The landmark decision, which comes after a week of deliberations, clears ElcomSoft of five counts of criminal violating of the controversial DMCA in one of the most closely-watched cases in the technology sector. Officials from ElcomSoft could not be reached at press time for a reaction to the ruling.

hydrarchist writes:

You could not make this shit up.


In a press release today, where they gloat at three prosecutions in course against children for warez activity brought to the attention of their 'European Internet Investigation Team', the Business Software Alliance also impart some real pearls of business ideology. And some cautionary words for parents:



Young people are often enthusiastic users, particularly of interactive services like email, chat and instant messaging. These are great tools that have been developed by the software industry so we do not want to limit children’s learning and enjoyment of the Internet. In short, the danger of ‘hanging-out’ in cyberspace is the same as loitering in the wrong part of town. Teenagers can just as easily fall in with the wrong crowd and unintentionally become involved in other serious crimes.


The software industry has been determined to refashion social norms around copyright for quite a while now, and they even managed to have it endorsed as State Doctrine (fear!) during the assembly of the National Information Infrastructure Report between 1993 and 1995. Somewhere out there exist hilarious websites dedicated to teaching children that sharing is wrong. Theft. Criminal.

hydrarchist writes:


"Taking Instead of Buying:

Towards an Economics of Free Software"

Stefan Merten

What is free software?

There are other ways of acquiring software than just buying the commercial software that's available on the free market like any other goods. There are, for example, the so-called Shareware models whereby customers wanting to use the software pay a fee to the producer. There is also the possibility of bootleg copies, an illegal means of acquiring software.


This article doesn't deal with any of these but is about free software, which is not only almost cost-free; it also, more significantly, incorporates regulations that guarantee freedom for the user. Besides the right to use the software, the user also has the right to study the sources of the software, modify them, and pass the original or modified version on.

hydrarchist writes Prior to the publication of "Art of Deception", the publishers Wiley and Sons received a letter threatening legal action on the part of John Markoff, the New York Times hack (sic) who played a key role in Mitnick's demonisation. As a result this chapter was pulled from the book. Fortunately the lost lines appeared miraculously in a yahoo group earlier this month, and it is provided below for your edification.


The account is interesting in several respects. First it demonstrates the shortsightedness of security through obscurity, or a reliance on smart technical fixes for the provision of assurance and safety. Given the continuing tendency towards security culture in political circles the sections on social engineering should act as reminder that most vulnerabilities are human. Secondly it demonstrates the connivance in the criminalization process between respected media mouthpieces and the state. Mitnick's case, along with those of LaMachia and Morris, were seminal from this point of view and established the trend for the decade. Third, he is candid about the very superficial nature of hacker rebellion, which often morphs into betrayal and collaboration with the state and businness without skipping a beat.

Enjoy.

"Chapter 1: Kevin's Story"

by Kevin Mitnick

I was reluctant to write this section because I was sure it would sound self-serving. Well, okay,
it is self-serving. But I've been contacted by literally hundreds of people who want to know
"who is Kevin Mitnick. "
For those who don't give a damn, please turn to Chapter 2. For everybody else, here, for what it's
worth, is my story.

This story is pilfered from the British-based technology web-site, The Register. In related news see the new Know_Dump site. Time to Napsterise everything boys and girls....

File swap nets will win, DRM and lawyers lose, say MS researchers

Posted: 21/11/2002 at 15:24 GMT

A group of Microsoft researchers, including Paul 'Mr Secure PC' England, has delivered a paper which concludes that all efforts to stop content swapping/theft - possibly even including Palladium - are in the long term futile. This message, particularly the bit that dealt with the economics of DRM-enabled versus 'clean' content, must have gone down a storm with the audience.



Which, since you ask, was the Association for Computing Machinery DRM conference.



The paper, which is currently available here, is particularly striking in that it argues its way persuasively through the history, present and future of file sharing, the success or otherwise of 'attacks' (academicspeak for 'lawyers') on it, and concludes that file sharing will triumph.

Pages

Subscribe to Technology