Yesterday, a year-long collaboration between EFF and the Election Protection Coalition came to fruition. OurVoteLive.org, powered by EFF's Total Election Awareness project, helped EP's thousands of hotline operators and legal response teams document and respond to over 86,000 calls to the 866-OUR-VOTE voter-assistance hotline on November 4th and during early voting. Over 5,000 more calls were documented during the primaries.
Now that the election is over, Our Vote Live contains the largest database of voting-related inquiries, problems, and discrepancies ever created — all searchable and visible to the general public. While important prototypes were used in prior elections, Our Vote Live was by far the most comprehensive and most successful effort to date.
- French Senate Votes for Three Strikes
The bill still has to pass the National Assembly, however — and faces a clash with developing European law.
- No Clean Feed - Stop Internet Censorship in Australia
The battle against the Australian goverment's plans to install compulsory filters on all Internet traffic grows in strength. Electronic Frontiers Australia offers action items for worried Aussie Net users.
- Circumvention in New Zealand
Content Agenda summarizes what's been happening in NZ copyright law.
- Join the Public Domain Calculators
This is the first post in a three part series directed at restoring some of the civil liberties we've lost over the past eight years. Today's post is about our privacy rights. We'll follow this up early next week with our thoughts on intellectual property rights and government transparency.
As new leaders prepare to move into the White House and Congress over the next few months, we'd like to call on them to restore Americans' privacy rights. Here's a little "wish list" we'd like to put forward:
Last year, we reported that WIPO Member States had decided to postpone holding an intergovernmental diplomatic conference to adopt the controversial Broadcasting Treaty. For us, and the many others who had expressed concern about the proposed treaty, this was welcome news. But it was short-lived. In 2008, the Broadcasting Treaty is being pushed by its supporters with a vengeance. Surprisingly, the US seems to have reversed its most recent position, and expressed support for continuing treaty negotiations so long as it includes webcasting.
This is the second post in a three-part series outlining how the new leadership in Congress and the White House can restore some of the civil liberties we've lost over the past eight years. Today's post focuses on innovation, fair use and intellectual property. On Friday, we posted about privacy and surveillance, and tomorrow we'll discuss government transparency.
This is the final post in a three-part series outlining how the new leadership in Congress and the White House can restore some of the civil liberties we've lost over the past eight years. Today's post focuses on government transparency. Previously, we've written about surveillance and intellectual property.
The past eight years have seen an increase in government secrecy and a decrease in government accountability. These factors have led to record levels of distrust in our government. Here are three steps the new leadership should take to begin to restore that trust:
Advocates for the opening of the "white spaces" were rewarded with a resounding victory earlier this month when the FCC unanimously voted in favor of allowing unlicensed use of the unused spectrum between TV channels. (For a more complete explanation of white spaces, check out our earlier blog post.) While FCC Chairman Kevin Martin had telegraphed his support for white spaces at the conclusion of technical trials, the landslide vote opens doors for innovation and is a victory for the public over the entrenched media incumbents.
In a decision that could have significant negative consequences for online speech and commerce, Judge John Darrah of the Northern District of Illinois has refused to dismiss some of the most preposterous trademark claims we've ever seen (and that's saying something).
Each public and private institution of higher education in the state that has student residential computer networks shall:
[R]easonably attempt to prevent the infringement of copyrighted works over the institution's computer and network resources, if such institution receives fifty (50) or more legally valid notices of infringement as prescribed by the Digital Millennium Copyright Act of 1998 within the preceding year.
A coalition of more than 25 organizations, including EFF, yesterday released "Liberty and Security: Recommendations for the Next Administration and Congress", a comprehensive catalogue of policy recommendations on a range of critical civil liberties issues.
This collaboratively-created transition roadmap, coordinated by our friends at the Constitution Project, contains 20 chapters providing policy recommendations on a wide variety of issues, from Guantanamo Bay to warrantless wiretapping. EFF has signed on as an ally in support of the recommendations in eleven of those chapters, concerning issues within EFF's mission to protect free speech and privacy on the electronic frontier.
Yesterday, the New York Times ran the story "Early Test for Obama on Domestic Spying Views", describing the national security-related issues facing the incoming Obama Administration. Chief among them is the issue of immunity for telecoms that illegally assisted in the National Security Agency's warrantless wiretapping program:
In perhaps the most critical test, civil liberties groups that are suing major phone companies that took part in the N.S.A. program are waiting to find out whether a federal judge will throw out the lawsuits based on immunity granted by Congress in June.
Students interested in technology law and policy may be interested in applying to work with EFF next summer through the Google Policy Fellowship, a program that gives students the chance to spend the summer working alongside host organizations on topics of Internet and technology policy.
Much like how the Summer of Code project aims to develop and promote open source projects, Google is hoping that policy fellowships will advance debate on key policy issues affecting the public. Google is kindly offering fellows a $7000 stipend (for a minimum of 10 weeks in June to August 2009) for working with host organizations like EFF on various topics.
[I wrote the following op-ed, which appeared in the Nov. 14 issue of The Recorder. Because that publication's website is not publicly available, I'm posting a copy here, with their permission.]
For most of the decade, Silicon Valley technology startups have assumed that Google would pay their legal bills. Not literally, mind you, but rather by taking on the big, high-profile cases about fair use, interoperability, and other digital intellectual property issues that would set precedents that all disruptive innovators could rely on.
Well, Google just put the Valley on notice that the free ride is over, which means more legal burdens for smaller technology companies that previously depended on Google clearing a path for them.
In counseling computer security researchers, I have found the law to be a real obstacle to solving vulnerabilities. The muddy nature of the laws that regulate computers and code, coupled with a series of abusive lawsuits, gives researchers real reason to worry that they might be sued if they publish their research or go straight to the affected vendor. By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied. I discuss this problem, and offer some ideas about what researchers can do about it, in a new document called "A 'Grey Hat' Guide". Constructive feedback is welcome, as I can use it to improve the paper.
Slashdot reports that Apple has sent a "cease and desist" email to bluwiki, a public wiki site, demanding the removal of postings there by those who are trying to figure out how to write software that can sync media to the latest versions of the iPhone and iPod Touch.
Short answer: Apple doesn't have a DMCA leg to stand on.
On November 12, 2008, a group of artists and activists unveiled a brilliant spoof of the New York Times, widely distributed to readers in New York and Los Angeles. This "July 4, 2009" version of the Times — which the real New York Times described as a "Grade-A caper" — boldly announced the end of the Iraq War, the nationalization of major oil conglomerates, the elimination of tuition at public universities, and the indictment of soon-to-be-former president Bush on charges of high treason.
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Know Your Rights
- Trade Agreements and Digital Rights
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anti-Counterfeiting Trade Agreement
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- Defend Your Right to Repair!
- Defending Digital Voices
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA Rulemaking
- Do Not Track
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2015 Copyright Review Process
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- Trusted Computing
- Video Games