How US Copyright Expansionism Created The Infrastructure That Now Stymies US Gov't In Stopping Wikileaks

from the cause-and-effect dept

Two of the bigger stories these days are the US government’s copyright expansionist policies with domain name seizures and bills like COICA and (of course) the whole Wikileaks story. We’ve noted some similarities between large centralized systems reacting badly to distributed systems, but there’s also a much more direct connection as well. Glyn Moody points us to a blog post by Brendan Scott that lays out the basic fact that the distributed distribution tools that Wikileaks now relies on were mainly developed in response to constant copyright expansionism at the behest of the US government (on behalf of the entertainment industry). As Scott notes, he wonders if the US government will recognize this. However, given that it’s still pushing for even greater copyright expansionism (which will only make the “leaks” issue more difficult to control), it appears that very few in power actually understand this.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “How US Copyright Expansionism Created The Infrastructure That Now Stymies US Gov't In Stopping Wikileaks”

Subscribe: RSS Leave a comment
18 Comments
ChimpBush McHitlerBurton says:

Re: So...

I’ve always thought that the dictionary definition was the common definition. How else would we define irony?

Wait. I’ll bet you define it along the lines of Poetic Justice, don’t you?

Yeah, that’s called “Poetic Justice”. I imagine Poetic Justice is somewhat ironic for the perpetrator of a wrong who receives PJ. It’s just not ironic to the onlooker or historian; it’s satisfyingly expected.

CBMHB

ChimpBush McHitlerBurton says:

Re: Re: Re: So...

I was going to volley with a correspondence replete with briery aspersion, thinly-veiled innuendo, unmitigated malignity, calumny regarding your matrilineage, and a smattering of abject censure…

Then I realized that words are defined by their usage, and not what’s written in a book…so you’d have nowhere to go to understand what I just said.

Shame really…

CBMHB

Andrew (profile) says:

Dreams of further expansionism

A newer post from the same guy discusses the huge number of hits Wikileaks has taken over the past few days (kicked off Amazon, bank account suspended, MasterCard & Visa revoked, DDOSed, etc.) – the sorts of protections and sanctions that the copyright lobby can, thankfully, only dream of – and points out that they’re still around and more prominent than ever.

This is a response truly worthy of shock and of our awe. It is raw power being put to work, largely extra-legally. The exercise of this power has been extremely effective, remarkably quick and unburdened by judicial oversight ? it is the sort of response a copyright ideologue dreams of.

How can anyone take the copyright proposition seriously anymore? This is raw power, exercised by not just any old government, but by a very motivated Superpower ? and one which is aided by other governments large and small who also have a joint interest is keeping diplomatic cables secret. If this raw power can?t contain this information how could copyright holders backed only by a Copyright Act possibly do so? How is it possible to argue for extensions to the Act other than on the basis of vengeance?

iamtheky (profile) says:

What tools exactly? The article is certain it uses these tools and that they were spawned from government interference, but lists none. I am sure because it would quickly be shown that they were developed by research and/or educational institutions.

Remember there are plenty of legitimate uses for torr….or are we finally done with that argument and now just going to attribute all good P2P features to circumvention.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...