Skip to main content

Home/ Politically Minded/ Group items tagged open source

Rss Feed Group items tagged

Skeptical Debunker

Big Content condemns foreign governments that endorse FOSS - 0 views

  • University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA's 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create "trade barriers" and restrict "equitable market access" for software companies. The profound absurdity of this accusation is exacerbated by the fact that Indonesia's move towards open source software was almost entirely motivated by a desire to eliminate the use of pirated software within the government IT infrastructure. It's important to understand that Indonesia has not mandated the adoption of open source software or barred government agencies from purchasing proprietary commercial software. The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA. In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia's policy "weakens the software industry and undermines its long-term competitiveness" because open source software "encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights." The number of ways in which the IIPA's statements regarding open source software are egregiously misleading and dishonest are too numerous to count. The IIPA seems to have completely missed the fact that there is a very robust ecosystem of commercial software vendors in the open source software market and that open source software is at the heart of some of the most popular consumer electronics products that are sold in the United States. It has clearly become an important part of the US software economy and increasingly serves as an enabler of innovation and technological progress. In light of the profitability of Red Hat and other open source leaders, it seems absurd to contend that open source software adoption will weaken the software industry or reduce its competitiveness. In fact, the emergence of open source software has contributed to creating a more competitive landscape in the software industry by offering alternative business models that enable smaller companies to gain traction against the dominant incumbent players. The IIPA's position is profoundly hypocritical, because many parts of the US government, including the Department of Defense, have issued their own memos endorsing open source software adoption. The IIPA's disingenuous move to equate open source software with piracy reeks of desperation. The BSA and other IIPA members are likely losing sleep over open source software because that development model and approach to licensing will empower developing countries to build their own domestic IT industries, eliminating the need for them to tithe to American software giants. It's another failing of the 301 review, which Big Content wants used to coerce other countries into adopting ever-more-stringent copyright laws.
  •  
    In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States. The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. We have already noted the targeting of Canada for its supposedly lax copyright laws, but that is not the only nation drawing the ire of Big Content. One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.
thinkahol *

Open-source governance - Wikipedia, the free encyclopedia - 0 views

  •  
    Open-source governance is a political philosophy which advocates the application of the philosophies of the open-source and open-content movements to democratic principles in order to enable any interested citizen to add to the creation of policy, as with a wiki document. Legislation is democratically opened to the general citizenry. The concept behind democracy, that the collective wisdom of the people as a whole is a benefit to the decision-making process, is applied to policy development directly
Levy Rivers

Tom Watson MP » Blog Archive » Power of Information: New taskforce and speech - 0 views

  • We commissioned Ed Mayo and Tom Steinberg to write the Power of Information report because we knew that information, presented in the right way, was a potent driver for improving public services and government.
  • Today I am going to offer two arguments that I think compliment the Prime Minister’s recent announcement on public service reform
  • Firstly, that freeing up data will allow us to unlock the talent British entrepreneurs. And secondly, engaging people - using the simple tools that bring them together - will allow the talents of all our people to be applied to the provision of public services.
  • ...20 more annotations...
  • The difference of course is that today we contend with what Richard Saul Wurman describes as a ‘tsunami of data’
  • My job is to make sure that government can benefit from this new thinking too. When we were first elected in 1997 people had a recipient relationship with data, they got what they were given when they were given it. It was static.
  • In scale, the spread of social media is comparable to the spread of telephones in the 1930’s to the 1950’s. Yet it’s happened in two years not 20.
  • As Clay Shirky would say, we’ve reached a point where technology is simple and boring enough to be socially useful and interesting.
  • Over 7 million electronic signatures have been sent, electronically, to the Downing Street petition website. 1 in 10 citizens have emailed the Prime Minister about an issue. The next stage is to enable e-petitioners to connect with each other around particular issues and to link up with policy debates both on and off Government webspace.
  • Only last week, the Prime Minister became the first head of Government in Europe to launch his own channel on Twitter, which I can tell you from experience, is extremely useful to his ministers at least
  • Richard is here tonight and I hope that after the formal proceedings you might like to share some of your own ideas with him. Richard is also joined by a number of other taskforce members. They’re all people with remarkable track records in this field. We’re lucky. The UK has some of the world’s leading talent.
  • And today the PM announced an initiative that would allow you to find your community Bobbies using your postcode.
  • The taskforce will bring its expertise to bare on existing initiatives to see if we can what we already do better
  • I want the taskforce to ensure that the COI and Cabinet Office produce a set of guidelines that adheres to the letter of the law when it comes to the civil service code but also lives within the spirit of the age. I’ll be putting some very draft proposals to the taskforce to consider later this week.
  • By bringing people onto the taskforce with the skills and experiences of people like Sally Russell we can move further and faster in this area.
  • Two weeks ago the Prime Minister signalled that we were moving public services to the next stage of reform. He said that we were not only going to, further enhance choice but also empower both the users of services and all the professionals who deliver them - to drive up standards for all.
  • Transformational government is about wrapping services around the citizen, not citizens around the services.
  • Last month DirectGov had over 7 million visitors. Peter is seeing the aggregate desires of millions of UK public service using citizens. I had half an hour with him a fortnight ago and came away with a dozen ideas as to how we can improve our public services.
  • I’m the Member of Parliament for West Bromwich East and I didn’t know about an important recycling initiative going on in my own patch. This information now means that a bag load of clothing for a small child and a habitat sofa are about given a second chance to give pleasure.
  • And much of that information has the potential to be reused in data mashups. Some of it already is, like Hansard on theyworkforyou, or Google Maps using Ordnance Survey data.
  • The Power of Information Report recognised that, and made recommendations to the Treasury. The Treasury, with the Department for Business, Enterprise and Regulatory Reform, published an independent economic study in the Budget and announced its intention to look at these issues during this spending review cycle.
  • It was this early open source approach that arguably fostered 500 years of Islamic scholarship in important fields like medicine, astronomy, lexicography, literature and science. In contrast, European data was stored in monasteries and did not foster easy knowledge transfer. As Gibbon wrote in the ‘Decline and fall of the Roman empire’ the ‘age of Arabian learning continued about five hundred years’ and was coeval with the darkest and most slothful period of European annals?
  • I believe in the power of mass collaboration. I believe that as James Surowiecki says the many are smarter than the few. I believe that the old hierarchies in which government policy is made are going to change for ever. I said that I don’t believe the post-bureaucratic age argument. It’s just old thinking, laissez faire ideas with a new badge. The future of government is to provide tools for empowerment, not to sit back and hope that laissez-faire adhocracy will suffice.
  • The irony that laying claim to the ownership of a policy on open source was lost to the poor researcher who had spent a day dissecting the speech. He’d been able to do so easily because it was freely available on my blog, a simple tool used for communicating information quickly and at nearly zero cost without the requirement to charge for access. The point is, who cares? It doesn’t matter who has the ideas. It’s what you do with them and how you improve on them that counts.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
thinkahol *

America's Secret Empire of Drone Bases - 0 views

  •  
    They increasingly dot the planet.  There's a facility outside Las Vegas where "pilots" work in climate-controlled trailers, another at a dusty camp in Africa formerly used by the French Foreign Legion, a third at a big air base in Afghanistan where Air Force personnel sit in front of multiple computer screens, and a fourth at an air base in the United Arab Emirates that almost no one talks about. And that leaves at least 56 more such facilities to mention in an expanding American empire of unmanned drone bases being set up worldwide.  Despite frequent news reports on the drone assassination campaign launched in support of America's ever-widening undeclared wars and a spate of stories on drone bases in Africa and the Middle East, most of these facilities have remained unnoted, uncounted, and remarkably anonymous - until now. Run by the military, the Central Intelligence Agency, and their proxies, these bases - some little more than desolate airstrips, others sophisticated command and control centers filled with computer screens and high-tech electronic equipment - are the backbone of a new American robotic way of war.  They are also the latest development in a long-evolving saga of American power projection abroad - in this case, remote-controlled strikes anywhere on the planet with a minimal foreign "footprint" and little accountability.Using military documents, press accounts, and other open source information, an in-depth analysis by TomDispatch has identified at least 60 bases integral to U.S. military and CIA drone operations.  There may, however, be more, since a cloak of secrecy about drone warfare leaves the full size and scope of these bases distinctly in the shadows.
David Corking

140,000 Miles of African Roads Added to Open Street Map | Development Seed - 0 views

  • It’s really important that data like GIS data is “open” and freely available to everyone, otherwise that economic (and digital) divide will never lessen.
  •  
    OSM is far from a mere hobby project
Arabica Robusta

West 86th - The Administration of Things: A Genealogy - 0 views

  • “If men never disagreed about the ends of life, if our ancestors had remained undisturbed in the Garden of Eden, the studies to which the Chichele Chair of Social and Political Theory is dedicated could scarcely have been conceived,” Isaiah Berlin told his audience at Oxford when he assumed that position in 1958. Philosophy was at its best when it was being contentious, especially when it was being contentious about the meaning and purpose of our common existence. Too much agreement was an abdication of its ethical responsibility
  • The task of philosophy was not to settle disputes, but to unsettle them, to encourage them, to keep them going. For it was only through disputation that we could resist the rule of experts and machines, the bureaucratic-technocratic society foretold by Saint-Simon and championed by Marx and Engels, a society in which we replace the “government of persons by the administration of things.”
  • Louis de Bonald pointed to the hard choices that the state would have to make. “In the modern state, we have perfected the administration of things at the expense of the administration of men, and we are far more preoccupied with the material than the moral,” he wrote. “Few governments nurture religion or morality with the same attention that they promote commerce, open communications, keep track of accounts, provide the people with pleasures, etc.” 12
  • ...6 more annotations...
  • All history, Comte argued, is a history of class struggle. Not the struggle between master and slave, lord and serf, bourgeois and proletarian—that was still a couple decades away—but the struggle between two classes of phenomena: “critical” phenomena that contributed to moral and political decay and “organic” phenomena that promoted individual and social regeneration.
  • The objective was to protect against arbitrariness in all of its manifestation. Earlier political thinkers had tended to associate arbitrariness mainly with absolutist governments, but for Comte any form of government was susceptible so long as it rested on “metaphysical” rather than “positive” principles.
  • Engels believed that the obsession with detail that had characterized utopian socialism—its compulsion to work out every last aspect of future social organization—is precisely what made it so utopian.
  • When, at last, it becomes the real representative of the whole of society, it renders itself unnecessary. As soon as there is no longer any social class to be held in subjection; as soon as class rule, and the individual struggle for existence based upon our present anarchy in production, with the collisions and excesses arising from these, are removed, nothing more remains to be repressed, and a special repressive force, a State, is no longer necessary.
  • “I think it was Trotsky who used a very plain but very telling metaphor,” the historian Isaac Deutscher told graduate students in a seminar on bureaucracy at the London School of Economics in 1960. “The policeman can use his baton either for regulating traffic or for dispersing a demonstration of strikers or unemployed. In this one sentence is summed up the classical distinction between administration of things and administration of men.”
  • Our hasty genealogy of the “administration of things” must conclude with its latest, and quite possibly last, iteration: Bruno Latour’s “Parliament of Things,” or Dingpolitik. Initially proposed in his book We Have Never Been Modern (1991), then extended in a massive exhibition and accompanying catalog, Making Things Public (2005), Latour’s program has attracted a growing number of partisans in the world of political theory
1 - 9 of 9
Showing 20 items per page