CC: The Story

From Lawrence Lessig:

Creative Commons was conceived in a conversation I had with Eric
Eldred. I was representing Eric in his case challenging the United
States Congress’ Copyright Term Extension Act. Eric was enthusiastic
about the case, but not optimistic about the results. Early on, he
asked me whether there was a way that we could translate the energy
that was building around his case into something positive. Not an
attack on copyright, but a way of using copyright to support, in
effect, the public domain.

I readily agreed, not so much because I had a plan, but because,
naive lawyer that I was, I thought we’d win the case, and Eric would
forget the dream. But nonetheless, long before the Supreme Court
decided to hear Eldred’s plea, a bunch of us had put together the
plan to build the Creative Commons.

We stole the basic idea from the Free Software Foundation — give
away free copyright licenses. Because copyright is property, the law
requires that you get permission before you “use” a copyrighted work,
unless that use is a “fair use.” The particular kind of “use” that
requires permission is any use within the reach of the exclusive
rights that copyright grants. In the physical world, these “exclusive
rights” leave lots unregulated by copyright. For example, in the real
world, if you read a book, that’s not a “fair use” of the book. It is
an unregulated use of the book, as reading does not produce a copy
(except in the brain, but don’t tell the lawyers).

But in cyberspace, there’s no way to “use” a work without
simultaneously making a “copy.” In principle, and again, subject to
fair use, any use of a work in cyberspace could be said to require
permission first. And it is that feature (or bug, depending upon your
perspective) that was the hook we used to get Creative Commons going.

The idea (again, stolen from the FSF) was to produce copyright
licenses that artists, authors, educators, and researchers could use
to announce to the world the freedoms that they want their creative
work to carry. If the default rule of copyright is “all rights
reserved,” the express meaning of a Creative Commons license is that
only “some rights [are] reserved.” For example, copyright law gives
the copyright holder the exclusive right to make “copies” of his or
her work. A Creative Commons license could, in effect, announce that
this exclusive right was given to the public.

Which freedoms the licenses offer is determined both by us (deciding
which freedoms are important to secure through CC licenses) and by
the creator who selects from the options we make available on our
website. The basic components have historically been four: (1)
Attribution (meaning the creator requires attribution as a condition
of using his or her creative work), (2) NonCommercial (meaning the
creator allows only noncommercial uses of his or her work), (3) No
Derivatives (meaning the creator asks that the work be used as is,
and not as the basis for something else), and (4) Share Alike
(meaning any derivative you make using the licensed work must also be
released under a Share Alike license).

These four options — when each is an option — produce 11 possible
licenses. But when we saw that 98% of our adopters chose the
“attribution” requirement, we decided to drop attribution as an
option. That means we now offer 6 core licenses:

(1) Attribution (use the work however you like, but give me attribution)
(2) Attribution-ShareAlike (use the work however you like, but give
me attribution, and license any derivative under a Share Alike license)
(3) Attribution-NoDerivatives (use the work as is, and give me
attribution)
(4) Attribution-NonCommercial (use the work for noncommercial
purposes, and give me attribution)
(5) Attribution-NonCommercial-NoDerivatives (use the work for
noncommercial purposes, as is, and with attribution)
(6) Attribution-NonCommercial-ShareAlike (use the work for
noncommercial purposes, give me attribution, and license any
derivative under a ShareAlike license)

(We also offer a couple of other specialty licenses that I’ll
describe in a later post).

These options get added to a basic template license. That template
assures that the creator (1) retains his or her copyright, (2)
affirms that any fair use, first sale, or free expression rights are
not affected by the CC license, and (3) so long as the adopter
respects the conditions the creator has imposed, the license gives
anyone in the world four freedoms: (i) to copy the work, (ii) to
distribute the work, (iii) to display or publicly perform the work,
and (iv) to make a digital public performance of the work (i.e.,
webcasting). Finally, the license also requires the adopter to (1)
get permission for any uses outside of those granted, (2) keep any
copyright notices intact, (3) link to the license, (4) not alter the
license terms, and (5) not use technology (i.e., DRM) to restrict a
licensee’s rights under the license.

The licenses give creators a simple way to mark their creativity with
the freedoms they want it to carry by default. The license is an
invitation to others to ask for permission for uses beyond those
given by default. A “Noncommercial” license does not mean the creator
would never take money for his or her creativity. It means simply,
“Ask if you want to make a commercial use. No need to ask if you want
to make just a noncommercial use.”

We launched Creative Commons in December, 2002. Within a year, we
counted over 1,000,000 link-backs to our licenses. At a year and a
half, that number was over 1,800,000. At two, the number was just
about 5,000,000. At two and a half years (last June), the number was
just over 12,000,000. And today — three months later — Yahoo!
reports over 50,000,000 link-backs to our licenses. “Link-backs” are
not really a count of how many objects are licensed under Creative
Commons licenses – a single license could cover 100,000 songs in a
music database for example, or a single blog might have multiple
instances of the license. But the growth does measure something: The
uptake of Creative Commons licenses is growing fast, and indeed, far
faster than I ever dreamed.

WSIS, Internet Governance and Human Rights

Time: Monday, October 3, 2005, 09.00 – 17.00
Venue: Hammarskog Conference Centre, Uppsala

Registration: johan.hellstrom@kus.uu.se
More practical information Background material

Why is there no debate or no media reports in Sweden about the emerging and existing information society and Internet governance issues? Internationally, the discussion is at its peak, with the second phase of the World Summit on the Information Society (WSIS) coming up in November in Tunis. Sweden, being one of the countries with the highest Internet access rates and with the ambition to be a leading nation on information and communication technology (ICT) usage and development, should be more involved in the international debate and also more concerned about the implications of Internet governance and Internet usage for society at large.

One reason for the absent debate is the existing intellectual divide between ICT and Internet management experts on the one hand, and democracy and human rights experts on the other. Technologists know how information technology can be managed and manipulated – but show little interest in or do not understand the implications for democracy and human rights.
More background

Keynote Speakers
Avri Doria (USA/Israel). Member of the UN Working Group on Internet Governance (WGIG). Technical Consultant, Providence, Rhode Island, USA. Researcher at the School of Technoculture, Humanities and Planning, Blekinge Institute of Technology, Sweden.

Astrid Dufborg (Sweden). Special ICT Adviser, Ministry of Foreign Affairs, Sweden. Convenor of the UN ICT Task Force Working Group on Enabling Environment.

Mathias Klang (Sweden). Researcher in the field of access to technology and technology rights at the Department of Informatics, University of Göteborg. Responsible for Creative Commons in Sweden. Editor of the book “Human Rights in the Digital Age” (Glasshouse Press, 2005).

Website
http://www.kus.uu.se/en/activities/activities/20051003e.shtml

Wow deadline!

Remember what was it Douglas Adams said about deadlines? “I love deadlines. I like the whooshing sound they make as they fly by” Unfortunately I can’t be as casual… My next deadline is a book chapter by Friday. I just handed in a draft of part of my thesis on Sunday – quick change: different focus different langauage… Lifes imitates blogs.

Here is the first paragraph

    Att vara människa är att delta i en komplex social interaktion men vi lever våra liv genom att delta i samhället inte genom att reflektera över den. Förtroende och tillit är så grundläggande beståndsdelar i våra liv att vi endast lägger märke till dem när systemfel inträffar. Att ta bussen till jobbet är en banal upplevelse inte sällan förknippad med tristess. Men för att vi ska kunna sitta där och uppleva tristessen krävs lager på lager av tillit till en mängd olika system. Vi utgår att bussbolaget har anlitat en förare som kan köra, är ansvarsfull, att bussen fungerar, att alla andra bilar i trafiken även denna dag tänker följa reglerna, att våra pengar kommer accepteras, att de andra på bussen följer god buss sed� Att som människa inte vara tillitsfull skulle vara ohållbart. Den tid vi sparar på att vara tillitsfulla gör att vi kan leva våra liv. Vår tillit har blivit en vana, vi reagerar nu endast om system inte fungerar. Vi blir irriterade när bussen inte följer tidtabellen eftersom vi har en förväntan att tidtabellen stämmer.

Handbook for bloggers and cyber-dissidents

Reporters Without Borders has produced this handbook to help bloggers and cyber-dissidents, with handy tips and technical advice on how to to remain anonymous and to get round censorship, by choosing the most suitable method for each situation. It also explains how to set up and make the most of a blog, to publicise it (getting it picked up efficiently by search-engines) and to establish its credibility through observing basic ethical and journalistic principles.

Reporters Without Borders Cyber-dissident Handbook

Privacy, GPS & Children

After taking a short look at some of the products available on the market (and it is a growing market, I did a similar small survey about a year ago) it is obvious that GPS surveillance of children (but obviously not only children) is only going to grow. Privacy & childrens rights be damned this fear of the terrible has led to “paranoid parenting” (Furedi 2001).

Here are some of the products and services available for parents and other amateur Big Brothers:

ULocate http://www.ulocate.com/
uLocate Communications is a leading provider of wireless location-based services (LBS) that leverage an individual’s location to deliver customized, actionable information:
â?¢ last known locations
â?¢ maps
â?¢ directions
â?¢ location-based alerts
â?¢ proximity-based points of interest

Wherify Wireless http://www.wherifywireless.com/
The GPS Wheriphone: Through the convergence of Global Positioning System (GPS) and digital wireless technology – along with Wherify’s patented location technologies – the GPS Locator Phone offers parents, family members and business people peace of mind knowing they can locate loved ones or valuable property, 24-hours a day, seven days a week. The slim, small and lightweight GPS Locator Phone can fit almost anywhereâ?¦from a backpack to a purse to a coat pocket to the family car.

Teen Arrive Alive http://www.teenarrivealive.com/
Features of the Teen Arrive Alive GPS service:
â?¢ Locations are updated every 2minutes.
â?¢ 7 days of location history is available.
â?¢ Location data can be downloaded to your computer.
â?¢ Our service provides physical address, speed, and heading for each location with a corresponding data point plotted on a map. See the route your teen has taken each day.
â?¢ Our patent-pending locator hotline allows parents to locate their teen anytime, from anywhere in the world from any phone.
â?¢ Location data is available in real time, 24 hours a day, everyday.
â?¢ You have unlimited access to location information with no additional fees or charges.
â?¢ Our service is as mobile as your teen. We locate the phone, not the car.
â?¢ The java application on the phone allows the teen to get their physical address and a corresponding street map directly on the phone – useful if they get lost.
â?¢ Choose from 5 different reports to analyze travel data.

DriveDiagnostics http://www.drivediagnostics.com/
Parents can receive:
â?¢ Recieve real time warnings when their child drives aggressively or dangerously.
â?¢ Be informed of specific and recurring aggressive and dangerous maneuvers performed by their teenager.
â?¢ Recieve real time warning messages to the parent via mail, SMS or phone call
â?¢ Gain access to driver profile, guidance and advise as to how to improve the teens driving
http://www.drivediagnostics.com/site/industry.asp?subMenu=teen

GPS Kid Locator Tracker Backpack http://www.spyshops.ca/trackerbackpack.htm
â?¢ Safety: The hours before and after school is in session are when parents worry most about their childâ??s safety. The GPS Kid Locator Tracker Backpack gives them an easy way to pinpoint their childâ??s location at any time.
â?¢ Convenience: The rechargeable battery operates for up to one week between battery recharges. Without having to remove the battery pack from the backpack, simply plug it into any outlet to recharge.
â?¢ Emergency Help: The GPS Kid Locator Tracker Backpack features an emergency call button that can be used to summon help or directly alert a parent to a childâ??s specific location. The child could also use the emergency call button to alert a parent should he or she become lost.
â?¢ GeoFence: Parents can easily construct a GeoFence online using the patented LOBOâ?¢ mapping software. A GeoFence is a defined are in which a parent can be alerted if the child is not inside the area or goes beyond a predefined area.
â?¢ Easy to Use: The GPS Kid Locator Tracker Backpack is self-contained and ready to use. Programming is done remotely online anytime anywhere. Our secure web site transmits programming instructions to the unit implementing them immediately.

Sentinel Watch (30 June 2004) – This may turn out to be vaporware since I have been unable to find updated information.
CPS and Xion collaborate on development of GSM based communications and security device
The new Sentinel Watch is based on a tri-band GSM engine and consistently delivers 100m accuracy in urban, suburban and rural areas. In addition the Watch can be tracked and located indoors and metal framed buildings. The watch also offers:
â?¢ parent/child communication via SMS/MMS
â?¢ a warning for parents if the child moves outside a designated or defined area
â?¢ a panic button which sends an immediate alert message to the parent
â?¢ security clasp and security strap the alert the parent when the watch is removed without authorisation
â?¢ gaming facilities
http://www.cursor-system.com/cps/news_detail.asp?ID=119

and finally the silliest of the lot…
SmartWear Technologies plans to launch a line of pajamas embedded with RFID tags (http://www.informationweek.com/story/showArticle.jhtml;?articleID=165701942).

Twain on Copyright

“Only one thing is impossible for God: to find any sense in any copyright law on the planet”
Mark Twain

(Mark Twain’s Notebook, Cooper Square, 1972, p. 381)

Pope not Potter Fan

No real surprise really that the new Pope is not a Harry Potter fan. In a letter he wrote as a Cardinal he warned that the books are dangerous to children. “…because those are subtle seductions, which act unnoticed and by this deeply distort Christianity in the soul, before it can grow properly.”

So I dont think that he will be lining up for an early copy…

Times Online

Cybersecurity and Computer Misuse

A consensus has emerged with regard to the governance of attacks against information systems. EU Member States will now harmonise their legislation to render illegal any act undertaken with the intention of compromising information stored on computers or networks. Unauthorised access or interference will now be illegal.

The decision of the JHA can be found here (pdf)

More material
CSIRT Handbook
http://www.edri.org/edrigram/number3.5/attacks
http://www.iht.com/articles/88499.htm
http://ue.eu.int/pressData/en/jha/74719.pdf

From Cyberbug