Table of Contents Egoism and Moral Scepticism ....................................................................................................................... 7 Religion, Morality and Conscience................................................................................................................ 8 Master and Slave Morality ............................................................................................................................ 8 Utilitarianism................................................................................................................................................. 9 The Debate Over Utilitarianism .................................................................................................................... 9 Categorical Imperative ................................................................................................................................ 10 The Nature of Rights and Value .................................................................................................................. 10 Taking Rights Seriously................................................................................................................................ 11 A Theory of Justice ...................................................................................................................................... 12 The Need for More than Justice ................................................................................................................. 12 23 Critiques of the Reproductive Health Bill 5043 .................................................................................... 14 Population Bogey: a scapegoat ................................................................................................................... 14 Unhealthy reproductive bill ........................................................................................................................ 16 Reckless and irresponsible .......................................................................................................................... 18 No place for reproductive health bill in our law ......................................................................................... 20 It's Satan's Semen, Stupid ........................................................................................................................... 20 Crucial questions on the RH bill .................................................................................................................. 21 No! to the Reproductive Health and Population Development Act of 2008 .............................................. 21 Should You Support Reproductive Health Bill No. 5043? Take this Simple Test to Find Out ..................... 21 What’s Wrong with the Reproductive Health Bill ....................................................................................... 22 Contraceptives harmful to women’s health ............................................................................................... 22 Oversimplication of Economists ................................................................................................................. 23 Spending Billions for Birth Control Pills? .................................................................................................... 23 Philippines Threatened By a 2-Child Policy ................................................................................................. 24 12 Reasons Why We Oppose HB5043 ........................................................................................................ 24 Artificial Birth Control is Fascist .................................................................................................................. 24 The Filipino Front in the Culture War ......................................................................................................... 25 The Smoldering Poker ................................................................................................................................. 25 Misconceptions and Clarifications on Issues Related to Humanae Vitae and theReproductive "Health" Bill in Philippine Congress ................................................................................................................................. 25 CEAP Statement (representing 1,256 Catholic schools including Ateneo, La Salle, UST, San Beda) .......... 26 Just Asking ................................................................................................................................................... 26 Statement on Reproductive Health Bill 5043 ............................................................................................. 27 Falsehoods in the Lagman Bill ..................................................................................................................... 27 What you can do to stop the Reproductive Health Act .............................................................................. 27 Population Bogey ........................................................................................................................................ 28 Unhealthy Reproductive Bill ....................................................................................................................... 28 No Place for RH Bill in our law .................................................................................................................... 29 FREE SPEECH ............................................................................................................................................... 30 Anonymity .......................................................................................................................................... 30 Bloggers' Rights ........................................................................................................................................... 32 CyberSLAPP ................................................................................................................................................. 33 No Downtime for Free Speech Campaign ................................................................................................... 34 The COICA Internet Censorship and Copyright Bill ..................................................................................... 35 Accessibility for the Reading Disabled ........................................................................................................ 37 Broadcast Flag ............................................................................................................................................. 38 Coders' Rights Project ................................................................................................................................. 39 Digital Rights Management......................................................................................................................... 40 Net Neutrality ............................................................................................................................................. 41 Patents ........................................................................................................................................................ 42 Trusted Computing ..................................................................................................................................... 43 https://www.eff.org/issues/trusted-computing ............................................................................................ 43 Video Games ............................................................................................................................................... 43 https://www.eff.org/issues/video-games .................................................................................................. 43 Broadcast Flag ............................................................................................................................................. 44 Copyright Trolls ........................................................................................................................................... 44 Digital Radio ................................................................................................................................................ 45 Digital Video ................................................................................................................................................ 45 Digital Millennium Copyright Act (DMCA) .................................................................................................. 46 File Sharing .................................................................................................................................................. 47 No Downtime for Free Speech Campaign ................................................................................................... 48 Patents ........................................................................................................................................................ 48 Anti-Counterfeiting Trade Agreement ........................................................................................................ 50 What is ACTA?....................................................................................................................................... 50 Why You Should Care About It .............................................................................................................. 51 What You Can Do................................................................................................................................... 52 Broadcasting Treaty .................................................................................................................................... 52 Development Agenda ................................................................................................................................. 52 EFF Europe .................................................................................................................................................. 54 Free Trade Agreement of the Americas...................................................................................................... 54 International Privacy Standards .................................................................................................................. 55 International Privacy Frameworks .............................................................................................................. 55 Organization for Economic Cooperation and Development ................................................................... 55 Council of Europe ................................................................................................................................... 56 Asia Pacific Economic Cooperation ....................................................................................................... 56 European Data Protection Directive ....................................................................................................... 56 International Conference of Data Protection and Privacy Commissioners ............................................. 56 Other International Instruments .............................................................................................................. 56 Mandatory Data Retention ......................................................................................................................... 57 The EU Data Retention Directive ........................................................................................................... 57 World Intellectual Property Organization................................................................................................... 58 Importing and Exporting Bad Law ......................................................................................................... 58 Towards Better IP Policy ........................................................................................................................ 58 Anonymity ................................................................................................................................................... 59 CALEA .......................................................................................................................................................... 60 Wiretapping Is Already Easy Enough ..................................................................................................... 61 Just Because It Can Be Tapped Doesn't Mean It Should ........................................................................ 61 The Cost of CALEA Will Be Passed on to Consumers .......................................................................... 62 Innovation Will Suffer ............................................................................................................................ 62 The Internet Is Not Like the Phone System ............................................................................................ 63 CALEA Could Make the Internet Less Secure ....................................................................................... 63 Cell Tracking ................................................................................................................................................ 64 Digital Books ............................................................................................................................................... 64 Locational Privacy ....................................................................................................................................... 65 National Security Letters............................................................................................................................. 65 NSA Spying .................................................................................................................................................. 66 Online Behavioral Tracking ......................................................................................................................... 67 Pen Trap ...................................................................................................................................................... 67 Printers ........................................................................................................................................................ 68 Real ID ......................................................................................................................................................... 69 RFID ............................................................................................................................................................. 70 Search Engines ............................................................................................................................................ 70 Google v. DoJ Subpoena......................................................................................................................... 71 Search Incident to Arrest ............................................................................................................................ 71 Social Networks........................................................................................................................................... 71 Travel Screening .......................................................................................................................................... 72 Border Searches ...................................................................................................................................... 72 Automated Targeting System (ATS) ...................................................................................................... 72 CAPPS II and Secure Flight.................................................................................................................... 73 E-Voting Rights ............................................................................................................................................ 73 FOIA Litigation for Accountable Government............................................................................................. 73 Test Your ISP ............................................................................................................................................... 75 EFF's Test Your ISP Software ....................................................................................................................... 77 Chapter 1: The Market at the Bottom of the Pyramid ............................................................................... 77 Chapter 2: Products and Services for the BOP............................................................................................ 78 Chapter 3: A Global Opportunity ................................................................................................................ 79 Chapter 4: The Ecosystem for Wealth Creation.......................................................................................... 80 Chapter 5: Reducing Corruption: Transaction Governance Capacity ......................................................... 81 Chapter 6: Development as Social Transformation .................................................................................... 81 Voxiva Case Study Guide Questions ........................................................................................................... 82 Jaipur Foot Case .......................................................................................................................................... 84 Casas Bahia ................................................................................................................................................. 86 Hindustan Lever Case.................................................................................................................................. 87 CEMEX Case Study ...................................................................................................................................... 89 What is the EFF concern regarding Free Speech? ...................................................................................... 94 What is the EFF concern regarding Intellectual Property? ......................................................................... 94 What is the EFF concern regarding International issues?........................................................................... 94 What is the EFF concern regarding Privacy? ............................................................................................... 95 What kind of bloggers does the EFF want on the Internet? ....................................................................... 95 What is CyberSLAPP? .................................................................................................................................. 95 How does EFF benefit those who have reading disabilities? ...................................................................... 95 What is a Broadcast Flag? ........................................................................................................................... 96 What is the Coder's Right Project? ............................................................................................................. 96 What is Digital Rights Management?.......................................................................................................... 96 What agency is in charge of making the rules of Net Neutrality? Can it be trusted? ................................ 96 What are patents designed to do? ............................................................................................................. 96 What will happen if the Broadcast Flag was fully implemented? .............................................................. 97 Is it legal to record radio programs? How so? ............................................................................................ 97 How many people in the United States have used file sharing? ................................................................ 97 What effect does the DMCA have on anonymous free speech? ................................................................ 98 How can the patent system be improved? ................................................................................................. 98 Why are Terms of Use contracts biased? ................................................................................................... 98 What concerns does the Anti-Counterfeiting Trade Agreement raise? ..................................................... 98 What concerns does the Broadcasting Treaty raise? ................................................................................. 98 What is the challenge concerning technological development in poorer countries? ................................ 99 What currently concerns EFF Europe?........................................................................................................ 99 What is the Global Network Initiative?....................................................................................................... 99 What is the WIPO? ...................................................................................................................................... 99 What is the basis for anonymity on the Internet? .................................................................................... 100 What is CALEA? ......................................................................................................................................... 100 Why is tracking people through their mobile phones controversial? ...................................................... 100 What features should digital books retain from their physical counterparts? ........................................ 100 What is the EFF doing regarding locational privacy? ................................................................................ 100 Why is NSA so controversial regarding the Internet? ............................................................................... 101 What are some Online Behavioral Tracking technologies being used? .................................................... 101 What problems are posed by the Real ID system? ................................................................................... 101 How is RFID controversial? ....................................................................................................................... 101 How are search engines controversial? .................................................................................................... 102 What is the problem regarding Search Incident to Arrest? ...................................................................... 102 What is the main problem concerning Social Networks? ......................................................................... 102 How are Travel Screenings problematic? ................................................................................................. 102 What are the problems regarding E-voting? ............................................................................................ 102 What is the aim of the FOIA Litigation for Accountable Government (FLAG) Project? ............................ 103 What are Terms of Service? ...................................................................................................................... 103 What is the problem with some ISPs? ...................................................................................................... 103 Copyright, Privacy, and Anonymity ........................................................................................................... 103 Chapter 1: Foundations of Information Ethics.......................................................................................... 104 Chapter 2: Milestones in the History of Information and Computer Ethics ............................................. 105 Chapter 3: Moral Methodology and Information Technology ................................................................. 107 Chapter 4: Value Sensitive Design and Information Systems ................................................................... 108 Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property ....... 109 Chapter 6: Informational Privacy: Concepts, Theories, and Controversies .............................................. 110 Chapter 7: Online Anonymity ................................................................................................................... 111 Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counter hacking ....... 112 Chapter 9: Ethical Interest in Free and Open Source Software ................................................................ 113 Chapter 10: Ethical Interest in Free and Open Source Software .............................................................. 114 Egoism and Moral Scepticism By: James Rachels This chapter focuses on the two kinds of egoism. These are mainly the ethical and the psychological egoism. These two might be synonymous, but they are far different from each other when they are properly analyzed. Psychological egoism is the perspective wherein humans are selfish in everything they that they do in which they only act in accordance to their self interest. If we are to analyze it, it may have some sort of truth in it. But going deeper can give us a clue that humans are not always selfish in their acts. A very good example is when someone foregoes his own enjoyment for the sake of helping other people. We can't say that it is an act of selfishness but it is can be considered as an act of self-interest if it is in which case. It's because that if the interest of that person is the welfare of others, then that is not acting selfishly. Another thing that would support the idea of humans being unselfish is that when a person get satisfied in helping others. We can't say that it is for his own interest because there will be no selfish person that would become satisfied when helping others. Ethical egoism on the other hand, tells us that humans are only obliged to act for themselves and nothing else. If we are to find some logical error into it, then there might be none. But there are things that it does which shouldn't be the case. It challenge our moral confidence to a demand of an explanation on the reason of adopting policies in which other's welfare are given importance. Thus it forgets the value of sympathy that every human has. A human without sympathy can't be considered as one. It is to say that in these kinds of arguments, reason alone is not the solution. Religion, Morality and Conscience By: John Arthur This chapter discusses the relationship between religion and morality. According to John Arthur, morality and religion is different for the reason that morality involves our attitudes toward various forms of behavior, typically expressed using the notions of rules, rights and obligations. On the other hand, religion, typically involves prayer, worship, beliefs about the supernatural, institutional forms and authoritative texts. Morality and Religion are connected for the reason that without religion people could not do the right thing; that religion is necessary to provide guidance to people in their search for the correct course of action; and that religion is essential for there even to be a right or wrong. Master and Slave Morality By: Friedrich Nitzsche This chapter discusses two types of morality according to what kind of person is holding it. These are the master morality and slave morality. These two things seem to be of the opposite side but both entail right and wrong character which teaches us to be observant on how we will act. The first type is the master morality. This type is the one which can also be consider as the morality of the ruler. Here, we can say that those people are the ones which they think that they are the ones who identify what is good or evil. This leads to a synonymous term which is the noble and despicable. A noble man considers himself distinguish from others and whatever he says will be praised and acknowledge by the many. He always thinks that everything he has is good and what they don't have is bad. Thus, he labels himself as the determinant of values. We may somehow see this kind of attitude in an egoist. Both of them use morality only for self-glorification. They may be able to help those that are unfortunate, but it is not because of kindness or pity, rather it is because of the superabundance of their resources that they want to find some usage for it rather for it to waste. They always honor themselves in the way that they see themselves powerful and he is the only one who has power over himself. The good thing here is that a noble man knows the manner to speak and to keep silence. The point here is that this type of morality considers that everything that entails them to be more powerful will always be consider as good even it destroys other people. Utilitarianism By: John Stuart Mill Based on John Stuart Mill’s article the only thing important as he said in his article, a means to an end is happiness and anything that is the opposite of that is unhappiness and is wrong. The principle of utility is that happiness can be achieved and anything that can make us happy are the things right and if anything is with the absence of happiness is something wrong. The author explained what creed is, it is a brief authoritative formula of religious belief or a set of fundamental beliefs, a guiding principle. As I understand it. We should be able to utilize the things around to make us happy and that our belief tells us that we need to be happy and that the absence of happiness is equivalent to something that is something wrong The Debate Over Utilitarianism By: James Rachels “There must be other countless errors of the same sort that no living man can yet detect, because of the fog within which our type of Western culture envelops us. Cultural influences have set up the assumptions about the mind, the body, and the universe with which we begin; pose the questions we ask; influence the facts we seek; and direct our reaction to these interpretation and conclusions.” Rachels, discussed the different kinds of utilitarianism and how the followers of utilitarianism refutes the idea that Rachels suggested. First, actions are to judged right or wrong solely in virtue f their consequences. Nothing else matters. Second is assessing those consequences. whether they produce happiness or unhappiness. Lastly, calculating the amount of happiness it caused. Rachels quoted Mill passage “the happiness which forms the utilitarian standard of what is right in conduct, is not the agent’s own happiness, but that of all concerned. As between his own happiness and that of others, utilitarianism requires him to be as strictly impartial as a disinterested and benevolent spectator.” Rachels pointed out too that utilitarianism theory states that right actions are those that produce the greatest balance of happiness over unhappiness, with each person’s happiness counted as equally important. Rachels pointed out that one’s happiness is equivalent to others happiness no matter how big it is or small. Categorical Imperative By: Immanuel Kant “Moral Worth of an action does not depend on the result expected from it and so too does not depend on any principle of action that needs to borrow its motive from this expected result.” I believe in the quoted words used by Immanuel Kant. There is a universal law that we follow to justify an action of a person. The right of RIGHT reasoning is where you categorize the things of what you think is right and will apply to you and to others. According to Kant, human beings occupy a special place in creation, and morality can be summed up in one ultimate commandment of reason, or imperative, from which all duties and obligations derive. He defined an imperative as any proposition that declares a certain action (or inaction) to be necessary. A hypothetical imperative compels action in a given circumstance: if I wish to quench my thirst, I must drink something. A categorical imperative, on the other hand, denotes an absolute, unconditional requirement that asserts its authority in all circumstances, both required and justified as an end in itself. It is best known in its first formulation:"Act only according to that maxim whereby you can at the same time will that it should become a universal law”. his argument was based on his striking doctrine that a rational will must be regarded as autonomous, or free in the sense of being the author of the law that binds it. Based on the article I have learned that the only thing that a person lives for is doing the right reasoning. There is a universal law that we follow to justify an action of a person. The right of RIGHT reasoning is where you categorize the things of what you think is right and will apply to you and to others. The Nature of Rights and Value By: Joel Feinberg “A right is a claim and a claim is “an assertion of right”. Feinberg said every person claims that they have their own rights and responsibility to fulfill. Every persons perception about right differs, some maybe of same direction but end result and some may be of different direction but same end result. I have learned that rights are important for a society to maintain its harmony. A person who value their rights do things to their neighbor the things that they wanted to be treated as well. I think that the reason for a harmonious relationship between people be it couple friends, neighbors, workmates and other kind of relationship is the ability to respect each other’s right and belief. You cannot impose to someone that you have a more reasonable belief that theirs because for them their belief is much more viable than yours. You can talk your way through it but always remember that the only reason they will believe is the reason they want to believe in, not yours but theirs. The article said that a person is or have to defend their rights. Everybody has a balanced authority to defend themselves against the threats of others. Local government units are designated to enforce the law and make they apply to everybody. These are the agencies of our society that make sure that peace and order are maintained in the society. The author said that if ever that you feel that someone is somewhat stepping inside your comfort zone and endangering your rights then you have the ability to defend it and can make them be subjected to law. People should learn to respect the rights of others as much as they wanted others to respect their rights as well. Respect is earned not just given away. Taking Rights Seriously By: Ronald Dworkin “If the government itself is not taking right seriously, then they do not take the law seriously either”. The quote explains it all. Where do you think the rights of the people is based on? Their beliefs, on others want? Dworkin, the author, tackled the importance of the rights of the people as person why we should take this seriously. Ronald Dworkin in the article asserts that individuals have legal rights beyond those openly laid down by the government and also that they have political and moral rights against the state that are prior to the welfare of the majority. Also he argues that basic among political rights is the right of each individual to the equal respect. Every person has the right to political issues, each individual have the right to earn equal respect whether one person have a white collared or blue collared job. They are all the same and though they don’t have the same status in life. They are still the same, human beings they have both equal rights. But if the law is not applicable to other since he is poorer then there is what you call inequality of rights. We should not decide whether a person is guilty of something just because he is able to do it. Or have the ability to do it. Always give the person the benefit of the doubt. I’ve learned that people should take our rights seriously because sometimes we find things funny until it happens to us. A Theory of Justice By: John Rawls “In justice as fairness the original position of equality corresponds to the state of nature in the traditional theory of the social contract. This original position is not, of course, thought of as an actual historical state of affairs, much less as a primitive condition of culture. It is understood as a purely hypothetical situation characterized so as to lead to a certain conception of justice.” We will be having a better place to live in. If only government play by the rule of “equal treatment” if they just take these things seriously then it is a better place to live in. he implicitly stated that each person has the right to live freely, without the fear of any threat and abuse. In reality, justice favors those who are in power, people who can buy their way to the top and can twist the situation for their own benefit. Equality amongst the people should always be upheld by the governing state because it is through equality that peace and harmony is achieved. Defining liberty as personal freedom from servitude or coercion or cruelty. The second principle of justice which is wealth states that social and economic inequalities are to be arranged so that they are both: (a) to the greatest benefit of the least advantaged, consistent with the just savings principle, and (b) attached to offices and positions open to all under conditions of fair equality of opportunity. The According to Rawls theory, these are the principles that free and rational persons would accept in a theoretical creative position where there is a veil of ignorance hiding from the contractors all the particular facts about themselves. Rawls think that by giving everyone an equal access to the basic judicial services of the government and people will be treated equally. The Need for More than Justice By: Annette Baier In the article, Annette Baier, the author of the reading The Need for More than Justice, points out the importance justice towards attaining peace and harmony in society. Is Justice really relative to fairness? What about those who said to serve justice but in reality are innocent? Is that still fairness? She distinguishes between the justice perspective of philosophers such as Kant and Rawls and the care perspective Gilligan found in her studies of the moral development of women. The reading discusses about the inequalities between people, where it has an unlikely realistic view of freedom of choice, and it ignores the importance of moral emotions such as love. She also tackled a moral theory that talked about how justice is harmonized justice and care. Annette said that one cannot regard any version of morality that does not ensure that caring for children gets well done as an adequate “minimal morality,” anymore than we could so regard one that left any concern for more distant future generations an optional extra. Justice brings forth an authoritative element to society that sets standards for the people to follow. These standards set by the law are what help in bringing forth equality and fairness into the table because any defiance with the law will result into just consequences. All in all, justice is meant more for the society because it is designed to prove constantly that people are safe within their society. Victims will be given proper justice for the damages or loses the have suffered because criminals will be caught, who will go under trial and be convicted. In general, we may conclude that justice is what keeps the world safe. 23 Critiques of the Reproductive Health Bill 5043 Most of the critiques of the Reproductive Health Bill 5043 share the opinions about the bill being: Unconstitutional, Against the Church Teachings, Against the Law of God, Against the Human Rights (because it intervenes the individual’s right to privacy), Destructive of public morals and Flawed premise. Almost all of the 23 critiques of the Reproductive Health Bill 5043 are Catholics, which of whom some of them are officers of the Catholic Church. For a bill that unavoidably deals on moral issues, more specifically gender equality, responsible parenthood, family planning and abortion, it miserably failed to include in its declaration of policy and guiding principles any reference to our “Almighty God,” which point is clearly so emphasized in the preamble of our Constitution. The bill also failed to explain clearly to the public the contents of the Reproductive Health Bill. The bill is broad in its sense. The simpler, the better should be the rule. The bill is nothing but ambitious as it seeks to envelop at the same time in such a short single initiative a handful of differing and complicated subjects revolving around population, women’s rights, health promotion, gender equality and human rights. Population Bogey: a scapegoat By Sonny Coloma, Business World In the article Population Bogey: a scapegoat, the content of the article is that “In the fifties and up to the time martial rule was imposed by a dictatorial President, the communist bogey was the favorite justification for witch-hunting against advocates of progressive thought who were accused of "destabilizing" the government and "threatening our democratic way of life." Today, the communist bogey has been replaced by a new scapegoat: the population bogey. House Bill 5043, otherwise known as the Population and Reproductive Health Bill, is now being debated. Even if the bill has not been passed it has been reported that about P 2 billion has been appropriated to fund the purchase and provision of contraceptives that will be distributed in health centers nationwide. I first became aware of the population bogey when, as a freshman in UP, I read the winning piece for the Philippine Collegian editorship written by Antonio Tagamolila. (Government soldiers in the coutnryside killed Tony Tagamolila in the early seventies, not long after his stint as Collegian editor.) His lead sentence was quite memorable: “The ghost of the Parson Malthus once more stalks the land.” Thomas Malthus was a Protestant minister who warned about the potentially catastrophic consequences of “geometric” (or “exponential”) population growth far outstripping “arithmetic” growth in food production. This view found resonance in the Club of Rome’s exposition on the Limits to Growth in the mid-seventies. But such gloom-and-doom scenarios have not materialized. Advances in technology have greatly enhanced human productivity. The market economy has created such an abundance of wealth that, even if not equitably distributed, has forestalled the dire predictions on the supposed detrimental effects of the law of diminishing marginal returns. Poverty cannot be totally blamed on the poor themselves: it is more clearly the outcome of human greed and bad governance. In the Real Wealth of Nations, Riane Eisler points out that it is dominator economic systems that “artificially create and perpetuate scarcity – and with this, pain and fear.” Such systems have spawned “heavy investment in armaments, lack of investment in meeting human needs, ruthless exploitation of nature, and waste of natural and human resources from wars and other forms of violence.” In our country, the Catholic Church has often been blamed by politicians for the continuing high population growth rate. I recall that during the Ramos regime, Cardinal Sin mobilized a huge rally in Luneta to counteract the high-profile birth control program of the Department of Health that was then headed by flamboyant Secretary (later Senator) Juan Flavier. During my two stints in government, I have realized why every secretary of health is bound to support the use of contraceptives in population control programs. Almost the entire DOH budget (up to 80%) is allocated for personnel salaries and administrative expenses. Only official development assistance from such sources as the US Agency for International Development (USAID) makes it possible for the DOH to pursue meaningful pubic health programs. I am opposed to HB 5043 even if I favor planned parenthood through natural methods. My opposition stems from the fact that, historically, the open tolerance of the use of contraceptives has produced more harmful effects than the good that its advocates have vowed to promote. A culture of contraception is, essentially, an anti-life –not a pro-choice—culture. It is also antifamily. Contrary to expectations, the percentage of out-of wedlock births has increased dramatically since oral contraceptives, or birth control pills, were approved for sale in 1960. In the US, out-of-wedlock births have increased from 6% to about 35%. In Europe, about half of the children in Denmark, Sweden, and Norway are born to unmarried mothers. These figures give rise to the query: since birth control pills prevent pregnancy, shouldn’t the out-of-wedlock pregnancy rates have gone down? Not so, because of the operation of the law of unintended consequences. Since contraception has become legitimate, then childbearing can take place outside marriage. Hence, there has been a big increase in the out-ofwedlock pregnancies – and births – and of abortions as well. With few exceptions, abortions always happen outside of marriage. Another consequence of the onset of the culture of contraception is the spiral in the incidence of divorce and a corresponding decline of marriage as an institution. Let the authors of the House Bill explain and justify to the people the rationale in terms of the foregoing challenges: the likely increase in unwanted pregnancies and criminal abortions, out-of-wedlock births, and the decline of marriage. Let them file a divorce law to complete their menu for the new Filipino lifestyle. But let the silent majority of those who are opposed to abortion and the decline of the family as an institution also speak up. (…) Not surprisingly, none of the presidential wannabees for 2010 has spoken in favor of HB 5043, which still needs a Senate counterpart measure that is yet to be reported out and debated on the floor. Catholics should come out in the open and ask their senators, congressmen, and political leaders to declare where they stand on this issue.” – The article of the first critique from the 23 Critiques of the Reproductive Health Bill. The author doesn’t believe that by the passing of the reproductive health bill 5043. The problem with population growth will lessen. As a matter of fact, she even pointed out that poverty cannot be totally blamed on the poor themselves: it is more clearly the outcome of human greed and bad governance. Actually, there are a lot things that she pointed out that because the contraceptive pills are now available for public consumption there was a surprisingly an increase of pregnancy out of wed-lock relationships. She was opposing the HB 5043 even though she is in favor of planned parenthood by means of natural methods because for her which I also believe that the tolerance for the use of contraceptives has produced more harmful effects than the good that its advocates have vowed to promote. Unhealthy reproductive bill by Atty. Augusto Bundang, Business World In the article Unhealthy reproductive bill, the content of the article is that “The "conscience" theme has never left local advertisements. The story line in many television ads about a woman talking to her inner voice or conscience in deciding what better soap or product to buy for her family never fails to amuse us for decades. The conscience advises the woman what product is good for her family and what will be beneficial to her in the long run. It teaches her to distinguish right from wrong. Her conscience guides her and warns her to act only in accordance with her own standards of right and wrong. I guess the current debate on House Bill 5043, or the “Reproductive Health Bill,“ involves at the very least an exercise of conscience as well. I tried to read through its provisions, attempting somehow though probably failing at times to momentarily set aside tenets that have been taught to me as a Roman Catholic. Well my conscience did not stop pricking me as I look at its contents. For a bill that unavoidably deals on moral issues, more specifically gender equality, responsible parenthood, family planning and abortion, it miserably failed to include in its declaration of policy and guiding principles any reference to our “Almighty God,” which point is clearly so emphasized in the preamble of our Constitution. The bill is nothing but ambitious as it seeks to envelop at the same time in such a short single initiative a handful of differing and complicated subjects revolving around population, women’s rights, health promotion, gender equality and human rights. Empirically such a hodgepodge bill will undoubtedly lead to more explanations and oversight confusion in the future. “The simpler, the better” should be the rule. The bill for all its good intentions made sweeping assumptions in an effort to push for what is referred to as “responsible parenthood.” Section 5 of the bill makes the Commission on Population (Popcom) the central planning and implementing body for the reproductive health policy. With Popcom at the helm, the bill apparently highlights the view that curbing the population is its main thrust. In its guiding principles (Section 3 (e)), the bill mentions “the limited resources of the country” affected by a “burgeoning multitude” that results in grossly inadequate and meaningless allocations. In effect, it perceives population in the country a “problem” that must be solved as it depletes its resources. But isn’t manpower the most important resource a country can ever have? Isn’t labor, more so an intelligent and productive one, the key to enhancing and maximizing resources, thus making resources bountiful and limitless rather than limited? Have our representatives failed to see the obvious by ignoring the continuing calls of developed countries for millions of migrants to work in their businesses and efforts to replace their graying population? The bill’s proponents if they truly believe in its importance, should work on other arguments and cease harping on the population growth. This type of reasoning has been shown to be false, misleading, obsolete, and very far from reality. Increasingly, Section 10 of the bill treats contraception as “essential medicines.” Categorizing contraceptives as such would imply that conception, which contraceptives seek to present, is a disease that requires medicines. Under Section 12 of the bill mandatory reproductive health education shall begin from Grade 3 up fourth year high school or for six continuous years from the time child is 11 years old up to the time he or she reaches 17 years of age. What will that make of them? Sex specialists or adventurists perhaps? Section 17 on the mandatory inclusions of free delivery by employers of a reasonable quantity of reproductive health care services, supplies and devices to all their workers under the collective bargaining agreement, is another awkward scheme to allow government to irregularly and unduly interfere in the relationship between employers and their employees and to violate the employer’s free exercise of religion. Freedom to exercise one’s religion is also infringed under Section 21 which considers as criminals the act of any health care service provider, whether public or private, to refuse to perform voluntary ligation and vasectomy and other legal and medically safe reproductive health care services. In the end, notwithstanding the long arguments raised by the bill’s proponents, they all would have to contend with their own conscience and examine themselves if indeed, the bill’s provision to which they adhere do not get entangled with their moral judgment. I’m not even talking of religion here. For conscience, is in a way above reason and discussion. It operates without the influence of any teaching ideology, or tradition, and comes as an automatic command whether to the young or to the old, the educated or the uneducated. It warns and it judges. Part II Last Sunday was another day of sermon criticizing House Bill 5043 or the Reproductive Health Bill. The priest who was giving a discourse on the subject kept exhorting on how the bill would violate the laws of men and of God. The problem, though, is, like some who would condemn the bill outright, the clergyman did not point out the specific provisions of the bill that he found objectionable. By coming up with sweeping statements and conclusions without laying the predicate, so to speak, he may have succeeded in convincing the devout churchgoers to disagree with the bill, but he definitely failed to make them informed and critical faithful followers who can ably defend their position when confronted by those who support the bill. Through this and last week’s columns, we hope to assist those who wish to know more about the bill and some of its damaging provisions. Stupid is as stupid does. That’s how Section 17 or the penal provision of the bill really is. It may be likened to the state-sponsored persecution by the Romans of the Christians for simply exercising their rights religious belief. It criminalizes acts that are morally right and fosters state initiatives that would infringe the Bill of Rights. Penalties imposed by the bill range from one month to six months imprisonment or a fine of P10,000.00 to P50,000.00. Violators are also civilly liable to the so-called “offended party” upon the discretion of the court. Under Section 17, regardless of their moral and ethical convictions, public and private health care service providers cannot knowingly withhold or impede the dissemination of information regarding programs and services on reproductive health., including the right to informed choice and access to a full range of medically-safe and effective family planning methods. They also can neither fail to provide reproductive health care services nor refuse to extend the same on account of the patient’s civil status, gender or sexual orientation, age, religion, personal circumstances, and nature of work. Worse, they cannot refuse to provide such services to a DSWD-certified abused minor or abused pregnant minor on whose case no parental consent is necessary. True, Section 17, also mentions “that all conscientious objections of health care service providers based on religious grounds shall be respected”. But then, why is the said proviso inserted only in one of Section 17’s subparagraph s and not crafted separately so as to apply to all paragraphs of the section? And yes, why is it that conscientious objections based on religious grounds are the only ones respected? What if the objections emanate from moral, logical or philosophical underpinnings? Will they be disregarded? One thing that well need to be reminded about this bill is the inevitable fact that all money to be utilized to provide those reproductive health and family planning services (many of which we cannot stomach) as well as to “urgently” promote them (Section 19 so says) will come from our very own pockets. Taxpayers money, we call it. We, the taxpayers, will foot the “bill” even if we find the bill repulsive and even if we know that our money would be put to better use with the building of well equipped hospitals and health centers. If this is not dumb, I don’t know what is. Our definite way of ending this long and costly argument on Bill 5043 is for President Arroyo to finally and resolutely make a pronouncement that she will not support it and will veto it if and when it reaches Malacañang. The President may have compromised her principles on many issues, but this is one situation I hope where she will neither back down nor surrender her values for the sake of her own redemption, political or otherwise. Remember, Madam President, we are not the only ones watching you. He too is ---- always.” – The article of the second critique from the 23 Critiques of the Reproductive Health Bill. “The simpler, the better” should be the rule. That what caught my attention, Before I began reading the comments of the critiques, I made a little research about the HB 5043. I browse through its provisions and sections and tried hard to understand everything they wanted to incorporate in the bill. I can see, what Atty. Bundang is trying to point, the HB is trying to tell people because of its increasing population. In effect, it perceives population in the country a “problem” that must be solved as it depletes its resources. Atty. Bundang said isn’t it a bigger problem that the need for people to go out of the country because they wanted to fill up the places where it should be populated by their natives? He opposes the bill because of many reasons, one highlighted reason was section 12 of the HB reproductive health education shall begin from Grade 3 up fourth year high school or for six continuous years from the time child is 11 years old up to the time he or she reaches 17 years of age. Are they trying to make them sex specialist? Which I couldn’t agree more. Reckless and irresponsible By Atty. Jo Imbong, CBCP In the article Reckless and irresponsible, the content of the article is that "http://opinion.inquirer.net/inquireropinion/talkofthetown/view/20080816-155092/Churchreplyto-reproductive-health-bill-facts-fallacies REP. EDCEL LAGMAN, THE PRINCIPAL AUTHOR OF THE proposed Reproductive Health and Population Development Act of 2008 asserts, among others, that the bill is neither antilife nor antifamily, that contraceptives are not life-threatening and that the bill does not impose a two-child policy. Prolife? To value human life is to respect and protect life in all its seasons. "Human life begins at fertilization." (Records of the Constitutional Commission, Vol. IV, Sept. 18, 1986, pp. 761, 801) hence, "the State shall equally protect the life of the mother and the life of the unborn from conception." (Constitution, Article II, Section 12). Lagman said in a House hearing that the bill would protect human life "from implantation." By that token, the zygote not yet in the mother's womb is not protected. Pills and the IUD hinder implantation of the embryo in the uterus, thereby precipitating the embryo's destruction. That is abortion. And yet, "every child ... needs appropriate legal protection before as well as after birth (UN Convention on the Rights of the Child). Not life-threatening? Records are rife of perforation of the uterus and serious pelvic infections in women with IUDs that public midwives have refused to extract. The Mayo Foundation found that oral contraceptives are associated with an increase risk of breast cancer. DepoProvera increases a woman's risk for chlamydia and gonorrhea. Oral contraceptives containing cyproterone increase risk of deep venous blood clots. Levonorgestrel is banned in this country as the Bureau of Food and Drugs found it to be abortifacient. Life-threatening ectopic pregnancies occur in mothers long after undergoing tubal ligation, particularly those sterilized before age 30. Contraceptives as essential medicines? Contraceptives do not treat any medical condition. Fertility is not a disease. It attests to health! The bill targets "the poor, needy and marginalized." This is most unkind to them whose real needs are jobs, skills, education, lucrative opportunities, nutrition, and essential medicines for anemia, tuberculosis, infections and childhood diseases. Remember, every citizen has the right to health (Art. II, Sec.15), hence, the State has a duty to protect the citizens against dangerous substances (Constitution, Art. XVI, Sec.9), and protect women in their maternal function (Art. XIII,Sec. 14). Family friendly? The "encouragement" to have two children is manipulation both brazen and subtle. It can set the stage for a stronger application of the recommendation through legislative amendments. Spouses have a basic, original, intrinsic and inviolable right "to found a family in accordance with their religious convictions and the demands of responsible parenthood" (Art. XV, Sec. 3 [1]). This includes their right to progeny. The bill mocks parents with fine and imprisonment in refusing to expose their children to mandatory "age-appropriate" reproductive health education starting Grade 5 outside the loving confines of home and family. Vulnerable and malleable, our children will be taught "adolescent reproductive health" and "the full range of information on family planning methods, services and facilities" for six years. This is child abuse of the highest order. And yet, "every child has the right to be brought up in an atmosphere of morality and rectitude for the enrichment and strengthening of his character." (Child and Youth Welfare Code) The ... care and nurtur[ance] of the child reside first in the parents (Article II, Sec. 12, Constitution), whose primary function and freedom include preparation for obligations the state can neither supply nor hinder. (Brantley v. Surles, 718 F. 2d. 1354,1358-59) The State did not create the family, and "the child is not a creature of the State." (Pierce vs. Society of Sisters, 268, U.S. 510, 535.) That is the law of nature, and no human institution has authority to amend it. Quality of life? The bill wants to "uplift the quality of life of the people." Population control started in 1976 "to increase the share of each Filipino in the fruits of economic progress." In other words - to eliminate poverty. Has it? The General Appropriations Act of 2008 earmarks an enormous amount for "family planning and reproductive health services," including contraceptives. For the Department of Health it is P3.19 billion; for Popcom -- P386.5 million, quite apart from funds for other agencies of government and local government units for the same programs. Add $2.4 million from the United Nations Population Fund for population and development and reproductive health for 2008, plus $2.2 million for 2009. Today's average family has three children compared with seven in the '70s. But the billions of pesos spent have not reduced poverty or benefited the poor. If Congress passes this bill, it wagers the future of the country. Citizens have a right to resist misplaced and irresponsible exercise of authority because the good of the people is the supreme law. Salus populi est suprema lex. The path of irresponsible legislation is a dreadful path: If an act is made legal, it will be perceived as moral. If an act is perceived as moral, it will become a norm. If it is observed by all as a norm, then it is too late. By then, you will have changed the culture. That is not simply reckless. It is the ultimate breach of public trust. “ – The article of the third critique from the 23 Critiques of the Reproductive Health Bill. Atty. Imbong says and I quote: “Contraceptives do not treat any medical condition. Fertility is not a disease. It attests to health! The bill targets "the poor, needy and marginalized." This is most unkind to them whose real needs are jobs, skills, education, lucrative opportunities, nutrition, and essential medicines for anemia, tuberculosis, infections and childhood diseases.” Also he is pointing out that the bill doesn’t contribute to the fact that the government is trying to eliminate poverty which HB 5043 doesn’t fit in that category at all. I believe that there is a need for the low and lowest category in the society needs these family planning, in fact I believe that there is a need for that in every family but it is a matter of choice not forcing it to people, definitely not a mandatory thing. No place for reproductive health bill in our law Sen. Francisco Tatad, International Right to Life Federation According to Sen. Tatad, THE REPRODUCTIVE HEALTH bill in the House of Representatives is being presented as a health bill and an antipoverty bill at the same time. He said that it is not. It is the very opposite of they say it is. He pointed out that women needs true medicine since fertility is not a disease, what they need is true medicines that will cure and secure the safety of women. For example of a basic need. Maternal death could be brought down to zero just by providing adequate basic and emergency obstetrics-care facilities and skilled medical services to women. Sen. Tatad also expressed that the bill seeks to tell the Catholic majority not to listen to the Church and to listen to anti-Catholic politicians instead. It's Satan's Semen, Stupid By Minyong Ordoñez In this article, I was shocked by the point that RH bill is pro-abortion. It violates the rule of God which is the right to live. Abortion is a mortal sin in the eyes of God. The abortion of a living fetus in the womb of a mother through aborticide using abortifacients in order to reduce birthrate. This process is insanity. I believed that this bill can’t be passed because it violates the rule of God and it also violates the right to live. The fetus in the woman’s womb should not be aborted because it is not the fetus fault to be inside that woman’s womb, instead it is the fault of his or her parents who don’t practice safe sex. It is just so funny (for me, when I was reading the article, how Ordoñez, put the words into that paragraph all in one go and to come up with all the categories of a man who are just sinners because of having inserted his love juice to women. That is something worth reading over and over again. Crucial questions on the RH bill By Atty. Jose Sison, Philippine Star Atty Sison said that there is something wrong with the Reproductive Health Bill since the bill is implying that there is a choice for women to chose which family planning method is best for the family, they have the power to do so because of the HB 5043. But for Atty. Sison, the power to choose freely however must be exercised for the common good. It does not give man the right to choose and commit something wrong. In blocking the bill, the Church is just trying to point out what is wrong with it. Ironically, it is the bill itself that prevents the exercise of the free will by employing coercive methods in limiting the family size. It imposes imprisonment and or fine or both on those who would violate or refuse to carry out its program on providing access to the artificial methods of birth control. No! to the Reproductive Health Population Development Act of 2008 and by Advocacy Center The Advocacy Center believe that by this Health bill, it is said that it is evil and project all the opposite of it to be the real agenda or will be the end result if it is to be passed by the government and become a law. For example, the Health Bill blames poverty to over population but the truth is the real causes of poverty and underdevelopment are graft and corruption bad governance, and uneven distribution of wealth not overpopulation. The bill promotes sex education should be given to children which will only lead to becoming promiscuous. They should be taught instead, the values of abstinence, chastity, and self discipline. The Advocacy Center also said criticized that contraceptives are not real medicines but killer medicines or deadly medicines. Should You Support Reproductive Health Bill No. 5043? Take this Simple Test to Find Out By Couples for Christ Foundation For Family and Life The questions here are going to be answered only if you read the HB 5043. For me, it is somewhat bias, bias in a sense that questions are formulated so that it can be answered by a negative or an answer that will definitely favor the “question formulator”. If you will read all the questions even if you will not answer it yet, you can see that it is favoring one side of the story. If is that is the way they ask questions then definitely they will all get most of it are no.. or this “If you answered No to any of the questions above, then you are not for Reproductive Health Bill No. 5043. Read the bill.” What’s Wrong with the Reproductive Health Bill by Sen. Francisco Tatad Just like his previous critique, he targeted the bill and say that it is not needed and very degrading to women all the more, he said that it is an insult to women on our freedom of speech and our Christian Culture as well. He said that it is not always true that the few are always richer and the many are always poorer. The bill is said to be unnecessary except for preventing abortion. But isn’t it considered abortion in using those pills. It is said also that oral contraceptives are considered dangerous that causes carcinogenic to human (the International Agency for Research on Cancer of the World Health Organization (WHO)) I agree that a state must levy taxes, to expropriate private property for public use, to conscript able-bodied young men for its defense. But the State may not enter the family bedroom and tell married couples how to practice marital love. Contraceptives harmful to women’s health by Dr. Bernardo Villegas According to Dr. Villegas it is proven that any reproductive contraceptive are very harmful to women. There are numerous adverse effects of the pill on women that have been equally well documented. They are breast cancer, cervical cancer, liver cancer, premature hypertension and coronary artery disease leading to heart attacks and strokes, thromboembolism/pulmonary embolism. Other negative side effects are decreased libido, infertility, leg cramps, gallstone formation, nausea, and bloatedness. It was also emphasize in the article that IUD is something like this, it will prevent the embryo from implanting and not just by preventing conception. I quote: “It is, therefore, an abortifacient, not a contraceptive.” As I have understood the article, why promote something if it has a high rate of failures and contribute to another unwanted pregnancy in the country. Oversimplication of Economists by Dr. Bernardo Villegas Dr. Villegas is condemning the economists who pointed out that a rapid growth of GDP may lead to more human misery if it is not accompanied with a more equitable distribution of income and wealth and increasing access to education and health among the masses. He said that through this bill, it is like allowing the state to intervene into people’s private lives by strongly promoting contraception and its enforced provision, state run sex education with the potential of undermining parental influence, and denying conscientious objection. He even pointed out that internationally according to UN committee reproductive rights is equivalent to abortion. The bill chooses words like reproductive health bill, planned parenthood, informed choice, sexual health to cover up the truth about what this bill really wants and the effects of it being implemented. The terms being used by the bill is like suggesting or will do selective purification of a population based on social classes. And it is horrible just by thinking about it. Spending Billions for Birth Control Pills? by Fr. Cecilio Magsino “The proponents of the Reproductive Health Bill want the national government to buy birth control pills and make them available to the public for free or for a nominal price.” Fr. Cecilio researched this on the internet that the cheapest price of an oral contraceptive is 30 pesos and did some math and came up with a figure around 141billion will be spent on oral contraceptive alone. Which defeat other purposes of fund allocation. There must be some other way to channel the money and have a more fruitful and meaningful return of investments. There must be some other ways to spend the money not just by giving those contraceptives for free to child bearing able women. It is very unwise of the government to do so. Philippines Threatened By a 2-Child Policy by Genevieve Pollock, Zenit News Agency All in all the article talks about just like the others, silencing the parents on what to do with their children. Freedom of speech is at stake. Parents will not be able to object. Health care workers will be forced to refer against their conscience. Employers will have to provide family planning services. Cosby noted the affirmation of Archbishop Pacino Aniceto, chairman of the Episcopal commission on family and life, who stated "If you are Catholic, you should behave like a Catholic. Otherwise you are not what you profess." Cosby said we should protect the church and our family or else everything else will start to fall down if not together, soon after. 12 Reasons Why We Oppose HB5043 by Alliance for the Family Foundation (ALFI) The ALFI stated its reason why there are opposing HB 5043. This statement: “HB 5043 promotes abortion. These HORMONAL CONTRACEPTIVES ACT AS ABORTIFACIENTS. They do not prevent ovulation 100%of the time and thus, fertilization can still occur. When the fertilized ovum is prevented from implanting in the uterus because of the effect of the pill, this ovum is expelled. This is plain and simple abortion. ( Note Research shows that ovulation still occurs during pill use in 6 out of 210 menstrual cycles, hence, there remains a grave risk of the abortion of undetected pregnancies that may still be occurring,)” was to me the most interesting quotation of the article. It is true that it is like promoting abortion. It was pointed out that contraceptives doesn’t reduce the rate of abortion but instead it promotes all the more that abortion is something natural or ordinary thing to do. Artificial Birth Control is Fascist by The Varsitarian Despite their sugarcoated names, they are not pro-women or even mildly “pro-choice.” They said that maybe because of hoax that the world is overpopulated and that high population is anti-growth and anti-progress. And I quote “Therefore, the bills are not only anti-life since they seek to stop women from pregnancy and giving births through a host of questionable means — birth-control pills, abortifacients like the IUD, and ligation; they are also anti-poor. In short, Lagman’s and Garin’s bills are antihumanist.” Vasitarians believe that the bills is promoting the violation of the privacy of couples, their meddling with couples on determining the size of their families is actually another flaw in the HB 5043. But Lagman et al say their proposed laws are pro-choice” in that they leave it to couples to decide whether or not to control their births and by what means. The Filipino Front in the Culture War By Rosa Linda Valenzona “Article II, Section 12 of the 1986 Philippine Constitution states: “The State recognizes the sanctity of family life and shall protect and strengthen the family as a basic autonomous social institution. It shall equally protect the life of the mother and the life of the unborn from conception. The natural and primary right and duty of parents in the rearing of the youth for civic efficiency and the development of moral character shall receive the support of the Government.” In fact, everyone feels entitled to criticize the church for its alleged antedeluvian views on contraception. According to Cngr. Del Mar, the real agenda of the HB 5043 is to push the contraceptive program and have a direct attack against the Catholoc nation in the absolute rejection of contraception, also because the church is well aware that in UN language the term “reproductive health” the legalization of abortion. The Smoldering Poker Amelia H.C. Ylagan, Business World “At the 14th Congress of the House of Representatives, House Bill 5043 was presented, providing for a national policy on reproductive health, responsible parenthood, and population development, among other related reproductive and population issues. The Catholic religious hierarchy, speaking to the 72% Catholics in the country” Ms. Ilagan told a story about Thomas Aquinas about his virginity and being tempted by a woman before by using wanton words and touches. So in keeping with the very clear message of Vatican II and Pope Paul VI’s encyclical, Humanae Vitae, against artificial birth control. The pro-choice faction of Filipinos, like those in the rest of the world, are for women’s rights to "choose their own destinies" as to bearing children or not, utilizing modern contraceptive aids, or abortion in extreme cases. She is opposing the bill because it is a mandatory to use contraceptive and will not be choice anymore and freedom of speech will be a problem if the bill is to be passed. Misconceptions and Clarifications on Issues Related to Humanae Vitae and theReproductive "Health" Bill in Philippine Congress By Fr. Gregory D. Gaston, STD. This is to prove that Reproductive "Health" Bill in Philippine Congress is giving false information just to let the people believe that it is worth to become a law. Fr. Gaston said that it is not really an ideal to have a family of two children since there are a lot of women who chooses to have no children or those women who cannot bear children at all. If that will happen then the fertility rate will be much lower the 2 and if that will push through Filipino race at first extremely old, and then rare, and finally extinct. As opposed to what the artificial methods are saying, the modern natural methods (e.g., Billings, Sympto-Thermal, Basal Body Temperature) can be more effective than contraceptives, if they are learned and practiced as a way of life and not as "natural contraceptives." Hence, communication, love, respect, self-discipline, and formation in the values are necessary for the natural methods to work—values that are not exclusively religious, but very human and natural as well, and values that are not necessary in the use of contraceptives. CEAP Statement (representing 1,256 Catholic schools including Ateneo, La Salle, UST, San Beda) Their position is to stand by the Church teachings in the objection to the contraceptive program the bill promotes. They are also calling the attention of lawmakers that they should know the effects and nature of contraceptives that VIOLATES the provision in the Philippine Constitution on the protection of the unborn from the first moment of conception or fertilization. Moreover, the Church also poses serious objections in that this contraceptive program, while supposedly championing the cause of women, ignores instances where women’s rights are violated. They also said that six years of value-free sex education that the Bill proposes violates the rights of parents to keep watchful guard over the moral education of their children. The Church also strongly opposes the use of the term “Reproductive Health” as defined in the proposed Bill since it is made synonymous with abortion packaged as a method of family planning. Just Asking By Archbishop Oscar V. Cruz “Just like the untimely resurrection of moves to amend the Constitution, the premature stir of the Congress to push for the reproductive health bills brings to mind some practical questions that proponents of this unnecessary legislation should answer.” Archbishop Oscar Cruz is questioning what is the real meaning of reproductive health anyway? He said that the bill is to promote health by making this physical attribute precisely unproductive? For this reason, reproduction is thereby seen as inimical to health. In other words, reproduction should be avoided for reasons of health whereas it militates against such a physical well-being, particularly on the part of women. It is very ironic how the bill tries to deviate from the truth but the explanation is very opposite to the one being proposed. Statement on Reproductive Health Bill 5043 By Fr. Bienvenido Nebres, Ateneo “Although there are points wherein the aforesaid bill and the Catholic moral tradition are in agreement, there are certain positions and provisions in the bill which are incompatible with principles and specific positions of moral teaching which the Catholic Church has held and continues to hold.” Although there is one faculty who agrees with the Bill that doesn’t mean that the whole institution of Ateneo is for the approval of the Bill, they respect their freedom of expression but it is just for one person and not the entirety of the institution. They were just expressing their opinion and so are they. At the same time, he wrote on October 2, they support continuing efforts on the critical study and discussion of the bill among Church groups including the University and in civil society. Falsehoods in the Lagman Bill By Emil Jurado, Manila Standard Lagman seems to put too much weight on what UP economists say. He forgets that economists make conclusions on assumptions and other factors, which are not validated, much less proven. Show me an economist that has become a billionaire because of assumptions and conclusions, and I’ll show you a pig that can fly. As I understand this, It is like saying I AM HAPPY when you know and they know for a fact that YOU ARE IN PAIN and very much SAD. It is like giving people a hope or teach them to do wrong just like sex education for grade five to high school is like making them promiscuous. What you can do to stop the Reproductive Health Act By Alliance for the Family Foundation (ALFI) It is just a series of steps to show how you will defeat or put an end to the pushing through of Reproductive Health Bill 5043. At first I saw that the article is saying to pray, it is not that I don’t believe in prayers, for me, even if you pray hard and do nothing then results will be definitely not at your side. Then as I read through the entire article, I was laughing I guess I did judge the article as a mere fact that it is not worth reading. The article is telling the reader what he can do physically not just by reacting to the Bill but doing something about it as well. You can either sign for a petition to stop the Bill, write a letter to the congress. Write to an editor of a newspaper and so on. Non – Religious Critiques on the Reproductive Health Bill 5043 Population Bogey - I am opposed to HB 5043 even if I favor Planned Parenthood through natural methods. My opposition stems from the fact that, historically, the open tolerance of the use of contraceptives has produced more harmful effects than the good that its advocates have vowed to promote. - Contrary to expectations, the percentage of out-of wedlock births has increased dramatically since oral contraceptives, or birth control pills, were approved for sale in 1960. In the US, out-of-wedlock births have increased from 6% to about 35%. In Europe, about half of the children in Denmark, Sweden, and Norway are born to unmarried mothers. These figures give rise to the query: since birth control pills prevent pregnancy, shouldn’t the out-of-wedlock pregnancy rates have gone down? Not so, because of the operation of the law of unintended consequences. Reaction: - The author use facts and figures of the other countries in comparison to our country. The percentage in the countries mentioned by the author tell that even the usage of the contraceptives become legal or legalized, the rate of pregnancy increases. Unhealthy Reproductive Bill - The General Appropriations Act of 2008 earmarks an enormous amount for "family planning and reproductive health services," including contraceptives. For the Department of Health it is P3.19 billion; for Popcom -- P386.5 million, quite apart from funds for other agencies of government and local government units for the same programs. Add $2.4 million from the United Nations Population Fund for population and development and reproductive health for2008, plus $2.2 million for 2009. - Today's average family has three children compared with seven in the '70s. But the billions of pesos spent have not reduced poverty or benefited the poor. Reaction: - The author use facts and figures on opposing the Reproductive Health Bill 5043. These facts and figures tell that even the government spend billions of pesos in reproductive health services, it does not reduced the poverty in the country and the poor families or individuals did not benefited on it as the author said in his critique about the Reproductive Health Bill 5043. And the funds that will be allotted to the suggested agencies in the RH Bill, can be a source of corruption in the government. No Place for RH Bill in our law - Our population growth rate (National Statistics Office) is 2.04 percent, total fertility rate (TFR) is 3.02. The CIA World Fact book has lower figures -- growth rate, 1.728 percent; TFR, 3.00. - Our population density is 277 per square km. GDP per capita (PPP) is $3,400. Fifty other countries have a much lower density, yet their per capita is also much lower. Thirty-six countries are more densely populated, yet their GDP per capita is also much higher. Are the few then always richer, the many always poorer? Not at all. - Our median age is 23 years. In 139 other countries it is as high as 45.5 years (Monaco). This means a Filipino has more productive years ahead of him than his counterpart in the rich countries where the graying and dying population is no longer being replaced because of negative birth rates. Reaction: - The author use statistics about the fertility rate, growth rate, median age, population density and GDP per capita of the other countries in comparison to our country. His method of opposing the RH Bill in non – religious view is somehow similar to the first two critiques of the bill. No to Reproductive Health and Population Development Act of 2008 1.) The Health Bill relies on the International Standard of Human Rights rather than the Constitution. Comment: Are we giving foreign countries power to change our laws? 2.) The Health Bill blames underdevelopment on overpopulation. Comment: The real causes of poverty and underdevelopment are graft and corruption, bad governance, and uneven distribution of wealth not overpopulation. Reaction: The author’s reaction on the first statement discusses why the Health Bill should rely on the International Standard of Human Rights rather than our own Constitution. The bill would let the foreign countries have their power to change or edit our own laws. EFF Issues FREE SPEECH Anonymity https://www.eff.org/issues/anonymity The content of the article is that “Many people don't want the things they say online to be connected with their offline identities. They may be concerned about political or economic retribution, harassment, or even threats to their lives. Whistleblowers report news that companies and governments would prefer to suppress; human rights workers struggle against repressive governments; parents try to create a safe way for children to explore; victims of domestic violence attempt to rebuild their lives where abusers cannot follow. Instead of using their true names to communicate, these people choose to speak using pseudonyms (assumed names) or anonymously (no name at all). For these individuals and the organizations that support them, secure anonymity is critical. It may literally save lives. Anonymous communications have an important place in our political and social discourse. The Supreme Court has ruled repeatedly that the right to anonymous free speech is protected by the First Amendment. A much-cited 1995 Supreme Court ruling in McIntyre v. Ohio Elections Commission reads: Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society. The tradition of anonymous speech is older than the United States. Founders Alexander Hamilton, James Madison, and John Jay wrote the Federalist Papers under the pseudonym "Publius," and "the Federal Farmer" spoke up in rebuttal. The US Supreme Court has repeatedly recognized rights to speak anonymously derived from the First Amendment. The right to anonymous speech is also protected well beyond the printed page. Thus, in 2002, the Supreme Court struck down a law requiring proselytizers to register their true names with the Mayor's office before going door-to-door. These long-standing rights to anonymity and the protections it affords are critically important for the Internet. As the Supreme Court has recognized, the Internet offers a new and powerful democratic forum in which anyone can become a "pamphleteer" or "a town crier with a voice that resonates farther than it could from any soapbox." The Electronic Frontier Foundation has been involved in the fight to protect the rights of anonymous speakers online. As one court observed, in a case handled by EFF along with the ACLU of Washington, "[T]he free exchange of ideas on the Internet is driven in large part by the ability of Internet users to communicate anonymously." We've challenged many efforts to impede anonymous communication, both in the courts or the legislatures. We also previously provided financial support to the developers of Tor, an anonymous Internet communications system. By combining legal and policy work with technical tools, we hope to maintain the Internet's ability to serve as a vehicle for free expression.” – The Anonymity article from www.eff.org/work What is Anonymity? Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymous typically refers to a person, and often means that the personal identity, or personally identifiable information of that person is not known. Since many people don't want the things they say online to be connected with their offline identities. For example if they want to criticize things be it politics, economic or other they might think as a sensitive topic for them to discuss but they also need the urge to blurt out they feelings about the said topic. I believe in the article saying “these people choose to speak using pseudonyms (assumed names) or anonymously (no name at all). For these individuals and the organizations that support them, secure anonymity is critical. It may literally save lives.” The EFF Organization helps to protect the rights of anonymous writers as they believe that there is always a freedom of speech here and across the globe. There should be no one be imprisoned for what they think is right and what they believe in. They also believe that Freedom of Expression is one way to maintain democracy. And as I quote “Anonymity is a shield from the tyranny of the majority”. EFF organization challenged many efforts to impede anonymous communication, both in the courts or the legislatures. They also previously provided financial support to the developers of Tor, an anonymous Internet communications system. By combining legal and policy work with technical tools EFF hope to be able to maintain the internet’s ability to serve as a medium for freedom of expression. Bloggers' Rights https://www.eff.org/issues/bloggers The content of the article is that “If you're a blogger, this page is for you. One of EFF's goals is to give you a basic roadmap to the legal issues you may confront as a blogger, to let you know you have rights, and to encourage you to blog freely with the knowledge that your legitimate speech is protected. To that end, we have created the Legal Guide for Bloggers, a collection of blogger-specific FAQs addressing everything from fair use to defamation law to workplace whistle-blowing. In addition, EFF continues to battle for bloggers' rights in the courtroom: Bloggers can be journalists (and journalists can be bloggers). We're battling for legal and institutional recognition that if you engage in journalism, you're a journalist, with all of the attendant rights, privileges, and protections. Bloggers are entitled to free speech. We're working to shield you from frivolous or abusive threats and lawsuits. Internet bullies shouldn't use copyright, libel, or other claims to chill your legitimate speech. Bloggers have the right to political speech. We're working with a number of other publicinterest organizations to ensure that the Federal Election Commission (FEC) doesn't gag bloggers' election-related speech. We argue that the FEC should adopt a presumption against the regulation of election-related speech by individuals on the Internet, and interpret the existing media exemption to apply to online media outlets that provide news reporting and commentary regarding an election -- including blogs. Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online, including providing a guide to help you with strategies for keeping your identity private when you blog. Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them. ” – Blogger’s Rights article from www.eff.org/work What are the Blogger’s rights? Bloggers can be journalists (and journalists can be bloggers). They are battling for legal and institutional recognition that if people are engaging in journalism, you're a journalist, with all of the attendant rights, privileges, and protections. Bloggers are entitled to free speech. They are working on some of the things that would defend you from frolicsome or obnoxious threats and lawsuits Internet bullies shouldn’t use any copyright, libel or other claims to chill your legitimate speech. Bloggers have the right to political speech. They are arguing that the FEC (Federal Election Commission) should adopt a presumption against the regulation of election-related speech by individuals on the Internet, and interpret the existing media exemption to apply to online media outlets that provide news reporting and commentary regarding an election including blogs. Any blogger can express his or her feelings regarding elections and other “election related speech. Bloggers have the right to stay anonymous. Just like in anonymity any blogger can stay anonymous as long as they want if they think that their blog might be offensive to some and might hurt some but if they think that it is the truth well so be it. Bloggers have freedom from liability for hosting speech the same way other web hosts do. They’re working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them. Over all, they are protecting all the bloggers from any threats or any life threatening because of their blogs. For them it is their right to have freedom of expression and EFF is fighting for these rights. CyberSLAPP https://www.eff.org/issues/cyberslapp The content of the article is that “These cases all involve defending people's right to remain anonymous when they post comments on message boards, as well as making sure that anonymous speakers' due process rights are respected. These cases, plus more, are also described at the Cyberslapp.org website http://www.cyberslapp.org/, a joint project of Public Citizen, EFF, the American Civil Liberties Union, the Center for Democracy and Technology and the Electronic Privacy Information Center. ” – CyberSLAPP article from www.eff.org/work What is CyberSLAPP? “These cases all involve defending people's right to remain anonymous when they post comments on message boards, as well as making sure that anonymous speakers' due process rights are respected. These cases, plus more, are also described at the Cyberslapp.org website http://www.cyberslapp.org/, a joint project of Public Citizen, EFF, the American Civil Liberties Union, the Center for Democracy and Technology and the Electronic Privacy Information Center.” As I’ve research on what is CyberSLAPP is. The CyberSLAPP is basically a form of lawsuit involving the right of a person to remain anonymous when they post comments on message borads, or on their blog and that they will be given respect on what they comment on. Cyber-critics, free speech and online anonymous web postings have become a combustable combination. The result is cyberSLAPP law suits, which seek to force ISPs to reveal the names of those who have posted anonymous statements critical of high profile individuals. A new form of lawsuit called a "CyberSLAPP" suit is threatening to overturn the promise of anonymous online speech and chill the freedom of expression that is central to the online world. CyberSLAPP cases typically involve a person who has posted anonymous criticisms of a corporation or public figure on the Internet. The target of the criticism then files a frivolous lawsuit just so they can issue a subpoena to the Web site or Internet Service Provider (ISP) involved, discover the identity of their anonymous critic, and intimidate or silence them. No Downtime for Free Speech Campaign https://www.eff.org/issues/ip-and-free-speech Whether you are quoting someone on your blog, inserting clips of CNN into your own video news report, or using a song sample in a musical parody, your free speech often depends on incorporating and referencing other people's creations as part of your own. The courts call this "fair use", and strong legal precedents exist to protect the limited use of copyrighted material in your work when you do so for expressive purposes. Unfortunately, copyright owners often object to these uses, and may look for ways to take them offline via the legal system. A copyright cease-and-desist letter to your webhost or ISP may be all it takes to make your online speech disappear from the Internet — even when the legal claims are transparently bogus. In particular, copyright claimants are increasingly misusing the Digital Millennium Copyright Act (DMCA) to demand that material be immediately taken down without providing any proof of infringement. Service providers, fearful of monetary damages and legal hassles, often comply with these requests without double-checking them, despite the cost to free speech and individual rights. The DMCA also puts anonymous speech in jeopardy; misusing its subpoena power, copyright holders can attempt to unmask an Internet user's identity based on a mere allegation of infringement without filing an actual lawsuit or providing the user any constitutional due process. And it's not just copyright law that gets misused. Trademark owners can also use their rights to censor critics online by claiming that any domain name or website referencing their product is an infringement. Yet, the First Amendment protects commentary and criticism using trademarks as well. Unless IP claimants are held accountable when they go too far, the situation for online speech will only get worse. EFF has been fighting to make sure copyright and trademark rights don't trump free speech by litigating against inappropriate uses of the law. ” – No Downtime for Free Speech Campaign article from www.eff.org/work What is DMCA? It is Digital Millennium Copyright Act. The DMCA creates a haven for online service providers against copyright liability. If they are able to receive any notification of infringement from a copyright holder or its agent. Also it will include a counter notification that offers OSPs a haven from all the liabilities to their users upon notice. The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of on-line services for copyright infringement by their users. On May 22, 2001, the European Union passed the Copyright Directive or EUCD, which addresses some of the same issues as the DMCA. The DMCA's principal innovation in the field of copyright, the exemption from direct and indirect liability of internet service providers and other intermediaries (Title II of the DMCA), was separately addressed, and largely followed, in Europe by means of the separate Electronic Commerce Directive. (Unlike U.S. federal laws and regulations, the execution of European Union directives usually requires separate legislation by or within each of the Union's member states.) The COICA Copyright Bill Internet Censorship and https://www.eff.org/issues/coica-internet-censorship-and-copyright-bill The content of the article is that “The "Combating Online Infringements and Counterfeits Act" (COICA) is an Internet censorship bill which is rapidly making its way through the Senate. Although it is ostensibly focused on copyright infringement, an enormous amount of noninfringing content, including political and other speech, could disappear off the Web if it passes. The main mechanism of the bill is to interfere with the Internet's domain name system (DNS), which translates names like "www.eff.org" or "www.nytimes.com" into the IP addresses that computers use to communicate. The bill creates a blacklist of censored domains; the Attorney General can ask a court to place any website on the blacklist if infringement is "central" to the purpose of the site. If this bill passes, the list of targets could conceivably include hosting websites such as Dropbox, MediaFire and Rapidshare; MP3 blogs and mashup/remix music sites like SoundCloud, MashupTown and Hype Machine ; and sites that discuss and make the controversial political and intellectual case for piracy, like pirate-party.us, p2pnet, InfoAnarchy, Slyck and ZeroPaid . Indeed, had this bill been passed five or ten years ago, YouTube might not exist today. In other words, the collateral damage from this legislation would be enormous. (Why would all these sites be targets?) There are already laws and procedures in place for taking down sites that violate the law. This act would allow the Attorney General to censor sites even when no court has found they have infringed copyright or any other law. ” – The COICA Internet Censorship and Copyright Bill article from www.eff.org/work What is Combating Online Infringements and Counterfeits Act? This a bill that if it is able to passed the senate and turn into a law, it will act as a combat to online infringement, and for other purposes. This bill also define internet site as an infringing act if they are able to contribute to this kind of activities or if they are hosting this kind of activities such as sharing copyrighted files, music labels, etc. If this bill passes, the list of targets could conceivably include hosting websites such as Dropbox, MediaFire and Rapidshare; MP3 blogs and mashup/remix music sites like Sound Cloud, MashupTown and HypeMachine ; and sites that discuss and make the controversial political and intellectual case for piracy, like pirate-party.us, p2pnet, InfoAnarchy, Slyck and Zero Paid . Indeed, had this bill been passed five or ten years ago, YouTube might not exist today. In other words, the collateral damage from this legislation would be enormous. Why do they target this kind of sites? Because like dropbox, rapidshare and other. This sites allow users to upload everything and anything and do not check if the files not unless they receive a DMCA notice that they might some be violators over their site. That's the way the law currently works, and although it causes problems, it at least strikes a balance between copyright enforcement and freedom for sites to innovate. Under COICA, the Department of Justice (DOJ) could decide that there is "too much" piracy on any of these sites and it is therefore "central" to their businesses. INNOVATION: Accessibility for the Reading Disabled https://www.eff.org/issues/reading-accessibility The content of the article is that “New technology has the potential to dramatically improve the lives of those with reading disabilities -- including the blind and profoundly dyslexic, and those with spinal injuries. Information in electronic formats can be made accessible using technologies like text-tospeech and refreshable Braille, opening up whole new worlds to people who have previously been unable to access information. EFF believes that individuals in the disabled community, as those best placed to determine their own needs, should be free to transform copyrighted works into a form most suitable for their use, as well as to innovate new presentation forms which they can share with other members of the community. Unfortunately, companies are now using copyright law and DRM to prohibit the use of helpful assistive technologies and stamp out innovative new technologies that could make copyrighted works universally accessible. ” – Accessiblity for the Reading Disabled article from www.eff.org/work What do you mean by accessibility for the reading disabled? There are new technologies that has potential to drastically improve lives of those with reading disabilities which includes the blind and dyslexic and also those with spinal injuries. Information in electronic formats can be made accessible using technologies like text-to-speech and refreshable Braille, opening up whole new worlds to people who have previously been unable to access information. Simply put, “effective communication” means that whatever is written or spoken must be as clear and understandable to people with disabilities as it is for people who do not have disabilities. This is important because some people have disabilities that affect how they communicate. They should be able to put up or use technology such as text to speech or refreshable Braille and this technology will help people with reading disability and will open other opportunities for them. First, having access to information that they cannot access before. Second, they will be able to open up themselves to new things that normally they haven’t had the pleasure to do so. Third, they will be able to share their knowledge to the world because of these new technologies. EFF believes that individuals in the disabled community, as those best placed to determine their own needs, should be free to transform copyrighted works into a form most suitable for their use, as well as to innovate new presentation forms which they can share with other members of the community. Unfortunately, companies are now using copyright law and DRM to prohibit the use of helpful assistive technologies and stamp out innovative new technologies that could make copyrighted works universally accessible. Broadcast Flag https://www.eff.org/issues/broadcast -flag The content of the article is that “Today, you can use any device you like with your television: VCR, TiVo, DVD recorder, home theater receiver, or a PC combining these functions and more. But if the broadcast flag mandate is passed, Hollywood and federal bureaucrats will get a veto over innovative devices and legitimate uses of recorded programming. The mandate forces all future digital television (DTV) tuners to include "content protection" (aka DRM) technologies. All makers of HDTV receivers will be required to build their devices to watch for a "flag" embedded in programs by copyright holders. When it comes to digital recording, it would be Hollywood's DRM way or the highway. Want to burn that recording digitally to a DVD to save hard drive space? Sorry, the DRM lock-box won't allow it. How about sending it over your home network to another TV? Not unless you rip out your existing network and replace it with DRMd routers. And forget about using open source TV tools. Kind of defeats the purpose of getting a high definition digital signal, doesn't it? Responding to pressure from Hollywood, the FCC had originally mandated the flag, but thanks to our court challenge, ALA v. FCC, it was thrown out. But that doesn't mean the danger is behind us. Hollywood has headed to Congress to ask for the flag again. ” – Broadcast Flag article from www.eff.org/work What is broadcast Flag? “A broadcast flag is a set of status bits (or a "flag") sent in the data stream of a digital television program that indicates whether or not the data stream can be recorded, or if there are any restrictions on recorded content. Possible restrictions include the inability to save an unencrypted digital program to a hard disk or other non-volatile storage, inability to make secondary copies of recorded content (in order to share or archive), forceful reduction of quality when recording (such as reducing high-definition video to the resolution of standard TVs), and inability to skip over commercials.” On a daily basis many of us use gadgets or equipment such as TV, plus VCR, video camera , home theater receiver and other things even your own personal computer and combining two three equipment. But if the broadcast flag mandate is passed, Hollywood and federal bureaucrats will get a veto over innovative devices and legitimate uses of recorded programming. ”Want to burn that recording digitally to a DVD to save hard drive space? Sorry, the DRM lockbox won't allow it. How about sending it over your home network to another TV? Not unless you rip out your existing network and replace it with DRMd routers. And forget about using open source TV tools. Kind of defeats the purpose of getting a high definition digital signal, doesn't it?“ If it is going to be a law then there is no way that we can enjoy anymore our digital signal and what would be the purpose of having a digital signal if you can’t fully use it to the maximum. The article said it is not yet over since Hollywood will bring it up a notch and still fight over it. I hope that it will never be passed into a law. Coders' Rights Project https://www.eff.org/issues/coders The content of the article is that “EFF's Coders' Rights Project protects programmers and developers engaged in cutting-edge exploration of technology in our world. Security and encryption researchers help build a safer future for all of us using digital technologies, yet too many legitimate researchers face serious legal challenges that prevent or inhibit their work. These challenges come from the Digital Millennium Copyright Act (DMCA), the Computer Fraud and Abuse Act and state computer crime laws, among others. The Coders Rights Project builds on EFF's longstanding work protecting researchers through education, legal defense, amicus briefs and involvement in the community with the goal of promoting innovation and safeguarding the rights of curious tinkerers and hackers on the digital frontier. Reverse Engineering FAQ: People have always explored and modified the technologies in their lives – from crystal radios to automobiles to computer software. Reverse engineering is one expression of the human impulse to take apart a system to see how it works. Unfortunately, legal regulation of reverse engineering can impact the "freedom to tinker" in a variety of ways. The Reverse Engineering FAQ gives information that may help coders reduce their legal risk. Vulnerability Reporting FAQ: Discovering security flaws is only half of the battle – the next step is reporting the findings such that users can protect themselves and vendors can repair their products. Many outlets exists for publicly reporting vulnerabilities, including mailing lists supported by universities and by the government. Unfortunately, however, researchers using these public reporting mechanisms have received legal threats from vendors and government agencies seeking to stop publication of vulnerability information or “proof of concept” code demonstrating the flaw. The Vulnerability Reporting FAQ gives information that may help security researchers reduce their legal risk when reporting vulnerabilities. A "Grey Hat" Guide: A computer security researcher who has inadvertently violated the law during the course of her investigation faces a dilemma when thinking about whether to notify a company about a problem she discovered in one of the company’s products. By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied. ” – Coder’s Rights Project article from www.eff.org/work What is Coders Right Protect? “EFF's Coders' Rights Project protects programmers and developers engaged in cutting-edge exploration of technology in our world. Security and encryption researchers help build a safer future for all of us using digital technologies, yet too many legitimate researchers face serious legal challenges that prevent or inhibit their work. These challenges come from the Digital Millennium Copyright Act (DMCA), the Computer Fraud and Abuse Act and state computer crime laws, among others. The Coders Rights Project builds on EFF's longstanding work protecting researchers through education, legal defense, amicus briefs and involvement in the community with the goal of promoting innovation and safeguarding the rights of curious tinkerers and hackers on the digital frontier.” This is the way of EFF way of helping those programmers, researchers from those hackers and other people getting their years of work researchers through education, legal defense, amicus briefs and involvement in the community with the goal of promoting innovation and safeguarding the rights of curious tinkerers and hackers on the digital frontier. It is a law that says that it is the right of one company to keep ideas to themselves or any person as long as she doesn’t to release it in public. No one can or should be able to access aside from themselves. If it being kept as a secret, then someone tried to access it and gain an access to it then release to the public then there will laws applied to that. Digital Rights Management https://www.eff.org/issues/drm The content of the article is that “Digital Rights Management (DRM) technologies attempt to control what you can and can't do with the media and hardware you've purchased. Bought an ebook from Amazon, but can't read it on your ebook reader of choice? That's DRM. Bought a DVD or Blu-Ray, but can't copy the video onto your portable media player? That's DRM. Bought a video-game, but can't play it today because the manufacturer's "authentication servers" are off-line? That's DRM. Bought a smart-phone, but can't use the applications or the service provider you want on it? That's DRM. Corporations claim that DRM is necessary to fight copyright infringement online and keep consumers safe from viruses. But there's no evidence that DRM helps fight either of those. Instead, DRM helps big business stifle innovation and competition, by making it easy to quash "unauthorized" uses of media and technology. DRM has proliferated thanks to the Digital Millennium Copyright Act of 1998 (DMCA), which sought to outlaw any attempt to bypass DRM. Fans shouldn't be treated like criminals, and companies shouldn't get an automatic veto over user choice and innovation. EFF has led the effort to free the iPhone and other smart phones, is working to uncover and explain the restrictions around new hardware and software, has fought for the right to make copies of DVDs, and sued Sony-BMG for their "rootkit" CD copy protection scheme. Learn more about our efforts through the links below, and consider donating to support our efforts. ” – Digital Rights Management article from www.eff.org/work What is Digital Rights Management? Ask the following questions to yourself. Have you bought an ebook from Amazon, but can't read it on your ebook reader of choice? That's DRM. Or did you bought a DVD or Blu-Ray, but can't copy the video onto your portable media player? That's DRM. Or may you bought a video-game, but can't play it today because the manufacturer's "authentication servers" are offline? That's DRM. And maybe did you bought a smart-phone, but can't use the applications or the service provider you want on it? That's DRM. “Corporations claim that DRM is necessary to fight copyright infringement online and keep consumers safe from viruses. But there's no evidence that DRM helps fight either of those. Instead, DRM helps big business stifle innovation and competition, by making it easy to quash "unauthorized" uses of media and technology” DRM simply means you can’t copy or reproduce any of your favorites singer or artist what they OWN. They have the right to not let you do it. They say it is one way to lessen the copyright infringement but EFF said that one fan is not and should not be treated as criminals. They should be always treated with care beside they are the reason why they (the copyright owners) profits right? Net Neutrality https://www.eff.org/issues/net-neutrality The content of the article is that “Anyone who watched John Hodgman's famous Daily Show rant knows what Net Neutrality means as an abstract idea. But what will it mean when it makes the transformation from idealistic principle into real-world regulations? 2010 will be the year we start to find out, as the Federal Communications Commission begins a Net Neutrality rulemaking process. But how far can the FCC be trusted? Historically, the FCC has sometimes shown more concern for the demands of corporate lobbyists and "public decency" advocates than it has for individual civil liberties. Consider the FCC's efforts to protect Americans from "dirty words" in FCC v. Pacifica Foundation, or its much-criticized deregulation of the media industry, or its narrowly-thwarted attempt to cripple video innovation with the Broadcast Flag. With the FCC already promising exceptions from net neutrality for copyright-enforcement, we fear that the FCC's idea of an "Open Internet" could prove quite different from what many have been hoping for. ” – Net Neutrality article from www.eff.org/work What is net neutrality? Example: Google. Google has been the leading corporate voice on the issue of network neutrality over the past five years. No other company is working as tirelessly for an open Internet. But given political realities, this particular issue has been intractable in Washington for several years now. At this time there are no enforceable protections – at the Federal Communications Commission or anywhere else – against even the worst forms of carrier discrimination against Internet traffic. With that in mind, we decided to partner with a major broadband provider on the best policy solution we could devise together. We’re not saying this solution is perfect, but we believe that a proposal that locks in key enforceable protections for consumers is preferable to no protection at all. (http://googlepublicpolicy.blogspot.com/search/label/Net%20Neutrality) Google together with other company demanded (if I may use the term) the following: Newly enforceable FCC standards Prohibitions against blocking or degrading wireline Internet traffic Prohibition against discriminating against wireline Internet traffic in ways that harm users or competition Presumption against all forms of prioritizing wireline Internet traffic Full transparency across wireline and wireless broadband platforms Clear FCC authority to adjudicate user complaints, and impose injunctions and fines against bad actors Patents https://www.eff.org/issues/patents While patent rights were designed to promote investment, public disclosure, and most importantly, useful innovation, the patent system is often abused. In the past decade, the U.S. Patent and Trademark Office (PTO) has been inundated with applications for so-called "inventions" that are neither innovative nor useful. When bogus patent applications are granted, they actually discourage progress and impede the growth of a public domain of knowledge. There are many ways to promote better patent quality and a vibrant knowledge commons. One approach is to advocate for good legislation in Congress and proper interpretation of that legislation by the courts. Another is to promote enforcement efforts, such as the reexamination of bogus patents. EFF employs both approaches to protect the public interest while supporting innovation. Trusted Computing https://www.eff.org/issues/trusted-computing Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users' computers against the users' wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. Video Games https://www.eff.org/issues/video-games Gaming communities were among the very first to recognize the potential of digital technology, and the Electronic Frontier Foundation has defended their rights from the very beginning. EFF's first case in 1990 was an unprecedented effort to regain computers unjustly seized by the Secret Service from gamesmaker Steve Jackson Games. Since then, EFF has continued to protect freedom and innovation in the gaming world, whether we are arguing for the right of gamers to speak anonymously, defending video games from unconstitutional censorship, or protecting your right to resell,modify, or copy the games you have purchased. Gamers are facing more threats to their freedoms than ever before. Sadly, it's routine for companies to force gamers to swallow updates that hobble their systems and routinely trap their users in restrictive, near-incomprehensible terms of service agreements and end-user licenses. But EFF continues to fight for the consumers who believe that if you bought it, your own it, and you should be able to put your games and hardware to unexpected and creative uses. INTELLECTUAL PROPERTY: Broadcast Flag Today, you can use any device you like with your television: VCR, TiVo, DVD recorder, home theater receiver, or a PC combining these functions and more. But if the broadcast flag mandate is passed, Hollywood and federal bureaucrats will get a veto over innovative devices and legitimate uses of recorded programming. The mandate forces all future digital television (DTV) tuners to include "content protection" (aka DRM) technologies. All makers of HDTV receivers will be required to build their devices to watch for a "flag" embedded in programs by copyright holders. When it comes to digital recording, it would be Hollywood's DRM way or the highway. Want to burn that recording digitally to a DVD to save hard drive space? Sorry, the DRM lock-box won't allow it. How about sending it over your home network to another TV? Not unless you rip out your existing network and replace it with DRMd routers. And forget about using open source TV tools. Kind of defeats the purpose of getting a high definition digital signal, doesn't it? Responding to pressure from Hollywood, the FCC had originally mandated the flag, but thanks to our court challenge, ALA v. FCC, it was thrown out. But that doesn't mean the danger is behind us. Hollywood has headed to Congress to ask for the flag again. Copyright Trolls When the Recording Industry Association of America (RIAA) declared an end to its litigation campaign against music fans who used peer-to-peer technology to share music, many people thought that would be the end of mass copyright litigation — after all, hadn’t the RIAA demonstrated that suing customers was no way to improve the bottom line? Apparently, not everyone got the memo. In the past year, at least three groups have begun to experiment with using mass copyright litigation to extract settlements from individuals. These copyright trolls try to grow businesses out of suing Internet users — their tactics include targeting large groups of anonymous "Doe defendants," improperly minimizing their court costs, and exploiting the massive damages in copyright law in order to pressure defendants into settling quickly. EFF is working hard to help victims get access to the resources they need to defend their rights, call the court's attention to trolls' disrespect for due process, and educate the public about the harms of copyright trolling. U.S. Copyright Group The U.S. Copyright Group (USCG) approaches independent film producers and offers to collect money from people who are illegally downloading their movies on BitTorrent. USCG currently represents the producers of several films, including The Hurt Locker and Far Cry. USCG then files predatory lawsuits implicating thousands of unnamed John Does, subpoenas their identities from the ISP's, and then sues the individuals themselves. Once the user's identity is known, USCG threatens a judgment of up to $150,000 per downloaded movie — the maximum penalty allowable by law in copyright suits and a very unlikely judgment in cases arising from a single, noncommercial infringement — in order to pressure the alleged infringers to settle quickly for $1,500 to $2,500 per person. Righthaven Righthaven LLC, has brought over a hundred lawsuits in a Nevada federal court claiming copyright infringement. They find cases by searching the Internet for parts of newspaper stories posted online by individuals, nonprofits, political organizations, and others; buying the copyright to that newspaper story; and then suing the operator of the website for copyright infringement. Like the U.S. Copyright Group, Righthaven relies on the threat of copyright liability (and in a unique twist, an entirely bogus threat of loss of the target’s domain name) to scare the posters into a quick settlement. Reported settlements have fallen between $2,000 and $3,000. Digital Radio RIAA's Attempt to Control Recording From the Radio Satellite radio, like XM and Sirius, is already at your fingertips, and HD Radio may soon be ubiquitous. If innovators are allowed to build them, so too will devices that time-shift and space-shift radio for you— imagine something like a TiVo for radio. New digital radio technologies should set off a revolution in other technologies that help you get more from your radio—recording music off the radio, moving it to a portable player, streaming it to your other devices online, and much more. But the recording industry wants to put the brakes on home recording, something American radio fans have been doing for more than 25 years and is clearly permitted under existing copyright laws. Taking a page from the movie business, the RIAA has been asking the FCC and Congress to force all digital radio devices with a record button to incorporate DRM and a host of restrictions. The music industry does not want your fair use rights to develop in the digital age. Instead, they are asking federal bureaucrats to force innovators to hobble their products, leaving you with something no better than the cassette decks of the 1970s. According to the RIAA, new technologies should only give you "customary" capabilities. The RIAA says, for instance, that you shouldn't be able to record individual songs or move content to another player. And many novel uses will simply never be invented; after all, before you could hit record on your boombox or VCR, time-shifting broadcasted content wasn't "customary." Digital Video Digital video promises a high quality picture and fresh crop of innovative technologies that will give you new options for manipulating video. But Hollywood is scheming to put shackles on digital video, hoping that the next generation of products will be designed to suit its desires, not yours. Hollywood claims that scrambling, down-rezzing, HDCP, and a host of other restrictions are necessary to stop "Internet piracy." Don't be fooled: none of the restrictions being pushed by Hollywood will stop or even slow those who are swapping content online. Instead, these restrictions are intended to take away your fair use rights in order to sell them back to you. They stymie the development of new technologies that will deliver capabilities you haven't even thought of yet (after all, Disney sued to ban the Betamax when it came out, and sued again to block the ReplayTV DVR). At a minimum, you can look forward to unnecessary hassles, as an alphabet soup of restrictions create compatibility nightmares for years to come. Already, DRM (aka copy protection) on DVDs restricts legitimate uses, like making back-ups or copying to a video iPod. Hollywood wants similar restrictions for TV as well. Today you can record your favorite TV show on a PC, burn it to DVD, send it to another device, email a clip to a friend, and much more. Tomorrow, government regulations and "inter-industry standards" may take away those freedoms. In fact, Hollywood's pushing Congress to slap restrictions on anything with a record button, including digital camcorders, TV tuner cards, and PVRs. What about devices you already own that aren't encumbered by DRM? Get ready to replace them. You may have invested thousands of dollars in HD displays and receivers, but restricted digital outputs will break compatibility. Your devices might rely on component analog connections instead, but Hollywood wants to be able to "down-rez" or disable those analog connections at their whim. And don't even think about getting or creating tools to work around these restrictions. Doing so even for legitimate purposes may expose you to liability. It's not too late to reclaim control of your digital TV devices. Learn more about how EFF's fighting for your rights and considersupporting our efforts. Digital Millennium Copyright Act (DMCA) Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA") have not been used as Congress envisioned. Congress meant to stop copyright pirates from defeating DRM restrictions (aka content or copy protections) added to copyrighted works and to ban the "black box" devices intended for that purpose. In practice, the DMCA and DRM have done nothing to stop "Internet piracy." Yet the DMCA has become a serious threat that jeopardizes fair use, impedes competition and innovation, chills free expression and scientific research, and interferes with computer intrusion laws. If you circumvent DRM locks for noninfringing fair uses or create the tools to do so, you might be on the receiving end of a lawsuit. EFF has fought hard against the DMCA in the courts, Congress, and other forums. Learn more through the links below, and take action now to support DMCA reform. File Sharing Tired of the entertainment industry treating you like a criminal for wanting to share music and movies online? We are too -- EFF is fighting for a constructive solution that gets artists paid while making file sharing legal. The irrational war against P2P by misguided content owners and their representatives is not generating a single penny for artists. In fact, despite lawsuits and other attempts to stymie P2P providers and thousands of music and movie fans, file sharing is more popular than ever. What's more, the entertainment industry has threatened innovation in P2P systems and many other tools that help you get more from your media. And it could get even worse -- the industry is pushing Congress to ratchet up civil and criminal sanctions for file sharing and to restrict innovation. You can help put a stop to this misguided campaign. Together, we can forge a better way forward. Learn more about how EFF has fought to end the war on P2P EFF is fighting to protect the due process rights of individuals caught in the most recent predatory lawsuits. EFF has created a list of subpoena defense resources for those targeted by file sharing suits. EFF has proposed ways for artists to get paid without fans getting sued. EFF helped establish legal protections for privacy online, including the privacy of P2P users. EFF has assisted Internet users mistakenly caught in the industry's dragnet. EFF has helped P2P users sued by the RIAA and MPAA find legal counsel. EFF took MGM v. Grokster to the Supreme Court and defended the right of innovators to build new technologies without begging Hollywood's permission first. EFF helped beat back the INDUCE Act, which threatened innovation and P2P systems. EFF debunked Audible Magic's P2P filtering solution. EFF pushed for sensible solutions for college campuses concerned with file sharing. EFF started a petition to Congress opposing the RIAA lawsuits. EFF and its members helped defeat the Berman "P2P Vigilantism" Bill in 2002. No Downtime for Free Speech Campaign https://www.eff.org/issues/ip-and-free-speech Whether you are quoting someone on your blog, inserting clips of CNN into your own video news report, or using a song sample in a musical parody, your free speech often depends on incorporating and referencing other people's creations as part of your own. The courts call this "fair use", and strong legal precedents exist to protect the limited use of copyrighted material in your work when you do so for expressive purposes. Unfortunately, copyright owners often object to these uses, and may look for ways to take them offline via the legal system. A copyright cease-and-desist letter to your webhost or ISP may be all it takes to make your online speech disappear from the Internet — even when the legal claims are transparently bogus. In particular, copyright claimants are increasingly misusing the Digital Millennium Copyright Act (DMCA) to demand that material be immediately taken down without providing any proof of infringement. Service providers, fearful of monetary damages and legal hassles, often comply with these requests without double-checking them, despite the cost to free speech and individual rights. The DMCA also puts anonymous speech in jeopardy; misusing its subpoena power, copyright holders can attempt to unmask an Internet user's identity based on a mere allegation of infringement without filing an actual lawsuit or providing the user any constitutional due process. And it's not just copyright law that gets misused. Trademark owners can also use their rights to censor critics online by claiming that any domain name or website referencing their product is an infringement. Yet, the First Amendment protects commentary and criticism using trademarks as well. Unless IP claimants are held accountable when they go too far, the situation for online speech will only get worse. EFF has been fighting to make sure copyright and trademark rights don't trump free speech by litigating against inappropriate uses of the law. Patents While patent rights were designed to promote investment, public disclosure, and most importantly, useful innovation, the patent system is often abused. In the past decade, the U.S. Patent and Trademark Office (PTO) has been inundated with applications for so-called "inventions" that are neither innovative nor useful. When bogus patent applications are granted, they actually discourage progress and impede the growth of a public domain of knowledge. There are many ways to promote better patent quality and a vibrant knowledge commons. One approach is to advocate for good legislation in Congress and proper interpretation of that legislation by the courts. Another is to promote enforcement efforts, such as the reexamination of bogus patents. EFF employs both approaches to protect the public interest while supporting innovation. You can review EFF writing and legal work on Patents below, or check out the EFF Patent Busting Project, which challenges the top ten most dubious software patents. Terms Of (Ab)Use One cannot go online today without eventually being asked to accept a set of so-called Terms of Service (or TOS). These "terms" are actually purported legal contracts between the user and the online service provider (websites, MMORPGs, communication services, etc.), despite the fact that users never get a chance to negotiate their contents and can often be entirely unaware of their existence. Using a TOS, online service providers can dictate their legal relationship with users through private contracts, rather than rely on the law as written. In the unregulated and unpredictable world of the Internet, such arrangements often provide the necessary ground rules for how various online services should be used. Yet TOS agreements also raise a number of concerns for the consumer, as they can be a vehicle for abuse by online service providers. For starters, TOS provisions are usually written by the service providers themselves. As a result, they tend to end up being one-sided in the service provider's favor, and are often designed to be beyond any judicial scrutiny. Even more importantly, most users never even bother to read, let alone understand, these agreements, filled as they are with confusing legalese. The time has come to shed light on what these Terms of Service agreements actually say, and what it means to users. In conjunction with our TOSBack project, EFF is working to make the contents of these TOS more transparent for the average user. The COICA Internet Censorship and Copyright Bill The "Combating Online Infringements and Counterfeits Act" (COICA) is an Internet censorship bill which is rapidly making its way through the Senate. Although it is ostensibly focused on copyright infringement, an enormous amount of noninfringing content, including political and other speech, could disappear off the Web if it passes. The main mechanism of the bill is to interfere with the Internet's domain name system (DNS), which translates names like "www.eff.org" or "www.nytimes.com" into the IP addresses that computers use to communicate. The bill creates a blacklist of censored domains; the Attorney General can ask a court to place any website on the blacklist if infringement is "central" to the purpose of the site. If this bill passes, the list of targets could conceivably include hosting websites such as Dropbox, MediaFire and Rapidshare; MP3 blogs and mashup/remix music sites like SoundCloud, MashupTown and Hype Machine ; and sites that discuss and make the controversial political and intellectual case for piracy, like pirate-party.us, p2pnet, InfoAnarchy, Slyck and ZeroPaid . Indeed, had this bill been passed five or ten years ago, YouTube might not exist today. In other words, the collateral damage from this legislation would be enormous. (Why would all these sites be targets?) There are already laws and procedures in place for taking down sites that violate the law. This act would allow the Attorney General to censor sites even when no court has found they have infringed copyright or any other law. INTERNATIONAL Anti-Counterfeiting Trade Agreement What is ACTA? In October 2007 the United States, the European Community, Switzerland and Japan simultaneously announced that they would negotiate a new intellectual property enforcement treaty, the AntiCounterfeiting Trade Agreement, or ACTA. Australia, the Republic of Korea, New Zealand, Mexico, Jordan, Morocco, Singapore, the United Arab Emirates and Canada have joined the negotiations. Although the proposed treaty’s title might suggest that the agreement deals only with counterfeit physical goods (such as medicines), what little information has been made available publicly by negotiating governments about the content of the treaty makes it clear that it will have a far broader scope, and in particular, will deal with new tools targeting “Internet distribution and information technology”. In recent years, major U.S. and EU copyright industry rightsholder groups have sought stronger powers to enforce their intellectual property rights across the world to preserve their business models. These efforts have been underway in a number of international fora, including at the World Trade Organization, the World Customs Organization, at the G8 summit, at the World Intellectual Property Organization’s Advisory Committee on Enforcement, and at the Intellectual Property Experts’ Group at the Asia Pacific Economic Coalition. Since the conclusion of the WTO Agreement on Trade-Related Issues of Intellectual Property in 1994 (TRIPS), most new intellectual property enforcement powers have been created outside of the traditional multilateral venues, through bilateral and regional free trade agreements entered into by the United States and the European Community with their respective key trading partners. ACTA is the new frontline in the global IP enforcement agenda. To date, disturbingly little information has been released about the actual content of the agreement However, despite that, it is clearly on a fast track; treaty proponents want it tabled at the G8 summit in July, and completed by the end of 2008. Why You Should Care About It ACTA has several features that raise significant potential concerns for consumers’ privacy and civil liberties, for innovation and the free flow of information on the Internet, legitimate commerce, and for developing countries’ ability to choose policy options that best suit their domestic priorities and level of economic development. ACTA is being negotiated by a select group of industrialized countries, outside of existing international multilateral venues for creating new IP norms such as the World Intellectual Property Organization and (since TRIPs) the World Trade Organization. Both civil society and developing countries are intentionally being excluded from these negotiations. While the existing international fora provide (at least to some extent) room for a range of views to be heard and addressed, no such checks and balances will influence the outcome of the ACTA negotiations. The Fact Sheet published by the USTR, together with the USTR's 2008 "Special 301" report make it clear that the goal is to create a new standard of intellectual property enforcement, above the current internationally-agreed standards in the TRIPs Agreement, and increased international cooperation including sharing of information between signatory countries’ law enforcement agencies. The last 10 bilateral free trade agreements entered into by the United States have required trading partners to adopt intellectual property enforcement obligations that are above those in TRIPs. Even though developing countries are not party to the ACTA negotiations, it is likely that accession to, and implementation of, ACTA by developing countries will be a condition imposed in future free trade agreements, and the subject of evaluation in content industry submissions to the annual Section 301 process and USTR report. While little information has been made available by the governments negotiating ACTA, a document recently leaked to the public entitled "Discussion Paper on a Possible Anti-counterfeiting Trade Agreement" from an unknown source gives an indication of what content industry rightsholder groups appear to be asking for – including new legal regimes to "encourage ISPs to cooperate with right holders in the removal of infringing material", criminal measures, and increased border search powers. The Discussion Paper leaves open how Internet Service Providers should be encouraged to identify and remove allegedly infringing material from the Internet. However the same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens' Internet connection on repeat allegation of copyright infringement (the "Three Strikes" /Graduated Response), so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers. While mandating copyright filtering by ISPs will not be technologically effective because it can be defeated by use of encryption, efforts to introduce network level filtering will likely involve deep packet inspection of citizens' Internet communications. This raises considerable concerns for citizens' civil liberties and privacy rights, and the future of Internet innovation. What You Can Do Despite the potentially significant harmful impact on consumers and Internet innovation and the expedited timeframe in which the treaty is being negotiated, the citizens that stand to be directly affected by the treaty provisions have been given almost no information about its real contents, and very little opportunity to express their views on it. Broadcasting Treaty The World Intellectual Property Organization's (WIPO) "Treaty on the Protection of Broadcasting Organizations" is protection, all right: a protection racket for middlemen in the TV and Internet worlds. If adopted, the WIPO treaty will give broadcasters 50 years of copyright-like control over the content of their broadcasts, even when they have no copyright in what they show. A TV channel broadcasting your Creative Commons-licensed movie could legally demand that no one record or redistribute it—and sue anyone who does. And TV companies could use their new rights to go after TiVo or MythTV for daring to let you skip advertisements or record programs in DRM-free formats. If that wasn't bad enough, some countries at WIPO have supported expanding the treaty to cover the Net. That means that anyone who feeds any combination of "sound and images" through a web server would have a right to meddle with what you do with the webcast simply because they serve as the middleman between you and the creator. If the material is already under copyright, you would be forced to clear rights with multiple sets of rightsholders. Not only would this hurt innovation and threaten citizens' access to information, it would change the nature of the Internet as a communication medium. Proponents say they need this treaty to prevent "signal piracy." But the treaty goes well beyond that by creating rights to control "fixations" of broadcasts that only apply after you've received and recorded a signal. EFF and an international coalition of NGOs support a real treaty against signal piracy. We've drafted a treaty that does just that, but treaty proponents have refused to adopt it. Before creating a brand new set of exclusive rights for broadcasters, cablecasters, and webcasters, there should be a demonstrated need for such rights, and a clear understanding of how they will impact the public, educators, existing copyright holders, online communications, and new Internet technologies. If you agree, tell your representative to scrutinize the treaty before it's too late. Development Agenda What Happened: In October 2004, the World Intellectual Property Organization (WIPO) took the historic step of agreeing to consider the impact of its decisions on developing nations—including assessing the impact of intellectual property law and policy on technological innovation, access to knowledge, and even human health. What's at stake is much more significant than the harmony or disharmony of IP regulations. WIPO decisions affect everything from the availability and price of AIDS drugs, to the patterns of international development, to the communications architecture of the Internet. WIPO held three meetings in 2005 to discuss Brazil and Argentina's Proposal to Establish a Development Agenda [PDF], which had been endorsed by hundreds of individuals and public-interest nongovernmental organizations (NGOs), including EFF and the Consumer Project on Technology (CPTech), through the Geneva Declaration on the Future of WIPO, and the subsequent thoughtful Elaboration on Issues Raised in the Development Agenda proposal from the 15 countries in the Group of Friends of Development. This is an extraordinary breakthrough. The Development Agenda gives WIPO the opportunity to move beyond the narrow view that any and all IP protection is beneficial, and choose instead to act strategically to spur economic growth, foster innovation, and help humanity. Why It Matters: Development issues are the international community's most daunting challenge. Despite international agreement to ensure the transfer of technology to developing countries (recognized in Articles 7 and 8 of the TRIPS Agreement), a significant knowledge gap and digital divide continue to separate the wealthy nations from the poor. These meetings are really about the future of WIPO as an international organization. As an agency of the United Nations, WIPO has an institutional obligation to facilitate and implement the wider development perspective of the United Nations' Millennium Declaration. In addition, as recognized in the 1974 Agreement between the United Nations and WIPO, WIPO has an institutional mandate to facilitate the transfer of technology and the building of technical capacity in developing countries. EFF believes that this broader perspective should infuse WIPO's norm-setting activity and the delivery of its technical assistance to developing countries. In particular, EFF believes that WIPO's work should move beyond securing higher levels of intellectual property protection as an end in itself and should: (a) Reflect the traditional balance between the public interest and rightsholders' interests in IPR systems (b) Recognize the sovereign rights of its 182 member nations to implement intellectual property laws that accord with their national domestic priorities and level of economic development (c) Take account of the way that existing national laws uphold the public interest by giving the public the right to make some uses of copyrighted work without permission. This means ensuring that new treaties don't close off the ability of governments to use the flexibility built into existing instruments to create appropriate new exceptions to meet their domestic needs (see Article 13 of the Trade Related Aspects of Intellectual Property agreement, Article 10 of the WCT, Article 16 of the WPPT, and Article 9 of the Berne Convention). What's Happening Now? The 2005 WIPO General Assembly voted to continue the Development Agenda talks. In February 2006 the newly formed Provisional Committee on Proposals for a Development Agenda considered proposals from Chile, the Group of Friends of Development, the Africa Group, Colombia, and the United States. Over 100 specific proposals on a wide range of issues are now on the table. When the next and final PCDA meeting takes place on June 26-30, 2006, WIPO member states must produce recommendations for the 2006 WIPO General Assembly, which will decide the future of the WIPO Development Agenda. EFF is accredited as a WIPO permanent observer and will be attending the Development Agenda meetings. We will continue to report on the proceedings via our Deep Links blog. The NGO Coalition's notes of previous meetings, together with EFF's analysis of what it all means, are linked below. EFF Europe FF has hundreds of donors and thousands of active supporters throughout Europe. As part of our expanded international work, EFF has been increasing its participation in European issues, providing publicity and logistical support for combatting bad European tech policy in co-operation with the many digital rights groups across Europe to fight effectively for consumers' and technologists' interests. Our workload currently includes combatting the growth of invasive European intellectual property law and policies, addressing free speech and innovation issues in Internet filtering and blocking, defending the privacy of Europeans from international threats to the rights protected by the Data Protection Directive (95/46/EC), and monitoring the effects of EU's introduction of data retention regime. Free Trade Agreement of the Americas The U.S. government is employing a new strategy to effect the global entrenchment of overly restrictive copyright law: incorporating DMCA-like copyright provisions in its free trade agreements. Having failed to persuade nations worldwide to adopt U.S.-style copyright regulations via the WIPO Copyright and WIPO Performances and Phonograms Treaties, the government has included anti-circumvention obligations in its bilateral Free Trade Agreements (FTAs) with Jordan (Article 4(13)), Singapore (Article 16.4(7)), Chile (Article 17.7(5)), Morocco (Article 15.5(8)), Australia (Article 17.4(7)), CAFTA (Article 15.5(7)), Bahrain (Article 14.4(7)) and Oman (Article 15.4(7)). It now seeks to include similar provisions in its current multilateral free trade negotiations with 33 countries in the Americas. This time, however, there's a twist: the provisions will be even more restrictive. How so? Like the DMCA, the draft of the Free Trade Area of the Americas (FTAA) IP chapter contains a provision that would require all FTAA countries to ban the circumvention of technological protection measures. It would also similarly prohibit the manufacture and distribution of certain circumvention tools, technologies and devices. But while the DMCA contains a few narrow exemptions to these prohibitions, the draft FTAA IP chapter contains none. As a result, FTAA countries' national copyright law will be entirely supplanted by "anti-circumvention" law. In effect, this allows U.S. copyright owners' rights to trump FTAA countries' national sovereignty and domestic public policy priorities, and consumers and technology developers in FTAA countries risk losing all of their existing rights under their own national copyright laws. When the FTAA negotiations stalled over the inclusion of intellectual property provisions in November 2003, the U.S. Trade Representative moved to Plan B. It announced that it would start negotiations for bilateral FTAs with various Latin American countries: Peru, Colombia, and Ecuador (the Andean community) and Panama. These negotiations are still under way. An FTA with 5 Central American countries (Costa Rica, El Salvador, Guatemala, Honduras and Nicaragua) and the Dominican Republic that includes DMCA-style provisions went into effect in August 2005. Below are resources on the technological protection measure provisions in the FTAA and bilateral FTAs, as well as information about the impact of the DMCA's provisions in the United States since 1998. Also below are resources on Internet Service Provider provisions modeled on section 512 of the U.S. copyright legislation in recent bilateral FTAs, together with information about how the U.S. ISP safe harbor provisions have been used since 1998. International Privacy Standards Privacy is a universal human right. Here is a list of international accords related to privacy that serve as the foundation for national laws, policy frameworks and international agreements throughout the world. International Privacy Frameworks Organization for Economic Cooperation and Development The OECD is a forum of more than 30 countries that has developed forward-thinking guidelines on the protection of privacy and transborder data flows. Decisions made within OECD are reached by consensus and commitments are undertaken on a voluntary basis. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980 Council of Europe Like the United Nations, the 47 member states of the Council of Europe have drafted several agreements to advance citizens' privacy rights as part of a broader commitment to cooperation and the development of human rights and fundamental freedoms. Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, 1980 Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows, 2001 Asia Pacific Economic Cooperation APEC is an inter governmental organization operating on the basis of non-binding commitments. Unlike other multilateral trade bodies, APEC has no treaty obligations required of its participants. Decisions made within APEC are reached by consensus and commitments are undertaken on a voluntary basis. APEC has 21 members. APEC Privacy Framework, 2004 European Data Protection Directive The Directive has been designed to protect the collection, use and disclosure of personal information held by the private and public sector. The Directive was adopted by the European Union, and have been transposed into national law by the 27 members states. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data International Conference of Data Protection and Privacy Commissioners Each year, the International Conference of Data Protection and Privacy Commissioners brings together the highest authorities and institutions guaranteeing data protection and privacy, as well as experts in the field from every continent. International Standards on Privacy and Personal Data Protection adopted by the 30th International Conference of Privacy and Data Protection Commissioners Other International Instruments Article 12, The Universal Declaration on Human Rights, 1948 Article 17, The International Covenant on Civil and Political Rights, 1966 Article 16, The Convention on the Rights of the Child, 1989 E/CN.4/1990/72: Guidelines for the regulation of computerized personal data files, 1990 Article 8, Convention for the Protection of Human Rights and Fundamental Freedoms, 1950 Council of Europe: Recommendations and resolutions of the Committee of Ministers Council of Europe: Recommendation No.R(99) 5 for the protection of privacy on the Internet, 1999 OECD Guidance on Policy and Practice: Privacy Online (book) OECD Guidelines on Cross-Border Privacy Law Enforcement, 2006-ongoing OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, 2002 Article 18, The Cairo Declaration on Human Rights in Islam, 1990 Article 4.3, Declaration of Principles on Freedom of Expression in Africa, 2002 Article 5, American Declaration of the Rights and Duties of Man Mandatory Data Retention Law enforcement agencies throughout the world are pushing for invasive laws that force ISPs and telecom providers to log information about how users communicate and use the Internet. This obligation to log users' Internet use is usually paired with provisions that allow the government to obtain those records, ultimately expanding the governments' ability to surveil its citizens, damaging privacy, and chilling freedom of expression. The EU Data Retention Directive The EU Data Retention Directive, adopted by the European Parliament in 2006, is the leading example of mandatory data retention framework. The highly controversial Directive compels all ISPs and telecommunications service providers operating in Europe to retain a subscriber's incoming and outgoing phone numbers, IP addresses, location data, and other key telecom and Internet traffic data for a period of at least 6 months, to as long as 2 years of all European citizens, including those not suspected or convicted of any crime. Since its passage, the Data Retention Directive has faced intense criticism and now has an uncertain future in the EU. In general, each member state of the European Union is required to implement the provisions of a Directive into their own national laws. But the flawed Data Retention Directive has proven to be too broken and controversial for a number of countries; the constitutional courts of Germany and Romania ruled that their national data retention law is in violation of their constitutions; the Irish Court has allowed the data retention law to be challenged in the European Court of Justice; and Austria,Belgium, Greece, Luxembourg, and Sweden have not yet transposed the Directive into national law. In addition, the European Commission has decided to take a few countries (Sweden, Austria) to the European Court of Justice for failing to implement the directive. Meanwhile, in the countries where data retention has been implemented, European privacy officials discovereddamning evidence of excessive tracking, illegal over-collection, and a lack of evidence to support data retention as a means of helping law enforcement. The indiscriminate collection of traffic data carries great potential for abuse and should be rejected as a serious infringement upon citizens' rights and freedoms. The example of the EU's experiment in mandatory data retention proves that pervasive surveillance will not be tolerated in countries where freedom is valued. With EDRI, AK Vorrat, and other civil society advocates, EFF will continue to fight for the repeal of the EU Directive, and will oppose blanket mandatory data retention proposals throughout the world. The Global Network Initiative The Global Network Initiative is a coalition of information and communications companies, major human rights organizations, academics, investors and technology leaders to produce guidance and oversight for companies facing civil liberties challenges in the ICT industries. EFF has participated in the process since its inception, providing technical and policy advice together with other NGO in the human rights sector. WIPO World Intellectual Property Organization The World Intellectual Property Organization (WIPO) is the UN agency responsible for treaties involving copyright, patent, and trademark laws. WIPO can be a force for progressive change, helping the world take into account public interest and development needs. But all too often, governments are using international treaties negotiated through WIPO as well as other bilateral trade agreements to ratchet up IP rights at the behest of copyright holders. EFF defends your rights at WIPO, acting as a watchdog at its proceedings and advising member countries. Here's a look at some current issues we're focusing on: Importing and Exporting Bad Law Most recently, WIPO has begun considering a treaty that would give broadcasters, cablecasters, and potentially webcasters, broad new 50-year rights to control transmissions over the Internet, irrespective of the copyright status of the transmitted material. It also requires countries to provide legal protection for broadcaster technological protection measures that will require Broadcast Flag-like technology mandates, undermining innovation, competition, and legitimate uses. Towards Better IP Policy Though WIPO has historically worked to create treaties that expand IP rights no matter the consequences to its developing country members, that has started to change. For instance, Brazil and Argentina, leading a group of 15 countries, have asked WIPO to adopt a "Development Agenda," under which new treaties and all of WIPO's work must consider the impact on international development. For the first time, WIPO member states are now discussing the importance of a rich public domain and the dangers of overbroad DRM laws. EFF is part of an international NGO coalition working at WIPO to ensure that intellectual property laws protect human rights like access to knowledge and access to medicine, even as some developed countries try to obstruct the Development Agenda at every turn. PRIVACY Anonymity Many people don't want the things they say online to be connected with their offline identities. They may be concerned about political or economic retribution, harassment, or even threats to their lives. Whistleblowers report news that companies and governments would prefer to suppress; human rights workers struggle against repressive governments; parents try to create a safe way for children to explore; victims of domestic violence attempt to rebuild their lives where abusers cannot follow. Instead of using their true names to communicate, these people choose to speak using pseudonyms (assumed names) or anonymously (no name at all). For these individuals and the organizations that support them, secure anonymity is critical. It may literally save lives. Anonymous communications have an important place in our political and social discourse. The Supreme Court has ruled repeatedly that the right to anonymous free speech is protected by the First Amendment. A much-cited 1995 Supreme Court ruling in McIntyre v. Ohio Elections Commission reads: Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society. The tradition of anonymous speech is older than the United States. Founders Alexander Hamilton, James Madison, and John Jay wrote the Federalist Papers under the pseudonym "Publius," and "the Federal Farmer" spoke up in rebuttal. The US Supreme Court has repeatedly recognized rights to speak anonymously derived from the First Amendment. The right to anonymous speech is also protected well beyond the printed page. Thus, in 2002, the Supreme Court struck down a law requiring proselytizers to register their true names with the Mayor's office before going door-to-door. These long-standing rights to anonymity and the protections it affords are critically important for the Internet. As the Supreme Court has recognized, the Internet offers a new and powerful democratic forum in which anyone can become a "pamphleteer" or "a town crier with a voice that resonates farther than it could from any soapbox." The Electronic Frontier Foundation has been involved in the fight to protect the rights of anonymous speakers online. As one court observed, in a case handled by EFF along with the ACLU of Washington, "[T]he free exchange of ideas on the Internet is driven in large part by the ability of Internet users to communicate anonymously." We've challenged many efforts to impede anonymous communication, both in the courts or the legislatures. We also previously provided financial support to the developers of Tor, an anonymous Internet communications system. By combining legal and policy work with technical tools, we hope to maintain the Internet's ability to serve as a vehicle for free expression. CALEA The Perils of Wiretapping the Internet EFF and a coalition of public interest, industry, and academic groups filed suit in 2005 challenging the Federal Communications Commission's (FCC) unjustified expansion of the Communications Assistance for Law Enforcement Act (CALEA). By forcing broadband Internet and interconnected voice over Internet Protocol (VoIP) services to become wiretap-friendly, the FCC ignored CALEA's plain language and threatened privacy, security, and innovation. Congress passed the Communications Assistance for Law Enforcement Act (CALEA) in 1994 to make it easier for law enforcement to wiretap digital telephone networks. CALEA forced telephone companies to redesign their network architectures to make wiretapping easier. It expressly did not regulate data traveling over the Internet. But now federal law enforcement agencies want to change that. On March 10, 2004, the Department of Justice (DOJ), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA) filed a joint petition with the FCC. The petition requested that CALEA's reach be expanded to cover communications that travel over the Internet. Thus, Broadband providers would be required to rebuild their networks to make it easier for law enforcement to tap Internet "phone calls" that use VOIP applications such as Vonage, as well as online "conversations" using various kinds of instant messaging (IM) programs like AOL Instant Messenger (AIM). EFF objected to a number of the requests in the joint petition, in conjunction with numerous other organizations. On August 9, 2004, the Federal Communications Commission (FCC) released its Notice of Proposed Rulemaking (NPRM) in response to the Law Enforcement joint petition. Applying dubious legal reasoning, it greatly expands the reach of CALEA by redefining what constitutes a "substantial replacement" of the telephone service, tentatively concluding that broadband Internet access providers and managed VoIP systems substantially replace local exchanges, and therefore are subject to the requirements of CALEA. (See CALEA Summary.) On August 5, 2005, the FCC announced a Final Rule, expanding CALEA to Internet broadband providers and certain Voice-over-IP (VoIP) providers. The FCC ruling has been challenged in court by EFF and others and may end up before the Supreme Court. After the DC Circuit Court of Appeals' ruling, the coalition of challengers filed for en banc review. Meanwhile, the DOJ—apparently tired of our lawsuits and hoping to avoid such suits in the future—has now proposed draft legislation to codify and expand the FCC ruling. Wiretapping Is Already Easy Enough Law enforcement agencies convinced the FCC that CALEA needed to be expanded in order to maintain the status quo. Because wiretapping has gotten so much more complex in the Internet age, they argued, it's just too hard for them to intercept all the communications that they need. Without structural changes to the Internet, they won't be able to conduct the same quality of investigations that they did ten years ago. It is crucial to remember that the issue here is not whether law enforcement can tap new technologies like VoIP, but whether they can tap it easily. Existing laws already permit law enforcement to place Internet users under surveillance, regardless of what programs or protocols they are using to communicate. Industry already cooperates with law enforcement to give it all the information requested, and this will continue to happen with or without a new FCC rule interpreting CALEA. Ironically, most kinds of surveillance have gotten much easier in the digital age. Agents can tap mobile phones, gain access to reams of electronic communications such as email, conduct DNA identification tests, and track people's locations using cell phone signals. Surely the greater ease of surveillance in these arenas and others more than makes up for the negligible difficulty of capturing a few VoIP calls and IM conversations. We would be maintaining the status quo without expanding CALEA. Just Because It Can Be Tapped Doesn't Mean It Should The FBI used the "tappability principle" to justify the demands in its petition. This principle holds that if something is legally searchable sometimes, it should be physically searchable all the time. But there is a vast difference between a computer network switch created precisely to be tappable and one that can be tapped with the right tools under the right circumstances. If we applied the FBI's logic to the phone system, it would state that every individual phone should be designed with built-in bugs. Consumers would simply have to trust law enforcement or the phone companies not to activate those bugs without just cause. The Cost of CALEA Will Be Passed on to Consumers The NPRM's proposed expansion of CALEA would also punish broadband providers and consumers, concluding that carriers should forced to spend millions of dollars on CALEA compliance. The FCC explores a mechanism by which these costs will pass to their customers, including a Commission mandated flat monthly charge. Quite literally, then, consumers would be subsidizing the surveillance state. Furthermore, this proposal completely restructures market incentives in the technology industry. Privacyfriendly technologies, which protect the personal information of consumers, would be pushed out of the marketplace. Instead, companies would be forced to design and manufacture surveillance-friendly technologies. The needs of government, not consumers, would guide the marketplace. Innovation Will Suffer When special interests like law enforcement commandeer the marketplace, innovation suffers. The NPRM suggests that all devices that provide broadband connectivity will have to be CALEA-compliant, which would severely limit the scope of high-tech research and development. Today's VoIP systems — revolutionary software tools that allow people to make phone calls over the Internet — would likely never have been developed in an environment where all products had to go through a CALEA-compliance test before making it to market. While the NPRM does not extend CALEA to providers of peer-to-peer VoIP, email and Instant Messaging, it seeks comment on whether other laws might give the FCC power over a wider array of technologies. If the FBI gets its way, the NPRM's tentative regulations will only be the tip of the iceberg. Soon, software companies, under threat of an expansive definition of CALEA's requirements, will face economic incentives to create email and IM programs that are surveillance-ready. Many computer game consoles that people can use to play over the Internet, such as the Xbox, allow gamers to chat with each other while they play. If any communication program running on the Internet has to be CALEAcompliant before being bought and sold, what would stop law enforcement from pushing for a tappable Xbox? CALEA means that innovators will always be forced to think inside the box of surveillance. Their designs and ideas will be limited by a government mandate that requires them to build technology for the purpose of spying rather than playing games, talking to colleagues, or collaboratively making art over the Internet. This will stifle creativity and result in a non-competitive technology market. The only creativity will exist off-shore, where developers outside the U.S. will develop technologies to circumvent U.S. law enforcement capability. The Internet Is Not Like the Phone System The NPRM suggests that rules applied to the phone system should also be applied to the Internet. But crucial differences between the two systems mean that what is healthy for one in terms of marketplace incentives and technological development is unhealthy for the other. What makes the Internet powerful are its edges: computers and other innovative technologies are located at the ends of the network wires. The phone system works the opposite way. Telephones are dumb, inflexible machines. Whereas the usefulness of the phone system comes from the telecommunications network itself, the Internet's usefulness comes from its endpoints. In addition, the phone network is a closed, insulated system, while the Internet is open and ever-changing. End users cannot change the nature of the phone network on a whim. But on the Internet, people can deploy new services and new devices at will — they can invent new protocols for sending data, or connect a new kind of widget to the network. This is integral to making the Internet a vital source of technological and scientific innovation. EFF believes that federal agencies should not force the broadband Internet access or voice over IP industries, and by extension, their consumers, to bear the considerable costs of purchasing and implementing surveillance-ready network technologies simply because it suits the government's needs. CALEA Could Make the Internet Less Secure While law enforcement's efforts to hijack the tech market are disturbing, EFF is also concerned that making the Internet CALEA-compliant might backfire: many of the technologies currently used to create wiretap-friendly computer networks make the people on those networks more pregnable to attackers who want to steal their data or personal information. When broadband service providers are forced to make their networks or applications tappable, this introduces more points of vulnerability into the system. Users have to place blind trust in companies and services they may not realize they are signing up for. The FCC's proposes to allow third parties to manage government surveillance requests: a private company would analyze all the data from a telecommunications carrier, extract information relevant to the court order, and send it to law enforcement. Currently, several large corporations are already offering CALEA services that might result in a loss of privacy for consumers. For example, VeriSign offers a legal intercept service to ISPs, which requires the providers to pipe all their data to VeriSign. Then the company's employees analyze the data, extract information relevant to the court order, and send it to law enforcement. This transaction leaves personal data potentially vulnerable when it travels from the service provider's network to VeriSign's. It also places the personal data of innocent people in the hands of a third party without customer consent. If CALEA is applied to the Internet, it is likely that many more services like VeriSign's will spring up, introducing still more uncertainty into the system. Services like these support and expand what the ACLU has called the Surveillance-Industrial Complex. Since compliance with surveillance requests is a significant cost for carriers, telecommunications companies have acted as a check on government power, lobbying against excessive proposals. Now, private entities that profit from surveillance will have an incentive to lobby for more government surveillance powers. Ultimately, all of these problems can be traced back to a single root cause: CALEA was drafted specifically to regulate phone networks, which are designed to be closed systems. The Internet is an open, global system that handles countless forms of data-transfer and accommodates an ever-changing array of smart edge-devices. If CALEA is misapplied to the Internet, the results will be disastrous. The privacy of innocent people is likely to be violated, innovation will certainly be stifled, and the current and future functionality of the Internet will be crippled. Cell Tracking Can the government use your cell phone records to track your physical location without first obtaining a warrant based on probable cause? Often with EFF input as a friend of the court, the vast majority of judges issuing public opinions on the matter are saying “no”, and rejecting government applications for cell site location tracking information made without showing sufficient need for this kind of sensitive information. This issue came to light in August 2005, when the first judge to publish a decision on the issue— Magistrate Judge Orenstein in the Eastern District of New York—publicly denied a government request that lacked proof of probable cause. In doing so, Judge Orenstein revealed that the Justice Department had routinely been using a baseless legal argument to get secret authorizations from a number of courts, probably for many years. Many more public denials followed from other judges, sharply rebuking the government and characterizing its legal argument as as "contrived," "unsupported," "misleading," "perverse," and even a "Hail Mary" play. But the government continues to rely on the same argument in front of other judges, most often in secret and sometimes successfully. EFF has been asked to serve as a friend of the court in several of these applications, successfully showing judges how and why the government's arguments are baseless. EFF will continue to serve as a resource to courts and to counsel, to protect your privacy interest in your physical location, to stop the government from turning the cellular phone system into a vast network for warrantless physical surveillance and to ensure that Big Brother stays out of your pocket. Digital Books Like music and movies before them, books are going digital, and each new development is a source of excitement and concern for avid, tech-savvy readers. Book fans should indeed be excited, because digital books could revolutionize reading, making more books more findable and more accessible to more people in a diversity of ways. But readers should also be concerned, because recent events demonstrate that the forces making digital books and digital readers a reality routinely fail to respect the kinds of rights and expectations that have been built and defended over generations of experience with physical books. The first round of mainstream digital book services, products, and applications -- Google Book Search, the Amazon Kindle, the Barnes and Noble Nook -- all offer a much riskier way to own and read books compared to our experiences with traditional books. It will take an informed readership and entrepreneurial leadership in the field to make sure that digital books preserve the rich heritage of intellectual freedom, free speech, and privacy that we have with physical books today. Locational Privacy Modern communications mean most Americans today walk around with a beacon that transmits their location. Mobile phones register to a nearby tower as the owner moves through space and the phone company can collect that data in real time or retrospectively to physically place the phone with varying degrees of accuracy. Companies can also determine the owner of every handset within range of a particular tower. GPS enabled phones enable far more precise location placement. Many cars now have GPS devices installed, some of which transmit the vehicle’s location to a centralized service. As the devices get cheaper and smaller, law enforcement agencies can more easily attach GPS trackers to cars and individuals, enabling precise round-theclock surveillance without ever leaving the precinct. Location-based services, including maps of nearby restaurants, friend finders and other social networks collect location data as part of providing the service, or for contextual advertising. EFF is fighting to protect the privacy and prevent the misuse of this data that users of phones, GPS transmitters and location-based services leak to providers and to the government. In our cell tracking and GPS tracking cases, we advocate that the law protect this information by requiring police to get a search warrant before obtaining this sensitive data. We also work to ensure that location based service providers don’t abuse the information they collect on their customers, or hand it off to other companies or the police without consent or probable cause. National Security Letters Of all the dangerous government surveillance powers that were expanded by the USA PATRIOT Act, the National Security Letter (NSL) power under 18 U.S.C. § 2709 as expanded by PATRIOT Section 505 is one of the most frightening and invasive. These letters, served on communications service providers like phone companies and ISPs, allow the FBI to secretly demand data about ordinary American citizens' private communications and Internet activity without any meaningful oversight or prior judicial review. Recipients of NSLs are subject to a gag order that forbids them from ever revealing the letters' existence to their coworkers, to their friends, or even to their family members, much less the public. The FBI's systemic abuse of this power has been documented both by a Department Of Justice investigation and in documents obtained by EFF through a Freedom of Information Act request. EFF has fought for years to spread awareness of National Security Letters and add accountability and oversight to the process. In 2007, EFF filed Freedom of Information Act litigation seeking documentation of National Security Letter misuse by the FBI. Thousands of pages of documents were released over a period of four years, leading to repeated revealations of governmentabuses of power. An EFF report based on these documents led to tough questions for the FBI before Congress. The documents also helped prompt the Senate Judiciary Committee to investigate whether Attorney General Alberto Gonzales lied to Congress. In 2008, EFF defended the Internet Archive from an inappropriate National Security Letter. Because NSLs come with a gag order, most recipients are unable to ever reveal their existence. However, with the help of EFF and the ACLU, the Internet Archive fought back and won the right to speak publicly about the letter. As a result, it's become one of the few well-documented and publicly-known cases of NSL use. EFF has been fighting in Congress for legislative reform of National Security Letters since 2005. In 2009, many hoped that President Obama, having run for office promising to reform Bush-era surveillance abuses, would work with Congress to curb NSL abuse. Unfortunately, the Obama Administration has instead continued to block reform, and has even sought to expand NSL powers. NSA Spying The U.S. government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001. News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports, plus a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution. The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence [PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails, web browsing, and other Internet traffic to and from AT&T customers, and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed, “this isn’t a wiretap, it’s a country-tap.” EFF is fighting these illegal activities on multiple fronts. In Hepting v. AT&T, EFF filed the first case against a telecom for violating its customers' privacy. In addition, EFF is representing victims of the illegal surveillance program in Jewel v. NSA, a lawsuit filed in September 2008 against the government seeking to stop the warrantless wiretapping and hold the government officials behind the program accountable. EFF is not alone in this fight. There are multiple cases challenging various parts of the illegal surveillance against both the telecoms and the government. This page collects information on EFF's cases as well as cases brought by individuals, the American Civil Liberties Union of Northern California and of Illinois, the Center for Constitutional Rights, and others. Online Behavioral Tracking Who knows what you're doing when you browse the web? New web technology has created many unexpected ways for corporations to track your web activity without your knowledge. Countless advertising networks are able to secretly monitor you across multiple websites and build detailed profiles of your behavior and interests. New threats include "super-cookies," like Adobe's "Local Shared Objects" and Microsoft's "User Data Persistence." They include semi-legal data-sharing agreements between Internet service providers and data warehouses like Phorm and NebuAd. And they include social networking websites that allow advertisers too much access to their users' behavior and data. EFF is working with lawmakers to close legal loopholes that enable unscrupulous tracking, with corporations to teach them how to manage data responsibly, and with the media to educate the public about corporate behavior and user rights. Pen Trap In the first ruling of its kind, a federal magistrate judge held that the government must obtain a search warrant to collect the content of a telephone call, even when that content is dialed digits like bank account numbers, social security numbers or prescription refills. The decision from Magistrate Judge Smith in Houston closely followed the reasoning outlined in an amicus brief from EFF and the Center for Democracy and Technology (CDT). The Texas judge invited EFF to file the brief in response to requests from government investigators to use a "pen register" or "trap and trace device" to collect all numbers dialed on a phone keypad after a call has been connected. Investigators can typically get "pen/trap" orders under a legal standard much lower than the "probable cause" required for a typical phone-tapping warrant, because only phone numbers used to connect the call are collected, not the content of the phone call itself. However, the judge found that when it comes to dialed numbers that represent call content, federal statutes require that investigators either get a probable cause warrant or use filtering technology to ensure that only dialed phone numbers are collected. In fact, according to the court, "Congress ordered law enforcement to do just that, 12 years ago, yet the court notes that the government's current practice is to collect all dialed digits without using any filtering technology." "Judge Smith correctly recognized that the privacy protections for your phone calls shouldn't depend on whether the information you are communicating is spoken or dialed," said EFF Staff Attorney Kevin Bankston. "Whether it's your bank account number, your social security number, your prescription refill, or even your vote for American Idol, the government has to get a search warrant to tap the numbers you dial after your call has been connected. Allowing such taps without a warrant not only violates longstanding statutes, as the court found here, but the Constitution itself"which makes it all the more troubling that government investigators have been collecting such information without a warrant for years." In the same opinion, Judge Smith also rejected a new government request to track the location of someone's cell phone without a warrant. EFF has briefed two other courts on the cell-tracking issue, which has been a continuing controversy since Judge Smith and another judge in New York first published decisions on the issue last fall. Those decisions revealed that government investigators had routinely been tracking cell phones for years without getting warrants based on frivolous legal arguments. Printers Imagine that every time you printed a document, it automatically included a secret code that could be used to identify the printer - and potentially, the person who used it. Sounds like something from an episode of "Alias," right? Unfortunately, the scenario isn't fictional. In a purported effort to identify counterfeiters, the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information. That means that without your knowledge or consent, an act you assume is private could become public. A communication tool you're using in everyday life could become a tool for government surveillance. And what's worse, there are no laws to prevent abuse. The ACLU recently issued a report revealing that the FBI has amassed more than 1,100 pages of documents on the organization since 2001, as well as documents concerning other non-violent groups, including Greenpeace and United for Peace and Justice. In the current political climate, it's not hard to imagine the government using the ability to determine who may have printed what document for purposes other than identifying counterfeiters. Yet there are no laws to stop the Secret Service from using printer codes to secretly trace the origin of non-currency documents; only the privacy policy of your printer manufacturer currently protects you (if indeed such a policy exists). And no law regulates what sort of documents the Secret Service or any other domestic or foreign government agency is permitted to request for identification, not to mention how such a forensics tool could be developed and implemented in printers in the first place. With no laws on the books, there's nothing to stop the privacy violations this technology enables. For this reason, EFF is gathering information about what printers are revealing and how - a necessary precursor to any legal challenge or new legislation to protect your privacy. And we could use your help. In the preliminary research paper linked below, we explain what we've observed so far, briefly explore the privacy implications, and ask you to print and send us test sheets from your color laser printer and/or a color laser printer at your local print shop. That way, we can watch the watchers and ensure that your privacy isn't compromised in ways that harm your fundamental consitutional rights. In addition to documenting what printers are revealing, EFF has filed a Freedom of Information Act (FOIA) request, and we will keep you updated on what we discover. In the meantime, we urge you to participate and pass the word along about this research project. Thank you for your support! Real ID Threatening Your Privacy Through an Unfunded Government Mandate The federal government is trying to force states to turn your drivers license into a national ID. Unless you tell your state legislator to push back, the Real ID Act will create grave dangers to privacy and impose massive financial burdens without improving national security in the least. Signed into law in May 2005 without meaningful debate, the Real ID Act states that drivers licenses will only be accepted for "federal purposes"—like accessing planes, trains, national parks, and court houses— if they conform to certain uniform standards. The law also requires a vast national database linking all of the ID records together. Once the IDs and database are in place, their uses will inevitably expand to facilitate a wide range of surveillance activities. Remember, the Social Security number started innocuously enough, but it has become a prerequisite for a host of government services and been coopted by private companies to create massive databases of personal information. A national ID poses similar dangers; for example, because "common machine-readable technology" will be required on every ID, the government and businesses will be able to easily read your private information off the cards in myriad contexts. Real ID won't just cost you your privacy. The federal government didn't give the states funds to implement the law and overcome its many administrative burdens, so the billions of dollars in costs will be passed down to you in the form of increased DMV fees or taxes. And what will you get in return? Not improved national security, because IDs do nothing to stop those who haven't already been identified as threats, and wrongdoers will still be able to create fake documents. In fact, the IDs and database will simply create an irresistible target for identity thieves. It's not too late to fight back—state legislators can still resist implementing the Real ID Act and force Congress' hand. Learn more about Real ID through the links below, and tell your representatives to oppose the Real ID Act. RFID Radio Frequency Identification Libraries, schools, the government, and private sector businesses are adopting radio frequency identification tags, or RFIDs — a technology that can be used to pinpoint the physical location of whatever item the tags are embedded in. While RFIDs are a convenient way to track items, they are also a convenient way to do something far less benign: track people and their activities through their belongings. EFF is working to prevent the embrace of this technology from eroding privacy and freedom. Search Engines Google, Yahoo, MSN, AOL and other search engines record your search queries and maintain massive databases that reach into the most intimate details of your life. When revealed to others, these details can be embarrassing and even cause great harm. Would you want strangers to know where you or your child work or go to school? How about everyone seeing searches that reference your medical history, financial information, sexual orientation, or religious affiliation? Unfortunately, information stored with a third-party is given much weaker legal protection than that on your own computer. It can be all too easy for the government or individual litigants to get access to your search history and connect it with your identity. Your search data demands more substantive legal and technical protections. Learn more about this issue below and take action to defend your privacy. Google v. DoJ Subpoena In January 2006, the Justice Department asked a federal court in San Jose, California to force Google to turn over search records for use as evidence in a case where the government is defending the constitutionality of the Child Online Protection Act (COPA). On March 17, 2006, the judge rejected the government's overreaching request for user records. Search Incident to Arrest The Fourth Amendment generally requires law enforcement to obtain a warrant based on probable cause before searching a person, her home, or her belongings. For nearly a century, however, courts have recognized a limited exception when the search is "incident to an arrest." The original justification for this exception was to enable police officers to find weapons on the arrestee or prevent the destruction of evidence, thus allowing the officers to search the arrestee's person and the area within her immediate control. The exception has expanded over the years to allow police under some circumstances to search the contents of containers found on or near the arrestee. Applying this exception to laptops, cell phones, and other digital devices makes little sense. Officers can seize these devices and then seek a warrant to search for relevant information if they have probable cause. Yet we see an increasing number of cases where law enforcement indiscriminately rummages through these devices without a warrant, and then seeks to justify the intrusion as a search incident to arrest. EFF is working to help courts correctly apply the search incident to arrest doctrine to new technologies. Smart phones such as the iPhone and Blackberry contain vast amounts of personal data like emails, photos, contact lists, and text messages, as well as the capability to access more information over the Internet. The mere fact that someone is carrying one of these phones when she is arrested does not justify police access to that sensitive information without judicial supervision. Social Networks Sites like Facebook and Twitter provide users with a place to share personal information with friends, family, and the public — an activity that's proven to be hugely compelling to Internet users. In response to the demand, technology is evolving to encourage the disclosure of information that was formerly discreet (like location), and to enable the sharing of information even when not sitting in front of a traditional computer (like from mobile phones). But it doesn't take much forethought to realize that there are countless privacy pitfalls in a world where a near-endless stream of personal bits is indiscriminately posted, indefinitely stored, and quietly collected and analyzed by marketers, identity thieves, and professional government snoops in America and abroad. The public controversies that have erupted to date — Facebook's drastic terms of service changes and Google Buzz's forced sharing of email contacts — are only the first snares in a rapidly growing thicket of social networking privacy issues. Here are some of the ways EFF is working to protect your privacy as the use of social networks grows: EFF has gone toe-to-toe with the government to uncover hidden details about how they use social networking sites for investigations, data collection, and surveillance. EFF works to expose issues with social networks as soon as they emerge, from the leaking of information to advertisersor the policies of the sites themselves. EFF helps savvy users better understand how to strengthen their privacy online and opt out of information sharing. Travel Screening Before you get on an airplane, the government wants to sift through the personal details of your life. If the data analysis says you're a security risk, too bad -- you may have no way of challenging the error. Worse still, that black mark could follow you for the rest of your life, and there may be little stopping the government from using your data for purposes far outside of travel screening. The privacy invasions don't stop there. When you cross the U.S. border to come home, you could be singled out for a random, invasive search. A recent court decision allows border agents to search your laptop or other digital device and copy the contents without limitation. EFF has been fighting these schemes every step of the way -- both in court and in Congress. Border Searches While the Supreme Court has ruled that customs and border agents can perform "routine" searches at the border without a warrant or even reasonable suspicion, the ongoing searches of laptops, cell phones, and other electronic devices at America's borders are unconstitutionally invasive. Agents often confiscate the devices, make copies of the data, and sometimes even transfer the information to other government agencies -- violating the Fourth Amendment prohibition on unreasonable search and seizures. EFF has called on Congress to recognize the unique nature of electronic information stored on personal digital devices and to restore search standards the protect the privacy of Americans in the Information Age. Learn more about our border search work below. Automated Targeting System (ATS) In November 2006, the Department of Homeland Security revealed that for years it has assigned "risk assessments" to millions of travelers as they enter or leave the country using the Automated Targeting System. Effectively, if you travel internationally, ATS creates an instant, personal and detailed dossier on you that Customs and Border Protection officers use to decide whether you get to enter the country, or will be subject to an enhanced (and potentially invasive) search. Before major media reports picked up the story, EFF sounded the alarm and submitted formal comments opposing ATS. CAPPS II and Secure Flight CAPPS II was a planned profiling system that would have required airlines to provide personal details about passengers before they boarded their flights. These details would then be combined with government and commercial databases to create a color-coded "score" indicating each person's security risk level. In 2004, American Airlines admitted to providing 1.2 million passenger records to contractors developing prototypes for the program, even though the Transportation Security Administration had denied such a transfer for months. TRANSPARENCY E-Voting Rights Many states are hastily implementing flawed electronic voting machines and related election procedures. EFF is protecting your right to vote in the courts while working with legislators and election officials across the country to ensure fair, transparent elections. Twenty-three states still do not require a paper record of all votes, despite the demonstrated technical failures of e-voting machines in the 2004 presidential election -- including the complete loss of thousands of votes. In turn, voters cannot verify that the e-voting machines are recording their votes as intended, and election officials cannot conduct recounts. Most of these machines use "black box" software that hasn't been publicly reviewed for security. Indeed, when security researchers have inspected the devices, they've found serious vulnerabilities all too often. But poorly-designed machines are not the only problem. Most election workers remain woefully undertrained regarding potential e-voting problems. Vendor technicians frequently have unsupervised access to voting equipment. Local election officials routinely deny attempts to examine e-voting audit data. EFF provides leadership on several fronts -- litigation, legislation, regulation, independent analysis, advocacy -- to help ensure that your vote counts. FOIA Litigation Government for Accountable EFF's FOIA Litigation for Accountable Government (FLAG) Project aims to expose the government's expanding use of new technologies that invade Americans' privacy. Through Freedom of Information Act (FOIA) requests, the project helps to protect individual liberties and hold the government accountable. National security and law enforcement demand some level of government secrecy, but too much secrecy enables abuses of power. The Justice Department's cell phone tracking without probable cause, the NSA's illegal spying program, and other recent privacy-invasive initiatives make this clear. While radically enhancing its technological ability to monitor lawful activity and the details of our lives, the government has also actively attempted to limit public scrutiny in recent years. As one study found in 2005, government secrecy "continues to expand across a broad spectrum of activities, including the courts, new private inventions, and the scientific and technical advice the government receives." The public deserves to know what the government is doing, so that it can keep abuses of power in check and challenge violations of privacy. To those ends, EFF submits requests under the Freedom of Information Act, a statute that forces the government to disclose details about its activities. Our requests focus on government collection and use of information about Americans, the increasing cooperation between the government and the private sector, and federal agencies' development and use of new information technologies. EFF makes this information available to the public, the media, and policymakers. EFF also strategically files FOIA lawsuits against government agencies to develop existing case law that will benefit all FOIA requesters. Terms Of (Ab)Use One cannot go online today without eventually being asked to accept a set of so-called Terms of Service (or TOS). These "terms" are actually purported legal contracts between the user and the online service provider (websites, MMORPGs, communication services, etc.), despite the fact that users never get a chance to negotiate their contents and can often be entirely unaware of their existence. Using a TOS, online service providers can dictate their legal relationship with users through private contracts, rather than rely on the law as written. In the unregulated and unpredictable world of the Internet, such arrangements often provide the necessary ground rules for how various online services should be used. Yet TOS agreements also raise a number of concerns for the consumer, as they can be a vehicle for abuse by online service providers. For starters, TOS provisions are usually written by the service providers themselves. As a result, they tend to end up being one-sided in the service provider's favor, and are often designed to be beyond any judicial scrutiny. Even more importantly, most users never even bother to read, let alone understand, these agreements, filled as they are with confusing legalese. The time has come to shed light on what these Terms of Service agreements actually say, and what it means to users. In conjunction with our TOSBack project, EFF is working to make the contents of these TOS more transparent for the average user. Test Your ISP In May 2007, Comcast began engaging in protocol-specific interference with the activities of its subscribers. When confronted by users and by EFF, Comcast responded with denials and answers that told less than the whole story. In October 2007, however, after independent testing by the Associated Press and EFF, it became clear that Comcast was, in fact, interfering with BitTorrent, Gnutella, and potentially other common file sharing protocols employed by millions of Internet users. In specific, Comcast was injecting forged RST packets into TCP communications, in an effort to disrupt certain protocols commonly used for file-sharing. The interference efforts were triggered by the protocol that the subscriber used, not by the number of connections made or amount of bandwidth used by the subscriber. After a wave of public outcry, lawsuits, and an FCC proceeding, Comcast eventually anounced that it was planning to phase out discrimination against P2P protocols. We look forward to seeing them do that. Meanwhile, the Comcast affair inspired us to launch our Test Your ISP project. Our aim is to ensure that the Internet community has the tools and organization to quickly recognize when ISPs engage in interference or protocol discrimination in the future. At a minimum, consumers deserve a complete description of what they are getting when they buy "unlimited Internet access" from an ISP. Only if they know what is going on and who is to blame for deliberate interference can consumes make informed choices about which ISP to prefer (to the extent they have choices among residential broadband providers) or what counter-measures they might employ. Policy-makers, as well, need to understand what is actually being done by ISPs in order to pierce the evasive and ambiguous rhetoric employed by some ISPs to describe their interference activities. Accordingly, EFF is developing information and software tools intended to help subscribers test their own broadband connections. We are also collecting information about software and tests being developed by other groups around the world. While these tests initially will require a relatively high degree of technical knowledge, we hope that we will be able to develop tools that will bring these testing efforts within reach of more subscribers. This web page will collect EFF's white papers, software tools, blog entries, and other materials relating to this ongoing project. We are also maintaining a list of known ISP testing projects: Known ISP Testing Software Tool Active / # Participants Platform Protocols Notes Passive per Test Gemini Active(?) Bilateral Bootable CD ? Glasnost Active 1.5 sided Java applet BitTorrent Firewall characteristi cs, HTTP proxies, DNS environment Forged RSTs Not code users can run Any A server platform for others' active testing software TCP performanc e A sophisticated speed test Real tests forthcoming here ;discu ssion here ICSI Netalyzr Active 1.5 sided Java applet + some javascrip t ICSI IDS Passive 0 sided (on the network) IDS 2 sided PlanetLa b (server), Any (client) Google/New AmericaMeasu rementLab Active NDT Active 1.5 sided Java applet native app Network Neutrality Check Active 1.5 sided Java applet No real tests yet Unilateral (currentl y) Windows app Any NNMA pcapdiff / tpcat Passive Either Bilateral Python app / Any Uses pcapdiff A tool to make manual tests easier. EFF is no longer working on pcapdiff, but development continues with the tpcat project. Switzerland Passive Multilateral Portable Python app Web Tripwires Passive 1.5 sided Javascrip t embed Any Sneak preview release just spots forged/modified packets HTTP Must be deployed by webmasters EFF's Test Your ISP Software EFF has released Version Zero of Switzerland, our sophisticated ISP testing software. Switzerland uses a semi-P2P, server-and-many-clients architecture to detect modified or spoofed traffic between multiple clients. You can learn more about Switzerland here. The Test Your ISP project previously released a much simpler piece of software called pcapdiff. Pcapdiff is a simple command line tool that lets you compare "pcap" packet captures from either end of an Internet communication; it reports when packets are dropped and spoofed between the endpoints ("pcap" packet captures can be recorded with standard packet sniffing tools like tcpdump and wireshark). Running tests with pcapdiff is a technically involved process; we have a whitepaper outlining the steps involved. Chapter 1: The Market at the Bottom of the Pyramid Quote: “However, to participate in these markets, the private sector must learn to innovate. Traditional products, services, and management processes will not work.” Review: We are all familiar with social classification based on income. We all know that the very rich constitute only a small percentage of our population while the poor constitute a significantly larger percentage. And we also know that this classification can be accurately portrayed as a pyramid, the very same pyramid that we have been familiar with since high school Economics. And since high school, a lot of us have thought that those at the bottom of the economic pyramid are the ones who can hardly to spend for anything save for basic necessities like food and drinking water, which may not always be clean as compared to our standards. When you and your family are only earning $2.00 on a typical day, then you’re not supposed to enjoy some, if not all, luxuries, right? Wrong. Every market has special characteristics that defines it and makes it unique. If we view the poor at the bottom of the pyramid as a potential market, then we can see that they have certain qualities that differentiate them from other markets. We can be quick to agree that our tried and tested products, services, and management styles that we’ve used for the other markets will not work for the BOP market. But should be just as quick to dismiss them as a viable market to sell products and services in? Of course not, because when you take a look at the sheer size of the market, you can easily have an idea of the value that they can offer. So, why not tap them? A lot of private corporations are still too caught up in their own worlds and are not looking to innovate their products, services, and even themselves in order to address the needs of the BOP market. What they should do is to realize that the poor are a viable market and then offer themselves and their products and services to the BOP market in such a way that entices them to spend. The BOP market has different characteristics that cannot be satisfied by current methods of doing business, thus there is a need for innovation. Chapter 2: Products and Services for the BOP Quote: “Regardless, the goal is to reach the entire population base, including the BOP.” Review: The BOP market has a different outlook on products and services mainly because of their low average income. With only a $2.00 a day budget, companies should expect that the BOP market would be choosy on the things that they want to buy. The poor are more interested in smaller packaging with a higher price per volume if they were to buy it in bulk. Why the seemingly bad judgment on spending? It’s because they have no other choice. They just can’t sacrifice necessities like food and drinking water to buy commodities in bulk. Unlike those at the middle or top of the pyramid who don’t sacrifice necessities even if they do buy in bulk, the poor just don’t have that financial flexibility. What companies need to do is innovate not only their products and services but also their other operational processes as well. Products and services that are well‐suited for the BOP market should be complemented with a business model that is specifically designed for them. There should be a Global standard on how to do business for BOP markets but companies should further tweak their operations to suit their local markets. This is because solutions should be transportable and scalable across different areas, which entails difference in the culture and languages of the local BOP market. When we think about it, most of the regular products are made more expensive because of the value added to them aside from the specific purpose they were created for. For example, toothpaste is primarily used to keep the teeth clean but many companies add mouthwash to cleanse the mouth of bacteria and fluoride to keep teeth white. But for a BOP market, a product’s function defines the product itself. It doesn’t need to have a lot of horns and whistles; if it does the job it was designed to do, then it good enough. This kind of goes against conventional ways of doing business, because companies are used to markets that want to get the best value out of their money, which results to more expensive products but with better form and functionalities. However, the same cannot be said about the BOP markets. Chapter 3: A Global Opportunity Quote: “MNCs and large firms have to start from a deep understanding of the nature and the requirements of the BOP... and then architect the business models and the management processes around these requirements.” Review: With a 4 billion strong market base, you would think that companies are competing against one another, trying to be the first to tap the BOP market. But you would be surprised to find that companies are actually semi‐ignoring this market for ones that are less than half its size. This is because the other markets, which are comprised of people from the other levels of the economic pyramid, have been in constant business with the companies. Over the years, companies have developed tried and tested products and systems of operations that perfectly suit these other markets. Companies are just used to dealing with these other consumers. But what about the BOP markets? The thought of tapping the poor as a potential market base is a relatively new and radical idea. This would entail stepping out of the companies’ comfort zones and try something new. Something that is not only a way of portraying social responsibility but also of getting rewards (read: profit) out of doing it. The BOP market can be found in all of the nations of the world, and compromise about two‐thirds of our entire population. Their sheer size and diversity is enough in order for companies to get reasonable returns on their operations but why aren’t they doing it? Companies aren’t doing it because they’re used to other markets and already have methods suited for their existing operations. Why fix something that isn’t broken, right? But what about progress? Should they remain stagnant just because they’re doing just fine at present? What would be better is for them to realize the opportunity that BOP markets are offering. Since BOP markets are similar throughout different regions, a local innovation could have global applications, and even have uses in other markets. One thing is for sure, BOP markets entail various opportunities and companies are just to reluctant to make changes in order to seize them. Chapter 4: The Ecosystem for Wealth Creation Quote: “A market‐based ecosystem is a framework that allows private sector and social actors, often with different traditions and motivations, and of different sizes and areas of influence, to act together and create wealth in a symbiotic relationship.” Review: The title of the chapter reminds me of a previous article that we’ve covered in class. It had to do with the creation of wealth. Yes, wealth can be created, unlike how some people believe that there is a fixed amount of wealth. They believe that we are all apportioned a part of that wealth and that is basically how much we have for the rest of our lives, unless some random circumstance, like winning the lottery, comes along. But the contrary is true. Wealth can be created and destroyed like almost everything else. Wealth can be created when one creates something that is of value to others. Something that is of that great value that they are willing to pay you an amount of money in exchange for it. And this is something that C.K. Prahalad understands very well and is trying as a basis for his proposition that the poor can be a viable market that companies can tap. An ecosystem, in a biological sense, is the set of living and non‐living things that interact with one another in such ways that benefit the entire community and not just one part of it. This is the kind of relationship that Prahalad wants the private companies, the BOP markets, and other concerned parties to have. He not only wants to empower the poor, to give them another shot at having a decent life, he also predicts that private corporations would benefit from their relationship. He gave an example with an Indian company named HLL, wherein they were able to reach 200 to 300 million more potential customers belonging to the BOP market thanks to their partnerships with more than one million partners who also belong to the BOP market themselves. Wealth is created not only on the side of the poor who benefit from the employment and access to world class products and services, but also on the side of the private companies who gain access to a very large market base, with a combined spending power probably in the range of a few hundred million dollars. But these aren’t the only two parties that will experience an increase in wealth. In an ecosystem, predators and prey aren’t the only ones involved. In the business perspective, every party involved in the supply chain benefits from the BOP market. From the raw materials suppliers, to the manufacturers, and even up to the distributors. When the BOP market is tapped, the creation of wealth isn’t limited to one party. It’s distributed to all. Chapter 5: Reducing Corruption: Transaction Governance Capacity Quote: “Corruption in various forms adds to this cost burden and business uncertainty.” Review: Coming from a country that is labeled as the most corrupt in the world, I should already know how corruption negatively affects the economy. But Prahalad is mostly talking about corporations, while the Philippines is famous for its corrupt government and its officials. Although there are similarities in both of the organizations, corporations usually have very strict system of punishment for corrupt employees while the Philippine government is riddled with officials who refuse to police their own ranks because they themselves are involved in corrupt practices or can benefit from it. Regardless of the difference, the effect is clear. I guess spending isn’t the only one with a multiplier effect in economics; corruption also has a multiplier effect, which is to say that if there is an increase in corruption, there is also an increase in its negative effects. Corruption not only has negative economic effects, where only a small group of people own a large amount of the total wealth, but also social ones. For example, families that cannot afford to send their children to school will produce a vastly uneducated workforce in the coming years. When you examine some of the “poor” countries in world, you’ll find that a lot are actually rich in natural resources, what Prahalad calls “trapped resources”. These sources of unrealized wealth are actually a result of inadequate rules and regulatory institutions. Again, the multiplier effect comes in. Laws and government agencies may actually already exist but any enforcement is limited to those who aren’t in the corruption circle. The main goal in tapping the poor as a market is providing a win‐win situation for them and private corporations: poverty alleviation while the corporations benefit both in a social and economic perspective. But before these benefits can be reaped, the private sector must be developed to the level where they can innovate themselves to the point that they can successfully satisfy the needs of the BOP market. Corruption is a hindrance to private sector development, another application of the multiplier effect. We can never truly know all of the negative effects of corruption. The various effects could branch out and indirectly produce other problems. But the opposite can be said of its reduction. A case in point was when an e‐Governance system was adopted in one state in India. It reduced corruption substantially while transactions were being completed at only a fraction of the original time. This too has a multiplier effect. People can now spend more time in doing productive work, which in itself also has multiple effects. The opportunities for development are endless. But before any of the benefits can be reaped, corruption must be reduced greatly if not eliminated altogether. Chapter 6: Development Transformation as Social Quote: “When the poor at the BOP are treated as consumers, they can reap the benefits of respect, choice, and self‐esteem and have an opportunity to climb out of the poverty trap.” Review: I had stated in my analysis of the previous chapter that development, like its counterpart corruption, has positive multiplier effects not only to the parties involved but also those that are involved with the parties themselves. The economic benefits are obvious. For example, if a family has a higher purchasing power, it can afford better products and services for its members and improve its standing in factors like health and educational attainment. But are there other benefits aside from the obvious economic ones? One of the other benefits is a sense identity among the poor. Being poor, they originally didn’t have the resources to avail of certain services like birth certification, voter registration, and the like. They, thus, didn’t exist in a legal sense. This loss of legal identity kinds of separate them from the rest of society that have the privilege of owning property and having employment because they were able to avail of basic government services. Having no legal identity, they can’t benefit from what modern society can offer. Also, knowledge and education come into play. Having better access to information, usually through digital means, helps the poor acquire knowledge or skills that they would have only gotten from formal training but were too poor to do so. This effect, like many others, also has multiple effects. This could result in a more knowledgeable and more literate population and workforce that could produce better products and services for the society. Whatever the effects are, whether they are economic, social, political, or individual in nature, they are all geared towards a social remodeling. The pyramid we have all become used to should be transformed into a diamond, with a large part of the population comprising the middle class instead of the poor. The goal of BOP tapping is poverty alleviation and other economic benefits, which ultimately leads to social transformation. But do our governments and private sector have the vision and motivation to bring this about? Voxiva Case Study Guide Questions 1. What is the innovation of Voxiva? Voxiva has a flexible solution that can be used by any user, regardless of technological expertise or communication device available. 2. What are the 3 ingredients of an effective system of disease surveillance and response? Early detection, urgent reaction, and a basic yet effective communications system are Voxiva's three ingredients of an effective disease surveillance and response system. 3. According to Meyer, what are his findings regarding ICT projects? First off, he finds that many of the projects are non-scalable. Secondly, he finds that many donors suffer from "dot-com fever." And lastly, the internet is viewed as the ultimate solution despite other factors like literacy and hardware costs. 4. What is Meyer's observations regarding the use of telephones worldwide? He finds that telephones are more accessible and are thus a more viable tool for the system. 5. What was the problem that Voxiva was originally designed to solve? It was originally designed to combine the usability of telephones and the internet to help people without internet access to access their system. 6. What are Alerta Pilot's benefits? a. allows for 2-way communication among users of the disease surveillance system. b. facilitates and simplifies the coordination among the different management and operation levelsw that are concerned w/ the disease surveillance. c. provides a unique DB for all users, to make a technical and specialized analysis in near-real-time or historical trend analysis. d. reduce errors in the DB since the person who enters data is the same reporter. e. permits exporting the data to DBF, excel and others. f. conforms to use any DB format w/n specialized or legacy software. 7. How can Voxiva help eradicate diseases? Voxiva piloted a system which connected approx. 204000 individuals in 2 sparsely populated districts south of Lima to the national health surveillance system: Chilca-Mala wth 15 residents per sq. km. and Canete w/ 24 inhabitants per sq. km. 8. How can Voxiva be used for bioterrorism preparedness? Early detection and communication can be the key to preparedness in case of a bioterrorist attack. 9. What are some of the lessons learned in Voxiva's deployment in other countries? a. the environment and deployable resources will dictate the type of communication device used. b. decreasing the cycle time in the date input and aggregation process to provide a near-real-time assessment of the situation in the field will likely help prevent or decrease the duration of outbreaks. c. the system increases the quality and quantity of adata available to facilitate decision making. d. the system must be cost-effective. e. the technology must be intuitive to facilitate adoption and use. f. collaboration among custoemrs, partners and users drives problem solving. g. remote locations w/ no access to the phone use the radio to contact a health post w/ a phone to report to the closest health post or clinic w/ a telephone. h. industry-wide standard best pratices must be adhered to including those associated w/ security, flexibility to inter-operate w/ other systems and versatility of input devices and exportability. 10. What are some of Voxiva's challenges? Voxiva's challenge is to become a viable business seeking public-sector funds. 11. What is Meyer's beliefs regarding diversity? What is its connection to innovation? Meyer's beliefs regarding diversity rests on scalability, where one system can be applicable in different societies. It is connected to innovation by virtue of its scalability. 12. Can this system be implemented in the Philippines? What target disease would you recommend? Yes, the target disease would be something widespread in the Philippines, such as dengue or even the common flu. Jaipur Foot Case 1. It is specially made for the actions of the poor and it only costs $30 dollars as opposed to $6000 to $8000 dollars prosthetic limbs in the United States. 2. A handmade prosthetic lower leg and limb. 3. Poor people who have lost their lower limbs. 4. There are a lot of landmines in Afghanistan and many of those who survive landmine accidents lose their lower limbs. 5. It only costs $30 while Western lower limb prosthetics can cost around $6000 to $8000 or even higher. 6. The Gait Cycle is the rhythmic alternating movements of the two lower limbs which results in a forward movement of the human body. 7. By experimenting with the development of an artificial limb using locally available natural materials. 8. The Jaipur Foot should be able to accommodate movements for squatting, sitting crossed-legged, walking on uneven ground, and walking on barefoot. 9. The constraints include: poverty of the intended market, a closed economy, limited trained manpower, and the kind of work lifestyle of the intended market. 10. The raw materials used are naturally available materials like willow, and sponge and aluminum molds, unlike in other materials that make use of expensive materials like steel, synthetic molds, and others. 11. A typical fitting would take up most of the day but only one or two fittings would be enough. In the West however, there would be a lot of fitting sessions. 12. BMVSS stands for Bhagan Mahaveer Viklang Sahayata Samiti .The Jaipur Foot conducts community outreach projects that are focused on the financial and social needs of India's poor. 13. The Jaipur Foot is more competitive because it has lower operating costs. 14. Yes, because the fitting sites are set up in a predetermined and easy-to-set-up location, called camps. 15. The cooperation with ISRO is expected to reduce the manufacturing costs of the Jaipur Foot. The cost of the Jaipur Foot would be reduced by 40% and the Foot itself would become lighter by around 350 grams. Casas Bahia 1. What is the center of Casas Bahia’s business model? The center of its business model is credit financing. 2. What is one of the most noteworthy issue that Casas Bahia faces? It faces the issue of a long-term plan of succession. 3. What important growth factor does Casas Bahia’s competition not invest in? Casas Bahia’s competition doesn’t invest heavily in technology. 4. What challenges does expansion pose for Casas Bahia? Casas Bahia needs to conduct further studies on the behavior of the new customer base, and on new distribution demands and controlling of the default level. 5. Who was the founder of Casas Bahia? Samuel Klein founded Casas Bahia. 6. What is Casas Bahia’s distinction in Brazil? It is the largest retail chain in the country. 7. How are the sales on installment basis called in the Casas Bahia business model? They are called Credit sales. 8. When was Casas Bahia founded? 1958 9. What percentage of Casas Bahia’s revenue is ploughed back into technology? 8 percent is invested in technology. 10. Where does Casas Bahia get information about the credit history of their customers? From the Service of Credit Protection 11. Why does Casas Bahia prefer to get local employees for their stores? They mainly want their employees to feel a sense of pride and ownership. Aside from this, other factors include familiarity and a lesser impact of bus and train strikes. 12. What has the company applied so as to allow them to quickly respond to unforeseen problems that may arise? They have a Unique Network Infrastructure to allow them to respond quickly to such problems. 13. How many levels or categories of economic status does Brazil have? Brazil has five levels or categories of economic status among its citizens. 14. What are the high income classes of these five? Classes A and B are the high income classes. 15. What are the low income classes of the five? Classes C, D, and E are the high income classes. 16. What role does technology have in the company? Technology enables Casas Bahia to increase productivity, lower the cost of operations, and increase client satisfaction. 17. As of 2004, what percentage of the Brazilian population belongs to the lower income classes? 84% belongs to the lower income classes of C, D, and E. 18. Where is work primarily focused in the company? To maximize their customer experience. 19. What is the number of initiatives that Casas Bahia handles? It has four initiatives. 20. On average, what are the number of contracts every month that Casas Bahia handles? It handles 800,000 contracts per month. Hindustan Lever Case 1. They made the health issue of diarrheal disease an integral part of their operations. 2. Handwashing is proven to be effective against diarrheal disease, cutting the amount of cases by 42% to 46%. 3. It is very familiar with the people being affected by the disease and it also has vast distribution networks to accommodate most of the affected population. 4. Seeing as HLL is the biggest manufacturer of soap and that handwashing cuts the amount of diarrhea cases by almost half, there is a very meaningful and profitable connection between the company and the disease. 5. Because he believes that good health can lead to long-term savings, which also equates to a higher spending budget for the people. 6. It was very well-aligned with HLL's corporate goals of improving the overall health of the population. 7. It is because Kerala has the highest access to clean water, highest knowledge of diarrhea prevention, and use of local health practices. Kerala doesn't need the World Bank funding; in fact it should be the one that should export cleanliness and hygiene practices and products. 8. As long as what I'm doing is right, I will continue what I am doing despite any opposition. 9. It decided to revisit it's mission. Yes, I do agree since it advocates new opportunities for the use of soap, especially when it comes to answering health issues. 10. Lifebuoy's cost is made to be affordable for the masses. Yes, I do agree because it makes affordable health care accessible to the masses. 11. The keys to sustained community behavioral change are education, involvement, shock, reiteration, and reward. 12. Yes, as long as partner organizations would be as willing to contribute. 13. There are three "exposure" processes, which are: Exposure 1: Initiation and information, Eposure 2: Large scale propogation, and Exposure 3: Reinforcement and preparing for sustainability 14. I think that the tactics are sufficient. Yes, I think they would work in the Philippines as long as partner organizations are also willing to contribute to the success of the tactics. 15. The demonstration basically shows that being visually clean does not necessarily equate to being safely clean. Yes, I think it was effective since it didn't require any higher level of knowledge just to understand the concept. 16. It impacted HLL with a long-term approach to answering India's health concerns. 17. Wealthier Indian populations can become advocates of cheap health care practices for poorer populations, thus making funding easier and more accessible. 18. Yes and Yes. 19. Yes. 20. Swathsya Cheetna seems to have a more effective program because they have done more research than PPP. CEMEX Case Study 1. How did CEMEX fundamentally change the way it conducted its business? - CEMEX did not only focus its business operations on their high-income customers (rich individuals and corporations) but they focus also on their low-income customers (poor families). They figured that the low revenue that they got per low-income customer would equate to a very high inflow of cash when multiplied with the size of the low-income customer base. - CEMEX also created a subsidiary that focused on transferring remittance money (money transferring system) from Mexicans working in the United States to their families in Mexico. Seeing as the remittance money is mostly used in building homes in Mexico, CEMEX provides an option to use the money to buy building materials which is sent to the family instead of money. 2. How does information systems contribute to CEMEX' competitive advantage? Information systems contribute to CEMEX in a way that it helped them make their production and distribution processes more efficient, thus reducing costs. Also, with the use of information systems, CEMEX has been able to avoid price wars by complementing it with their influence on the market. 3. What is social capital? How does CEMEX build social capital? Social capital refers to the connection within and between members of a social group (http://wikipedia.org/wiki/social_capital, accessed: November 23, 2010). Social capital can also be described as the value that these connections give businesses, both tangible and intangible. CEMEX built on both the tangible and intangible values by providing a very personal service in their rural housing program, Patrimonio Hoy. They built very personal working relationships with those involved in the program, thus making the people trust them more. 4. How are the low-income savings characteristics of Mexican society characterized? Low-income families are those that have no regular means of income and earn less than $15 a day, on the average. These families save by means of the "tanda system" where they put in money into a collective pool and they can bid for the pool or win it through lottery. This system is not very effective because it is very hard to monitor the people involved because of the large number of people involved and that a lot of the men use their money instead for drinking and gambling. 5. How are the entrepreneurial characteristics of the women in Mexican society tied to the CEMEX BOP strategy? Women in the Mexican society, they are usually the ones responsible of budgeting the money in their family that their husband earn and they are also the ones responsible for the allocation of a portion of the earnings for savings, which would be used for their children's education, housing, or some other project. 6. What did the CEMEX initial market research in Guadalajara discover? It discovered that the main problem that hindered the construction of houses was financing. Not a lot of families could afford to buy the materials needed to build a house. 7. What is the role of socios in the Patrimonio Hoy system? How important are they in the making the system successful? Socios are both the main beneficiaries and drivers of the Patrimonio Hoy System. They are the ones who pool in money every week. Three socios form one group and each group gives money which is used to purchase materials which are to be delivered at a predetermined time. Socios are the lifeblood of the system, seeing as most (if not all) of the money used in the system comes from them. 8. Why do you think it was important fo CEMEX to position itself as a complete solutions provider vs. just another product provider? It was important for CEMEX to position itself as such because their customers would now see it as a better company than its competitors based on the value-for-money that they get from their complete solutions. 9. How is the social capital of Patrimonio Hoy promoters related to economic capital? The promoters are the ones who encourage and convince other people to join the Patrimonio Hoy program. They are also the most visible members of the program. They are important because the more socios they invite, the more money it brings in to the program. Thus, they are compensated on a commission basis; they get payed in proportion to the number of socios they invite and how long they stay in the program. 10. What, in brief, is the value of Patrimonio Hoy to a) it's promoter b) its socios & partners c) its suppliers and d) its distributors? a) The program enables the promoter to earn money solely based on performance. b) Socios get to build better quality houses in a shorter amount of time. c) Suppliers benefit from the steady demand of raw materials for the construction of houses. d) Distributors also benefit from the steady demand of raw materials and thus will have a continuous demand for pfraw materials transportation. 11. What is patrimonio? Why is this important for the marketing efforts for the Patrimonio Hoy system? Patrimonio literally translates to "heritage" and in context is understood as leaving something that is immovable and of value to the next generation. In Mexican society, it is very important for the parents to leave something of value for their children to use and benefit from. Low-income families are not exempt from this and this motivates the Mexican people to join the program. 12. How can Patrimonio Hoy offer a slightly higher price than its competitors and maintain a competitive edge? The program offers a complete solution to the rural housing problem of Mexican society. Also, it promises to have a house built within a relatively faster time time and with good quality materials. This is where the trust of the customers come into play, benefiting CEMEX. 13. How does the concept of freezing prices encourage socios to do more business for Patrimonio Hoy? This ensures that prices would not go up suddenly and they will still be able to afford the ongoing construction of their homes. Having fixed prices also gives the socios peace of mind that they will be able to have their homes built in due time despite inflation and other economic factors. 14. Intuitively, doing with business with a low income group would be riskier than traditional lending models but it is profitable for Patrimonio Hoy. Why? This is because low-income groups aren't a very stable customer base. They may want to do business at present, but this isn't assured over a long period of time. Also, seeing as they have limited resources to spend, they might not want to follow through with spending money even if it is for their own benefit. 15. What is the role of peer/community pressure in the Patrimonio Hoy lending model? Mexican society generally wants to leave something of value behind for the coming generations. This means that a lot of people would want to be part of a program that would help bring this vision into reality. If it works for some people, then a lot would follow suit because of the benefits it would bring and the assurance that it will bear fruit thanks to the previous success of their neighbors. 16. How has Patrimonio Hoy changed the consumer behavior in Mexico? Low-income groups now are spending more on things that are of benefit for them, specifically housing, instead of gambling or using the money for buying alcoholic drinks. It also provides a means of income for the promoters, which gives their families added income for other expenses, like education for their children. 17. What are the challenges of the Patrimonio Hoy program? Since their customers belong to low-income groups, the program is faced with the problem of retaining the socios for a longer period of time and convincing them to build additional rooms to their houses, seeing as some of them settle for even just a one-roomed house. 18. What does Construmex take advantage of the existing remittance market between U.S.A and Mexico? There are a lot of Mexican workers in the United States that send remittances to their families every week, which amounts to a cumulative $10 Billion. 10% of this ($1 Billion) is used for building houses. This $1 Billion in remittances is what spurred the birth of Construmex. 19. CEMEX Philippines is exploring the possibility of replicating the Patrimonio Hoy system in the Philippines. What are the parallels between the Mexican and the Philippine market? There are a lot of low-income Filipino families that do not have proper homes. Also, Filipino parents also want to leave something for their children. Usually, this is in the form of education, but a home that provides security and is a symbol of family is a good complementary thing to be left behind. Filipino women are also very entrepreneurial and are generally very interactive with their neighbors in the community. 20. As an IT practitioner looking at the Construmex business model, what IT-driven systems can you propose to make CEMEX more competitive? (name 10-15) a) Supply Chain Management system b) Distribution Tracking system c) Inventory or Warehouse Management System d) Electronic Ordering System e) Customer Service and Support System f) Enterprise Resource Planning System (includes remittances from Mexican workers in the US) g) Customer Relationship Management System h) Transaction Processing System i) Decision Support System (to help CEMEX better adapt to hypothetical changes in the market) j) Management Information System (for the General Manager and Supply Manager) k) Collaboration and Knowledge Sharing Systems (wikis, intranet-/internet-based) l) Executive Support System (for CEMEX higher management make better decisions) m) Mobile Transaction Ordering n) Accounting or Finance System o) Payroll System (for promoters and office employees) What is the EFF concern regarding Free Speech? The internet is supposed to have a free and open architecture which supports absolutely no restrictions to free speech. Governments have time and again resorted to measures to enact censorship laws that restrict free speech on the internet which the EFF had and has been fighting. What is the EFF concern regarding Innovation? The EFF seeks to protect people and organizations that create new ideas and tools from established businesses that seek only to kill the new competition. What is the EFF Intellectual Property? concern regarding The EFF seeks to preserve balance in the use of trademarks and ensure that the Internet and other digital technologies are used to empower the user as a consumer, creator, innovator, scholar, and citizen. What is the EFF International issues? concern regarding The threats to online freedom are as global as the Internet. The EFF seeks to put a stop to these international threats by encouraging users to join their cause by either donating or becoming a member. What is the EFF concern regarding Privacy? The EFF seeks to extend our privacy rights into the digital world and supports the development of privacy-protecting technologies. What is the EFF concern regarding Transparency? The EFF seeks to allow the general public to more closely examine governments and corporate entities, and to hold them accountable for any deception, censorship, or corruption. What are people's concerns regarding anonymity on the Internet? Many people don't want the things they say online to be connected with their offline identities. They may be concerned about political or economic retribution, harassment, or even threats to their lives. What kind of bloggers does the EFF want on the Internet? Bloggers that are/have: 1. Journalists 2. Free speech 3. Political speech 4. Anonymous 5. Free from liability What is CyberSLAPP? A joint effort to preserve anonymity on the Internet. What is the "No Downtime for Free Speech Campaign"? It's an effort to eliminate the misuse of existing laws to curb free speech on the Internet. How does EFF benefit those who have reading disabilities? It encourages the transformation of content (copyrighted or not) into a form (ex. refreshable Braille) that is more accessible for the user. What is a Broadcast Flag? It is a technology that "flags" or marks a TV broadcast as unrecordable, thus TiVo and other content recording devices cannot function. What is the Coder's Right Project? It is an effort to protect tinkerers and hackers as they research new and more innovative developments in technologies. What is Digital Rights Management? It is a technology used by media and entertainment companies to try to protect copyrighted media from illegal use. What agency is in charge of making the rules of Net Neutrality? Can it be trusted? The Federal Communications Commission (FCC). No, because it has a history of taking the side of big corporations when it comes to public issues. What are patents designed to do? They are used to promote investment, public disclosure, and most importantly, useful innovation. What does Trusted Computing propose to resolve? It proposes to solve some of today's security problems through hardware changes to the personal computer. What will happen if the Broadcast Flag was fully implemented? Hollywood and federal bureaucrats will get a veto over innovative devices and legitimate uses of recorded programming. Is it legal to record radio programs? How so? Yes, through the fair use right that we have. Will restrictions on Digital Video use curb Internet piracy? No, it will only make ordinary users' lives harder when trying to use digital video. What does the Digital Millennium Copyright Act do instead of curbing piracy and other illegal use of digital media? It jeopardizes fair use, impedes competition and innovation, chills free expression and scientific research, and interferes with computer intrusion laws. How many people in the United States have used file sharing? Over 60 million people, which is actually greater than the number of people who voted for Obama during the Presidential elections. What effect does the DMCA have on anonymous free speech? The DMCA puts anonymous speech in jeopardy; misusing its subpoena power, copyright holders can attempt to unmask an Internet user's identity based on a mere allegation of infringement without filing an actual lawsuit or providing the user any constitutional due process. How can the patent system be improved? One approach is to advocate for good legislation in Congress and proper interpretation of that legislation by the courts. Another is to promote enforcement efforts, such as the reexamination of bogus patents. Why are Terms of Use contracts biased? They are written by the service providers themselves and users cannot negotiate the terms. What concerns does the Anti-Counterfeiting Trade Agreement raise? It raises concerns about consumers’ privacy and civil liberties, for innovation and the free flow of information on the Internet, legitimate commerce, and for developing countries’ ability to choose policy options that best suit their domestic priorities and level of economic development. What concerns does the Broadcasting Treaty raise? Not only would this hurt innovation and threaten citizens' access to information, it would change the nature of the Internet as a communication medium. What is the challenge technological development countries? concerning in poorer There is a significant knowledge gap and digital divide continue to separate the wealthy nations from the poor. What currently concerns EFF Europe? Concerns include combatting the growth of invasive European intellectual property law and policies, addressing free speech and innovation issues in Internet filtering and blocking, defending the privacy of Europeans from international threats to the rights protected by the Data Protection Directive (95/46/EC), and monitoring the effects of EU's introduction of data retention regime. What problems does the Free Trade Act of the Americas raise? It allows U.S. copyright owners' rights to trump FTAA countries' national sovereignty and domestic public policy priorities, and consumers and technology developers in FTAA countries risk losing all of their existing rights under their own national copyright laws. What is the Global Network Initiative? The Global Network Initiative is a coalition of information and communications companies, major human rights organizations, academics, investors and technology leaders to produce guidance and oversight for companies facing civil liberties challenges in the ICT industries. What is the WIPO? The World Intellectual Property Organization (WIPO) is the UN agency responsible for treaties involving copyright, patent, and trademark laws. What is the basis for anonymity on the Internet? Anonymous communications have an important place in our political and social discourse. The Supreme Court has ruled repeatedly that the right to anonymous free speech is protected by the First Amendment. What is CALEA? Communications Assistance for Law Enforcement Act (CALEA) is a law that makes it easier for law enforcement to wiretap digital networks including the Internet. Why is tracking people through their mobile phones controversial? Because the government doesn't need a warrant based on a just cause in order to legally do it. What features should digital books retain from their physical counterparts? Digital books should preserve the rich heritage of intellectual freedom, free speech, and privacy that we have with physical books today. What is the EFF doing regarding locational privacy? EFF is fighting to protect the privacy and prevent the misuse of this data that users of phones, GPS transmitters and location-based services leak to providers and to the government. Why is NSA so controversial regarding the Internet? The National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. What are some Online Behavioral Tracking technologies being used? Technologies like Adobe's "Local Shared Objects" and Microsoft's "User Data Persistence." In a federal ruling concerning Pen Traps, what must the government do before collecting information from communication done through telephone? - The government must first obtain a search warrant even if the information to be collected is dialed. What problems are posed by the Real ID system? Threats to privacy and the possibility of increased DMV fees and/or taxes. How is RFID controversial? It can help track people through RFID tags on their belongings, thus costing the person his/her privacy. How are search engines controversial? They collect lots of information about your search queries which can tell a lot about you and what you've been doing on the Internet. What is the problem regarding Search Incident to Arrest? Law enforcement officials don't need warrants to search a person's cellphone when that person is arrested. What is the main problem concerning Social Networks? The loss of privacy thanks to advertising and immediate sharing of contacts through services offered by the same company. How are Travel Screenings problematic? Customs and border officials can invasively search your laptop or cellphone even without a warrant. What are the problems regarding E-voting? Under-trained election workers, vulnerable equipment, and technicians having unsupervised control over the systems. What is the aim of the FOIA Litigation for Accountable Government (FLAG) Project? It aims to expose the government's expanding use of new technologies that invade Americans' privacy. Through Freedom of Information Act (FOIA) requests, the project helps to protect individual liberties and hold the government accountable. What are Terms of Service? These "terms" are actually purported legal contracts between the user and the online service provider (websites, MMORPGs, communication services, etc.), despite the fact that users never get a chance to negotiate their contents and can often be entirely unaware of their existence. What is the problem with some ISPs? They have been known to interfere with users' access to file sharing technologies like BitTorrent and GnuTella. Copyright, Privacy, and Anonymity 1. What is the EFF (Electronic Frontier Foundation)? -EFF is the leading civil liberties group defending your rights in the digital world. 2. Who is Lawrence Lessig? -Lawrence "Larry" Lessig (born June 3, 1961) is an American academic and political activist. He is best known as a proponent of reduced legal restrictions on copyright, trademark, and radio frequency spectrum, particularly in technology applications. 3. What is Creative Commons? -Creative Commons is a nonprofit organization that works to increase the amount of creativity (cultural, educational, and scientific content) in “the commons” — the body of work that is available to the public for free and legal sharing, use, repurposing, and remixing. 4. Who is Bruce Schneier? -Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc. He received his master's degree in computer science from the American University in Washington, DC in 1988. 5. What is the Advanced Encryption Standard? -Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. 6. What is PGP? -Pretty Good Privacy (PGP) is a computer program that provides cryptographic privacy and authentication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications. It was created by Philip Zimmermann in 1991. 7. Who is Phil Zimmerman? -Philip R. "Phil" Zimmermann Jr. (born February 12, 1954) is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption protocols, notably ZRTP and Zfone. Chapter 1: Foundations of Information Ethics Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “Moral life is a highly information‐intensive activity, and ICTs not only add interesting new dimensions to old problems, but may lead us to rethink, methodologically, the very grounds on which our ethical positions are based.” Review: The rise of information and communications technology brought with it not only new developments for the benefit of our communities, but also problems regarding morality on their application. Rapid advancements and acceptance of society in general to information technology (in the years after the 1980s, up to the present day) widened its reach to other people who otherwise would have only had access to computers in universities and research organizations. This led a lot of people to be exposed to information technology and its effects, which consequently posed a dilemma: what was right or wrong when it came to this new technology? Information ethics is part of macroethics, which basically defines ethical principles based on a large group of similar people or even a society. Information ethics came to be developed around the 1990s when developments in information and communications technology were being widely accepted in mainstream society. The problem with initial information ethics principles was that they were borrowed from other professional fields, like corporate ethics and common professional ethics, which didn’t give absolute definitions on right and wrong when it came to the new technology. What was introduced were new technologies and processes that nobody had experienced before. Not everything about IT was answered by these old ethical principles. Another problem that besieged early forms of Information ethics was that it didn’t really conform to earlier ethical theories. For example, privacy restrictions and copyright rules could be violated more easily and perpetrators could do so without being caught. Hence, the advent of Information technology in the recent decades not only spawned the great benefits that we see now, but also ethical problems that we must confront on a daily basis. Chapter 2: Milestones in the History of Information and Computer Ethics Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “He predicted that, after the war, the new information technology would dramatically change the world just as much as the Industrial Revolution had done in the nineteenth and early twentieth centuries.” What I expect to learn: I expect to learn about the big developments in the field of information and computer ethics and the situations surrounding them. Review: Information ethics, like any other ethical principle, has been shaped by people and events either intentionally or by accident. As is with most other things, information ethics is not immune to change. The changes that have been enforced were born out of necessity; people saw that the current information ethics principles were inadequate so they added new principles or changed old ones altogether. Whether intentional or not, change can never be avoided especially when concerning something that is as ever‐changing as developments in information technology. The very first proponent of information ethics was mathematician and scientist Norbert Wiener. He was working with other scientists and engineers during World War II to a new kind of anti‐aircraft cannon that could detect and take out an enemy airplane virtually instantaneously. He predicted that they were pioneering a new age that would produce never before seen technologies that would impact all of society, much like how the Industrial Revolution impacted societies in the nineteenth and twentieth centuries. He had also perceived that such a technology could be put to great use not only for good purposes, but also for evil. In a few years after World War II, Wiener published two books that talked of the new technology that he and his colleagues had developed (cybernetics) and the moral and societal issues that could be raised from the new science. These two books paved the way for information and computer ethics by laying down foundations that future ethicists and professionals would follow and mold. What I learned: The foundations of information and computer ethics. The situations surrounding the start of information and computer ethics. The possible implications brought about by the new technology developed by Wiener and his colleagues. . Integrative Questions: 1. Who laid down the foundations of information and computer ethics? 2. What was the first application of information‐cybernetics technology developed by Wiener and his colleagues? 3. What were the circumstances surrounding that development? 4. What were the implications of such a technological advancement? 5. Why was it important for Wiener to have laid down the foundations of information and computer ethics? Chapter 3: Moral Methodology Information Technology and Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “I think the way we ought to proceed in the ethics of IT is not very different from the way we ought to proceed in other departments of ethics of technology and engineering...” What I expect to learn: I expect to learn about how ethical principles are made to co‐exist with each other in IT. Review: Information and computer ethics implies something that should be applied and does not remain as just a set of theories on ethical principles. Practical ethics, like information and computer ethics, implies that the set of principles should be made applicable in real life situations. With the very fast pace of development of new technologies, the possibilities of encountering new ethical issues rises with each new advancement. Sound ethical principles in IT should also be developed as quickly as the technologies that they are based on. The use of computers and related technology, produces new ethical issues that have never been faced before. For the best part of the last 2,000 or so years, ancient Greek philosophy and ethics have been the basis for many ethical principles. Ethical principles relatively remained unchanged until the time of the French and Industrial Revolutions when many philosophers and ethicists provided new theories for the changing times. But even those changes were relatively gradual, the Industrial Revolution even stretched for more than a century. This new age of information technology however, represents a change that is unprecedented in human history. Information and computer ethics, as an ethical theory, is similar as to the ethics concerning other sciences or engineering principles. These fields also represent fields of knowledge that concern quick changes and the need for answering the issues that arise from these changes. Although IT is unique from the other fields, they are relatively the same in essence, they only differ in the type of developments they are advancing and how they develop them. What I learned: The need for philosophical coherence of ethical principles in information ethics. The similarities and differences between the ethical principles involved in IT and other fields of science and engineering. That the use of computers and related technology increases the possibility of having new ethical issues arising. Integrative Questions: 1. Why is there a need for philosophical coherence in ethical principles when it comes to information ethics? 2. What is the classification of information and computer ethics as an ethical theory? 3. What are the similarities between the ethical study of IT with that of other sciences? 4. What are the differences between the ethical study of IT with that of other sciences? 5. Why does IT need its own branch of ethics? Chapter 4: Value Sensitive Design and Information Systems Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “There is a longstanding interest in designing information and computational systems that support enduring human values.” What I expect to learn: I expect to learn about how developments in IT are used in a way that accounts for human values. Review: Value sensitive design calls for technology that is designed in a way that accounts for human values in a principled and comprehensive manner. This means that technology should not only be designed to carry out the purpose for which it was built but also take into account human values, i.e. what a person or groups of persons consider important in life. Seeing as there is a human element in value sensitive design, there are very significant differences in what people consider as valuable and those that they can live without. The variety in what people consider as valuable could produce new ethical issues that could be completely different from the one that was originally considered. I believe that the development of value sensitive design is a very innovative idea that caters not only to the technological needs of society but also its ethical needs. The rise of information technology have provided us with technology that have made doing tasks easier, faster, and at more accessible areas. But aside from these, Information technology has also brought about issues concerning piracy, privacy, copyright infringement, and many more. What value sensitive design takes into account is not only the output of technology but also by achieving such outputs in a way that is acceptable to people, i.e. it doesn’t go against things that they value. But seeing as the human factor in value sensitive design creates varying things that people consider as important, it still has a long way to go, which is why the writer in this chapter chose to describe it in so much detail so as to have other people build on the idea. What I learned: The principle of Value sensitive design. Its effect to IT when it comes to ethical issues. The implications of technology without value sensitive design to end‐users Integrative Questions: 1. What is value sensitive design? 2. How is value defined in this context? 3. Why is value sensitive design important? 4. What are the implications of the application of technology that wasn’t developed using value sensitive design? 5. Why is there no definite set of values in IT? Chapter 5: Personality-Based, RuleUtilitarian, and Lockean Justifications of Intellectual Property Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: “Care is needed so that we do not confuse moral claims with legal ones.” What I expect to learn: I expect to learn about how moral claims on intellectual property are defined using personality ethics, utilitarianism, and Lockean principles. Review: Intellectual property is generally defined as any non-physical property that is produced by the application of cognitive processes and whose value is based on an idea or in a collection of similar ideas. But our common notion of intellectual property ownership is governed by legal principles, i.e. those laws formulated by our governments, instead of those that are based on moral and ethical principles. This chapter seeks to find ethical and moral justifications on intellectual property ownership rights and any supporting ethical theories, most notably: personality ethics, utilitarianism, and Lockean ethics. Personality-based definitions of ethics defines intellectual property as an extension of the maker’s individual personality. Thus, there is a natural affinity of the maker and the product, so there is no need for legal intellectual ownership statutes. The problem with this theory is that it is not very definite on what constitutes intellectual property. For example, feelings and thoughts are part of our intellectual property due to the very loose definition. Rule-utilitarianism entails the production of many intellectual work which means that there is an optimal amount of good works produced. The problem with ruleutilitarianism in information ethics is that it can produce contradictions. Lockean principles, on the other hand, basically say that the maker of the intellectual property should control the fruits of his labor, thus justifying intellectual property ownership. The problem with Lockean principles is that it doesn’t take into account unscrupulous work, such as pirated software. Thus, the Lockean ethical principles also justify those intellectual property that is regarded as unethical. What I learned: The problems affecting the three kinds of principles when it comes to intellectual property ownership justification Integrative Questions: 1. What is intellectual property? 2. Why should moral claims on intellectual property be considered higher than legal claims? 3. What are three ethical principles that can be used to justify intellectual property ownership? 4. How do the three principles justify intellectual property ownership? 5. What are the problems encountered by the three ethical principles in justifying intellectual property ownership? Chapter 6: Informational Privacy: Concepts, Theories, and Controversies Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “… Privacy is an evolving concept and that its content is often influenced by the political and technological features of the society’s environment.” What I expect to learn: I expect to learn about the concept of privacy and some controversies surrounding it. Review: Privacy is a very common term in the English language. We are very quick to use the term regarding many things; it is not just limited to our use of the Internet or any other technology that requires access to our personal information. But the problem with this is that we do cannot easily give a definition for privacy, especially in its use in information technology. Privacy is too broad a term that we apply in a specific field. The reason why we talk of privacy very often is that we attach some value to it. As was discussed to a small extent in the previous chapter, people attach value to something which they consider important. With a wide range of people however, there is also a varying degree of value that these people attach to their privacy. Thus, this in itself can present a controversy. People value their privacy differently, thus IT solution providers have a dilemma on what kind of privacy protection feature that they should offer. What is acceptable for some people may not be for others. This begs the question: why do people value privacy in the first place? Many people believe that privacy is needed in order to have freedom. Predominantly, people who value their privacy very highly come from Western or Westernized countries or are citizens of a Democratic state. These people value their freedom very highly and they believe that protecting their privacy is needed to preserve this freedom. In contrast, people from communist societies, whose privacy is very limited thanks to an authoritative government, are not as volatile as their democratic counterparts when it comes to privacy protection. This, again, creates another controversy as to the extent of privacy protection measures. What I learned: The concept of privacy. The value that people attach to privacy. Some controversies surrounding issues on privacy. Integrative Questions: 1. What is privacy? 2. Why do people attach value to privacy? 3. Why do people have varying degrees of value to their privacy? 4. What are some controversies surrounding privacy? 5. Why is privacy considered to be an evolving concept? Chapter 7: Online Anonymity Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “Anonymity can also be brought about in a variety of ways and there are many purposes, both positive and negative....” What I expect to learn: I expect to learn about the concept of online anonymity and the ethical issues surrounding it. Review: Anonymity is one of the main reasons why the certain technologies, most notably the Internet, boomed. Being able to do virtually anything without being explicitly identified gives us a sense of freedom that we may not be able exercise if we were limited to the physical world. For example, say we have a certain college student who has his own views on a certain topic. For the sake of this example, we shall say that that certain topic is politics, specifically he has managed to get evidence concerning the corrupt practices of a high‐profile government official. Seeing as he is only your average college student, he doesn’t have the means to be able to voice out his views through readily available media, e.g. newspapers, TV, radio, etc. He could join his school newspaper, but that doesn’t assure him that he can write about his preferred topic immediately, that would depend on his editor. Also, if he did join the school paper, then that would limit his audience to his peers and mentors at school. What if he wanted a wider audience to hear him out? And couldn’t all of these methods require him to give out personal information, e.g. meet personally with TV/radio producers, if his story were to be treated seriously? This is where the Internet comes in. The said student could publish his own blog under a reputable blog site, i.e. one where he is sure that personal information will not be divulged. But even if he were required to give out personal information (e.g. name and location), he could put in false data and he would truly be untraceable. This is the presumed beauty of the Internet, where one can do almost anything (legal and illegal acts) and not be identified. But in reality, many websites actually make use of audit logs which track a person’s actions while on their website. This gives information on the type of activities this person does, which can be interpreted to the type of preferences they have, their interests, and even their age group. Google actually employs such a tactic where it gathers information about a user’s preferences so that it can provide search results that it thinks is what the user prefers. Many other technologies make use of similar tactics where activities of people are monitored and analyzed to produce a desired result. This is an issue because anonymity doesn’t only entail that one’s personal information remains unknown; one can be identified not only by name but also through what one does. This practice can have both positive and negative manifestations. As with Google, it helps their users find what they want based on their preferences, while on the extreme side, identity theft and spying could be result of such a practice. There are many sides to anonymity, and there should be answers to each instead of having just one general though inadequate policy. Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counter hacking Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “…all [hacking] are wrong because they constitute a digital trespass onto the property of another person.” Review: The concept of hacking is closely linked to that of the right to property and privacy. If we were to think of a file or a set of information as property, which is in fact true, then any person gaining unauthorized access to such is violating our right of maintaining ownership. Also, if that piece of information is supposed to be kept for the owner only, then any unauthorized access is not only an infringement on property rights but also on privacy. Although hacking is fundamentally seen as “unauthorized access”, it can also be an infringement on other rights depending on the situation. Although hacking generally connotes a negative meaning, many actually defend the practice depending on the scenario. Hacktivism, for example, is defined as the commission of an unauthorized digital intrusion for the purpose of expressing a political or moral position. It is bent upon stimulating discussion in a nonviolent way. Hacktivism generally involves changing the target organization’s website in a sometimes comical way so as to incite attention and then discussion. It is generally used to express dissatisfaction of the target’s actions, be it social injustice, over‐commercialism, and others. Some organizations sometimes answer back when they themselves are hacked. This is called active response or “counterhacking”. Counterhacking can have two forms: benign and aggressive. Benign counterhacking generally involves non‐damaging action in confronting the hackers, an example of which is tracing back the digital route of the hacking agent for the purpose of identifying the hacker involved. The aggressive form on the other hand an intended action wherein the original hacker might view the action as harmful or damaging. An example of this would be to redirect the packets of a Denial‐of ‐Service (DoS) attack to the original sender. Hacking is generally thought of as something wrong. It violates certain people’s rights and allows the hackers to access something that they are not supposed to. But can there be instances where hacking can be justifiable? This puts us in a moral tight spot. But also, when it comes to measures against hacking, we are again faced with another moral dilemma. Doesn’t counterhacking involve the violation of the hacker’s privacy and other rights? Doesn’t counterhacking generally entail the same meaning as the “an eye for an eye” system which is generally deemed to be ineffective? Hacking, it seems, is not as black and white as we originally thought. Chapter 9: Ethical Interest in Free and Open Source Software Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “…more and more software was not free – not free in a financial sense, but free in a way that allowed for its inspection, running, and modification.” Review: Software, since it was first used on a massive scale, has always been proprietary, i.e. it has been sold to serve the needs of others. Software development therefore does not only occupy an important niche in today’s information technology world but it has become a business as well. One of the reasons why software originally became proprietary was so that the developer or team of developers could make money out of what they made; which in another sense can be described as their “property.” Seeing as software is considered as someone’s property, that original developer would like to keep the knowledge of how the software works to himself, but that is the exact opposite of the free and open source software movement. The free and open source software movement seeks to combine the best aspects of two separate groups: free software and open source software. Free software is exactly what it name suggests while open source software allows other developers to make improvements on the original developer’s code to better suit it for the needs of other people. Bring both together and a big group of heads definitely is better than just one in producing effective software. Although I have nothing totally against free and open source software, I believe that certain lines need to be drawn. First off is accountability which is present in most proprietary software but only to some in free and open source. Also, one of the problems that many free and open source software face is that they aren’t always as easy to use than their proprietary counterparts. Another point is that software can be considered as the property of the original developer, thus he reserves the right to make his own modifications unless he chooses otherwise. All in all, I see nothing wrong with free and open source software; I think that it actually gives us more choices on what we can use. The ethical issues surrounding free and open source software. Chapter 10: Ethical Interest in Free and Open Source Software Amazon Reference: http://www.amazon.com/Handbook‐Information‐Computer‐Ethics/dp/0471799599 Quote: “…more and more software was not free – not free in a financial sense, but free in a way that allowed for its inspection, running, and modification.” Review: Software, since it was first used on a massive scale, has always been proprietary, i.e. it has been sold to serve the needs of others. Software development therefore does not only occupy an important niche in today’s information technology world but it has become a business as well. One of the reasons why software originally became proprietary was so that the developer or team of developers could make money out of what they made; which in another sense can be described as their “property.” Seeing as software is considered as someone’s property, that original developer would like to keep the knowledge of how the software works to himself, but that is the exact opposite of the free and open source software movement. The free and open source software movement seeks to combine the best aspects of two separate groups: free software and open source software. Free software is exactly what it name suggests while open source software allows other developers to make improvements on the original developer’s code to better suit it for the needs of other people. Bring both together and a big group of heads definitely is better than just one in producing effective software. Although I have nothing totally against free and open source software, I believe that certain lines need to be drawn. First off is accountability which is present in most proprietary software but only to some in free and open source. Also, one of the problems that many free and open source software face is that they aren’t always as easy to use than their proprietary counterparts. Another point is that software can be considered as the property of the original developer, thus he reserves the right to make his own modifications unless he chooses otherwise. All in all, I see nothing wrong with free and open source software; I think that it actually gives us more choices on what we can use.