Re: Hack License

2005-02-11 Thread Jeff . Hodges
Stephen Dunifer - Pirate of the airwaves takes crusade to television
Rick DelVecchio, Chronicle Staff Writer
Friday, February 11, 2005

http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2005/02/11/PNG66B7CP81.DTL

Visit the TV section of a consumer electronics store, and then check out 
Stephen Dunifer's electronics workshop. You'll see radically different visions 
of what it means to live in a wired world.

The store is the place to go if you want a better picture. Dunifer is the man 
to see if you want to control the picture.

The tinkering rebel behind Free Radio Berkeley and the local godfather of the 
idea that broadcasting is a free-speech right instead of something the 
authorities give permission to do, Dunifer is offering a course this weekend 
on how to build your own low-power TV station.

A simple station is easy to set up and costs only a few hundred dollars, said 
Dunifer, who is internationally known for his support of locally owned, 
low-power FM radio as a counterforce to corporate owners' control of the major 
airwaves.

Because of the actions of Dunifer and others in persuading the Federal 
Communications Commission to open up the nation's airwaves a crack, hundreds 
of noncommercial, low-power FM stations have gone on the air since 2000. But 
few of them are under local control, most carry religious programming and 
hardly any operate in a big city. Much more work needs to be done before media 
power is broadly democratized, said Dunifer, 53. Low-power TV is the latest 
thrust in the campaign, which Dunifer sees as global and revolutionary.

"Our whole approach to this is electronic civil disobedience on a mass level," 
he said. "They gave us a few crumbs off the table. I'm tired of battling for a 
few crumbs. I want the whole pie, or cake."

Under a 1998 federal court order that shut down his Free Radio Berkeley as an 
unlicensed FM station, Dunifer is in no position to resume broadcasting on his 
own. But there's nothing to stop him from offering training and equipment to 
other electronics do-it-yourselfers. Free Radio Berkeley may have been 
silenced as a pirate station, but it's more visible than ever as a pirate flag.

That pirate radio flourishes in spite of the threat of legal sanctions has 
much to do with the availability of low-cost, homemade and inconspicuous 
equipment. Dunifer's TV setup extends the strategy. The heart of it is a $140 
Mitsubishi modulator that Dunifer recently discovered works for TV as well as 
for FM.

With a $150 amplifier and a $75 antenna, both made in Dunifer's workshop in 
West Oakland, and a DVD player or camera, one has all the gear needed to 
distribute television programming.

Of course, that's the easy part.

Finding a frequency that doesn't bump up against other signals and make 
licensed broadcasters and the FCC mad remains a barrier. In urban areas where 
the airwaves are packed, the barrier would appear to be all but impenetrable.

But one Dunifer devotee who runs a pirate TV station in San Francisco said the 
benefits are worth the risks. The broadcaster, a 23-year-old Web designer who 
gave his name as "Monkey," said he isn't bothered by the 160 warning letters 
he has received over the years from the FCC or by the possibility of 
interfering with other broadcasters.

Monkey ignores the letters, reasoning that although he may have his equipment 
seized, it's unlikely he'd be prosecuted for broadcasting illegally. At the 
same time, he works hard to stay out of the way of other broadcasters by 
controlling his signal so it doesn't drift.

Monkey said five volunteers run the TV station, which he said broadcasts from 
"a little island in the middle of the bay." Branching off from Pirate Cat 
radio, which broadcasts on 87.9 FM, the station airs talk and public affairs 
programming, and its signal travels as far the I-5/I-580 interchange between 
Tracy and Manteca. On Jan. 20, it covered the San Francisco protest against 
the inauguration of President Bush, airing speeches by using cell phones in 
place of microphones.

Monkey said the pirate broadcasting movement is in its third generation, with 
Dunifer as the grandfather. "He's taught hundreds of people how to build 
transmitters," he said.

Inside Dunifer's workshop recently, two young men soldered transmitters for 
different radio stations. One of the two, Tom Belote, 23, of San Jose, said he 
planned to go on the air with Radio Libre, offering a mix of music and talk.

Two underground FM stations operate in the East Bay, three in San Jose and 
three in San Francisco, with one more under development in each area, said 
Jack Brink, Dunifer's chief of television development.

Brink, 35, whose day job is waiting tables in San Jose, said he is working on 
a low-power TV station that will go on the air this month on Channel 23. It 
will broadcast politically oriented programming from a transmitter in the 
North Berkeley hills.

An air of prudent mystery surrounds the venture.

"Jack is not setting

Re: Hack License

2005-02-10 Thread Steve Thompson
--- "R.A. Hettinga" <[EMAIL PROTECTED]> quoted: 
><http://www.technologyreview.com/articles/05/03/issue/review_hack.asp?p=0>
> 
> Hack License
> By Simson Garfinkel March 2005
[snip]
>
> Stallman wrote in 1985, "the golden rule requires that if I like a
> program
> I must share it with other people who like it." Stallman continues,
> "Software sellers want to divide the users and conquer them, making each
> user agree not to share with others. I refuse to break solidarity with
> other users in this way. I cannot in good conscience sign a
> nondisclosure
> agreement or a software license agreement."
[snip]

Interestingly enough, Stallman expects people to use one of the GNU
software licenses when they release a product.  Big deal.  Ideology and 
people change.  Today the significance of the open source 'movement' being
in conflict with the 'vectorialists', or rather the commercial and
proprietary software community is that the polarization of the industry is
limited to two poles:  commercial, for-pay software or free open-source
software.  Alternatives, or hybrid licensing agreements are generally
unknown to the computing public at large. 

Thus the software industry largely resembles the basic structure of the
United States federal political system.  Republican, or democrat : open
source, or commercial software.

Code that I have that is waiting for completion and formal release (some
of it has been stolen and distributed in advance of its completion) I
intend presently to license under a hybrid license that essentialy grants
unrestricted use for non-commercial and non-military purposes, but which
requires a license agreement for any commercial use.  

My thinking was that under the existing arrangement, commercial vendors
largely benefited from the efforts of many thousands of open-source
developers, thus reducing R&D costs, without necessarily returning
anything either to the community, or to the developers themselves. 
Furthermore, unless one is a high-profile open-source developer it is next
to impossible to make a living writing code that is given away to free to
all takers.  Of this last problem, it may become moot one day if the world
economy moves away from the use of money as an intermediate medium of
value exchange, but today it is necessary to have money so the developer
can pay his rent and buy food and purchase computer hardware tools.  Of
the former problem, some few vendors have recently exposed their
proprietary software to the open source community.  Sun Microsystems has
recently put their operating system on the table; the NSA released SE
Linux, and of course many smaller examples abound.

There are other considerations that remain largely unaddressed by the
present status quo, however, and I wanted to address some of them.  For
instance, I wanted to stop my software from being used by a military force
in the process of developing proprietary (and presumably classified)
weapons of mass destruction or weapons designed to be used against
[domestic] civilian populations.  Of course, I wouldn't also want my
software to be used by terrorists such as the Ted Kaczinski's of the
world.  As an individual developer, I didn't realistically expect that I
would actually halt the unlicensed use of my software for, say, illegal
purposes, but I did expect to force such people and organisations to
actually have to _steal_ the software rather than handing to them on a
sliver platter, with my tacit blessing.  While the existing judicial and
legislative environment doesn't seem to be friendly to the idea of people
taking responsibility for the purposes that their creations are put to, I
think that software professionals should put some thought to the moral
dimension of the application of their products.

The concept of "know your customer" exists today, however badly it is
deployed by extant legislation.  I believe it may be done well by
intelligent people, and surely it can also be abused.  A group of Klansmen
might release software that contained a licensing agreement restricting
its [free] use to aryans.  I think Tim might say that they should be free
to do so, because "coloured" people as well as concerned caucasions would
have the ability and right to produce nominally equivalent software to
compete with the Klansman's code.  However this view relies on the
minimalist view of government regulation, a point of view that is not much
in favour today.

Whatever the particulars of any given scenario, the point remains that the
two-pole system that dominates the software community has some rather
large holes. 

I expect that one day I will be able to afford to replace the computer(s)
that were stolen by the local "authorities", despite their ongoing and
malicious interference and harassment.  Then, I may end up finishing off a
few things for release;

Hack License

2005-02-09 Thread R.A. Hettinga
<http://www.technologyreview.com/articles/05/03/issue/review_hack.asp?p=0>

Technology Review



TechnologyReview.com
Print

Hack License
By Simson Garfinkel March 2005



As cultural critic and New School University professor McKenzie Wark sees
things, today's battles over copyrights, trademarks, and patents are simply
the next phase in the age-old battle between the productive classes and the
ruling classes that strive to turn those producers into subjects. But
whereas Marx and Engels saw the battle of capitalist society as being
between two social classes-the proletariat and the bourgeoisie-Wark sees
one between two newly emergent classes: the hackers and a new group that
Wark has added to the lexicon of the academy: the "vectoralist class."


Wark's opus A Hacker Manifesto brings together England's Enclosure
Movement, Das Kapital, and the corporate ownership of information-a process
that Duke University law professor James Boyle called "the Second Enclosure
Movement"-to create a unified theory of domination, struggle, and freedom.
Hacking is not a product of the computer age, writes Wark, but an ancient
rite in which abstractions are created and information is transformed. The
very creation of private property was a hack, he argues-a legal hack-and
like many other hacks, once this abstraction was created, it was taken over
by the ruling class and used as a tool of subjugation.

So who are these vectoralists? They are the people who control the vectors
by which information flows throughout our society. Information wants to be
free, Wark writes, quoting (without attribution) one of the best-known
hacker aphorisms. But by blocking the free vectors and charging for use of
the others, vectoralists extract value from practically every human
endeavor.

 There is no denying that vectoralist organizations exist: by charging for
the distribution of newspapers or Web pages, such organizations collect
money whenever we inform ourselves. By charging for the distribution of
music, they collect money off the expression of human culture. 

 Yes, today many Web pages and songs can be accessed over the Internet for
free. But others cannot be. The essence of the successful vectoralist,
writes Wark, is in this person's ability to rework laws and technology so
that some vectors can flourish while other vectors-the free ones-are
systematically eliminated.

But does Wark have it right? By calling his little red book A Hacker
Manifesto, Wark hopes to remind us of Marx and Mao. Does this concept of
"vector" have what it takes to start a social movement? Are we on the cusp
of a Hacker Rebellion?

The Communists of the 1840s had more or less settled on the ground rules of
their ideology-the communal ownership of property and social payments based
on need-by the time Marx and Engels wrote their infamous tract. By
contrast, many individuals who identify themselves as hackers today are
sure to find Wark's description circumscribed and incomplete. 

 When I was an undergraduate at MIT in the 1980s, hackers were first and
foremost people who perpetrated stunts. It was a group of hackers that
managed to bury a self-inflating weather balloon near the 50-yard line at
the 1982 Harvard-Yale game; two years later, Caltech hackers took over the
electronic scoreboard at the Rose Bowl and displayed their own messages.
(Another group had hacked the Rose Bowl 21 years before, rewriting the
instructions left on 2,232 stadium seats so that Washington fans raising
flip-cards for their half-time show unknowingly spelled out "Caltech.")

Hackers were also spelunkers of MIT's tunnels, basements, and heating and
ventilation systems. These hackers could pick locks, scale walls, and
practically climb up moonbeams to reach the roofs of the Institute's
tallest buildings.

By the late 1980s, the media had seized on the word hacker-not to describe
a prankster, but as a person who breaks into computers and takes joyrides
on electronics networks. These hackers cracked computer systems, changed
school grades, and transferred millions of dollars out of bank accounts
before getting caught by the feds and sent to the pen.

 Finally, there were the kind of hackers  MIT professor Joseph Weizenbaum
had previously called "compulsive programmers." These gods of software saw
the H-word as their badge of honor. Incensed by the hacker stereotype
portrayed in the media, these geeky mathlings and compiler-types fought
back against this pejorative use of their word-going so far as to write in
The New Hacker's Dictionary that the use of "hacker" to describe "malicious
meddler" had been "deprecated" (hacker lingo meaning "made obsolete"). I
remember interviewing one of these computer scientists in 1989 for the
Christian Science Monitor: the researcher threatened to terminate the
interview if I used the word "hacker" to describe