Bad Ideas
Broadcast Technology
Computer Technology
Science & Technology
Space, Astronomy, NASA
The Internet: Technology of Freedom
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

The Internet: Technology of Freedom

After a short period during the mid-nineties, the "short summer of the Internet", with its utopian promises, rising commercialism and radical cybercultures, a massification of the Net set in. The period of dotcom.mania is one of hyper growth with users turned into click rates generating "eyeballs". Open, decentralized "citizen" networks are of no use anymore in this environment. Potential customers are only interesting because of their market profile.

10 Commandments of Website Accessibility by Chris P. Bohn
 Helpful tips and suggestions to web designers.
A CNN Debate with Senator Exon by Senator Exon & Marc Rotenberg
 A transcript of the debate on CNN between Senator Exon & Marc Rotenberg, director of the Electronic Privacy Information Center in Washington.
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy by Dorothy E. Denning
 Government and non-government actors alike used the Net to disseminate information, spread propaganda, demonize opponents, and solicit support for their positions. Hackers used it to voice their objections to both Yugoslav and NATO aggression by disrupting service on government computers and taking over their Web sites.
Blocking Unwanted Ads From Websites by White Taipan
 Are you tired of going to your favorite websites only to see banners at the top, and boxes on the sides? Tired of seeing those ads flashing their bright colors and moving objects? This is most likely the easiest way to rid yourself of these nuisances. The best part is you don't need to download anything.
Bypass Internet Censorship by Freerk
 Getting around filters and blocked ports.
Censorship in a Box: Why Blocking Software is Wrong by ACLU
 Like any technology, blocking software can be used for constructive or destructive purposes. In the hands of parents and others who voluntarily use it, it is a tool that can be somewhat useful in blocking access to some inappropriate material online. But in the hands of government, blocking software is nothing more than censorship in a box.
China and the Internet: A Chronicle of Repression
 Arrests, banned sites, threats against operators, censorship of newsgroups and the shutting-down of cybercaf?s are many techniques used in this daily repression. To accomplish this goal, about twenty provinces now have special police brigades trained in pursuing "subversive" Internet users.
Civil Liberties In Cyberspace by Mitchell Kapor
 Our society has made a commitment to openness and to free communication. But if our legal and social institutions fail to adapt to new technology, basic access to the global electronic media could be seen as a privilege, granted to those who play by the strictest rules, rather than as a right held by anyone who needs to communicate.
Closed Networks in an Open Society by Geert Lovink
 After a short period during the mid-nineties, the "short summer of the Internet", with its utopian promises, rising commercialism and radical cybercultures, a massification of the Net set in. The period of dotcom.mania is one of hyper growth with users turned into click rates generating "eyeballs". Open, decentralized "citizen" networks are of no use anymore in this environment. Potential customers are only interesting because of their market profile.
Closing the Net by Greg Costikyan
 The arrest of Neidorf and Riggs was only the beginning. The Secret Service, which has authority over crimes involving government computers, had embarked on a vast, nationwide investigation of hacker activity: Operation Sun Devil.
Company E-mail Policy by David R. Johnson and John Podesta
 Formulating A Company Policy on Access to and Use and Disclosure of Electronic Mail on Company Computer Systems.
Comprehensive Guide to Noobs by olliemaster13
 A guide to all things about noobs/n00bs.
Congressional Testimony of Emmanuel Goldstein
 Edward J. Markey (D-MA) and Jack Fields (R-TX) launched into a tirade against the evils of computer hackers and generally demonstrated their ignorance on the subject and their unwillingness to listen to anything that didn't match their predetermined conclusions. Those conclusions are basically that 2600 Magazine is a manual for criminals and that hackers are a blight on civilization.
Copyright and Globalization in the Age of Computer Networks by Richard Stallman
 The Soviet Union treated it as very important. There this unauthorized copying and re-distribution was known as Samizdat and to stamp it out, they developed a series of methods: First, guards watching every piece of copying equipment to check what people were copying to prevent forbidden copying. Second, harsh punishments for anyone caught doing forbidden copying. Third, soliciting informers, asking everyone to rat on their neighbors and co-workers to the information police.
Crime and Puzzlement by John Perry Barlow
 Is transmission through an otherwise unused data channel really theft? Is the track-less passage of a mind through TRW's mainframe the same as the passage of a pickup through my Back 40? What is a place if Cyberspace is everywhere? What are data and what is free speech? How does one treat property which has no physical form and can be infinitely reproduced?
Cyberocracy is Coming by David Ronfeldt
 Optimism about the information revolution should be tempered by a constant, anticipatory awareness of its potential dark side...
Cyberpunk Manifesto by Gareth Branwyn
 The future has imploded onto the present. There was no nuclear Armageddon. There's too much Real Estate to lose. The new battlefield is people's minds.
Cyberpunks by Dr. Timothy Leary
 The opening moments of the movie WARGAMES provide a classic example of Cypberpunk warning. It is a foggy night. A jeep carries a captain and a lieutenant up a winding Colorado mountain road to secret nuclear-missile launching silos. The captain tells the lieutenant that he and his wife planted a cultivated grade of marijuana seeds in their garden, and, to ensure their growth, invoked the Tibetan Buddhist prayer for enlightenment...
Drug Use and The Internet by U.S. Department of Justice
 Advocates of an expanded freedom of expression are purveyors of information with yet another agenda. These individuals and groups publish information on the Internet to push the boundaries of self-expression and the First Amendment. The information they provide may induce minors and young adults to break drug laws or to become a danger to themselves or to others by abusing illegal drugs.
E-mail by Norman A. Rubin
 Some of the erotic material one receives in the E-mail as advertisements.
Economic FAQ about the Internet from 1994 by Jeffrey K. MacKie-Mason and Hal Varian
 This is a set of Frequently Asked Questions (and answers) about the economic, institutional, and technological structure of the Internet. We describe the current state of the Internet, discuss some of the pressing economic and regulatory problems, and speculate about future developments.
Electronic Fascism by William F. Jasper
 For all it's disingenuous bows to the "market" and "private sector initiative," the Clinton Administration is determined to dictate the development of the exciting new frontier of interactive, multimedia communications. It doesn't trust consumers and producers to work out solutions to the challenges presented by the new technologies.
Fahrenheit 451.2: Is Cyberspace Burning? by ACLU
 How rating and blocking proposals may torch free speech on the Internet.
Freedom Or Copyright? by Richard Stallman
 Computers can be powerful tools of domination when a few people control what other people's computers do. The publishers realized that by forcing people to use specially designated software to read e-books, they can gain unprecedented power: they can compel readers to pay, and identify themselves, every time they read a book!
From Crossbows to Cryptography: Thwarting the State via Technology by Chuck Hammill
 Technology represents one of the most promising avenues available for re-capturing our freedoms from those who have stolen them. By its very nature, it favors the bright over the dull. It favors the adaptable over the sluggish. And what two better words are there to describe government bureaucracy than "dull" and "sluggish"?
Getting Porn on Linspire Without A Trace by LINPIRE CNR WHIZ
 Using Linspire CNR gave me an advantage of one-click downloads. But, I discovered it could give me more...
Google Syntax by Satatik
 Explaining how www.google.com 's syntax commands work.
Heroic AOL CD Destruction Guide by Spirit Hero
 Remember...Everytime you destroy an AOL CD another person somewhere is saved from the evilness that is America Online. But how you destroy them is a different method... In my guide you'll learn ways that make it less a chore...And more fun.
Hiding Crimes in Cyberspace by Dorothy E. Denning and William E. Baugh, Jr.
 We address here the use of encryption and other information technologies to hide criminal activities. We first examine encryption and the options available to law enforcement for dealing with it. Next we discuss a variety of other tools for concealing information: passwords, digital compression, steganography, remote storage, and audit disabling. Finally we discuss tools for hiding crimes through anonymity: anonymous remailers, anonymous digital cash, computer penetration and looping, cellular phone cloning, and cellular phone cards.
Howard Bloom's Big Bang Tango Media Lab by unknown
 The Big Bang Tango Media Lab's first step is an animation that tells the tale of the cosmos' history from the first instant of the big bang to the emotions in your brain as you read this page. The group's next task is to tackle bit by bit the expression of a Grand Unified Theory of Everything In the Universe Including the Human Soul.
ICML Prologue by IC Metadata Sub-Working Group
 The IC Metadata Sub-Working Group (MSWG) has developed the Intelligence Community Markup Language (ICML) as part of the ICCIO Executive Council and Working Group commitment to IC inter-organization interoperability. ICML is based on a number of data modeling activities that have occurred in the IC over the last ten years, all of which have been used in one way or another to develop ICML.
If They Knew What You Know by Peter J. Celano
 Here on the internet, we enjoy what is probably the freest speech in history. We are not just free from censorship - we are free of the constraints of time, distance, borders, politics, ideology, philosophy and religion. We are even free of the monetary burden of mass communication and publication!
It's the Context, Stupid by Paul Saffo (1994)
Legal and Ethical Considerations for Dealing with Electronic Files by Harvey A. Silverglate and Thomas C. Viles
 This small sampling of cases demonstrates the unequivocal determination of the government to conduct investigative seizures of entire computer systems, even when only a few files may be relevant to an investigation or prosecution. Such seizures can have immediate and catastrophic effects on computer users who have no connection to the conduct being investigated.
Media Conglomerate Threatens Suit Against Gamer Community by EFF
 On behalf of its Blizzard Entertainment division, Vivendi sent a "cease and desist" letter to Internet Gateway Inc., the Internet Service Provider (ISP) host of a free software project called "bnetd" that emulates Blizzard's Battle.net gaming service. Blizzard game purchasers can meet online or on a local area network to chat, find competition, and start multiplayer games using the bnetd software.
Microsoft: It's Even Worse than You Think by Tom Paine
 If I told you that there was a web site that advocates the cloning of human beings, calls the 10 commandments "1st century rules is a 21st century world," and portrays Adolph Hitler as a loveable cartoon character, you probably wouldn't be surprised. After all, the Web is an equal opportunity medium and even the twisted are allowed their opportunity for free expression.
Old Freedoms and New Technologies: The Evolution of Community Networking by Jay Weston
 The Internet is less about information or content, and more about relations. For the mass media, it is always just the opposite. The mass media are almost pure content that insulates the few content producers or information providers from their audiences.
Our Underground World: Hackers United by Atomic
 An article which states the truth about hackers. But we must remember, is there a truth? Or is everything one giant lie? This is the opinion of a fellow hacker.
Sabotage in Cyberspace: The Coming Electronic Pearl Harbor by Mark Ward
 The threat to national security from computer "terrorists" is vastly overblown. Most hackers are after nothing more than an intellectual thrill.
Testimony of Mark M. Ishikawa CEO BayTSP.com
 Adult webmasters often risk obscenity prosecution in those areas that have more restrictivelocal standards. BayTSP.com has developed a product to address this very issue. 2257 FilterSM allows webmasters to make specific files available based on the geographic location ofthe user. Webmasters who utilize this "electronic stop light" that has been embedded in online graphic, video, text, and audio files can automatically filter out "obscene" material, as defined by the user's local community standards, and have this material replaced by content that is more acceptable.
The Case for Public Subsidy of the Internet by Sandra Schickele
 A particular good, such as the Internet, can only be efficiently produced through the free market, according to the theory of price, if the good's production and consumption meet the first nine conditions listed below. If the production or consumption of the good does not meet these conditions the good cannot be efficiently produced through a free unregulated market.
The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier by Laurence H. Tribe
 My topic is how to "map" the text and structure of our Constitution onto the texture and topology of "cyberspace". That's the term coined by cyberpunk novelist William Gibson, which many now use to describe the "place" -- a place without physical walls or even physical dimensions.
The Digital Revolution by John Sculley
 John Sculley's speech on The Digital Revolution at the 1992 Seybold Conference.
The Electronic Discourse of the Computer Underground by Dr. Steven Mizrach
 From an emic perspective, many of our subjects do not distinguish between "real" life and "virtual" life. As good ethnographers and participant observers, we should not make such seemingly "etic" distinctions, in the face of our informants. If they spend more of their waking time in cyberspace than in "real life," who is doing the more honest ethnography?
The Feminization of Cyberspace by Doctress Neutopia
 During the final year of my doctoral work I discovered the new world of Cyberspace. Having been involved in utopian thought for more than fifteen years, inventing my own utopia from the ideas of such futurists and architects as Charlotte Perkins Gilman, Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc, which I call Neutopia, I find the world of virtual reality is the perfect place for my Neutopian imagination be to born into reality. The central nervous system of Neutopia is the evolving Global Brain which we are now seeing come about through information technologies and the world of Cyberspace.
The International Legal Implications of Information Warfare by Richard W. Aldrich
 One initial hurdle posed by the breadth and uniqueness of certain aspects of information warfare is the question of what constitutes an armed attack in the information age? The answer is less than clear, but appears to revolve around the threat the action poses to a government's authority over its people.
The Internet & the Anti- Net by Nick Arnett
The Shocking Truth About Digital Signatures and Internet Commerce by Jane K. Winn
 It has been an article of faith for several years now among many observers that digital signatures will be the "next big thing" for Internet commerce. That unrealized potential is consistently mistaken for actual use in the marketplace, however, leading to countless wildly inaccurate journalistic accounts of digital signatures as the "most popular" or "most important" system for Internet contract formation.
The Social Organization of the Computer Underground by Gordon R. Meyer
 This paper examines the social organization of the "computer underground" (CU). The CU is composed of actors in three roles, "computer hackers," "phone phreaks," and "software pirates." These roles have frequently been ignored or confused in media and other accounts of CU activity. By utilizing a data set culled from CU channels of communication this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships.
Why Software Should Not Have Owners by Richard Stallman
 Owners often describe the current state of the law, and the harsh penalties they can threaten us with. Implicit in this approach is the suggestion that today's law reflects an unquestionable view of morality---yet at the same time, we are urged to regard these penalties as facts of nature that can't be blamed on anyone.
Why Your 'Movable Type' Blog Must Die by James A C Joyce
 In the past, blogging was an interesting pastime. Now, with the advent of the ridiculously popular weblog package Movable Type, the Web is in risk of drowning under a tidal wave of morons who throttle search engines with writing that has no purpose and such PageRank-destroying features as "TrackBack".
This page Copyright © 1997-2006 totse.com.

totse.com certificate signatures
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Four dead babies found in home
Paris Hilton Loses Inheritance
Pedophile dressed like a wizard!
Best field trip ever?
Weed + driving
Sheepish farmer finally snaps....
Another Sigma Test
Anonymous Replies to Fox (Epic Vid)
Sponsored Links
Ads presented by the
AdBrite Ad Network