Ear to the Ground: PDF2007

PDF Conference/UnConferenceKeeping all lines open for updates from Micah Sifry’s Personal Democracy Forum kicking off in New York today.

Lessig and Eric Schmidt / Tom Friedman already, and it’s not even noon out there. Full schedule here.

Keep live-blogging, folks — good stuff!

The Politics of Online Content

It’s often striking to note that the same rules and laws, from libel to copyright, apply online as they do in print. Until copyright laws are updated to reflect the Internet’s spirit of sharing, everything that is posted online is copyrighted by default. In backwards fashion, one must be *proactive* to indicate that sharing/lifting/reprinting of content, videos and photos is acceptable and *not* all rights are reserved.

The attitude of many publishers towards the Web, no thanks to Google/YouTube, is — “if it’s not fair use, what, are we gonna get sued?” And when a takedown notice comes through, the image, video, or other content is removed and usually the conflict is resolved. In other instances, however, a photographer is completely entitled to send a bill to a for-profit publication or organization that uses a photo or video without the creators permission. In the old days of print, I believe they called it “plagiarism.”

There are exceptions, of course. When user-generated content (UGC) is submitted through a module or service that requires agreeing to terms (i.e. checking a box without realizing what exactly you’re doing), the original producer of the content typically often signs off their rights completely on a non-exclusive basis.

In the case of Jamal Albarghouti’s infamous cellphone video of the Virginia Tech shootings, CNN contacted Albarghouti minutes after his submission was received to negotiate exclusive rights (for an undisclosed sum. Surely the creator was aware of the key terms and the key opening clause — submitting content meant no payment from CNN or its affiliates in exchange, automatically, for “a non-exclusive, perpetual, worldwide license to edit, telecast, rerun, reproduce, use, syndicate, license, print, sublicense, distribute…” (emphasis mine). Yahoo!/Reuters YouWitness News has similar terms, as do other sites, although to see a YouTube “exclusive” on CNN would probably be a first. In other words, no other UGC provider likely had the breadth of worldwide video distribution outlets (and cash) as did CNN (a Time-Warner company).

I wonder if any outlet has ever “bluffed” a claim of exclusive rights to user-generated content and/or how competitors could confirm the nature of their exclusive arrangement, but then again, the distortion of the term “exclusive” (not to mention “breaking news”) throughout the media is for another blog post / conference.

How do you know what you can post and what *might* get you in trouble? I use a Creative commons license or badge to indicate content that I’m happy to share for non-commercial use with proper attribution. In other instances, I’ll gladly accept cash or PayPal. NowPublic, AP’s UGC partner, was friendly enough to send me a message via flickr asking permission to use CC-licensed photos of mine on a couple occasions. Is a CC license legit? Well, your work is copyrighted whether or not you ever file or register a copyright and — after only 5 years of operation, there are over 140 million pages with CC licenses. Where can you find CC-licensed content? They’ve got a search tool.

* C-SPAN’s CC-style license.
* BBC’s Creative Archive Licence Group.
* Poynter’s David Shedden’s guide to copyright & fair use.

Originally posted in the Digital Political Communication class blog on April 20, 2007

Blogging for Knight Center on Politics 2.0

I’m blogging for the rest of the week for the Knight Foundation from their Politics & Cyberspace conference. It’s been excellent so far, all of the posts are here — my post on the keynote is copied below. On the right, John Amato of CrooksandLiars with James Joyner of Outside the Beltway.

———–

“You know how they say we only use 10 percent of our brains? I think we only use 10 percent of our hearts.” — Owen Wilson in Wedding Crashers.

Campaigns are only using 10 percent of the Internet, said political scientist Michael Cornfield, former director of research for the GW & Pew-backed Democracy Online Project (now VP of ElectionMall), in his opening keynote, “Politics and the Internet: What Do We Really Know?”

The public and in some ways the press are now trained to expect the marriage of Web 2.0 and politics to produce breakthrough discoveries or disseminate ill-conceived media that can make or break political campaigns. But as Cornfield stressed, George Allen’s 2006 “macaca” moment was simply the nadir of an already disintegrating campaign.

“Tech innovation brought into the marketplace is not significant on its own,” said Cornfield. While 2006 was YouTube’s year, it didn’t make or break these races, the campaigns and candidates did. Similarly, the first televised presidential debate — Nixon v. JFK in 1960 — did not necessarily produce a sudden sea change in which voters went purely on looks as much as the candidates themselves reacted to their performances.

Television remains the mass medium of choice among Americans, although the Internet is gaining in popularity, especially among the younger set. But it was not an Internet campaign that definitively changed the tone of the media and in turn the momentum of the 2004 election. The Swift Boat Veterans for Truth was a donor-funded political group that, in the final weeks of the campaign, created TV and radio ads disparaging John F. Kerry’s Vietnam service and spread rumors — most of which, if not all, have only been verified as false — insinuating that, among other things, he acted unethically on the battlefield during the incident for which he was awarded a purple star.

Who exactly were the donors and private interests behind the Swift Boat Fund and how long had they been planning it?

Cornfield could not have possibly overstated the importance of micro-analysis of campaign usage of media and new tech and of profiling big donors and supporters. As the public’s use and comfort level with the Internet as a socially and politically reverent medium continues to grow, so will the number — and the power — of individual campaign donors. Thanks to the resources made available by the FEC and OpenSecrets, major donors can be identified and their campaign contributions, monetary and otherwise can often be tracked. Cornfield recommended journalists band together and create forums in which they listen to — and interview — groups of donors. It would be interesting to see how this could be effective on both sides of the political aisle — we’ll see if any donor profiles come out of large-scale events like YearlyKos in Chicago in August or even the GOP debate May 3rd at the Reagan Library.

McCain and Giuliani may have been early frontrunners to be the GOP candidate, but, now, where did all of Romney’s millions come from?

The general public will continue to dissect the candidates, their histories and intentions, but who will follow the money to the source? Are campaign donors the new kingmakers as Cornfield suggests?

The White House and Illegal E-mail

I just read a flurry of accounts describing the many ways the Bush Administration has repeatedly violated the Presidential Records Act.

There’s an excellent segment explaining why this act requires White House officials to communicate via their official e-mail addresses and how much of the activity behind the Gonzales / AG firings scandal took place on RNC servers, where the data transmitted could be encrypted, deleted, and stay out of the public eye. You can click here and listen to the segement on this from this weekend’s On the Media:

Additionally, we now know that the White House has added five years of delay into the process of releasing presidential records (since 2001) if for nothing else than to cover their asses.

Further investigation of this issue points to conspiratorial — but heavily documented — accusations that Karl Rove is the kingpin of covert (and illegal) e-mail communications in concert with a Republicans-trusted server farm based in Tennessee.

UPDATE: Coptix is now taking credit for manufacturing the digitally altered photo referred to below.

This post at CorrenteWire explains best how a recent photo of Rove with a Coptix folder unravels into a long paper trail of activity involving the nameserver gwb43.com and Rove (he privatized his e-mail there). This method helps him, and other White House staffers, like his ex-assistant Susan Ralston, feel confident that they will not be held liable as they can destroy any evidence that might lead to a subpoena. But, alas, might the circumvention of white house communication policies alone be enough to serve a subpoena. Furthermore, the same company, Coptix, also SmartTech, is said to have been involved with filtering election results through their servers.

OK, now — I know it’s April Fool’s Day and this sounds incredibly tin-foiled-hatty as I’ve tried to relay it, but listen to the short radio piece and read the Corrente piece (and comments)…. Of course, this isn’t the first (or last) time BushCo will be caught breaking laws, but…

Finally, in another careless and potentially fatal blow (the Department of Homeland Security seems to be able to do whatever it wants):

“At an ICANN meeting in Lisbon, the US Department of Homeland Security made it clear that it has requested the master key for the DNS root zone. The key will play an important role in the new DNSSec security extension, because it will make spoofing IP-addresses impossible. By forcing the IANA to hand out a copy of the master key, the US government will be the only institution that is able to spoof IP addresses and be able to break into computers connected to the Internet without much effort. There’s a further complication, of course, because even ‘if the IANA retains the key … the US government still reserves the right to oversee ICANN/IANA. If the keys are then handed over to ICANN/IANA, there would be even less of an incentive [for the U.S.] to give up this role as a monitor. As a result, the DHS’s demands will probably only heat up the debate about US dominance of the control of Internet resources.'”

read the article DHS Wants Master Key for DNS (via slashdot).