<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=192.54.222.3</id>
	<title>Noisebridge - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=192.54.222.3"/>
	<link rel="alternate" type="text/html" href="https://wiki.extremist.software/wiki/Special:Contributions/192.54.222.3"/>
	<updated>2026-04-05T14:42:01Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35376</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35376"/>
		<updated>2013-11-09T22:35:02Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s writings, history, timeline  ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting related projects included where appropriate on Wikipedia&lt;br /&gt;
*: James (user:dervorquil, Cambridge)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Mozilla: Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35375</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35375"/>
		<updated>2013-11-09T22:34:46Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Aaron&amp;#039;s writings, history, timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s writings, history, timeline  ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting related projects included where appropriate on Wikipedia&lt;br /&gt;
*: James (user:dervorquil, &#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Mozilla: Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35374</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35374"/>
		<updated>2013-11-09T22:34:31Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Aaron&amp;#039;s writings, history, timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s writings, history, timeline  ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting related projects included where appropriate on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Mozilla: Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35373</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35373"/>
		<updated>2013-11-09T22:34:15Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Personal archive */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s writings, history, timeline  ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Mozilla: Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35372</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35372"/>
		<updated>2013-11-09T22:33:53Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Essence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Mozilla: Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35371</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35371"/>
		<updated>2013-11-09T22:33:40Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Essence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35370</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35370"/>
		<updated>2013-11-09T22:33:26Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Essence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Essence ===&lt;br /&gt;
* Mozilla is working on many new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users.  There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re proposing to fill this gap with an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &amp;quot;[https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9 &#039;&#039;&#039;Essence&#039;&#039;&#039; (project details)]&amp;quot;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;br /&gt;
* For more information:&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35369</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35369"/>
		<updated>2013-11-09T22:32:01Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Transparency */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* &#039;&#039;&#039;SecureDrop&#039;&#039;&#039; (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Essence ===&lt;br /&gt;
* Mozilla is working on a number of awesome new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users!&lt;br /&gt;
* There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re looking to fill this strategic gap by proposing an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &#039;Essence&#039;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;br /&gt;
* For more information: https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35368</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35368"/>
		<updated>2013-11-09T22:31:47Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Transparency */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Continued work==&lt;br /&gt;
First call is 11/11 at 18:30 EST. worldtimebuddy.com for time translation&lt;br /&gt;
: (213) 493-0352 OPEN PIN 38453 &lt;br /&gt;
Platform for continued engagement coming soon&lt;br /&gt;
&lt;br /&gt;
=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
** Timeline visualization is in a state to share (still needs detail added in) : http://prezi.com/9r2agd3u8ule/aaron-swartz-timeline/&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* SecureDrop (yan/micah/garrett?/james?, SF,  samthetechie, Berlin): a platform for whistleblowers to transfer documents to newspapers directly. See [https://pressfreedomfoundation.org/securedrop Press Freedom page] + [https://github.com/freedomofpress/securedrop GitHub trunk].&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;br /&gt;
&lt;br /&gt;
=== Essence ===&lt;br /&gt;
* Mozilla is working on a number of awesome new projects (Webmaker, FirefoxOS, Firefox Accounts, etc) that together are greater than the sum of their parts and will (hopefully) help the web leapfrog traditionally native platforms in ways that restore sovereignty to users!&lt;br /&gt;
* There&#039;s but one major thing missing in Mozilla&#039;s current tech roadmaps: an approach to wrangling control of personal data across the web back into the hands of users. &lt;br /&gt;
* We&#039;re looking to fill this strategic gap by proposing an extensibility model for Mozilla&#039;s [https://developer.mozilla.org/en-US/docs/WebAPI WebAPI project] that would enable RESTful API ecosystems to align with Mozilla&#039;s user-centric values. We are calling this extensibility model &#039;Essence&#039;&lt;br /&gt;
* In nutshell, we are Mozilla volunteers aiming to influence the Firefox development roadmap. To do so, we are building a prototype that demonstrates the UX of Essence that also acts as a forward polyfill for future potential prototypes that can demonstrate the implications of a WebAPI extensibility model for products across Mozilla as well as the API ecosystems across the web.&lt;br /&gt;
* Needs: Developers interested in creating Firefox Add-ons, modeling APIs using [http://raml.org/ RAML], or hacking the about:permissions UI in Firefox.&lt;br /&gt;
* For more information: https://jwilde.hackpad.com/Essence-Project-Summary-b9vSK8NkuQ9&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35352</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35352"/>
		<updated>2013-11-09T21:25:13Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: .&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039; &amp;lt;br/&amp;gt; &lt;br /&gt;
[https://pad.textb.org/p/CFAA &#039;&#039;&#039;Draft of Principles&#039;&#039;&#039;] being edited online &amp;lt;br/&amp;gt; &lt;br /&gt;
Draft outline of replacement law underway&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Guiding principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
(&#039;&#039;see the draft&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
=== Points of consensus ===&lt;br /&gt;
Based on conversations with folks at the &#039;&#039;&#039;Cambridge/Boston&#039;&#039;&#039; hack, these principles emerged as points of agreement. Other groups feel free to chime in as well.&lt;br /&gt;
&lt;br /&gt;
==== Reasonable defenses ====&lt;br /&gt;
* &#039;&#039;&#039;Scope should be limited&#039;&#039;&#039; - the law should not run to the boundary of what we find ethical or moral. We want people to have freedom to &amp;quot;mess around&amp;quot; with the web (perhaps with some negligence-based liability if they cause actual damage). As with media law and &amp;quot;bad journalism&amp;quot;, copyright and &amp;quot;plagiarism,&amp;quot; the law should leave the edge cases for the community to set up a moral/normative/shame-oriented punishment scheme.&lt;br /&gt;
** we feel as though there is sufficient persistent identity in the community that even pseudonymous hackers care about their reputations. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;focus on bad &#039;&#039;access&#039;&#039;, leave &#039;&#039;use&#039;&#039; to other laws&#039;&#039;&#039; - laws on copyright, trade secret, identity theft, espionage, extortion, and fraud govern most of the &amp;quot;scary&amp;quot; use cases.&lt;br /&gt;
** In this way, we are leaving the &amp;quot;hats&amp;quot; (black/white/grey/green) discussion for the community norms or existing law.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Consent should always be a defense&#039;&#039;&#039; - server owners ask members of the public to do some weird stuff against their systems, but as long as they ask for it, it should never be a crime to access one&#039;s computer in that way.&lt;br /&gt;
&lt;br /&gt;
* As to code-based vulnerabilities and authentication measures, &#039;&#039;&#039;some level of technical effectiveness should be considered.&#039;&#039;&#039; A &amp;quot;reasonable&amp;quot; standard may not be appropriate, as defining what is &amp;quot;reasonable&amp;quot; may lead to unnecessary confusion. But some consideration should be made to ensure that trivially-overcome measures are not considered within the scope.&lt;br /&gt;
&lt;br /&gt;
==== What should be unlawful ====&lt;br /&gt;
* &#039;&#039;&#039;hold the party intending to do the bad behavior culpable&#039;&#039;&#039; - don&#039;t track liability to a person whose computer was unwittingly used to commit the crime.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Circumvention of a code-based authentication measure&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). This includes cracking, password guessing, or human-engineering password disclosure.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Exploiting a code-based vulnerability to obtain information&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). We are thinking of things like a SQL injection hack.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Knowingly deleting or impairing the integrity of the work&#039;&#039;&#039; should be unlawful if done intentionally or recklessly. Moving down to negligence or strict liability at a certain damage threshold is harder to say.&lt;br /&gt;
&lt;br /&gt;
==== Uncertain areas ====&lt;br /&gt;
* &#039;&#039;&#039;penetration testing&#039;&#039;&#039; is squishy - an open call for bug bounties should be treated like consent to access the site (again, using laws govern bad uses)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;&amp;quot;accidentally open&amp;quot; sites are squishy&#039;&#039;&#039; - e.g., sites that were supposed to be behind an authentication layer but are not. To a certain extent, it may be best to place the fault of this onto the coder of the site, with the comfort that certain uses by the obtainer of information may still be unlawful.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
&#039;&#039;Lofgren &amp;amp; Wyden&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*: Amend the Wire Fraud Act&lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
*: Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35351</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35351"/>
		<updated>2013-11-09T21:24:57Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Points of consensus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039; &amp;lt;br/&amp;gt; &lt;br /&gt;
[https://pad.textb.org/p/CFAA &#039;&#039;&#039;Draft of Principles&#039;&#039;&#039;] being edited online &amp;lt;br/&amp;gt; &lt;br /&gt;
Draft outline of replacement law underway&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Guiding principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
(&#039;&#039;see the draft&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
=== Points of consensus ===&lt;br /&gt;
Based on conversations with folks at the &#039;&#039;&#039;Cambridge/Boston&#039;&#039;&#039; hack, these principles emerged as points of agreement. Other groups feel free to chime in as well.&lt;br /&gt;
&lt;br /&gt;
==== Reasonable defenses ====&lt;br /&gt;
* &#039;&#039;&#039;Scope should be limited&#039;&#039;&#039; - the law should not run to the boundary of what we find ethical or moral. We want people to have freedom to &amp;quot;mess around&amp;quot; with the web (perhaps with some negligence-based liability if they cause actual damage). As with media law and &amp;quot;bad journalism&amp;quot;, copyright and &amp;quot;plagiarism,&amp;quot; the law should leave the edge cases for the community to set up a moral/normative/shame-oriented punishment scheme.&lt;br /&gt;
** we feel as though there is sufficient persistent identity in the community that even pseudonymous hackers care about their reputations. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;focus on bad &#039;&#039;access&#039;&#039;, leave &#039;&#039;use&#039;&#039; to other laws&#039;&#039;&#039; - laws on copyright, trade secret, identity theft, espionage, extortion, and fraud govern most of the &amp;quot;scary&amp;quot; use cases.&lt;br /&gt;
** In this way, we are leaving the &amp;quot;hats&amp;quot; (black/white/grey/green) discussion for the community norms or existing law.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Consent should always be a defense&#039;&#039;&#039; - server owners ask members of the public to do some weird stuff against their systems, but as long as they ask for it, it should never be a crime to access one&#039;s computer in that way.&lt;br /&gt;
&lt;br /&gt;
* As to code-based vulnerabilities and authentication measures, &#039;&#039;&#039;some level of technical effectiveness should be considered.&#039;&#039;&#039; A &amp;quot;reasonable&amp;quot; standard may not be appropriate, as defining what is &amp;quot;reasonable&amp;quot; may lead to unnecessary confusion. But some consideration should be made to ensure that trivially-overcome measures are not considered within the scope.&lt;br /&gt;
&lt;br /&gt;
==== What should be unlawful ====&lt;br /&gt;
* &#039;&#039;&#039;hold the party intending to do the bad behavior culpable&#039;&#039;&#039; - don&#039;t track liability to a person whose computer was unwittingly used to commit the crime.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Circumvention of a code-based authentication measure&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). This includes cracking, password guessing, or human-engineering password disclosure.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Exploiting a code-based vulnerability to obtain information&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). We are thinking of things like a SQL injection hack.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Knowingly deleting or impairing the integrity of the work&#039;&#039;&#039; should be unlawful if done intentionally or recklessly. Moving down to negligence or strict liability at a certain damage threshold is harder to say.&lt;br /&gt;
&lt;br /&gt;
==== Uncertain areas ====&lt;br /&gt;
* &#039;&#039;&#039;penetration testing&#039;&#039;&#039; is squishy - an open call for bug bounties should be treated like consent to access the site (again, using laws govern bad uses)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;&amp;quot;accidentally open&amp;quot; sites are squishy&#039;&#039;&#039; - e.g., sites that were supposed to be behind an authentication layer but are not. To a certain extent, it may be best to place the fault of this onto the coder of the site, with the comfort that certain uses by the obtainer of information may still be unlawful.&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
&#039;&#039;Lofgren &amp;amp; Wyden&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*: Amend the Wire Fraud Act&lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
*: Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35350</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35350"/>
		<updated>2013-11-09T21:18:45Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039; &amp;lt;br/&amp;gt; &lt;br /&gt;
[https://pad.textb.org/p/CFAA &#039;&#039;&#039;Draft of Principles&#039;&#039;&#039;] being edited online &amp;lt;br/&amp;gt; &lt;br /&gt;
Draft outline of replacement law underway&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Guiding principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
(&#039;&#039;see the draft&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
=== Points of consensus ===&lt;br /&gt;
Based on conversations with folks at the &#039;&#039;&#039;Cambridge/Boston&#039;&#039;&#039; hack, these principles emerged as points of agreement. Other groups feel free to chime in as well.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scope should be limited&#039;&#039;&#039; - the law should not run to the boundary of what we find ethical or moral. We want people to have freedom to &amp;quot;mess around&amp;quot; with the web (perhaps with some negligence-based liability if they cause actual damage). As with media law and &amp;quot;bad journalism&amp;quot;, copyright and &amp;quot;plagiarism,&amp;quot; the law should leave the edge cases for the community to set up a moral/normative/shame-oriented punishment scheme.&lt;br /&gt;
** we feel as though there is sufficient persistent identity in the community that even pseudonymous hackers care about their reputations. &lt;br /&gt;
* &#039;&#039;&#039;focus on bad &#039;&#039;access&#039;&#039;, leave &#039;&#039;use&#039;&#039; to other laws&#039;&#039;&#039; - laws on copyright, trade secret, identity theft, espionage, extortion, and fraud govern most of the &amp;quot;scary&amp;quot; use cases.&lt;br /&gt;
** In this way, we are leaving the &amp;quot;hats&amp;quot; (black/white/grey/green) discussion for the community norms or existing law.&lt;br /&gt;
* &#039;&#039;&#039;hold the party intending to do the bad behavior culpable&#039;&#039;&#039; - don&#039;t track liability to a person whose computer was unwittingly used to commit the crime.&lt;br /&gt;
* &#039;&#039;&#039;Consent should always be a defense&#039;&#039;&#039; - server owners ask members of the public to do some weird stuff against their systems, but as long as they ask for it, it should never be a crime to access one&#039;s computer in that way.&lt;br /&gt;
* &#039;&#039;&#039;Circumvention of a code-based authentication measure&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). This includes cracking, password guessing, or human-engineering password disclosure.&lt;br /&gt;
* &#039;&#039;&#039;Exploiting a code-based vulnerability to obtain information&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). We are thinking of things like a SQL injection hack.&lt;br /&gt;
* As to code-based vulnerabilities and authentication measures, &#039;&#039;&#039;some level of technical effectiveness should be considered.&#039;&#039;&#039; A &amp;quot;reasonable&amp;quot; standard may not be appropriate, as defining what is &amp;quot;reasonable&amp;quot; may lead to unnecessary confusion. But some consideration should be made to ensure that trivially-overcome measures are not considered within the scope.&lt;br /&gt;
* &#039;&#039;&#039;Knowingly deleting or impairing the integrity of the work&#039;&#039;&#039; should be unlawful if done intentionally or recklessly. Moving down to negligence or strict liability at a certain damage threshold is harder to say.&lt;br /&gt;
* &#039;&#039;&#039;penetration testing&#039;&#039;&#039; is squishy - an open call for bug bounties should be treated like consent to access the site (again, using laws govern bad uses)&lt;br /&gt;
* &#039;&#039;&#039;&amp;quot;accidentally open&amp;quot; sites is squishy&#039;&#039;&#039; - e.g., sites that were supposed to be behind an authentication layer but are not. To a certain extent, it may be best to place the fault of this onto the coder of the site, with the comfort that certain uses by the obtainer of information may still be unlawful.&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
&#039;&#039;Lofgren &amp;amp; Wyden&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*: Amend the Wire Fraud Act&lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
*: Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35349</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35349"/>
		<updated>2013-11-09T21:18:26Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039; &amp;lt;br/&amp;gt; &lt;br /&gt;
[https://pad.textb.org/p/CFAA &#039;&#039;&#039;Draft of Principles&#039;&#039;&#039;] being edited online &amp;lt;br/&amp;gt; &lt;br /&gt;
Needed: Draft outline of replacement law, good law to emulate&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Guiding principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
(&#039;&#039;see the draft&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
=== Points of consensus ===&lt;br /&gt;
Based on conversations with folks at the &#039;&#039;&#039;Cambridge/Boston&#039;&#039;&#039; hack, these principles emerged as points of agreement. Other groups feel free to chime in as well.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scope should be limited&#039;&#039;&#039; - the law should not run to the boundary of what we find ethical or moral. We want people to have freedom to &amp;quot;mess around&amp;quot; with the web (perhaps with some negligence-based liability if they cause actual damage). As with media law and &amp;quot;bad journalism&amp;quot;, copyright and &amp;quot;plagiarism,&amp;quot; the law should leave the edge cases for the community to set up a moral/normative/shame-oriented punishment scheme.&lt;br /&gt;
** we feel as though there is sufficient persistent identity in the community that even pseudonymous hackers care about their reputations. &lt;br /&gt;
* &#039;&#039;&#039;focus on bad &#039;&#039;access&#039;&#039;, leave &#039;&#039;use&#039;&#039; to other laws&#039;&#039;&#039; - laws on copyright, trade secret, identity theft, espionage, extortion, and fraud govern most of the &amp;quot;scary&amp;quot; use cases.&lt;br /&gt;
** In this way, we are leaving the &amp;quot;hats&amp;quot; (black/white/grey/green) discussion for the community norms or existing law.&lt;br /&gt;
* &#039;&#039;&#039;hold the party intending to do the bad behavior culpable&#039;&#039;&#039; - don&#039;t track liability to a person whose computer was unwittingly used to commit the crime.&lt;br /&gt;
* &#039;&#039;&#039;Consent should always be a defense&#039;&#039;&#039; - server owners ask members of the public to do some weird stuff against their systems, but as long as they ask for it, it should never be a crime to access one&#039;s computer in that way.&lt;br /&gt;
* &#039;&#039;&#039;Circumvention of a code-based authentication measure&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). This includes cracking, password guessing, or human-engineering password disclosure.&lt;br /&gt;
* &#039;&#039;&#039;Exploiting a code-based vulnerability to obtain information&#039;&#039;&#039; should be unlawful (leaving proportionality for another discussion). We are thinking of things like a SQL injection hack.&lt;br /&gt;
* As to code-based vulnerabilities and authentication measures, &#039;&#039;&#039;some level of technical effectiveness should be considered.&#039;&#039;&#039; A &amp;quot;reasonable&amp;quot; standard may not be appropriate, as defining what is &amp;quot;reasonable&amp;quot; may lead to unnecessary confusion. But some consideration should be made to ensure that trivially-overcome measures are not considered within the scope.&lt;br /&gt;
* &#039;&#039;&#039;Knowingly deleting or impairing the integrity of the work&#039;&#039;&#039; should be unlawful if done intentionally or recklessly. Moving down to negligence or strict liability at a certain damage threshold is harder to say.&lt;br /&gt;
* &#039;&#039;&#039;penetration testing&#039;&#039;&#039; is squishy - an open call for bug bounties should be treated like consent to access the site (again, using laws govern bad uses)&lt;br /&gt;
* &#039;&#039;&#039;&amp;quot;accidentally open&amp;quot; sites is squishy&#039;&#039;&#039; - e.g., sites that were supposed to be behind an authentication layer but are not. To a certain extent, it may be best to place the fault of this onto the coder of the site, with the comfort that certain uses by the obtainer of information may still be unlawful.&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
&#039;&#039;Lofgren &amp;amp; Wyden&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*: Amend the Wire Fraud Act&lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
*: Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35325</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35325"/>
		<updated>2013-11-09T17:40:04Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039; &amp;lt;br/&amp;gt; Draft of Principles being drafted online &amp;lt;br/&amp;gt; Draft replacement law underway later today&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35324</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35324"/>
		<updated>2013-11-09T17:35:25Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Open questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
: Not the worst thing to do; it&#039;s not the same as impersonating a real person&lt;br /&gt;
&lt;br /&gt;
* Circumventing the auth process altogether? &lt;br /&gt;
: This tends to be pretty bad.  It&#039;s clearly defeating the system, when it requires finding a subtle exploit&lt;br /&gt;
: Can be less bad when a system has an auth system but doesn&#039;t use it (e.g. it&#039;s never checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  Who could provide oversight?  &lt;br /&gt;
: (cf [http://www.technewsdaily.com/16445-fix-hacking-laws.html fix-hacking-laws essay] and Robert Graham&#039;s comment)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35323</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35323"/>
		<updated>2013-11-09T17:26:33Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Open questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where do the following edge cases fall?&lt;br /&gt;
* &#039;sockpuppeting&#039; authentication where it&#039;s assumed you have one-account-per-user?&lt;br /&gt;
: This is rarely prevented clearly.  &lt;br /&gt;
&lt;br /&gt;
; Circumventing the auth process? &lt;br /&gt;
&lt;br /&gt;
; What&#039;s the ECTF doing?  &lt;br /&gt;
: (cf fix-hacking-laws essay)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35322</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35322"/>
		<updated>2013-11-09T17:22:43Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Open questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
; Where does &#039;sockpuppeting&#039; fall in the spectrum of decent of authentication?&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35321</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35321"/>
		<updated>2013-11-09T17:20:46Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Open questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authentication&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
: Is feigning authentication fraud? (when simply making up a new account; impersonating yourself, and not someone else)&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35320</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35320"/>
		<updated>2013-11-09T17:19:51Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Principles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Open questions ===&lt;br /&gt;
Feel free to suggest brief answers, pointers to where this is discussed. &lt;br /&gt;
&lt;br /&gt;
; Does &#039;authorization&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access.  Compare historical ways of handling these issues.&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;br /&gt;
&lt;br /&gt;
=== Additional needed resources (1 hour projects) ===&lt;br /&gt;
&lt;br /&gt;
* mapping out where the CFAA overlaps with existing law; identifying areas left untouched.&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35318</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35318"/>
		<updated>2013-11-09T17:14:48Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Open questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
; Govtrack updates&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2454#overview H.R. 2454] (Lofgren bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1196#overview S. 1196] (Wyden bill; referred to Senate Judiciary)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/hr2077 H.R. 2077] (Perlmutter bill; referred to House Judiciary subcommittee on Crime, Terrorism, Homeland Security, and Investigations)&lt;br /&gt;
* [https://www.govtrack.us/congress/bills/113/s1426 S. 1426] (Blumenthal bill; referred to Senate Health, Education, Labor, and Pensions Committee)&lt;br /&gt;
&lt;br /&gt;
=== Comparative Law ===&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
=== Legal elements ===&lt;br /&gt;
There are 7 planks to [http://www.law.cornell.edu/uscode/text/18/1030 18 U.S.C. § 1030]&lt;br /&gt;
&lt;br /&gt;
# Knowingly accessing a computer without access or exceeding access, and obtaining security, foreign relations, atomic info&lt;br /&gt;
#: rarely used, as it is substantively overlapped by other ares&lt;br /&gt;
# Intentionally accessing a computer without access or exceeding access, and in so doing obtaining &amp;quot;information,&amp;quot; financial records, or U.S. government info.&lt;br /&gt;
#: the biggest and most frequently used for access-and-downloading type offenses&lt;br /&gt;
# Accessing without authorization (not &amp;quot;exceeding&amp;quot;) a US government owned or controlled computer&lt;br /&gt;
# Equivalent to the statute on [http://www.law.cornell.edu/uscode/text/18/1343 wire fraud], but replacing &amp;quot;wire&amp;quot; with &amp;quot;computer&amp;quot; and tweaking the details &lt;br /&gt;
#: Overlap with WFA, rather irrelevant in current environs&lt;br /&gt;
# Computer damage&lt;br /&gt;
#: three separate crimes (&amp;quot;damage&amp;quot; = impairment to integrity and availability of data; &amp;quot;loss&amp;quot; = reasonable cost of responding to offense, including costs of damage assessment)&lt;br /&gt;
#:: knowingly cause transmission of program and intentionally cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result recklessly cause damage&lt;br /&gt;
#:: intentionally access a computer and as a result cause damage and &amp;quot;loss&amp;quot; &lt;br /&gt;
# Password Trafficking &lt;br /&gt;
# Extortion through use of computer&lt;br /&gt;
&lt;br /&gt;
== Proposed solutions == &lt;br /&gt;
&lt;br /&gt;
=== Aaron&#039;s Law ===&lt;br /&gt;
* Lower some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
* Clarify once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
*: NB -  Chin in US v. Drew - precedent that an individual, violating a TOS without a script, is pretty clearly not a crime.   But it is still always used as a threat to amplify perceived risk.  &lt;br /&gt;
&lt;br /&gt;
; current status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
: compare [https://necessaryandproportionate.org/text Necessary and Proportionate] principles&lt;br /&gt;
&lt;br /&gt;
What substantive things should be in a rational computer crime law?  &lt;br /&gt;
&lt;br /&gt;
=== Positive principles ===&lt;br /&gt;
; Parallelism with non-computer crime law&lt;br /&gt;
&lt;br /&gt;
; Proportionate punishment&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Negative principles ===&lt;br /&gt;
; Avoid confusion/overlap between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
* b/t social-good and infosec goals&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
=== Patching existing law ===&lt;br /&gt;
; EFF proposals and ideas&lt;br /&gt;
* Limit scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
* lower penalties for crimes that produce little or no harm&lt;br /&gt;
* cleanup: delete repeated provision, delete provision repeated in WFA&lt;br /&gt;
* clarify once and for all that violating TOS is not a crime (nb: it can still be prosecuted civilly)&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page, listing legal history and proposed changes&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating something new ===&lt;br /&gt;
; Manifesto &lt;br /&gt;
*A la necessary and proportionate manifesto created after PRISM: https://necessaryandproportionate.org/text&lt;br /&gt;
* Hack on this version: [https://pad.textb.org/p/CFAA CFAA replacement]&lt;br /&gt;
; Drafting example legislation?&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35300</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35300"/>
		<updated>2013-11-09T15:05:43Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* EFF proposals */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
== Legal issues ==&lt;br /&gt;
* Violating TOS is not a crime:  &lt;br /&gt;
*:  Chin in US v. Drew - an individual, violating a TOS without a script, is pretty clearly not a rime.  &lt;br /&gt;
* Still used in a civil context.   &lt;br /&gt;
&lt;br /&gt;
* Lowers some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*Clarifies once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
&lt;br /&gt;
; Does &#039;authorization&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access?&lt;br /&gt;
&lt;br /&gt;
; Aaron&#039;s Law status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Social issues ==&lt;br /&gt;
&lt;br /&gt;
; This shows confusion between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
&lt;br /&gt;
== Active proposals ==&lt;br /&gt;
&lt;br /&gt;
; Limiting scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
* Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
; Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
&lt;br /&gt;
; Fork the Law page&lt;br /&gt;
* [http://forkthelaw.org/node/9 From mid-2013]&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35299</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35299"/>
		<updated>2013-11-09T15:03:34Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Legal issues */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
== Legal issues ==&lt;br /&gt;
* Violating TOS is not a crime:  &lt;br /&gt;
*:  Chin in US v. Drew - an individual, violating a TOS without a script, is pretty clearly not a rime.  &lt;br /&gt;
* Still used in a civil context.   &lt;br /&gt;
&lt;br /&gt;
* Lowers some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*Clarifies once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
&lt;br /&gt;
; Does &#039;authorization&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access?&lt;br /&gt;
&lt;br /&gt;
; Aaron&#039;s Law status&lt;br /&gt;
* referred to the Committee on Crime, Terr, Homeland Security subcomm of Judiciary Committee (chair: Sensenbrenner)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Social issues ==&lt;br /&gt;
&lt;br /&gt;
; This shows confusion between different parts of the government : in terms of means and ways&lt;br /&gt;
* b/t different parts of the government&lt;br /&gt;
* b/t different phil and pol goals&lt;br /&gt;
&lt;br /&gt;
== EFF proposals ==&lt;br /&gt;
&lt;br /&gt;
; Limiting scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
* Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
; Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35298</id>
		<title>Aaron projects/CFAA</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects/CFAA&amp;diff=35298"/>
		<updated>2013-11-09T15:01:16Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&#039;&#039;Work in progress; please link to other work here&#039;&#039;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;Goal: Let&#039;s prepare for a full repeal of the CFAA and replacement with sane law.  &lt;br /&gt;
;Questions: How would we construct good law in these areas, from scratch? &lt;br /&gt;
: How do different areas of law, policy, and internet governance view the law and its impact?  &lt;br /&gt;
: What would it take to generate support for a [repeal + replace] action, in each area? &lt;br /&gt;
: What are the professional and philosophical circles for each of these areas, where these issues are discussed?  &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The CFAA was developed over time as a merger of  ~7 different areas of law.  It has developed in an aggregate way, and few groups are happy with the current law.  It is so broad that prosecutors like it because they can use it to force plea bargains, since it applies to almost everything in its sphere of action (relying on prosecutorial judgement).&lt;br /&gt;
&lt;br /&gt;
Different parts of the story: National defense, cyber war, data sec, corporate law, contracts online.  Authorization based on code, contract, social norms.  Legal frameworks used to push political means.  Career standards for prosecutors defined in political ways. &lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
; Aaron&#039;s Law&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Analysis from January], [https://www.eff.org/document/eff-cfaa-improvements EFF suggested changes] &lt;br /&gt;
*[http://www.slate.com/blogs/crime/2013/06/20/aaron_s_law_zoe_lofgren_s_new_bill_would_help_reform_the_cfaa_will_congress.html June update via Lofgren], [https://www.eff.org/deeplinks/2013/07/critics-aarons-law-emerge-agree-statute-has-problems July update via Wyden]&lt;br /&gt;
* [https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=9005 EFF action page] - &#039;&#039;&#039;send a letter&#039;&#039;&#039; to your senators&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
;Aspects of the search:  &lt;br /&gt;
* &amp;quot;Advanced technical crime&amp;quot; -- The deployment of the SS was a bit peculiar; but they were the only fed. agents trained in what they were looking for.&lt;br /&gt;
&lt;br /&gt;
;Civil rights concerns&lt;br /&gt;
* Part of the prosecution that was particularly troubling: at one point in the invest., it felt that they were keeping the prosecution going b/c they&#039;d spent so much time bringing it along.  There was no will from victims to keep it going, and not necc. any other desire, but the prosecutors for their own reason wanted conclusion.  &lt;br /&gt;
*: Suggestion: &#039;&#039;employ economists to remind people of sunk costs&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
;Three levels of problem&lt;br /&gt;
* Occlusion of different agendas and sets of laws&lt;br /&gt;
*: Compare pre-computer to post-computer laws for identical crimes.&lt;br /&gt;
* Problems with prosecution as it happens today&lt;br /&gt;
*: Motivations for initiating/closing cases&lt;br /&gt;
* The nature of CFAA as it&#039;s been employed&lt;br /&gt;
*: Failure of proportionality&lt;br /&gt;
&lt;br /&gt;
== Legal issues ==&lt;br /&gt;
* Violating TOS is not a crime:  &lt;br /&gt;
*:  Chin in US v. Drew - an individual, violating a TOS without a script, is pretty clearly not a rime.  &lt;br /&gt;
* Still used in a civil context.   &lt;br /&gt;
&lt;br /&gt;
* Lowers some of the penalties for crimes that produce little or no harm, &lt;br /&gt;
* Delete a provision that is repeated elsewhere in the statute &lt;br /&gt;
*Clarifies once and for all that violating terms of service agreements is not a crime.&lt;br /&gt;
&lt;br /&gt;
; Does &#039;authorization&#039; make sense as the basis for such a law?  &lt;br /&gt;
: As opposed to other corollaries re: trespass and access?&lt;br /&gt;
&lt;br /&gt;
== EFF proposals ==&lt;br /&gt;
&lt;br /&gt;
; Limiting scope of &amp;quot;exceeding authorized access&amp;quot;&lt;br /&gt;
* Say: contractual violation can&#039;t be the basis for this&lt;br /&gt;
; Amend the Wire Fraud Act&lt;br /&gt;
: Say: contractual violation can&#039;t be the basis for this&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35297</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35297"/>
		<updated>2013-11-09T14:32:44Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (Cambridge), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (Cambridge). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* SecureDrop (yan/micah/garrett?/james?, SF): a platform for whistleblowers to transfer documents to newspapers directly. See https://github.com/freedomofpress/securedrop.&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
* SecureDrop (samthetechie, Berlin) https://pressfreedomfoundation.org/securedrop + https://github.com/freedomofpress/securedrop.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35296</id>
		<title>Aaron projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_projects&amp;diff=35296"/>
		<updated>2013-11-09T14:31:59Z</updated>

		<summary type="html">&lt;p&gt;192.54.222.3: /* Personal archive */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== TOR ===&lt;br /&gt;
* tor2web and jot2tor (virgil, SF)(oliver, BOS) : Tor2web makes it possible for internet users to view content from Tor hidden services.  It&#039;s online in a (mostly) functioning form at http://tor2web.org .  Jot2tor is an extension of this allowing users to use Aaron&#039;s jottit.com framework to easily create pages hosted on hidden services.  Naturally, pages created via jot2tor are accessible from tor2web.  Aaron and I actually worked on both of these projects until his death.&lt;br /&gt;
*: OliverDay (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
More information about what help we need is at: https://tor.jottit.com&lt;br /&gt;
&lt;br /&gt;
=== Access ===&lt;br /&gt;
* Fork the Law ([[User:Christie|Christie]] ([[User talk:Christie|talk]]), SF) Fork the Law has spent the last few months working out what ordinary people need to know in order to effect legislative change. We&#039;re now working on condensing this down to a set of technical design requirements. We&#039;d like to dig into turning the requirements into code, integrating existing open source applications and other services wherever possible. The repository for the development effort is https://github.com/fork-the-law/hancock.&lt;br /&gt;
&lt;br /&gt;
* [http://freelawproject.org Free Law Project] - non-profit providing free access to primary legal materials, developing legal research tools, and supporting academic research on legal corpora. Creators of CourtListener and Juriscraper. Easiest project for new contributor would be to extend juriscraper to cover another state court website not yet covered. See code on bitbucket.org. &lt;br /&gt;
*: Free Law Machine is a virtual machine containing all dev tools and code one needs to get started.&lt;br /&gt;
*: See also the &amp;quot;Free the Law&amp;quot; project @ HLS&lt;br /&gt;
&lt;br /&gt;
* [http://peerlibrary.org/ PeerLibrary] is a new open source project and a service providing collaborative reading, sharing and storing. Users can upload publications they want to read (currently in PDF format), read them in the browser in real-time with others, highlight, annotate and organize their own or collaborative library. PeerLibrary provides a search engine to search over all uploaded open access publications. Additionally, it aims to collaboratively aggregate the open layer of knowledge on top of this publications through public annotations and references user will add to publications. In this way publications would not just be available to read, but accessible to the general public as well. Currently, it is aiming at scientific community and scientific publications, but could be deployed for any other field (a StackExchange-like family is envisioned).&lt;br /&gt;
*: [https://github.com/peerlibrary/peerlibrary source code] (build with [http://meteor.com/ Meteor])&lt;br /&gt;
*: [https://archive.org/details/PeerLibraryPreview screencast of a prototype]&lt;br /&gt;
*: [http://okcon.org/2013/09/12/okcon-2013-guest-post-peerlibrary-open-scientific-knowledge/ OKCon blog post about the ideas behind the project]&lt;br /&gt;
*: [https://twitter.com/PeerLibrary @PeerLibrary]&lt;br /&gt;
&lt;br /&gt;
=== Personal archive ===&lt;br /&gt;
*Archiving Aaron&#039;s writings (psawaya, &#039;&#039;&#039;SF&#039;&#039;&#039;). I think it&#039;d be helpful to produce an archive of Aaron&#039;s writings, as the formatting on his blog isn&#039;t well-organized or good for reading on mobile devices. Some projects might include producing ePub and MOBI versions, organizing and tagging his writing, making it searchable, and perhaps even making it annotatable. It may be possible to build off of [https://github.com/joshleitzel/rawthought this project]. I recall not finding a Creative Commons declaration on Aaron&#039;s blog, though this project certainly seems to be in alignment with his ideals. Yan suggested talking about it with Noah Swartz.&lt;br /&gt;
*: Interest: JoshL, SJ (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;), JamesGrimm&lt;br /&gt;
&lt;br /&gt;
* Abelson Report &#039;&#039;TL;DR&#039;&#039; (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;). Distillation and restating the Report to the President, such that more people can join in the conversations around the issues specific to MIT. [https://hackpad.com/TL-DR-lSAvXSwRYpH Ongoing project page]&lt;br /&gt;
&lt;br /&gt;
* Getting projects their own articles on Wikipedia&lt;br /&gt;
*: James (&#039;&#039;&#039;Cambridge&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
=== Legal Fixes ===&lt;br /&gt;
* [[/CFAA|&#039;&#039;&#039;Repeal the CFAA&#039;&#039;&#039;]]:  SJ, Andy (Cambridge). The CFAA is broken; noone but prosecutors like it.  Building a constructive, normative replacement, and strategies for getting support at all levels: executive, policy, law, prosecution, activists, cyberwar.   Cooperating with Aaron&#039;s Law and EFF work; but also tackling.  &lt;br /&gt;
*: Most discussions of &amp;quot;CFAA reform&amp;quot; have been incremental, in a framework of discussing what changes to current law are possible and would help fix recent problems; as opposed to describing why CFAA is broken and what proportionate and moral laws in that space wold look like. &lt;br /&gt;
*: We&#039;re trying to describe what effective policy would look like, starting from scratch.  Policy, Legal, Social, Tech/Security, and Prosecutorial norms which make sense.  &lt;br /&gt;
*: [[/CFAA|Project details]] and analysis&lt;br /&gt;
&lt;br /&gt;
* Prosecutorial Overreach/Underreach: The DOJ turns a blind eye to war criminals and Wall St crooks yet throws the book at activists like Aaron. I&#039;ve registered 14 domains that are variations of the three main prosecutors in Aaron&#039;s trail (i.e. carmenortiz.org, stephenheymann.org, etc.) The names Carmen Ortiz and Stephen Heymann are already synonymous with abuse of power. Let&#039;s cement that while drawing attention to other activists/whistleblowers who are being prosecuted for non-crimes. While we&#039;re at it, let&#039;s give prosecutors something useful to do by highlighting well documented but unprosecuted crimes (I&#039;m looking at you John Yoo/Jamie Dimon/James Clapper).&lt;br /&gt;
&lt;br /&gt;
* Restore the Fourth placeholder.  We&#039;ll know more closer to the date about which of our projects would benefit the most from this. Options include the various encrpytion/meshnet/other coding aspects, blog posts and other content development, or drafting policy documents and researching for coalition-building.&lt;br /&gt;
&lt;br /&gt;
=== Privacy and other software tools ===&lt;br /&gt;
* Mailpile (brennan, Berlin): https://github.com/pagekite/mailpile&lt;br /&gt;
&lt;br /&gt;
* Indie Box: Set up our own web applications on cheap Linux devices (like the Raspberry Pi) in our own homes: http://indieboxproject.org/&lt;br /&gt;
&lt;br /&gt;
* Client-side encryption (Daniel, SF): a library for creating web apps that encrypt user data before sending it to the server. This is an attempt at keeping the convenience of cloud storage while retaining data privacy.&lt;br /&gt;
&lt;br /&gt;
=== Transparency ===&lt;br /&gt;
* SecureDrop (yan/micah/garrett?/james?, SF): a platform for whistleblowers to transfer documents to newspapers directly. See https://github.com/freedomofpress/securedrop.&lt;br /&gt;
*: Our ongoing documentation / q&amp;amp;a site is https://securedrop.hackpad.com. You can also find us on oftc #securedrop-dev.&lt;br /&gt;
* SecureDrop (samthetechie, Berlin) https://pressfreedomfoundation.org/securedrop + https://github.com/freedomofpress/securedrop.&lt;br /&gt;
*: Is there a place for people to publish already? &lt;br /&gt;
&lt;br /&gt;
* Transparency Toolkit (shidash, ?): Unfortunately Shidash is unavailable, but maybe someone else could do it?&lt;br /&gt;
&lt;br /&gt;
* Overview Project (Ian, SF): an open-source tool to help journalists (or anyone!) find stories in large sets of documents, by automatically sorting them according to topic and providing a fast visualization and reading interface. It&#039;s a way to quickly make sense of huge leaks, FOIA responses, and document dumps using a combination of clever algorithms and human intuition. Remember, transparency is meaningless if nobody&#039;s watching. Homepage: http://overview.ap.org/  Source: https://github.com/overview&lt;br /&gt;
&lt;br /&gt;
=== Activism tools ===&lt;br /&gt;
* Taskforce (Sina, SF): https://taskforce.is are a group of developer volunteers working on a range of different activism tools and campaigns, aiming to improve the tools available to citizens and organizations advocating for better technology policy.&lt;br /&gt;
** Two projects we&#039;d love to collaborate on are: &lt;br /&gt;
*** &#039;&#039;&#039;An SMS campaigning tool&#039;&#039;&#039; - Similar to MobileCommons, but open source. We have funding from Twilio that will enable this to exist as a &amp;quot;warning broadcast system&amp;quot; for people interested in tech advocacy. How it should work: The system would allow a user to sign up (either via SMS or via a web form) to receive SMS updates about tech advocacy projects. When a user signs up they immediately receive a text confirming their signup, and they can opt out any time. Admins can send messages to all subscribers via an admin interface. &lt;br /&gt;
*** &#039;&#039;&#039;Crowdsourced anti-apathy platform&#039;&#039;&#039; - There&#039;s quite a bit of apathy with regards to surveillance in both the tech community and in the general public. We&#039;ve been brainstorming to try and figure out how we can effectively convince people that it matters. Our best proposal thus far is to create a system to crowdsource the most convincing content, videos, photos and articles from around the web. Users would then be able to upvote the things that they found the most convincing.&lt;br /&gt;
**Feel free to hack away. If you have any questions, feel free to email me (Email: [mailto:sina.khanifar@gmail.com], SMS: 949-878-8202). Also see https://github.com/tfrce and https://taskforce.is&lt;/div&gt;</summary>
		<author><name>192.54.222.3</name></author>
	</entry>
</feed>