SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
[N
                                          J   ♥
Mindful Play:
                                                  ]
Free Software, Peer Production and Human Rights




            Jonah Bossewitch
   PhD Candidate, Columbia University
      http://alchemicalmusings.org
The Joker’s Detonators
Free Software and Human Rights




          Jonah Bossewitch
 PhD Candidate, Columbia University
    http://alchemicalmusings.org
Ask me about software freedom
“Education is the
unfinished business of the
revolution”
     Malak Zaalouk, Director of the Middle East
                  Institute of Higher Education




Online learning and
education can help
reduce "extremism" in
the world
       Daphne Koller, Co-Founder of Coursera
Criminalizing Communications



    -   Intelligence and Communication have
        always been powerful, and often lethal.
    -   National Defense Authorization Act:
        -   Software as speech? Material support?
        -   Aiding and Abetting?
Playing with Fire:
 Not just for hobbyists

-   Android
-   DIY Drones
-   3-D Printing
-   Open-Source Guidance Systems
-   Arduinos
Android



-   General Purpose Computing Platform
-   Cell phone hardware requirements have
    enabled drones, and the commodification of
    precision components
Open Source Drones
3-D Printing
-   Wiki Weapons project - http://defensedistributed.com
    “This project might change the way we think about gun
    control and consumption. How do governments behave
    if they must one day operate on the assumption that
    any and every citizen has near instant access to a
    firearm through the Internet? Let’s find out.”
Open Source Toy Rockets




-   Open hardware and software designs for high
    powered model rocketry & guidance systems
Arduinos




-   Little Buddy in Italian
-   Open-Source Actuators: Control systems that
    sense, decide, and act on the physical environment
Bomb Kiddies?




-   How long does it take to assemble an IED?
-   How long to assemble your second?
-   Designs evolving on internet-time, exchanged
    on distributed exchanges (e.g. Pirate Bay?)
Sentient Landmines




-   Face Detection?
-   Networked Detonations??
-   Random Detonations???
It from Bit



-   Platform is somewhat irrelevant...

-   The critical transitions are from:

    -   Hardware      Software

    -   Individuals   Network
Please, describe your problems
Joseph Weizenbaum (1923-2008)




 -   Plug & Pray (2010)
 -   Dr. ELIZA - http://bit.ly/10VLdoG
“‘The technology itself is neutral and value-free and it just
depends how one uses it...’ Well, that is false... we live in a
concrete society, [and] with concrete social and historical
circumstances and political realities in this society, it is
perfectly obvious that when something like a computer is
invented, then it is going to be adopted will be for military
purposes”                     - http://tech.mit.edu/V105/N16/weisen.16n.html



                                   “We should always stay mindful
                                   of the dangers that emerge with
                                   new technology and debate
                                   those dangers, because some of
                                   them will turn out to be real."
                                    - http://www.boston.com/bostonglobe/obituaries/articles/
                                    2008/03/16/joseph_weizenbaum_85_mit_professor_humanist/
Rhetorical Thought Experiments

  -   Will the first recognizably sentient AI be
      running on Free Software?


  -   Who will try to patent the process we
      know as consciousness?
Copy-Lefting Ethics?




                                                   [ x x ] & HACKTIVISMO
                                                   ((___)) cDc communications
                                                    (' ') July 4th, 2001
                                                    


                                                    _
                                                     (U)

                                                         / "A Special Message of Hope"


                                                         _
-   Human rights licenses
    -   Hacktivismo Enhanced-Source
        Software License Agreement (HESSLA)




                                                   FOR IMMEDIATE RELEASE
    -   Torrify Ethical
        Software License Agreement (TESLA)
-   Prohibits the use or modification of the software
    to violate human rights or to introduce features
    that spy on the user.
Freedoms Collide
-   Rejected by the Free Software Foundation,
    and most other Free Software communities.




      -   What webserver runs www.kkk.com?
Robotic Arms Control




-   http://icrac.net
-   “say no to killer robots”
¿Questions?
-   How should the average software developer
    think about their responsibilities towards the
    potential uses of their creations?
-   Will proliferation of these technologies balance
    the inequalities, or launch arms races?
-   How can we encourage this conversation?
-   “Everything is valuable under the right
    conditions”...

Mais conteúdo relacionado

Semelhante a Jokers detonators

The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
Mike Linksvayer
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paper
Marklin
 
LECTURE 7 - Cyberculture
LECTURE 7 - CybercultureLECTURE 7 - Cyberculture
LECTURE 7 - Cyberculture
Kim Flintoff
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
 

Semelhante a Jokers detonators (20)

Everyone's a Coder Now: Reading and Writing Technical Code
Everyone's a Coder Now: Reading and Writing Technical CodeEveryone's a Coder Now: Reading and Writing Technical Code
Everyone's a Coder Now: Reading and Writing Technical Code
 
Social Machines Democratization
Social Machines DemocratizationSocial Machines Democratization
Social Machines Democratization
 
[DSC Adria 23] Tomislav Stipancic PLEA-Affective interactive virtual agents t...
[DSC Adria 23] Tomislav Stipancic PLEA-Affective interactive virtual agents t...[DSC Adria 23] Tomislav Stipancic PLEA-Affective interactive virtual agents t...
[DSC Adria 23] Tomislav Stipancic PLEA-Affective interactive virtual agents t...
 
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_sourceCc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
 
Efficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation ProcessesEfficient Use of Internet and Social Media Tools in Innovation Processes
Efficient Use of Internet and Social Media Tools in Innovation Processes
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital Self
 
The Myth of Free Information
The Myth of Free InformationThe Myth of Free Information
The Myth of Free Information
 
Collaboration for Good Futures
Collaboration for Good FuturesCollaboration for Good Futures
Collaboration for Good Futures
 
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
 
who is writing my autobiography
who is writing my autobiographywho is writing my autobiography
who is writing my autobiography
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source Panel
 
Highlights from SXSW 2014
Highlights from SXSW 2014Highlights from SXSW 2014
Highlights from SXSW 2014
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paper
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Transfersummit2011
Transfersummit2011Transfersummit2011
Transfersummit2011
 
LECTURE 7 - Cyberculture
LECTURE 7 - CybercultureLECTURE 7 - Cyberculture
LECTURE 7 - Cyberculture
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Naked Security
Naked SecurityNaked Security
Naked Security
 
Why Open Source matters
Why Open Source mattersWhy Open Source matters
Why Open Source matters
 

Jokers detonators

  • 1. [N J ♥ Mindful Play: ] Free Software, Peer Production and Human Rights Jonah Bossewitch PhD Candidate, Columbia University http://alchemicalmusings.org
  • 2. The Joker’s Detonators Free Software and Human Rights Jonah Bossewitch PhD Candidate, Columbia University http://alchemicalmusings.org
  • 3. Ask me about software freedom “Education is the unfinished business of the revolution” Malak Zaalouk, Director of the Middle East Institute of Higher Education Online learning and education can help reduce "extremism" in the world Daphne Koller, Co-Founder of Coursera
  • 4. Criminalizing Communications - Intelligence and Communication have always been powerful, and often lethal. - National Defense Authorization Act: - Software as speech? Material support? - Aiding and Abetting?
  • 5. Playing with Fire: Not just for hobbyists - Android - DIY Drones - 3-D Printing - Open-Source Guidance Systems - Arduinos
  • 6. Android - General Purpose Computing Platform - Cell phone hardware requirements have enabled drones, and the commodification of precision components
  • 8. 3-D Printing - Wiki Weapons project - http://defensedistributed.com “This project might change the way we think about gun control and consumption. How do governments behave if they must one day operate on the assumption that any and every citizen has near instant access to a firearm through the Internet? Let’s find out.”
  • 9. Open Source Toy Rockets - Open hardware and software designs for high powered model rocketry & guidance systems
  • 10. Arduinos - Little Buddy in Italian - Open-Source Actuators: Control systems that sense, decide, and act on the physical environment
  • 11. Bomb Kiddies? - How long does it take to assemble an IED? - How long to assemble your second? - Designs evolving on internet-time, exchanged on distributed exchanges (e.g. Pirate Bay?)
  • 12. Sentient Landmines - Face Detection? - Networked Detonations?? - Random Detonations???
  • 13. It from Bit - Platform is somewhat irrelevant... - The critical transitions are from: - Hardware Software - Individuals Network
  • 14. Please, describe your problems Joseph Weizenbaum (1923-2008) - Plug & Pray (2010) - Dr. ELIZA - http://bit.ly/10VLdoG
  • 15. “‘The technology itself is neutral and value-free and it just depends how one uses it...’ Well, that is false... we live in a concrete society, [and] with concrete social and historical circumstances and political realities in this society, it is perfectly obvious that when something like a computer is invented, then it is going to be adopted will be for military purposes” - http://tech.mit.edu/V105/N16/weisen.16n.html “We should always stay mindful of the dangers that emerge with new technology and debate those dangers, because some of them will turn out to be real." - http://www.boston.com/bostonglobe/obituaries/articles/ 2008/03/16/joseph_weizenbaum_85_mit_professor_humanist/
  • 16. Rhetorical Thought Experiments - Will the first recognizably sentient AI be running on Free Software? - Who will try to patent the process we know as consciousness?
  • 17. Copy-Lefting Ethics? [ x x ] & HACKTIVISMO ((___)) cDc communications (' ') July 4th, 2001 _ (U) / "A Special Message of Hope" _ - Human rights licenses - Hacktivismo Enhanced-Source Software License Agreement (HESSLA) FOR IMMEDIATE RELEASE - Torrify Ethical Software License Agreement (TESLA) - Prohibits the use or modification of the software to violate human rights or to introduce features that spy on the user.
  • 18. Freedoms Collide - Rejected by the Free Software Foundation, and most other Free Software communities. - What webserver runs www.kkk.com?
  • 19. Robotic Arms Control - http://icrac.net - “say no to killer robots”
  • 20. ¿Questions? - How should the average software developer think about their responsibilities towards the potential uses of their creations? - Will proliferation of these technologies balance the inequalities, or launch arms races? - How can we encourage this conversation? - “Everything is valuable under the right conditions”...