Project Skynet: Difference between revisions
>Hitlerlol No edit summary |
>CrackRabbit No edit summary |
||
(21 intermediate revisions by 16 users not shown) | |||
Line 1: | Line 1: | ||
{{Standard/HeaderStyle1 | {{Standard/HeaderStyle1 | ||
| image = File:Cyberdyne.jpg | | image = File:Cyberdyne.jpg|45px | ||
| legend = Project Skynet | | legend = Project Skynet | ||
| quotetext = The impending threat of the Anti-Counterfeiting Trade Agreement and the implications on our freedom and access to information and resources has brought us to this point. This is an intended declaration of war, [and] we will not stop until this global legislation has been terminated. | | quotetext = The impending threat of the Anti-Counterfeiting Trade Agreement and the implications on our freedom and access to information and resources has brought us to this point. This is an intended declaration of war, [and] we will not stop until this global legislation has been terminated. | ||
Line 13: | Line 13: | ||
| style="width: 450px; overflow: hidden;" | {{#widget:YouTube|id=roMf2RmRzFc}} | | style="width: 450px; overflow: hidden;" | {{#widget:YouTube|id=roMf2RmRzFc}} | ||
| {{Raid Infobox | | {{Raid Infobox | ||
| image = [[File:Cyberdyne.jpg]] | | image = [[File:Cyberdyne.jpg|200px]] | ||
| legend = Fuck Internet Censorship | | legend = Fuck Internet Censorship | ||
| raid = ACTA | | raid = ACTA | ||
Line 23: | Line 23: | ||
| irclocation = [irc://irc.helldive.org/skynet helldive #skynet] | | irclocation = [irc://irc.helldive.org/skynet helldive #skynet] | ||
| firstboard = [http://rockstararmy.com/net/ RSC] | | firstboard = [http://rockstararmy.com/net/ RSC] | ||
| secondboard = [http:// | | secondboard = [http://www.asdfchan.org/acta/ asdfchan] | ||
}} | }} | ||
|} | |} | ||
Line 31: | Line 31: | ||
| | | | ||
=Introduction= | =Introduction= | ||
ACTA, the Anti Counterfeiting Trade Agreement, is an international treaty--being drafted mainly in secret--in order to stifle internet anonymity and freedom. In the name of combating | ACTA, the Anti Counterfeiting Trade Agreement, is an international treaty--being drafted mainly in secret--in order to stifle internet anonymity and freedom. In the name of combating piracy, they are trading liberty for some security; they are seeking for increased surveillance and more strict copyright laws in order to protect the vast profits of those industries that rely on intellectual property | ||
{| | {| | ||
| | | | ||
Line 45: | Line 45: | ||
* It creates a culture of surveillance and suspicion, in which the freedom that is required to produce free software is seen as dangerous and threatening rather than creative, innovative, and exciting. | * It creates a culture of surveillance and suspicion, in which the freedom that is required to produce free software is seen as dangerous and threatening rather than creative, innovative, and exciting. | ||
* Makes streaming or downloading a movie/game/music a FEDERAL crime and not a civil matter I.E No longer Accused vs Movie Corporation but U.S Government Vs Accused + Accused vs Movie Corporation in two separate trials. | * Makes streaming or downloading a movie/game/music a FEDERAL crime and not a civil matter I.E No longer Accused vs Movie Corporation but U.S Government Vs Accused + Accused vs Movie Corporation in two separate trials. | ||
* | * ISP will be fined if their customer had illegally downloaded copyrighted media, This will force ISP to monitor users | ||
==Full ACTA | ==Full ACTA text== | ||
Following months of small Anti-Counterfeiting Trade Agreement leaks, the [http://www.laquadrature.net/files/201001_acta.pdf full consolidated ACTA text]has now been posted online. The consolidated text provides a clear indication of how the negotiations have altered earlier proposals as well as the first look at several other ACTA elements. For example, last spring it was revealed that several countries had proposed including a de minimus provision to counter fears that the border measures chapter would lead to iPod searching border guards. The leak shows there are four proposals on the table. | Following months of small Anti-Counterfeiting Trade Agreement leaks, the [http://www.laquadrature.net/files/201001_acta.pdf full consolidated ACTA text]has now been posted online. The consolidated text provides a clear indication of how the negotiations have altered earlier proposals as well as the first look at several other ACTA elements. For example, last spring it was revealed that several countries had proposed including a de minimus provision to counter fears that the border measures chapter would lead to iPod searching border guards. The leak shows there are four proposals on the table. | ||
=== ACTA Abridged === | |||
[[file:acta2010.pdf]] | |||
=== ACTA Links === | |||
{{Standard/LinkBox | {{Standard/LinkBox | ||
| Name = Download Mirrors | | Name = Download Mirrors | ||
Line 61: | Line 65: | ||
{{tinyquote|JASA proposes that the ban, covering TV but also mobile phones and the web, could be implemented in the form of filters set by internet service providers. Countries such as Australia and China have already developed filters to block access to certain websites.|See the "Talk" page for more information}} | {{tinyquote|JASA proposes that the ban, covering TV but also mobile phones and the web, could be implemented in the form of filters set by internet service providers. Countries such as Australia and China have already developed filters to block access to certain websites.|See the "Talk" page for more information}} | ||
| | | | ||
=Who is doing it?= | =Who is doing it?= | ||
This assault on your liberties has many perpetrators, all of whom must be dealt with accordingly. They are listed in brief below. | This assault on your liberties has many perpetrators, all of whom must be dealt with accordingly. They are listed in brief below. | ||
Line 68: | Line 73: | ||
*[[AT&T]] | *[[AT&T]] | ||
*Bell Canada [ | *Bell Canada [?http://www.crtc.gc.ca/eng/NEWS/RELEASES/2008/r081120.htm] | ||
*Comcast | *Comcast | ||
*Time Warner | *Time Warner | ||
*Walt Disney | *Walt Disney | ||
*Verizon | *[http://www.engadget.com/2010/08/09/google-and-verizons-net-neutrality-proposal-explained/ Google and Verizon | ||
*Virgin | *Virgin | ||
*[http://www.wired.com/threatlevel/2009/06/wsj-nokia-and-siemens-help-iran-spy-on-internet-users/ Nokia and Siemens] | *[http://www.wired.com/threatlevel/2009/06/wsj-nokia-and-siemens-help-iran-spy-on-internet-users/ Nokia and Siemens] | ||
*[ | *[http://www.xenu.net/archive/events/censorship/ Church of $cientology] | ||
*T-Com (and even moar in Germany) look this [ | *T-Com (and even moar in Germany) look this [http://zensurprovider.de/ Zensur Provider] | ||
*Sony | *Sony | ||
*Acer | *Acer | ||
Line 84: | Line 89: | ||
*Jinhui Computer System Engineering Ltd. [http://en.wikipedia.org/wiki/Green_Dam_Youth_Escort] | *Jinhui Computer System Engineering Ltd. [http://en.wikipedia.org/wiki/Green_Dam_Youth_Escort] | ||
| valign="middle" style="vertical-align: top;" | | | valign="middle" style="vertical-align: top;" | | ||
==Governments== | ==Governments== | ||
Line 89: | Line 95: | ||
*Ukraine | *Ukraine | ||
*China | *China | ||
*New Zealand | |||
*Iran | *Iran | ||
*[http://christianengstrom.wordpress.com/2010/03/17/no-acta-transparency-from-spain/ Spain] | *[http://christianengstrom.wordpress.com/2010/03/17/no-acta-transparency-from-spain/ Spain] | ||
Line 95: | Line 102: | ||
|- | |- | ||
| valign="middle" style="vertical-align: top;" | | | valign="middle" style="vertical-align: top;" | | ||
==Individuals== | ==Individuals== | ||
*[[Tim Couch]] | *[[Tim Couch]] | ||
Line 103: | Line 111: | ||
| valign="middle" style="vertical-align: top;" | | | valign="middle" style="vertical-align: top;" | | ||
==NGO's== | ==NGO's== | ||
*[ | *[http://www.iwf.org.uk Internet Watch Foundation] | ||
|- | |- | ||
| valign="middle" style="vertical-align: top;" | | | valign="middle" style="vertical-align: top;" | | ||
Line 145: | Line 153: | ||
*Keker & Van Nest LLP | *Keker & Van Nest LLP | ||
*Open Source Applications Foundation (OSAF) | *Open Source Applications Foundation (OSAF) | ||
*Free Software Foundation (FSF) | |||
*Stanford Center for Law, Science and Technology | *Stanford Center for Law, Science and Technology | ||
*Samuelson Law, Technology & Public Policy Clinic at Boalt Hall School of Law | *Samuelson Law, Technology & Public Policy Clinic at Boalt Hall School of Law | ||
Line 154: | Line 163: | ||
|- | |- | ||
| | | | ||
[[File:1278490622363.png|left|190px|thumb|Update this with a link here, and distribute, plox]] | |||
| | | | ||
=What can I do?= | =What can I do?= | ||
There are some things you can do to help. Here are those things, plus information you may need to know. | There are some things you can do to help. Here are those things, plus information you may need to know. | ||
==What to do right now?== | ==What to do right now?== | ||
See [[Project_IFM]] | |||
==Bypass Censorship== | ==Bypass Censorship== | ||
Line 167: | Line 176: | ||
*[http://sethf.com/anticensorware/ The Censorware Project] | *[http://sethf.com/anticensorware/ The Censorware Project] | ||
*[http://www.haystackproject.org/ Haystack Project] | *[http://www.haystackproject.org/ Haystack Project] (warning: seems the guy pushing this was full of shit; no longer considered helpful) | ||
*[[Tor]] | *[[Tor]] | ||
*[[Freenet]] | *[[Freenet]] | ||
Line 178: | Line 187: | ||
Fighting against ACTA encompasses an incredibly broad variety of targets. To simplify, various individual operations are being formulated with specific goals. These are located below. | Fighting against ACTA encompasses an incredibly broad variety of targets. To simplify, various individual operations are being formulated with specific goals. These are located below. | ||
*[http:// | *[http://www.insurgen.in/wiki/Operation_Payback Operation Payback] | ||
**Currently dormant, awaiting new targets. | |||
*[http://www.insurgen.in/wiki/Project_IFM Project IFM] | |||
*[http://insurgen.in/wiki/Operation_Didgeridie Operation Didgeridie] | |||
** Has come to an end. Further destructive operations needed. | ** Has come to an end. Further destructive operations needed. | ||
*[http://www. | *[http://www.insurgen.in/wiki/CyberDyne_Solutions Operation: CyberDyne Solutions] | ||
** The constructive operation of Skynet. | ** The constructive operation of Skynet. | ||
*[http://www. | *[http://www.insurgen.in/wiki/Operation_Ceiling_Cat Operation: Ceiling Cat] | ||
** Agains The EU Project Indect | ** Agains The EU Project Indect | ||
Line 206: | Line 220: | ||
*http://rockstararmy.com/i/res/1063.html | *http://rockstararmy.com/i/res/1063.html | ||
**IRL raids are | **IRL raids are possible. Please check out the [http://ifmovement.org/forum/ Internet Freedom Movement]for moar info. | ||
|} | |} |
Latest revision as of 22:43, 25 May 2013
![]() |
|
| ||||||||||||||||
Introduction[edit]ACTA, the Anti Counterfeiting Trade Agreement, is an international treaty--being drafted mainly in secret--in order to stifle internet anonymity and freedom. In the name of combating piracy, they are trading liberty for some security; they are seeking for increased surveillance and more strict copyright laws in order to protect the vast profits of those industries that rely on intellectual property
| ||||||||||||||||
How it can affect you[edit]
Full ACTA text[edit]Following months of small Anti-Counterfeiting Trade Agreement leaks, the full consolidated ACTA texthas now been posted online. The consolidated text provides a clear indication of how the negotiations have altered earlier proposals as well as the first look at several other ACTA elements. For example, last spring it was revealed that several countries had proposed including a de minimus provision to counter fears that the border measures chapter would lead to iPod searching border guards. The leak shows there are four proposals on the table. ACTA Abridged[edit]ACTA Links[edit]
| ||||||||||||||||
|
Who is doing it?[edit]This assault on your liberties has many perpetrators, all of whom must be dealt with accordingly. They are listed in brief below.
| |||||||||||||||
Who is on our side?[edit]On the bright side, there are those who stand on the side of internet freedom, net neutrality, and fair, reasonable copyright laws -- and, consequentially, they are none too fond of ACTA.
| ||||||||||||||||
|
What can I do?[edit]There are some things you can do to help. Here are those things, plus information you may need to know. What to do right now?[edit]See Project_IFM Bypass Censorship[edit]Software[edit]Software projects geared towards circumventing censorship.
Websites[edit]
Operations[edit]Fighting against ACTA encompasses an incredibly broad variety of targets. To simplify, various individual operations are being formulated with specific goals. These are located below.
|
![]() |
Project Skynet is part of a series on Projects. |