“The Fear That Everything Has Already Been Done”

November 18, 2014

maxresdefault

Interesting video connected to the first book review presentation about photography and the idea of how despite a same subject is being captured, there will always be something in it creating a new perspective, making it unique. Do you think after seeing the video this is true?

An Interview with the Only Female Photojournalist in Gasa

November 11, 2014

eman-mohammed-interview-129-body-image-1414852277

Read this interesting article on Vice about this woman, Eman Mohammed, who is the only photojournalist in Gaza. Check it out!

Net Neutrality Legislation

November 10, 2014

As of today, November 10, 2014, the  topic of Net Neutrality is still coming into play. I was scrolling through Facebook and found an article about Obama’s stance on Net Neutrality, read to find out what Obama thinks.

“All songs use the same damn chords”

November 5, 2014

Here’s a song by comedian/musician Rob Paravonian about the derivative nature of modern music.

Extra Credit Opportunity

DE2014

EXTRA CREDIT OPPORTUNITY (20 points)

1. Attend a presentation at the Center for Digital Ethics and Policy symposium:

Friday, November 7 — Regents Hall & Beane Hall — Lewis Towers (111 E. Pearson)

CLICK HERE FOR SYMPOSIUM SCHEDULE

2. Write a short paper (2-3 pages) about the experience.

Please include:
– a summary of the topic(s) addressed in the presentation,
– your observations on the presenter(s) approach to the topic(s)
(are they taking a critical perspective, or merely reporting their research findings?)
– what’s your reaction to the information presented?
– what’s your reaction to the experience of attending an academic symposium?

MESSAGE FROM THE SYMPOSIUM COORDINATOR
Students will need to register using 8762 as the code. 
If that fails, they should plan to show a Loyola / state photo ID at our various registration check points.

CLICK HERE TO REGISTER

 

It’s not stealing, it’s PARODY.

November 3, 2014

Artists slave away in their studios to create record-breaking music, box-office winning movies, best-selling books, life-altering poems, and jaw dropping paintings only to have other amateur “artists” create parodies of their works. For a long while, there was no such thing as a parody: it was called copyright infringement. The parody artists take the works of others and add their own twist to it. It’s a little like an innovation of an original invention, and sometimes end up more popular than the original song or work of art.

 

2 Live Crew faced a very close call with their parody of Roy Orbison’s Pretty Woman.

 

Leonardo Da Vinci’s Mona Lisa, one of the best-known paintings of all time, has gotten its fair share of duck faces, cat whiskers,  and bat masks.

 

Picture1

 

“Wierd Al” Yankovic  does parodies of a lot of popular songs, his most famous one being of Chamillionaire’s “Ridin'”. Wierd Al’s “White and Nerdy” has gotten 91 million views, compared to Chamillionaire’s 47 million.

 

 

James Joyce’s Ulysses is considered a parody of  Homer’s Odyssey and T. S. Eliot’s The Waste Land.

 

YouTube personality “ChokeOnFunny” sings a parody of Eminem’s “Rap God.” (The parody is nowhere near as popular as the original song, but it has gotten more than 450,000 views.)

 

Even Walt Disney, who is basically the creator of our childhoods, has gotten a parody by YouTube personality “Paint” dedicated to his works. Paint has gotten more than 42 million views on his Disney parody.

 

Picture4

 

Some argue that a parody can also be seen as a form of free publicity for an artist and their work of art. The parody will never substitute the original because the two hold “separate market functions.” Others argue that the parody takes away the importance of the original song, and the artists make money off of another’s work.

 

Are parodies a form of copyright infringement? Should they be protected by the Fair Use Doctrine and/or the First Amendment? Should parodies and covers of various forms of art be made money off of? Are their exceptions?

 

Libel and Slander: You Can’t Hide Behind the First Amendment Forever

One may think that all that he or she says is protected under the First Amendment and it’s free speech clause, but there are limitations to this law. Libel and slander are unprotected areas of speech, as its only motive is to harm the person or topic. According to our text book, libel is the defamation of character in written or broadcast forms, while slander is spoken language that can hurt someone. A libelous or slanderous  statement could be any false statement that ridicules or harms someones business or profession.

Our good friend Spiderman helps to explain the two terms. 

In 2011, soccer star David Beckham sued a magazine for $25 million for publishing that he had slept with a prostitute. However, the judge for the case rejected Beckham’s case, because the libel laws in the United States hold celebrities to a different standard than to those who are not famous. The court said that Beckham had to produce evidence of “actual malice” to prove that the magazine had published libel against him. Although Beckham’s lawyer had proof that he was not with the prostitute, there was not enough evidence to keep the case in the court system.

If you’d like to read more about Beckham’s experience with libel, read this. 

While Beckham’s case was a recent bout of libel in the public eye, still the most known case of libel and slander was that of the New York Times v. Sullivan case of 1964. This case led to many stipulations being put on court cases that revolved around libel and slander. Some of those being different categories of people that can be affected by the published works, a long list of things that must be proven against the publication, and a differentiation between public and private plaintiffs. They say that the best defense against libel and slander is the truth. Those in the court cases are granted privilieges not given in other cases, to help protect themselves more.

I just thought this was really cute, and has a little bit to do with my post...

Cute and pertinent to the discussion :)

After reading this chapter and focusing mainly on libel and slander, I cant help but wonder how the increase in social media and online publications is going to effect these types of publications.

Do you think that it is easier to make a libelous or slanderous comment online? Should a comment made online be treated the same as something published in a reputable source? Are libel and slander less of a big deal with the introduction of social media and the anonymous nature of the internet?

 

Challenging the Powers of National Security

lossy-page1-608px-NSA-parody-logo-black

Since World War I, national security has claimed itself a requirement in order to maintain the survival of the state through various assumed powers. The extent of these powers has been in question, though, since as early as 1931 in the court case Near v. Minnesota. While the major claim to the authoritative enforcement of national security has always been through the identifying of clear, major threats, many have claimed that the actions impose unconstitutional contradictions to the First  Amendment. Recent articles, regarding the disclosure of military information and apprehension of public information, demonstrate a possible over-extension of the regulatory statures encompassing the powers of national security.

An article published last week by Senior health Scientist, Charles C. Engel, entitled “Compromised Confidentiality in the Military is Harmful,” claims that mental health effects of the “stigma” imposed through the reluctance to seek medical attention by war veterans is reason enough for national security to disclose information forfeited this way. Engel states that the unregulated disclosure “hobbles military capacity to provide effective mental health services because military members rightly perceive that seeking treatment can harm their careers.” likewise, the same can be said about non-military employed citizens who fear that the repercussions of sought medical attention may affect their own careers. The article addresses the concern for both military and non-military employees, but only makes a push for the regulations behind the disclosure of military employees. This possible favoritism may be constituted as a first priority concerning the immediate deployments in wartime, but this logic challenges the overarching principle of national defense: who are they defending?

NSA

Another recent article concerning the constitutionality of national security letters (NSLs) explains the questioning of the federal government’s right to secretly apprehend personal information from major mobile service providers. The Electronic Frontier Foundation (EFF), a non-profit digital rights group, explains that “the statutes governing National Security Letters empower the FBI, without prior judicial authorization, to both demand customer records directly from Internet and telecommunication providers and to issue permanent gag orders that prevent the recipients from disclosing anything about the government’s demand.” This NSL was eventually ruled unconstitutional under a judge explaining that the gag order issued, “violate[d] the First Amendment; and that the lack of judicial oversight is a violation of the separation of powers.” The client received two more NSLs afterword, in which the attempt to fight the appeal was “thwarted by a court ruling that the NSL could be enforced.”

Ultimately, it is the up to the Supreme Court to determine if the foundational reasoning behind the government’s pursuing of public information is constitutional to enforce. The disclosure of this nearly-same information is understandable for soldiers because they are under federal contract, and thus the federal government claiming ownership of this information is technically expressing their right. However, public information is protected under no such disclosure, as demonstrated through the demand to claim this personal information through mobile service providers. Furthermore, The terms of the initial NSL in the case backed by the EFF showed that the federal government demanded no disclosure of the personal information they wished to gather. In this slight contradictory method displaying the controversial tools used to enforce national security, it raises the question whether the terms of those tool overstep their own regulations.

Consider the following questions for discussion:

-Should the enforcement of national security allow the full range of of the apprehension and disclosure of public and federal information?

-If yes, what justifies the the federal government’s methods of enforcing national security? 

-If no, in what ways do you believe the powers of the federal government enforcing national security should be limited?  

Privacy in Modern Media

November 2, 2014

 

founding-fathers

When we talk about the advancement of modern media it is important to remember a person’s right to privacy in our new technology-centered world. This past week’s reading was about the mass media as it relates to the United States legal system. The topic I have chosen to focus on is privacy. This is because privacy is an important part of American values. Though we do not have an explicit right to privacy in the Constitution, we do however have an implied right to privacy through case law and common practice.

Griswold v. Connecticut confirmed “together the First, Third, Fourth and Ninth Amendments, create a new constitutional right, the right to privacy.” This means that even though the founding fathers never drafted an Amendment that specifically stated, “Citizens have a right to privacy,” we still have an implied right to privacy based off of the combination of these Amendments and their current interpretation by the Supreme Court. The reason why I chose this as my topic is because I find case law almost as interesting as corporate law. In the next section I’m going to take us through the controversial topic of person privacy as it relates to mass media and the power of the internet.

The Fappening

It’s not a scandal. It’s a sex crime.”

~Jennifer Lawrence

The Fappening is Certainly Happening 

One of the most relevant cases of media’s role in the personal invasion of privacy comes from the “Fappening.” The Fappening is an online blog where various hackers have posted stolen risqué photos of famous celebrities. How they obtained these photos is quite interesting. When a person takes a photo on an iPhone, even photos that are not meant for anyone else to see, their phone automatically backs the image up on Apple’s iCloud. Well, society’s elite group of hackers soon figured this out, and began hacking into the iCloud accounts of over 30 famous celebrities.

The figure-head of these A-List celebrities is Jennifer Lawrence. Ms. Lawrence originally denied that the photos were hers, but after realizing she needed grounds for a lawsuit, she admitted to taking the photos. In an in-depth interview, Lawrence spoke out against the actions of these “hackers” and called for legal action. Lawrence is just one of many celebrities that have been affected by this campaign, although not all of the photos have been proven real, yet (for the full list of celebrities visit the video link attached to the title). Many celebrities attribute this breach of personal privacy to Apple’s system protections. Here is what Apple had to say about the hacking:

We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved. 

Apple claims that the hacking of the photos was merely just a matter of finding out celebrities account usernames and passwords. But what the video above describes is how it was even easier to obtain certian photos because the some celebrities’ boyfriends had photos on their phones with little to no protection on their accounts. Being that Apple’s response may have been less than satisfactory to celebrities, I wonder if Apple might be in the crosshairs of future litigation against breaches of privacy. Then again we do willingly agree to those 50+ pages of Terms of Use.

As of today the federal government has not shut down the website, in fact it has only grow stronger. Active members of the online community came together to make a website that stores every nude or risqué photo of a famous person that has ever been posted online. Usually with these types of situations, the websites will be shut down, but the images are never completely gone. Seeing an event like this makes me wonder, if a decentralized online world is in the best interest of American society and our rights as citizens.

Additional Link to Consider:

1. Online Case Law Reference:

http://www.oyez.org/

Discussion Questions:

1. If you were a celebrity who had their private photos leaked on the internet, what would your immediate response be to the uproar?

2. What should the punishment be to the hackers (if they are ever found) for leaking the photos? Do you think this crime is worse than the government reading through your private emails and text messages?

3. Because privacy was not specifically mentioned in the wording of the Constitution, do you think the founding fathers meant for us to have the right? Or did this just come about through the views of the Supreme Court Justices?