Category: Blog

Prototyping Lighthouse Studio

lighthouse_logo

I am delighted to announce that I am currently a resident at the prototype Lighthouse Studio along with Aral Balkan and Mark Simpkins. Here is part of the announcement that lays out the scope of the project:

“We are currently prototyping Lighthouse Studio in advance of a launch in Spring 2014. To do this, we are running two short experiments in 2013 and early 2014. Selected residents will work within a ‘scratch’ studio environment on their own practice, but will also help us answer many questions about how the Studio can and should work.The theme for the current prototyping phase responds to our post-PRISM digital world. The recent scandals relating to the NSA, the revelation of the PRISM surveillance programme, and the treatment of whistleblowers such as Edward Snowden and Bradley Manning, have revealed how fundamentally intertwined our civil liberties are with our technological infrastructures. These systems can both enable, and threaten, both our privacy and our security. Ubiquitous networked infrastructures create radical new creative opportunities for a coming generation of makers and users, whilst also presenting us with major social dilemmas.

We are becoming more aware than ever that our data is a powerful resource and we need to think carefully about how we use it in the future. What happens to our data when we share it online? Who owns it? Who else is it being shared with, and how much control or oversight do we have over that sharing? How can we regain control?

The inaugural Lighthouse Studio residents are all exploring aspects of these questions, during the first phase of prototyping.”

Weeknotes 01: Crypto, Catalan Cuisine & Lashings of Builders Tea

I’ve started my short residency here at the Lighthouse Studio and the first two weeks have flown by in a whirl of crypto/surveillence discussions and lashings of the builders tea which Lighthouse appears to run on.

Mostly I’ve been preparing two events, Tech Activism 3rd Monday on November 18th and Brighton CryptoFestival on December 1st, both of which are collaborations with Lighthouse and Open Rights Group and will be hosted by Lighthouse. #TA3M “are monthly meetups that happen simultaneously in cities throughout the world. It brings together a diversity of people interested in surveillance, censorship and open technology”, and the aim is to find people in and around Brighton who are either working on or interested in, well, tech and activism, and explore ways to work together.

When I first moved to Brighton I was surprised to find that there hadn’t been a CryptoParty here so I started nosing around and discovered that various discussions were taking place which have finally come to fruition in Brighton CryptoFestival, inspired by the London CryptoFestival which takes place the day before. It will be a will be a mixture of talks, workshops, cryptoparty and kids activities, intended for everyone; no prior technical expertise or knowledge is assumed.

My fellow resident Mark brought along some of his Emotional Infrastucture diaries and I’ve been keeping one on surveillance which I’ll be posting more about – it’s been a great way to focus on the topic and you can download your own over at his site.

diary

So next week I’ll be doing more preparation for the events and also putting together a privacy session for the folks at Lighthouse – and somewhere along the way Catalan food got thrown into the mix too, so next week will see the first Practical Privacy & Catalan Cuisine Workshop ever.

DNShonest & Worldbank added to Chokepoint Project

crossposted from Chokepoint Project
We have been making steady progress behind the scenes and are very happy to finally be able to show off some of our hard work:
We have integrated the DNShonest remote DNS probing tool created by Joss Wright of the Oxford Internet Institute into Chokepoint Project´s Structured Human Rights Analytics platform.

This allows us to do a number of things :

1. See for each Domain Name Server if it lies about the domains we ask it about.

2. See which Autonomous Systems contain DNS servers that lie about domains

3. See who owns the Autonomous Systems that contain lying DNS systems

This iteration is testing a small set of domain servers (200) in China for replies given to a small set of domains (180). We are running the probe every hour which results in a little less than 18000 queries. The results are then tested for suspicious replies, which in turn are tested for states of “lying”, “probably lying” and “maybe lying”. From these results statistics are generated which are visualized on our public dashboard.

Country page : https://beta.chokepointproject.net/country/CN?show=2013-09-21
Worldmap : https://beta.chokepointproject.net/

dnh

Lying is a big claim, and in this case it explicitly means that a reply given by a domain name server is not the reply it should give. We have tried to avoid false positives as much as possible, and first identifying suspicious replies, after which additional probes aid in determining if something is a lie or not.More information is available at https://beta.chokepointproject.net/aboutWorldbank :
In this release we also show a visualization of a selection of Worlbank data, this is intended primarily to provide some basic contextual insight into the country for which data is presented. In the case of China, the internet usage in 2011 (most recent Worldbank statistic) was 38.4% of the country. In the context of the DNShonest results this means that 61.6% of the Chinese population is unaffected by these “lying” DNS servers. Of course the internet usage will have increased somewhat over the past 21 months, so this conclusion should not be seen as representative of the current situation.wbWhat´s next?

Well, a lot. First of all, we will start rolling this out to all countries and increase both the number of servers tested and the numbers of domains tested. Additionally, we can already see improvements to the dashboard visualizations that should be made.

Thanks

Many thanks are in order for the Internet Protection Lab who provided some sorely needed funding out of a donation made by the Dutch .nl registrar SIDN.

If you like our work so far, please consider throwing a little funding our way. Any amount, no matter how large will help us build more, faster and shinier tools (and pay the rent on our cardboard box sub-basement walk-downs.) https://chokepointproject.net/donate/

Grooming the Kitten (or cleaning up possible malware from a USB using Raspberry PI)

OMG! A post mentioning kittens and GitHub, I’m really turning into a geek!
Or not. Because that’s (one of) the great thing(s) about Kitten Groomer, you don’t have to be a geek to use it.

kgbig

OK let’s back up there…

Being involved in CryptoParties, seeing the problems of “normal” people, and the experience of my own learning curve with tech have resulted in a growing interest in “simple” solutions to geeky “problems”. So I’ve been checking out so-called Live operating systems or distributions such as Tails or Liberté Linux which aim to offer anonymous use of the Internet – however they are certainly not simple…(though I did manage to download and use Tails all on my ownsome following the instructions)

Raphael, a fellow organiser of CryptoParties in Luxembourg, is most certainly an über-geek, and one who puts his code where his mouth is when it comes to promoting accessible tools for the average tech user, taking Crypto out of hackerspaces and into the pub. And he’s been working on Kitten Groomer, as “simple needs need simple solutions”. Coming out of a conversation between writer Quinn Norton and designer/developer/creator @geekmaya who wrote the first version of the Groomer:

This project aims to be used by someone receiving a USB key from an unknown source and who wants to see the content on it without opening the original and potentially malicious files.

The code runs on a Raspberry Pi which means it is never required to plug nor open the original USB key on a computer.

It does not require any technical prerequisites of any kind and can be used by anyone.

The Raspberry Pi is a cheap and widely available device with a big user base so it’s a good choice for Kitten Groomer, which actually runs simply once installed. Basically you plug the suspicious USB into the top port and a larger clean USB into the bottom port and let the Kitten get on with grooming. All the details for use and downloading are available on the website of CIRCLean, a version Raphael put together for his day job at CIRCL (Computer Incident Response Center Luxembourg).

It still needs to be easier to install for non-geeks but that should be resolved very shortly. I’ll be helping out with documentation of the installation and use to make sure that even Luddites like myself will be able to get and use it. And if you’ve got any ideas for a logo, please get in touch.

With so much malware around, and plenty of malware being used for surveillance purposes, Kitten Groomer can be a quick and easy way to get some protection.

All comments/criticism should be directed to Raphael 😉

Smile! You’re on CCTV

smile

That sinister image beams down from walls and shop windows all over Brighton and Hove and seems to corroborate all the stories I’d seen from Europe about the UK being the CCTV capital of the world.

Wondering just how pervasive that surveillence is, I came across a street game called Snap Zap, part of the Tiny Games of Brighton Digital Festival 2013. The rules are as follows:

snapzap

Of course I immediately started scanning my surroundings for tell-tale cams while pondering on the Hacker vs Warden concept.

At home I decided to see if anyone had mapped the cameras in Brighton as in Luxembourg and other places but a quick search (on ixquick if you’re interested) turned up just a list of public facing cameras in Brighton & Hove operated by the council and Sussex Police obtained via a Freedom of Information Act request and an article from local newspaper the Argus also based on an FOI request, listing the 400 cameras monitored by Sussex Police and debating the value of their cost of  £1.3 million a year.

Seemed like there was nothing for it then but to do the mapping myself…

So here is a (not so) quick & dirty map of the cameras listed in Brighton by the council. I went out and checked a couple of them locally and they are where the coordinates say they are.

cam

Western Rd / Brunswick Sq. Hove

Maybe some have been added or removed since the list was published and these are only the cameras that the council and police say they operate and not the multitude of cameras on “private” property that are also monitoring public space.

See full screen

So if anybody is interested in mapping more of the CCTV cameras in Brighton & Hove, get in touch.

While I was checking up on the local cameras I came across what must be one of the greatest signs about the boundaries of a private area ever in Churchill Square:

bollards1

and here is a person crossing from public to private space at those very bollards:

public/private space

While poking around Churchill Square this sign caught my eye:

No Smoking

So is a bus shelter a private space?

shelter

Hmm – time to investigate, and maybe do another #walkshop 😉

UPDATE:

as the “data” provided by the council was just a list I had to convert it into a format that Open Street Map could use, so here is the data in usable formats if you want to play around with it cctvbtn.json or cctvbtn.csv

Miners at the rock-face of the excavation of the Northwest Passage

Abstract based on *work in progress*

Imagining the real when the real is imaginary

The Internet in the Service of the Human Project

In this paper, we aim to conduct four inter-related activities:

  • Stimulate debate regarding how the Society of the Spectacle has benefited from the development of the internet (and other ‘new’ media) and how the Net offers the means to coordinate social contestation.

  • Make an initial assessment of the impact on the individual, both as ‘atom’ and as member of the social collectivity, of ‘new’ media, and the implications they have for fundamental phenomena such as identity.

  • Contextualise the development of the virtual economy within a wider picture of ‘non-productive’ financial valorisation, demonstrated by the catalysts for the current economic crisis

  • Initiate a tentative exploration of the Net as a an autochthonous entity as part of the debate on the potential contribution to libertarian political thought of scientific cybernetic and systems theories

We draw on a range of sources including libertarian political theory [anarchism, Council Communism, Situationist theory], scientific debates on both cybernetics and emergence and self-organisation in natural systems, modern extrapolations of Marxist economic theory, and ongoing discussions regarding surveillance, social control and contestation of these latter phenomena.

Keywords:

Capitalist Valorisation, Control of Data, Cybernetics, Identity, Internet, Phenomenology, Self-Organisation, Social Contestation, Social Control, Systems Theory, Use of Data.

About the Authors:

Jim Fearnley and Chris Pinchen are miners at the rock-face of the excavation of the Northwest Passage.

#ikaskide13 informal networked learning vs the university

ikaskide13-300x300

I’m delighted to have been invited to facilitate a CryptoParty at the Escuela Universitaria de Magisterio de Donostia, UPV/EHU as part of the “I. Jornadas de Aprendizaje Informal y Comunicación en Red” which take place on July 15/16.

The objective of the event is to facilitate contact between initiatives of different characteristics and foster research that provides coverage and guidance to initiatives that are being developed and will be developed in the future. This impulse can be facilitated by contact between the university and the various agents of formal, non-formal and informal education”.

CryptoParty is an interesting example of a worldwide decentralised peer to peer learning network with real results based on real needs, so I think a lot can be learned from it. I’m looking forward to sharing ideas and experiences with the other participants in the event, and of course can’t wait to eat my way through Donostia and hang out with some of my Iberian posse…

#ikaskide13 is free and will be in Euskara and Spanish – register here

Imagining the real when the real is imaginary

From a work in progress with Fulano de Tal


Preamble

These notes represent a preliminary outline of what we hope in due course will be developed into a fuller piece of writing designed, as ever, to support the human project and the transformation of everyday life. Small ambitions, then.

As is so often the way, we were overtaken by events, and these notes were assembled before both the online data surveillance revelations regarding the UK and US States, and also the events taking place in Turkey and Brazil. A preliminary reading of the role of the internet in these latter events suggests that its major role has been to drive up the speed of extension of social struggle, while the Prism and Pandora reports confirm the views of ‘conspiracy’ theorists (already proven many years ago by the discovery of universal monitoring of all telephone calls to/from the entire island of Ireland, for example). These revelations also highlight the forked tongues of the major cyber-players (contestational in public, craven in private), and their willingness to voluntarily initiate the will of State.

Rationale

What will we ultimately be attempting by putting the final version of these thoughts down on paper? The fulfilment of two inter-connected aims:

  • An attempt to understand how the Spectacle has benefited from the development of the internet (and other ‘new’ media) and how the internet offers the means to coordinate social contestation
  • A desire to make an assessment of  the impact on the individual, both as ‘atom’ and as member of the social collectivity, of ‘new’ media, and the implications these have for fundamental phenomena such as identity
Audience and style

This is an open-ended endeavour, and one we aim to make as accessible as possible to non-techies and non-academics. It is not an item to be filed under cultural theory, but represents the beginning of an attempt to put this new world at our disposal once and for all. We draw on known schools of revolutionary thought, such as the Situationist project, council communist theory etc, but do not wish to confine ourselves to the company of other middle-aged men with questionable personal hygiene, sitting in free-house pubs and speaking in abstruse tongues.

The Game of being

The chance offered by the internet to masquerade as personalities we are not is more than a potentially sinister ruse to ensnare the unwary, but offers infinite opportunities for self-invention. In that sense that it makes ‘real’ the proposition that we are who we say we are and choose to be. Given that more people are spending more time engaged in remote communication, the notion of reality (also challenged by some post-modernists as being spurious because off its contingent and relative status) is itself opened to debate.

In this view, the persona becomes a more sophisticated self-chosen variant of Raoul Vaneigem’s division of the self into a series of roles (father, partner, worker, etc). Perhaps we should also consider Immanuel Kant’s categories as the framework by which a ‘self’ is defined, or as the Velvet Underground put it, “I do believe we are what we perceive”. However, the introduction of effectively mandatory online IDs, which is gaining currency via the Cloud, once again limits us to a given identity.

There is an intrinsic tension between the ‘anonymous’ movement as a strategic means of developing resistance and evading State scrutiny, and the progressive ‘selfism’ that characterises human behaviour, namely the stressing of the primacy of the individual’s status and experience over the value of the collective, which the new social media promotes. If all that anonymity means is the individual freedom to not be surveyed and to pass passively unnoticed, it is a defensive, conformist. and utterly negative freedom, and contributes nothing to the project of human community. If, however, it is a flag of convenience for all those individuals whose starting point for mutual unmediated recognition is to be free of the State’s panoptical gaze, then it is positive.

‘New’ media and human perception

The rate of acceleration of production and dissemination of perceptible images and ideas has been immeasurably increased by the development of electronic and cybernetic media. If, as the McCluhanite school observed, visual images penetrate our consciousness far more quickly and in a far less mediated fashion than the spoken word, then this progressive acceleration is merely a matter of degree following on, eg, from TV and motion pictures..

Whether orthodox Darwinism is sufficient to entirely account for changes in brain development is debatable, but it seems likely that being exposed from shortly after birth to new forms of media may alter the brain’s hard wiring within a single lifespan. Once again, this is merely consistent with the dialectic between humans and matter, whereby tool development, a human activity, affects human perception and behaviour in turn.

Suffocated by thin air

The development of ‘new’ media has been co-terminous with radical changes in economic activity in the West, to the extent that commentators can talk about ‘living on thin air,’ which at first hearing, seems to posit that the grubby-nailed world of industrial production is a thing of the past. This fallacy is relatively easy to sustain in economies where the production of things is overshadowed by the production and exchange of services, concepts, and experiences. However, it overlooks the daily horror of multiple fatalities in Bangladeshi sweatshops due to working conditions, for example.

Apparently, Charles Leadbeater, author of Living on Thin Air, argues that production has not only been superseded, it has been replaced by ‘participation’, a term that not only carries the characteristic Blairite whiff of false consultation, but also overlooks the ubiquitous price of admission associated with any activity under capitalism. “Partnership” and the pretence of consultation (the politicised variant of participation) create a notionally non-hierarchical world where fundamental disagreement has been left outside the hall, and the rules of discourse and behaviour are determined by their ‘appropriateness’, an unexamined ethos that places greater importance on the manner by which a message is conveyed than on its content.

Representation and ‘reality’

There are further challenges associated with new forms of media, in particular the primacy given to the representation over the reality of the thing or the experience, to the extent that gap-year students will talk about having ‘done’ a given country, as if  such journeys were something ‘outside’ the traveller, rather than part of the process of living. The temptation to record actuality rather than experience it, and the facility the internet provides to channel-hop such representations makes us all part of a movie that we seek to create, rather than living. However, as we observe when we examine the construction of memory, the apparent transience of experience that characterises online activity conceals the invariance of the version of ourselves held in aspic by those who control us through our self-representation ossified as data objects. The trivial attractions of an eternal present help to create the control we cede over a current version of ourselves, which can be re-transmitted to haunt us.

Electronica as police-person

The internet provides the opportunity to communicate freely and learn about the daily lives of others on a scale simply not imaginable twenty years. Thus, the Net and other media, such as mobile messaging services, have provided the opportunity to extend social interventions rapidly and efficiently. It is therefore no surprise that States have been keen to impose their control as soon as they are able, in a not dissimilar fashion to income-generating market enterprises seeking to penetrate such a rich mine of no-cost peer activity.

We would also do well to remind ourselves of the policing possibilities offered by social media, which have been used to identify geographical concentrations of the expression of particular views, as was the case following the recent street killing in the UK of a person wearing a Help for Heroes (and therefore implicitly pro-military) T-shirt.

The Enemy without a leader

The problem with the internet and the fuzzy lines between national and international capital formations in general is largely one of control. The phenomenon of poacher turned gamekeeper at senior levels is well illustrated by Eric Schmidt, executive Chair of Google, who was previously an adviser to Condoleeza Rice and Hillary Clinton. However, the porosity, flat structure, and flexibility of the internet are capable of ultimately defeating any attempts to contain and suppress it, assuming this is what the mass of users want.

Hacking and other forms of counter-attack become inflated into full-blown assaults on the machinery of state, acts of terrorism. Fractally, but not effectively, there is some logic in this position, but this form of ‘psyops’ deliberately ignores the myriad motivations of participants, eg, self-defence, journalism, subversive humour, all-out assault etc, and the blurred lines between these categories. The conflation of all contestation as ‘acts of terrorism’ is a powerful ideological weapon, and needs to be challenged.

The deadly seduction the internet offers is to act as the consolation of the defeated, in the form of online games, pornography etc. Capitalism would be happy for us to scuttle from office to home (assuming one has to leave home to work or one has a job) in order to download our lives. Who would we challenge and who would we blame for this state of affairs?

The personalisation of data strengthens this isolating tendency yet further, ensuring that the ‘news’ which people receive online is selected according to the existing political assumptions of the consumer. The only contact we would have with others would therefore be virtual, and the selection of ‘facts’ and, by extension, contacts, would be predicated on one’s existing worldview, caught in  a solipsistic, self-reinforcing bubble.

Anonymity cuts both ways. One could vote for different shades of s*** via online survey, and, generally, communication would become increasingly unnecessary. Julian Assange argues (New York Times review of The New Digital Age,  02/06/13)  that this false reciprocity and illusion of participation actually creates the opportunity to “build and fine tune a political figure” (an apparent citation from the book being reviewed) by knocking off the ideological rough edges of an individual, who could be re-designated, for example, as challenging and polemical, but ultimately compliant. The political subject is thus dissolved by consensus, and becomes an object, a work in progress.

The logical endpoint of this impersonal scenario would be a re-imagining of the human as an entity who understands ‘the social’ as itself a story or a game, rather than a defining and irreducible core from which all other possibilities flow.

Space is the place

Space has long been contested, between nation-states and between classes, not only for the resources it might contain but also for the dominance it represents. Proletarians are right to be suspicious of containment, given the consequences of the expropriation of common land (acts of enclosure), and the reduction of nature to a theme park. In 1945, British dock workers ‘on the lump’, who had previously been financially dependent day to day on being chosen for work, were offered a stipend, even for workless days, on condition they waited to be chosen for work in a purpose-built hall. They refused, on the grounds that being incentivised to move from street to hall represented an invasion of liberty. This demonstrates a sophisticated understanding of space as a vehicle of containment, and is poignant given the subsequent defeat of the dockers’ power by the introduction of containers to transport goods.

Space exerts a phenomenological fascination on the human mind, not least perhaps because of the ‘elective affinities’ between space and the human mind – unconstrained by limitation, superseding time, and resonating with possibilities. It may be that resistance to  enclosure was not simply a rejection of the act of converting ludic space and common ground into ‘resource mines’, rather than free, mutable, ragged zones where anything could happen. This parcelling up of a  universal dimension of physics could be usefully compared to the introduction of the measurement of time, making what is infinite into a domesticated servant of Capital.

Thought, memory, and imagination share the characteristics of space, unlimited and infinite. It is tempting to assume that data is indeed as free as the air, escaping the limitations of the geographical, but this belies a reality of vast, energy-guzzling data bunkers, a fact that relegates the fable of online indeterminacy and lack of permanence itself to the status of political ephemera.

Marx was right to assert that capitalism contained the seeds of its own destruction, and that Capital’s desire to roam freely across the globe puts the nation state in jeopardy.The struggle for space also plays itself out in the negotiation of the respective powers of national and international law and the significance of formal boundaries, such as the case of the Icelandic MP who was pursued under US national law for using US-owned social media to disseminate Wikileaks footage of US army attacks on Iraqi civilians. Somewhat naively, privacy was invoked by the MP in question, who argued that her online existence was (or should be) as susceptible to confidentiality as her offline life. However, the cultural effect of the near ubiquity of Western social networks imposes a vehicle that promotes free-market values at the expense of ‘local’ attitudes and social structures. In pointing this out, we do not seek to defend Islam, state capitalism, etc, but merely point out the apparent ‘givenness’ of the Facebook cosmos.

Who’s the tail and who’s the donkey?

It is hard to measure and describe the constellation of relationships between big capital and national governments that facilitates this centralising process, but the mutual benefits are clear. Monopolisation favours large corporations and thus provides an incentive for them to undertake activities that serve the agendas of government. The State’s desire for secrecy and the suppression of information is self-explanatory, and it appears unlikely that the two factions (Capital and the State) will disagree on anything more fundamental than matters of detail.

Other writers have noted the lack of reference to the political economy in critiques of cyber-society, and the assumption that the prevailing social relations are ‘always with us’, like the weather (or the poor, as St. Matthew would have it). Enthusiasts of the possibilities offered by the Net choose not to recognise that as long as we live in a society where power relations prevail, the internet will not be ‘allowed’ to act as the fundamental agent of democratising change, while critics tend to view things in tactical, piecemeal terms, rather than strategically. That is to say, it is easy to wage single-issue battles and/or devise plans to, for example, evade individual surveillance techniques, without recognising that these are one of the many and self-replacing heads of the hydra.

It has even been claimed that the development of scientific theory may be wrested from the hands of academics, and arrived at by a consortia of peers, wiki-style. Once again, this optimism overlooks the reality of real-world constraints, in this case academic gatekeeping. However, it does re-introduce the role of chance to the nature and acquisition of knowledge, pushing the boundaries of constraints in order to effect often unsought paradigm shifts.

Memory as a ghost from the past

As soon as we learned to record our thoughts, we created a world outside ourselves to which we could refer, and which could be drawn on by others to corroborate or challenge our arguments. This represented a reification of human consciousness, and created the means by which our thoughts could be remembered without us being present, or indeed alive. This process has been made richer by the ‘netification’ of daily life, but the principle remains what it was at the time the Rosetta Stone was inscribed.

Clearly the nature of communication is deeply affected by the extent to and the method by which data is/can be recorded, and this development is invaluable in resolving disagreements regarding what we said and when. However, the frozen memorialisation of life by Facebook and other media is qualitatively distinct in a number of profound respects:

  • The self and how it is objectively (in the sense of being an object) presented is a matter of our own choice
  • Our existence as ‘cyber-memory’, and ultimately the uses to which this data is put, is in the hands of others, the data managers

The first point is crucial inasmuch as it is risks removing the continuing and unique relationship between oneself and another implied by subjective memory, and holds individual reminiscence up to ‘objective’ comparison with the cybernetic self as the individual has chosen to construct it. The relational aspect of memory (eg, the dead ‘live’ in memory as recollections of how they related with the individual) is extinguished and is replaced with scrutiny of an object.

Regarding the second point, to one extent or another, engagement with storecards, Facebook etc, are acts of ‘living agency’, and can be avoided or minimised if desired. However, the ‘decampment’ of memory makes it the property of others, and it is added to the vast databank dealing with human behaviour, tastes, desires, etc. What we are describing goes beyond the more intangible world of alienated commodities that Marx describes in relation to capitalist social relations, in that what comes back to confront us is an ossified version of ourselves.

2. New York Times review of The New Digital Age, 2 May 2013.

The geopolitics of domain names pt. 2

So, this is pretty ludicrous &/or worrying – TorrentFreak recently reported on the latest developments in the  “entertainment” industry  vs The Pirate Bay Whac-A-Mole bonanza, including this interesting detail:

“However, in today’s complaint the Swedish prosecutor suggests that the court has jurisdiction over the .is domain because it is registered to Fredrik Neij, who has Swedish nationality.”

Err, what? The Swedish prosecutor suggests jurisdiction over another nations’ domain because it is registered to a Swedish national…this is going to be interesting.

BTW – finally after investigation I got a .nl & a .lu