<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>legal &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/legal/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Sat, 14 Mar 2026 09:00:34 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>legal &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Are Brother's Insecure Printers Illegal in the UK?]]></title>
		<link>https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/</link>
					<comments>https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 01 Jul 2025 11:34:15 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Legislation]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=61677</guid>

					<description><![CDATA[Another day, another security disaster! This time, multiple printers from Brother have an unfixable security flaw. That&#039;s bad, obviously, but is it illegally bad?  Let&#039;s take a look at details of the vulnerability:  An unauthenticated attacker who knows the target device&#039;s serial number, can generate the default administrator password for the device.  Recently, the UK brought in some laws aimed…]]></description>
										<content:encoded><![CDATA[<p>Another day, another security disaster! This time, <a href="https://www.theverge.com/news/694877/brother-printers-security-flaw-password-vulnerability">multiple printers from Brother have an unfixable security flaw</a>. That's bad, obviously, but is it <em>illegally</em> bad<sup id="fnref:law"><a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fn:law" class="footnote-ref" title="I'm not a lawyer. This is not legal advice. This is just my interpretation of what's going on. If in doubt, consult someone qualified." role="doc-noteref">0</a></sup>?</p>

<p>Let's take a look <a href="https://www.cve.org/CVERecord?id=CVE-2024-51978">at details of the vulnerability</a>:</p>

<blockquote><p>An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device.</p></blockquote>

<p>Recently, the UK brought in some laws aimed at strengthening consumer protection - the Product Security and Telecommunications Infrastructure act (PSTI).  There's <a href="https://www.ncsc.gov.uk/blog-post/smart-devices-law">a readable summary on the National Cyber Security Centre's website</a>.</p>

<p>There are three interesting points to note in that blog post. The first is about passwords:</p>

<blockquote><p>The law means manufacturers must ensure that all their smart devices meet basic cyber security requirements. Specifically:</p>

<ol>
<li>The manufacturer must not supply devices that use default passwords, which can be easily discovered online, and shared.</li>
</ol></blockquote>

<p>Secondly, is a question of jurisdiction:</p>

<blockquote><p>Most smart devices are manufactured outside the UK, but the PSTI act also applies to all organisations importing or retailing products for the UK market. Failure to comply with the act is a criminal offence</p></blockquote>

<p>Thirdly, what is actually covered:</p>

<blockquote><p>The law applies to any ‘consumer smart device’ that connects either to the internet, or to a home network (for example by wifi).</p></blockquote>

<p>Is a WiFi enabled printer a "consumer smart device"?  One of the things that techies find confusing is that the law is <em>not</em> code. It usually doesn't enumerate a definitive list of what is and what isn't in scope. It gives a general outline and then allows case-law to develop. This means laws don't need to be updated when someone invents, say, an Internet connected tinfoil dispenser.</p>

<p>Let's move beyond the consumer-friendly summary and go to the actual law. <a href="https://www.legislation.gov.uk/uksi/2023/1007/schedule/1/made">The Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023</a></p>

<blockquote><ol start="2">
<li><p>Passwords must be—</p>

<p>a. unique per product; or</p>

<p>b. defined by the user of the product.</p></li>
<li><p>Passwords which are unique per product must not be—</p>

<p>a. based on incremental counters;</p>

<p>b. based on or derived from publicly available information;</p>

<p>c. based on or derived from unique product identifiers, such as serial numbers, unless this is done using an encryption method, or keyed hashing algorithm, that is accepted as part of good industry practice;</p>

<p>d. otherwise guessable in a manner unacceptable as part of good industry practice.</p></li>
</ol></blockquote>

<p>How does this apply to the printers? Rapid7, who discovered the vulnerability, <a href="https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/">have this to say about how it works</a>:</p>

<blockquote><p>[The vulnerability] allows an attacker to leak a serial number via the target's HTTP, HTTPS, and IPP services. However, should an attacker not be able to leverage [the vulnerability], a remote unauthenticated attacker can still discover a target device's serial number via either a PJL or SNMP query</p></blockquote>

<p>So, yes. The default password <em>is</em> unique but it can be automatically derived from the serial number.  That serial number is available to anyone with a network connection to the printer.</p>

<p>But, do printers fall under the scope of this act?</p>

<p>The <a href="https://www.legislation.gov.uk/ukpga/2022/46/part/1/enacted#section-4">Product Security and Telecommunications Infrastructure Act 2022</a> says:</p>

<blockquote><p>4 Relevant connectable products</p>

<ol>
<li><p>In this Part “relevant connectable product” means a product that meets conditions A and B.</p></li>
<li><p>Condition A is that the product is—</p>

<p>A. an internet-connectable product, or</p>

<p>B. a network-connectable product.</p></li>
<li><p>Condition B is that the product is not an excepted product (see section 6).</p></li>
</ol></blockquote>

<p>It goes on to define what Internet-connectable means, along with some other clarifying details.  But is there a get-out clause here? Are printers an "excepted product"?</p>

<blockquote><p>In this Part “excepted product” means a product of a description specified in regulations made by the Secretary of State.</p></blockquote>

<p>OK, let's look at <a href="https://www.legislation.gov.uk/uksi/2023/1007/schedule/3">the regulations</a>. I've expanded out the relevant bit:</p>

<blockquote><p>Schedule 3 Excepted connectable products</p>

<ol start="5">
<li><p>Computers</p>

<ol>
<li><p>Products are excepted under this paragraph if they are computers which are—</p>

<p>a. desktop computers;</p>

<p>b. laptop computers;</p>

<p>c. tablet computers which do not have the capability to connect to cellular networks.</p></li>
</ol></li>
</ol></blockquote>

<p>Nope! The Brother printers don't appear to be exempt<sup id="fnref:neil"><a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fn:neil" class="footnote-ref" title="With thanks to m'learned colleague Neil Brown who came to much the same conclusion" role="doc-noteref">1</a></sup>.  What's <a href="https://www.legislation.gov.uk/ukpga/2022/46/part/1/enacted#section-38">the <em>maximum</em> penalty</a> Brother could be subject to?</p>

<p>The greater of £10 million or 4% of worldwide <em>revenue</em>.</p>

<p>Ouch!</p>

<p>Of course, much like GDPR fines, these are headline grabbing numbers. The prosaic reality is that <a href="https://www.gov.uk/government/publications/safety-and-standards-enforcement-enforcement-policy">the enforcement policy is much more likely to suggest remedial steps</a>. Only the most flagrant transgressors are likely to be punished harshly<sup id="fnref:actions"><a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fn:actions" class="footnote-ref" title="You can see the actions they've previously taken. Because PSTI is so new, there aren't any actions against insecure IoT devices - so we'll have to wait and see how they choose to proceed." role="doc-noteref">2</a></sup>.</p>

<p>So, to recap. The law says an Internet-connected device (including printers) must have a password which is not "based on or derived from publicly available information". As I understand it, having a serial-number based password is OK <em>as long as you don't publicise the serial number</em>.  I expect that if it were printed on a sticker that would be fine. But because the serial can be discovered remotely, it fails at this point.</p>

<p>In Brother's (slight) defence, unless the user has specifically connected the printer to the Internet this is only a local vulnerability. Someone on the same network would be able to monkey around with the printer but, similarly, they could plug in a USB cable for some illicit printing or break it with a hammer. Any damage is confined to the LAN.</p>

<p>Should users change default passwords? Yes. But manufacturers have a legal duty to ensure that people who don't are still protected.</p>

<div id="footnotes" role="doc-endnotes">
<hr>
<ol start="0">

<li id="fn:law">
<p>I'm not a lawyer. This is not legal advice. This is just my interpretation of what's going on. If in doubt, consult someone qualified.&nbsp;<a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fnref:law" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:neil">
<p>With thanks to m'learned colleague <a href="https://decoded.legal/blog/2023/10/new-rules-for-people-making-importing-or-distributing-internet-connected-or-connectable-products-part-1/">Neil Brown who came to much the same conclusion</a>&nbsp;<a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fnref:neil" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:actions">
<p>You can <a href="https://www.gov.uk/government/publications/opss-enforcement-actions">see the actions they've previously taken</a>. Because PSTI is so new, there aren't any actions against insecure IoT devices - so we'll have to wait and see how they choose to proceed.&nbsp;<a href="https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/#fnref:actions" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

</ol>
</div>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=61677&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2025/07/are-brothers-insecure-printers-illegal-in-the-uk/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Is enhancement the same as manipulation?]]></title>
		<link>https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/</link>
					<comments>https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 30 Apr 2025 11:34:34 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[legal]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=60538</guid>

					<description><![CDATA[How far can you enhance an image or video before you cross the line into manipulation?  The UK is currently prosecuting two men accused of a crime. Part of the prosecution&#039;s evidence is a video. In showing it to the jury, the prosecution have said:  the two minute and 41 second-long video is &#34;extremely dark&#34; but the &#34;unmistakeable&#34; noise of a chainsaw can be heard followed by the sound of a tree…]]></description>
										<content:encoded><![CDATA[<p>How far can you enhance an image or video before you cross the line into manipulation?</p>

<p>The UK is currently prosecuting two men accused of a crime. Part of the prosecution's evidence is a video<sup id="fnref:not"><a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fn:not" class="footnote-ref" title="To be clear, I'm not at the trial." role="doc-noteref">0</a></sup>. In showing it to the jury, the prosecution have said:</p>

<blockquote><p>the two minute and 41 second-long video is "extremely dark" but the "unmistakeable" noise of a chainsaw can be heard followed by the sound of a tree falling.</p><br>
<p>Police experts have "enhanced" the video as much as possible but it has "not been interfered with", Mr Wright tells the jury.</p><br>
<p><a href="https://www.bbc.co.uk/news/live/cvg93k0950pt?post=asset%3A54970a3b-ae9f-4299-832a-4ebe813dd756#post">BBC News</a>
</p></blockquote>

<p>I think most reasonable people would agree that creating an AI "Deep Fake" by inserting the faces of the pair into the video, would be unacceptable.</p>

<p>What about boosting the brightness on the video? That seems pretty unobjectionable to me and, I suspect, most neutral parties.</p>

<p>Suppose the prosecutors used AI to enhance the image? Perhaps <a href="https://www.slrlounge.com/photoshop-tips-how-to-use-content-aware-scale-to-extend-backgrounds/">adding a background which wasn't there</a>  up maybe <a href="https://www.theverge.com/news/625904/netflix-a-different-world-ai-upscaling-nightmare">upscaling the video resolution</a> and introducing elements which didn't exist before? I think that's a step too far. Algorithmic enhancement strays into manipulation territory.</p>

<p>But what if the police ran a face detection algorithm on the video and only boosted the visibility of those parts, rather than the rest of the video?  Now I think we're <a href="https://quoteinvestigator.com/2012/03/07/haggling/">haggling over price</a>.</p>

<p>The photographer <a href="https://paulclarke.com/photography/mother-of-all-photoshoots/">Paul Clarke has a wonderful blog post about enhancing photographs of MPs</a> - take a look at those photos. Are they enhanced or manipulated? Do you feel differently if it is a photo of an MP from "your" side?</p>

<p>But just brightening and colour correcting is fine, right?</p>

<p>This is a well-known problem in legal circles<sup id="fnref:friends"><a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fn:friends" class="footnote-ref" title="With thanks to several anonymous legal friends for pointing me in the right direction." role="doc-noteref">1</a></sup>. <a href="https://www.lawgazette.co.uk/practice-points/photographic-evidence-acceptable-manipulation/5040793.article">Boosting the colouring of a photo may make an injury seem more severe</a>.  Zooming or cropping an image may make someone seem closer to the action than they were.</p>

<p>The Crown Prosecution Service has this to say about video<sup id="fnref:vids"><a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fn:vids" class="footnote-ref" title="There's a good discussion about the admissibility of video evidence in [2002] EWCA Crim 2373" role="doc-noteref">2</a></sup> evidence:</p>

<blockquote><p>In terms of proving the authenticity of the video recording, the Prosecution must be able to show that the video film produced in evidence is the original video recording or an authentic copy of the original and show that it has not been tampered with.</p>

<p><a href="https://www.cps.gov.uk/legal-guidance/exhibits#video">CPS Legal Guidance - Exhibits</a></p></blockquote>

<p>I suppose it's pretty easy to show that the produced evidence can be derived by taking the original and twisting the brightness and contrast knobs. I also guess that the defence could bring in an image manipulation specialist to show that the enhanced version introduces unacceptable changes.</p>

<p>Although that brings with it some problems about whether <a href="https://assets.publishing.service.gov.uk/media/5eb177bd86650c435fa620e4/Regulatory_notice_2019.01_-_Imaging__2_.pdf">an expert in manipulation can say they're an expert about the <em>contents</em> of the media</a>. (No, basically.)</p>

<p>I'll leave you with these words from a House of Lords report in <strong>1998</strong>:</p>

<blockquote><p>The existence of a technology that can be used to modify images in this way need in itself be of no great concern; even the widespread availability of the technology at low cost might not cause concern.</p>

<p>But an apparent lack of understanding of the implications of both these facts should cause concern and warrants further study. The public and all those in the legal profession should be made more aware of the technology, what it can do, and what its limitations are.</p>

<p>It was suggested that criminal convictions that were dependent on evidence captured by digital cameras could be at risk if defence lawyers began to realise how vulnerable such images are to manipulation.</p>

<p><a href="https://publications.parliament.uk/pa/ld199798/ldselect/ldsctech/064v/st0503.htm#n11">Select Committee on Science and Technology Fifth Report</a></p></blockquote>

<p>The trial continues.</p>

<p><ins datetime="2025-04-30T12:28:57+00:00">Update!</ins></p>

<p><a href="https://www.bbc.co.uk/news/live/cvg93k0950pt?post=asset%3A6a86c349-4267-4cbb-bd9b-24eb8ec95e17#post">The BBC reports</a>:</p>

<blockquote><p>The initial video was totally dark, with just the sound of wind and a chainsaw leading up to a giant crash.</p>

<p>A second version has now been shown to the jury, which has been enhanced by a Northumbria Police digital media examiner.</p>

<p>The contrast has been changed, a white border has been put around it and the image has been made brighter.</p></blockquote>

<p>Here's a clip of the enhanced version:</p>

<p></p><div style="width: 620px;" class="wp-video"><video class="wp-video-shortcode" id="video-60538-2" width="620" height="349" preload="metadata" controls="controls"><source type="video/mp4" src="https://shkspr.mobi/blog/wp-content/uploads/2025/04/bbc.mp4?_=2"><a href="https://shkspr.mobi/blog/wp-content/uploads/2025/04/bbc.mp4">https://shkspr.mobi/blog/wp-content/uploads/2025/04/bbc.mp4</a></video></div><p></p>

<p>If you were presented evidence of a completely dark video, how could you be sure that subsequent "brighter" version was derived from the original?</p>

<div id="footnotes" role="doc-endnotes">
<hr>
<ol start="0">

<li id="fn:not">
<p>To be clear, I'm not at the trial.&nbsp;<a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fnref:not" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:friends">
<p>With thanks to several anonymous legal friends for pointing me in the right direction.&nbsp;<a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fnref:friends" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

<li id="fn:vids">
<p>There's a good discussion about the admissibility of video evidence in <a href="https://www.bailii.org/ew/cases/EWCA/Crim/2002/2373.html">[2002] EWCA Crim 2373</a>&nbsp;<a href="https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/#fnref:vids" class="footnote-backref" role="doc-backlink">↩︎</a></p>
</li>

</ol>
</div>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=60538&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2025/04/is-enhancement-the-same-as-manipulation/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		<enclosure url="https://shkspr.mobi/blog/wp-content/uploads/2025/04/bbc.mp4" length="6445777" type="video/mp4" />

			</item>
		<item>
		<title><![CDATA[A small text rendering bug in legal judgements]]></title>
		<link>https://shkspr.mobi/blog/2024/01/a-small-text-rendering-bug-in-bailii/</link>
					<comments>https://shkspr.mobi/blog/2024/01/a-small-text-rendering-bug-in-bailii/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Mon, 22 Jan 2024 12:34:56 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[unicode]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=49416</guid>

					<description><![CDATA[OK, first off, you have to read this amazing judgement about whether Walker&#039;s Sensations Poppadoms count as a potato-based snack for VAT purposes.  Like most judgements, it is written in fairly plain and accessible language. The arguments are easy to follow and it even manages to throw in a little humour.  But if you read closely, you&#039;ll see there are a few instances where an errant question-mark …]]></description>
										<content:encoded><![CDATA[<p>OK, first off, you have to read this <em>amazing</em> judgement about <a href="https://www.bailii.org/uk/cases/UKFTT/TC/2024/TC09024.html">whether Walker's Sensations Poppadoms count as a potato-based snack for VAT purposes</a>.  Like most judgements, it is written in fairly plain and accessible language. The arguments are easy to follow and it even manages to throw in a little humour.</p>

<p>But if you read closely, you'll see there are a few instances where an errant question-mark pops up:</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/01/our-fs8.png" alt="Screenshot of text. Highlighted are a couple of instances of a question mark followed by the letters &quot;o&quot;, &quot;u&quot;, &quot;r&quot;." width="801" height="277" class="aligncenter size-full wp-image-49417">

<p>From context, it is pretty clear the word should be "flour" but is rendered as "?our" - why is that?</p>

<p>The <a href="https://financeandtax.decisions.tribunals.gov.uk/Aspx/view.aspx?id=12932">original PDF judgement can be downloaded from the official Tribunals website</a> (an ancient service which is long overdue for an update).</p>

<p>If you search the PDF the word "flour" and select it, notice what happens:</p>

<p><video width="944" height="201" src="https://shkspr.mobi/blog/wp-content/uploads/2024/01/our.webm" autoplay="" loop="" muted=""></video></p>

<p>Looking at the metadata of the PDF, it appears the file was created with Office 365 which has "helpfully" used a <a href="https://en.wikipedia.org/wiki/Ligature_(writing)">typographic ligature</a> - "ﬂ".</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/01/Ligature_drawing-fs8.png" alt="Drawing showing how two letters can be squashed together to form a new symbol." width="306" height="240" class="aligncenter size-full wp-image-49421">

<p>Ligatures are handy for displaying characters in a pleasing manner - but they can really confuse some software.</p>

<p>One way to deal with this is to use a process called "<a href="https://unicode.org/reports/tr15/">Unicode Normalisation</a>". It is rather dull and technical, but there are plenty of libraries which will split these characters.</p>

<p>Here's how it works for the "ﬁ" ligature:</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/01/Normalisation-fs8.png" alt="Graphic showing the &quot;F&quot; &quot;I&quot; ligature being split." width="503" height="103" class="aligncenter size-full wp-image-49422">

<p>There are a few issues here.</p>

<p>Firstly, Office 365 should <em>not</em> be using Unicode ligatures. The text should have the letters "f" and "l" but it is the <em>font</em> which should display as a ligature.</p>

<p>Secondly, Bailii's processing of the PDF should either cope with normalisation or it should throw loud and explicit warnings when it runs into something it doesn't understand.</p>

<p>Thirdly, as well as Bailii and the Tribunal Service, the PDF is also available at <a href="https://caselaw.nationalarchives.gov.uk/ukftt/tc/2024/31">the more modern Case Law service</a> from The National Archive. Their HTML and PDF documents <em>also</em> have the ligatures, but have subtly different layouts because <a href="https://github.com/nationalarchives/ds-caselaw-pdf-conversion">they have been re-rendered with LibreOffice 7.2</a>.</p>

<p>I've reported the issue to Bailii via their contact form. I've also <a href="https://github.com/nationalarchives/ds-caselaw-ingester/issues/145">raised a bug with The National Archive</a>.</p>

<p>And now I'm off to enjoy some tasty potato-based snacks which have been assessed at the correct level of tax!</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=49416&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2024/01/a-small-text-rendering-bug-in-bailii/feed/</wfw:commentRss>
			<slash:comments>12</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Fruit Of The Poisonous LLaMA?]]></title>
		<link>https://shkspr.mobi/blog/2023/07/fruit-of-the-poisonous-llama/</link>
					<comments>https://shkspr.mobi/blog/2023/07/fruit-of-the-poisonous-llama/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Mon, 10 Jul 2023 11:34:12 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[legal]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=46256</guid>

					<description><![CDATA[A group of authors are suing various vendors of Large Language Model AIs. The authors claim that the AIs are trained on material which infringes their copyright.  Is that likely? Well, let&#039;s take a quick look at the evidence presented.  First up, Meta&#039;s LLaMA Paper. It describes how the LLM was trained:  We include two book corpora in our training dataset: the Gutenberg Project, which contains…]]></description>
										<content:encoded><![CDATA[<p>A group of authors are <a href="https://www.theverge.com/2023/7/9/23788741/sarah-silverman-openai-meta-chatgpt-llama-copyright-infringement-chatbots-artificial-intelligence-ai">suing various vendors of Large Language Model AIs</a>. The authors claim that the AIs are trained on material which infringes their copyright.</p>

<p>Is that likely? Well, let's take a quick look at the evidence presented.</p>

<p>First up, <a href="https://arxiv.org/pdf/2302.13971.pdf">Meta's LLaMA Paper</a>. It describes how the LLM was trained:</p>

<blockquote><p>We include two book corpora in our training dataset: the Gutenberg Project, which contains books that are in the public domain, and the Books3 section of ThePile (Gao et al., 2020)</p></blockquote>

<p>OK, <a href="https://www.gutenberg.org/">Gutenberg</a> is out-of-copyright books. That seems like fair game. But what about Books3?</p>

<p>Let's look at <a href="https://arxiv.org/abs/2101.00027">The Pile Paper</a>. Here's how that describes "Books3":</p>

<blockquote><p>Books3 is a dataset of books derived from a copy of the contents of the Bibliotik private tracker made available by Shawn Presser (Presser, 2020).</p></blockquote>

<p>Following that reference takes us to a <a href="https://twitter.com/theshawwn/status/1320282149329784833">Tweet by Shawn Presser</a> where he describes Book3 as</p>

<blockquote class="social-embed" id="social-embed-1320282149329784833" lang="en" itemscope="" itemtype="https://schema.org/SocialMediaPosting"><header class="social-embed-header" itemprop="author" itemscope="" itemtype="https://schema.org/Person"><a href="https://twitter.com/theshawwn" class="social-embed-user" itemprop="url"><img class="social-embed-avatar social-embed-avatar-circle" src="data:image/webp;base64,UklGRlABAABXRUJQVlA4IEQBAADQCACdASowADAAPqlEnEmmJCMhMdmd+MAVCWMAuWAMiOH94CygL/1Rvgmi0kAKl+jGbyXoQR+dfxsy0G62So9LVvYbY266GGSlokUyKhQAAN9poUGOHMlHFaeqvM0iva/p6gTTGIvVlNQBJUHjMUJl/OqaPw3qxY2I3vzyOFdOMB64A10O1iLx826668YPRA+TrSFQV4mjTAVHEFg/cDu2ZdfzRxsXUwasvZpTwhAAokTjUm2lgBa7r8vjtgcY2gKjWdqJDH07UkuXB/d0rzo9K8hr0iNQ3jJMdtp2tmoAFkcib6multI3rnjQhVTVzfutk910tJcBdW0AqTtYsxscJJJiemkd02nFGgq+sAk7FVCjh3+5eR/xARNKj7n2FgHlkIb45jmgAzJh1Uiw2RKFN6DE3kQxG/yHfckOlOTWA79AAAA=" alt="" itemprop="image"><div class="social-embed-user-names"><p class="social-embed-user-names-name" itemprop="name">Shawn Presser</p>@theshawwn</div></a><img class="social-embed-logo" alt="Twitter" src="data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%0Aaria-label%3D%22Twitter%22%20role%3D%22img%22%0AviewBox%3D%220%200%20512%20512%22%3E%3Cpath%0Ad%3D%22m0%200H512V512H0%22%0Afill%3D%22%23fff%22%2F%3E%3Cpath%20fill%3D%22%231d9bf0%22%20d%3D%22m458%20140q-23%2010-45%2012%2025-15%2034-43-24%2014-50%2019a79%2079%200%2000-135%2072q-101-7-163-83a80%2080%200%200024%20106q-17%200-36-10s-3%2062%2064%2079q-19%205-36%201s15%2053%2074%2055q-50%2040-117%2033a224%20224%200%2000346-200q23-16%2040-41%22%2F%3E%3C%2Fsvg%3E"></header><section class="social-embed-text" itemprop="articleBody">Suppose you wanted to train a world-class GPT model, just like OpenAI. How? You have no data.<br><br>Now you do. Now everyone does.<br><br>Presenting "books3", aka "all of bibliotik"<br><br>- 196,640 books<br>- in plain .txt<br>- reliable, direct download, for years: <a href="https://the-eye.eu/public/AI/pile_preliminary_components/books3.tar.gz">the-eye.eu/public/AI/pile…</a><br><br>thread 👇 </section><hr class="social-embed-hr"><footer class="social-embed-footer"><a href="https://twitter.com/theshawwn/status/1320282149329784833"><span aria-label="1503 likes" class="social-embed-meta">❤️ 1,503</span><span aria-label="25 replies" class="social-embed-meta">💬 25</span><span aria-label="0 reposts" class="social-embed-meta">🔁 0</span><time datetime="2020-10-25T08:32:48.000Z" itemprop="datePublished">08:32 - Sun 25 October 2020</time></a></footer></blockquote>

<p>And then he links to a 37GB file.</p>

<p>So, what is "Bibliotik"? The site itself isn't particularly instructive. But various Torrent forums describe it as:</p>

<blockquote><p>Latest Free Indie Books – As a member of Bibliotik.me, you will not have to wait for a long time to get your hands on the latest free indie book or edition of a particular free indie series. The members of the community upload new free indie books every day to the website’s content library.</p></blockquote>

<p>"Free indie books"? <a href="https://en.wikipedia.org/wiki/Wikipedia:Mandy_Rice-Davies_applies">Mandy Rice-Davis applies</a>, naturally!  Taking a look at <a href="https://github.com/shawwn/mount">a sample file listing</a> shows a number of books which appear to be commercially sold rather than being released for free.</p>

<p>There is a <a href="https://gist.githubusercontent.com/Q726kbXuN/e4e9919a2f5d81f1c2b23bad53dda4d1/raw/99ba9cf49e7a75c7c0f9de58ab6e7bd94bf196ca/books3.list.txt">file listing available (20MB .txt file)</a> - which appears to list the books written by the complainants.</p>

<p>I don't have the time and space to download the 37GB file. Nor do I want the legal liability if it <em>is</em> full of illicit material. But if those authors' books <em>are</em> in there... isn't this a slam dunk case?</p>

<p>Meta literally published a paper where they said "We trained this AI on Intellectual Property which we knew had been obtained without the owners' consent."</p>

<p>Now, you can argue all day about whether an AI being able to summarise a book is fair use. Or if reading a borrowed book is a crime. I'm even happy to hear arguments about whether it is legally binding to say "No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means without the prior written permission of the publisher".</p>

<p>But... come on! If a regular person published a confession about their piracy and how they're storing thousands of pirated works, the copyright goon squad would be knocking down their doors!</p>

<p>I suspect we're about to hear some arguments from AI-maximalists that LLaMA is sentient and that deleting it would be akin to murder - and wiping out AIs trained on stolen property is literally genocide.  I don't believe that for a second.</p>

<p>I want to live in a future where Artificial Intelligences can relieve humans of the drudgery of labour. But I don't want to live in a future which is built by ripping-off people against their will.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=46256&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2023/07/fruit-of-the-poisonous-llama/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Book Review - Future law : emerging technology, regulation and ethics ★★★★☆]]></title>
		<link>https://shkspr.mobi/blog/2021/12/book-review-future-law-emerging-technology-regulation-and-ethics/</link>
					<comments>https://shkspr.mobi/blog/2021/12/book-review-future-law-emerging-technology-regulation-and-ethics/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 12 Dec 2021 12:34:12 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[Book Review]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[MSc]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=41285</guid>

					<description><![CDATA[How will law, regulation and ethics govern a future of fast-changing technologies?  Focuses on the practical difficulties of applying law, policy and ethical structures to emergent technologies both now and in the future. Covers crucial current issues such as big data ethics, ubiquitous surveillance and the Internet of Things, and disruptive technologies such as autonomous vehicles, DIY…]]></description>
										<content:encoded><![CDATA[<img src="https://shkspr.mobi/blog/wp-content/uploads/2021/12/9781474417617.jpg" alt="Book cover featuring a cyborg holding the scales of justice." width="200" class="alignleft size-full wp-image-41286">

<blockquote><p>How will law, regulation and ethics govern a future of fast-changing technologies?</p>

<p>Focuses on the practical difficulties of applying law, policy and ethical structures to emergent technologies both now and in the future. Covers crucial current issues such as big data ethics, ubiquitous surveillance and the Internet of Things, and disruptive technologies such as autonomous vehicles, DIY genetics and robot agents. Asks where law might go next and how to regulate new-phase technology such as artificial intelligence, 'smart homes' and automated emotion recognition. Uses examples from popular culture such as books, films, TV and Instagram - including Black Mirror, Disney princesses, Star Wars, Doctor Who and Rick and Morty - to bring hypothetical examples to life. Bringing together cutting-edge authors from academia, legal practice and the technology industry, this book explores and leverages the power of human imagination in understanding, critiquing and improving the legal responses to technological change.</p></blockquote>

<p>This is a brilliant introduction to the way new technology will craft the need for new laws, and how new laws alter the way we craft new technology. It's a mish-mash of law, tech, and pop-culture - as per the <a href="http://www.gikii.org/">Gikii way</a>.</p>

<p>It starts with a barnstorming explanation of how GDPR relates to Disney® Princesses! It sounds daft, but it is an excellent way to discuss how a right to privacy can be beneficial - and the risks associated with automated data processing ("Mirror, mirror on the wall... What is your lawful basis for the processing of personal data in this manner?")</p>

<p>There's an fascinating section on how so-called smart contracts could be used to write a person's Last Will and Testament. Can automated decisions - and possibly AI - be used to represent a human after they die? If so, what are the legal and societal ramifications of that?</p>

<p>The essay on port mortem privacy was particularly thought provoking and troubling in equal measure.</p>

<p>Some of the essays are only tangentially related to geeky concepts. Including one weird essay where Boba Fett discussed how to use software vulnerabilities to catch Han<strong>s</strong> Solo!</p>

<p>A few of the essays were a little to lawyer-y for me. I had to skip over large chunks about sub-clauses of GDPR and old court cases. But that's the deal with any compilation - not everything will be to your taste, but there is something for everyone.</p>

<p>It's a great read for anyone interested in the intersection of new-tech and modern laws.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=41285&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2021/12/book-review-future-law-emerging-technology-regulation-and-ethics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Is it stealing to read by the light of your neighbour's candle? Or, should companies pay for employees' broadband?]]></title>
		<link>https://shkspr.mobi/blog/2021/03/is-it-stealing-to-read-by-the-light-of-your-neighbours-candle-or-should-companies-pay-for-employees-broadband/</link>
					<comments>https://shkspr.mobi/blog/2021/03/is-it-stealing-to-read-by-the-light-of-your-neighbours-candle-or-should-companies-pay-for-employees-broadband/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 14 Mar 2021 12:48:58 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[covid19]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[wfh]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=38382</guid>

					<description><![CDATA[Back when I worked for an ISP, my employer paid for me to have broadband. I was expected to work from home a few days a month and they needed their workers to have high-bandwidth connectivity.  Because it was a business expense, we all received BIG SCARY WARNINGS that the broadband was only to be used for work. Absolutely no domestic use allowed.  *nudge nudge wink wink*  Of course, everyone…]]></description>
										<content:encoded><![CDATA[<p>Back when I worked for an ISP, my employer paid for me to have broadband. I was expected to work from home a few days a month and they needed their workers to have high-bandwidth connectivity.  Because it was a business expense, we all received BIG SCARY WARNINGS that the broadband was <em>only</em> to be used for work. Absolutely no domestic use allowed.</p>

<p><em>*nudge nudge wink wink*</em></p>

<p>Of course, everyone ignored that directive and used it for web-surfing after-hours.</p>

<p>Was that theft?  Our employer paid the same amount whether we used it for a few emails during the day or for all-night Xbox sessions.  Our extra-curricular use didn't cost the business any money.  There may have been some tax implications for receiving a Benefit-In-Kind, but how do you apportion usage of a service?</p>

<p>Whatever the future brings, I think it's clear that lots of office workers are going to be working from home a few days a week now.  So should your employer pay for broadband?  If so, are you allowed to use it for non-work purposes?</p>

<p>It got me thinking about all the costs I already have to personally bear when working.</p>

<ul>
<li>Commuting. The big one! £3,000ish per year. Most large employers offer a loan to help offset the cost.</li>
<li>Home office costs. Buying or renting a place with enough space to have an office is a significant expense.</li>
<li>Clothing. I've worked jobs where I had to buy the uniform. While I wouldn't usually turn up to work naked, I occasionally have to buy smart-looking clothes.</li>
<li>Lunch. Sure, I could pack sandwiches - but they're yucky after an hour-long commute. So I buy something overpriced from a local shop.</li>
<li>Beer. No, it isn't mandatory to go to after-work drinks. But you want to be a team player, don't you?</li>
</ul>

<p>I'm sure you can add your own examples.</p>

<p>In the UK, top price broadband maxes out at about £50 per month. I don't think that's a <em>huge</em> expense for a business - especially if they're saving on office costs.</p>

<p>Or, am I expected to pay for broadband myself in the same way that I'm expected to own a suit, tie, and sensible shoes?</p>

<p>If not, is it OK to use my work-provided broadband for watching Netflix?</p>

<p>A few years ago, someone was arrested for allegedly using someone else's unsecured WiFi.  Is that theft?</p>

<blockquote><p>"It is a bit like reading your book from the light coming out from someone's window"</p>

<p>Julian Baggini, Philosopher <a href="http://news.bbc.co.uk/1/hi/magazine/6960304.stm">BBC News (2007)</a></p></blockquote>

<p>My wife <a href="https://web.archive.org/web/20250214210720/https://mymisanthropicmusings.org.uk/is-it-stealing-to-read-by-the-light-of-your-neighbours-lamp/">has written about this from a philosophical perspective</a> - you should go read her eloquent take on the issue.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=38382&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2021/03/is-it-stealing-to-read-by-the-light-of-your-neighbours-candle-or-should-companies-pay-for-employees-broadband/feed/</wfw:commentRss>
			<slash:comments>9</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[What Is "Internet Use"?]]></title>
		<link>https://shkspr.mobi/blog/2016/06/what-is-internet-use/</link>
					<comments>https://shkspr.mobi/blog/2016/06/what-is-internet-use/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 05 Jun 2016 16:37:35 +0000</pubDate>
				<category><![CDATA[politics]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[legal]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=22930</guid>

					<description><![CDATA[A former advisor to the Prime Minister was recently convicted on charges of downloading indecent images of underage girls.  I don&#039;t want to go into detail about whether or not his punishment is adequate, but I would like to talk about this curious remark made by the Judge during his sentencing:  beginning today and lasting for two years, you are prohibited from using any device capable of…]]></description>
										<content:encoded><![CDATA[<p>A former advisor to the Prime Minister was <a href="http://www.bbc.co.uk/news/uk-36433568">recently convicted on charges of downloading indecent images of underage girls</a>.</p>

<p>I don't want to go into detail about whether or not his punishment is adequate, but I would like to talk about this curious remark made by the Judge during his sentencing:</p>

<blockquote><p>beginning today and lasting for two years, you are prohibited from using any device capable of accessing the internet unless it has the capacity to retain and display the history of internet use and you make the device available on request for inspection by a police officer. You are also prohibited from deleting such history.

</p><p><cite><a href="https://www.judiciary.gov.uk/wp-content/uploads/2016/06/r-v-rock-sentencing.pdf">R v Patrick Rock. Sentencing Remarks of HHJ McCreath - Southwark Crown Court - 2nd June 2016</a></cite>
</p></blockquote>

<p>On the face of it, this seems quite sensible - but what exactly is "accessing the Internet" and what do we mean by retaining "the history of Internet use"?</p>

<h2 id="history"><a href="https://shkspr.mobi/blog/2016/06/what-is-internet-use/#history">History</a></h2>

<p>By "Internet history", I suspect most people think of a web-browser's "history" function.  Silently recording every page that you've visited.</p>

<p>There are two flaws in this thinking.</p>

<ol>
    <li>All web browsers have an "incognito" mode which prevents a history being created.</li>
    <li>History usually covers pages - not embedded media.</li>
</ol>

<p>I don't know of any way - short of persistent monitoring of a connection - that you could tell if Incognito mode had been used.  That's the whole point in it existing.  It doesn't <em>delete</em> the history - it never records it in the first place.</p>

<p>Is it enough for the offender to say "just because Firefox has an incognito mode, that doesn't mean I've used it."?  Or are they prohibited from using any browser with such a feature?</p>

<p>Secondly, your browser is recording a visit to this specific page in its history.  But it is <em>not</em> recording a visit to the page hosting this image:</p>

<p><a href="https://commons.wikimedia.org/wiki/File:Persian_sand_CAT.jpg#/media/File:Persian_sand_CAT.jpg"><img alt="Persian sand cat" src="https://upload.wikimedia.org/wikipedia/commons/e/e9/Persian_sand_CAT.jpg" height="415" width="600"></a></p>

<p>It would be possible to craft a page full of forbidden content, yet have the browser only record a visit to a seemingly innocuous site.</p>

<p>Similarly, a history may record that you visited a specific page on YouTube - but if the video is subsequently deleted, there's no way to know what its contents were.</p>

<h2 id="the-internet-is-not-the-web"><a href="https://shkspr.mobi/blog/2016/06/what-is-internet-use/#the-internet-is-not-the-web">The Internet is not the Web</a></h2>

<p>It is a common misconception that the Internet is the same thing as the Web.  <a href="https://twitter.com/w3c/status/527763367566405633">It isn't</a>.</p>

<p>There are many different ways to access the Internet on a device. For example, switching on your <a href="https://shkspr.mobi/blog/2016/05/singing-to-my-light-bulbs/">Internet connected lightbulbs</a> doesn't use the Web.</p>

<ul>
    <li>Suppose this person has an Internet connected thermostat.  Does his smarthome have to retain every time he adjusts the temperature?</li>
    <li>What about email?  Can he delete unsolicited spam messages? How about discarding drafts of emails?</li>
    <li>A games console can access the Internet.  But generally doesn't record its Internet use.  So can he play on an Xbox if it isn't connected to his WiFi?</li>
    <li>Most devices will not have access to the encrypted streams that an app requests. So are all apps out of the question unless they also retain a hstory?</li>
    <li>Consider a Skype video call. Is it enough to preserve the metadata (when was the call placed, who were the participants)? Or does the video and audio need to be preserved?</li>
</ul>

<h2 id="thoughts"><a href="https://shkspr.mobi/blog/2016/06/what-is-internet-use/#thoughts">Thoughts</a></h2>

<p>Is it impractical to completely ban someone from using the Internet given how much of modern life relies on it?  If it is, how do you adequately craft an unambiguous order which allows an offender to be monitored without overwhelming complexity?</p>

<p>I'm (obviously) not a legal scholar.  The spirit of this ruling seems to be "you can access the Internet only if we're allowed to inspect everything you do" - but the wording seems (deliberately?) vague and technologically naïve.</p>

<p>Does that embolden the guilty party to look for loopholes?  Does it give the police too much power to arrest on a whim?  Given that it is rarely the "device" which records Internet history, is there any way of practically complying with the order?</p>

<p>What are the alternatives?</p>

<ul>
    <li>Directly monitor the offender's Internet connection? Wouldn't be able to see encrypted traffic. Doesn't stop someone buying a SIM card.</li>
    <li>Install surveillance software on all Internet connected devices? Impossible for Smart TVs, games consoles, eBooks, smart watches, etc.</li>
<li>Only use approved apps on approved devices, and ensure that the phone/laptop/games console/etc can't install anything else? Complex and expensive.</li>
    <li>Ban the offender from buying a burner phone / SIM or using Incognito Mode?  This seems to be what the Judge wants - but it is almost impossible to detect.</li>
</ul>

<p>At this point, we're back where we started. The offender has to be trusted to comply with an order which is easy to unexpectedly break, and those supervising him have an almost impossible job detecting unauthorised use.</p>

<p>I'd welcome thoughts from people better informed than I am.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=22930&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2016/06/what-is-internet-use/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Talking about SMS Spam with Radio 4]]></title>
		<link>https://shkspr.mobi/blog/2015/05/talking-about-sms-spam-with-radio-4/</link>
					<comments>https://shkspr.mobi/blog/2015/05/talking-about-sms-spam-with-radio-4/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 05 May 2015 10:49:09 +0000</pubDate>
				<category><![CDATA[mobile]]></category>
		<category><![CDATA[BBC Interview]]></category>
		<category><![CDATA[dma]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=20973</guid>

					<description><![CDATA[Earlier this week I appeared on BBC Radio 4&#039;s &#34;You And Yours&#34; to talk about the scourge of SMS Spam.  You can listen to it on their website - or, if it has expired, I&#039;ve grabbed an audio clip for your listening pleasure.   	🔊 	 	 		💾 Download this audio file. 	   I&#039;ve asked the Direct Marketing Associate to create a &#34;Do Not Text&#34; list - so that people can opt-out of spam SMS.  They already opera…]]></description>
										<content:encoded><![CDATA[<p>Earlier this week <a href="http://www.bbc.co.uk/programmes/b05ssqzg">I appeared on BBC Radio 4's "You And Yours"</a> to talk about the <a href="https://shkspr.mobi/blog/2015/04/dealing-with-sms-spam-from-paddypower/">scourge of SMS Spam</a>.</p>

<p>You can <a href="http://www.bbc.co.uk/programmes/b05ssqzg">listen to it on their website</a> - or, if it has expired, I've grabbed an audio clip for your listening pleasure.</p>

<p></p><figure class="audio">
	<figcaption>🔊</figcaption>
	
	<audio controls="" loading="lazy" src="https://shkspr.mobi/blog/wp-content/uploads/2015/05/You-and-Yours-SMS-Spam.ogg">
		<p>💾 <a href="https://shkspr.mobi/blog/wp-content/uploads/2015/05/You-and-Yours-SMS-Spam.ogg">Download this audio file</a>.</p>
	</audio>
</figure><p></p>

<p>I've asked the Direct Marketing Associate to create a "Do Not Text" list - so that people can opt-out of spam SMS.  They already operate the <a href="http://www.mpsonline.org.uk/">Mail Preference Service</a> and the <a href="http://www.tpsonline.org.uk/">Telephone Preference Service</a> for opting out of junk mail and calls.</p>

<p>The DMA argues that there's no need for such a service because spam SMS are already illegal.  That strikes me as odd.  It is quite clear that there are networks of personal data brokers who are careless with your personal data.  Creating a universal suppression file would allow text marketers to be sure that they are not <em>inadvertently</em> breaking the law.</p>

<p>The DMA know that there's a problem with SMS Spam - <a href="https://web.archive.org/web/20150419233518/http://www.tpsonline.org.uk/tps/news3.html">they have a whole page dedicated to it</a>!</p>

<p><a href="http://www.tpsonline.org.uk/tps/news3.html"><img src="https://shkspr.mobi/blog/wp-content/uploads/2015/05/TPS-SMS-fs8.png" alt="TPS SMS-fs8" width="1024" height="576" class="aligncenter size-full wp-image-20977"></a></p>

<p>The DMA offers a service to <a href="http://www.fpsonline.org.uk/">opt-out of spam faxes</a>!  Surely it can't be beyond their wit to create a similar system for text messages, can it?</p>

<p>If you've received a Spam SMS, please <a href="http://dma.org.uk/contact">complain to the DMA</a> and ask them to add SMS to their <a href="http://dma.org.uk/articles/preference-services">list of preference services</a>.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=20973&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2015/05/talking-about-sms-spam-with-radio-4/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://shkspr.mobi/blog/wp-content/uploads/2015/05/You-and-Yours-SMS-Spam.ogg" length="3882123" type="audio/ogg" />
<enclosure url="https://shkspr.mobi/blog/wp-content/uploads/2015/05/You-and-Yours-SMS-Spam.mp3" length="3264120" type="audio/mpeg" />

			</item>
		<item>
		<title><![CDATA[The Danger Of Auto Displaying Pictures On Twitter]]></title>
		<link>https://shkspr.mobi/blog/2013/11/the-danger-of-auto-displaying-pictures-on-twitter/</link>
					<comments>https://shkspr.mobi/blog/2013/11/the-danger-of-auto-displaying-pictures-on-twitter/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sat, 30 Nov 2013 12:37:10 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[NaBloPoMo]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=8896</guid>

					<description><![CDATA[The UK has the notion of a &#34;strict liability&#34; law.  If you are caught with a picture of child abuse - you&#039;re guilty of a crime.  It doesn&#039;t matter if it was sent to you unsolicited, or misaddressed.  Possession is the crime and there are no mitigating circumstances.  On that cheery note, let&#039;s consider Twitter&#039;s new image embedding functionality.  If your friends post a photo onto Twitter, you…]]></description>
										<content:encoded><![CDATA[<p>The UK has the notion of a "<a href="https://web.archive.org/web/20131114171407/http://ukcriminallawblog.com/2012/11/27/strict-liability/">strict liability</a>" law.  If you are caught with a picture of child abuse - you're guilty of a crime.  It doesn't matter if it was sent to you unsolicited, or misaddressed.  Possession is the crime and there are no mitigating circumstances.</p>

<p>On that cheery note, let's consider Twitter's new image embedding functionality.  If your friends post a photo onto Twitter, you will see it in your timeline automatically.  No need to click on anything.  (As an aside, that's a feature Dabr and other Twitter apps have had for years).</p>

<p>A few years ago, the <a href="http://thenextweb.com/2009/06/29/britney-spears-twitter-account-hacked-twitpic-vulnerability/">Twitter account of Britney Spears was compromised</a>.  Attackers were able to send an <a href="https://web.archive.org/web/20131214152415/http://blog.twitpic.com/2009/06/email-posting-vulnerability-fixed/">email to her TwitPic account</a> which contained a fake notice of her death.</p>

<p>Imagine, for a moment, if it had contained a pornographic photo.  Everyone who followed Britney would automatically be exposed to explicit images.  An annoyance for some, an employment disciplinary matter for others - and for some, a legal issue.</p>

<p>Suppose a some hacker takes over the account of a well followed Twitter user.  They then upload images which are illegal in the UK - and possibly other countries.  Now, everyone who follows them, has that image in their web browser. It's stored in their cache, it may even have been auto downloaded onto their phone.</p>

<p>That's what happened to me last week.
<img src="https://shkspr.mobi/blog/wp-content/uploads/2013/11/Twitter-explicit-screenshot.jpg" alt="Twitter explicit screenshot" width="248" height="441" class="alignleft size-full wp-image-9180"> A friend posted a photo of the <a href="http://www.amazon.co.uk/gp/product/B00CELB94E/ref=as_li_ss_tl?ie=UTF8&amp;camp=1634&amp;creative=19450&amp;creativeASIN=B00CELB94E&amp;linkCode=as2&amp;tag=shkspr-21">new Beady Eye single</a>.</p>

<p>True, it's not the most explicit image in the world, but it's not the sort of thing you want on your screen at work. Nor do you want it in your browser's cache should someone decide you need investigating.</p>

<p>All of a sudden, all of this user's followers have an (unwanted?) image on their computer.  In this case, half a breast is unlikely to cause much offence - but this could easily have been the <a href="http://en.wikipedia.org/wiki/Virgin_Killer#Wikipedia_controversy">controversial Virgin Killer album cover</a>.</p>

<p>This thrusting of potentially illegal images can also happen by accident - a Twitpic error caused the BBC's technology correspondent to appear to share a photo of a woman "<a href="http://www.bbc.co.uk/blogs/technology/2009/03/causing_offence_by_accident.html">in a pose that can only be described as extremely post-watershed.</a>"</p>

<p>So, what does this mean for Twitter and for strict liability laws?  It's almost impossible for a computer to automatically detect whether an image is offensive or illegal.  Humans aren't much better - and there's a massive cost for pre-emptive moderation.</p>

<p>A wave of spam on social media could be enough to see you convicted on some <em>very</em> nasty charges.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=8896&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/11/the-danger-of-auto-displaying-pictures-on-twitter/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[YQL and The Pirate Bay]]></title>
		<link>https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/</link>
					<comments>https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 02 May 2012 07:17:55 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[jquery]]></category>
		<category><![CDATA[json]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[Star Wars]]></category>
		<category><![CDATA[the phantom menace]]></category>
		<category><![CDATA[the pirate bay]]></category>
		<category><![CDATA[yql]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=5649</guid>

					<description><![CDATA[For reasons best known to themselves, certain sections of the entertainment industries seem to believe that bolting the stable door shutting down The Pirate Bay will stop all piracy.  It&#039;s as though they think that people won&#039;t be able to use a proxy, circumvent the Cleanfeed block, or simply use a search engine to find another torrent site.  Build Your Own Pirate Bay?  Proxying is a very simple…]]></description>
										<content:encoded><![CDATA[<p>For reasons best known to themselves, certain sections of the entertainment industries seem to believe that <del datetime="2012-05-01T08:34:33+00:00">bolting the stable door</del> <a href="http://www.guardian.co.uk/technology/2012/apr/30/british-isps-block-pirate-bay">shutting down The Pirate Bay will stop all piracy</a>.</p>

<p>It's as though they think that people won't be able to use a proxy, circumvent the <a href="http://en.wikipedia.org/wiki/Cleanfeed_%28content_blocking_system%29">Cleanfeed</a> block, or simply use a search engine to find another torrent site.</p>

<h2 id="build-your-own-pirate-bay"><a href="https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/#build-your-own-pirate-bay">Build Your Own Pirate Bay?</a></h2>

<p>Proxying is a very simple concept.</p>

<ul>
    <li>Alice is forbidden from speaking to Bob.</li>
    <li>Alice can speak to Eve.</li>
    <li>Eve can speak to Bob.</li>
    <li>Alice, therefore, can use Eve to communicate with Bob.</li>
</ul>

<p>So, a user who wishes to access The Pirate Bay would have to do something quite complex to use a proxy?  No, this is all there is to it:</p>

<pre>SELECT * FROM html
WHERE url="https://thepiratebay.se/search/ubuntu/0/7/0"
AND xpath='//tr'</pre>

<p>This uses YQL and xpath to extract all the information from a Pirate Bay search (in this case, for Ubuntu - which is legally distributed through Bit Torrent).</p>

<p>Simply, this asks Yahoo (an American site) to contact The Pirate Bay (a Swedish site) to deliver information to a user in Britain.</p>

<p>You can play with the results yourself <a href="https://web.archive.org/web/20120504160649/http://developer.yahoo.com/yql/console/">in the Yahoo Console</a>.</p>

<p>This returns a JSON string which can then be easily parsed (e.g. using jQuery). Simple.</p>

<h2 id="aha-but-what-about-downloading-a-torrent"><a href="https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/#aha-but-what-about-downloading-a-torrent">Aha! But What About Downloading A Torrent?</a></h2>

<p>In the olden days (well, last year) there was a fly in the ointment.  You had to download a .torrent file from the website. That meant that you needed a way to connect to, in this case, The Pirate Bay or find a proxy which was willing to transfer files.</p>

<p>Nowadays, people use the <a href="http://en.wikipedia.org/wiki/Magnet_URI_scheme">magnet protocol</a>.  Here's what a magnet link looks like:</p>

<pre>magnet:?xt=urn:btih:fa692da0488aee23e5eb605a87be934ad7cec106</pre>

<p>Short enough to fit into a text message and, handily, can be embedded in an HTML document with no need to download an extra file.  Paste those 60 characters into your torrent client, and it will connect to the cloud and start downloading the file you requested.</p>

<p>So, a single web request to Yahoo and a line of JavaScript code is all it takes to circumvent this blockade.</p>

<h2 id="next-move"><a href="https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/#next-move">Next Move</a></h2>

<p>So, do the UK courts need to order ISPs to block Yahoo as well?  Or play whack-a-mole with all the new torrent sites springing up?  Let's not forget, in 2004 the huge Bit Torrent search engine <a href="http://en.wikipedia.org/wiki/Suprnova">Suprnova</a> was sued out of existence. Just like with the Hyrda, a decapitation lead to multiple sites springing up.</p>

<p>Piracy is a problem of convenience.  A pirated copy is</p>

<ul>
    <li>Faster to download.</li>
    <li>Quicker to watch (no unskipable trailers).</li>
    <li>More convenient to transfer to different devices.</li>
    <li>Global availability (no artificial regional restrictions).</li>
    <li>Immense back-catalogue (Star Wars, for example).</li>
    <li>Cheaper.</li>
</ul>

<p>The only downsides are that they are often of dubious legality, and occasionally of poor quality.</p>

<p>The entertainment industries have to compete on <strong>all these points</strong>.  I'll admit, that they will almost certainly not be able to compete with "free" - although monthly unlimited subscriptions come close.</p>

<p>The rest are problems of their own making.  I described how <a href="https://shkspr.mobi/blog/2009/05/the-10th-aniversary-of-the-death-of-the-modern-film-industry/">I downloaded The Phantom Menace back in 1999</a>.  13 long years later and the movie industry still isn't even close to where it needs to be.</p>

<p>Amazon have done pretty well from selling raw MP3s - a simple web interface, pay a small bit of money, instant high-quality download which is DRM free.  Where's the equivalent for films? Or for TV? Or radio?</p>

<p>The pernicious restrictions around geography also must end.  I want to watch Veep just as much as the Americans do. Why do I have to wait even an hour, let alone a week?</p>

<p>Finally, Star Wars <em>still</em> isn't available to (legally) download.  If I have a hankering for Jar Jar Binks at 3AM, I have to order a DVD and wait while it is physically transported from a warehouse. That's such a 19th Century way of thinking that it hurts my brain.</p>

<p>Get all that right and maybe - just maybe - the "piracy problem" will solve itself.</p>

<p>Of course, alternatively, it may be too late.  For 13 years people have been used to downloading without paying.  That's a long period of learned behaviour.  How content providers can convince people to change the habit of a lifetime is beyond my knowledge.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=5649&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2012/05/yql-and-the-pirate-bay/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Data Protection and Twitter]]></title>
		<link>https://shkspr.mobi/blog/2012/02/data-protection-and-twitter/</link>
					<comments>https://shkspr.mobi/blog/2012/02/data-protection-and-twitter/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Thu, 16 Feb 2012 14:54:22 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[dpa]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=5341</guid>

					<description><![CDATA[As Twitter now have a UK office, I thought I would see what data they hold about me.  Thanks to the UK&#039;s Data Protection act, it&#039;s really simple to request the information.  I wasn&#039;t expecting a whole CD&#039;s worth of information - like Facebook provides users - but what I did get surprised me.  Twitter UK has no control or responsibility over the user information in the Twitter service and cannot…]]></description>
										<content:encoded><![CDATA[<p>As Twitter now have a UK office, I thought I would see what data they hold about me.  Thanks to the UK's Data Protection act, it's really simple to request the information.</p>

<p>I wasn't expecting a whole CD's worth of information - <a href="http://www.guardian.co.uk/technology/2011/sep/29/facebook-flooded-with-requests">like Facebook provides users</a> - but what I did get surprised me.</p>

<blockquote><p>Twitter UK has no control or responsibility over the user information in the Twitter service and cannot respond to these sorts of requests.</p></blockquote>

<p>So, I was rather surprised to see <a href="https://web.archive.org/web/20180724032027/https://www.privacyinternational.org/blog/1504/what-does-twitter-know-about-its-users-nologs">Privacy International telling people to contact Twitter's UK office</a>.</p>

<p>I'm not sure whether PI are mistaken, or Twitter UK are.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=5341&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2012/02/data-protection-and-twitter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Sky News Infringed My Copyright]]></title>
		<link>https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/</link>
					<comments>https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Fri, 27 Jan 2012 15:00:43 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[sky]]></category>
		<category><![CDATA[sky news]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[YouTube]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=5301</guid>

					<description><![CDATA[UPDATE!  I have reached a settlement with Sky.  Update: 16 March, 2011. They have finally paid up!  tl;dr  Sky News stole my copyrighted work and distributed it without credit or payment.  I asked them to pay £1,500.  They refused.  Full Story  During the recent O2 brouhaha I recorded a video showing how the issue could affect people.  I deliberately gave it the standard YouTube licence rather …]]></description>
										<content:encoded><![CDATA[<h2 id="update"><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#update">UPDATE!</a></h2>

<p><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#settled">I have reached a settlement with Sky.</a></p>

<p>Update: 16 March, 2011. They have <em>finally</em> paid up!</p>

<h2 id="tldr"><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#tldr">tl;dr</a></h2>

<p>Sky News stole my copyrighted work and distributed it without credit or payment.</p>

<p>I asked them to pay £1,500.</p>

<p>They refused.</p>

<h2 id="full-story"><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#full-story">Full Story</a></h2>

<p>During the recent O2 brouhaha <a href="http://www.youtube.com/watch?v=67b4GTI2Tto">I recorded a video showing how the issue could affect people</a>.  I deliberately gave it the standard YouTube licence rather than the Creative Commons licence.</p>

<p>Later that evening, I was alerted to the fact that Sky News had broadcast my video without first seeking permission.</p>

<blockquote class="social-embed" id="social-embed-162228673632669696" lang="en" itemscope="" itemtype="https://schema.org/SocialMediaPosting"><header class="social-embed-header" itemprop="author" itemscope="" itemtype="https://schema.org/Person"><a href="https://twitter.com/gcluley" class="social-embed-user" itemprop="url"><img class="social-embed-avatar social-embed-avatar-circle" src="data:image/webp;base64,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" alt="" itemprop="image"><div class="social-embed-user-names"><p class="social-embed-user-names-name" itemprop="name">Graham Cluley</p>@gcluley</div></a><img class="social-embed-logo" alt="Twitter" src="data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%0Aaria-label%3D%22Twitter%22%20role%3D%22img%22%0AviewBox%3D%220%200%20512%20512%22%3E%3Cpath%0Ad%3D%22m0%200H512V512H0%22%0Afill%3D%22%23fff%22%2F%3E%3Cpath%20fill%3D%22%231d9bf0%22%20d%3D%22m458%20140q-23%2010-45%2012%2025-15%2034-43-24%2014-50%2019a79%2079%200%2000-135%2072q-101-7-163-83a80%2080%200%200024%20106q-17%200-36-10s-3%2062%2064%2079q-19%205-36%201s15%2053%2074%2055q-50%2040-117%2033a224%20224%200%2000346-200q23-16%2040-41%22%2F%3E%3C%2Fsvg%3E"></header><section class="social-embed-text" itemprop="articleBody">Just did Sky News spot about the <a href="https://twitter.com/O2">@O2</a> controversy. From sound of what came down my earpiece they also used <a href="https://twitter.com/edent">@edent</a>'s vid <a href="https://www.youtube.com/watch?v=67b4GTI2Tto&amp;feature=youtube_gdata_player">youtube.com/watch?v=67b4GT…</a>None</section><hr class="social-embed-hr"><footer class="social-embed-footer"><a href="https://twitter.com/gcluley/status/162228673632669696"><span aria-label="0 likes" class="social-embed-meta">❤️ 0</span><span aria-label="2 replies" class="social-embed-meta">💬 2</span><span aria-label="0 reposts" class="social-embed-meta">🔁 0</span><time datetime="2012-01-25T17:41:44.000Z" itemprop="datePublished">17:41 - Wed 25 January 2012</time></a></footer></blockquote>

<p>I grumbled a bit on Twitter and was contacted by a representative of Sky News.  He was very quick in ascertaining that my video was used without my permission and arranged to prevent it being shown again.</p>

<p>I was not happy about this state of affairs.  BSkyB and News International have been very vocal about digital piracy and copyright infringement.  They have relentlessly pursued a copyright maximalist agenda which - I believe - is damaging to the creative industries.  Not to mention rampantly hypocritical.</p>

<p>Sky News accept user generated videos, with this stern warning:</p>

<blockquote><p>Copyright protects the interests of the people and companies who create these products. If the content or product or marks in your video are owned by someone else, you are infringing copyright and run the risk being prosecuted.

</p><p><strong>It is important that you understand that you cannot take other people's creations and use them as you see fit</strong>.

</p><p>Uploading somebody else's video is no different to taking something from a shop without paying. Copyright infringement damages the music, film and television businesses and the future development of music, film and TV programmes.

</p><p>From <a href="https://web.archive.org/web/20111220022940/http://uservideos.sky.com/site-skynews/article/index/faq.html">Sky News' Frequently Asked Questions about user videos</a>.  Emphasis added.
</p></blockquote>

<p>Sky News have a <a href="http://onlinejournalismblog.com/2009/08/19/what-happened-when-sky-news-took-images-from-twitter/">history of ignoring copyright</a> and infringing the moral rights of authors.</p>

<p>Unfortunately, the Digital Economy Act doesn't allow me to sue Sky News for distributing my content for free without my permission.  An individual can lose their Internet access for sharing a movie, however there don't seem to be any sanctions against a large company for sharing my copyrighted work without permission.</p>

<p>I don't have the resources to fight a legal battle against Sky.  So I decided to settle for cold, hard cash.</p>

<p>Originally, Sky made the following offer:</p>

<blockquote><p>For a short youtube video like that we would normally pay around £50 &amp; would be more than willing to pay an extra £25 for the fact you weren't asked in the inconvenience it has caused you.</p></blockquote>

<p>The <a href="http://www.londonfreelance.org/feesguide/index.php?&amp;section=Photography&amp;subsect=Videography&amp;page=INDEX">NUJ publish a freelance rate card</a>. The rate for freelance video should be around £300 per minute.</p>

<p>I farted in Sky's general direction.  I wanted £300 for the broadcast of the video, plus £1,200. I calculated that as £400 for them failing to ask permission, another £400 for them infringing my copyright, and then £400 for them violating my moral rights.</p>

<p>Even if they didn't agree with the above reasoning, it is usual to charge <a href="http://www.londonfreelance.org/feesguide/index.php?language=en&amp;country=UK&amp;section=General&amp;subsect=Rights+and+why+they+are+important&amp;page=Advice">four times time standard licence rate</a> when a copyright owner is asked to assign all rights away.  Effectively, Sky News had unilaterally assigned all my rights to them - so I felt justified asking for this sum.</p>

<p>Overall, I thought £1,500 was reasonable - especially when you consider that <a href="http://www.wonderlandblog.com/wonderland/2011/08/the-daily-mail-knowingly-and-commercially-used-my-photos-despite-my-denying-them-permission.html">the Daily Mail paid £2,000 for using photographs without permission</a>.</p>

<p>Sky came back with an offer of £300.</p>

<p>I pointed out that <a href="http://www.legislation.gov.uk/ukpga/1988/48/section/107">s107 of the Copyright, Designs and Patents Act 1988</a> had provisions for fines of up to £50,000, or a six month prison sentence.  In comparison £1,500 seems modest.</p>

<p>Sky replied:</p>

<blockquote><p>As I indicated, we do not yet agree on a sensible figure for this use.

</p><p>Bearing in mind you are now invoking the Copyright Designs and Patents Act I have placed this matter in the hands of our lawyers.

</p><p>This does not represent an unwillingness to come to an agreement between us but, unfortunately, it is likely to slow the progress slightly.</p></blockquote>

<p>Now I'm waiting to hear back from their lawyers.  I wonder what their hourly rate is?</p>

<p>I'll update this post when I know more...</p>

<h1 id="a-settlement"><a name="settled">A Settlement</a><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#a-settlement">🔗</a></h1>

<p>I have accepted an offer of £300.  A few minutes ago, I received this email from Sky:</p>

<blockquote>After consulting with our Sky lawyers our position is that we believe a £300 settlement is a fair and appropriate sum.
Our position is:
<ul>
<li>The £300 is in respect of what you describes as "infringement of copyright" rather than any "union rate";</li>
<li>Contrary to what you claim, we did not act as if you had assigned us all rights. Specifically, we did not claim ownership nor seek to profit from it by licensing to others;</li>
<li>Criminal liability will not attach in relation to an inadvertent use of footage;</li>
<li>English law does not recognise violation of moral rights;</li>
<li>There is no authority that an infringement in these circumstances attracts four times the usual licence fee.  To the contrary, the usual measure is what the reasonable cost of licensing would have been.</li>
<li>Our offer is generous for the reasons above and we will not increase it.</li>
</ul>
<p>May I also stress that when you are relating this issue to third parties on whatever platform I would consider it unfair if you did not relay the fact that we immediately acknowledged your copyright and sought to bring redress. I stress, once again, that we take copyright and its infringement very seriously at Sky News.</p></blockquote>

<p>I'm not a copyright lawyer, so am in no position to argue against their formidable legal might.  I have invoiced them for £300.  I must point out that - once I contacted them - Sky were very quick to take down the infringing content and have been unfailingly polite in their dealings with me.</p>

<p>I will be donating £100 to both <a href="http://www.openrightsgroup.org/">The Open Rights Group</a> and <a href="http://www.mysociety.org/donate/">MySociety</a>.   And drinking the rest.</p>

<p>Thank you for all your comments, tweets, and messages of support.</p>

<h3 id="footnote"><a href="https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/#footnote">Footnote</a></h3>

<p>I'm currently on holiday - so comment moderation and updates may be delayed.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=5301&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2012/01/sky-news-infringed-my-copyright/feed/</wfw:commentRss>
			<slash:comments>22</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Recording Phone Calls]]></title>
		<link>https://shkspr.mobi/blog/2009/11/recording-phone-calls/</link>
					<comments>https://shkspr.mobi/blog/2009/11/recording-phone-calls/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Fri, 13 Nov 2009 07:00:49 +0000</pubDate>
				<category><![CDATA[mobile]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[NaBloPoMo]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=1124</guid>

					<description><![CDATA[A few months ago I was contacted by dodgy timeshare merchants Club Lacosta.  Being slightly disturbed by their weasely words and reputation for dishonesty, I recorded the call.  Listen to the call on iPadio. The iPadio service died several years ago. There are no backups.  I&#039;ll admit, it&#039;s not the most cutting edge piece of investigative journalism.  To create the recording, I placed the rep on …]]></description>
										<content:encoded><![CDATA[<p>A few months ago I was contacted by <a href="http://www.clublacosta.co.uk/">dodgy timeshare merchants Club Lacosta</a>.  Being slightly disturbed by their <a href="https://web.archive.org/web/20090505214339/http://forum.holidaywatchdog.com:80/Timeshare-&amp;-Holiday-Clubs-Club-La-Costa-Thread-2329.html">weasely words</a> and <a href="http://www.guardian.co.uk/travel/2003/jul/19/budgetingforyourholiday.scamsandfraud">reputation for dishonesty</a>, I recorded the call.</p>

<p><del datetime="2024-11-13T08:04:04+00:00"><a href="https://www.ipadio.com/broadcasts/TerenceEden/2009/09/18/Club-La-Costa-Timeshare-sales">Listen to the call on iPadio</a>.</del> <ins datetime="2024-11-13T08:04:04+00:00">The iPadio service died several years ago. There are no backups.</ins></p>

<p>I'll admit, it's not the most cutting edge piece of investigative journalism.&nbsp; To create the recording, I placed the rep on hold, dialed iPadio, then conferenced the two calls together.&nbsp; Hey presto - the call was recorded.</p>

<p>One thing bothered me though, I hadn't told the cold-caller that I was recording them.&nbsp; At best, it was slightly unethical and rude - at worst it could be illegal.</p>

<p>I was reminded of this when I saw a tweet from <a href="https://web.archive.org/web/20091103111941/http://www.qwghlm.co.uk/">Chris Applegate</a></p>

<style>.social-embed {all: unset;display: block;}.social-embed * {all: unset;display: revert;}.social-embed::after {all: unset;}.social-embed::before {all: unset;}blockquote:not(*) {all: unset;}.social-embed a {cursor: pointer;}blockquote.social-embed {box-sizing: border-box;border: .5px solid;width: 550px;max-width: 100%;font-family: sans-serif;margin: 0;margin-bottom: .5em;padding: 1em;border-radius: 1em;background-color: white;color: black;display: block;}.social-embed-header {display: flex;justify-content: space-between;}.social-embed-user {display: flex;position: relative;align-items: center;text-decoration: none;color: inherit;}.social-embed-avatar {width: 3em;height: 3em;margin-right: .5em;}.social-embed-avatar-circle {border-radius: 50%;}.social-embed-avatar-square {border-radius: 5%;}.social-embed-user-names-name {display: flex;align-items: center;font-weight: bold;margin: 0;}.social-embed-text {margin-top: .5em;}.social-embed-footer {display: flex;align-items: center;justify-content: space-between;}.social-embed-logo {width: 3em;}.social-embed-hr {border: .1px solid;margin: .5em 0 .5em 0;}.social-embed-meta {text-decoration: none !important;color: unset !important;}.social-embed-reply {display: block;}.social-embed-text a, .social-embed-footer time {color: blue;text-decoration: underline;}.social-embed-media, .social-embed-video {border-radius:1em;max-width:100%;}.social-embed-reply{font-size:.75em;display:block;}.social-embed-meter{width: 100%;background: #0005;}</style>

<blockquote class="social-embed" id="social-embed-5586813792" lang="en"><header class="social-embed-header"><a href="https://twitter.com/chrisapplegate" class="social-embed-user"><img class="social-embed-avatar social-embed-avatar-circle" src="data:image/webp;base64,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" alt=""><div class="social-embed-user-names"><p class="social-embed-user-names-name">Chris Applegate</p>@chrisapplegate</div></a><img class="social-embed-logo" alt="" src="data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciCmFyaWEtbGFiZWw9IlR3aXR0ZXIiIHJvbGU9ImltZyIKdmlld0JveD0iMCAwIDUxMiA1MTIiPjxwYXRoCmQ9Im0wIDBINTEyVjUxMkgwIgpmaWxsPSIjZmZmIi8+PHBhdGggZmlsbD0iIzFkOWJmMCIgZD0ibTQ1OCAxNDBxLTIzIDEwLTQ1IDEyIDI1LTE1IDM0LTQzLTI0IDE0LTUwIDE5YTc5IDc5IDAgMDAtMTM1IDcycS0xMDEtNy0xNjMtODNhODAgODAgMCAwMDI0IDEwNnEtMTcgMC0zNi0xMHMtMyA2MiA2NCA3OXEtMTkgNS0zNiAxczE1IDUzIDc0IDU1cS01MCA0MC0xMTcgMzNhMjI0IDIyNCAwIDAwMzQ2LTIwMHEyMy0xNiA0MC00MSIvPjwvc3ZnPg=="></header><section class="social-embed-text"><small class="social-embed-reply"><a href="https://twitter.com/edent/status/5586683646">Replying to @edent</a></small><a href="https://twitter.com/edent">@edent</a> You can record a call for your own purposes, but not reveal to a 3rd party without consent of other caller http://is.gd/4RFDY</section><hr class="social-embed-hr"><footer class="social-embed-footer"><a href="https://twitter.com/chrisapplegate/status/5586813792" aria-label="0 likes" class="social-embed-meta">❤️ 0</a><a href="https://twitter.com/chrisapplegate/status/5586813792" aria-label="0 replies" class="social-embed-meta">💬 0</a><a href="https://twitter.com/chrisapplegate/status/5586813792" aria-label="0 retweets" class="social-embed-meta">♻️ 0</a><a href="https://twitter.com/chrisapplegate/status/5586813792"><time datetime="2009-11-10T12:00:20.000Z">12:00 - Tue 10 November 2009</time></a></footer></blockquote>

<p>The site he mentions is hideously out of date - it talks about <a href="https://web.archive.org/web/20091118172118/http://www.ofcom.org.uk/static/archive/oftel/index.htm">Oftel</a> who ceased to exist in 2003.&nbsp; So, I rang <a href="http://www.ofcom.org.uk/">Ofcom</a> who inherited most of Oftel's functions.</p>

<p>Ofcom were very helpful - recording telephone calls came under the ambit of the <a href="http://www.ico.gov.uk/">Information Commissioner's Office</a>.</p>

<p>So, I rang them.&nbsp; Success! The advisers there pointed me to <a href="http://www.opsi.gov.uk/Acts/Acts1998/ukpga_19980029_en_5#pt4-l1g36">Section 36 of the Data Protection Act</a>.</p>

<blockquote>
<h3 id="domestic-purposes"><a href="https://shkspr.mobi/blog/2009/11/recording-phone-calls/#domestic-purposes">Domestic purposes</a></h3>
<p>Personal data processed by an individual only for the purposes of that individual’s personal, family or household affairs (including recreational purposes) are exempt from the data protection principles and the provisions of Parts II and III.</p></blockquote>

<p>This, according to the ICO, meant individuals are not bound by the DPA.  Of course, it may well be prudent to let people know that they're being recorded and inform them if you intend to publish the conversation - but there is no obligation for <em>individuals</em> to do so.</p>

<p><a href="http://www.currybet.net/cbet_blog/2009/11/gordon_brown_sun_pcc.php">Martin Belam raises some points about the Sun broadcasting a phone conversation with Gordon Brown</a>.&nbsp; While individuals may make recordings and are under no obligation, the whole thing becomes slightly murkier when a company is involved - even if no money changes hands.&nbsp;&nbsp; I think Martin is right; this sort of exploitation of privatley recorded material should be investigated by the PCC.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=1124&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2009/11/recording-phone-calls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
