Actually, no there is not. There is no provision in law that makes obtaining copyrighted materials illegal if the copyright owner doesn't consent other than copying and distributing. If somehow I missed it, show me.
Downloading is copying. Before you download, there is one copy, on the server. After your download, there is still a copy on the server and there is also one on your computer which you directed your computer to write by initiating the download. It's pretty simple, really.
Things like end-to-end encryption (total encryption between the two users communicating like OTR, CryptoCat, Jitzi, etc., not only on each leg to/from the server like HTTPS), making GPG more userfriendly, making Tor more popular, etc.
then dragnet or not, user will be safer on the average, even from non-law abiding 3rd parties. (Not only safe from NSA, but safe from script kiddies too).
What makes you think those products will make you safe from the NSA when the NSA has been found to be intercepting PC shipments, installing their own hardware, and resealing the boxes, then shipping them to the end user?
If you have access to the ATM physically, why not just take the cash there and then?
Because there would only be a finite amount of cash in the machine. By installing this software, you can steal a little bit at a time, and the cash would be reloaded periodically.
...WiFi operates on UNREGULATED spectrum, which means anyone can use, and anyone must accept interference from other users...
and we did EXACTLY the same thing that Mariott was doing, for just that reason.
According to that logic, I can come with a router backpack and prevent all users from connecting to YOUR university network.
That's absolutely true, and we discussed that very scenario at our staff meeting. The conclusion was that about all we could do in that situation is demand that the person with router backpack either turn it off or leave the campus and charge him/her with trespassing if they didn't.
You're confusing unlicensed with unregulated. The FCC regulates ALL the RF spectrum in the US.
With that said...The rules include:
"...no person shall willfully or maliciously interfere with or cause interference to any radio communications of any station licensed or authorized by or under this chapter or operated by the United States Government"
This was definitely willful and arguably malicious as well.
The very law you quoted defeats your argument. First, you are correct that WiFi frequencies are unlicensed, not unregulated. However, the statute you quote says: "...no person shall willfully or maliciously interfere with or cause interference to any radio communications of any station licensed or authorized by or under this chapter or operated by the United States Government" [emphasis added]. So, if the WiFi spectrum is unlicensed, please explain how Marriott is in violation of this statute.
I just read the web page you linked to, and it only affirms my belief that the FCC was acting beyond their authority. First, as several other posters mentioned, I do incorrectly use the term "unregulated" in my post when I meant to say "unlicensed". However reading the web page you link to, the relevant section of the law here is section 333 of the Communications Act which states: "prohibits willful or malicious interference with the radio communications of any station licensed or authorized under the Act or operated by the U.S. Government (47 U.S.C. 333)". The key word there is LICENSNED. WiFi routers operate on UNLICENSED parts of the spectrum, so interfering with communications on those channels is not prohibited by that section of the Act. Reading the other sections that are quoted in that web page, it doesn't appear that Marriott's actions violated any other parts of the Act, so I think the FCC was really overreaching here.
Furthermore, this article seems to focus on jammers, and Marriott was not using a jammer here. They were merely sending de-auth packets. Jammers, as I understand the term refers to a device which creates radio frequency interference in order to interrupt or disable a communications channel.
Doesn't a cellular " jammer " utilize the same methods to prevent folks from using their phones ?
HUGE difference. Cell phones use LICENSED parts of the frequency spectrum, while WiFi uses UNLICENSED parts of the spectrum. Running a cell phone jammer will get you in huge lots of trouble.
Submitter is a tyro. It was, of course, Visicalc which added to the Apple ]['s success. And, before Lotus 1-2-3 on the IBM PC, there was Multiplan.
Multiplan though, didn't have a great deal more functionality than VisiCalc (although it did have a superior user interface in my opinion). Lotus 1-2-3 added graphics. You could now select ranges and make bar graphs, line graphs, and pie charts, and do simple statistical things like finding lines of best fit. This is what really set it apart from VisiCalc and made it the dominant spreadsheet of its time.
Simply require a passport or driving license to register any domain name.
Believe it or not, there do exist domain name registrars outside the UK. They could certainly require this for anyone using the
Corporations want infrastructure, rule of the law, and educated workforce that comes with doing business in US
What, you think Canada doesn't have an educated workforce?
What is research but a blind date with knowledge? -- Will Harvey