Strategies for Unbridled Data Dissemination: An Emergency Operations Manual
Mazurov, Nikita. 2015. Strategies for Unbridled Data Dissemination: An Emergency Operations Manual. Doctoral thesis, Goldsmiths, University of London [Thesis]
|
Text (Strategies for Unbridled Data Dissemination: An Emergency Operations Manual)
CUL_thesis_MazurovN_2015.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (4MB) | Preview |
Abstract or Description
This project is a study of free data dissemination and impediments to it. Drawing upon post-structuralism, Actor Network Theory, Participatory Action Research, and theories of the political stakes of the posthuman by way of Stirnerian egoism and illegalism, the project uses a number of theoretical, technical and legal texts to develop a hacker methodology that emphasizes close analysis and disassembly of existent systems of content control. Specifically, two tiers of content control mechanisms are examined: a legal tier, as exemplified by Intellectual Property Rights in the form of copyright and copyleft licenses, and a technical tier in the form of audio, video and text-based watermarking technologies.
A series of demonstrative case studies are conducted to further highlight various means of content distribution restriction. A close reading of a copyright notice is performed in order to examine its internal contradictions. Examples of watermarking employed by academic e-book and journal publishers and film distributors are also examined and counter-forensic techniques for removing such watermarks are developed. The project finds that both legal and technical mechanisms for restricting the flow of content can be countervailed, which in turn leads to the development of different control mechanisms and in turn engenders another wave of evasion procedures. The undertaken methodological approach thus leads to the discovery of on-going mutation and adaptation of in-between states of resistance.
Finally, an analysis of various existent filesharing applications is performed, and a new Tor-based BitTorrent tracker is set up to strengthen the anonymization of established filesharing methods. It is found that there exist potential de-anonymization attacks against all analyzed file-sharing tools, with potentially more secure filesharing options also seeing less user adoption.
Item Type: |
Thesis (Doctoral) |
Identification Number (DOI): |
|
Keywords: |
Piracy, counter-forensics, intellectual property, copyleft, posthumanism, illegalism, critical theory |
Departments, Centres and Research Units: |
|
Date: |
31 December 2015 |
Item ID: |
16589 |
Date Deposited: |
04 Feb 2016 15:52 |
Last Modified: |
18 Oct 2022 12:39 |
URI: |
View statistics for this item...
Edit Record (login required) |