Skip to main content
Skip to content
1 duplicate copy in the archive
Case File
d-34165House OversightOther

Bibliographic list on copyright, DRM, and cryptocurrency with no actionable allegations

The passage consists solely of citations and general commentary on technology topics, lacking any specific names, transactions, dates, or allegations that could be pursued as an investigative lead. Provides sources on copyright law, DRM, and cryptocurrency. Mentions EPA opposition to VW emissions rules (but only in a citation, no new claim). No direct connection to high‑profile individuals or misc

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #024261
Pages
1
Persons
6
Integrity
No Hash Available

Summary

The passage consists solely of citations and general commentary on technology topics, lacking any specific names, transactions, dates, or allegations that could be pursued as an investigative lead. Provides sources on copyright law, DRM, and cryptocurrency. Mentions EPA opposition to VW emissions rules (but only in a citation, no new claim). No direct connection to high‑profile individuals or misc

Tags

copyrightcryptocurrencytechnology-policyhouse-oversightdigital-rights-management

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
e Matthew Green, Napster Opens Pandora’s Box: Examining How File-Sharing Services Threaten the Enforcement of Copyright on the Internet, 63 Oh. St. L. J. 799 (2002) http://moritzlaw.osu.edu/students/groups/oslj/files/2012/03/63.2.green_.pdf archived at https://perma.cc/H77J-TN43. e Brad Hill, “The iTunes Influence, Part |: How Apple Changed the Face of the Music Marketplace,” Engadget (April 29, 2013) https://www.engadget.com/2013/04/29/the-itunes-influence-part-one/ archived at https://perma.cc/MEU4-W5N9. e David Kravets, “10 Years Later, Misunderstood DMCA is the Law That Saved the Web,” Wired (October 27, 2008) https:/Awww.wired.com/2008/10/ten-years-later/ archived at https://perma.cc/VH2T-7S7V. e Lawrence Lessig, The Creative Commons, 55 Fla. L. Rev. 763 (2003) http://homepages.law.asu.edu/~dkarjala/OpposingCopyrightExtension/commentary/Less igCreativeCommonsFlaLRev2003.htm archived at https://perma.cc/T7UD-JHYZ. e Alex Davies, “The EPA Opposes Rules That Could’ve Exposed VW’s Cheating,” Wired (September 18, 2015) https://www.wired.com/2015/09/epa-opposes-rules-couldve-exposed-vws-cheating/ archived at https://perma.cc/W4RK-Q6QJ. DRM and HTML5 background readings: e “Information about W3C and Encrypted Media Extensions (EME)” W3C (March 2016) https://www.w3.orgq/2016/03/EME-factsheet.html archived at https://perma.cc/4ZPR-DXTA. e Peter Bright, “DRM in HTMLS5 is a victory for the open Web, not a defeat,” Ars Technica (May 10, 2013) http://arstechnica.com/business/2013/05/drm-in-html5-is-a-victory-for-the-open-web-not- a-defeat/ archived at https://oerma.cc/UM8C-NFPV. Day 3: Cryptocurrency One view of the progression of digital technology has been roughly from amateur to professional, from open to closed, and from chaotic to ordered -- as the early successes from left field of Google, Facebook, and Twitter enter publicly-traded adulthood. At the ripe year of 2017, are there still digital disruptions to be had? The phenomenon (and increasing literal value) of cryptocurrency -- and, for that matter, the foundational blockchain technologies on which it can be based -- seems to indicate that there are still surprises from left field. What does the rise of cryptocurrency tell us about the state of cyberspace, and what should we expect -- and hope for -- next? Readings: Introduction

Technical Artifacts (14)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainawww.wired.com
URLhttp://arstechnica.com/business/2013/05/drm-in-html5-is-a-victory-for-the-open-web-not
URLhttp://homepages.law.asu.edu/~dkarjala/OpposingCopyrightExtension/commentary/Less
URLhttp://moritzlaw.osu.edu/students/groups/oslj/files/2012/03/63.2.green_.pdf
URLhttps://oerma.cc/UM8C-NFPV
URLhttps://perma.cc/4ZPR-DXTA
URLhttps://perma.cc/H77J-TN43
URLhttps://perma.cc/MEU4-W5N9
URLhttps://perma.cc/T7UD-JHYZ
URLhttps://perma.cc/VH2T-7S7V
URLhttps://perma.cc/W4RK-Q6QJ
URLhttps://www.engadget.com/2013/04/29/the-itunes-influence-part-one
URLhttps://www.w3.orgq/2016/03/EME-factsheet.html
URLhttps://www.wired.com/2015/09/epa-opposes-rules-couldve-exposed-vws-cheating

Related Documents (6)

House OversightSep 19, 2013

AGI Research Paper by Ben Goertzel et al. – No Evident Investigative Leads

AGI Research Paper by Ben Goertzel et al. – No Evident Investigative Leads The excerpt is merely a citation of an academic paper on artificial general intelligence with no mention of individuals, transactions, or misconduct. It provides no actionable investigative information. Key insights: Document is a technical overview of AGI research.; Authors are Ben Goertzel, Cassio Pennachin, Nil Geisweiller.; Date: September 19, 2013.

1p
House OversightMay 20, 2017

House Oversight Document Titled 'Breaking Down Democracy: Goals, Strategies, and Methods of Modern Authoritarians' (June 2017)

House Oversight Document Titled 'Breaking Down Democracy: Goals, Strategies, and Methods of Modern Authoritarians' (June 2017) The passage contains only a title, author name, and date, with no substantive details, names, transactions, or allegations that could be pursued as an investigative lead. Key insights: Document dated June 2017; Authored by Arch Puddington; Title suggests analysis of authoritarian tactics

1p
Dept. of JusticeAug 22, 2017

15 July 7 2016 - July 17 2016 working progress_Redacted.pdf

Kristen M. Simkins From: Sent: To: Cc: Subject: Irons, Janet < Tuesday, July 12, 2016 10:47 AM Richard C. Smith     Hello Warden Smith,     mother is anxious to hear the results of your inquiry into her daughter's health.   I'd be grateful if you could  email or call me at your earliest convenience.  I'm free today after 2 p.m.  Alternatively, we could meet after the Prison  Board of Inspectors Meeting this coming Thursday.    Best wishes,    Janet Irons    1 Kristen M. Simkins From: Sent:

1196p
House OversightUnknown

Syllabus for MIT/HLS course on Internet governance and cyberlaw (Winter 2017)

Syllabus for MIT/HLS course on Internet governance and cyberlaw (Winter 2017) The document is a routine academic syllabus with no mention of specific actors, transactions, or allegations. It provides no actionable leads, novel information, or connections to powerful individuals or agencies. Key insights: Course taught by Jonathan Zittrain and Joi Ito at Harvard Law School.; Focuses on internet governance, copyright, privacy, and platform regulation.; Schedule runs Jan 3‑13, 2017, with daily sessions.

1p
House OversightSep 28, 2016

Epstein Investigation Files Reveal Potential High‑Level Collusion, Suppressed Evidence, and Questionable Plea Deal

Epstein Investigation Files Reveal Potential High‑Level Collusion, Suppressed Evidence, and Questionable Plea Deal The document contains multiple concrete leads that, if verified, tie a roster of powerful individuals—including Prince Andrew, Donald Trump, Bill Clinton, Henry Kissinger, Ted Kennedy, and others—to Jeffrey Epstein’s illegal activities or to the suppression of evidence. It also details alleged misconduct by the Palm Beach State Attorney’s Office, the involvement of high‑ranking lawyers (Dershowitz, Starr, Lefkowitz) in shaping a non‑prosecution agreement, and a possible extortion scheme by former Epstein employee Alfredo Rodriguez. These points suggest actionable investigative steps (e.g., subpoenaing Rodriguez’s notebook, tracing the alleged $50,000 payment, reviewing the non‑prosecution agreement, interviewing the listed high‑profile contacts). The controversy is extreme, the information is largely unpublished in this detail, and it implicates senior officials and political figures, meeting the criteria for a high‑impact lead. Key insights: Alfredo Rodriguez possessed a bound notebook containing names, addresses, and phone numbers of dozens of high‑profile individuals (Kissinger, Jagger, Hoffmann, Koch, Ted Kennedy, Donald Trump, Bill Clinton, Ehud Barak).; Rodriguez attempted to sell this notebook to an undercover FBI operative for $50,000, indicating possible extortion and obstruction of justice.; State Attorney Barry Krischer negotiated a non‑prosecution agreement (NPA) that granted immunity to co‑conspirators, including Sarah Kellen and Nadia Marcinkova, while limiting charges against Epstein.

1p
House OversightFinancial RecordNov 11, 2025

Harvard Law & MIT Media Lab Course Syllabus on Internet Governance and Technology

The document is a course syllabus listing topics, readings, and instructor contacts. It contains no specific allegations, financial transactions, or actionable leads linking powerful individuals or ag Course taught by Jonathan Zittrain (Harvard) and Joi Ito (MIT Media Lab). Topics cover right to be forgotten, cryptocurrency, surveillance, net neutrality, AI, etc. Includes references to public read

15p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.