Feeds

Vote against a paid-for Pigopolist pol!

Insurgent candidates surface

  • alert
  • submit to reddit

The essential guide to IT transformation

Bought and paid-for representatives of the entertainment oligopolies in Washington could find themselves facing challenges back home.

A 26-year old will oppose Howard Coble (R) as a single-issue candidate. Well, not strictly as a single issue: Tara Grubb is the Libertarian Party candidate who says she'll campaign on a single issue, the "Internet", which again sounds like a lot of issues [pl.].

Democrat Senator and former Presidential wannabee Joe Biden, who also benefits from the Pigopolists' largesse, is also in the frame for an insurgency candidate.

The idea of picking two vulnerable representatives - one from each party - was first hatched by Doc Searls and friends in an organized attempt to adopt the Pigopolists' tactic of buying influence in DC by forming GeekPAC. (A PAC is a fund-raising committee).

Lawrence Lessig welcomed the move in his blog. "Man, that would be a coup. Just the sort of thing they would say the geeks could never do," he wrote.

Indeed. And Lessig tips his own choice Hank Perritt, against incumbent copyright Taliban Mary Bono. And how we'd love to see a challenge against Howard Berman the man who wants the right to hack into your computer - and who our own Thomas C Greene brilliantly and accurately described as the House Hollywood sock puppet.

It'll be a great test of how effective computer users are at persuading the public at large that their freedoms are being taken away. So far, they've lacked the will or the courage to do so effectively. I identified a couple of reasons why here, and Register readers have elaborated on the topic most recently yesterday, discussing a parallel open "Stuckist" Net.

One of those correspondents Brian Hurt elaborated in a follow-up.

"Want to see a hundred people look at their shoes simultaneously? Ask a roomful of geeks how many of them would be willing to vote for the "other guy" if he'd support our cause. If you generally vote Democratic, what would it take to make you vote republican? If Republican, Democratic? I've done it. Or you could ask a bunch of SF fans or space proponents the same question, and get the same response (I've done that too).

"This is what the pro-gun (and anti-gun) lobbies do, every other lobby that's effective. Move as a unit. It has been said that managing programmers is like herding cats. We- and I'm a programmer myself- are not good at being part of the herd."

And he isn't optimistic:-

"But OK. Let's assume, for a moment, that such a lobby does coalesce."

"And that the highly individualistic, anarchistic-libertarian tending, geek subculture does decide to start voting as a block. What happens? Birds sing, government catches a clue, bells ring out freedom, and we all live happily ever after?"

"Try again. Take a long hard look at how the anti-corporatist movement is being treated in the mainstream media. We'd be lucky to only be called 'hooligans', and not 'terrorists'."

Or labelled as a right-wing insurgency. There's sure to be a swell of support from the heavily partisan Republican corner of the blogosphere, keen to tip the balance of the House back their way. So unless, as Lessig points out, "balance" is preserved, this campaign will get nowhere.

My only quibble with GeekPAC is a complaint that the insurgent candidates will also need to disarm. The name's wrong. Being a geek by definition suggests you're marginal, and so it's very easy for the mass media to marginalize the campaigns. Fair use, such as sharing music you've bought legally is not a marginal activity: it's a noble populist cause.

It needs an umbrella term as attractive as "Sunshine" legislation, which opened public representatives to greater public scrutiny. Any suggestions? ®

Related Stories

Hollywood's private war for social control
Valenti backs away from P2P hack bill
Congress to turn hacks into hackers
Music biz wants tougher DMCA, CPRM 2 to protect copyright

Practical Stuckism
The Meatspace Mailbag">
l">Bill Thompson answers critics
Damn the Constitution: Europe must take back the Web

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.