{"id":3739,"date":"2007-11-11T13:04:57","date_gmt":"2007-11-11T20:04:57","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cmusings\/2007\/11\/11\/katyals-semiotic-disobedience\/"},"modified":"2007-11-11T22:57:33","modified_gmt":"2007-11-12T05:57:33","slug":"katyals-semiotic-disobedience","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cmusings\/2007\/11\/11\/katyals-semiotic-disobedience\/","title":{"rendered":"Katyal&#8217;s &#8220;Semiotic Disobedience&#8221;"},"content":{"rendered":"<p>If you haven&#8217;t already read Sonia Katyal&#8217;s <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=722441\">&#8220;Privacy v. Piracy&#8221;<\/a> and <a href=\"http:\/\/ssrn.com\/abstract=527003\">&#8220;The New Surveillance,&#8221;<\/a> you should. The articles have proven quite prescient &#8212; with the Sony DRM rootkit and AT&amp;T&#8217;s <a href=\"http:\/\/www.publicknowledge.org\/node\/1259\">announcement<\/a> about forthcoming ISP-level filtering, the notion of &#8220;piracy surveillance&#8221; has become increasingly relevant.<\/p>\n<p>She recently sent me a new article, &#8220;<a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1015500\">Semiotic Disobedience,<\/a>&#8221; which she&#8217;d appreciate feedback on. <\/p>\n<p>&#8220;In this Article, I seek to introduce another framework to supplement<br \/>\nFiske&#8217;s important metaphor: the phenomenon of &#8220;semiotic<br \/>\ndisobedience.&#8221;Three contemporary cultural moments in the world &#8211; one<br \/>\ncorporate, one academic, and one artistic &#8211; call for a new understanding<br \/>\nof the limitations and possibilities of semiotic democracy and underline<br \/>\nthe need for a supplementary framework. As public spaces have become<br \/>\nconverted into vehicles for corporate advertising &#8211; ads painted onto<br \/>\nsidewalks and into buildings, schools, and other public spaces &#8211; product<br \/>\nplacement has soared to new heights of power and subtlety. And<br \/>\nthroughout, the law has generously offered near-sovereign protection to<br \/>\nsuch symbolism through the ever-expanding vehicle of intellectual<br \/>\nproperty protection. Equations between real property and intellectual<br \/>\nproperty are ubiquitous. Underlying these themes is a powerful linkage<br \/>\nbetween intellectual and tangible property: as one expands, so does the<br \/>\nother&#8230;.<br \/>\n&#8220;Just as previous discussions of civil disobedience focused on the need<br \/>\nto challenge existing laws by using certain types of public and private<br \/>\nproperty for expressive freedoms, today&#8217;s generation seeks to alter<br \/>\nexisting intellectual property by interrupting, appropriating, and then<br \/>\nreplacing the passage of information from creator to consumer. This<br \/>\nArticle suggests that the phenomenon of semiotic disobedience offers a<br \/>\nradically different vantage point than Fiske&#8217;s original vision, one that<br \/>\nunderlines the importance of distributive justice in intellectual<br \/>\nproperty. Thus, instead of interrogating the limits of First Amendment<br \/>\nfreedoms, as many scholars have already done, I argue that a study of<br \/>\nsemiotic disobedience reveals an even greater need to study both the<br \/>\ncore boundaries between types of properties &#8211; intellectual, real,<br \/>\npersonal &#8211; and how propertization offers a subsidy to particular types<br \/>\nof expression over others.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you haven&#8217;t already read Sonia Katyal&#8217;s &#8220;Privacy v. Piracy&#8221; and &#8220;The New Surveillance,&#8221; you should. The articles have proven quite prescient &#8212; with the Sony DRM rootkit and AT&amp;T&#8217;s announcement about forthcoming ISP-level filtering, the notion of &#8220;piracy surveillance&#8221; has become increasingly relevant. She recently sent me a new article, &#8220;Semiotic Disobedience,&#8221; which she&#8217;d [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3739","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/comments?post=3739"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3739\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/media?parent=3739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/categories?post=3739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/tags?post=3739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}