{"id":79,"date":"2008-11-03T13:12:51","date_gmt":"2008-11-03T17:12:51","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cyberone\/?p=79"},"modified":"2008-11-03T13:12:51","modified_gmt":"2008-11-03T17:12:51","slug":"in-plain-english-quashing-subpoenas","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cyberone\/2008\/11\/03\/in-plain-english-quashing-subpoenas\/","title":{"rendered":"In Plain English: Quashing Subpoenas"},"content":{"rendered":"<p>Matt Sanchez from the RIAA group explains why we&#8217;re moving to quash the subpoena against Joel&#8217;s sister, and how it fits into the broader pattern of using civil process to victimize Joel.<\/p>\n<p><code>[kml_flashembed movie=\"http:\/\/youtube.com\/v\/EoC2nlgfWV8\" width=\"425\" height=\"350\" wmode=\"transparent\" \/]<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Matt Sanchez from the RIAA group explains why we&#8217;re moving to quash the subpoena against Joel&#8217;s sister, and how it fits into the broader pattern of using civil process to victimize Joel. [kml_flashembed movie=&#8221;http:\/\/youtube.com\/v\/EoC2nlgfWV8&#8243; width=&#8221;425&#8243; height=&#8221;350&#8243; wmode=&#8221;transparent&#8221; \/]<\/p>\n","protected":false},"author":1542,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[923,387],"tags":[],"class_list":["post-79","post","type-post","status-publish","format-standard","hentry","category-blog","category-riaa"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/posts\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/users\/1542"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/posts\/79\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/media?parent=79"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/categories?post=79"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberone\/wp-json\/wp\/v2\/tags?post=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}