Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals
How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals
How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals
Ebook157 pages2 hours

How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Are you an aspiring creative professional who primarily works on a personal computer? If so then you should know one important fact about the work that you create. People can see it without your permission, whenever they want. That's right, your being watched, even as you work on your computer - writing that manuscript, creating that marvelous digital painting, or design. Anyone with the right tools can see what you're doing, and duplicate it in real-time - second per second, as you make it. The same is true, even if your computer is not connected to the internet or network of any kind. Literary works are the most vulnerable to this assault against the creative process. Does all this sound the least bit disturbing to you? If so, it's because I've just given you a brief glimpse at the hindrances that can plague the life of a creative professional that has been marked by Real-time Copyright Infringers.

Why is real-time copyright infringement a problem? It's because this particular variation of intellectual property theft is perpetrated with the intent to hinder creative professionals from profiting on valuable work that they create. With enough cunning and planning, real-time copyright infringers can even claim an artist's work as their own, and get away with it. These perfidious clans of intellectual property thieves work in secret, and they use arcane methods to undermine artists' privacy. This book will teach you how to make simple adjustments to your artistic workflow, which will diffuse or totally nullify the ill-effects of real-time copyright infringement against your creative endeavors.

LanguageEnglish
Release dateJan 29, 2013
ISBN9780984727827
How to Beat Real-time Copyright Infringers Version 2.0: A Savvy Approach for Creative Professionals
Author

Emmanuel C. Flint

Hello, My name is Emmanuel C. Flint and... One of my favorite forms of art is literature because it seems that all forms of communication can be derived from the written word; it possesses the power to inform, transform, enlighten and support the creation of various works, which can convey meaning in our lives. One can construct and deconstruct entire worlds with literature – not to mention lightening up the darkness with wonderfully arrayed words, as they would appear in ink, having been well-received on paper. In recent years I have labored much to gain some mastery thereof; thus, I have developed my own unique form of literary expression that has been baptized by my life-experiences, over the years. Apart from writing, I have been creating visual art since the age of ten. Many years ago while still in adolescence, I decided to pursue a "creative professional" career. During my high school years I sampled various kinds of art such as life drawing, painting, sculpture and foreign animation. By the time I graduated from college I had acquired many self-taught skills - most of all an intermediate knowledge of human anatomy that would prove most useful in years to come. In May of 2001, I graduated from Massachusetts College of Art with a Bachelor of Fine Arts Degree in Illustration. Thenceforth, I took up digital painting and worked as a freelancer for a few years, creating concepts and covers for small graphic novel-based productions. While trying to expand my horizons as a professional, I became interested in 3D graphics. At the time the visual graphics industry was expanding rapidly in both the video game and motion picture arenas. Computer generated art seemed like a limitless world that was full of grand possibilities. In time, I decided to enroll in Digital Media Arts College, where I earned a Masters degree in special effects and 3D animation. When I graduated from the program I was awarded the "Best of Show Award," for my graduate thesis demo reel production in May of 2006. Since then I have been working as a freelancer in 3D graphics. Alongside my freelancing endeavors I spend time developing literary works, with the hope that each will serve as a source of inspiration when I publish them. Ultimately, I aspire to take part in screenplay writing and production, hopefully after I gain some tenure as a novel writer, in the years to come. Although the majority of my work is Christian-based, it has the tendency to appeal to all types of audiences. I currently work and reside in Boston, Massachusetts (USA) where I operative under the business name of Digitalflint.com. Best Regards, Emmanuel C. Flint

Related to How to Beat Real-time Copyright Infringers Version 2.0

Related ebooks

True Crime For You

View More

Related articles

Reviews for How to Beat Real-time Copyright Infringers Version 2.0

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    How to Beat Real-time Copyright Infringers Version 2.0 - Emmanuel C. Flint

    How to Beat Real-time Copyright Infringers

    -

    A Practical Approach for Creative Professionals

    Written by

    Emmanuel C. Flint

    By Emmanuel C. Flint

    Copyright (C) 2013 Emmanuel C. Flint

    Smashwords Edition

    Cover design and interior graphics by Emmanuel C. Flint

    Library of Congress Catalog No. (pending as of 1-28-2013)

    ISBN# 978-0-9847278-2-7

    The subject matter in this book is NOT fictitious. Some hypothetical arguments are contained herein, but just to support the factual content. Any similarity to real persons, living, or dead, is not directly intended by the Author. However, keep in mind that real-time copyright infringement is REAL. If the crimes depicted herein inspire some concerns in you then perhaps you should stop perpetrating them. With the case of law abiding folk, simply ask your local Senator to investigate anything about this book that is shockingly familiar to events in your life. Learn what you can from this book, and use it to overcome the darkness.

    All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without certified written permission, except in the case of brief quotations embodied in critical articles and reviews. Permission for other uses will only be granted at an official proceeding: in the presence of the author, lawyers and independent witnesses of certain note, or credentials.

    Transfer of Rights details: Due to certain realities that I've experienced recently, the rights to this manuscript will only be transferred in certified writing; in a manner that is ceremonious (notarized) and official - with attorneys present for both sides. I expect and hope that such proceedings will include or require the recordation of transfer with the United States Library of Congress. No exclusive rights will be granted or implied by the informal behaviour and/or affiliation between me and another party. This includes acquaintances, family members, and colleagues. I do not employ the use of Oral transfers for any rights reserved. All of the above is ESPEACIALLY TRUE in the case of unexplained and prolonged unemployment - or financial difficulties (if you catch my drift).

    P.S. - If this Author ever says at any time, No you don't have my permission, then you never did.

    For more information contact the author Emmanuel C. Flint.

    eflint@digitalflint.com

    Table of Contents

    Introduction

    Chapter 1: Got Creative Security?

    Chapter 2: Keepin' It Safe.

    Chapter 3: Information Security.

    Chapter 4: Some Basics for Beginning a Project.

    Chapter 5: Real-time Protection for Everyone.

    Chapter 6: Getting More Tech Savvy.

    Chapter 7: Under Lock and Key - Encryption.

    Chapter 8: Get Audacious With Audacity.

    Chapter 9: Social Engineering.

    Chapter 10: The Infringer's Toy Box

    Chapter 11: Contract Terms.

    Chapter 12: Quiz Time.

    Chapter 13: The Final Word

    Bibliography

    Other References

    Appendix A

    Introduction

    Can I ask you a question?

    Do you think it's okay for a creative professional to submit to a group of intimidators who indirectly force him or her to give up the rights to a valuable work of art? Keep in mind that the artist who reluctantly parts with the work will receive no creative mention or proceeds, when the piece is inevitably sold or profited from. Now what if that particular work was worth a million dollars on the open market, whereas the intimidators only sold it for tens of thousands (chump change) through shady back channels?

    It's a sad story indeed.

    Yet, there is something about this sad story that you should be aware of; this type of thing happens more often than you think it does. In fact such things may be happening right around the corner in your neighborhood, against a freelance artist, writer, or a small business owner.

    What can be done about it?

    Well, let me remind you that knowledge is the key to solving problems, and that's why I wrote this book. So, without further delay-

    Let me introduce you to the advent of what I call Real-time Copyright Infringement; a troublesome movement that could put your entire creative career at risk. Its unhindered proliferation will allow the people who perpetrate it to hold your creative efforts hostage. Resistance to such criminal activity tends to invite many social and economic woes.

    Have I gotten your attention yet?

    Well I hope so, because there's a lot more that I have to tell you about this subject. Before I get right down to it I would like to say that I am not an expert in the field of intelligence, law, or anything else that pertains to catching bad guys on an official basis. For all intensive purposes I am a normal guy, with some nice talent in the arts and in recent years - literature. However, I also have a substantial grasp of information technology, and often have a good time doing research about issues that are relevant to the subject matter. In this book I will share some useful information with my fellow artists and creative professionals, who might be interested in learning about a few simple and systematic methods for securing their work from the atypical prying eyes.

    There are some questions that you may have asked yourself when you thought about buying or reading this book. The first question might have been -

    Is this book really important?

    Well, I would like to think, uhm... -

    Hell yeah! Of course it is!

    For starters the knowledge that you will acquire in this book is not the kind that they teach you in the standard vocational schools, for aspiring creative professionals. Having worked as a freelance artist for about a decade now, I can certainly give some of you a few pointers on how to protect yourselves from real-time copyright infringers. As you continue to read on some of the commentary in this book might make you laugh and say,

    HA! That's never going to happen to me!

    Be forewarned; I was inspired to write this book only just recently, for reasons that pertain to my desire to preserve the rights to my own work. I decided to take a stand against those who were using certain illegal and technologically advanced tactics to compromise the exclusivity of my creations. It took a while to understand what they were trying to do. It was only after I untangled their web of obfuscation that I came upon the answer, which was 'easy money' for them. With some research and well thought-out steps I found a way to make them think twice about trying to claim the rights to my work, just because they were using advanced technologies to reproduce them in real-time (as I was creating them). How is this possible, you may ask? Don't worry. I will definitely answer that question to your satisfaction in the later portions of this book.

    By the way, if you are not a techie - fear not. I was oblivious to 75% of the information that is contained in this book until I was well out of school. In truth, it was only after I earned my Bachelors Degree in Illustration and a Masters Degree in 3D Graphics later on that I came across most of what you will read, or discover in this book. So, I almost guarantee you that you won't be too disappointed, because this book will help you become more conscious about protecting your intellectual property from advanced methods of copyright infringement.

    Keep in mind that at any time during your perusal of this book, you don't have to take my word for it. Treat this book as if it were a series of hypothetical suggestions, until you check out the content that I present herein. Do your own research and you'll really understand why this book has emerged at this point in human history. Check out the bibliography at the end, along with my listed references, to give you a bearing for some research venues.

    Now on to the good stuff!

    Chapter 1

    Got Creative Security?

    A creative professional might one day discover that someone seems to secretly know what he or she is doing sometimes, or even all the time. I think that as certain economies get tighter and tougher, such plights may become the norm for talented or gifted people who have not yet made that big break in their respective industries. Though they may have their name and work out there, they often seem to have quite a ways to go in regards to achieving substantial notability for their talent(s). The big advantage that a lot of scammers out there have over artists is that we tend to be too trusting, and not so disciplined in how we approach the task of copyright protection. I mean why would we spend time stressing-out over all that paperwork when we can simply focus on creating awesome-looking stuff?

    Unfortunately, this kind of laid-back attitude towards intellectual property rights protection may have to be a thing of the past, for any serious artist in this modern era. Intellectual property thieves are getting cleverer these days, and they've perfected various advanced methods for stealing valuable creations from artists such as you. This is most certainly the case if they sense that you are an up and coming artist with a lot of valuable talent. Now, if you don't mind me saying so, I feel like I am in that position right now - on the verge, so to speak; I've spent several years freelancing as a Digital Painter, 3D Graphics Artist, and now a Concept Designer.

    Although, I am not quite where I want to be in the creative industry, I am still producing some really competitive work for some decent projects. Nevertheless, I will get there soon, so I continue to be optimistic. One thing that I've learned is that in order get a good name for myself in the concept design biz, I should probably hit high marks in the areas of creativity and innovation in my designs. This is why I tend to guard my really good ideas, and keep them close to my chest until I get to work with a client who will really value them. But what if somewhere out there someone seems to be mysteriously coming across the same concepts and innovations, at the same time that I do? Yes, that's what one would call competition I suppose.... Or simply a coincidence of course. Yet, what if the circumstances surrounding such so called coincidences, begin to get a little bit too close for comfort?

    No, no wait - better yet.

    What if these happy accidents happened a little bit too often? An artist like me would certainly give props to the other guy or gal - once, twice, or thrice even. Hmmmm, although it would be in my best interest to consider what the implications are, if whenever I create something

    Enjoying the preview?
    Page 1 of 1