My grandmother, the thief!
Paw Prints: Writings of the maddog
Just when you think the copyright and patent laws have reached their peak, more atrocities whack you in the face. After all these years I find out that according to US patent law (35 U.S.C. 161 Patents for Plants) my grandmother was a thief!
My grandmother loved plants. Every year seed catalogs would appear in our mailbox, and grand-mom would pour through them for hours. A couple of weeks later small packages would appear in the mail and a few weeks after that flowers would start to bloom around the yard.
Of course some plants you do not grow from seed. They are propagated asexually, usually by a cutting being taken from one plant and either “rooted” (by putting it in water) or by grafting onto another plant (many fruit trees and grape vines are grafted), but there are other ways such as layering, using “runners” or bulbs. Grandmother belonged to a garden club and the members of this club would exchange cuttings or other “asexual propagators” (grandma would have blushed if I had called it that) in order to get new plants in their garden.
“I have a new cutting that I received from my cousin who lives in Oklahoma,” Grandmother would tell them. A few months later that cutting had grown large enough that other cuttings could be taken from it, and trades happened. Little did Grandmother know that she was breaking major federal laws.
Or was she?
Back in those days many growers did not patent their plants. It is possible that grandmother was simply passing on unpatented plants that were in the public domain. After all, none of the cuttings that she traded had the word “patented” or even “patent pending” displayed in the fiber of the plant. It almost as hard to ascertain with plants if they are patented or not as it is to ascertain with software.
The other issue is that, plants being plants, they tend to “propagate” even without our help, and you never know when those runners, bulbs or “cutting” might escape the confines where we put them and get carried off by a mischievous animal or child. Now, without the benefit of gene analysis, it may be impossible to tell if one particular plant is the same as another plant. And that type of gene analysis is normally not available to the backyard gardener.
The patent laws protecting the “development” of a plant were written as early as 1954, and I know that grandma and her henchmen were busy with their illicit asexual trades back in those days. At least with software we did not start patenting it until the mid-1980s, so in both cases there was lots of time for public-domain “cuttings” to occur naturally.
Perhaps the original sin was not the fact that Adam and Eve ate the apple, but with the Knowledge of Good and Evil, tried to grow a better one from a patented plant.
I am writing this because the average person really does not feel threatened by our patent system and the patents on software. But perhaps if we hit them where it hurts, and show them how "patents run wild" affect everyone, the "grandmothers of today" will understand and help us fight the issue.
Carpe Planta!comments powered by Disqus
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.