How to Edit Audio: A Beginner's Guide

Editing audio is pretty simple once you get the hang of what does what and where to find the button that will allow you to do what you want. After reading this guide, you will be able to do simple sampling, equalize levels, and eliminate dead air time amongst other things. For this guide, we'll assume you know nothing about editing audio.

What Programs You May Need

1. Download Audacity for Windows/PC or Mac - A free, open-source digital audio editor with all the features of an expensive professional program without the steep learning curve.

2. Download the LAME MP3 encoder for Windows/PC or Mac and put it in the same directory as Audacity. You will need to locate it the first time you export to MP3.

The Basics

1. Open Audacity

2. Select File-->Open and choose the file you wish to edit (we're assuming you already have your audio file. If you are looking to record audio, see the "Create" section of How to Make a Podcast).

3. You should see a graphic display of your file. If your file was recorded in stereo, you will see two identical images, one for each stereo channel. Any changes you make on one will apply to the other, so for now, just pick one and ignore the other.

4. For now, we'll focus on two major tools: the selction tool and the zoom tool. You can see both along with a few other tools in the upper left hand of the program just below the main menu. By default, your mouse is set to the selection tool, which looks like a word-processing cursor when you mouse over the audio image. We'll get back to this because you're going to use it a lot. The zoom tool looks like a magnifiying glass and does exactly what you would expect. When you select the zoom tool, left-clicking the audio image will zoom in and right-clicking will zoom out.

5. There are two ways to play the audio and navigate to other portions of the file. One way is to press the space bar on your computer. This will play and stop the audio. If you are using the selection tool, you can click on any part of the audio image and press the space bar for the audio to play from that point (like if want to start listening in the middle of a song instead of the beginning). You will see though, that if you stop the audio and start it again, it will play from the original part you clicked on, NOT from where you stopped it. If that doesn't make sense, don't worry, you will recognize it as soon as you start playing around with the program. The other way to play, stop, fast-forward, etc. is by using the familiar stereo-type buttons under the main menu.

6. Don't be afraid to play around. If you are ever unsure of what you just did, press "Ctrl+Z" to undo your changes.

Simple Editing: Eliminate Dead Air

Let's say you are making a podcast and everything is cool, but you want to cut out 45 seconds of dead air that got recorded at the beginning of the file while you set-up your equipment. Here's how:

1. Magnify your file until you can clearly see the dead space at the beginning of the recording (or wherever else it is). In the graphical representation of your audio file, the taller an area, the louder it is. So you are looking for the area that's like a flat line.

2. Switch to your selection tool and click on one end of the dead area (it doesn't matter which side you start from). While holding the mouse cursor down, drag your cursor to the exact opposite end of the dead area and release your mouse button. If the flat line is selected properly, it will be highlighted in grey.

3. To remove the selected area, simply push delete on your keyboard. Audacity will automatically snap everything back together so there aren't any gaps left from the deleted area.

Basic Mixing: Equalize Levels

There may be parts of your audio that are annoyingly louder or softer than others (maybe you got too close or too far from the mic or an ambulance drove by). This is what you can do:

1. Find the area of your audio file that is too loud or too soft (either by listening to it or by looking for areas of the image that are taller or shorter than the others) and zoom in enough to see what you are selecting.

2. Select the area where you would like to increase or decrease the volume using the selection tool (see the section on Simple Editing above if you are having trouble).

3. Under the main menu, select Effects-->Amplify. To decrease the volume, move the slide bar to the left. Move the bar to the right to increase the volume. If you increase the volume too much, you will have to select the check box to "Allow clipping." You'll have to play around a bit untill you get a feel for how much you can increase or decrease the volume. Generally, you shouldn't need to go more than "+" or "-" 5dB in either direction (but there are plenty of exceptions). Remember, you can always hit "Ctrl+Z" on your keyboard to undo any changes.

Find additional articles by

Unpublished

How to Browse the Internet Anonymously and Take Control of Your On-Line Identity

The only thing that can guarantee the anonymity of your online identity is to not go online. With that being said, there are a couple of programs that can help.

Tor - This program anonymizes your IP address. For example, if you are connecting to the Internet from Irvine, your IP address might show up as Romanian. Tor also lets you select a new identity whenever you want, so you can view one page as an Argentinian and the next page as an Egyptian. Here's what to do:

1. Download Tor (including Privoxy and Vidalia) for Windows/PC or Mac.

2. Tor works best with the Firefox browser. Download it if you aren't using it and install the Torbutton extension.

3. Make sure Tor, Vidalia, and Privoxy are all running. To test if it is working, go to an IP locator and refresh the page after selecting the "New Identity" feature from Vidalia's menu. If it work's, your IP will be in a different part of the world.

NOTE: Tor can slow down your browser speed depending on your set-up. Also, some sites that record IP addresses of anonymous users, like Wikipedia, can detet IP anonymizers and limit their priveleges (i.e. not allow you to make edits or posts).

PeerGuardian - This program blocks incoming and outgoing connections that might compromise your online identity or security. You can choose which range of connections you want to block, including: advertising, government, educational, peer-to-peer, and spyware.

1. Dowload PeerGuardian for Windows/PC or Mac.

2. Use the "Check for Updates" feature often. PeerGuardian maintains a list of IPs that are potentially dangerous and the software is only as effective as the most recent list.

3. If PeerGuardian is set-up properly, you will not be able to navigate to certain sites that are on the block list (for example, Disney-owned sites like disney.com, abc.com, or espn.com). You can go to the URL, but the page will not load.

NOTE: As of 11/1/07, PeerGuardian is experiencing difficulties with manual list updates. The automatic update feature should not be affected.

Find additional articles by

Related Topics: 

Related Types of Content: 

New version of open source image creation and editing software The Gimp version 2.4 released

We are big fans of The Gimp at New Media Rights. The new version, 2.4, looks slick, and promises to be the best Gimp version yet.

So go get an idea of all the new features, and then upgrade or give it shot for the first time. Hey it's FREE, and it's as good as any software available for image creation and editing.

It's available for free, complete version download for

Windows (GIMP does not release a Windows binary, so you should make sure to download it here from Jernej Simončič.)

MAC OSX

Linux (Gnome, KDE, Xfce)

Once you've got it installed (simply click the executable file in Windows to install), you can review detailed documentation to get you off and running with The Gimp. Note that The Gimp even has animation ability with its GAP plugin, so the sky's the limit!

This is yet another example of open source software outpacing proprietary models. We've even had internal experiences where staff who were long time Photoshop (made by some company with a name that rhymes with Kanobe) users and now are convinced The Gimp is where it's at for image creation and editing.

Find additional articles by

How to Upload, Store, and Share Photos and Images

There are a number of ways to share and host your photos online for free. One option we will discuss here is Flickr.

1. Sign-up for a free Yahoo! email account if you don't already have one.

2. Log in to Flickr with your Yahoo! account.

3. You can now begin to upload your photos. If the buttion is not immediately visible, select "Upload Photos" under the "You" tab.

4. Once your photo has been uploaded, you can change the title, add a description and tags, or create a set (or photo album). If you do not want others to see a photo, make sure the privacy setting is at "private."

5. If your photo is public, Flickr offers a number of licensing options. You can change the licensing on your photo by selecting the photo and looking under the "Additional Information" heading to the right of the image. We strongly urge anyone to select one of the Creative Commons licenses that are available.

6. Your images are now hosted and can be posted on other websites that do not offer hosting themselves. To find your image's URL, select the image and click "All Sizes." At the bottom of the page is a box entitled, "Grab the photo's URL."

Find additional articles by

Sample DMCA section 512 counternotice letters and other resources

This guide, originally created by the Fair Use Network, has been edited by New Media Rights, and is provided for users and creators who have received a DMCA section 512 "takedown" notice.

Here are two sample counternotices to cover two common situations. We stress that these should be considered samples or models only. While a takedown counternotice only needs to comply with a few key points to be legally valid, anyone considering filing a counternotice should understand the legal implications of the DMCA § 512 process and the underlying legal claims.

Sample Counternotices:

Counternotice for fair use [512(c) webhost]
Counternotice for non-copyright claims [512(c) webhost]

Other Resources:

DMCA § 512(g) Counternotice Generator at Chilling Effects
Browse some actual counternotices at Chilling Effects
Does the notice include more than just DMCA § 512 claims? Review the 'Cease & Desist!' Guide.

Find additional articles by

Step 4. Assessing the options and taking action.

This guide, originally created by the Fair Use Network, has been edited by New Media Rights, and is provided for users and creators who have received a DMCA section 512 "takedown" notice.

Step 4. Assessing the options and taking action.

The possible responses to a takedown notice are limited. Most ISPs will "expeditiously" take down the targeted material. The person whose material is taken down can choose to let it go (that is, to acquiesce); to try to get it restored; to try to resolve the dispute through compromise; and/or to take a proactive approach through media attention or a lawsuit.

Although acquiescence comes first in this list, that does not suggest that that acquiescence is the best solution in any particular situation. Rather, takedown notice targets should understand their own rights, and respond accordingly. Fair use and other free expression safeguards in IP law can atrophy if they are not understood and used.

It may be worthwhile to consult an attorney.

Below we discuss what a recipient, or her attorney, might do in response to a section 512 takedown.

Acquiesce / let it go. Someone whose material has been targeted may decide to just let it go, either because he concludes that his material may in fact infringe the sender's copyright, or because he feels it's not worth the effort to fight it. Acquiescence may not be the end of the matter, though. While getting information successfully removed from the Internet, or de-indexed, might mollify the rights holder, she may still decide to sue for damages or harm she feels has already occurred.

File a counternotice. If the use is justified, it is a fairly simple matter to file a counternotice. Reviewing sample counternotices can provide guidance, as can Chilling Effects' counternotice generator. Filing a counternotice makes it no more or less likely that the user will win if the dispute ends up in court.

Counternotice Samples

Cease & Desist 101 for claims other than DMCA § 512 takedown notices

Try to resolve the dispute. The person targeted by a takedown notice can try to resolve the dispute, often by proposing some sort of compromise. He could offer to edit the work to take out some of the challenged content, to give credit for the original work, or to pay a licensing fee to use it. He doesn't need to agree that his conduct was infringing in order to make such an offer. Many, perhaps most, courts would look at such compromises as good faith attempts to avoid litigation, not as admissions that the original conduct was infringing. It may be helpful, however, to consult with an attorney to avoid any appearance of admitting to wrongdoing.

Take the initiative. People targeted by cease and desist senders may also take a proactive approach. The DMCA itself includes a section, DMCA § 512(f), for users to file suit if the takedown notice made a "material misrepresentation" that material was infringing.

If the sender has threatened to sue, then the target can file a "declaratory judgment" lawsuit asking a judge to rule that the use is fair and lawful. If the sender has a bad motive for sending her notice, such as trying to stifle politically important speech, some states provide "anti-SLAPP" procedures that may be applicable. If a sender's claims are harassing or abusive, the target may be able to seek an injunction or damages for harassment, abuse of legal process, or intentional or negligent harm. Or a lawsuit may simply be a way to resolve a genuine legal dispute, with IP or other claims on both sides.

Find More Help. Anyone who receives a DMCA § 512 notice may wish to talk with an attorney who has expertise in the area of electronic civil liberties, or the particular subject. Targets of takedown notices who feel they have a strong or sympathetic case may wish to contact the media and civil liberties organizations to draw attention to the situation, or gain legal representation in the case.

Directory of legal assistance organizations[link]

Document the process. Keeping good records is an invaluable part of any legal process, including section 512 takedown interactions. The target of a takedown notice should document everything that has happened. This includes listing how and when he began developing his work; when he posted it or made it available to others; how he distributed it; how much it cost and whether or not any profits have been made from it. He should also keep copies of any relevant correspondence. Having this material in advance will also help attorneys assess the matter more quickly. Be aware that if the matter ends up in court, such records may be subject to "discovery" by the other side.

Some people choose to publicize cease and desist letters and takedown notices on their websites. They may do this as part of a media strategy, to draw attention to what they see as a wrongful or abusive claim, or just to explain why they have taken the information down. Some senders may try to dissuade recipients from publicizing the action, by claiming that the letter is confidential, privileged, or protected by copyright. However, Chilling Effects has posted thousands of such letters and notices, as have many online activists who thought it was in the public interest to alert others to the types of claims made by some IP owners.

Submit notice to the Chilling Effects Clearinghouse. We encourage everyone to submit their notices to the Chilling Effects Clearinghouse. Chilling Effects collects cease and desist letters for two major purposes. First, publishing and annotating the notices for public viewing enables other recipients and targets to compare and learn about the law and the ways it is applied. Private information is generally redacted, and notice recipients can edit out any other private or identifying information before submitting it to Chilling Effects. Submission to the Chilling Effects Clearinghouse will also help users identify repeat senders.

Second, since cease and desist letters are sent by private mail and not usually publicly filed in a court, there is no way to know for sure whether their use is increasing or decreasing, what they are being sent for, or if the process is being abused. By contributing this legal correspondence to a clearinghouse, attorneys and researchers can look at the senders, targets, and types of claims made, to get a better sense of whether the law is working, or whether it's dysfunctional. Contributing to Chilling Effects may help reform bad laws, or prevent abuses in the future.

Submit your notice to Chilling Effects or to New Media Rights to have it published

Find additional articles by

Step 3. Learn the potential consequences.

This guide, originally created by the Fair Use Network, has been edited by New Media Rights and is provided for users and creators who have received a DMCA section 512 "takedown" notice.

Step 3. Learn the potential consequences.

After assessing the facts and legal issues, someone targeted by a takedown notice needs to understand the potential consequences.

By the time a user finds out about it, the takedown notice may have already caused the ISP to remove the targeted material - though sometimes, the ISP will give the user the chance to remove the material herself. Either way, it is now the job of the user to do something to get her material back online. If she does nothing, her content stays offline. If she is able to take advantage of the counternotice procedure, it is likely that her material will be put back online. While restoring the material in response to a counternotice is not mandatory, many ISPs will respond favorably to a counternotice or letter explaining the situation.

By submitting a counternotice, the target signals that she is willing to stand up for her rights. After 10-14 days, the ISP will likely replace the material. Unless the sender of the original takedown notice decides to file suit, this should be the end of the matter. On the other hand, if the complainant was serious, this could be the first of several new actions - including repeat actions about the same content.

A complainant might file new takedown notices with other ISPs - for instance, companies that provide Internet access to the subscriber's webhost. And of course, the complainant may still file a lawsuit, seeking an injunction or damages.

The counternotice provision of § 512 requires the user to agree that she consents to be sued in the federal court jurisdiction where is located, or if outside the U.S., for "any judicial district in which the service provider may be found". For U.S. residents, this doesn't mean much: anybody can be sued at any time, for any reason.
But for non-U.S. residents, this requirement could be significant. A non-U.S. resident, who learns of a takedown notice from her U.S. ISP, should probably consult an attorney with expertise in international law as well as intellectual property issues.

Learn more:

Copyright infringement penalties.

Find additional articles by

Step 2. Understanding legal claims in takedown notices.

This guide, originally created by the Fair Use Network, has been edited by New Media Rights and is provided for users and creators who have received a DMCA section 512 "takedown" notice.

The DMCA § 512 Takedown Process

Section 512 basically creates an expedited process for copyright holders to get material removed from the Internet. If a copyright holder feels her copyright is being infringed, she can send a § 512 takedown notice to the ISP where the content is stored or indexed. The ISP doesn't have to take it down, but the DMCA provides the ISP a "safe harbor" if it does remove the material. The safe harbor protects the ISP from liability for hosting or linking to the material, if it is later found to be infringing.

Section 512 also provides a limited encouragement to put content back online - the § 512(g) "counternotice" procedure. An online services host, such as a webhost, that takes down material is protected from "secondary" copyright liability. But in theory the webhost might be liable to its user if it turns out to have been a wrongful takedown. The webhost can gain a safe harbor from that potential liability by following the counternotice procedure.
The counternotice procedure applies only to hosting services, such as webhosts. When a hosting service receives a takedown notice, it is immune from liability for taking down the material if it notifies the user about the takedown and accepts counternotices. The sender of the original takedown notice must be told about the counternotice, but so long as they don't file a lawsuit, the webhost can put the material back online in 10-14 days.

The Copyright Claim

The section 512 takedown remedy is available only for claims of copyright infringement. While a sender may have all sorts of other claims, and even include them in the letter, the § 512 takedown remedy is applicable only to the sender's copyright claims.

Thus, any evaluation of a § 512 notice starts with copyright. Questions to consider include:

Does the target - rather than the sender - own the copyright, or have permission to do the action? (see Copyright holders, licensing & permissions)

Is the material copyrightable in the first place? Facts, ideas, systems, and methods are not copyrightable. (see Copyrightable subject matter)

Is the copyrighted material in the public domain? Anything published before 1923 is in the public domain. Other works published since 1923 may also be in the public domain. (see How Long Copyright Lasts, and What Is the Public Domain)

Is the use defensible as a fair use? The user may have a particularly strong claim if the work is transformative. (see Fair Use)

Still confused about copyright? Review Copyright 101.

If the targeted use falls under any of these, or other defenses or exceptions, then the person may wish to file a counternotice, and have the content restored.

Non-Copyright Claims:

In sending a Section 512 notice, copyright owners will often claim violations of other rights, such as trademark. The § 512 takedown process is not applicable to non-copyright claims. But an ISP might choose to respond to such claims, under its Terms of Service.

Because Section 512 is tied to notices of copyright infringement, responding to the non-copyright "takedown notices" does not give the ISP any legal benefit such as a "safe harbor" from potential liability. But an ISP may still choose to comply with a takedown notice in order to avoid any liability for knowing about infringing activity. ISPs generally guarantee themselves the rights to take those actions in their terms of service.

Non-copyright claims sometimes found in takedown notices include trademark, cybersquatting, and unfair competition. Rightsholders sometimes complain that someone has been illegally circumventing their copy-protection technology. Invasion of privacy claims may come up if someone is unhappy about the posting of a private email or photo online. Defamation (sometimes called libel in written form) and "false light" invasion of privacy are also common.

If other claims are being made, it behooves the target to pay close attention, as the sender may be thinking of actions beyond the section 512 takedown process.

Terms of Service / Terms of Use / EULAs

Almost all ISPs have "Terms of Service" or "Terms of Use" (TOU) which establish the terms of the relationship between the ISP and the consumer. Most TOUs give the ISP the right to terminate service at any time for any reason, with no liability to the customer for loss of data, loss of profit, or other harms. Many TOUs specifically mention copyright or other IP infringements as a reason for termination.

Consequently, it is common for hosting service providers and Internet access providers to forward infringement claims to their users, accompanied with a warning about violations of the Terms of Use.

Users may wish to respond to these notices quickly. The ISP may have internal policies about terminating access, and it may not be clear when those levels are reached. Because ISPs set their own terms, a subscriber should read any correspondence, and the terms of use, very carefully to understand their rights and obligations. If an ISP does not stand up for its users, the user may wish to switch ISPs to one that is more protective.

Laughing Squid is an example of a webhost that is known to offer its users greater protection from takedown notices.

Find additional articles by

Step 1. Critical evaluation of the section 512 takedown notice

This guide, originally created by the Fair Use Network, has been edited by New Media Rights and is provided for users and creators who have received a DMCA section 512 "takedown" notice.

Step 1. Critical evaluation of the notice.

The core of every takedown notice is a demand for an ISP to "take down" material - to disable access or remove links. There can be significant variation among takedown notices, though, so it pays to look carefully at any notice that an ISP may pass along to an Internet user.

Many takedown notices are automatically generated, or produced by filling out an online form. An automatically generated notice may not include much useful information. At its sparsest, a takedown notice may include only contact information, a list of allegedly infringing files, a reference to the work claimed to be infringed, and some brief formulaic statements - for example, that the sender has a "good faith" belief that the material is infringing. Other takedown notices may be much more elaborate, or even include a takedown demand in the midst of a longer cease and desist letter.

In these pages, we will address only Section 512 takedown notices - demands sent to an ISP - and what notice targets can do in response. The "Cease and Desist!" guide has information about examining other kinds of claims and demands.

Four key facts are essential to evaluating any cease and desist letter, including a takedown notice.
1.Who is sending the notice?
2.What kind of ISP received the notice?
3.What is the sender demanding?
4.What is the complaint about?

Who is sending the notice?

Who is the original sender? An individual? A large corporation? Is the rightsholder a person or company that the person whose material is targeted recognizes? Perhaps the sender has a reputation for trying to intimidate people or extort money from them. On the other hand, the rightsholder may be aggressive about enforcing its rights, but not known for sending takedown notices (or cease and desist letters) based on weak copyright claims. What are the resources available to the rightsholder, should it choose to pursue its claim beyond the initial takedown notice?
Is there a business relationship between the original sender and the targeted user? The legal issues surrounding works-for-hire, transfers of copyrights, and joint authorship can be complex, and may affect the legal status of the original work. In such a situation, the recipient should probably seek the advice of an attorney right away.

One might also measure how serious the rightsholder is by seeing who actually wrote and sent the takedown notice. Is it from the rightsholder itself, its in-house legal counsel, or an outside attorney? Or is it from another agent of the rightsholder, such as a publicist or rights-enforcement company? Notices from law firms don't necessarily mean that the rightsholder will be prepared to file a lawsuit, but at the least, they suggest that the rightsholder has some financial resources available to pay legal fees.

Is the sender targeting the recipient specifically? Or is the target just one among many? A cease and desist letter may target one individual, or it might be part of a larger campaign by the sender. Some entities and individuals have become known for aggressive, or even over-aggressive, assertion of IP rights. A check of Chilling Effects and other sites may give information about whether the complainant is a repeat sender.

What kind of ISP received the notice?

What kind of online service does the ISP perform? Is the ISP the webhost for the targeted material, or it is some other kind of hosting service? Is it a search engine; or an Internet access provider? Different kinds of online service providers have different legal obligations that will likely affect what happens when they receive a takedown notice.

What is the sender demanding?

What is the sender asking the ISP to do? A § 512 takedown notice, by definition, is a request to remove access or links to content. But some notices may include other demands or threats. Demands that go substantially beyond the takedown request should be separately evaluated, as if the notice were a cease and desist letter.
Has the sender assigned any timetables to its demands? While IP owners may or may not have a right to demand action on a particular timetable, or at all, a date may suggest that they plan further action after that date.

What is the complaint about?

Finally, what is the complaint really about? What is the context, or larger issue, behind the letter? The underlying issue, for example, may be that the sender feels upset about the content of the target's work, because it is a satire, casts the sender in an unflattering light, or discloses something private or secret. Or the underlying issue may be that the sender wants a credit or a licensing fee. Understanding the sender's motivations may help determine what responses will be most effective in resolving the situation.

An examination of the letter itself can indicate whether it appears to be automatically generated, a standard form notice, or detailed and closely tailored to the particular facts. Many takedown notices are automatically generated, or the products of online forms. But some notices may be detailed and specific, including information about claims beyond the takedown request. A detailed and specific notice may suggest that the sender is taking the issue seriously, and is prepared to go beyond the § 512 takedown process. On the other hand, an aggressive tone by itself does not necessarily mean that the claims are more legitimate, or that the rightsholder is more serious about pursuing them.

Chilling Effects has hundreds of takedown notices to look at for comparison. Regardless of the tone, however, a takedown notice is likely to have one concrete outcome: the ISP will take down the targeted material.

Find additional articles by

Pages