Why the DMCA has the right to outlaw numbers

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Hart District Acceptable Use Policy Acceptable Use Policy.
The digital age of information is not yet a done deal and copyright is not the only potential “block” DRM.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Intellectual Property
Computer Concepts 2013 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Digital Millennium Copyright Act (DMCA) Cases Claire Stewart MM450 February 16, 2006.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Digital Rights Management Bill Cody – MSIT-526 – 12/20/05.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Hear IT- An introduction to internet audio media..
C opyright Protection and Digital Rights Management 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Standards and Guidelines for Web Page Publishing December 9, 2009.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Unlocking the Copyright Puzzle. How copyright applies to classroom teachers. Shannon Lopez LI 550.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
Creating Web Pages Overview. Design – Start with a Purpose Before you start any web page, you need to design the website. The first question that should.
CptS 401 Adam Carter Section 4.3.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Movies, Copyright, PowerPoint, Oh my!! What?. What does Copyright/FairUse say? Video (for integration into.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
The DMCA, DeCSS, Copyrights and the First Amendment.
Is It Stealing? By Amber Porter. Key Terms  Software licensing- Allowing an individual or group to use a piece of software  Piracy- The unauthorized.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Compsci 82, Fall Digital Millennium Copyright Act,DMCA l Copyright law of United States  Passed in 1998, general industry support  Controversial.
10 Big Myths About Copyright Explained Article by: Brad Templeton Presentation: James Brown.
INTELLECTUAL PROPERTY PRESENTED BY: BENJAMIN BAKER & BLAZE STERLING.
Copy DVD Movie to Blank DVD Disc From:
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Backup DVD to Hard Drive From: -
Introduction. Internet Worldwide collection of computers and computer networks that link people to businesses, governmental agencies, educational institutions,
01 OPTIONS 01 OPTIONS Lorem Ipsum In play mode, click the image in the tab to the left. This will load the slide for the option clicked. Be sure to edit.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Rights Management (DRM) Kamil Kaminski. Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption:  AACS (Advanced Access Content.
Copyright and Fair use guidelines FAIR USE GUIDELINES FOR EDUCATIONAL MULTIMEDIA: WHAT TEACHERS AND STUDENTS NEED TO KNOW.
I can hear it? Can I use it? Copyright: Audio What are our rights? Natasha Smith Marie Webb March 10, 2016 Audio Copyright Workshop for Teachers.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
Developing Web-Based Applications
Copyright.
Digital Rights Management (DRM)
Intellectual Property Rights
ethical issues in business
So you were told to make a website
Encryption and Digital Rights Management
Presentation transcript:

Why the DMCA has the right to outlaw numbers Illegal Numbers Why the DMCA has the right to outlaw numbers

What is an illegal number? A number containing information deemed “illegal”. Any digital information may ultimately be represented as a number. Often are encryption keys. 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 Hexadecimal Advanced Access Content System (AACS) encryption key

What does the Digital Millennium Copyright Act (DMCA) have to do with this? DMCA makes criminal: Copyright circumvention Distribution of circumvention technology Possession of circumvented works outside fair-use or licensed guidelines. Does not make possession of circumvention technology illegal Thus storage of circumvention technology in the form of base-10 or base- 16 numbers, via the DMCA, makes that number an “illegal number”.

If the DMCA says circumventing copyright systems is illegal, how is this controversial? Copyright law allows for limited fair-use of copyright material Education Parody Criticism The DMCA prevents fair-use by outlawing copyright system circumvention carte blanche. No limited/no exceptions. The power is left with the copyright holder to determine fair-use at the time the copyright system is circumvented. Prior to the DMCA, non- authorized personal back-ups were neither illegal nor specifically legal. DMCA effectively makes all circumstances illegal.

Advanced Access Content System (AACS) encryption key controversy AACS first appeared on HD DVDs and Blu-ray Disc players in 2006. Content encryption based upon two layers of on-media encryption. Key to first later based upon specific media player model groups. This allow individual model keys to be revoked in future produced media upon being compromised. Model Key Media Key Unencrypted Movie Decryption

Cracked and Crack again Encryption keys pulled from unsecure HD DVD / Blu-ray players began appearing online the same year. First key model group revocations were issues on April 16th 2007. New model keys were cracked in less than a month – even before the updated DRM was pushed. DMCA takedown notices were issued by the Motion Picture Association of America (MPAA) to various websites requiring the hexadecimal keys be taken down.

Backlash at Digg.com Digg.com, a user driven tech and social news website, begins to remove posts containing the key and close related user accounts. User community reacted by flooding the user submission feed with user generated content containing the key. Inserting into other media. Parody of the situation. Allegory of the key. Key reposting. Unable to control the situation, the administration switches sides: “We hear you, and effective immediately we won't delete stories or comments containing the code and will deal with whatever the consequences might be,”

Dramatically increased the number of postings of the key. 9,410 webpages worldwide to over 700,000 webpages worldwide. Streisand effect ‘Free Speech’ flag containing the AACS decryption key in RGB color values: 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

Content Scramble System (CSS) and DeCSS Content Scramble System (CSS) began appearing on DVDs in 1996. 40-bit key stored in the player to authenticate discs. Legal restrictions and licensing limited availability of compatible software. Entirely unable to play on certain OS, such as Linux. First cracked in 1999 using a key acquired from a disassembled Xing DVD player’s object code. Released under the name DeCSS. One of the three programmers involved in DeCSS was tried and acquitted under Norwegian Law. A perfectly legal program that strips Cascading Style Sheets (CSS) tags from HTML pages of the same name was created to bait the MPAA.

The infamous illegal prime Sought for an intrinsic property to distribute a form of DeCSS to be printed on shirts, ect. Very large prime number based upon the binary of the DeCSS code. In the forms: k·256211 + 99 k·2562 + 2083 The first form was large enough to be mentioned in the list of largest known primes. Since the prime is based upon the binary of DeCSS’s code it is, in theory, possible to convert the prime and run DeCSS. Thus, the number is illegal. It would still be much easier to get the already compiled version off the internet. Seeking to give a representative form of DeCSS an intrinsic property to allow open publication, Phil Carmody generated a 1401-digit prime number in the form k·2562 + 2083 and then a 1905-digit prime in the form k·256211 + 99 based upon the binary representation of the DeCSS C source code.

Quick, write down this computer code! 49310 83597 02850 19002 75777 67239 07649 57284 90777 21502 08632 08075 01840 97926 27885 09765 88645 57802 01366 00732 86795 44734 11283 17353 67831 20155 75359 81978 54505 48115 71939 34587 73300 38009 93261 95058 76452 50238 20408 11018 98850 42615 17657 99417 04250 88903 70291 19015 87003 04794 32826 07382 14695 41570 33022 79875 57681 89560 16240 30064 11151 69008 72879 83819 42582 71674 56477 48166 84347 92846 45809 29131 53186 00700 10043 35318 93631 93439 12948 60445 03709 91980 04770 94629 21558 18071 11691 53031 87628 84778 78354 15759 32891 09329 54473 50881 88246 54950 60005 01900 62747 05305 38116 42782 94267 47485 34965 25745 36815 11706 55028 19055 52656 22135 31463 10421 00866 28679 71144 46706 36692 19825 86158 11125 15556 50481 34207 68673 23407 65505 48591 08269 56266 69306 62367 99702 10481 23965 62518 00681 83236 53959 34839 56753 57557 53246 19023 48106 47009 87753 02795 61868 92925 38069 33052 04238 14996 99454 56945 77413 83356 89906 00587 08321 81270 48611 33682 02651 59051 66351 87402 90181 97693 93767 78529 28722 10955 04129 25792 57381 86605 84501 50552 50274 99477 18831 29310 45769 80909 15304 61335 94190 30258 81320 59322 77444 38525 50466 77902 45186 97062 62778 88919 79580 42306 57506 15669 83469 56177 97879 65920 16440 51939 96071 69811 12615 19561 02762 83233 98257 91423 32172 69614 43744 38105 64855 29348 87634 92103 09887 02878 74532 33132 53212 26786 33283 70279 25099 74996 94887 75936 91591 76445 88032 71838 47402 35933 02037 48885 06755 70658 79194 61134 19323 07814 85443 64543 75113 20709 86063 90746 41756 41216 35042 38800 29678 08558 67037 03875 09410 76982 11837 65499 20520 43682 55854 64228 85024 29963 32268 53691 24648 56000 75591 66402 47292 40716 45072 53196 74499 95294 48434 74190 21077 29606 82055 81309 23626 83798 79519 66199 79828 55258 87161 09613 65617 80745 66159 24886 60889 81645 68541 72136 29208 46656 27913 14784 66791 55096 51543 10113 53858 62081 96875 83688 35955 77893 91454 53935 68199 60988 08540 47659 07358 97289 89834 25047 12891 84162 65878 96821 85380 87956 27903 99786 29449 39760 54675 34821 25675 01215 17082 73710 76462 70712 46753 21024 83678 15940 00875 05452 54353 7

Questions on bomb making ethics. Why are these numbers, essentially pieces of information used for whatever their purpose, illegal? Specifically what makes them an illegal number? They contain information which may be used to circumvent copyright protection systems. Without very specific know-how, they’re simply intangible numbers. Suppose the number ‘5’ and ‘150’ was now illegal because it was used in some part

Questions on bomb making ethics. Should users be given full access of their content, even if it means breaking the law? Digital content vs. physical content. Violation of an individual’s rights of legal access? Personal back-up of digital vs. physical content. Should users be given access to media behind copyright DRM for fair-use purposes?