1 The Digital Millennium Copyright Act David S. Touretzky Computer Science Department Carnegie Mellon University November, 2001.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Intellectual Property Image: William J. Wynn.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Digital Millennium Copyright Act (DMCA)
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Intellectual Property
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Keeping Your Copyrights Deborah R. Gerhardt – Fall 2005.
Digital Millennium Copyright Act (DMCA) Cases Claire Stewart MM450 February 16, 2006.
Rights Management Overview Peter B. Hirtle Intellectual Property Officer Cornell University Library
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Intellectual Property
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
1/nov/21/multiple-choice-students- teachers-technology How does copyright affect me?
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
Unlocking the Copyright Puzzle. How copyright applies to classroom teachers. Shannon Lopez LI 550.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Copyright and Fair Use Guidelines: Using Protected Materials to Enhance Instruction.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
Author Rights and Copy Rights: The Dos and Don'ts of Reusing Published Articles Elizabeth Kirk, Associate Librarian for Information Resources Dartmouth.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES/DIGITAL MUSIC.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
Helpful Info for Music Teachers Julie M. Collins January 14, 2011 Indiana Wesleyan University MEDO202 – “Technology in Education” Copyright Laws.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
The DMCA, DeCSS, Copyrights and the First Amendment.
Copyright: What Every Teacher and Student Should Know Katie Amend Casey Moffett.
Becky Albitz Electronic Resources Librarian
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
Dissemination of Information Why is Labeling so Important? How is Drug Labeling Different from Other Consumer Product Labeling? How is Rx Labeling Different.
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Legal and Ethical Issues in Computer Security Csilla Farkas
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
CPS Digital Copyright. CPS Copyright US Constitution (Article I, Section 8, Clause 8): “To promote the Progress of Science and useful.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
As you Arrive…. Place your cell phone or other small electronic devices in the in the Cell Phone Parking Lot. Take out your blogging assignment. Take.
Fair Use in the Classroom
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
The First amendment Speech Press Religion Petition Assembly.
Property in Cyberspace
Computer 101 Extra Credit By: Marjorie Jackson.
Presentation transcript:

1 The Digital Millennium Copyright Act David S. Touretzky Computer Science Department Carnegie Mellon University November, 2001

2 Digital Millennium Copyright Act Enacted in Added new copyright regulations (Title 17, US Code) concerning: –access controls/digital rights management –liability limitations for ISPs –broadcasting music on Internet radio stations

3 Anti-Circumvention Provision 17 USC 1201(a)(1)(A): No person shall circumvent a technological measure that effectively controls access to a work protected under this title. –Can’t watch encrypted DVDs at home using an unapproved (open-source) DVD player. –Can’t decrypt your lawfully purchased eBook.

4 Anti-Trafficking Provision 17 USC 1201(a)(2): No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product service, device, component, or part thereof that –(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;

5 –(B) has only limited commercially significant purpose or use other than to circumvent... –(C) is marketed by that person … for use in circumventing a technological measure that effectively controls access to a work protected under this title. You can sell digital signal processors, but you can’t sell cable TV descramblers.

6 Anti-Trafficking: Copying 17 USC 1201(b)(1): No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof that –(A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title...

7 Escape Clause 1 17 USC 1201(c)(1): Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title. –1201 isn’t about copyright infringement. –But if A circumvents, B can make fair use of the fruits of A’s crime.

8 Escape Clause 2 17 USC 1201(c)(4): Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products. –Dismissed as “precatory language” (pleading) by 2nd Circuit Court of Appeals.

9 Exemptions to Anti-Circumvention 1201(d) - Libraries 1201(e) - Law enforcement 1201(f) - Reverse engineering of software 1201(g) - Encryption research 1201(h) - Protect minors from the Internet 1201(i) - Protect personally identifying info 1201(j) - Security testing

10 Library Exemption 1201(d)(1) says libraries, archives, and educational institutions may circumvent access controls… to gain access to a work… to decide whether to purchase it. But...

11 The Librarians’ Catch (d)(4) says the exemption in (d)(1) cannot be used as a defense to a claim under the anti-trafficking provisions, and... Libraries may not manufacture, import, etc., any technology, product, service, etc., which circumvents a technological measure. So how can they acquire the tools to circumvent under (d)(1)?

12 Reverse Engineering 1201(f) - allows circumvention of access controls to permit reverse engineering of software programs to achieve interoperability with other programs. Doesn’t apply to hardware, such as DVD players and media. “Interoperability” does not mean bypassing another program’s access/copying controls.

13 Encryption Research 1201(g) - cracking permissible when: –lawfully obtained copy of the encrypted work –good faith effort to obtain permission to crack –no copyright infringement or computer abuse –information gained is disseminated in a manner calculated to advance state of knowledge –cracker has respectable credentials –copyright owner notified of results

14 Librarian of Congress Reports Special cases designated by the Librarian of Congress as exempt from 1201(a)(1)(A): –1. Encrypted list of blocked sites used by censorware programs such as CyberPatrol –2. “Broken” access control mechanisms. But 1201(a)(2) still applies, so providing the tools to make use of these exemptions is still illegal!

15 Part II Why Is Code Protected Speech?

16 Is Code Speech? Bernstein v. U.S. Dept. of State –Snuffle encryption algorithm (a “munition”) is speech –“functional aspect”; maybe object code isn’t speech Junger v. Daley –cryptography textbook with code also provided on diskette DVD-CCA v. Bunner et al. –California DVD case: 1st Amdt. trumps trade secret law Universal City Studios v. Reimerdes –2600 DVD case: even object code is speech

17 What’s Special About Code? Bomb-making instructions are not a bomb. The recipe for LSD is not a drug. A drawing of a gun is not a weapon. –All are fully protected speech. But a copy or listing of a computer program is a computer program. –Why should that make code less protected?

18 “Code is Dangerous” Argument Software has a functional aspect: –Software can instantly instruct computers to do antisocial things. This makes software more dangerous than other types of speech that only instruct slow, lazy humans.

19 But Code Isn’t Dangerous Computer programs don’t do anything. –They are merely expressions of ideas. DeCSS does not pirate DVD movies. –A person must insert the DVD into a drive, load DeCSS onto a digital computer, and run it. Where have we seen this argument before?

20 Guns Don’t Kill People: People Do

21 Treat Software Like Guns? Restrictions on possession of guns and controlled substances are constitutional. –Doesn’t interfere with the expression of ideas. Can we restrict publication of software without restricting the expression of ideas?

22 The “No Ideas Here” Strategy Claim: some programs are purely functional and do not express ideas. –Is object code purely functional? –Is css_descramble.c purely functional because it relies on long boring tables of numbers? –Only code published in textbooks or journal articles expresses ideas?

23 Ideas That Code Can Express “X” is possible: here’s an existence proof. My way of doing “X” is better than the other guy’s way. –Runs faster / Less memory / Shorter code “X” is trivial. –Winstein & Horowitz’ qrpff.pl is 472 bytes!

24 DVD Decryption in Perl #!/usr/bin/perl # 472-byte qrpff, Keith Winstein and Marc Horowitz # MPEG 2 PS VOB file -> descrambled output on stdout. # usage: perl -I : : : : qrpff # where k1..k5 are the title key bytes in least to most-significant order b=map{ord |256|$b[3];Q=Q>>8^(P=(E=255)&(Q>>12^Q>>4^Q/8^Q)) >8^(E&(F=(S=O>>14&7^O) ^S*8^S<<6))<<9,_=(map{U=_%16orE^=R^=110&(S=(unqT,"\xb\ntd\xbz\x14d")[_/16%8]);E It is Illegal to Display This Slide

25 “Imminent Peril” Strategy Courts now accept that code is speech. But speech that poses a specific and imminent threat of harm is not protected. –“Let’s kill all the lawyers” is protected. –“Kill that lawyer with this gun now” is not. Could publishing computer code meet this test? “Computers make crime too easy.”

26 WARNING: You are only one mouse click away from destroying the motion picture industry! Click here to continue...

27 Counting Mouse Clicks Judge Kaplan enjoined 2600 from distributing the DeCSS source. –2600 responded by posting links to mirror sites. Judge Kaplan enjoined 2600 from linking to mirror sites: only a mouse click away. –So 2600 published the URLs as plaintext. 2nd Circuit: now it takes four mouse clicks. –How many mouse clicks are enough?

28 When Does Code Not Pose an Imminent Danger? Executable binary -- extremely dangerous! Compilable source -- very dangerous. Screen dump (a “picture” of the code)? Code printed on a t-shirt? Algorithm expressed in a formal language for which there is no compiler? –So it’s not really “code”?

29 When Is Code Not Dangerous? Algorithm translated line-by-line into machine-generated English? –Poses threat of reverse-translation. Algorithm expressed in colloquial English? –Professor Felten, call your lawyer. Impure thoughts about an algorithm? –1201(a)(1) says thou shalt not “manufacture”!

30 Where to Draw the Line? Conservative: only ban binaries and compilable/interpretable source. –Too easy to work around. Liberal: ban anything that can potentially be turned into executable code. –First Amendment doesn’t permit this.

31 Conclusions Restricting only the publication of imminently dangerous “code” will prove unworkable in practice. –Counting mouse clicks is silly. –Code can take many forms. –Computers will soon understand English. Truly effective restrictions require the censorship of “dangerous ideas.”

32 The Censorship of Ideas Is Intolerable