December 4, 2024

Archives for 2003

DMCA Exemptions Granted, Problems Remain

The U.S. Copyright Office has issued its report, creating exemptions to the DMCA’s anti-circumvention provisions for the next three years. The exemptions allow people to circumvent access control technologies under certain closely constrained conditions. The exemption rulemaking, which happens every three years, was created by Congress as a kind of safety valve, intended to keep the DMCA from stifling fair use too severely.

This time around, exemptions were granted for (1) access to the “block-lists” of censorware products, and (2) works protected by various types of broken or obsolete access control mechanisms.

My own exemption request, asking for exemptions for information security researchers, was denied as expected.

It is abundantly clear by now that the DMCA has had a chilling effect on legitimate research related to access control technologies. When researchers ask Washington for a solution to this problem, they have so far gotten a Catch-22 answer. When we ask Congress do to something, we are told to seek an exemption in the Copyright Office rulemaking. But when we petitioned the Copyright Office for an exemption in the 2000 rulemaking, we were told that the Copyright Office did not have the power to grant the kind of exemption we had requested.

So this time, I wrote an exemption request that was designed to end the Catch-22 – to entice the Copyright Office to either (a) grant an exemption for researchers, or (b) state flatly that Congress had not given it the power to grant any kind of useful research exemption. As I read the Copyright Office’s findings (see pages 14-15 of the short version, or pages 86-89 of the extended dance version; they designate my request as number 3), they have essentially said (b) – exemptions of the type I requested “cannot be considered.”

Broadcast Flag Confusion

In today’s New York Times, Stephen Labaton reports on the continuing controversy over the FCC’s impending Broadcast Flag rules. In the midst of a back-and-forth about the rules, Labaton writes this:

An F.C.C. official said, for instance, that the broadcast flag could contain software code that was recognized by computer routers in a way that the program would self-destruct after passing through three routers while being e-mailed by a user.

Somebody is really confused here about how the Internet works. Maybe it’s the reporter, or maybe it’s the FCC source, or maybe (God forbid) both.

If this statement bears any connection to reality, it’s cause for serious worry. I can’t think of any way of translating the statement into a technically coherent form that doesn’t involve the FCC redesigning the basic workings of the Internet.

UPDATE (8:55 PM): Seth Schoen has solved the mystery; see his comment. The mystery sentence looks like a very confused attempt to explain the fact that DTCP-over-IP sets the Time-To-Live field on its IP packets equal to three.

Remote Controls for Traffic Lights

Many cities have installed systems that let emergency vehicles control traffic lights via infrared remote controls, thereby getting to the scene of an emergency more quickly. This is good.

Yesterday’s Detroit News, in a story by Jodi Upton, reports on the availability of remote controls that allow ordinary citizens to control the same traffic lights. Now traffic engineers worry that selfish people will use the remotes to disrupt the flow of traffic.

As Eric Rescorla notes, this could have been avoided by using cryptography in the design of the original system. Instead, we’re likely to see a crackdown on the distribution of the remote controls, and the predictable black market in the banned devices.

This seems like a classic example of the harm caused by deploying a technology without considering how it might be abused. It would be interesting to know why this happened. Did the vendor not stop to think about the potential for abuse? Did they think that nobody would ever figure out how to abuse the system? Did they fail to realize that anti-abuse technologies were available? I wish I knew.

Ads

As an experiment, and in the hopes of defraying the cost of running this site, I have started sticking ads onto this site’s individual entry pages. The service uses some kind of algorithm, based on the pages’ content, to decide which ads to place on each page.

Please let me know what you think.

Swarthmore Bans Indirect Links

Ernest Miller reports that Swarthmore now is yanking the Net connections of students who linking to a page that links to a page containing the infamous Diebold memos.

So Swarthmore students can’t make a two-hop link to the memos (i.e., a link to a link to the memos). Can they make a three-hop link, say by linking to Ernest Miller’s report? Can they make a four-hop link, say by linking to the page you are reading right now? Can they make a five-hop link, say by linking to my personal home page? Maybe some enterprising Swarthmore student will do an experiment to find out.

UPDATE (1:40 PM, Oct. 27): James Grimmelmann at LawMeme says that Diebold’s own home page contains a five-hop link.