November 22, 2024

Archives for 2004

Recent Induce Act Draft

Reportedly, the secret negotiations to rewrite the Induce Act are ongoing. I got hold of a recent staff discussion draft of the Act. It’s labeled “10/1” but I understand that the negotiators were working from it as late as yesterday.

I’ll be back later with comment.

UPDATE (8 PM): This draft is narrower than previous ones, in that it tries to limit liability to products related “peer-to-peer” infringement. Unfortunately, the definition of peer-to-peer is overbroad. Here’s the definition:

the term “peer-to-peer” shall mean any generally available product or service that enables individual consumers’ devices or computers, over a publicly available network, to make a copy or phonorecord available to, and locate and obtain a copy or phonorecord from, the computers or devices of other consumers who make such content publicly available by means of the same or an interoperable product or service, where –

(1) such content is made publicly available among individuals whose actual identities [and electronic mail address] are unknown to one another; and

(2) such program is used in a manner in which there is no central operator of a central repository, index or [directory] who can remove or disable access to allegedly infringing content.

By this definition, the Web is clearly a peer-to-peer system. Arguably, the Internet itself may be a peer-to-peer system as well.

What's the Cybersecurity Czar's Job?

The sudden resignation of Amit Yoran, the Department of Homeland Security’s “Cybersecurity Czar”, reportedly due to frustration at being bureaucratically marginalized, has led to calls for upgrading of the position, from the third- or fourth-level administrator billet that Yoran held, to a place of real authority in the government. If you’re going to call someone a czar you at least ought to give him some power.

But while we consider whether the position should be upgraded, we should also ask what the cybersecurity czar should be doing in the first place.

One uncontroversial aspect of the job is to oversee the security of the government’s own computer systems. Doing this will require the ability to knock heads, because departments and offices won’t want to change their practices and won’t want to spend their budgets on hiring and retaining top quality system administrators. That’s one good argument for upgrading the czar’s position, perhaps affiliating it with a government-wide Chief Information Officer (CIO) function.

A harder question is what the government or its czar can do about private-sector insecurity. The bully pulpit is fine but it only goes so far. What, if anything, should the government actually do to improve private-sector security?

Braden Cox at Technology Liberation Front argues that almost any government action will do more harm than good.

In an article I wrote last year when Yoran was first appointed, I argued that the federal government has a role to play in cybersecurity, but that it should not be in the business of regulating private sector security. Mandated security audits, stringent liability rules, or minimum standards would not necessarily make software and networks more secure than would a more market-based approach, though it would surely help employ more security consultants and increase the bureaucracy and costs for industry.

Certainly, most of the things the government can do would be harmful. But I don’t see the evidence that the market is solving this problem. Despite the announcements that Microsoft and others are spending more on security, I see little if any actual improvement in security.

There’s also decent evidence of a market failure in cybersecurity. Suppose Alice buys her software from Max, and Max can provide different levels of security for different prices. If Alice’s machine is compromised, she suffers some level of harm, which she will take into account in negotiating with Max. But a breakin to Alice’s machine will turn that machine into a platform for attacking others. Alice has no incentive to address this harm to others, so she will buy less than a socially optimal level of security. This is not just a theoretical possibility – huge networks of compromised machines do exist and do sometimes cause serious trouble.

Of course, the existence of a problem does not automatically imply that government action is required. Is there anything productive the government can do to address this market failure?

I can see two possibilities. The first approach is for the government to use its market power, as a buyer of technology, to try to nudge the market in the right direction. Essentially, the government would pay for compromise-resistance, beyond its market incentive to do so, in order to bolster the market for more compromise-resistant software. For example, it might, in deciding what to buy, try to take into account the full social cost of potential breakins to its computers. Exactly how to make this happen, within a budget-conscious bureaucracy, is a challenge that I can’t hope to address here.

The second approach government might take is to impose some form of liability, on somebody, for the types of security breaches associated with this market failure. Liability could be placed on the user (Alice, in our example above) or on the technology vendor. There has been lots of talk about the possibility of liability rules, but no clear picture has emerged. I haven’t studied the issue enough to have a reliable opinion on whether liability changes are a good idea, but I do know that the idea should not be dismissed out of hand.

What’s clear, I think, is that none of these possibilities require a “czar” position of the sort that Yoran held. Steps to improve cybersecurity inside the government need muscle from a CIO type. Changes to liability rules should be studied, but if they are adopted they won’t require government staff to administer them. We don’t need a czar to oversee the private sector.

Sin in Haste, Repent at Leisure

Ernest Miller, continuing his stellar coverage of the Induce Act, reports that, according to PublicKnowledge:

An all-star game of private sector legislative drafters will start at 10:30 [today]. There will be representatives from consumer electronics, Verizon, CDT, and others on our team and from the usual suspects on the other team. They are supposed to produce a draft by 4 p.m. That draft will then be, probably revised, to see if it can be marked up next week.

Yes, you read that right: critically important decisions about our national innovation policy need to be made, and a small group has been given a few hours to make them.

The result of this process will be yet another Induce Act draft. Doubtless it will take the same approach – blanket bans on broad classes of behavior, with narrow carveouts to protect the present business plans of the groups in the room – as the previous bad drafts.

How bad have these drafts been? Well, as far as I can tell, the now-current draft would appear to ban the manufacture and sale of photocopy machines by companies like Xerox.

Xerox induces infringement because, when it makes and sells photocopiers, it “engage[s] in conscious and deliberate affirmative acts that a reasonable person would expect to result in widespread [copyright infringement] taking into account the totality of circumstances.” After all, everybody knows that photocopiers are sometimes used to infringe, so that widespread distribution of copiers will lead to widespread infringement.

Now we come to the issue of the narrow carveouts. The Induce Act draft does have two subsections that provide carveouts, which appear to be constructed to protect iPods. But those carveouts appear not to protect Xerox. Subsection (C) of the draft exempts some product distributors, but only if the infringements that are induced are entirely private, non-commercial, and done by consumers. This would appear not to protect Xerox, which has many commercial customers. Subsection (D) exempts Xerox’s user manuals and advertising, but not the distribution of its copiers, so that doesn’t help either. It looks like Xerox would be liable as an inducer under the current draft.

Am I missing something here? Perhaps a reader who is a lawyer can straighten me out. Regardless, this kind of analysis shows the risk induced by the “broad ban; narrow carveouts” approach to tech regulation – the risk that some legitimate business activity will fall outside the carveouts.

This problem is at its worst when regulatory language is written in a hurry, and when only a few stakeholders are invited to participate in drafting it. But that’s exactly what is scheduled to be happening, right now, in a conference room in Washington.

DMCA Ruling in BNETD Case

A Federal Court in Missouri has ruled on the BNETD case, which involves contract and DMCA claims, and issues of reverse engineering and interoperability. Because I played a role in the litigation (as an expert), I won’t comment on the court’s ruling. The rest of you are welcome to discuss it.

Recorded Music Being Replaced by Other Media

The music industry likes to complain about sales lost to piracy, but figures that show huge sales declines only tell part of the story. Before we blame this trend on infringement, we have to make several assumptions, including that the demand for music (whether purchased or pirated) has remained steady.

Figures available from the US Census bureau suggest otherwise. Data on “Media Usage and Consumer Spending” abstracted from a study by Veronis Suhler Stevenson show the average number of hours spent listening to music by US residents age 12 and older has declined steadily since 1998 (from 283 to a projected 219 in 2003, a 21% decline). Meanwhile, home video, video games, and consumer Internet have seen dramatic gains. This suggests that people are turning to new forms of entertainment (i.e., the Internet, video games, and DVDs) at the expense of recorded music.

Here’s the data, extracted from the Census Bureau report, on the number of hours Americans spent using various types of media in 1998 and 2003.

Activity Hours, 1998 Hours, 2003 (proj.) Change (hours)
TV 1551 1656 +105
Radio 936 1014 +78
Box office 13 13 0
Home video 36 96 +60
Interactive TV 0 3 +3
Recorded music 283 219 -64
Video games 43 90 +47
Consumer Internet 54 174 +120
Daily newspapers 185 173 -12
Consumer books 120 106 -14
Consumer magazines 125 116 -9
Total 3347 3661 +314

(Source: US Census Bureau, Statistical Abstract of the United States: 2003, p. 720.)

(Note 1: We chose to use 2003 as the ending point, even though the source includes projected 2004 data, on the assumption that the 2003 Statistical Abstract’s projected data would be more trustworthy for 2003 than for 2004. Using 2004 as the endpoint would not materially affect the analysis.)

(Note 2: It is possible that part of the decline in recorded music hours may be an artifact of the study methodology. The table caption states that the data for categories including recorded music were based on “survey research and consumer purchase data”. To the extent that the estimate of music listening hours is based on survey data, it can serve as a possible cause of the drop in music sales. But to the extent that the listening time estimate might be inferred from the drop in sales, it should not be used to explain the sale drop. More methodological details might be available in the VSS report, but that is not available to the public.

However, we think it is unlikely that the listening time estimate is derived entirely from sales data. According to the same Census Bureau report (which cites as its source the same Veronis Suhler Stevenson report), per-capita spending on recorded music fell by only 4% from 1998 to 2003; the RIAA estimated a 15% drop in its total recorded music revenue over the same period. It seems unlikely that a 21% drop in listening time would be inferred entirely from a 4% or 15% spending drop.)

(Note 3: VSS wants $2000 for a copy of their report. We’re not in a position to pay that much. If anybody has a copy of the report and is able to fill us in about their methodology, we’d be grateful.)

[This entry was written by Alex Halderman and Ed Felten. If you cite this, please don’t attribute authorship to Ed alone.]