December 21, 2024

RIAA To Do The Right Thing?

Fortune reports on the RIAA’s stunning new anti-infringement strategy of suing actual infringers:

“The RIAA is considering a far riskier strategy–suing individuals who share large numbers of files on Kazaa, Grokster, or Morpheus. It’s a tactic guaranteed to infuriate and alienate music fans, and it underscores the awful bind record labels are in.”

Assuming the RIAA chooses to go after folks who clearly and consistently infringe copyrights, music fans should applaud. I certainly will. I have no problem with punishing copyright infringers. What I do object to is laws and litigation aimed at legitimate activities and tools, just because some infringers use them. Punish the infringer, not the tool.

If the RIAA is indeed in an awful bind – if suing blatant infringers is indeed controversial – that is because the public is starting to question the legitimacy of copyright. How can that legitimacy be restored? Punishing the actual bad guys would be a good start.

British Bill to Ban Mods to Cellphone ID Numbers

The British Parliament is now considering a bill that would make it illegal to change the IMEI number on a cell phone. Each phone has a unique IMEI which it uses to identify itself to the cell network; it’s like a serial number for the phone.

If you report your phone stolen, the cell operator blacklists your phone’s IMEI, effectively shutting off the stolen phone. But if the thief can reprogram the IMEI number, then he can keep using the stolen phone. Is this enough to justify banning the practice?

There are two questions we should ask ourselves in evaluating this kind of ban.

First: Is it necessary? Presumably there are already laws against stealing cell phones and against using a stolen phone. The bill only makes sense if those existing laws are somehow deficient. If the deficiency is that the existing laws carry insufficient penalties, then those penalties can be beefed up. If the deficiency is that the existing laws are hard to enforce, then we would still have to ask whether the newly proposed law is somehow easier to enforce.

Second: Does the practice that would be banned have significant legal uses? It is hard to object to a ban on practices that only criminals engage in, but if there are legitimate and legal uses of it then we should be much more reluctant to ban it. And we really have to try our hardest to think of legal uses – it is all too easy to ignore unusual or novel uses that would turn out to have great value in the future.

Based on my very limited knowledge, it looks like the ban on IMEI modifications may pass this two-part test, and so may be good policy. But I’m happy to hear any counterarguments.

Pro-Tinkering Speech from White House Cybersecurity Czar

Richard Clarke, the White House cybersecurity czar, in a speech today at the Black Hat conference, called for legal protection for tinkering by security researchers.

According to an Associated Press article by D. Ian Hopper, Clarke “encouraged the nation’s top computer security professionals and hackers Wednesday to try to break computer programs, but said they might need protection from the legal wrath of software makers.” The article also quotes Clarke as saying that security researchers “have an obligation to find the vulnerabilities.”

This is just common sense. Still, it’s refreshing to hear that somebody in official Washington understands the value of tinkering and open debate about technology.

Vaidhyanathan: Copyright as Cudgel

Nice article on copyright abuses by Siva Vaidyanathan in the latest Chronicle of Higher Education. The Chronicle is read mostly by professors, so the article talks at length about the harm to scholarship caused by the recent copyright expansion.

Vaidhyanthan identifies two common arguments used by those opposed to copyright expansion. The first, which he calls commons talk promotes the value of the ever-shrinking public domain. The second (unnamed) strategy is to enlist public support by pointing out how routine and accepted activities of Joe Public, such as backups and party mixes, are endangered.

As the scope of “intellectual property” continues to expand, I think we’ll see a third argument, based on collateral damage. The idea is that new laws, while apparently intended to protect the flank of copyright by giving copyright holders or technology makers new powers to restrict their competitors’ activities, will increasingly choke off beneficial and clearly-legal innovations.

Berman-Coble Bill: Green Light for Cyber-Attacks

In the current climate of concern about cyber-attacks, it’s astonishing that Congress is considering a bill that would legalize a wide range of cyber-attacks – yet that is just what the proposed Berman-Coble bill would do.

The bill allows the owner of a copyright to interfere with the computer or network of anybody who is thought to be using the copyrighted material without authorization. The bill allows any attack, so long as it does not mess with any files on the victim’s computer (other than copyrighted ones). For example, they can cut off your network connection, or even crash your computer.

I am not totally opposed to the idea of self-help for parties whose legal rights are being violated. But this bill goes way, way too far. For example, the bill allows attacks on anybody making “unauthorized” use of a work, even if that use is legal. (Under copyright law, if you own a legimate copy of a work, there are certain things you can do with that work whether the copyright holder likes it or not; so a use can be unauthorized but still legal) And the bill doesn’t do much to hold the attackers accountable for any collateral damage they cause.

Text of the proposed bill is available at http://www.politechbot.com/docs/berman.coble.p2p.final.072502.pdf