November 23, 2024

Rubenfeld on Copyright and the Constitution

October’s Yale Law Review has an interesting article by Jed Rubenfeld, entitled “The Freedom of Imagination: Copyright’s Constitutionality.” (Disclaimer: I’m not a lawyer and not a legal scholar, so I’m not fully qualified to judge the scholarly merit of the article. What you’re getting here is my semi-informed opinion.)

Rubenfeld argues, convincingly in my view, that standard claims about copyright and freedom of speech don’t stand up to scrutiny. He argues that copyright as now enforced places unconstitutional limits on free speech.

He goes on to explore how copyright can be made constitutional. This involves a detour to discuss the meaning of the First Amendment, followed by the laying of a new framework for copyright. He finds that copyright’s ban on literal copying is constitutional, but the rules regarding derivative works need to be adjusted.

Whether this ultimately is correct is beyond me, but I think the article is worth reading if you’re interested in these issues. I would like to hear the opinions of any readers who are lawyers.

[Link credit: Kitchen Cabinet]

Tech Provisions in Homeland Security Bill

Orin Kerr, over at the Volokh Conspiracy, summarizes some tech-related provisions in the new Homeland Security bill.

The bill changes the sentences that can be assessed for some computer crimes. The effect of these changes is unclear but will likely be small. The widely discussed life-sentence-for-hacking provision applies only in cases when the crimes deliberately or recklessly kill people; but such crimes are already punishable under state murder statutes. There is also an increase in the penalty for intruding into people’s email.

The bill also makes some changes in wiretap law, granting more power to law enforcement. I won’t attempt to further compress Kerr’s already-compressed explanation; read it yourself if you’re interested.

UPDATE (12:49 PM): Ted Bridis points out that the life-sentence-for-hacking provision applies even to attempts to kill people. This might in some cases allow prosecutors too much leeway.

Pavlovich Decision

The California Supreme Court has ruled that Matt Pavlovich can’t be sued in California state court for posting DVD decryption software (though he can probably be sued elsewhere). Apparently, the key issue was whether Pavlovich’s knowledge that his action would affect California companies was by itself enough to give California courts jurisdiction. The Court ruled that it was not.

Denise Howell at Bag and Baggage has a quickie analysis of the opinion.

Slate: Just Say No to Politics

Slate, a smart online magazine that normally urges citizen involvement in politics, published today a commentary by Paul Boutin, urging citizens who happen to be geeks not to participate in the political process.

Boutin argues (as others have before) that geeks should stick to writing code – that freedom is a Simple Matter of Programming. This was true back when the law ignored technology. Now the danger is different. A ban on broad classes of technology, or on entire areas of development, cannot be programmed around.

Boutin’s argument is especially mystifying when it is applied – as it is by Boutin – to DARPA’s now-famous Total Information Awareness program. According to press accounts, this program would accumulate information about Americans’ commercial transactions, for wide-ranging analysis by law enforcement agencies If you don’t like this program, you can’t stop it by writing code.

It’s easy to make fun of clueless geeks’ pathetic attempts to exert political muscle, like the campaign for Rep. Coble’s libertarian-blogger opponent. It’s clear that we geeks can’t go toe-to-toe with their adversaries. But that isn’t to say that we should just resign themselves to whatever Washington dishes out. The right argument, presented in the right way, can still make a difference.

Boutin is right about one thing: political muscle isn’t the answer. Let’s face it, muscle has never been our strong suit. What we need is to do what we do best: to use our brains.

[Footnote for non-geeks: The phrase “Simple Matter of Programming” is an ironic geek in-joke that geeks like to use to refer to notoriously unsolvable problems. By analogy, the eradication of poverty is a “simple matter of economics,” or achieving world peace is a “simple matter of international relations.”]

DarkNet

Lots of buzz lately about the DarkNet paper written by four Microsoft Research people.

The paper makes a three-part argument. First, there is really no way to stop file sharing, as long as people want to share files. Second, in the presence of widespread file sharing, a copy-prevention technology must be perfect, for the presence in a file sharing environment of even a single uncontained copy of a work enables anyone who wants to infringe its copyright to do so. (This is what I call the “break once, infringe anywhere” model.) Finally, there is little if any hope that a copy-prevention (or “DRM”) technology can be strong enough to prevent the creation of single uncontained copies of works. So the conclusion is that the current DRM approach will not work.

This paper has gotten attention in the policy community because it is well written and makes a compelling argument. But its argument is far from new. Indeed, the paper’s claims have been the consensus of independent security experts for a few years already. You can see this, for instance, in Bruce Schneier’s writing on DRM.

So why has the DarkNet paper gotten this much attention? My guess is that there are two reasons. First, the paper was written by guys from Microsoft Research, and Microsoft has previously taken a pro-DRM position. The paper includes a standard disclaimer saying that it is the opinion of the authors and not of Microsoft. But still it reflects a change. In past years, conference presentations from industrial researchers, both at Microsoft and elsewhere, have shied away from anti-DRM statements, so as to keep their employers happy (although vigorous anti-DRM language could often be heard at dinner afterwards). So non-techies will put more weight on the paper because of its authors’ affiliation.

The second reason for the buzz around this paper is that the “DarkNet” terminology has a certain persuasive power, evoking a subterranean world of illicit activity, a sort of criminal underground of the Net. Although compelling, the “DarkNet” concept is misleading, if it is understood as implying that one can draw a neat line between the “legitimate Net” and the illegal “DarkNet”.

In practice, the same technologies are used to conceal both legal and illegal activity. You can use a safe to lock up either criminal plans or business data. You can use encryption to conceal either copyright infringement or love letters. You can use “sneakernet” (which is a DarkNet technology, according to the paper) to share software illegally with your neighbor, or to give baby pictures to grandparents. Attempts to regulate or ban the DarkNet often affect legitimate networking. Examples of this include both the Hollings CBDTPA, which would have regulate many innocuous devices (as documented in Fritz’s Hit List), and the Berman-Coble “P2P Hacking” bill, which would affect ordinary websites.

On balance, the DarkNet paper will be valuable not because it breaks new ground technically but because of its persuasive power. If it can move the policy debate forward, and onto sounder technical ground, that will be a major achievement.