Linux and DeCSS: What the MPAA is Really After
"If we have to file a thousand lawsuits a day,we'll do it. It's less expensive thanlosing control of your creative works."--Jack Valenti, President and CEO,Motion Picture Association of America (emphasis mine)
Next time you think about going to see a feature film, remember this: attorneys from the MPAA and its ally, the DVD Copy Control Authority, are beating up on hackers and ISPs the world over. Their complaint? Those targeted have posted or linked to DeCSS, a Linux utility that enables Linux users to play back legally purchased DVD video discs on their systems.
If you think these lawsuits are bogus, you'd better think twice. The same organization's lobbyists played a pivotal role in several key U.S. legislative acts that transformed copyright infringement into a crime with penalties akin to second-degree murder. What's more, they could very well win the lawsuits they've filed; after all, the MPAA's lobbyists were given virtually free rein to write the very laws they're citing in these lawsuits, including the DMCA. And the MPAA has already won the opening skirmishes. Hackers can only hope that, somewhere along the way, judges will come to their senses and perceive the truth: namely, that the MPAA-backed legislation pushes the rights of copyright holders to an unconstitutional extreme. In what follows, I'll trace this outrage back to its roots--the U.S. Digital Millennium Copyright Act (DMCA)--and show you just what's at stake.
First, a bit of background. The product of a reverse-engineering effort, DeCSS was posted last fall by Jon Johansen, a Norwegian teenager. (The fact that the Norwegian police hassled and charged Johansen and his father shows that this whole mess goes far beyond the U.S. borders.) In brief, CSS--short for Content Scrambling System--is a weak encryption scheme that locks up the data in DVD video discs--unless, that is, you're using MPAA-approved commercial software, which isn't available for Linux systems. Note that CSS doesn't prevent anyone from copying DVD videos; you can copy DVD video discs all you want. Whether the disc has been copied or not doesn't matter; you can't play the disc without a CSS-enabled player. In short, CSS is not a means of copy protection. It's a means of access control. CSS is designed to extract licensing fees from companies that create DVD players and DVD software. What's more, it's designed to protect the motion picture industry's profitable markets in Europe and Australia. Among other things, CSS won't let you play a lawfully obtained DVD video if the film hasn't yet opened in theaters in your region. Try to defeat this, and you go to jail--never mind that you're in possession of a legally obtained copy of the material.
So what does the DMCA have to do with all this? Just ask Lewis A. Kaplan, a judge in the U.S. District Court's Southern District. Citing the "law of record" (including the DMCA), Kaplan issued a preliminary injunction on January 21 ordering the 2600.com Web site and its ISP to refrain from posting or in any other way "trafficking" in DeCSS, even in cases where DeCSS or similar software has "only [a] limited commercially significant purpose" other than to circumvent CSS.
And what does all this mean? It's simple, as I'll explain in the following. It shows precisely why certain provisions of the Digital Millennium Copyright Act are grossly unconstitutional. The DMCA amounts to one of the most outrageous examples I've ever seen of what happens when you let wealthy corporate campaign contributors and lobbyists dictate laws to the people of the United States. If you've been wondering whether the U.S. political system is fundamentally corrupt, you won't have any illusions by the time you've finished reading this article.
Enacted in 1998, the DMCA prohibits the circumvention of technological protection measures that copyright holders use to control access to their works. It was ostensibly enacted to bring U.S. law into conformity with the World Intellectual Property Organization (WIPO) treaty, which calls for "adequate protections" against the circumvention of measures used by copyright holders to protect their work from infringement. However, the DMCA goes far beyond the protections WIPO requires. WIPO calls for legislation that criminalizes attempts to circumvent copy-protection measures. But the DMCA criminalizes much more than that. It criminalizes any attempt to defeat any measure that controls access to a copyrighted work, even if such measures have nothing to do with copy protection.
Note that no infringement or piracy need take place in order for a civil or criminal procedure to take place under the DMCA's provisions; it is sufficient that the accused merely have manufactured, imported, offered to the public, provided, or otherwise trafficked in anything whatsoever ("a technology, product, service, device, component, or part thereof") that defeats or attempts to defeat a copyright holder's access-protection measures, even if such a thing has "only [a] limited commercially significant purpose or use other than to circumvent."
Why would the MPAA have pushed for such broad language in the anti-circumvention portions of the DMCA? In terms that seem especially chilling in the aftermath of the DeCSS lawsuits, Samuelson sums up the objectives of the MPAA and its allies:
"These groups seem to believe they are so important to America that they should be allowed to control every facet of what Americans do with digital information. They also seem to think they are entitled to control the design and manufacture of all information technologies that can process digital information" (Pamela Samuelson, "Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to be Revised", Berkeley Technology Law Review, Spring 1999).
U.S. Congressman Thomas P. Bliley of Virginia, an informed observer of the evolving digital economy, clearly recognized the peril of overly broad anti-circumvention measures. Testifying before the DMCA's enactment, Bliley noted that overly broad anti-circumvention measures "could well prove to be the legal foundation of a society in which information becomes available only on a 'pay-per-use' basis."
And that, my friends, is exactly what the MPAA and its buddies are shooting for.
|Designing Electronics with Linux||May 22, 2013|
|Dynamic DNS—an Object Lesson in Problem Solving||May 21, 2013|
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
- Nice article, thanks for the
22 min 39 sec ago
- I once had a better way I
6 hours 8 min ago
- Not only you I too assumed
6 hours 26 min ago
- another very interesting
8 hours 19 min ago
- Reply to comment | Linux Journal
10 hours 12 min ago
- Reply to comment | Linux Journal
17 hours 6 min ago
- Reply to comment | Linux Journal
17 hours 22 min ago
- Favorite (and easily brute-forced) pw's
19 hours 13 min ago
- Have you tried Boxen? It's a
1 day 1 hour ago
- seo services in india
1 day 5 hours ago
Enter to Win an Adafruit Pi Cobbler Breakout Kit for Raspberry Pi
It's Raspberry Pi month at Linux Journal. Each week in May, Adafruit will be giving away a Pi-related prize to a lucky, randomly drawn LJ reader. Winners will be announced weekly.
Fill out the fields below to enter to win this week's prize-- a Pi Cobbler Breakout Kit for Raspberry Pi.
Congratulations to our winners so far:
- 5-8-13, Pi Starter Pack: Jack Davis
- 5-15-13, Pi Model B 512MB RAM: Patrick Dunn
- 5-21-13, Prototyping Pi Plate Kit: Philip Kirby
- Next winner announced on 5-27-13!
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?