Linux and DeCSS: What the MPAA is Really After
"If we have to file a thousand lawsuits a day,we'll do it. It's less expensive thanlosing control of your creative works."--Jack Valenti, President and CEO,Motion Picture Association of America (emphasis mine)
Next time you think about going to see a feature film, remember this: attorneys from the MPAA and its ally, the DVD Copy Control Authority, are beating up on hackers and ISPs the world over. Their complaint? Those targeted have posted or linked to DeCSS, a Linux utility that enables Linux users to play back legally purchased DVD video discs on their systems.
If you think these lawsuits are bogus, you'd better think twice. The same organization's lobbyists played a pivotal role in several key U.S. legislative acts that transformed copyright infringement into a crime with penalties akin to second-degree murder. What's more, they could very well win the lawsuits they've filed; after all, the MPAA's lobbyists were given virtually free rein to write the very laws they're citing in these lawsuits, including the DMCA. And the MPAA has already won the opening skirmishes. Hackers can only hope that, somewhere along the way, judges will come to their senses and perceive the truth: namely, that the MPAA-backed legislation pushes the rights of copyright holders to an unconstitutional extreme. In what follows, I'll trace this outrage back to its roots--the U.S. Digital Millennium Copyright Act (DMCA)--and show you just what's at stake.
First, a bit of background. The product of a reverse-engineering effort, DeCSS was posted last fall by Jon Johansen, a Norwegian teenager. (The fact that the Norwegian police hassled and charged Johansen and his father shows that this whole mess goes far beyond the U.S. borders.) In brief, CSS--short for Content Scrambling System--is a weak encryption scheme that locks up the data in DVD video discs--unless, that is, you're using MPAA-approved commercial software, which isn't available for Linux systems. Note that CSS doesn't prevent anyone from copying DVD videos; you can copy DVD video discs all you want. Whether the disc has been copied or not doesn't matter; you can't play the disc without a CSS-enabled player. In short, CSS is not a means of copy protection. It's a means of access control. CSS is designed to extract licensing fees from companies that create DVD players and DVD software. What's more, it's designed to protect the motion picture industry's profitable markets in Europe and Australia. Among other things, CSS won't let you play a lawfully obtained DVD video if the film hasn't yet opened in theaters in your region. Try to defeat this, and you go to jail--never mind that you're in possession of a legally obtained copy of the material.
So what does the DMCA have to do with all this? Just ask Lewis A. Kaplan, a judge in the U.S. District Court's Southern District. Citing the "law of record" (including the DMCA), Kaplan issued a preliminary injunction on January 21 ordering the 2600.com Web site and its ISP to refrain from posting or in any other way "trafficking" in DeCSS, even in cases where DeCSS or similar software has "only [a] limited commercially significant purpose" other than to circumvent CSS.
And what does all this mean? It's simple, as I'll explain in the following. It shows precisely why certain provisions of the Digital Millennium Copyright Act are grossly unconstitutional. The DMCA amounts to one of the most outrageous examples I've ever seen of what happens when you let wealthy corporate campaign contributors and lobbyists dictate laws to the people of the United States. If you've been wondering whether the U.S. political system is fundamentally corrupt, you won't have any illusions by the time you've finished reading this article.
Enacted in 1998, the DMCA prohibits the circumvention of technological protection measures that copyright holders use to control access to their works. It was ostensibly enacted to bring U.S. law into conformity with the World Intellectual Property Organization (WIPO) treaty, which calls for "adequate protections" against the circumvention of measures used by copyright holders to protect their work from infringement. However, the DMCA goes far beyond the protections WIPO requires. WIPO calls for legislation that criminalizes attempts to circumvent copy-protection measures. But the DMCA criminalizes much more than that. It criminalizes any attempt to defeat any measure that controls access to a copyrighted work, even if such measures have nothing to do with copy protection.
Note that no infringement or piracy need take place in order for a civil or criminal procedure to take place under the DMCA's provisions; it is sufficient that the accused merely have manufactured, imported, offered to the public, provided, or otherwise trafficked in anything whatsoever ("a technology, product, service, device, component, or part thereof") that defeats or attempts to defeat a copyright holder's access-protection measures, even if such a thing has "only [a] limited commercially significant purpose or use other than to circumvent."
Why would the MPAA have pushed for such broad language in the anti-circumvention portions of the DMCA? In terms that seem especially chilling in the aftermath of the DeCSS lawsuits, Samuelson sums up the objectives of the MPAA and its allies:
"These groups seem to believe they are so important to America that they should be allowed to control every facet of what Americans do with digital information. They also seem to think they are entitled to control the design and manufacture of all information technologies that can process digital information" (Pamela Samuelson, "Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to be Revised", Berkeley Technology Law Review, Spring 1999).
U.S. Congressman Thomas P. Bliley of Virginia, an informed observer of the evolving digital economy, clearly recognized the peril of overly broad anti-circumvention measures. Testifying before the DMCA's enactment, Bliley noted that overly broad anti-circumvention measures "could well prove to be the legal foundation of a society in which information becomes available only on a 'pay-per-use' basis."
And that, my friends, is exactly what the MPAA and its buddies are shooting for.
Practical Task Scheduling Deployment
July 20, 2016 12:00 pm CDT
One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of criteria. It's pretty easy to string these tools together to build even more powerful tools, such as a tool that finds all of the .log files in the /home directory and searches each one for a particular entry. This erector-set mentality allows UNIX system administrators to seem to always have the right tool for the job.
Cron traditionally has been considered another such a tool for job scheduling, but is it enough? This webinar considers that very question. The first part builds on a previous Geek Guide, Beyond Cron, and briefly describes how to know when it might be time to consider upgrading your job scheduling infrastructure. The second part presents an actual planning and implementation framework.
Join Linux Journal's Mike Diehl and Pat Cameron of Help Systems.
Free to Linux Journal readers.Register Now!
- SUSE LLC's SUSE Manager
- My +1 Sword of Productivity
- Murat Yener and Onur Dundar's Expert Android Studio (Wrox)
- Non-Linux FOSS: Caffeine!
- Managing Linux Using Puppet
- Doing for User Space What We Did for Kernel Space
- SuperTuxKart 0.9.2 Released
- Parsing an RSS News Feed with a Bash Script
- Tech Tip: Really Simple HTTP Server with Python
- Rogue Wave Software's Zend Server
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide