DMCA, DRM, Computer Security & You Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford, CA 94305 650-724-0014 [email protected].
Download ReportTranscript DMCA, DRM, Computer Security & You Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford, CA 94305 650-724-0014 [email protected].
DMCA, DRM, Computer Security & You Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford, CA 94305 650-724-0014 [email protected] Searching for Halvar….. Sklyarov Case • Russian programmer • Wrote program that decrypts Adobe eBooks • Program permits Read Aloud function • Also copyright infringement DMCA §1201 1 of 2 • (a)(1)(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. • (a)(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that-• (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; DMCA §1201 2 of 2 • (a)(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that-• (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or • (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title. 2600 VAN Professor Ed Felten My Speech • • • • • • • Power of the Content Industries Development of Copyright Law Dwindling Rights of Citizens Copyright Maximalism Legal and Technological Controls of Content DMCA Anti-circumvention Provisions Whether You Will Do Something About It The Congress shall have Power To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries Corporate Behemoths Sonny Bono Copyright Term Extension Act DRM = Control • • • • • SDMI CSS pay per listen limited time purchases regional pricing schemes Fair Use • (1) the purpose and character of use • (2) the nature of the copyrighted work • (3) the amount and substantiality of copying, and • (4) the market effect. DMCA 1201(b)(2)(C)(1) • Other Rights, Etc., Not Affected. • Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title. Security Testing Exception • information derived used solely to promote the security of the owner or operator of the tested computer system, or • information obtained shared directly with the developer of the system • information obtained distributed in a way that might enable copyright infringement or other legal violations Encryption Research • • • • Professional Cryptographers Seek Advance Permission Necessary to Advance the State of the Art Publishing Results Does Not Promote Infringement Reverse Engineering • Purpose to Achieve Program-to-program Interoperability • Reverse Engineering Is Necessary • Information Divulged for the Sole Purposes of Enabling Program-to-Program Interoperability http://cryptome.org/ms-drm-os.htm 12 December 2001. Thanks to I. Source: US Patent Office: http://www.uspto.gov -----------------------------------------------------------------------United States Patent 6,330,670 England , et al. December 11, 2001 ------------------------------------------------------------------------ Digital rights management operating system Abstract A digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs while the data is loaded into memory or on a page file as a result of the execution of a trusted application that accesses the memory. To protect the rights-managed data resident in memory, the digital rights management operating system refuses to load an untrusted program into memory while the trusted application is executing or removes the data from memory before loading the untrusted program. If the untrusted program executes at the operating system level, such as a debugger, the digital rights management operating system renounces a trusted identity created for it by the computer processor when the computer was booted. To protect the rights-managed data on the page file, the digital rights management operating system prohibits raw access to the page file, or erases the data from the page file before allowing such access. Alternatively, the digital rights management operating system can encrypt the rights-managed data prior to writing it to the page file. The digital rights management operating system also limits the functions the user can perform on the rights-managed data and the trusted application, and can provide a trusted clock used in place of the standard computer clock.