Submission Result in Legal Action Under the DCMA
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Unintended Consequences: Twelve Years Under the DMCA
Unintended Consequences: Twelve Years under the DMCA By Fred Von Lohmann, [email protected] February 2010 ELECTRONIC FRONTIER FOUNDATION eff.org Unintended Consequences: Twelve Years under the DMCA This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate compet- itors. It will be updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary Since they were enacted in 1998, the “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. 1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Profes- sor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, stu- dents, program¬mers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally elimi- nate the public’s fair use rights. -
TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday. -
The Hacker's Aegis
Emory Law Journal Volume 60 Issue 5 2010 The Hacker's Aegis Derek E. Bambauer Oliver Day Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Derek E. Bambauer & Oliver Day, The Hacker's Aegis, 60 Emory L. J. 1051 (2010). Available at: https://scholarlycommons.law.emory.edu/elj/vol60/iss5/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. BAMBAUER&DAY GALLEYSFINAL 6/6/2011 10:27 AM THE HACKER’S AEGIS Derek E. Bambauer* ∗∗ Oliver Day ABSTRACT Intellectual property (IP) law stifles critical research on software security vulnerabilities, placing computer users at risk. Researchers who discover flaws often face IP-based legal threats if they reveal findings to anyone other than the software vendor. This Article argues that the interplay between law and vulnerability data challenges existing scholarship on how intellectual property law should regulate information about improvements on protected works, and suggests weakening, not enhancing, IP protections where infringement is difficult to detect, lucrative, and creates significant negative externalities. It proposes a set of three reforms—“patches,” in software terms—to protect security research. Legal reform would create immunity from civil IP liability for researchers who follow “responsible disclosure” rules. Linguistic reform would seek to make the term hacker less threatening either by recapturing the term’s original meaning, or abandoning it. -
Ajax Security Is a Remarkably Rigorous and Thorough Examination of an Underexplored Subject
“Ajax Security is a remarkably rigorous and thorough examination of an underexplored subject. Every Ajax engineer needs to have the knowledge contained in this book—or be able to explain why they don’t.” Jesse James Garrett “Finally, a book that collects and presents the various Ajax security concerns in an understandable format! So many people have hopped onto the Ajax bandwagon without considering the secu- rity ramifications; now those people need to read this book and revisit their applications to address the various security short- comings pointed out by the authors.” Jeff Forristal “If you are writing or reviewing Ajax code, you need this book. Billy and Bryan have done a stellar job in a nascent area of our field, and deserve success. Go buy this book. I can’t wait for it to come out.” Andrew van der Stock, Executive Director, OWASP “Web technologies like Ajax are creating new networked business structures that remove the sources of friction in the new econ- omy. Regrettably, hackers work to compromise this evolution by capitalizing on the weaknesses in this technology and those who develop it. Until now, few books told the whole Ajax security story, educating those using or planning to use this technology. This one does.” Managing Partner, Trellum Technologies This page intentionally left blank Ajax Security This page intentionally left blank Ajax Security Billy Hoffman and Bryan Sullivan Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Cape Town • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. -
2014 EFF Unintended Consequences 2
Unintended Consequences: Sixteen Years under the DMCA September 2014 Unintended Consequences: Sixteen Years under the DMCA September 2014 This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against “pirates,” but against consumers, scientists, and legitimate competitors. It is updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary The “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. The law was ostensibly intended to stop copyright infringers from defeating anti-piracy protections added to copyrighted works.[1] In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities. As a result, the DMCA has become a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public’s fair use rights. Already, the movie industry’s use of encryption on DVDs has curtailed consumers’ ability to make legitimate, personal-use copies of movies they have purchased. -
TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday. -
Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series
Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series VOLUME 7 Series Editors: POMPEU CASANOVAS, UAB Institute of Law and Technology, Bellaterra, Barcelona, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law-CIRSFID) and European University Institute, Florence, Italy Scienti fi c Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liverpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOURCIER, CERSA, France; TOM BRUCE, University of Cornell, USA; NURIA CASELLAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; G. CONRAD JACK, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRANCESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Arquitectura de Computadors, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, University of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF, -
539814-00713.Pdf
FEDERAL TRADE COMMISSION FTC TOWN HALL: DIGITAL RIGHTS MANAGEMENT TECHNOLOGIES William H. Gates Hall, Room133 University of Washington Law School 15'~Avenue NE & NE 43rdStreet Seattle, Washington Wednesday, March 25,2009 COMMENT: PROJECT NO. PO94502 ELECTRONIC FRONTIER FOUNDATION February 9,2009 Corynne McSherry Staff Attorney and Kahle Promise Fellow Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94 110 (415) 436-9333 I. Statement Of Interest EFF is a member-supported, nonprofit organization committed to defending civil liberties and the public interest in a digital world. Founded in 1990, EFF represents more than 14,000 contributing members including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers united in their reliance on a balanced copyright system that promotes both adequate protection for copyright owners and access to information in the digital age. EFF has long been an active participant in the public debate over Digital Rights Management ("DRM") technologies and the impact of such technologies on consumers. In 2001, for example, EFF defended 2600 Magazine after several major movie studios sought to enjoin publication of information about DeCSS, a program that circumvents a standard form of DRM on DVDs. Four years later, EFF took a leading role in the class action litigation against Sony BMG when the DRM in its CDs introduced security flaws into millions of computers. In addition to litigation, EFF attorneys and activists have raised public awareness on DRM issues via EFFYswebsite (one of the most linked-to sites in the world), numerous white papers, press commentary, and public speaking in the United States and abroad. -
Unintended Consequences: Seven Years Under the DMCA
Unintended Consequences: Seven Years under the DMCA This document collects a number of reported cases The DMCA Impedes Competition and where the anti-circumvention provisions of the Innovation. DMCA have been invoked not against pirates, but Rather than focusing on pirates, many against consumers, scientists, and legitimate comp- copyright owners have wielded the DMCA etitors. It will be updated from time to time as to hinder their legitimate competitors. For additional cases come to light. The latest version can example, the DMCA has been used to block always be obtained at www.eff.org. aftermarket competition in laser printer toner cartridges, garage door openers, and 1. Executive Summary computer maintenance services. Similarly, Since they were enacted in 1998, the “anti- Apple invoked the DMCA to chill circumvention” provisions of the Digital Millennium RealNetworks’ efforts to sell music Copyright Act (“DMCA”), codified in section 1201 downloads to iPod owners. of the Copyright Act, have not been used as Congress The DMCA Interferes with Computer envisioned. Congress meant to stop copyright Intrusion Laws. infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black Further, the DMCA has been misused as a box” devices intended for that purpose.1 general-purpose prohibition on computer network access which, unlike most computer In practice, the anti-circumvention provisions have intrusion statutes, lacks any financial harm been used to stifle a wide array of legitimate threshold. As a result, a disgruntled activities, rather than to stop copyright infringement. employer has used the DMCA against a As a result, the DMCA has developed into a serious former contractor for simply connecting to threat to several important public policy priorities: the company’s computer system through a The DMCA Chills Free Expression and VPN. -
Blackboard, Inc. V. Billy Hoffman and Virgil Griffith
Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 1 of 66 ORIGINAL UNITED STATES DISTRICT COURT FICEDIIV [E NORTHERN DISTRICT GEORGIA u5.p,C , RKS~,, prFa E OF C IC ATLANTA DIVISION ~7/MA Y BLACKBOARD, INC ., 1 2 2003 LUTHER,, , .S, Plaintiff, Clerk BYe Pul ICl erk v . Civil Action File No . BILLY HOFFMAN and VIRGIL GRIFFITH, I!e3-CV-1279 Defendants . NOTICE OF REMOVAL Defendants Billy Hoffman ("Hoffman") and Virgil Griffith ("Griffith") (collectively the "Defendants") file this Notice of Removal and respectfully show the following grounds for removal as specified by 28 U .S .C . § 1446 : 1 . Blackboard, Inc . ("Blackboard") has filed suit against the Defendants in the Superior Court of Dekalb County, which county is within the Atlanta Division of this Court . This suit is styled as above and numbered Civil Action No . 03CV4404-10 in that Court . The suit asserts various causes of action arising under the statutes of the United States . Blackboard is, upon information and belief, a Delaware corporation with its principal place of business in Washington, D .C . r'R~1~ RE~FI+~ C005211 IU t~S 1B( ---~- 1111 ?~ '= 71, Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 2 of 66 z . Defendant Hoffman is a Georgia resident . Defendant Griffith is an Alabama resident . Neither Hoffman nor Griffith were ever a resident of Delaware or the District of Columbia or Delaware . 3 . The afore-mentioned civil action is a civil action over which this Court has original jurisdiction under the "federal question" provisions of 28 U .S .C .