Submission Result in Legal Action Under the DCMA

Total Page:16

File Type:pdf, Size:1020Kb

Submission Result in Legal Action Under the DCMA Unintended Consequences: Five Years under the DMCA protect its monopoly on Playstation video 1. Executive Summary game consoles, as well as their Since they were enacted in 1998, the “anti- “regionalization” system limiting users in circumvention” provisions of the Digital Millennium one country from playing games Copyright Act (“DMCA”), codified in section 1201 legitimately purchased in another. of the Copyright Act, have not been used as Congress Section 1201 Becomes All-Purpose Ban on envisioned. Congress meant to stop copyright pirates Access To Computer Networks from defeating anti-piracy protections added to copyrighted works, and to ban “black box” devices Further, section 1201 has been misused as a intended for that purpose.1 new general-purpose prohibition on computer network access which, unlike the In practice, the anti-circumvention provisions have several federal “anti-hacking” statutes that been used to stifle a wide array of legitimate already protect computer network owners activities, rather than to stop copyright piracy. As a from unauthorized intrusions, lacks any result, the DMCA has developed into a serious threat financial harm threshold. Disgruntled ex- to several important public policy priorities: employer Pearl Investment’s use of the Section 1201 Chills Free Expression and DMCA against a contract programmer who Scientific Research. connected to the company’s computer system through a password-protected Virtual Experience with section 1201 demonstrates Private Network illustrates the potential for that it is being used to stifle free speech and unscrupulous persons to misuse the DMCA scientific research. The lawsuit against 2600 to achieve what would not be possible under magazine, threats against Princeton existing computer access regulation regimes. Professor Edward Felten’s team of researchers, and prosecution of Russian This document collects a number of reported cases programmer Dmitry Sklyarov have chilled where the anti-circumvention provisions of the the legitimate activities of journalists, DMCA have been invoked not against pirates, but publishers, scientists, students, program- against consumers, scientists, and legitimate comp- mers, and members of the public. etitors. It will be updated from time to time as additional cases come to light. The latest version can Section 1201 Jeopardizes Fair Use. always be obtained at www.eff.org. By banning all acts of circumvention, and all technologies and tools that can be used for 2. DMCA Legislative Background circumvention, section 1201 grants to Congress enacted section 1201 in response to two copyright owners the power to unilaterally pressures. Congress was responding to the perceived eliminate the public’s fair use rights. need to implement obligations imposed on the U.S. Already, the music industry has begun by the 1996 World Intellectual Property Organization deploying “copy-protected CDs” that (WIPO) Copyright Treaty. Section 1201, however, promise to curtail consumers’ ability to 2 went further than the WIPO treaty required. The make legitimate, personal copies of music details of section 1201, then, were a response not just they have purchased. to U.S. treaty obligations, but also to the concerns of Section 1201 Impedes Competition and copyright owners that their works would be widely Innovation. pirated in the networked digital world.3 Rather than focusing on pirates, many Section 1201 contains two distinct prohibitions: a copyright owners have wielded the DMCA ban on acts of circumvention, and a ban on the to hinder their legitimate competitors. For distribution of tools and technologies used for example, Sony has invoked section 1201 to circumvention. Unintended Consequences: Five Years Under the DMCA 1 v.3 (September 24, 2003) for latest version, visit www.eff.org The first prohibition, set out in section 1201(a)(1), ironically, for copyright owners counting on technical prohibits the act of circumventing a technological measures to protect their works), as security measure used by copyright owners to control access researchers shy away from research that might run to their works (“access controls”). So, for example, afoul of section 1201.5 this provision makes it unlawful to defeat the encryption system used on DVD movies. This ban on Cyber-Security Czar Notes Chill on Research acts of circumvention applies even where the purpose for decrypting the movie would otherwise be Speaking at MIT in October 2002, White House legitimate. As a result, when Disney’s Tarzan DVD Cyber Security Chief Richard Clarke called for prevents you from fast-forwarding through the DMCA reform, noting his concern that the DMCA commercials that preface the feature presentation, had been used to chill legitimate computer security efforts to circumvent this restriction would be research. The Boston Globe quoted Clarke as saying, unlawful. “I think a lot of people didn't realize that it would have this potential chilling effect on vulnerability Second, sections 1201(a)(2) and 1201(b) outlaw research.” the manufacture, sale, distribution or trafficking of tools and technologies that make circumvention Jonathan Band, “Congress Unknowingly possible. These provisions ban both technologies that Undermines Cyber-Security,” S.J. defeat access controls, and also technologies that MERCURY NEWS, Dec. 16, 2002. defeat use restrictions imposed by copyright owners, http://www.siliconvalley.com/mld/siliconval such as copy controls. These provisions prevent ley/4750224.htm technology vendors from taking steps to defeat the Hiawatha Bray, “Cyber Chief Speaks on “copy-protection” now appearing on many music Data Network Security,” The Boston Globe, CDs, for example. October 17, 2002. Section 1201 also includes a number of exceptions http://www.boston.com/globe/search/ for certain limited classes of activities, including security testing, reverse engineering of software, Professor Felten’s Research Team Threatened encryption research, and law enforcement. These In September 2000, a multi-industry group known exceptions have been extensively criticized as being as the Secure Digital Music Initiative (SDMI) issued too narrow to be of real use to the constituencies who 4 a public challenge encouraging skilled technologists they were intended to assist. to try to defeat certain watermarking technologies A violation of any of the “act” or “tools” intended to protect digital music. Princeton Professor prohibitions is subject to significant civil and, in Edward Felten and a team of researchers at Princeton, some circumstances, criminal penalties. Rice, and Xerox took up the challenge and succeeded in removing the watermarks. 3. Free Expression and Scientific Research When the team tried to present their results at an Section 1201 is being used by a number of academic conference, however, SDMI copyright owners to stifle free speech and legitimate representatives threatened the researchers with scientific research. The lawsuit against 2600 liability under the DMCA. The threat letter was also magazine, threats against Princeton Professor Edward delivered to the researchers’ employers and the Felten’s team of researchers, and prosecution of the conference organizers. After extensive discussions Russian programmer Dmitry Sklyarov have chilled a with counsel, the researchers grudgingly withdrew variety of legitimate activities. their paper from the conference. The threat was ultimately withdrawn and a portion of the research Bowing to DMCA liability fears, online service was published at a subsequent conference, but only providers and bulletin board operators have begun to after the researchers filed a lawsuit.ß censor discussions of copy-protection systems, programmers have removed computer security After enduring this experience, at least one of the programs from their websites, and students, scientists researchers involved has decided to forgo further and security experts have stopped publishing details research efforts in this field. of their research on existing security protocols. Pamela Samuelson, “Anticircumvention Foreign scientists are increasingly uneasy about Rules: Threat to Science,” 293 SCIENCE traveling to the United States out of fear of possible 2028, Sept. 14, 2001. DMCA liability, and certain technical conferences http://www.sciencemag.org/cgi/reprint/293/ have begun to relocate overseas. 5537/2028 These developments will ultimately result in Letter from Matthew Oppenheim, SDMI weakened security for all computer users (including, General Counsel, to Prof. Edward Felten, Unintended Consequences: Five Years Under the DMCA 2 April 9, 2001. researcher Andrew “Bunnie” Huang, citing DMCA http://cryptome.org/sdmi-attack.htm liability concerns. Wiley commissioned Huang to write the book which analyzes security flaws Huang Hewlett Packard Threatens SNOsoft discovered in the process of reverse-engineering the Microsoft X-Box game console, after Huang Hewlett-Packard resorted to Section 1201 threats published his research as part of his doctoral work at when researchers published their discovery of a M.I.T. Huang did not distribute the Xbox public security flaw in HP’s Tru64 UNIX operating system. security keys which he had isolated through reverse The researchers, a loosely-organized collective engineering and did not copy any Xbox code. known as Secure Network Operations (“SNOsoft”), Although the DMCA includes exceptions for received the DMCA threat after releasing software in circumvention for computer security testing and July 2002 that demonstrated vulnerabilities that HP
Recommended publications
  • Unintended Consequences: Twelve Years Under the DMCA
    Unintended Consequences: Twelve Years under the DMCA By Fred Von Lohmann, [email protected] February 2010 ELECTRONIC FRONTIER FOUNDATION eff.org Unintended Consequences: Twelve Years under the DMCA This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate compet- itors. It will be updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary Since they were enacted in 1998, the “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. 1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Profes- sor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, stu- dents, program¬mers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally elimi- nate the public’s fair use rights.
    [Show full text]
  • TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
    Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday.
    [Show full text]
  • The Hacker's Aegis
    Emory Law Journal Volume 60 Issue 5 2010 The Hacker's Aegis Derek E. Bambauer Oliver Day Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Derek E. Bambauer & Oliver Day, The Hacker's Aegis, 60 Emory L. J. 1051 (2010). Available at: https://scholarlycommons.law.emory.edu/elj/vol60/iss5/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. BAMBAUER&DAY GALLEYSFINAL 6/6/2011 10:27 AM THE HACKER’S AEGIS Derek E. Bambauer* ∗∗ Oliver Day ABSTRACT Intellectual property (IP) law stifles critical research on software security vulnerabilities, placing computer users at risk. Researchers who discover flaws often face IP-based legal threats if they reveal findings to anyone other than the software vendor. This Article argues that the interplay between law and vulnerability data challenges existing scholarship on how intellectual property law should regulate information about improvements on protected works, and suggests weakening, not enhancing, IP protections where infringement is difficult to detect, lucrative, and creates significant negative externalities. It proposes a set of three reforms—“patches,” in software terms—to protect security research. Legal reform would create immunity from civil IP liability for researchers who follow “responsible disclosure” rules. Linguistic reform would seek to make the term hacker less threatening either by recapturing the term’s original meaning, or abandoning it.
    [Show full text]
  • Ajax Security Is a Remarkably Rigorous and Thorough Examination of an Underexplored Subject
    “Ajax Security is a remarkably rigorous and thorough examination of an underexplored subject. Every Ajax engineer needs to have the knowledge contained in this book—or be able to explain why they don’t.” Jesse James Garrett “Finally, a book that collects and presents the various Ajax security concerns in an understandable format! So many people have hopped onto the Ajax bandwagon without considering the secu- rity ramifications; now those people need to read this book and revisit their applications to address the various security short- comings pointed out by the authors.” Jeff Forristal “If you are writing or reviewing Ajax code, you need this book. Billy and Bryan have done a stellar job in a nascent area of our field, and deserve success. Go buy this book. I can’t wait for it to come out.” Andrew van der Stock, Executive Director, OWASP “Web technologies like Ajax are creating new networked business structures that remove the sources of friction in the new econ- omy. Regrettably, hackers work to compromise this evolution by capitalizing on the weaknesses in this technology and those who develop it. Until now, few books told the whole Ajax security story, educating those using or planning to use this technology. This one does.” Managing Partner, Trellum Technologies This page intentionally left blank Ajax Security This page intentionally left blank Ajax Security Billy Hoffman and Bryan Sullivan Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Cape Town • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • 2014 EFF Unintended Consequences 2
    Unintended Consequences: Sixteen Years under the DMCA September 2014 Unintended Consequences: Sixteen Years under the DMCA September 2014 This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against “pirates,” but against consumers, scientists, and legitimate competitors. It is updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary The “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. The law was ostensibly intended to stop copyright infringers from defeating anti-piracy protections added to copyrighted works.[1] In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities. As a result, the DMCA has become a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public’s fair use rights. Already, the movie industry’s use of encryption on DVDs has curtailed consumers’ ability to make legitimate, personal-use copies of movies they have purchased.
    [Show full text]
  • TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
    Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday.
    [Show full text]
  • Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series
    Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series VOLUME 7 Series Editors: POMPEU CASANOVAS, UAB Institute of Law and Technology, Bellaterra, Barcelona, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law-CIRSFID) and European University Institute, Florence, Italy Scienti fi c Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liverpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOURCIER, CERSA, France; TOM BRUCE, University of Cornell, USA; NURIA CASELLAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; G. CONRAD JACK, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRANCESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Arquitectura de Computadors, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, University of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF,
    [Show full text]
  • 539814-00713.Pdf
    FEDERAL TRADE COMMISSION FTC TOWN HALL: DIGITAL RIGHTS MANAGEMENT TECHNOLOGIES William H. Gates Hall, Room133 University of Washington Law School 15'~Avenue NE & NE 43rdStreet Seattle, Washington Wednesday, March 25,2009 COMMENT: PROJECT NO. PO94502 ELECTRONIC FRONTIER FOUNDATION February 9,2009 Corynne McSherry Staff Attorney and Kahle Promise Fellow Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94 110 (415) 436-9333 I. Statement Of Interest EFF is a member-supported, nonprofit organization committed to defending civil liberties and the public interest in a digital world. Founded in 1990, EFF represents more than 14,000 contributing members including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers united in their reliance on a balanced copyright system that promotes both adequate protection for copyright owners and access to information in the digital age. EFF has long been an active participant in the public debate over Digital Rights Management ("DRM") technologies and the impact of such technologies on consumers. In 2001, for example, EFF defended 2600 Magazine after several major movie studios sought to enjoin publication of information about DeCSS, a program that circumvents a standard form of DRM on DVDs. Four years later, EFF took a leading role in the class action litigation against Sony BMG when the DRM in its CDs introduced security flaws into millions of computers. In addition to litigation, EFF attorneys and activists have raised public awareness on DRM issues via EFFYswebsite (one of the most linked-to sites in the world), numerous white papers, press commentary, and public speaking in the United States and abroad.
    [Show full text]
  • Unintended Consequences: Seven Years Under the DMCA
    Unintended Consequences: Seven Years under the DMCA This document collects a number of reported cases The DMCA Impedes Competition and where the anti-circumvention provisions of the Innovation. DMCA have been invoked not against pirates, but Rather than focusing on pirates, many against consumers, scientists, and legitimate comp- copyright owners have wielded the DMCA etitors. It will be updated from time to time as to hinder their legitimate competitors. For additional cases come to light. The latest version can example, the DMCA has been used to block always be obtained at www.eff.org. aftermarket competition in laser printer toner cartridges, garage door openers, and 1. Executive Summary computer maintenance services. Similarly, Since they were enacted in 1998, the “anti- Apple invoked the DMCA to chill circumvention” provisions of the Digital Millennium RealNetworks’ efforts to sell music Copyright Act (“DMCA”), codified in section 1201 downloads to iPod owners. of the Copyright Act, have not been used as Congress The DMCA Interferes with Computer envisioned. Congress meant to stop copyright Intrusion Laws. infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black Further, the DMCA has been misused as a box” devices intended for that purpose.1 general-purpose prohibition on computer network access which, unlike most computer In practice, the anti-circumvention provisions have intrusion statutes, lacks any financial harm been used to stifle a wide array of legitimate threshold. As a result, a disgruntled activities, rather than to stop copyright infringement. employer has used the DMCA against a As a result, the DMCA has developed into a serious former contractor for simply connecting to threat to several important public policy priorities: the company’s computer system through a The DMCA Chills Free Expression and VPN.
    [Show full text]
  • Blackboard, Inc. V. Billy Hoffman and Virgil Griffith
    Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 1 of 66 ORIGINAL UNITED STATES DISTRICT COURT FICEDIIV [E NORTHERN DISTRICT GEORGIA u5.p,C , RKS~,, prFa E OF C IC ATLANTA DIVISION ~7/MA Y BLACKBOARD, INC ., 1 2 2003 LUTHER,, , .S, Plaintiff, Clerk BYe Pul ICl erk v . Civil Action File No . BILLY HOFFMAN and VIRGIL GRIFFITH, I!e3-CV-1279 Defendants . NOTICE OF REMOVAL Defendants Billy Hoffman ("Hoffman") and Virgil Griffith ("Griffith") (collectively the "Defendants") file this Notice of Removal and respectfully show the following grounds for removal as specified by 28 U .S .C . § 1446 : 1 . Blackboard, Inc . ("Blackboard") has filed suit against the Defendants in the Superior Court of Dekalb County, which county is within the Atlanta Division of this Court . This suit is styled as above and numbered Civil Action No . 03CV4404-10 in that Court . The suit asserts various causes of action arising under the statutes of the United States . Blackboard is, upon information and belief, a Delaware corporation with its principal place of business in Washington, D .C . r'R~1~ RE~FI+~ C005211 IU t~S 1B( ---~- 1111 ?~ '= 71, Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 2 of 66 z . Defendant Hoffman is a Georgia resident . Defendant Griffith is an Alabama resident . Neither Hoffman nor Griffith were ever a resident of Delaware or the District of Columbia or Delaware . 3 . The afore-mentioned civil action is a civil action over which this Court has original jurisdiction under the "federal question" provisions of 28 U .S .C .
    [Show full text]