Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 77
Computer underground Digest Sun Oct 26, 1997 Volume 9 : Issue 77
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.77 (Sun, Oct 26, 1997)
File 1--Telerights II - Current Digital Copyright Controversy
File 2--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sun, 26 Oct 1997 13:46:48 -0600 (CST)
From: Wade Riddick <riddick@MAIL.LA.UTEXAS.EDU>
Subject: File 1--Telerights II - Current Digital Copyright Controversy
Open Letter to Chairman Tauzin Concerning
the Current Digital Copyright Controversy
(c) 1997 By Wade Riddick
All rights reserved
Circulate freely without alteration
The following is an edited version of an open letter sent to
House Telecommunications Subcommittee Chairman Billy Tauzin
(R-Houma, LA) calling for legislative action (and in some
instances, inaction).
It is an overview of market forces involved in the current
digital copyright debate and an analysis of the broad
evolutionary changes occurring in technology. Because of
its general nature, more advanced readers will no doubt
find some technical inconsistencies and omissions.
I make it available to encourage you to support Chairman
Tauzin and others in Congress in their effort to forge a
compromise between the conflicting interests involved. This is
not easy work and our representatives deserve our
assistance and sympathy in this matter.
Wade Riddick
Department of Government
University of Texas-Austin
RIDDICK@JEEVES.LA.UTEXAS.EDU
----------------------------------------------------------
--
The Honorable Billy Tauzin
2183 Rayburn House Office Building
Washington, DC 20515
(o)202-225-4031
Dear Chairman Tauzin,
10/23/97
My name is Wade Riddick. I am in graduate school studying
political
science at the University of Texas, with a particular focus on
technology and economic regulation.
As a fellow Louisiana citizen, I have for some time followed
your work on HDTV, data privacy and encryptionA0issues
with keen interest, most recently with respect to H.R.
2368. You are one of the few members of Congress witha
deep understanding of the concerns involved and the balance that
must be struck between public and private interests to make
the digital economy work.
I am writing to bring to your attention the important way in
which these issues intersect with respect to digital
copyrights and the opportunity this provides you. As you
know, the Internet Service Provider (ISP) liability
problem has recently flared up again on Capitol Hill, which is
disappointing. There is a fairly simple method for
creating strong digital property rights
which will benefit both authors and consumers-namely through the
use of public key encryption-and yet, for several years
now, the industry has been at loggerheads over whether and
how to do this. I believe Congress can provide the
leadership to unite these diverse and often opposing viewpoints.
A little over a year ago, I proposed just such a solution that
would
favor most parties in this debate (_BYTE Magazine_, Feb. '96). My
work is by no means unique and in the following year
several companies including powerhouses like Xerox and IBM
have moved forward in marketing various components of this
digital copyright enforcement model.
However, these commercial solutions have tended to be closed,
proprietary in design and niche oriented. Their
development has also tended to exclude
players outside the computer industry, where lies much of the
impetus for
making harmful revisions to the copyright law. Because no uniform
standards exist, companies have been reluctant to invest
in these systems and use them to sell their most valuable
forms of property.
It is no surprise given the relative youth of the computer
industry that it lacks the political experience necessary
to forge a broad consensus and lay the foundations for
the public infrastructureA0necessary to address these
digital concerns. Bold (and incorrect) statements like
'information wants to be free' frequently leave copyright
holders ill at ease and casting about for ways to
strengthen their rights.
Congress, however, is in a position to bring these opposing
sides together, reduce the anxiety surrounding such solutions
and create a level
playing field of benefit to the greater economy.
If I may, I would like to briefly outline how such a copyright
system
would function, how it would benefit the currently squabbling
interest groups, what kind of opposition it might
encounter and why Congress should get involved in brokering a
settlement.
My personal position on digital IP reform is quite simple; I
do not have one. I believe it is first necessary to
enforce current property rights before we can address their
inadequacies. The existing copyright code provides adequate
*legal* protection for authors and gives them the ability
to seek restitution for their work. What is lacking
electronically is a *practical* means of enforcing these
rights which makes it easy for consumers to comply with
the law.
My research goal has been to discover and then advocate such
methods in the hopes that we can return to more of an
open market in intellectual property. I believe that if
someone buys a book in hardback, they ought tobe able to
buy, 'own' and resell its digital 'copy' in exactly the same
fashion they can with the physical document. Decisions
like 'renting' software are
most efficiently left to free enterprise and not mandated in the
law. Once
intellectual property is open to rental, lease, outright purchase
and even
bundling like financial options-just as any other form of
property-then its
market will expand as fruitfully as other capital markets have in
the last
decade. The more flexible the law is in rewarding entrepreneurs,
the more
complex, developed and profitable the marketplace will become. I
do not believe this will come about by adding further
restrictions and regulations2E
How will it happen? The technical alterations which must be
made to digital 'publishing' are quite simple, though
they require a great deal of forethought and coordinat
ion among many companies to implement. The changes rely
on one basic foundation of digital communication-that
while information can be easily *copied*, it
cannot always be easily *used*. The best example of this is
encryption.
Without the proper key, any encrypted document is worthless. If
that key can be protected and monitored by networking
utilities, then the entire document can be tracked as
well without regard to how its encrypted form is duplicated.
This thinking is the basis of many different efforts in
digital copyright protection. Under a system which I
call telerights and others call 'cryptolopes' (or, more
generally, 'digital libraries') *each* copy of a document
which is published for sale is encrypted with a key unique to
that
document, thus personalizing the copy for each purchaser. In the
accompanying diagram, I have outlined four different steps
to
illustrate how such a system works. In the first stage, the
publisher creates several different copies of the same
document using distinct private encryption keys. The public
key is later passed out to read the document.
Because of the nature of public key encryption, only the owner of
the private key (the publishing house) can ever fix
content into a publishable form that matches the public
key. This makes it impossible for an outsider to switch
content and steal property during the transaction process. A
special bank or escrow agent is used to complete the actual
sale, thereby shielding the user's identity from the
publisher in much the same way cash does in a
bookstore. The publisher collects payment and passes along
the encrypted document, together with a small
signature which combines information about the
publisher, the document and the privileges granted to a user.
By
using a signature to communicate about the document, it is not
necessary to
reveal the nature of the content in any transaction. The escrow
agent forwards the user's identity to a bookstore, which al
so collects a copy of the signature and the actual public
key from the publisher. When the user is ready to
'view' the document-and this could include anything
from running PC software to listening to music-he sends the
signature to the bookstore which returns the public
key. Because these bits of data are very small, this process
requires very
little time to complete. Even on a fairly slow modem, up to a
dozen keys per second can be transmitted compared to the
minutes or hours it would take to
re-download, say, a large movie. (Pay Per View films and digital
TV broadcasts could avoid this speed problem by transmitting
each frame in a
series of single smaller documents). When the user requests the
key, the bookstore notifies the publisher that his
particular key is in use, allowing them to search other
bookstores for
evidence that the key has been pirated (e.g., someone else is
using it simultaneously). If it has been, then the publisher
can either block access and contact the owner or go to
the extreme of invalidate the key and starting an
investigation, depending on whatever prior arrangement was reached
at the time of sale.
Notice how this puts the burden of preventing intellectual
property theft on the actual purchaser of the material
and not the publisher, which is as it should be with any
form of property that is sold. It becomes the user's du
ty to keep copies of his document out of circulation,
incurring a significant
risk of having his key invalidated if he carelessly 'loans out'
his material or fails to take other precautions. It is
*his* property that is stolen in
any act of piracy. The crucial part of this process-and where the
need for corporate coordination is most evident-comes in
the safeguards which must be built into the user's
computer itself. When the machine receives the key in the
final
part of the third stage, it is placed in a tamper resistant area
of RAM where it is used to decrypt the document. This is
essentially a portion of the
computer that is tied into the network and off limits to the user.
These
types of secure memory are already widely used in many inexpensive
smart cards and, even when combined with the other
alterations, should only add a few
dollars to the physical cost of a PC. When the user finishes
viewing the document in the final stage, the key and
decrypted content are erased and a message is sent back to the
bookstore (and on to the publisher) informing them
the material is secured again. The user, of course,
retains the encrypted document to store and do with as he
pleases. He may make unlimited multiple backups of his
information without
raising the author's fears of illicit use. He can also move
copies around
between his home and office or take them on vacations and business
trips.
While this method of protection may seem quite simple, it
changes a variety of important behaviors in the marketplace,
giving digital materials
the properties we have come to appreciate in most physical goods.
For example, users could band together to purchase one copy
of a book and shareit among themselves at prearranged
times, much like a household can now 'share' software.
Several public libraries could pool their meager funds and
purchase a single copy of an expensive document that
would be available to patrons from several geographic
areas to check out. Users could also carry materials cr
oss country and access them from several different computers,
provided they take the proper precautions.
What is truly interesting is the way such an arrangement would
expand the publishing world. The low cost of digital
distribution would be turned from a drawback into an
advantage. Individuals could very inexpensively sell thei
r own content or repackage and distribute the content of
others, adding valuein any of a dozen ways. By
collecting a fee for what was once considered piracy,
such distributors would be encouraged through market incentives to
enforce the property rights of other publishers.
A new rental market would also be opened. Users would be able
to loan
out their copies or even rent them by acting, in effect, as their
own publisher. They could encrypt an item they have
purchased with their own set of keys and just follow the
four steps again, this time from the seller's
point of view. Getting to the real content would require the
borrower to go through both keys. The borrower would
have to go through both keys to get to the real content.
'Returning' such borrowed material would be quite easy. The
bookstore
would be instructed to simply stop honoring the new signature
after a given
period of time. Thus keeping track of materials on loan in a
public library would become automatic, not to say
inexpensive.
Material could be republished this way several times. Indeed,
multiple copyright holders could easily mix their work
together and get reimbursed
according to a prearranged formula, thus simplifying, for example,
the negotiations a movie producer might have to go through to
acquire the rights of a hit song for the soundtrack.
This infrastructure could also be used as a broadcast conduit
for ostensibly free information. As I pointed out earlier,
only those individuals with the private key can publish
material that matches the public key. A
television network, in order to protect its advertisers from
having their
messages stripped out, could encode their signals with a single
key whose
brother would then be provided freely to the public.
Rebroadcasters would not be able to piggyback their own
commercials over legitimate ones and users who 'tape' the
programs would not be able to avoid the commercials without
purchasing separate, clean copies. And by tracking requests for
the public
key, networks could also assemble valuable demographic numbers.
By breaking up the information needed to pay for and use
copyrighted
materials and limiting the players to their own spheres of
self-interest, this process reinforces not only royalty
collections but also privacy rights.
Bookstores, for instance, would be in the business of monitoring
keys, the one duty they are contracted with both parties
to perform. A bookstore would have no interest in the
type of content it was monitoring the same way the phone
company has no interest in what two parties are saying, only in
making the
connection. Likewise a publisher would not care who in particular
buys their product, only that they can collect their
money and stem losses from piracy. They
might like to know demographic information about their consumers,
but this
could be collected quite easily though a third party auditor who
could scan
bookstore records on behalf of the entire publishing industry,
stripping away individual user identities before matching
the pertinent statistics up with
the nature of the content. In this way, user privacy can be
protected while still allowing businesses to acquire the
much needed marketing information
which benefits everyone. Of course, as with any financial
transaction, allowances would have tobe made for
other types of auditing to prevent piracy and money laundering
andto insure proper bookkeeping standards-but these
last two issues will have to be faced in the broader
context of digital commerce anyway and proper benchmar
ks for such regulation already exist in the financial
world. The first issue, piracy, actually becomes much easier
to deal with under this system. In order to make
money, a pirate will either have to enter the market
as a legitimate publisher (in essence 'publishing' stolen
material) or he will have to settle for selling the
decrypted content and disguising his
profits. Given the ease of legal republishing and assuming that
digital distribution will vastly lower prices, pirates should
usually opt to go legitimate as redistributors of goods. On
the user side, most consumers should shy away from purchasing
decrypted goods, particularly if the costs of the
commercial items can be lowered sufficiently.
In any event, one thing would stand in the way of exchanging
pirated
goods, decrypted or not: watermarks. It is becoming quite easy to
insert
permanent, indelible watermarks into audio and video information
to identify the true author and purchaser. The user's
computer could be instructed to
scan for one of these marks in a random audit of a decrypted
document and then forwarding it on to the bookstore or a
third party association specifically
set up to check for stolen goods. This would provide a check on
unscrupulous publishers who dupe well-meaning consumers,
vastly increasing the risk associated with trafficking in
pirated goods.
What I have just outlined is only one possible way to
structure digital copyright transactions. A user's
identity and privacy, for instance, could
easily be shielded much earlier in the process. The network
provider might
simply send the bank a guaranteed pseudonym and retain all the
user's personal information to themselves. One could
also add more privacy through multiple banks and escrow
agents in the transaction. As well, the bookstore does no
t necessarily need to hold the actual decryption key. It
could merely act asa conduit through which the key passes
in a private channel to the user. Should the publisher
go bankrupt or cease operations, the user could rely on a thi
rd party warehouse agreed to with the publisher for archiving
keys.
I will turn now to the political questions involved in
developing sucha system. This model makes two key
technical assumptions, neither of which is far-fetched
but both of which lie at the heart of Hollywood's fears. The
first assumption is that the personal computer will become the
ubiquitous
device through which we consume information. The second is that
every one of these computers will have a continuous
network connection out of the home. In terms of technical
advances, neither of these are terribly difficult obstac
les to overcome. The know-how exists; it only needs
deployment in high volume
consumer goods. The question is who will pay for it and who will
try to throw up regulatory hurdles.
On the hardware side, it is becoming increasingly clear that
advanced
computing power will in a few years penetrate homes to the same
degree that
telephones and TVs have, perhaps even replacing both devices. It
makes little difference whether the end product will be a
smart TV or a PC adapted to accept multimedia broadcasts.
Right now, the abilities of these devices to
quickly and cheaply reproduce digital information in volume has
copyright
holders justifiably worried. So far, their response has been
quite typical2E They have either tried to retard
these advances through litigation turned to dedicated
hardware like DVD players which limit the flow of information.
This is not a viable long term strategy. Computing history is
littered with the remains of dedicated platforms and
proprietary designs. DVDs are
simply one more data storage format in a long line. It is
inevitable that
consumers will acquire some kind of mass storage technology and
eventually
some arrangement of two-way accounting between publishers and
consumers must be agreed to. Whether publishers like it
or not, PCs will become widespread, will overwhelm any
dedicated player and any long term solution must take th
is into account.
The mistake made in past DVD negotiations is not that
encryption was
used, but that it was not taken far enough. DVD keys are tied
into the players themselves, which in turn are geared toward
distinct geographic regions. The goal, basically, is to
prevent Chinese pirates from cracking the code in their
region and then distributing movies released in China back in
to the U.S. If these keys were geared to the individual
purchaser instead of an arbitrary region, then Chinese
utilities could be given a small financial
incentive to monitor and enforce the copyrights as key managers.
But Hollywood interests did not turn to encryption with this
goal in
mind. They did so to protect their current distribution system
using the same logic that saved them from the analog
electronics revolution of the VCR. When you copy a movie
onto videotape, its quality degrades quickly-as does that
of CDs transferred to audiotape. Digital technology
eliminates this problem, but Hollywood has sought to use
these same methods to reign in pirates. In the
case of Digital Audio Tape, individual recorders are specifically
designed to degrade the signal when copies are made.
However, the worlds of software and movies are in for a rude
collision2E Computer data cannot tolerate any such
degradation. Mass storage devices like CDs, hard drives
and tape backups must do their jobs of reproduction
perfectly. So far the entertainment industry has been protected
by the high costs of devices like CD-ROM burners, but as
prices for them drop rapidly and they become standard
components in computers the consumer electronics and PC
industries will inevitably collide.
The second assumption this new copyright system makes is that
homes will have a continuous network connection.
Technically, this is not an onerous
requirement for the kind of model I have outlined. Most homes
already havea continuous cable feed, often times
bi-directional. Several companies are also working on
using power lines to transmit information continually into and
out of electrical sockets. By the time such a copyright
management system could be developed and marketed, these
technologies will probably be widely available to consumers.
Even if they are not, the system I have proposed can work
with the intermittent contact of a regular phone line. Indeed the
phone, coupled with the video store, becomes more
efficient at delivering movies than cable. The data
required to transmit a key is minuscule compared to that o
f constantly rebroadcasting a movie on Pay-Per-View each time
a viewer wants to watch it.
Politically, however, the issue of network connections is a
more subtle problem that tends to be finessed differently
by different players. Here the focus of the fight is not
on preventing piracy from happening, as it is with DVD
players, but in shifting around the legal liability once it does
happen2E
The main target for the entertainment industry are the
Internet Service Providers (ISPs) who supply networking
services to personal computer owners2E Since ISPs
lack the tools to track piracy on every PC plugged into their
network, they have little choice but to try to claim that they are
not in the content business and seek protection under the
common carrier statutes.
This is indeed an ironic trend. Most companies in the
aftermath of the 1996 Telecommunications Act have been
more than happy to jump feet first into the content
business. Just the opposite is true for ISPs. Copyright
liability legislation being considered would vastly increase their
costs with little or no reward on their part for
enforcing any of these laws.
The phone companies, who are ambivalent about the internet and
have not yet fully committed to being ISPs, are happy to
stand by and watch their ISP competitors get taken to the
cleaners on this issue. Not only does it clear the ISP
field for the bells to enter (by vastly increasing the
administrative costs of regulatory compliance-something
they are very good at), it also knocks out all the companies
who are competing with their phone business by
using the internet. Both ISPs and the Bells must be convinced
that they can profit from the liability 'problem' by
collecting key management fees. When ISPs object th
at they are not in the business of monitoring content,
pay them to make it in
their interest. Turn that liability into an advantage by making
them a rewarded part of the 'publishing' process. Allow them
to collect a toll for keeping track of this valuable
information. Convince publishers, in turn,
that such fees are be minimal compared to the money they would
save through
digital distribution. In this part of the fight, phone companies
are potentially your savviest ally if they can be
convinced in the merits of altering the copyright
landscape. They already have an extensive accounting
infrastructure that
could easily track these multiple individual transactions (unlike
cable companies and most ISPs). The Bells are also far more
experienced with these kinds of large industry
negotiations and lobbying efforts, particularly on the
international front where much work would have to be done. The
one major
objection the bells might have lies in moving closer to a packet
switched
network. However, confounding any such rapprochement among the
industries is the decision of the 1996
Telecommunications Act to further blur the barriers
between content carriers and producers. There is ample
incentive now for
companies who act as both a creator and distributor of content to
use both to their advantage. Microsoft, for instance,
can propose proprietary software
solutions that only benefit *its* MSN network and *its* content
partners and/or charge others an exorbitant fee for the same
service. Its recent acquisition of Web TV and its
investments in the cable industry only multiply the
possibilities.
Under a telerights-like system, users would no long be locked
in to particular channels of distribution when they buy a
product. A user on the
Microsoft Network, for instance, could purchase advice formerly
supplied only through AOL. Producers would cut deals
with bookstores based on the price of monitoring their
keys, not on the type of digital content they provided. I
f this blur is allowed to persist without clear regulatory
controls, one might see a market restriction tantamount
to, say, only Merrill Lynch traders being allowed to buy
and sell IBM stock.
The problem is more pernicious within movie studios themselves
where
content and distribution have been wed the longest. For decades
studios have relied on the huge expense of developing
negatives of film stock and making
and distributing prints as ways of protecting their property from
piracy-aided by the fact that theaters are also a
relatively public business. The new
analog technologies of VCRs and cable-TV were adapted to this mold
closely
enough to suit Hollywood's expectations and they are now merely
extra stages in a film's release. And in some case,
companies like Disney have sought even better integration
by combining with broadcast and cable entities.
Under this new copyright model the increased profits due to
gains in
efficiency should benefit most publishing *and* distributing
operations-provided the two can be separated-but the movie making
business continues to be a tightly knit industry and, if
not properly appeased, may prove a further obstacle to
change. The key problem will probably center around formats of
distribution. Once a film goes from theatrical release (where it
can be closely tracked) to digital consumer form, the *type*
of format it is distributed on becomes irrelevant. Bits are
bits whether delivered over a
cable connection, the airwaves, the phone or purchased on a disk
platter. Indeed, consumers may choose to forgo spending the
extra dollars on, say, printed liner notes or fancy
box artwork and instead have material copied
directly to their own blank disks. Freeing the market this way
will, no doubt, prove beneficial for consumers, the
industries and the country as a
whole but not without first having an impact on advertising and
marketing in the film industry (if not to say the entire
video rental/retail and cable/broadcast sectors).
As I have pointed out, most of the friction in the digital
copyright
fight has centered on the two fronts of computer hardware and
networking liability. This conflict would be more profitable
for all parties concerned if it were not split in this
fashion. As it stands, ISPs cannot turn the
lobbying pressure around to encourage PC makers to build
monitoring devices
into their products. It raises the traditional hackles of Big
Brother intrusion even though phone companies already keep
track of this kind of information. Computer companies, in
turn, cannot rely on ISPs to alleviate
the fear film makers have about the copying abilities of things
like DVD drives. ISPs have to claim they are not in the
content monitoring business
because they are not even in a position to develop the necessary
hardware
tools. The result is two separate industry battles inching
forward. It must be the business of Congress to address all
of these concerns at the same time. Despite this
muddied copyright terrain, some companies have already
sensed the underlying logic of the convergence. They have
tried to bridge the gap on their own but so far their
efforts have been fragmented and far from
comprehensive. IBM, for example, has proposed a system called
cryptolopes
which sends purchased information across the internet in encrypted
form.
However it lacks the ability to protect and track such information
once it is downstream. Xerox's work on digital
libraries-which perhaps comes closest to the ideal-is not
currently geared toward the consumer PC market. Neither
company's system shows any signs of turning into a universal data
standard for conveying books, movies, music and other
consumer goods.
One of the most interesting recent innovations comes out of
the DVD industry itself. Circuit City is developing a
special rentable DVD movie
format that makes consumers dial over the telephone for the
unlocking key if they decide to purchase the material.
Unfortunately, this appears to be a one time call and,
once again, it is far from being an industry standard product.
Neither is it adapted for the most important digital
appliance, the personal computer, nor can it handle any
of the vast array of other forms of information like CDs and
computer software.
These partial efforts are not enough. As you can see, the
problems the market has had to date in reaching a
solution are mostly organizational and
not technological. For the public good, a unified method of
handling copyrighted information needs to be developed to
ensure that we do not havea single market based on
competing and mutually exclusive currencies of transaction.
Congress can encourage this by simplifying copyright liability
and transferring back to the buyer all the digital ownership
rights that have been stripped away (e.g. rental
rights)-provided of course that this information
can be delivered in a properly monitored, encrypted form. This
will give ISPs a happy medium for accepting
responsibility for the copyrighted information
passing through them. To do this, Congress will need to prod the
ignorant sectors of each industry and educate them about
one another. Experts with deep understandings of all
three parts of the economy need to be assembled to bridge this
gap and help Congress provide leadership on this
issue by creating incentives for
companies to collaborate on copyright enforcement systems. To do
this it may be necessary to sharpen the legal distinction
between content and network service providers.
Without some sort of Chinese wall,
these operations will have the incentive to piggyback on one
another to compete unfairly. One might see certain
bookstores refusing to honor keys
with signatures that come from other publishers-a situation
equivalent to
phone companies refusing to take one another's calls. Congress
also needs to provide a stable landscape for the legal use
of
encryption. The way to do so-in this particular context only-is
to *entirely ignore* the wider controversy. The type of
encryption needed for this infrastructure project is key
escrow by its very nature, something which no
one should object to. By avoiding Fourth Amendment issues
altogether, you can also avoid any unnecessary
complications in the discussions.
Stress instead the financial need publishers and consumers
will have for using trusted third parties to monitor
their agreements. If a publisher goes bankrupt, buyers
should be able to retain ownership of their goods.
Bookstores can ensure this by holding on to an extra copy of the
key and acting, in effect, as a third party repository. If
the key escrow issue is
treated properly in this context, everyone can win. The proper
contractual model for this type of relationship comes out t
he computer programming industry. When companies
contract out specialized software, they often have
concerns about what will happen to the source code if
the company they hire goes out of business. The programmers,
on the other hand, do not want to allow their clients
access to the code since that negates the value of
future service and upgrade contracts. Both parties
typically
turn to a trusted third entity who is paid to hold on to a copy of
the source code as insurance against such eventualities.
By citing this example as your justification for key
escrow you can reduce the friction between civil libertarians
and national security concerns.
I would also encourage you in particular, Mr. Chairman, to
continue your dual work on both strengthening privacy
rights and reinforcing public identities on the internet.
Give companies solid guidelines for protecting
individual privacy without stripping away the crucial ability to
collect important marketing information.
Also continue your work to secure public discourse on the
internet. Go beyond requiring spammers to use their real
email addresses and take steps to prevent all other forms
of spoofing. Require businesses to use their own
addresses and email accounts. A pirate can thwart this kind of
copyright
enforcement system if he pretends to be a bookstore and intercepts
its traffic. This particular problem has implications well
beyond the digital
copyright issue. If spoofing cannot be prevented, both through
technical and legal measures, then large chunks of the
digital economy simply will not work.
Finally, some of the things like fair use which we have come
to love
about the copyright law must be adapted for the digital age.
Methods of quotation and incorporation must be worked out.
My personal suggestion is to force companies to grant
automatic key approval to any individual claiming a fair
use exemption. This could, perhaps, be done by having a public
agency
like the Library of Congress act as a 'bookstore' for keys. In
the event of a dispute, the publisher could request some
type of arbitration procedure and, if unsatisfied, could
challenge the fair use in court. Since the key would
always be monitored there would be a clear auditing trail and
damages wouldbe easier to determine than they are today.
In closing, I would like to point out that time is a critical
factor
here. One technical obstacle I have not covered is the cost of
writing software for this system. Since the methods of
delivering high volume digital information to consumers
have yet to be worked out, cost right now is not a
critical issue. It can be bundled into the general expense of
developing the 'information superhighway.' However, if
too much time passes and individual companies realize too
late that a new copyright enforcement system is in their
interests, then the upgrade effort could be considerable,
particularly with
respect to the needed PC hardware. So while this idea for
copyright enforcement is simple, speed is of the
essence. Its implementation is complex and requires agreement
among several powerful players, some of whom may be
risk averse and may feel it is opposed to their true
interests. With very few exceptions, I believe most
industries will benefit and the market for digital
goods will be vastly enhanced, providing the economy with
even greater stimulus than we have seen in the
'90s. By properly adapting encryption technology to give
networking authorities the ability to track such information,
we can decentralize the
distribution process, cut costs and expand the market for digital
intellectual property.
This kind of delivery can occur over the phone, the cable
system and even through HDTV broadcasts. All of these
industries stand to expand their markets and raise profits
for copyright holders if they can 1) agree on a
standard form of protected digital distribution, 2) get the
computer companies to implement it (perhaps with a
government mandate), 3) stop tampering with
the existing copyright and liability laws in ways that discourage
this and 4) negotiate with foreign governments to pull
them into such a system.
These goals will eventually be accomplished through
marketplace experimentation already underway. However, the
pain of trial and error and
non-standardization can be avoided now with a little
forward-looking leadership. The various industries involved
need to be educated about the
future opportunities digital technology will provide them with and
a legal
path needs to be set down which eases the transition. For
purposes of brevity I have not discussed several important
issues
pertaining to this idea, so this letter may raise more questions
with you than it answers. If you or other parties would
like to pursue this, please contact me. At this point in
my career, I am not in much of a position to implement
this idea beyond using my powers of persuasion and the time is
drawing close when leadership from within industry and
government must take over.
Sincerely,
Wade Riddick
Department of Government
University of Texas-Austin
RIDDICK@JEEVES.LA.UTEXAS.EDU
---------------------------------------------------------------------------
--
Telerights Digital Copyright Enforcement Model
3D3D Step 1 3D3D Publication 3D3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D
Private key A'; Public Key A
Original Document -+----->----------------------------> Copy A
!
! Private key B'; Public Key B
+-------->-------------------------> Copy B
!
! Private key C'; Public Key C
+------------>---------------------> Copy C
3D3D Step 2 3D3D Purchasing Copy A 3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D
Signature A + Key A
Publisher ------->-------------------------> Bookstore (ignorant of
^ ! ^ content)
! v !
$ ! ! Copy A (content) !
! ! + Signature A !
^ ! !
! v user's identity !
Escrow agent/bank --------->----------------------+
(renders the buyer
anonymous to the publisher)
^ !
! v
$ ! ! Copy A (content)
! ! + Signature A
^ !
! v
A0 user
3D3D Step 3 3D3D Using Copy A 3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D
Publisher
^
Key A ! The document
+------<----- Copy A <----------------------<-----+ ! w/ Signature
A
! ^ ! ^ is in use
v ! ! !
document ->-----> user ->-------------------------> Bookstore
Signature A
3D3D Step 4 3D3D Finishing up 3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D
3D3D3D3D3D3D3D3D3D3D3D3D3D
Publisher
Copy A (keep) ^
^ ! finished
! finished !
trash <--------<---- user ------>-----------------> Bookstore
Key A +
document
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 2--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.77
************************************