May 2006

Fred Von Lohmann criticizes Solveig Singleton’s new essay for failing to discuss the darknet critique of DRM. Ray [Gifford, I assume] at PFF had this reaction:

The talismanic authority of the Darknet paper baffles me. It simply proves too much; namely that because some can circumvent DRM and, in a sense IPR, therefore there should be no DRM. It is not a completely bankrupt argument–you can certainly argue that the net effect of, say, antitrust laws or drug laws is negative. With Darknet, though, it is treated at something of an instant QED. To the contrary, it simply makes the point that a black market will arise on the internet for illicitly copied content. The challenge of law (and the usefulness of property rights) is, through social norms and legal sanctions, to shrink the size of that black market so that productive activity continues and a market thrives. Seems to me, on balance, that’s what the DMCA is doing in its best instantiations.

I think this response misunderstands the darknet critique, and the nature of peer-to-peer file distribution more generally.

Continue reading →

First things first. For those interested in yelling at your Member of Congress, Privacilla.org has info and advice.

Now that I have a respite from my whirlwind NSA-spying media tour, I’m asking myself (and you): Who is to blame?

I’ve spent years arguing that market processes are the best way to get privacy on the terms consumers want it. And for all my troubles, I get this?! Businesses regularly share information with the government, even informally. A privacy outrage, no?

Well, let’s see. I think it is. But I’m not consumers. I’m just a consumer. The average consumer is a little more concerned with terrorism and proportionately more sanguine about privacy. That’s why a key to winning this privacy debate is getting the risk of terrorism in perspective.

My favorite article ever is John Mueller’s A False Sense of Insecurity? Read the whole thing. (If I wanted to read a whole thing, I wouldn’t be on a freakin’ blog right now.) How about this: If you are outraged by talk of ‘George Orwell’ and ‘privacy’ while there’s a war on, then shut up, sit down, and read the whole thing. 😉

But back to some self-criticism. I am a proponent of the free market, but three out of four large telecommunications providers, in whose tender mercies I would place your privacy, sold us out. Time to commit sepuku? Begin my David-Brock-style conversion from libertarian to . . . not libertarian? Are the Communications Act, the Stored Communications Act, the Cable Act, and all kinds of other regulatory statutes with privacy mandates our saviours?

Not so fast, because comparisons are best made between comparables, not between real and ideal. It’s not like the phones only just started getting used for surveillance recently. The Nation reports this week that telephone and telegraph companies began assisting the NSA during the 1940s. When Ma Bell owed its existence to a government-enforced monopoly, was it in a position to bite the hand that feeds? No. Indeed, it probably let that hand go a lot of places that we would characterize as “inappropriate touching.”

So before anyone goes lambasting the private sector for this – and no one has, but it might be deserved – I wonder whether it is the decreasing control of telecommunications by government (combined with some significant overreach by the current Administration) that has brought the practice of mass surveillance to light.

Qwest, the one hold out against the NSA, recognized the privacy interests of its customers. The importance of privacy to many consumers may have moved Qwest from on-the-fence to refusing the NSA. Now, the seam that opened up between Qwest, the others, and the NSA is one into which cable telephony can move, for example. Their superior (statutory) protection for privacy is in the paper today. VoIP providers like Skype have a real opportunity to point out that communications on their services are encrypted end-to-end, making it difficult – though not impossible – to snoop on the content of calls.

I am not proud today of the telecommunications sector. And I hasten to remind people at a time like this that I am an advocate of markets, not businesses. I’m putting this post in the “When Capitalists Go Bad” category for a reason.

But – with the caveat that this thought deserves more thinking – I believe this failure of businesses to protect privacy is more a product of government arm-twisting and excess than the failure of markets to serve consumers’ demands for privacy which, as I said above, are unnecessarily diminished by the “War on Terror.”

Seth Finkelstein offers a reubuttal to Solveig Singleton’s contention that DeCSS wasn’t related to the effort to build an open Linux DVD player.

I’ve been out in Los Angeles this week attending “E3,” the video game industry’s annual trade show. It’s the first time I’ve been able to attend the show and I am finding it very interesting. Indeed, as I walk the halls of the L.A. convention center and chat with gaming companies and gamers themselves, I am struck by several things:

(1) This is one heck of an innovative industry. There are some remarkably creative minds working in the electronic gaming sector. As a life-long gamer who was part of the “Pong” and “Pac-Mac” generation, I am just flabbergasted by how much more highly developed games are today (in terms of graphics, narrative and gameplay) than they were 30 years ago when I first started gaming. There was a moment in my life when I thought that games just couldn’t get much more sophisticated than Activision’s “Pitfall” or Atari’s “Adventure.” What a fool I was! Some of the massive multi-player online roll-playing games (“MMORPGs”) I saw at the show were just jaw-dropping in terms of their graphical detail and narrative sophistication. And all of the new high-definition titles for the X-Box 360 and PlayStation 3 are nothing short of stunning. Old favorites of mine like “Madden” football and “Gran Turismo” are now rendered in ultra-crisp 1080p HD resolution. There are moments during those games when you really think you’re watching a live feed from a real football game or road race.

And even the games which featured a more simple premise were exciting. Consider “Table Tennis” by Rock Star Games. The same company that brought us the infamous “Grand Theft Auto” is now producing a decidedly less controversial title based on the classic game of Ping Pong! If you think it sounds silly, wait till you play it. It is addicting in a “Tetris-like” fashion. I hope they eventually make it for my PlayStation Portable!

Continue reading →

Ed Felten links to an alarming report about flaws in Diebold’s voting machines:

The attacks described in Hursti’s report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools. The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes.

Hursti’s findings suggest the possibililty of other attacks, not described in his report, that are even more worrisome.

In addition, compromised machines would be very difficult to detect or to repair. The normal procedure for installing software updates on the machines could not be trusted, because malicious code could cause that procedure to report success, without actually installing any updates. A technician who tried to update the machine’s software would be misled into thinking the update had been installed, when it actually had not.

On election day, malicious software could refuse to function, or it could silently miscount votes.

As I’ve written before, I’m not convinced there are any good reasons to use computerized voting machines. It seems to be driven by a simplistic notion that computerized stuff is always better than non-computerized stuff. But as Felten says, these sorts of vulnerabilities are inevitable on a general-purpose computer.

The most important features for a voting machine are reliability and transparency. In general, the simpler a machine is, the easier it is to verify that it’s working correctly and the more likely ordinary voters are to trust it. Optical-scan voting machines appear to be plenty reliable, and they have the advantage that if anything goes wrong, there’s always an option for a manual recount.

When it comes to voting, we should be very, very hesitant to fix what’s not broken.

Joe at TechDirt debunks a reactionary column about the need for tech workers to unionize:

Historically, a powerful union tool has been the ability to exclude non-members from the workforce. This is why unions are so vehemently against “right to work” laws, or these days, outsourcing labor overseas. Closely related to this is opposition to technologies that reduce the need for human employees, like in the example of the plumbers that were against waterless urinals. Though such a mentality is completely anathema to the tech world, it’s not surprising to see it at a column called The Luddite–the fear that technology would take jobs away from humans was the same fear that the original Luddites had. Even more important, perhaps, is that the delineation between labor and management–central to the union ethos–doesn’t hold at most technology companies. Often, company equity is part of an employee’s compensation package; so even if their wages seem to stagnate due to competition from Indian programmers, they benefit when their company saves money.

Indeed.

Yesterday I responded to Solveig Singleton’s comments about the Linux DVD player issue. Today I want to focus on the other major argument of her posts, namely that DRM is sufficiently effective that the DMCA is worth it even if it does have some disadvantages.

Unfortunately, the debate over whether DRM is effective often has a “Does not! Does too!” quality to it. I’m going to try to dig into the matter a little more deeply to see if we can get past that to some substantive discussion of when DRM is effective and when it isn’t. I apologize in advance for the length of this post.

Continue reading →

Kerr on NSA and FISA

by on May 11, 2006

Orin Kerr has a lengthy analysis of the latest NSA spying revelations. He concludes that it doesn’t violate the Fourth Amendment but likely runs afoul of several statutes. This paragraph didn’t strike me as being quite right:

The legality of the program under FISA is somewhat similar to the legality of the NSA program we learned about a few months ago. The key question is, did the monitoring constitute “electronic surveillance” under FISA, and if so, does the Authorization to Use Military Force allow it? Note that FISA’s definition of “electronic surveillance” goes beyond accessing only content information and extends to some non-content information. If the program did involve “electronic surveillance” under FISA, then we’re right back to the same question that has been raised about the legality of the known NSA domestic surveillance program. If that’s right, your views of the legality of the new NSA program will pretty much coincide with your views of the legality of the NSA program disclosed a few months ago.

It seems to me that one of the arguments frequently deployed by the president and his supporters is that the wiretapping program only targetted calls international calls. On this theory, FISA doesn’t apply at all because FISA only governs domestic surveillance. I don’t think I buy that agument, but I can easily see someone who does concluding that the wire-tapping program is legal, but this new program is not.

Remember how the administration said it was only monitoring international calls? Well, never mind. It turns out that the NSA is building a database of every phone call made in the United States:

The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans–most of whom aren’t suspected of any crime. This program does not involve the NSA listening to or recording conversations. But the spy agency is using the data to analyze calling patterns in an effort to detect terrorist activity, sources said in separate interviews.

“It’s the largest database ever assembled in the world,” said one person, who, like the others who agreed to talk about the NSA’s activities, declined to be identified by name or affiliation. The agency’s goal is “to create a database of every call ever made” within the nation’s borders, this person added.

Having the NSA know who I called is less creepy than having them all recorded. But it’s still creepy. And probably illegal.

MPEG Patent Thicket

by on May 11, 2006 · 24 comments

In comments to my big DVD post, Urijah points out another obstacle to a completely free and legal version of MPlayer or Xine: the MPEG format is heavily encumbered by patents, and commercial entities generall must pay $2.50 per installation for a license.

I haven’t looked into this issue in detail, but if this article is right, this problem likely extends beyond MPEG-2 to other video-playback technologies:

All patents in the list of the MPEG licence association in regard to the MPEG-4 standard were examined and analysed. After intensive study of relevant literature and more than 100 patents of the relevant companies we can say now: Upon careful examination, we can not find any advances over the prior art in said list that could justify the granting of a patent. Most of these patents should be attackable in court, but who would take the burden of litigation against 900 patents owned by dozens of large companies?

When people talk about “the MPEG-2 patents,” they aren’t referring to a specific patent that describes the MPEG-2 standard. Rather, they refer to 640 holders of patents related to various aspects of the MPEG-2 standard. If 640 patents describe a single video format, it’s a safe bet that a substantial fraction of them cover any conceivable alternative video format. Which means that technically speaking, all free video-playing software is probably technically infringing on numerous patents.

It’s also quite possible that the MPEG-LA wouldn’t bother suing an open source project, which doesn’t have any money anyway. At worst, I would think MPlayer and Xine could charge people $2.50 to download copies of MPlayer or Xine and turn the tribute revenue over to the MPEG-LA. They could still distribute the source code, so this wouldn’t greatly hamper its development as an open source project.

In any event, the best solution is to repeal software patents, which impede innovation in this and many other software categories.