Wednesday, August 26, 2015
Rentboy.com and the Internet's Role in Sex Work
On Tuesday, New York police officers and agents of the Department of Homeland Security raided the Manhattan offices of Rentboy.com (link is to the Wikipedia page). The company's chief executive and other members of the leadership and employment team were also arrested at their homes. According to the Complaint, rentboy.com, a social networking website that connects male sex workers to clients, has been the hub of a multimillion dollar criminal enterprise.
This episode, on the heels of another sex-related internet story at Ashley Madison, raises several questions. The broadest: Should prostitution be criminalized? Reasonable people disagree. The narrowest: Did rentboy.com commit a crime? At this stage, which just requires the government to offer facts that make the case viable, there is factual and legal sufficiency to move forward. I have additional questions: Why is this website a priority for the government? Has the internet made the problem of sexual exploitation worse?
For better or for worse, prostitution is illegal in New York and rentboy.com, the Complaint alleges, fostered, promoted, and facilitated prostitution. A brief read of the redacted Complaint shows the not-so-subtle advertisements individuals posted looking for clients: all of them were thinly veiled posts that included sexual preferences and costs. The website, which charged significant sums for sex workers to advertise, promoted the practice of prostitution by hosting events, giving out awards, and cutting out the middle man in the off-line sex work arrangement. Therefore, it is hard to argue that there is insufficient evidence to move forward.
Should prostitution be a crime and should city and federal law enforcement be spending time and money on investigating and prosecuting this particular website is another question.
Scholars far smarter than I have debated the merits of criminalization of sex work for decades. For some, the decision to commercialize one's body is empowering and the right of free, autonomous individuals in a democratic society. For others, prostitution is not a free and voluntary choice: it is either forced labor or someone's last hope for survival. In many cases, sex workers are victims of abuse and legitimizing prostitution promotes the very real harms some young people face when they are caught in the world of sex trafficking.
The victimization problem may be particularly acute for LGBT youth, though we don't have enough research to make an airtight case. There is a disproportionate number of LGBT youth in the commercially sexually exploited population. One study suggested that within 48 hours of running away from home, something LGBT youth are much more likely to do than their heterosexual peers, 1 in 3 homeless LGBT youth will be approached with offers or invitations to sell their bodies for sex. A Canadian study found that LGBT youth are three times as likely to engage in survival sex than their heterosexual peers. And survival sex -- exchanging sexual favors for food, shelter, clothing -- is a gateway to the sexual exploitation marketplace.
Not all men advertising their services on rentboy.com are victims. Indeed, there is no allegation in the Complaint that any advertisement for sex-for-pay was nonconsensual (although evidence of that may turn up). But that misses the point. Prostitution is illegal. The question of should prostitution be illegal is really a societal choice about whether we are willing to restrict one group's freedom -- that of willing sex workers -- to protect another's -- that of victims, of abuse and sex traffickers, who have no choice but to commercialize their bodies. New York has made the choice to protect the victims.
The internet law implications of this case are worth mentioning even though they are taking a back seat to the broader debate over sex work. With respect to jurisdiction: The website's offices are in Manhattan, under the jurisdiction of the Southern District. The Eastern District (Brooklyn) is leading this case because many of Rentboy.com's sex workers live and work in Brooklyn. DHS is involved because many of the transactions involved interstate commerce. The internet's reach, therefore, has not only given various different jurisdictions potential control over anti-prostitution litigation; it has also federalized it. But that is not the result of overzealous law enforcement eager to score an anti-gay victory. That is the nature of the internet and jurisdiction over it.
With respect to commerce: Rentboy.com has done one thing that anti-prostitution advocates have wanted for decades, and it has used the internet to do so. The website has arguably helped sex workers by eliminating the middle man, the "pimp", in a commercial sex transaction. Pimps, the evidence suggests, perpetrate much of the abuse inherent in the world of prostitution, so taking them out of the equation should be liberating to sex workers. But the website has also made a commercial sex transaction easier, which further perpetuates prostitution's culture of abuse and victimization.
Setting aside the broader discussion over (de)criminalizing prostitution, this story is another example of how we have to accept that internet life is part of "real" life, subject to the same laws as offline transactions and the cause of very real harms to real people. Rentboy.com cannot escape liability simply because it tossed up a disclaimer saying none of its advertisements are for sex-for-pay. Websites that facilitate prostitution still promote the same culture of victimization that New York has decided is bad enough to merit restricting the freedom of voluntary sex workers.
Thursday, August 20, 2015
What the Ashley Madison Hack Teaches Us About Digital Privacy Invasions
Hackers just published a massive amount of data about the roughly 36 million members of the website, Ashley Madison, a social network that markets itself to those in relationships who may want to explore, shall we say, "what else is out there." Along with the 36 million emails, 33 million first and last names, street addresses, and phone numbers, and 9.6 million documented credit card transactions were released. The data also tell us about subscribers' sexual preferences.
There has been some fanfare about a few of the names on the list: Josh Duggar, the conservative star of TLC's "19 Kids and Counting," had two accounts. The Associated Press notes that "subscribers included at least two assistant U.S. attorneys, an IT administrator in the Executive Office of the President, a division chief, an investigator and a trial attorney in the Justice Department, a government hacker at the Homeland Security Department and another DHS employee who indicated he worked on a U.S. counterterrorism response team."Mr. Duggar, who molested his younger sisters years ago, has already conceded that he cheated on his wife. But being among those whose credit cards were used to create Ashley Madison accounts does not necessarily mean you made the same choices as Mr. Duggar. Nevertheless, every name, from the hypocrites to the innocent, is about to experience the very same shame, and it will be difficult to recover. Digital privacy invasions are cold and permanent: they remove necessary context and create a permanent truth. And, in this way, they cause untold harm.
We don't know the possibly myriad reasons why millions of people subscribed to Ashley Madison. A jilted ex or a prankster could have used your credit card. You may have been curious. You may have signed up accidentally, as Marge Simpson did (on the parody site, sassymadison.com) on "The Simpsons" episode, "Dangers on a Train." You may have wanted to have an affair and then decided not to. Perhaps you logged on, had an affair, but ultimately admitted it to your spouse and the two of you worked it out. Another possibility: you created an account to practice immersion sociology, much like the controversial sociologist Sudhir Venkatesh did with respect to gang culture. In fact, it's pretty easy to create an account on Ashley Madison using someone else's name and it's not that easy to erase it. In other words, the data is devoid of context. Now, all 33 million individuals whose first and last names were hacked are "cheaters" or, worse yet, "sluts."
And they will be branded as such forever. The internet stores information permanently because it can: it has essentially infinite storage capacity and a search platform that can find anything in 0.0000043 seconds. Even if the raw data were ever taken down, it has already been copied, recopied, told, and retold so often that it can never be scrubbed. And Google's ubiquitous search platform will ensure that anyone with an internet connection can find it. There is even a handy tool to determine if your email is included in the data dump. Furthermore, the United States does not have a European-style "right to be forgotten," which could help unlink data and reports on that data for persons innocently caught up in the breach.
As Glenn Greenwald suggested, the result is a modern scarlet letter: an invasion of privacy that gets wrapped up in a moral crusade against infidelity. This can result in long term negative effects: depression, social ostracism, loss of employment and employment opportunities, lower academic achievement, a receding from social life, and much worse.
Hackers that gleefully disseminate private personal information entrusted to a third party are causing significant harm. It may be easy to smirk and hard to find pity for victims of this particular hack, but consider some other invasions of privacy:
Victims of revenge porn similarly entrust private personal information -- an intimate "selfie" texted to a then-romantic partner -- to another only to have that data posted on websites that extort money, endanger lives, and ruin reputations. Danielle Keats Citron and Mary Anne Franks have spoken eloquently on the need for criminal revenge porn statutes as well as the very real emotional, physical, and professional damage caused by nonconsensual pornography.
Cyberbullying targets are ripped from private life and thrust into a very public humiliation when online aggressors, known or anonymous, take photos, harassing language, text messages, "I Hate" videos, or private encounters and post them online. This is particularly harmful to LGBTQ youth, who are unique in both their frequency of victimization and the importance of a safe internet.
A wry smile at Mr. Duggar's comeuppance is not the same as condoning privacy invasions, revenge porn, or cyberbullying of LGBT youth. His hypocritical moral crusade against gays in the name of "family values" made him a public figure on the matter of values. But the same social norms that lump all Ashley Madison account holders into one class of "cheaters" are the same norms that slut shame revenge porn victims and tell victims of cyberharassment to just turn off their computers. More to the point, it is the nature of online invasions of privacy that foster these harmful over-generalizations: the internet erases context and hoards raw, decontextualized data, transforming it into a searchable gospel.
The internet, the raw, decontextualized internet, can be a dangerous place. Ashley Madison is just one unique case study showing us how.
Wednesday, August 12, 2015
Introduction and Dedication
Hello Prawfs! It is already August 12, and I am posting my first post to Prawfs this month. For that, I apologize. But I will make up for it in the coming weeks.
First, some introductions. My name is Ari Ezra Waldman. I'm on the faculty at New York Law School, where, in addition to teaching intellectual property, internet law, privacy, and torts, I run our academic center focused on law, technology, and society. My research and writing focus on privacy, the bridge between privacy and intellectual property, and cyberharassment. You can find some of my publications on SSRN, although I have a handful in the works or under submission at the moment. More on that later. My partner and I are the human parents to a wonderful dog named Scholar. She's a dachshund-beagle mix.
Second, I would like to dedicate all my posts this month to Dan. I didn't know Dan as well as some others, but in the short time I knew him, he was a friend and mentor.
Now on to substance. In my short time at Prawfs, I would like to use several posts to talk about teaching and some other posts to tell one story, hoping to flesh out ideas about an ongoing project about information diffusion, privacy, and intellectual property. I start with identifying a theoretical problem.
In an important and oft-cited essay, Professor Jonathan Zittrain came to the profound conclusion that intellectual property owners and personal data owners want the same thing: “control over information.” That control was being eroded by the early internet: “perfect, cheap, anonymous, and quick copying of data” endangered copyright owners’ ability to control dissemination of their content and threatened to make private personal data a market commodity. Using the illustrative case studies of copyrighted music and patient health data, Zittrain suggested that privacy advocates could learn from content owners’ use technological systems that prevented the unlawful mass distribution of copyrighted data.
This correlative inquiry is important. Control is an empty concept without knowing what it means to lose it, and the conceptual vacuum has contributed to haphazard and, at times, harsh, unjust results. Often, courts conclude that personal information and intellectual property is out of an individual’s control if even just a few other people know or have access to it. At other times, decisions are more nuanced. But they all ask the same question: When is information, already known by some, sufficiently out of the owner’s control such that it can be deemed public? Conceptualizing the problem of privacy and intellectual property merely as loss of control does not give us the tools to answer this question.
In subsequent posts, I will lay out a proposed answer to this second inquiry. In short, I argue that loss/retention of control has everything to do with information diffusion, social networks, and trust.
Monday, April 27, 2015
Google Announces Patent Purchase Experiment
Today, Google announced a patent purchase promotion, which is an open call for those who wish to sell their patents to the company. Some details are here, while others are here. The terms are remarkably simple--between May 8 and May 22, sellers must provide Google with the patent number and a proposed price. As part of the transaction, sellers obtain a non-exclusive license to practice the patent together with the purchase price if the offer is accepted.
In typical Google-style, the company states that this call is an experiment and an effort to eliminate the middle-man. In the company's words:
Unfortunately, the usual patent marketplace can sometimes be challenging, especially for smaller participants who sometimes end up working with patent trolls. Then bad things happen, like lawsuits, lots of wasted effort, and generally bad karma. Rarely does this provide any meaningful benefit to the original patent owner.
Of course, the looming question is what will Google do with any patents that it buys? Whatever it wants, of course. According to Google's FAQ on this issue:
Google maintains a large patent portfolio. Any patents purchased by Google through this program will join our portfolio and can be used by Google in all the normal ways that patents can be used (e.g., we can license them to others, etc.)
One interesting aspect of the program is the speed at which it is moving--sellers will be notified at the end of June, and the sales are expected to be closed by the end of August.
Tuesday, April 21, 2015
In the marketplace of ideas, Twitter has decided that online trolls are bad for business. Back in February, it was reported that Twitter's CEO Dick Costolo told staff "We lose core user after core user by not addressing simple trolling issues that they face every day." This statement suggested that keeping Twitter safer from abusers had become a corporate goal.
Recently, Twitter began to roll out changes that puts meaning behind Costolo's statement. Rather than asking the victim to track down an abuser, Twitter has flipped the script to test a new a feature to lock the abuser's account for a period of time. The account can be reactivated if the user provides a phone number verification, and then deletes all of the tweets that are in violation of terms of service. A screen shot of the procedure is below (and a text explanation is here on Ars Technica).
Additionally, Twitter's guidelines have been amended to broaden the definition of prohibited conduct to include "threats of violence against others or promot[ing] violence against others" (expanded from the “direct, specific threats of violence against others” in the former policy). In addition, the company is implementing measures to limit distribution of certain tweets that exhibit "a wide range of signals and context that frequently correlates with abuse including the age of the account itself, and the similarity of a Tweet to other content that our safety team has in the past independently determined to be abusive."
The sheer size and volume of Twitter's platform, and the types of distinctions that will have be made, make implementation of these standards a challenge. Of course, the platform is in the private sector, and these guidelines are a form a type of private governance. I wonder where this direction will take the company, what the impact will be on public discourse, and whether it will affect the behavior of other online platforms.
Wednesday, April 15, 2015
Diversifying Startup Funding Sources
As someone interested in the growth of new ideas and innovation, I'm very interested in the financial infrastructure required to undertake creative activity. Although there is a high level of disagreement about the appropriate legal incentives needed to create new medicines, new technologies, new films and works of art, at a certain point there can be little dispute that time, resources, and dollars are required to create and ultimately bring products to market. Indeed, some work in the economics field has considered that the U.S.'s venture capital funding system has been a major factor to this country's ability to develop groundbreaking solutions. All puns aside about Snoop Dogg's recent decision to provide seed funding for weed startups (sorry! someone had to say it), there appears to be no limit to the types of funding sources.
For example, there has been a spate of recent press about mutual funds who are quietly beginning to provide startup funding in exchange for private stock. According to The New York Times, the growth potential of startups has attracted funding from more conservative sectors who are attracted by success of companies with high valuations including Uber, Airbnb, and Pintrest. Of course, there are limitations on the level of risk that these funds will tolerate. Balance is everything--according to the piece, "Fidelity’s Uber stock, for example, represents less than 1 percent of each fund’s total holdings."
I cannot help but wonder at the role that these funds will play to the overall management and direction of startups. Innovation isn't all about the money. Some of the value that many venture capitalists provide includes making introductions, advising, pointing out potential pitfalls and professionalizing operations. It isn't clear from the press whether mutual funds are providing these same benefits, although it may exist. Moreover, it may be that the mutual funds' decision to invest in more mature startups will alleviate this issue.
Nonetheless, in my view it is a very positive development to see more dollars moving toward the creation of new businesses. I am hopeful that some of this work will result in more invention, research, innovation and all of the benefits that those things can provide.
Tuesday, April 14, 2015
The Moral Psychology of the Fair Play, Fair Pay Act
Yesterday, four members of Congress introduced the “Fair Pay, Fair Play Act,” a bill that would entitle owners of copyrights in sound recordings to recover royalties for radio airplay of those tracks on terrestrial radio stations. That performers don’t receive such royalties may seem surprising, but it’s just one of many strange outcomes generated by the statutory labyrinth that is the Copyright Act.
At first blush, the rationale for such a revision seems simple and appealing. Performers work hard to create sound recordings, so when radio stations broadcast those recordings, why shouldn’t they get paid? After all, the songwriters who wrote those tunes get a royalty each time they are played. But upon closer examination, this rationale is more puzzling. The purpose of copyright law, expressed in the Constitution, is to promote the progress of science and the useful arts (including creative innovation) by means of financial incentives secured by exclusive rights in authors’ works of authorship.
Copyright’s incentives story may explain the FPFPA going forward (performers may be more likely to create future sound recordings if they can expect more remuneration via performance rights), but this account cannot make sense of the retroactive application of the law to already-created songs. And much of the industry force behind the act comes from performers who recorded older, classic tracks who feel aggrieved that they have not gotten royalties from their hit recordings for decades.
So if incentives cannot explain this sense of entitlement to recover additional royalties for past creation, what does? One account may lie in Mark Lemley’s snappy new essay, Faith-Based IP, discussed by Amy Landers in her earlier post on this site. The musicians and Congresspeople behind FPFPA may simply be relying on the notion that copyright owners have pre-political rights that should be recognized regardless of whether the existence of those rights would drive innovation, or even regardless of whether those rights would generate social welfare. At the surface, this may be a plausible account, but I want to propound a different account, one that draws on a forthcoming paper I co-authored with Chris Buccafusco, The Moral Foundations of Copyright Infringement. I elaborate this alternative theory below the fold.In our paper, Chris and I show that the FPFPA is hardly unique. There are countless examples in which owners of copyrighted works express outrage over unauthorized use in ways that bear no relationship to the classic IP incentives account, and that may even bear no relationship to their economic interests at all. Sometimes people even seek suppression of unauthorized use that might help them economically, such as when fashion designers sought stronger IP protection despite evidence that design piracy may actually help their brands.
This only shows the depth of the puzzle, though, not its solution. And while some have argued that authors deserve non-economically based rights in their works of authorship for reasons divorced from welfare considerations, Chris and I look instead to contemporary cognitive science for an explanation. In particular, our account invokes moral foundations theory, which posits the existence of at least five different heuristic dyads—harm/care, fairness/cheating, loyalty/subversion, purity/degradation, and authority/subversion—that describe the mental architecture of our experience of transgression.
It’s easy to explain why authors of extant sound recordings would root for the FPFPA. Everyone wants more money. But why would the situation of such authors case strike a chord with unaffected third parties such as the bill’s congressional sponsors, and even the public more broadly? Our moral-psychological account indicates that what is afoot here is instead the intuitive sense shared by many people that formal inequities (such as compensating songwriters but not performers for radio play of the same track) grate on our moral sensibilities, regardless of welfare considerations. Unlike the incentives theory, our account explains the FPFPA in its prospective and retrospective applications, since in both instances performers are equally aggrieved by the fact that songwriters get performance royalties but they do not.
This is different than a mere “rights” account because such accounts often (though not always or necessarily) descend into conclusory circularity. The idea of a right is a legal conclusion about relative entitlements, but is often used instead (and especially in some of the high-flown rhetoric about the FPFPA) as an argument for that conclusion instead (or as well). Hence the dismissals, like Lemley’s, of rights-based arguments about IP as rootless and “faith-based.”
But while Chris and I argue that the moral-psychological account provides a richer sense of non-welfarist approaches to IP (especially the instinctive responses of laypeople, including creators and owners of works of authorship, to unauthorized use) than simply dismissing them as rights-voodoo, this does not mean that copyright law should be determined by moral-psychological considerations. Our moral intuitions may feel righteous but that does not at all mean that acting on those intuitions serves the social good. After all, some of the great evil done in human history has likely been animated by a sense (however wrong) of moral righteousness.
What we end up suggesting is a moral-psychological realist approach to IP law. You can still be committed to the incentivist story of copyright while acknowledging that our moral intuitions operate in tension with those welfarist aims. In fact, you might get better outcomes from the incentivist perspective by basing copyright law on a vision of actors that acknowledges their complex moral psychology rather than assuming that they are simple utility-maximizing homines economici. How to do this, of course, is a harder question, but one suggestion we make in the paper is that copyright law should respect only lawsuits motivated by copyright-relevant harm (i.e., attempts to protect a copyright monopoly, not to seek revenge or vindicate a sense of injustice or grab extra rents).
The Moral Psychology of Copyright Infringement (available on SSRN) is forthcoming later this year in the Minnesota Law Review, but we are still making revisions, so comments are most welcome.
Monday, April 13, 2015
Law and Social Change
Law has an ill-defined relationship to culture. Certainly, some legal rules seek to standardize norms in the way that the reasonable person operates in tort law or custom sets interpretive principles for contractual relations. Law may push against culture, such as the way anti-discrimination laws attempt to eradicate bias.
Further, culture can seek to change law. One recent example that caught my eye is the transport of films, TV shows and other media into North Korea via weather balloons. Among other things, these balloons carry TV shows including Desperate Housewives and The Mentalist, so that those who find the USB drives on which this entertainment is stored can be exposed to cultural information about those outside North Korea's borders. This is one way that the Human Rights Foundation is seeking to reach out to North Korean citizens to open up the government's information block.
Where do such efforts come from? Recently, Peter Lee (UC Davis School of Law) has posted an interesting piece on social innovation that is insightful for those interested in innovation, the theory of the firm, distributive justice, and/or intellectual property. In it, he contrasts the formal incentive system of the intellectual property system to:
...the altruistic motivations and public funding that drive social innovations. . . Beyond efficiency considerations, however, social innovations often play a distributive role in shifting resources to underserved communities. Social innovations address underserved markets, such as when microfinance entities provide loans to populations who do not qualify for traditional financing. Going further, social innovations sometimes provide essential goods and services to entirely neglected populations on a charitable basis.
I found that Lee's piece opens a new door on the mechanisms that foster the creation of public goods. The piece is replete with insights about the interaction between government and private entities in both the IP and social innovation spheres. He argues that these systems have much to learn from each other. This is downloadable here and certainly worth a read.
Sunday, March 01, 2015
Recommending Highly The Black Box Society by Professor Frank Pasquale
This is my last post for this stint (my third) on Prawfsblawg and I want to thank again for inviting me Howard Wasserman and the others who are doing the work of keeping going what Dan Markel, ZT”L started.
I also wanted to share a very interesting, well-written and important book that I’ve been reading this month by PrawfsBlawg alumni @frankpasquale called The Black Box Society: The Secret Algorithms that Control Money and Information. (Amazon). Professor Pasquale is a professor at the University of Maryland Francis King Carey School of Law School of Law. In this book, Frank explains in clear, non-technical English what exactly is going on behind the internet technology we use every day. He explains how the sites we access on the internet are not just collecting information from us, but are selling it to others who are using that information in shaping the information we get back. So, and this among the more benign points, what you get when you run a Google (or other) search is probably very different than what I would. Google is not an automated index nor is a database like Lexis or Westlaw. Moreover, the information collected isn’t just shaping the advertisements we see on the screen, it’s controlling our access to jobs, credit, insurance, security clearances, and housing. As he explains, “you can’t form a trusting relationship with a black box.”
What makes the book of special interest to law professors is that it doesn’t just present the issue, it addresses the lack of legal restraints in the United States to regulate (or even monitor) the information private companies collect and the ways they use it. Frank makes a strong case, as he has in his scholarship, for the role of regulation not just in promoting transparency, but in regulating behavior. As he explains, “If credit scores can be regulated, why not the scoring systems used by digital advertisers and employers?”
Whether we directly use the internet to apply for credit, insurance or jobs, those offering these things to us have full access to extensive data about what we like, what we do, and how we are likely to behave. For example, they know whether we are willing to pay above market price for convenience. We are, he tells us, voluntarily opening our entire lives to commercial organizations who not only lack any obligation to keep our confidences, whose business model is to package and sell them.
While we were worrying about the government listening to our phone calls, we didn’t notice that “the state’s immense powers of compulsion and enforcement can now be enlisted in support of the black box technologies of the search, reputation, and finance sectors.”
I commend the book to you highly, as well as his NY Times Op-Ed overview but in the event you need more convincing, please see what others have said in Science, The New Republic, Slate, and The New York Times.
Tuesday, December 09, 2014
The New Cognitive Property & Human Capital Law
Intellectual property is all about the bargain, no absolutes. But below the radar, a patchwork of law and contract is operating to expand the types of knowledge and information that become propertized. My new article, The New Cognitive Property: Human Capital Law and the Reach of Intellectual Property, forthcoming Texas Law Review 2015 is now up on ssrn. Here is the abstract and as always, I would love to get your thoughts and comments:
Contemporary law has become grounded in the conviction that not only the outputs of innovation – artistic expressions, scientific methods, and technological advances – but also the inputs of innovation – skills, experience, know-how, professional relationships, creativity and entrepreneurial energies – are subject to control and propertization. In other words, we now face a reality of not only the expansion of intellectual property but also cognitive property. The new cognitive property has emerged under the radar, commodifying intellectual intangibles which have traditionally been kept outside of the scope of intellectual property law. Regulatory and contractual controls on human capital – post-employment restrictions including non-competition contracts, non-solicitation, non-poaching, and anti-dealing agreements; collusive do-not-hire talent cartels; pre-invention assignment agreements of patents, copyright, as well as non-patentable and non-copyrightable ideas; and non-disclosure agreements, expansion of trade secret laws, and economic espionage prosecution against former insiders – are among the fastest growing frontiers of market battles. This article introduces the growing field of human capital law, at the intersections of IP, contract and employment law, and antitrust law, and cautions against the devastating effects of the growing enclosure of cognitive capacities in contemporary markets.
Posted by Orly Lobel on December 9, 2014 at 10:45 AM in Article Spotlight, Employment and Labor Law, Information and Technology, Intellectual Property, Orly Lobel, Property, Workplace Law | Permalink | Comments (0)
Monday, October 20, 2014
Parents and the Privacy of Their Children
In a fascinating article about her son’s relationship with Siri in yesterday’s New York Times, Judith Newman does a terrific job illustrating some key benefits of artificial intelligence. Newman observes how Siri has infinite patience for lengthy and detailed discussions of her autistic son’s obsessions, how it forces him to enunciate clearly if he wants to elicit an answer, and how their interactions improve his communication and social skills. Very exciting stuff.
While I enjoyed learning about Siri's impact on Newman's son, the article also reminded me that when writers take us into the privacy of their families’ lives, we may learn more than we should. Millions of other readers and I now know very intimate details about Newman’s son. We know what he likes to discuss. We know which social skills he lacks. We learn about his speech skills.
In this case, Newman may have drawn the right balance. From her description of her son, it sounds like his autism is obvious to people who meet him, so it’s not as if she disclosed a medical condition, such as HIV infection or diabetes, that otherwise would not be detected by others. And her son may be very proud of his role in teaching so many people how technology can influence the lives of people with autism.
But other revelations about children are more problematic. In many cases, it seems difficult to justify the intrusions into the privacy of their children’s lives by author-parents. Often, the writings may serve many purposes but not the interests of the children they depict. At a time when government, corporations, and other outsiders are too quick to invade the privacy of children, one would expect parents to be more careful about doing so themselves.
Tuesday, October 14, 2014
Think about proposing programming for the annual meeting, or participating in a junior scholars workshop. And if you are ever interested in serving on a committee, let Russ Weaver (the executive director) know. The appointments usually happen in the summer, but he keeps track of volunteers all year long.
Posted by Marcia L. McCormick on October 14, 2014 at 11:00 AM in Civil Procedure, Corporate, Criminal Law, Employment and Labor Law, First Amendment, Gender, Immigration, Information and Technology, Intellectual Property, International Law, Judicial Process, Law and Politics, Legal Theory, Life of Law Schools, Property, Religion, Tax, Teaching Law, Torts, Travel, Workplace Law | Permalink | Comments (0)
Monday, October 13, 2014
10 Lists I Read on the Internet That Made Me Feel Stupid
Maybe I'm just still pondering College Magazine's list of "22 Reasons Why Going to Law School is the Best Decision You'll Ever Make", which, unlike anything I've written, got picked up by Huff Post. All in good fun, sure, though perhaps over-selling the case and understating the seriousness of law school as a financial proposition.
But I must not be the only person to notice that the internet seems to have been taken over by lists. There they are at the bottom and sides of the screen on my tablet, just begging to be clicked on as I strain to get up that one last hill on the stationary bike. Yes, I know, it's all about ads, and getting to put a different ad up after each click on the list. Still...
It's as if the internets think people can only think in lists. I'm all for, say, numbered blog posts, to help make it easier for commenters to point out which aspect of my argument they found the most stupid. But among the problems with these lists is that their authors seem to gravitate towards the number 10, or 12 (unlike our industry's latest booster), but sometimes getting past eight requires adding a few entries that probably didn't belong.
I'll join the fun, though. Here's a list of recent lists I find silly:
I desire only to smell it, drink it, and dream of it.
I prefer to think of myself as a being of only thought and light.
Don't care what coast animates what character. Still cry every time Mufasa dies.
Seriously, Buffalo has an NFL team? Huh.
It's so obviously the best place to live in America we didn't even try for 10 reasons.
Holy Mother Goddess, pagans can go on and on and on...
Odd that "hurts" and "pain" aren't more prominent, or at least "Riggs, I'm getting too old for this ..."
No Tweets about conferences? That's like the most exciting thing we do, dude.
Back in my day, we used to call this a "mix tape".
Guessing Joe Slater knew most of them.
Friday, October 03, 2014
The Right to be Forgotten
Much of my scholarship concerns comparative constitutional law. An interesting example of such topics being addressed, beyond a law journal, is the recent article by Jeffrey Toobin in the Sep. 29 New Yorker titled "The Solace of Oblivion," http://www.newyorker.com/magazine/2014/09/29/solace-oblivion. His article focuses on a European Court of Justice ruling that essentially ordered Google to delete any links to information regarding an individual in Spain, who had cleared up some financial difficulties that had been previously written about on the Internet. The ECJ said individuals had a right to prohibit Google from linking to items that were "inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed and in the light of the time that has elapsed." From a U.S. First Amendment perspective, such a ruling would almost certainly be an untenable speech restriction, especially given the vagueness and overbreadth of these criteria.
The article includes an interview with the Austrian born Oxford professor who is considered by Toobin to be the "intellectual godfather" of this right to be forgotten. The professor apparently sees analogies between Google retaining links to permanent blemishes about people on the one hand, and the Stasi, or other surveillance states, keeping records on people. It's a short fascinating article that I recommend to folks who want to learn more about the differences between American and European approaches to these issues. Students would find it especially accessible. The article has special relevance now in light of disclosures regarding NSA and other surveillance actions in the U.S. Yale Law Professor James Whitman wrote a seminal law review article addressing some of the underlying philosophical differences between the U.S. and Europe on privacy that has some similarities. "The Two Western Cultures of Privacy: Dignity Versus Liberty," 113 Yale L.J. 1151 (2003-4), http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1647&context=fss_papers
Thursday, September 04, 2014
Using GoFundMe for Litigation
Here is a creative way this local news anchor is trying to raise public awareness and money for defending his case against a non-compete he had signed with his former employer. Watch him and his litigation team explain their woes.
Monday, August 11, 2014
The Supreme Court Needs to Pick Up The PACER
The Supreme Court is in recess, so it seems like a good time to raise a boring but important point of judicial administration: the need for public access to court filings.
I think that everyone whose work involves the Court—and there are a lot of us—has at one time or another struggled to understand why the Court doesn’t have a system like PACER. For those who don’t know, PACER has for many years allowed the public to access filings made in the federal district courts and courts of appeals. True, PACER is imperfect in many ways, including because it charges fees for most services. Still, PACER is clearly much better than nothing. Yet no such system exists in the highest court in the land.
Acting where the Court has not, organizations like SCOTUSBlog and the ABA have done a great job of trying to provide public access to key Court documents--and at no charge. But why should the Court effectively outsource this work? Making court filings public is critical to transparency and accountability and so is part of the Court’s mission. In any event, existing websites don’t (and, realistically, can’t) supply all filed documents, such as applications for stays. For example, the Court recently divided 5-4 over an eleventh-hour request to stay an execution--yet the Court's two-sentence order was unaccompanied by the filings in that case, making it difficult to ascertain the claim that had been so narrowly denied. And even when existing websites supply these documents, there is often a significant delay that prevents timely public debate.
The Court has made great technological strides in recent years. It has made oral argument transcripts and audio files available much more quickly, for example. The Court's rules now require that key paper filings be served electronically on opposing parties. And the Court’s recent unanimous decision in Riley v. California exhibited a reassuring familiarity with modern technologies that didn’t exist even ten years ago. The Court should build on these recent achievements to leapfrog PACER and supply free public access to all filings (with appropriate exceptions, such as for materials under seal, of course). The Court should become a leader in promoting judicial transparency, rather than remaining woefully far behind.
At a time when almost every other federal court has a readily accessible electronic database, why can’t the Supreme Court?
The above is cross-posted from Re's Judicata.
Tuesday, June 17, 2014
IRS: "sorry, can't produce" or a bad example of hiding the ball?
Last week, the IRS stated that it lost numerous emails from Lois Lerner concerning the targeting of conservative groups for tax exempt status because her computer crashed. And this week, the IRS is now revealing that it has lost numerous additional emails from key IRS officials. Politics aside, it is interesting to think how this discovery issue involving electronically stored information (ESI) would be addressed in a federal court under the Federal Rules of Civil Procedure (FRCP).
The facts surrounding this issue almost read like a law school exam hypothetical. The IRS received a subpoena to produce emails between key IRS officials and other government agents that might suggest targeting. The IRS knew months ago, in February, that it could not produce the emails, but failed to inform Congress that the emails were lost until just the last few days. The IRS has taken the position that the emails were lost during a computer crash in 2011 but that the IRS has made a "good faith" effort to find them having spent $10 million dollars (of tax payer money) to deal with the investigation including the cost to piece together what could be found. The IRS does not deny that the recipients, other government officials, may still be in possession of the emails. The IRS, however, maintains that because the subpoena was only directed at the IRS, not other government agencies, the non-IRS recipients of the emails are not required to produce them.
If this issue arose in federal court, under FRCP 26, parties are required at the outset to submit a "discovery plan" that includes how ESI will be retained and exchanged in order to prevent unnecessary expense and waste. The FRCP requires the parties to take reasonable steps to preserve relevant ESI (a litigation hold) or face possible sanctions. Under Rule 37's so-called safe harbor provision, however, "absent exceptional circumstances, a court may not impose sanctions ... for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system." The IRS is hanging its hat on this safe harbor rule by arguing that, despite a good-faith effort, the emails were lost. Did the IRS, in fact, make a good faith effort?While there is confusion among the courts on how to apply the good faith standard, there is precedent for a court to monetarily sanction the IRS if the court found that the IRS acted negligently when it lost the emails. The court would also have the authority to issue an adverse inference instruction (inferring that the lost evidence would have negatively impacted the IRS's position), if it determined that the IRS acted grossly negligent or willful.
An important fact which will probably be discussed during the next few hearings is whether the IRS violated its own electronic information retention policy. The IRS was put on notice of the investigation last year, and so had a duty to put a litigation hold on the emails at that time (the very essence of what "good faith" means). It seems that the general IRS retention policy of ESI was six months (although now it is longer), but emails of "official record" had to have a hard copy which would never be deleted. Whether these emails constituted an "official record" is hard to determine since Lerner won't testify to their content.
Even assuming the emails were lost before a litigation hold could be placed (or despite a litigation hold being in place), at the very minimum, it seems "good faith" means that the IRS should have notified Congress in February that it lost the emails. Rule 26 would have required Congress to do so. Indeed, such notice would have brought this issue to the forefront and could have saved a lot of money - the money it apparently has already cost to piece together some of the emails, and the money it will cost as the parties argue over whether the IRS negligently or willfully destroyed evidence. If the IRS had been upfront from the beginning, then subpoenas could have been issued months ago to other agencies who, as employers of the lost email recipients, might have copies of the missing emails.
If this discovery issue had arisen in federal court, the IRS would have likely been subject to monetary sanctions and possibly an adverse inference instruction. Shouldn't the IRS be held to these standards?
Monday, June 16, 2014
Looks like President O got an early start on that coconut
After the next inauguration, quipped President Obama in a hipster Tumblr interview today, he says he'll "be on the beach somewhere, drinking out of a coconut . . ." Maybe sooner than that, as the president proclaims at the beginning of the interview: "We have enough lawyers, although it's a fine profession. I can say that because I'm a lawyer."
So "don't go to law school" is the message he wants to get across. Larger debate, of course. But let's see what he says right afterward. Study STEM fields, he insists, in order to get a job after graduation. STEM study, yes indeed. But STEM trained grads often look beyond an early career as a bench scientist or an IT staffer, or a mechanical career or . . . that is, STEM-trained young people look to leverage these skills to pursue significant positions in corporate or entrepreneurial settings. Hence, they look for additional training in business school, in non-science master's programs, and, yes, even in law schools.
Tumblr promises #realtalk, so here is some real talk: Significant progress in developing innovative projects and bringing inventions to market require a complement of STEM, business, and legal skills. These skills are necessary to negotiate and navigate an increasingly complex regulatory environment and to interacts with lawyers and C-suite executives as they develop and implement business strategy. Perhaps too many lawyers, but not too many lawyers who are adept at the law-business-technology interface. "Technology is going to continue to drive innovation," wisely insists President Obama. But it is not only technology that is this driver, but work done by folks with a complement of interdisciplinary skills and ambition.
Monday, June 09, 2014
Decline of Lawyers? Law schools quo vadis?
My Northwestern colleague, John McGinnis, has written a fascinating essay in City Journal on "Machines v. Lawyers." An essential claim in the article is that the decline of traditional lawyers will impact the business model of law schools -- and, indeed, will put largely out of business those schools who aspire to become junior-varsity Yales, that is, who don't prepare their students for a marketplace in which machine learning and big data pushes traditional legal services to the curb and, with it, thousands of newly-minted lawyers.
Bracketing the enormously complex predictions about the restructuring of the legal market in the shadow of Moore's Law and the rise of computational power, let's focus on the connection between these developments and the modern law school.
The matter of what law schools will do raises equally complex -- and intriguing -- questions. Here is just one: What sorts of students will attracted to these new and improved law schools? Under John's description of our techno-centered future, the answer is this: students who possess an eager appreciation for the prevalence and impact of technology and big data on modern legal practice. This was presumably include, but not be limited to, students whose pre-law experience gives them solid grounding in quantitative skills. In addition, these students will have an entrepreneurial cast of mind and, with it, some real-world experience -- ideally, experience in sectors of the economy which are already being impacted by this computational revolution. Finally, these will be students who have the capacity and resolve to use their legal curriculum (whether in two or three years, depending upon what the future brings) to define the right questions, to make an informed assessment of risk and reward in a world of complex regulatory and structural systems, and, in short, to add value to folks who are looking principally at the business or engineering components of the problem.
Law remains ubiquitous even in a world in which traditional lawyering may be on the wane. That is, to me, the central paradox of the "machines v. lawyers" dichotomy that John draws. He makes an interesting, subtle point that one consequence of the impact of machine learning may be a downward pressure on the overall scope of the legal system and a greater commitment to limited government. However, the relentless movement by entrepreneurs and inventors that has ushered in this brave new big data world has taken place with and in the shadow of government regulation and wide, deep clusters of law. The patent system is just one example; the limited liability corporation is a second; non-compete clauses in Silicon Valley employment contracts is a third. And, more broadly, the architecture of state and local government and the ways in which it has incentivized local cohorts to develop fruitful networks of innovation, as the literature on agglomeration economics (see, e.g., Edward Glaeser and David Schleicher for terrific analyses of this phenomenon). This is not a paean to big govenment, to be sure. It is just to note that the decline of (traditional) lawyers need not bring with it the decline of law which, ceteris paribus, makes the need for careful training of new lawyers an essential project.
And this brings me to a small point in John's essay, but one that ought not escape our attention. He notes the possibilities that may emerge from the shift in focus from training lawyers to training non-layers (especially scientists and engineers) in law. I agree completely and take judicial notice of the developments in American law schools, including my own, to focus on modalities of such training. John says, almost as an aside, that business schools may prove more adept at such training, given their traditional emphasis on quantitative skills. I believe that this is overstated both as to business schools (whose curriculum has not, in any profound way, concentrated on computational impacts on the new legal economy) and as to law schools. Law schools, when rightly configured, will have a comparative advantage at educating students in substantive and procedural law on the one hand and the deployment of legal skills and legal reasoning to identify and solve problems. So long as law and legal structures remain ubiquitous and complex, law schools will have an edge in this regard.
Saturday, May 31, 2014
How do we know that the version of any case, statute or regulation we read is an accurate one
The recent kurfuffle about Supreme Court Justices changing the text of already released opinions raises the larger question of how we can ever know whether the version of any statute or case or regulation we are reading is the “final one.” It also highlights the problem of of linkrot that is also affecting the reliability of judicial opinions.
Given how important a problem it can be if the text we rely on is wrong, its interesting that authenticating information places no role in the legal curriculum. I never gave it a thought until one of my dissertation advisors asked me to write a methodology section that explained to lay readers “where statues and opinions come from” and “how do we know they are reliable.” Here's a highly abbreviated version with some helpful links (reliable as of posting, May 31, 2014).
For statutes, all roads led to the National Archives and the Government Printing Office which operates the FDYS. The National Archives operates the Office of the Federal Register (OFR), which receives laws directly from the White House after they are signed by the U.S. President..” The accuracy of these texts is assured by “[t]he secure transfer of files to GPO from the AOUSC [that] maintains the chain of custody, allowing GPO to authenticate the files with digital signatures.”
The GPO assures us that it “uses a digital certificate to apply digital signatures to PDF documents. In order for users to validate the certificate that was used by GPO to apply a digital signature to document, a chain of certificates or a certification path between the certificate and an established point of trust must be established, and every certificate within that path must be checked." Good news.
The GPO has developed a system of “Validation Icons”--explained further on the Authentication FAQ page.
Editors at the OFR then prepare a document called a “slip law,” which “is an official publication of the law and is admissible as ‘legal evidence.’” It is the OFR that assigns the permanent law number and legal statutory citation of each law and prepares marginal notes, citations, and the legislative history (a brief description of the Congressional action taken on each public bill), which also contains dates of related Presidential remarks or statements.” Slip laws are made available to the public by the GPO online.
The system is more complicated when it comes to judicial opinions. Each of the Eleven Circuit Courts of Appeal issues its own opinions. For example, this is the website of the Fifth Circuit Court of Appeals, The GPO has joined with the Administrative Office of the United States Courts (AOUSC) “to provide public access to opinions from selected United States appellate, district, and bankruptcy United States Courts Opinions (USCOURTS). Currently the collection has cases only as far back as 2004As indicated by the term “selected,” this database only contains some of the federal courts.
The official source for the opinions of the U.S. Supreme Court of the United States is the U.S. Supreme court itself. Pursuant to 28 U.S.C. § 673(c), an employee of the U.S. Supreme Court is designated the “Reporter of Opinions” and he or she is responsible for working with the U.S. Government Printing Office (GPO) to publish official opinions “in a set of case books called the United States Reports.”
According to the Court, “[p]age proofs prepared by the Court’s Publications Unit are reproduced, printed, and bound by private firms under contract with the U.S. Government Printing Office (GPO). The Court’s Publications Officer acts as liaison between the Court and the GPO.” Moreover, “the pagination of these reports is the official pagination of the case. There are four official publishers of the U.S. Reports but the court warns on its website that “[i]n the case of any variance between versions of opinions published in the official United States Reports and any other source, whether print or electronic, the United States Reports controls.”
To some exent this latest information suggesting that there may be different versions of opinions at different times fits in well with the history of the court. As most of us know, the Supreme Court did not have an official reporter until the mid-nineteenth century and did not produce a written opinion for every decision. Moreover, it has only been recording oral arguments since 1955 and although now issues same day transcripts this was hardly always the case. Also now available are the remarks that the Justices make when reading their opinions. But, and no link is missing, I don't have one, in hearing Nina Totenberg give a key note presentation at ALI in 2012 about her days at the court, she pointed out that when she began covering the Court this was not available. And that it was not unusual for notes to differ on exactly what the Justices said.
Thursday, May 01, 2014
UF Law's (and My) New MOOC: The Global Student's Introduction to US Law
I am now officially part of a MOOC, which went online today. It has been a learning experience (!!), with the biggest lesson being that it is nowhere as easy as you might think to put one of these courses together. I plan to blog about the experience at length when I get a chance. For now, though, you might be interested in viewing the University of Florida Law School's foray into the great MOOC experiment: The Global Student's Introduction to US Law.
The course description is as follows:
In this course, students will learn basic concepts and terminology about the U.S. legal system and about selected topics in the fields of constitutional law, criminal law, and contract law. A team of outstanding teachers and scholars from the University of Florida faculty introduces these subjects in an accessible and engaging format that incorporates examples from legal systems around the world, highlighting similarities to and differences from the U.S. system. Students seeking an advanced certificate study additional topics and complete assignments involving legal research that are optional for basic level students. The course may be of interest both to U.S. students contemplating law school and to global students considering further study of the U.S. legal system.
My Senior Associate Dean Alyson Flournoy spearheaded the project, and we had excellent technical assistance, which was crucial, by Billly Wildberger. My colleagues Pedro Malavet, Jeff Harrison, Claire Germain, Loren Turner, Jennifer Wondracek, and Sharon Rush all provided lectures, and our research assistant Christy Lopez is providing support with the discussion forums.
Wednesday, April 30, 2014
Of (Courtney) Love and Malice
Today Seattle Police released a note found on Kurt Cobain at his death excoriating wife Courtney Love. Based on her subsequent behavior, Love cannot have been an easy person to be married to. I've been researching Love lately for an article on social media libel that I'm writing with RonNell Andersen Jones. Love is not only the first person in the US to be sued for Twitter libel; she's also Twibel's only repeat player thus far. According to news reports, Love has been sued for Twitter libel twice , and recently she was sued for Pinterest libel as well.
Love's Twitter libel trial raises interesting issues, one of which is how courts and juries should determine the existence of "actual malice" in libel cases involving tweets or Facebook posts by "non-media" defendants. As you probably recall, the US Supreme Court has held that the First Amendment requires public figures and public officials to prove actual malice--i.e., knowledge or reckless disregard of falsity--before they can recover for defamation. And even private figure defamation plaintiffs involved in matters of public concern must prove actual malice if they wish to receive presumed or punitive damages. However, US Supreme Court jurisprudence elucidating the concept of actual malice predominantly involves “media defendants”—members of the institutional press—and the Court’s examples of actual malice reflect the investigative practices of the institutional press. Thus, the Court has stated that in order for a plaintiff to establish actual malice, “[t]here must be sufficient evidence to permit the conclusion that the defendant in fact entertained serious doubts as to the truth of his publication." [St. Amant v. Thompson] Actual malice, for example, exists if a defendant invents a story, bases it on ‘an unverified anonymous telephone call,” publishes statements “so inherently improbable that only a reckless man would have put them in circulation,” or publishes despite “obvious reasons to doubt the veracity of [an] informant or the accuracy of his reports." Id.
These examples have little resonance for “publishers” in a social media context, many of whom, like Love, post information spontaneously with little verification other than perhaps a perusal of other social media sources. The typical social media libel defendant is less likely than her traditional media counterpart to rely on informants strategically placed within government or corporate hierarchies or to carefully analyze primary sources before publishing. Moreover, the typical social media defendants has no fact-checker, editor, or legal counsel and is less likely than institutional media publishers to have special training in gauging the credibility of sources or to profess to follow a code of ethics that prizes accuracy over speed.
The issue Courtney Love's libel trial appears to have raised is whether it constitutes reckless disregard of falsity if a defendant irrationally believes her defamatory accusation to be true. I say "appears," because one can only glean the issue from media accounts of Love's libel trial--the first full jury trial for Twitter libel in the US. The jury found that Love lacked actual malice when she tweeted in 2010 that her former attorney had been "bought off." Specifically, Love tweeted: “I was f—— devestated when Rhonda J. Holmes esq. of san diego was bought off @FairNewsSpears perhaps you can get a quote[sic].” Holmes sued Love in California state court for $8 million, arguing that the tweet accused Holmes of bribery. Love contended that her tweet was merely hyperbole. News accounts of the jury verdict in Love’s favor, however, indicate that the jury found that Love did not post her tweet with “actual malice." The jury deliberated for three hours at the end of the seven-day trial before concluding that the plaintiff had not proved by clear and convincing evidence that Love knew her statements were false or doubted their truth.
The Love case doesn't set any precedents, but it raises interesting issues for future cases. According to court documents and news accounts, Love consulted a psychiatrist for an “addiction” to social media. Certainly Love’s actions in the series of defamation cases she has generated do not seem entirely rational, but there is no “insanity defense” to a libel claim. Yet the determination of whether a defendant had “actual malice” is a subjective one, meaning that it is relevant whether the defendant suffered from a mental illness that caused her to have irrational, or even delusional, beliefs about the truth of a statement she posted on social media. It seems problematic, however, for the law to give no recourse to the victims of mentally disordered defamers pursuing social media vendettas based on fantasies they have concocted. As a practical matter, this problem is likely to be solved by the skepticism of juries, who will rarely accept a defendant’s argument that she truly believed her delusional and defamatory statements. Or at least I hope so.
And in case you wondered . . . Love's first social media libel case involved her postings on Twitter, MySpace and Etsy calling a fashion designer known as the "Boudoir Queen" a "nasty lying hosebag thief" and alleging that the Queen dealt cocaine, lost custody of her child, and committed assault and burglary. Love apparently settled that case for $430,000. Love's third social media libel case involves further statements about the Queen that Love made on the Howard Stern show and posted on Pinterest. Some people, it seems, are slow learners.
Posted by Lyrissa Lidsky on April 30, 2014 at 06:30 PM in Blogging, Constitutional thoughts, Culture, Current Affairs, First Amendment, Information and Technology, Lyrissa Lidsky, Torts, Web/Tech, Weblogs | Permalink | Comments (0)
Tuesday, June 18, 2013
Libel Law, Linking, and "Scam"
Although I'm a little late to the party in writing about Redmond v. Gawker Media, I thought I'd highlight it here because, though lamentably unpublished , the decision has interesting implications for online libel cases, even though the court that decided it seems to have misunderstood the Supreme Court's decision in Milkovich v. Lorain Journal.
Redmond involved claims against "new media" company Gawker Media based on an article on its tech blog Gizmodo titled Smoke and Mirrors: The Greatest Scam in Tech. The article criticized a new tech "startup," calling it " just the latest in a string of seemingly failed tech startups that spans back about two decades, all conceived, helmed and seemingly driven into the ground by one man: Scott Redmond." The article further suggested that Redmond, the CEO of the new company, used “technobabble” to promote products that were not “technologically feasible” and that his “ventures rarely—if ever—work.” In other words, the article implied, and the title of the blog post stated explicitly, that Redmond’s business model was a “scam.” Redmond complained to Gizmodo in a lengthy and detailed email, and Gizmodo posted Redmond's email on the site. Regardless, Redmond sued Gawker and the authors of the post for libel and false light. Defendants filed a motion to strike under Califonia’s anti-SLAPP statute. The trial court granted the motion, and the California appellate court affirmed.
Unsurprisingly, the appellate court found that the Gizmodo article concerned an “issue of public interest,” as defined by the anti-SLAPP statute, because Redmond actively sought publicity for his company. The court described “the Gizmodo article [as] a warning to a segment of the public—consumers and investors in the tech company—that [Redmond's] claims about his latest technology were not credible.” This part of the decision is entirely non-controversial, and the court's interpretation of "public interest" is consistent with the goal of anti-SLAPP laws to prevent libel suits from being used to chill speech on matters of significant public interest.
More controversial is the court's determination that Gizmodo's use of the term “scam” was not defamatory (and thus Redmond could not show a probability of prevailing). The court noted that “’scam’ means different things to different people and is used to describe a wide range of conduct;” while the court's assertion is correct, surely at least one of the "different things" that "scam" can mean is defamatory. [For a similar statement, see McCabe v. Rattiner, 814 F.2d 839, 842 (1st Cir. 1987) ]. While the term "scam" is usually hyberbole or name-calling, in some contexts the term acts as an accusation of criminal fraud, especially when accompanied by assertions of deliberate deception for personal gain. However, the court found that "scam" was not defamatory as used in the Gizmodo article, relying heavily on the fact that the authors gave links to “evidence” about the fates of Redmond's prior companies and his method of marketing his new one. The court concluded that the statement that Redmond's company was a “scam” was “incapable of being proven true or false.”
It is clear that the court's categorization of the statements about Redmond as “opinion rather than fact” relied on online context--both the conventions of the blog and its linguistic style. The court asserted that the article contained only statements of opinion because it was “completely transparent,” revealing all the “sources upon which the authors rel[ied] for their conclusions” and containing “active links to many of the original sources.” Technology-enabled transparency, according to the court, “put [readers] in a position to draw their own conclusions about [the CEO] and his ventures.” The court also stressed the blog's “casual first-person style." The authors of the article, according to the court, made “little pretense of objectivity,” thereby putting “reasonable reader[s]” on notice that they were reading “subjective opinions.”
As attractive as this reasoning is, especially to free speech advocates and technophiles, one should read the Redmond decision with caution because it almost certainly overgeneralizes about the types of "opinion" that are constitutionally protected. The Supreme Court's 1990 decision in Milkovich v. Lorain Journal clearly and forcefully indicates that a statement is not constitutionally protected simply because a reader would understand it to reflect the author's subjective point of view. Instead, the Milkovich Court held that a purported "opinion" can harm reputation just as much as explicit factual assertions, at least when it implies the existence of defamatory objective facts. Hence, the Court declared that the statement "In my opinion Jones is a liar" can be just as damaging to the reputation of Jones as the statement "Jones is a liar," because readers may assume unstated defamatory facts underlie the supposedly "subjective" opinion. Moreover, even if the author states the underlying facts on which the conclusion is based, the statement can still be defamatory if the underlying facts are incorrect or incomplete, or if the author draws erroneous conclusions from them. The Court therefore rejected the proposition that defamatory statements should be protected as long as it is clear they reflect the authors' point of view, or as long as they accurately state the facts on which they are based. [This analysis is freely borrowed from this article at pp. 924-25, full citations are included there.]
Posted by Lyrissa Lidsky on June 18, 2013 at 03:24 PM in Blogging, Constitutional thoughts, First Amendment, Information and Technology, Lyrissa Lidsky, Torts, Web/Tech, Weblogs | Permalink | Comments (2) | TrackBack
Wednesday, June 05, 2013
More on MOOCs
Glenn Cohen beat me to the punch in blogging about MOOCs, but I thought I might build on what he's written by giving a different perspective: describing my own (admittedly limited) on-the-ground experience with MOOCs.
Taking a MOOC, or at least signing up for one, is extraordinarily easy and painless . A MOOC--Massive Open Online Course--is a course that is open to anyone and everyone and requires no tuition or fee, but also carries no actual academic credit. There are at least three major providers of MOOCs--Coursera, Udacity, and EdX--and signing up is as easy as entering your name and email address.
For the sheer fun of it, I suppose, I signed up for a literature course through Coursera and a statistics course through Udacity. I am just starting both. Some very brief and mostly practical observations, aimed primarily at those of us who may be doing some online teaching in the future:
1. Udacity and Coursera have radically different styles, or at least the courses I'm taking do. The Coursera course, offered through Brown, is rather sparse and staid and feels more like a traditional lecture. The Udacity course, offered through San Jose state, is flashy and interactive and self-consciously entertaining. The Udacity lecture segments are short, and they are spoken not by the professors themselves but rather by someone who appears to have been hired by Udacity for the purpose of presenting the material in an appealing way (read: an attractive young woman with a pleasant voice). Moreover, Udacity seems to be totally asynchronous, whereas Coursera requires you to follow an overall week-by-week schedule. In other words, there are a lot of choices that can be made about presentation style in the online format, and the above are just a few examples.
2. It is exceedingly hard to pay close attention to a lecture on a video, even an engaging one, even for the brief 10-minute segments that Coursera offers. In real life, I have found that I can have difficulty focusing on live lectures for more than about 20 minutes or so too, unless the speaker is unusually entertaining. But with the computer format, it is even harder, because you are at an additional remove from the speaker, and because it is just too easy to start surfing the web, checking email, checking your bank account, etc. while still convincing yourself you are "listening" to the lecture in the background.
3. Because thousands of people can (and do) take these MOOCs, the discussion threads are extremely lengthy. Though I suppose they are meant to give the student of feeling of interactivity, I find them rather overwhelming and not worth the time -- especially since many of the comments are relatively devoid of useful content.
4. It is really fun, but weirdly intimidating, to be a student again.
Wednesday, April 24, 2013
On Policy and Plain Meaning in Copyright Law
As noted in my last post, there have been several important copyright decisions in the last couple months. I want to focus on two of them here: Viacom v. YouTube and UMG v. Escape Media. Both relate to the DMCA safe harbors of online providers who receive copyrighted material from their users - Section 512 of the Copyright Act. Their opposing outcomes illustrate the key point I want to make: separating interpretation from policy is hard, and I tend to favor following the statute rather than rewriting it when I don't like the policy outcome. This is not an earthshattering observation - Solum and Chiang make a similar argument in their article on patent claim interpretation. Nevertheless, I think it bears some discussion with respect to the safe harbors.For the uninitiated, 17 U.S.C. 512 states that "service providers" shall not be liable for "infringement of copyright" so long as they meet some hurdles. A primary safe harbor is in 512(c), which provides exempts providers from liability for "storage at the direction of a user of material that resides on a system" of the service provider.
To qualify, the provider must not know that the material is infringing, must not be aware of facts and circumstances from which infringing activity is apparent, and must remove the material if it obtains this knowledge or becomes aware of the facts or circumstances. Further, if the copyright owner sends notice to the provider, the provider loses protection if it does not remove the material. Finally, the provider might be liable if it has the right and ability to control the user activity, and obtains a direct financial benefit from it.
But even if the provider fails to meet the safe harbor, it might still evade liability. The copyright owner must still prove contributory infringement, and the defendant might have defenses, such as fair use. Of course, all of that litigation is far more costly than a simple safe harbor, so there is a lot of positioning by parties about what does and does not constitute safe activity.
This brings us to our two cases:
Viacom v. YouTube
This is an old case, from back when YouTube was starting. The district court recently issued a ruling once again finding that YouTube is protected by the 512(c) safe harbor. A prior appellate ruling remanded for district court determination of whether Viacom had any evidence that YouTube knew or had reason to know that infringing clips had been posted on the site. Viacom admitted that it had no such evidence, but instead argued that YouTube was "willfully blind" to the fact of such infringement, because its emails talked about leaving other infringing clips on the site - just not any that Viacom was alleging. The court rejected this argument, saying that it was not enough to show willful blindness as to Viacom's particular clips.
The ruling is a sensible, straightforward reading of 512 that favors the service provider.
UMG v. Escape Media
We now turn to UMG v. Escape Media. In a shocking ruling yesterday, the appellate division of the NY Supreme Court (yeah, they kind of name things backward there) held that sound recordings made prior to 1972 were not part of the Section 512 safe harbors. Prior to 1972, such recordings were not protected by federal copyright. Thus, if one copies them, any liability falls under state statute or common law, often referred to as "common law copyright." Thus, service providers could be sued under any applicable state law that protected such sound recordings.
Escape Media argued that immunity for "infringement of copyright" meant common law copyright as well, thus preempting any state law liability if the safe harbors were met.
The court disagreed, ruling that a) "copyright" meant copyright under the act, and b) reading the statute to provide safe harbors for common law copyright would negate Section 301(c), which states that "any rights or remedies under the common law or statutes of any State shall not be annulled or limited by this title until February 15, 2067." The court reasoned that the safe harbor is a limitation of the common law, and thus not allowed if not explicit.
If this ruling stands, then the entire notice and takedown scheme that everyone relies on will go away for pre-1972 sound recordings, and providers may potentially be liable under 50 different state laws. Of course, there are still potential defenses under the common law, but doing business just got a whole lot more expensive and risky to provide services. So, while the sky has not fallen, as a friend aptly commented about this case yesterday, it is definitely in a rapidly decaying orbit.
Policy and Plain Maining
This leads to the key point I want to make here, about how we read the copyright act and discuss it. Let's start with YouTube. The court faithfully applied the straightforward language of the safe harbors, and let YouTube off the hook. The statute is clear that there is no duty to monitor, and YouTube chose not to monitor, aggressively so.
And, yet, I can't help but think that YouTube did something wrong. Just reading the emails from that time period shows that the executives were playing fast and loose with copyright, leaving material up in order to get viewers. (By they way, maybe they had fair use arguments, but they don't really enter the mix). Indeed, they had a study done that showed a large amount of infringement on the site. I wonder whether anyone at YouTube asked to see the underlying data to see what was infringing so it could be taken down. I doubt it.
I would bet that 95% of my IP academic colleagues would say, so what? YouTube is a good thing, as are online services for user generated content. Thus, we read the statute strictly, and provide the safe harbor.
This brings us to UMG v. Escape Media. Here, there was a colossal screw-up. It is quite likely that no one in Congress thought about pre-1972 sound recordings. As such, the statute was written with the copyright act in mind, and the only reasonable reading of the Section 512 is that it applies to "infringement of copyright" under the Act. I think the plain meaning of the section leads to this conclusion. First, Section 512 refers to many defined terms, such as "copyright owner" which is defined as an owner of one of the exclusive rights under the copyright act. Second, the copyright act never refers to "copyright" to refer to pre-1972 sound recordings that are protected by common law copyright. Third, expanding "copyright" elsewhere in the act to include "common law copyright" would be a disaster. Fourth, state statutes and common laws did not always refer to such protection as "common law copyright," instead covering protection under unfair competition laws. Should those be part of the safe harbor? How would we know if the only word used is copyright?
That said, I think the court's reliance on 301(c) is misplaced; I don't think that a reading of 512 that safe harbored pre-1972 recordings would limit state law. I just don't think that's what the statute says, unfortunately.
Just to be clear, this ruling is a bad thing, a disaster even. I am not convinced that it will increase any liability, but it will surely increase costs and uncertainty. If I had to write the statute differently, I would. I'm sure others would as well.
But the question of the day is whether policy should trump plain meaning when we apply a statute. The ReDigi case and the UMG case both seem to have been written to address statutes who did not foresee the policy implications downstream. Perhaps many might say yes, we should read the statute differently.
I'm pretty sure I disagree. For whatever reason - maybe the computer programmer in me - I have always favored reading the statute as it is and dealing with the bugs through fixes or workarounds. As I've argued with patentable subject matter, the law becomes a mess if you attempt to do otherwise. ReDigi and UMG are examples of bugs. We need to fix or work around them. It irritates me to no end that Congress won't do so, but I have a hard time saying that the statutes should somehow mean something different than they say simply because it would be a better policy if they did. Perhaps that's why I prefer standards to rules - the rules are good, until they aren't.
This is not to say I'm inflexible or unpragmatic. I'm happy to tweak a standard to meet policy needs. I've blogged before about how I think courts have misinterpreted the plain meaning of the CFAA, but I am nevertheless glad that they have done so to reign it in. I'm also often persuaded that my reading of a statute is wrong (or even crazy) even when I initially thought it was clear. I'd be happy for someone to find some argument that fixes the UMG case in a principled way. I know some of my colleagues look to the common law, for example, to solve the ReDigi problem. Maybe there is a common law solution to UMG. But until then, for me at least, plain meaning trumps policy.
Tuesday, April 16, 2013
Solving the Digital Resale Problem
As Bruce Willis's alleged complaints about not being able to leave his vast music collection to his children upon his death illustrate, modern digital media has created difficulties in secondary and resale markets. (I say alleged because the reports were denied. Side note: if news breaks on Daily Mail, be skeptical. And it's sad that Cracked had to inform Americans of this...).
This post describes a recent attempt to create such a market, and proposes potential solutions.
In the good old days, when you wanted to sell your old music, books, or movies, you did just that. You sold your CD, your paperback, or your DVD. This was explicitly legalized in the Copyright Act: 17 USC Section 109 says that: “...the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord.” As we'll see later, a phonorecord is the material object that holds a sound recording, like a CD or MP3 player.
But we don't live in the good old days. In many ways, we live in the better new days. We can buy music, books, and DVDs over the internet, delivered directly to a playback device, and often to multiple playback devices in the same household. While new format and delivery options are great, they create problems for content developers, because new media formats are easily copied. In the bad sort-of-old days, providers used digital rights management (or DRM) to control how content was distributed. DRM was so poorly implemented that it is now a dirty word, so much so that it was largely abandoned by Apple; it is, however, still used by other services, like Amazon Kindle eBooks. Providers also use contracts to limit distribution - much to Bruce Willis's chagrin. Indeed, Section 109(d) is clear that a contract can opt-out of the disposal right: “[Disposal rights] do not, unless authorized by the copyright owner, extend to any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it.”
But DRM is easily avoided if you simply transfer the entire device to the another party. And contracts are not necessarily as broad as people think. For example, I have scoured the iTunes terms of service and I cannot find any limitation on the transfer of a purchased song. There are limitations on apps that make software a license and limit transfers, but the music and video downloads are described as purchases unless they are "rentals," and all of the “use” limitations are actually improvements in that they allow for multiple copies rather than just one. Indeed, the contract makes clear that if Apple kills off cloud storage, you are stuck with your one copy, so you had better not lose it. If someone can point me to a contract term where Apple says you have not “purchased” the music and cannot sell it, I would like to see that.
Enter ReDigi and the lawsuit against it. ReDigi attempted to set up a secondary market for digital works. The plaintiff was Capitol Records, so there was no contract privity, so this is a pure “purchase and disposal” case. A description from the case explains how it worked (in edited form here):
To sell music on ReDigi's website, a user must first download ReDigi's “Media Manager” to his computer. Once installed, Media Manager analyzes the user's computer to build a list of digital music files eligible for sale. A file is eligible only if it was purchased on iTunes or from another ReDigi user; music downloaded from a CD or other file-sharing website is ineligible for sale. After this validation process, Media Manager continually runs on the user's computer and attached devices to ensure that the user has not retained music that has been sold or uploaded for sale. However, Media Manager cannot detect copies stored in other locations. If a copy is detected, Media Manager prompts the user to delete the file. The file is not deleted automatically or involuntarily, though ReDigi's policy is to suspend the accounts of users who refuse to comply.
After the list is built, a user may upload any of his eligible files to ReDigi's “Cloud Locker,” an ethereal moniker for what is, in fact, merely a remote server in Arizona. ReDigi's upload process is a source of contention between the parties. ReDigi asserts that the process involves “migrating” a user's file, packet by packet — “analogous to a train” — from the user's computer to the Cloud Locker so that data does not exist in two places at any one time. Capitol asserts that, semantics aside, ReDigi's upload process “necessarily involves copying” a file from the user's computer to the Cloud Locker. Regardless, at the end of the process, the digital music file is located in the Cloud Locker and not on the user's computer. Moreover, Media Manager deletes any additional copies of the file on the user's computer and connected devices.
Once uploaded, a digital music file undergoes a second analysis to verify eligibility. If ReDigi determines that the file has not been tampered with or offered for sale by another user, the file is stored in the Cloud Locker, and the user is given the option of simply storing and streaming the file for personal use or offering it for sale in ReDigi's marketplace. If a user chooses to sell his digital music file, his access to the file is terminated and transferred to the new owner at the time of purchase. Thereafter, the new owner can store the file in the Cloud Locker, stream it, sell it, or download it to her computer and other devices. No money changes hands in these transactions. Instead, users buy music with credits they either purchased from ReDigi or acquired from other sales. ReDigi credits, once acquired, cannot be exchanged for money. Instead, they can only be used to purchase additional music.
ReDigi claimed that it was protected by 17 USC 109. After all, according to the description, it was transferring the work (the song) from the owner to ReDigi, and then to the new owner. Not so, said the court. As the court notes, Section 109 protects only the disposition of particular copies (phonorecords, really) of the work. And uploading a file and deleting the original is not transferring a phonorecord, because the statute defines a “phonorecord” as the physical medium in which the work exists. Transfer from one phonorecord to another is not the same as transfering a particular phonorecord. So, ReDigi could be a secondary market for iPods filled with songs, but not the songs disembodied from the storage media.
As much as I want the court to be wrong, I think it is right here, at least on the narrow, literal statutory interpretation. The words say what they say. Even the court notes that this is an uncomfortable ruling: “[W]hile technological change may have rendered Section 109(a) unsatisfactory to many contemporary observers and consumers, it has not rendered it ambiguous.”
Once the court finds that transferring the song to ReDigi is an infringing reproduction, it's all downhill, and not in a good way. The court notably finds that there is no fair use. I think it is here that the court gets it wrong. Unlike the analysis of Section 109, the fair use analysis is short, unsophisticated, and devoid of any real factual analysis. I think this is ReDigi's best bet on appeal.
Even despite my misgivings, ReDigi's position is not a slam dunk. After all, how can it truly know that a backup copy has not been made? Or that the file has not been copied to other devices? Or that the file won't simply be downloaded from cloud storage or even iTunes after it has been uploaded to ReDigi.
If ReDigi, which seemed to try to do a good job ensuring no residual copies, cannot form a secondary market, then what hope do we have? We certainly aren't going to get there with the statute we have, unless courts are much more willing to read a fair use into transfers. The real problem is that the statute works fine when the digital work (software, music, whatever) is stored in a single use digital product. When we start separating the “work” from the container, so that containers can hold many different works and one work might be shared on several containers all used by the same owner, all of the historical rules break down.
So, what do we do if we can't get the statute amended? I suspect people will hate my answer: a return to the dreaded DRM. A kinder, gentler, DRM. I think that DRM that allows content providers to recall content at will (or upon business closure) must go -- whether legislatively or regulatorily. It is possible, of course, for sophisticated parties to negtotiate for such use restrictions (for example, access to databases), and to set pricing for differing levels of use based on those negotiations. That's what iTunes does with its "rentals."
But companies should not be allowed to offer content "for sale" if delivery and use is tied to a contract or DRM that renders that content licensed and not in control of buyers. This is simply false advertising that takes advantage of settled expectations of users, and well within the powers of the FTC, I believe.
But DRM can and should be used to limit copying and transferrability. If transferability is allowed, then the DRM can ensure that the old user does not maintain copies. Indeed, if content outlets embraced this model, they might even create their own secondary markets to increase competition in the secondary market. In short, the solution to the problem, I believe, is going to be a technical one, and that might be a good thing for users who can no credibly show that they won't copy.
And DRM is what we are seeing right now. Apparently, ReDigi has reimplemented its service so that iTunes purchases are directly copied to a central location where they stay forever. From there, copies are downloaded to particular user devices pursuant to the iTunes agreement. This way, ReDigi acts as the digital rights manager. When a user sells a song, it ReDigi cuts off access to the song for the selling user, and allows the buying user access without making a new copy of the song on its server. I presume that its media manager also attempts to delete all copies from the sellers devices.
Of course, this might mean that content, or at least transferring it, is a little more expensive than before. But let's not kid ourselves - the good old days weren't that good. You had to buy the whole CD, or maybe a single if one was available, but you could not pick and choose any song on any album. Books are heavy and bulky; you couldn't carry thousands of them around. And DVDs require a DVD player, which has several limitations compared to video files.
DRM may just be the price we pay for convenience and choice. We don't have to pay that price. Indeed, I buy most of my music on CD. And I get to put the songs where I want, and I suppose sell the CD if I want, though I never do. As singles start costing $1.50, it may make sense to buy the whole CD. Alas, these pricing issues are incredibly complex, which may take another post in the future.
Tuesday, April 09, 2013
Academics Go To Jail – CFAA Edition
Though the Aaron Swartz tragedy has brought some much needed attention to the CFAA, I want to focus on a more recent CFAA event—one that has received much less attention but might actually touch many more people than the case against Swartz.
Andrew “Weev” Auernheimer (whom I will call AA for short) was recently convicted under the CFAA and sentenced to 41 months and $73K restitution. Orin Kerr is representing him before the Third Circuit. I am seriously considering filing an amicus brief on behalf of all academics. In short, this case scares me in a much more personal way than prior discussed in my prior CFAA posts. More after the jump.
Here’s the basic story, as described by Orin Kerr:
When iPads were first released, iPad owners could sign up for Internet access using AT&T. When they signed up, they gave AT&T their e-mail addresses. AT&T decided to configure their webservers to “pre load” those e-mail addresses when it recognized the registered iPads that visited its website. When an iPad owner would visit the AT&T website, the browser would automatically visit a specific URL associated with its own ID number; when that URL was visited, the webserver would open a pop-up window that was preloaded with the e-mail address associated with that iPad. The basic idea was to make it easier for users to log in to AT&T’s website: The user’s e-mail address would automatically appear in the pop-up window, so users only needed to enter in their passwords to access their account. But this practice effectively published the e-mail addresses on the web. You just needed to visit the right publicly-available URL to see a particular user’s e-mail address. Spitler [AA’s alleged co-conspirator] realized this, and he wrote a script to visit AT&T’s website with the different URLs and thereby collect lots of different e-mail addresses of iPad owners. And they ended up collecting a lot of e-mail addresses — around 114,000 different addresses — that they then disclosed to a reporter. Importantly, however, only e-mail addresses were obtained. No names or passwords were obtained, and no accounts were actually accessed.
Let me paraphrase this: AA went to a publicly accessible website, using publicly accessible URLs, and saved the results that AT&T sent back in response to that URL. In other words, AA did what you do every time you load up a web page. The only difference is that AA did it for multiple URLs, using sequential guesses at what those URLs would be. There was no robot.txt file that I’m aware of (this file tells search engines which URLs should not be searched by spiders). There was no user notice or agreement that barred use of the web page in this manner. Note that I’m not saying such things should make the conduct illegal, but only that such things didn’t even exist here. It was just two people loading data from a website. Note that a commenter on my prior post asked this exact same question--whether "link guessing" was illegal--and I was noncommital. I guess now we have our answer.
The government’s indictment makes the activity sound far more nefarious, of course. It claims that AA “impersonated” an iPad. This allegation is a bit odd: the script impersonated an iPad in the same way that you might impersonate a cell phone by loading http://m.facebook.com to load the mobile version of Facebook. Go ahead, try it and you’ll see – Facebook will think you are a cell phone. Should you go to jail?
So, readers might say, what’s the problem here? AA should not have done what he did – he should have known that AT&T did not want him downloading those emails. Yeah, he probably did know that. But consider this: AA did not share the information with the world, as he could have. I am reasonably certain that if his intent was to harm users, we would never know that he did this – he would have obtained the addresses over an encrypted VPN and absconded. Instead, AA shared this flaw with the world. AT&T set up this ridiculously insecure system that allowed random web users to tie Apple IDs to email addresses through ignorance at best or hubris at worst. I don’t know if AA attempted to inform AT&T of the issue, but consider how far you got last time you contacted tech support with a problem on an ISP website. AA got AT&T’s attention, and the problem got fixed with no (known) divulgence of the records.
Before I get to academia, let me add one more point. To the extent that AA should have known AT&T didn’t desire this particular access, the issue is one of degree not of kind. And that is the real problem with the statute. There is nothing in the statute, absolutely nothing, that would help AA know whether he violated the law by testing this URL with one, five, ten, or ten thousand IDs. Here’s one to try: click here for a link to a concert web page deep link using a URL with a numerical code. Surely Ticketmaster can’t object to such deep linking, right? Well, it did, and sued Tickets.com over such behavior. It claimed, among other things, that each and every URL was copyrighted and thus infringed if linked to by another. It lost that argument, but today it could just say that such access was unwanted. For example, maybe Tickemaster doesn’t like me pointing out its ridiculous argument in the tickets.com case, making my link unauthorized. Or maybe I should have known because the Ticketmaster terms of service says that an express condition of my authorization to view the site is that I will not "Link to any portion of the Site other than the URL assigned to the home page of our site." That's right, TicketMaster still thinks deep linking is unauthorized, and I suppose that means I risk criminal prosecution for linking it. Imagine if I actually saved some of the data!
This is where academics come in. Many, many academics scrape. (Don’t stop reading here – I’ll get to non-scrapers below.) First, scraping is a key way to get data from online databases that are not easily downloadable. This includes, for example, scraping of the US Patent & Trademark Office site; although data is now available for mass download, that data is cumbersome, and scraper use is still common. That the PTO is public data does not help matters. In fact, it might make it worse, since “unauthorized” access to government servers might receive enhanced penalties!
Academics (and non-academics) in other disciplines scrape websites for research as well. How are these academics to know that such scraping is disallowed? What if there is no agreement barring them from doing so? What if there is a web-wrap notice as broad as Ticketmaster's, purporting to bar such activities but with no consent by the user? The CFAA could send any academic to jail for ignoring such warnings—or worse—not seeing them in the first place. Such a prosecution would be preposterous, skeptics might say. I hope the skeptics are right, but I'm not hopeful. Though I can't find the original source, I recall Orin Kerr recounting how his prosecutor colleagues said the same thing 10 years ago when he argued the CFAA might apply to those who breach contracts, and now such prosecutions are commonplace.
Finally, non-scrapers are surely safe, right? Maybe it depends on if they use Zotero. Thousands of people use it. How does Zotero get information about publications when the web site does not provide standardized citation data? You guessed it: a scraper. Indeed, a primary reason I don’t use Zotero is that the Lexis and Westlaw scrapers don’t work. But the PubMed importer scrapes. What if PubMed decide that it considered scraping of information unauthorized? Surely people should know this, right? If it wanted people to have this data, they would provide it in Zotero readable format. The fact that the information on those pages is publicly available is irrelevant; the statute makes no distinction. And if one does a lot of research, for example, checking 20 documents, downloading each, and scraping each page, the difference from AA is in degree only, not in kind.
The irony of this case is that the core conviction is only tangentially a problem with the statute (there are some ancillary issues that are a problem with the statute). “Unauthorized access” and even “exceeds authorized access” should never have been interpreted to apply to publicly accessible data on publicly accessible web sites. Since they have, then I am convinced that the statute is impermissibly broad, and must be struck down. At the very least it must be rewritten.
Tuesday, March 05, 2013
The iPhone, not the eye, is the window into the soul
It is great to be back at Prawfsblawg this year. Thanks to Dan and the gang for having me back. For my first post this month, I wanted to point everyone to the most important privacy research of 2012. The same paper qualifies as the most ignored privacy research of 2012, at least within legal circles. It is a short paper that everyone should read.
The paper in question,Mining Large Scale Smart-Phone Data for Personality Studies, is by Gokul Chittaranjan, Jan Blom, and Daniel Gatica-Perez. Chittaranjan and co-authors brilliantly show that it is straightforward to mine data from smart-phones in an automated way so as to identify particular "Five Factor" personality types in a large population of users. They did so by administering personality tests to 117 smartphone users, and then following the smartphone activities of those users for seventeen months, identifying the patterns that emerged. The result was that each of the "Big Five" personality dimensions was associated with particular patterns of phone usage. For example, extraverts communicated with more people and spent more time on the phone, highly conscientious people sent more email messages from their smartphones, and users of non-standard ring-tones tended to be those who psychologists would categorize as open to new experiences.
There is a voluminous psychology literature linking scores on particular Big Five factors to observed behavior in the real world, like voting, excelling in workplaces, and charitable giving. Some of the literature is discussed in much more detail here. But the Chittaranjan et al. study provides a powerful indication of precisely why data-mining can be so powerful. Data mining concerning individuals' use of machines is picking up personality traits, and personality predicts future behavior.
The regularities observed via the analysis of Big Data demonstrate that you can aggregate something seemingly banal like smartphone data to administer surreptitious personality tests to very large numbers of people. Indeed, it is plausible that studying observed behavior from smartphones is a more reliable way of identifying particular personality traits than existing personality tests themselves. After all, it is basically costless for an individual to give false answers to a personality questionnaire. It is costly for an extravert to stop calling friends.
Privacy law has focused its attention on protecting the contents of communications or the identities of the people with whom an individual is communicating. The new research suggests that -- to the extent that individuals have a privacy interest in the nature of their personalities -- an enormous gap exists in the present privacy framework, and cell phone providers and manufacturers are sitting on (or perhaps already using) an information gold mine.
It's very unlikely that the phenomenon that Chittaranjan et al. identify is limited to phones. I expect that similar patterns could be identified from analyzing peoples' use of their computers, their automobiles, and their television sets. The Chittaranjan et al. study is a fascinating, tantalizing, and perhaps horrifying early peek at life in a Big Data world.
Wednesday, January 30, 2013
Does Not Translate?: How to Present Your Work to Real People
Recently I've agreed to give talks on social media law issues to "real" people. For example, one of the breakfast talks I've been asked to give is aimed at "judges, city and county commissioners, business leaders and UF administrators and deans." Later, I'm giving a panel presentation on the topic to prominent women alumni of UF. My dilemma is that I want to strike just the right tone and present information at just the right level for these audiences. But I'm agonizing over some basic questions. Can I assume that every educated person has at least an idea of how social media work? What segment of the information that I know about Social Media Law and free speech would be the most interesting to these audiences, and should I just skip a rock over the surface of the most interesting cases and incidents, accompanied by catchy images? How concerned should I be about the offensive potential of talking about the real facts of disturbing cases for a general but educated audience? As a Media Law scholar and teacher, I'm perfectly comfortable talking about the "Fuck the Draft" case or presenting slides related to the heart-wrenching cyberbullying case of Amanda Todd that contain the words "Flash titties, bitch." But can I talk about this at breakfast? If I can, do I need to give a disclaimer first? And for a general audience, do I want to emphasize the disruptive potential of social media speech, or do I have an obligation to balance that segment of the presentation with the postive aspects for free speech? And do any of you agonize over such things every time you speak to a new audience?
Anyway, translation advice is appreciated. I gave our graduation address in December, and I ended up feeling as if I'd hit the right note by orienting the address around a memorable story from history that related to the challenges of law grads today. But the days and even the minutes preceding the speech involved significant agonizing, which you'd think someone whose job involves public speaking on a daily basis wouldn't experience.
Monday, December 10, 2012
Big Data, Privacy, and Insurers: Forget the web, Flo’s the one to watch.
At least within the corner of the web that I frequent, it seems that I cannot go more than a few pages without running into articles discussing the never-ending growth of the Big Data industry, the death of online privacy, and how long it will be until we are all subject to 1984-esque surveillance. These issues have been particularly interesting to me, given that, like many of us, I maintain a presence on a number of social media sites. If at all possible, I would prefer to control who has access to the embarrassing high school yearbook photos that were posted to my Facebook wall, my Amazon.com browsing history, and the contents of the Christmas list I sent to my family. Even when I have given my consent to certain entities to access this information, I'd like to restrict how they use this data, limit its transferability, and have some type of assurance that adequate securities measures have been put into place to protect my data. While I recognize that the dissemination of this information would, in most cases, have little to no detrimental impact on my life, the ease with which third parties could aggregate data about me makes me quite uneasy. The public uproar that results every time Facebook changes its privacy settings establishes that my feelings are widely shared. It is no surprise that the law’s regulation of web-based information has become one of the hotter topics in politics and legal academia (I've particularly enjoyed a forthcoming piece written by one of my colleagues: Prof. Bedi’s Facebook and Interpersonal Privacy).
there are good reasons that the data privacy discussion has centered on the
Internet, I have found myself wondering whether this focus has diverted
attention away from the rampant expansion of offline data collection. Given my
scholarly interests, it is unsurprising that the best example of this
phenomenon that I can point to comes from the insurance industry.
Recent developments in the auto insurance industry may (at least in my mind) herald the beginning of a new era of aggressive approaches to data collection. Over the past two years, Progressive has increasingly offered consumers the opportunity to reduce their premiums if they agree to allow Progressive to monitor their driving habits via wireless technology (the “Snapshot” discount). While Progressive’s observation period is limited in both duration and amount of data collected (e.g., braking habits are recorded, GPS data is not), it is easy to see how market incentives will push auto insurers to try and collect increasing amounts of data about—or continuously monitor—their policyholders. Further, if such programs are widely adopted throughout the industry, consent to monitoring could become a market-imposed mandatory condition for obtaining coverage. Finally, there do not appear to be any reasons why this type of data collection would not spread to other lines of casualty insurance.
While there are factors that will limit the expansion of this trend (collection and processing costs, state insurance regulations, social pressures), I anticipate that we have only seen the tip of the iceberg when it comes to insurers' taking an active approach towards data. I will save my thoughts on why this type of data collection is particularly worrisome (as well as its potential upside) for another post.
Thursday, November 08, 2012
Cease and Desist
For nearly 10 years, scholars, commentators, and disappointed downloaders have criticized the now-abandoned campaign of the Recording Industry Association of America (RIAA) to threaten litigation against, and in some cases, sue downloaders of unauthorized music. The criticisms follow two main themes. First, demand letters, which mention of statutory damages up to and including $150,000 per infringed work (if the infringement is willful), often lead to settlements of $2,000 - $3,000. A back of the envelope cost-benefit analysis would suggest this is a reasonable response from the receipient if $150,000 is a credible threat, but for those who conclude that information is free and someone must challenge these cases, the result is frustrating.
Second, it has been argued that the statutory damage itself is unconstitutional, at least as applied to downloaders, because it is completely divorced from any actual harm suffered by the record labels. The constitutional critique has been advanced by scholars like Pam Samuelson and Tara Wheatland, accepted by a district court judge in the Tenenbaum case, dodged on appeal by the First Circuit, but rejected outright by the Eighth Circuit. My intuition is that the Supreme Court would hold that Congress has the authority to craft statutory damages sufficiently high to deter infringement, and that there's sufficient evidence that Congress thought its last increase in statutory damages would accomplish that goal.
We could debate that, but I have something much more controversial in mind. I hope to convince you that the typical $3,000 settlement is the right result, at least in file-sharing cases.
The Copy Culture survey indicates that the majority of respondents who support a penalty support fines for unauthorized downloading of a song or movie. Of those who support fines, 32% support a fine of $10 or less, 43% support fines of up to $100, 14% support fines of up to $1,000, 5% support higher fines, 3% think fines should be context sensitive, and 3% are unsure. The average max fine for the top three groups is $209. Let's cut it in half, to $100, because roughly half of survey respondents were opposed to any penalty.
How big is the typical library of "illegally" downloaded files? 10 songs? 100 songs? 1,000? The Copy Culture study reports the following from survey respondents who own digital files, by age group:
18-29: 406 files downloaded for free
30-49: 130 files downloaded for free
50-64: 60 files downloaded for free
65+: 51 files downloaded for free
In the two cases that the RIAA actually took to trial, the labels argued that the defendants had each downloaded over 1,000 songs, but sued over 30 downloads in one case, and 24 downloads in the other. As I see it, if you're downloading enough to catch a cease and desist letter, chances are good that you've got at least 30 "hot" files on your hard drive.
You can see where I'm going here. If the average target of a cease and desist letter has 30 unauthorized files, and public consensus centers around $100 per unauthorized file, then a settlement offer of $3,000 is just about right.
Four caveats. First, maybe the Copy Culture survey is not representative of public opinion and that number should be far lower than $100. Second, misfires happen with cease and desist letters: sometimes, individuals are mistargeted. One off-the-cuff response is to have the RIAA pay $3,000 to every non-computer user and the estate of every dead grandman who gets one of these letters.
Third, this doesn't take fair use into account, and thus might not be a fair proxy for many other cases. For example, the Righthaven litigation seems entirely different to me - reproducing a news story online seems different than illegally downloading a song instead of paying $1, in part because the news story is closer to copyright's idea line, where more of the content is likely unprotectable, and because the redistribution of news is more likely to be fair use.
Fourth, it doesn't really deal with the potentially unconstitutional / arguably stupid possibility that some college student could be ordered to pay $150,000 per download, if a jury determines he downloaded willfully. I'd actually be happy with a rule that tells the record labels they can only threaten a maximum damage award equal to the average from the four jury determinations in the Tenenbaum and Thomas-Rasset cases. That's still $43,562.50 per song. Round it down to the non-willful statutory cap, $30,000, and I still think that a $3,000 settlement is just about perfect.
Now tell me why I'm crazy.
Thursday, October 25, 2012
Copyright's Serenity Prayer
I recently discovered an article by Carissa Hessick, where she argues that the relative ease of tracking child pornography online may lead legislators and law enforcement to err in two ways. First, law enforcement may pursue the more easily detected possession of child pornography at the expense of pursuing actual abuse, which often happens in secret and is diffcult to detect. Second, legislators may be swayed to think that catching child porn possessors is as good as catching abusers, because the former either have abused, or will abuse in the future. Thus, sentences for possession often mirror sentences for abuse, and we see a potential perversion of the structure of enforcement that gives a false sense of security about how much we are doing to combat the problem.
With the caveat that I know preventing child abuse is muchmuch more important that preventing copyright infringement, I think the ease of detecting unauthorized Internet music traffic may also have troubling perverse effects.
When I was a young man, copying my uncle's LP collection so I could take home a library of David Bowie casette tapes, there was no way Bowie or his record label would ever know. The same is true today, even though they now make turntables that will plug right into my computer and give me digital files that any self-respecting hipster would still disdain, but at least require me to flip a vinyl disc as my cost of copying.
On the other hand, it's much easier to trace free-riding that occurs online. That was part of what lead to the record industry's highly unpopular campaign against individual infringers. Once you can locate the individual infringer, you can pursue infringment that used to be "under the radar." The centralized, searchable nature of the Internet also made plausible Righthaven's disastrous campaign against websites copying news stories, and the attempt by attorney Blake Field to catch Google infringing his copyright in posted material by crawling his website with automated data gathering programs.
What if copyright owners are chasing the wrong harm? For example, one leaked RIAA study suggests that while a noticeable chunk of copyright infringement occurs via p2p sharing, it's not the largest chunk. While the RIAA noted that in 2011, 6% of unauthorized sharing (4% of total consumption) happens in locker services like Megauploads, and 23% (15%) happens via p2p, 42% (27%) of unauthorized acquisition is done by burning and ripping CDs from others, and another 29% (19%) happens through face-to-face hard drive trading. Offline file sharing is apparently more prevalent than the online variety, but it is much more difficult to chase. So it may be that copyright holders chase the infringement they can find, rather than the infringement that most severely affects the bottom line.
In a way, leaning on the infringement they can detect is reminiscent of the oft-repeated "Serenity Prayer," modified here for your contemplation:
God, grant me the serenity to accept the infringement I cannot find,
The courage to crush the infringement I can,
And the wisdom to know the difference.
All this brings me back to the friends and family question. The study on Copy Culture in the U.S. reports that roughly 80% of the adults owning music files think it's okay to share with family, and 60% think it's okay to share with friends. In addition, the Copyright Act specifically insulates friends and family sharing in the context of performing or displaying copyrighted works to family and close friends in a private home (17 USC s. 101, "publicly"). Thus, there is some danger in going after that friends and family sharing. If the family and friends line is the right line, can we at least feel more comfortable that someone to whom I'm willing to grant physical access to my CD library is a "real" friend than my collection of Facebook friends and acquaintances, some of whom will never get their hands on my vinyl phonograph of Blues and Roots?
Wednesday, October 10, 2012
FriendsHello all. Glad to be back at Prawfsblawg for another round of blogging. I'm looking forward to sharing some thoughts about entertainment contracts, the orphan works problem in copyright, and the new settlement between Google and several publishers over Google Books. Today, I want to talk a bit about file-sharing and friendship. A recent study asked U.S. and German citizens whether they thought it was "reasonable" to share unauthorized, copyrighted files with family, with friends, and in several different online contexts. Perhaps unsurprisingly, respondents in the 18-29 range responded more favorably to file sharing than older respondents in every context. What interests me is that respondents in every context see a sharp difference between sharing files with friends, and posting a file on Facebook. We call our Facebook contacts "friends," but I'm curious why the respondents to this study made the distinction between sharing with friends and sharing on Facebook. I have a few inchoate thoughts, and I'd love to hear what you think. Megan Carpenter wrote an interesting article about the expressive and personal dimension of making mix tapes. I grew up in the mix tape era as well, and remember well the emotional sweat that I poured into collections of love songs made for teenage paramours in the hopes of sustaining doomed long-distance romances. Carpenter correctly argues that there is something personal about that act, and it seems reasonable that it would fall outside the reach of the Copyright Act. I also remember copying my uncle's entire collection of David Bowie LPs onto casette tapes when I was in junior high. In that instance, music moved through family connections, and in my small town in Wyoming, there were no casettes from the Bowie back catalog on the shelves of the local music store. But the only effort involved in making those casettes was turning the LP at the end of a side. Less expressive, but within a fairly tight social network. A properly functioning copyright system might reasonably allow for these uses, and still sanction a decision to post my entire Bowie collection on Facebook, or through a torrent. I'm skeptical of any definition of "friends and family" so capacious that it would include Facebook friends, and I suspect that many people realize now, if they didn't then, that what constitutes a face-to-face friend is different than what constitutes a Facebook friend, but you may have a different impression. I hope you'll share it here, whatever it is.
Thursday, October 04, 2012
TPRC Celebrates 40 Years of Research in Telecom
Two weeks ago the Telecommunications Policy Research Conference (TPRC) had a great event to celebrate its 40th year of delving into communications, information and Internet policy issues (I'm a member of the program committee so, yes, this is a shameless plug). What I enjoy most about TPRC is that it is truly interdisciplinary; that should come as a relief to anyone who's been in a room filled only with lawyers--bless our hearts. The conference brings together scholars from all fields as well as policy makers and private and non profit practitioners. There were many outstanding sessions including a Friday evening panel (soon available on video) about The Next Digital Frontier with speakers straight out of the "who's who" of telecom: Eli Noam (Columbia), David Clark (MIT), Gigi Sohn (Public Knowledge) and Thomas Hazlett (GMU).
There is much more work of note, I'll single out a few articles after the jump, and I encourage you to look at the TPRC Program files for additional articles of interest. Also, around March keep your eyes open for next year's call for papers. I will still be on the program committee so, in case you're interested, you should know I'm highly motivated by gifts of chocolate (dark preferred).As mentioned, the TPRC website has the full program of presented articles so be sure to check it out. I particularly enjoyed the work of the legal and economic scholars--and not just because they made the math easier than the engineers did, but that didn't hurt. Three pieces that come to mind are Payment Innovation at the Content/Carriage Interface by James Speta, American Media Concentration Trends in Global Context: A Comparative Analysis by Eli Noam and Political Drivers and Signaling in Independent Agency Voting: Evidence from the FCC by Adam Candeub and Eric Hunnicutt.
First, if you haven't exhausted your interest in net neutrality issues, take a look at Speta's article that considers payment innovation at the customer level as a means by which congestion may be resolved in a content neutral manner. This is a highly topical piece as current net neutrality regulation is arguably on shaky, jurisdictional ground. Second, my friend Eli Noam, who never fails to intrigue, shared some counter intuitive observations from a multi-year, 30 country research project that tracks concentration levels in 13 communications industries. And third, Candeub and Hunnicutt make a welcome, empirical entry in a largely qualitative arena by quantifying the effects that party affiliation (of FCC Commissioners, Congress and the Executive) has on agency decision making. It's really a must read for anyone interested in the areas of communications, administrative law and political economy (and who isn't!).
Finally, a shout out to my fellow blogger Rob Howse who recently wrote on our need to be more patient with each other when we accidently hit "Reply to All." The conference also featured some innovation demonstrations and, Rob, I have just the plugin for you! The product is "Privicons" and as self-described (because I could not make this up):
Unlike more technical privacy solutions like tools that use code to lock down emails, Privicons relies on an iconographic vocabulary informed by norms-based social signals to influence users' choices about privacy.
In other words,with this plugin you can send a graphic reminder to email readers that they should "act nice." I think I'll send some Privicons to my students right around evaluation time.
Wednesday, July 18, 2012
Legal Education in the Digital Age
With the latest news of U-Va. joining a consortium of schools promoting online education, it seems only a matter of time before law schools will have to confront the possibility of much larger chunks of the educational experience moving into the virtual world. Along with Law 2.0 by David I.C. Thomson, there is now Legal Education in the Digital Age, edited by Ed Rubin at Vanderbilt. The book is primarily about the development of digital course materials for law school classes, with chapters by Ed Rubin, John Palfrey, Peggy Cooper Davis, and Larry Cunningham, among others. The book comes out of a conference hosted by Ron Collins and David Skover at Seattle U. My contribution follows up on my thoughts about the open source production of course materials, which I have previously written about here and here. You can get the book from Cambridge UP here, or at Amazon in hardcover or on Kindle.
One question from the conference was: innovation is coming, but where will it come from? Some possibilities:
- Law professors
- Law schools and universities
- Legal publishers
- Outside publishers
- Tech companies such as Amazon or Apple
- SSRN and BePress
- Some combination(s) of these
I think we all agree that significant change is coming down the pike. But what it ultimately will look like is still very much up in the air. What role will law professors play?
Tuesday, July 03, 2012
How Not to Criminalize Cyberbullying
My co-author Andrea Pinzon Garcia and I just posted our essay, How Not to Criminalize Cyberbullying, on ssrn. In our essay, we provide a sustained constitutional critique of the growing body of laws criminalizing cyberbullying. These laws typically proceed by either modernizing existing harassment and stalking laws or crafting new criminal offenses. Both paths are beset with First Amendment perils, which our essay illustrates through 'case studies' of selected legislative efforts. Though sympathetic to the aims of these new laws, we contend that reflexive criminalization in response to tragic cyberbullying incidents has led law-makers to conflate cyberbullying as a social problem with cyberbullying as a criminal problem, leading to pernicious consequences. The legislative zeal to eradicate cyberbullying potentially produces disproportionate punishment of common childhood wrongdoing. Furthermore, statutes criminalizing cyberbullying are especially prone to overreaching in ways that offend the First Amendment, resulting in suppression of constitutionally protected speech, misdirection of prosecutorial resources, misallocation of taxpayer funds to pass and defend such laws, and the blocking of more effective legal reforms. Our essay attempts to give legislators the First Amendment guidance they need to distinguish the types
of cyberbullying that must be addressed by education, socialization, and stigmatization from those that can be remedied with censorship and criminalization. To see the abstract or paper, please click here or here.
Posted by Lyrissa Lidsky on July 3, 2012 at 03:44 PM in Article Spotlight, Constitutional thoughts, Criminal Law, Current Affairs, First Amendment, Information and Technology, Lyrissa Lidsky, Web/Tech | Permalink | Comments (0) | TrackBack
Thursday, June 07, 2012
The Virtual Honesty Box
As a fan of comic book art, I'm often thrilled to encounter areas where copyright or trademark law and comic books intersect. As is the case in other media, the current business models of comic book publishers and creators has been threatened by the ability of consumers to access their work online without paying for it. Many comic publishers are worried about easy migration of content from paying digital consumers to non-paying digital consumers. Of course, scans of comics have been making their way around the internet on, or sometimes before, a given comic's onsale date for some time now. As in other industries, publishers have dabbled with DRM, and publishers have enbraced different (and somewhat incompatible) methods for providing consumers with authorized content. Publishers' choices sometimes lead to problems with vendors and customers, as I discuss a bit below.
While services like Comixology offer a wide selection of content from most major comics publishers, they are missing chunks of both the DC Comics and Marvel Comics catalogues. DC entered a deal to distribute 100 of its graphic novels (think multi-issue collections of comic books) exclusively via Kindle. Marvel Comics subsequently struck a deal to offer "the largest selection of Marvel graphic novels on any device" to users of the Nook.
Sometimes exclusive deals leave a bad taste in the mouths of other intermediaries. DCs graphic novels were pulled from Barnes & Noble shelves because the purveyor of the Nook was miffed. Independent publisher Top Shelf is an outlier, offering its books through every interface and intermediary it can. But to date, most publishers are trying to make digital work as a complement to, and not a replacement for, print.
Consumers are sometimes frustrated by a content-owner's choice to restrict access, so much so that they feel justified engaging in "piracy." (Here I define "piracy" as acquiring content through unauthorized channels, which will almost always mean without paying the content owner.) Some comics providers respond with completely open access. Mark Waid, for example, started Thrillbent Comics with the idea of embracing digital as digital, and in a manner similar to Cory Doctorow, embracing "piracy" as something that could drive consumers back to his authorized site, even if they didn't pay for the content originally.
I recently ran across another approach from comic creators Leah Moore and John Reppion. Like Mark Waid, Moore and Reppion have accepted, if not embraced, the fact that they cannot control the flow of their work through unauthorized channels, but they still assert a hope, if not a right, that they can make money from the sales of their work. To that end, they introduced a virtual "honesty box," named after the clever means of collecting cash from customers without monitoring the transaction. In essence, Moore and Reppion invite fans who may have consumed their work without paying for it to even up the karmic scales. This response strikes me as both clever and disheartening.
I'll admit my attraction to perhaps outmoded content-delivery systems -- I also have unduly fond memories of the 8-track cassette -- but I'm disheartened to hear that Moore and Reppion could have made roughly $5,500 more working minimum wage jobs last year. Perhaps this means that they should be doing something else, if they can't figure out a better way to monetize their creativity in this new environment. Eric Johnson, for one, has argued that we likely don't need legal or technological interventions for authors like Moore and Reppion in part because there are enough creative amateurs to fill the gap. The money in comics today may not be in comics at all, but in licensing movies derived from those comics. See, e.g., Avengers, the.
I hope Mark Waid is right, and that "piracy" is simply another form of marketing that will eventually pay greater dividends for authors than fighting piracy. And perhaps Moore and Reppion should embrace "piracy" and hope that the popularity of their work leads to a development deal from a major film studio. Personally, I might miss the days when comics were something other than a transparent attempt to land a movie deal.
As for the honesty box itself? Radiohead abandoned the idea with its most recent release, King of Limbs, after the name-your-price model adopted for the release of In Rainbows had arguably disappointing results: according to one report, 60% of consumers paid nothing for the album. I can't seen Moore and Reppion doing much better, but maybe if 40% of "pirates" kick in a little something into the virtual honesty box, that will be enough to keep Moore and Reppion from taking some minimum wage job where their talents may go to waste.
Friday, June 01, 2012
Oracle v. Google - The Other Shoe Drops
For those of you following the Oracle v. Google case, as I predicted here, the court has ordered that the APIs that Google copied are not copyrightable - at least not in the form that they were used. The case is basically dismissed with no remedy to Oracle.
Thursday, May 31, 2012
A Coasean Look at Commercial Skipping...
Readers may have seen that DISH has sued the networks for declaratory relief (and was promptly cross-sued) over some new digital video recorder (DVR) functionality. The full set of issues is complex, so I want to focus on a single issue: commercials skipping. The new DVR automatically removes commercials when playing back some recorded programs. Another company tried this many years ago, but was brow-beaten into submission by content owners. Not so for DISH. In this post, I will try to take a look at the dispute from a fresh angle.
Many think that commercial skipping implicates derivative work rights (that is, transformation of a copyrighted work). I don't think so. The content is created separately from the commercials, and different commercials are broadcast in different parts of the country. The whole package is probably a compiliation of several works, but that compilation is unlikely to be registered with the copyright office as a single work. Also, copying the work of only one author in the compilation is just copying of the subset, not creating a derivative work of the whole.
So, if it is not a derivative work, what rights are at stake? I believe that it is the right to copy in the first place in a stored DVR file. This activity is so ubiquitous that we might not think of it as copying, but it is. The Copyright Act says that the content author has the right to decide whether you store a copy on your disk drive, absent some exception.
And there is an exception - namely fair use. In the famous Sony v. Universal Studios case, the Court held that "time shifting" is a fair use by viewers, and thus sellers of the VCR were not helping users infringe. Had the Court held otherwise, the VCR would have been enjoined as an agent of infringement, just like Grokster was.
I realize that this result is hard to imagine, but Sony was 5-4, and the initial vote had been in favor of finding infringement. Folks can debate whether Sony intended to include commercial skipping or not. At the time, remote controls were rare, so skipping a recorded commercial meant getting off the couch. It wasn't much of an issue. Even now, advertisers tolerate the fact that people usually fast forward through commercials, and viewers have always left the TV to go to the bathroom or kitchen (hopefully not at the same time!).
But commercial skipping is potentially different, because there is zero chance that someone will stop to watch a catchy commercial or see the name of a movie in the black bar above the trailer as it zooms by. I don't intend to resolve that debate here. A primary reason I am skipping the debate is that fair use tends to be a circular enterprise. Whether a use is fair depends on whether it reduces the market possibilities for the owner. The problem is, the owner only has market possibilities if we say they do. For some things, we may not want them to have a market because we want to preserve free use. Thus, we allow copying via a DVR and VCR, even if content owners say they would like to charge for that right.
Knowing when we should allow the content owner to exploit the market and when we should allow users to take away a market in the name of fair use is the hard part. For this reason, I want to look at the issue through the lens of the Coase Theorem. Coase's idea, at its simplest, is that if parties can bargain (which I'll discuss below), then it does not matter with whom we vest the initial rights. The parties will eventually get to the outcome that makes each person best off given the options, and the only difference is who pays.
One example is smoking in the dorm room. Let's say that one person smokes and the other does not. Regardless of which roommate you give the right to, you will get the same amount of smoking in the room. The only difference will be who pays. If the smoker has the right to smoke, then the non-smoker will either pay the smoker to stop or will leave during smoking (or will negotiate a schedule). If you give the non-smoker the right to a smoke-free room, then the smoker will pay to smoke in the room, will smoke elswhere, or the parties will negotiate a schedule. Assuming non-strategic bargaining (hold-ups) and adequate resources, the same result will ensue because the parties will get to the level where the combination of their activities and their money make them the happiest. The key is to separate the analysis from normative views about smoking to determine who pays.
Now, let's apply this to the DVR context. If we give the right to skip commercials to the user, then several things might happen. Advertisers will advertise less or pay less for advertising slots. Indeed, I suspect that one reason why ads for the Super Bowl are so expensive, even in a down economy, is that not only are there a lot of viewers, but that those viewers are watching live and not able to skip commercials. In response, broadcasters will create less content, create cheaper content, or figure out other ways to make money (e.g. charging more for view on demand or DVDs). Refusing to broadcast unless users pay a fee is unlikely based on current laws. In short, if users want more and better content, they will have to go elsewhere to get it - paying for more channels on cable or satellite, paying for video on demand, etc. Or, they will just have less to watch.
If we give the right to stop commercial skipping to the broadcaster, then we would expect broadcasters will broadcast the mix they have in the past. Viewers will pay for the right to commercial skip. This can be done as it is now, through video on demand services like Netflix, but that's not the only model. Many broadcasters allow for downloading via the satellite or cable provider, which allows the content owner to disable fast forwarding. Fewer commercials, but you have to watch them. Or, in the future, users could pay a higher fee to the broadcaster for the right to skip commercials, and this fee would be passed on to content owners.
These two scenarios illustrate a key limit to the Coase Theorem. To get to the single efficient solution, transactions costs must be low. This means that the parties must be able to bargain cheaply, and there must be no costs or benefits that are being left out of the transaction (what we call externalities). Transactions costs are why we have to be careful about allocating pollution rights. The factory could pay a neighborhood for the right to pollute, but there are costs imposed on those not party to the transaction. Similarly, a neighborhood could pay a factory not to pollute, but difficulty coordinating many people is a transaction cost that keeps such deals from happening.
I think that transactions costs are high in one direction in the commercial skipping scenario, but not as much in the other. If the network has the right to stop skipping, there are low cost ways that content aggregators (satellite and cable) can facilitate user rights to commercial skip - through video on demand, surcharges, and whatnot. This apparatus is already largely in place, and there is at least some competition among content owners (some get DVDs out soon, some don't for example).
If, on the other hand, we vest the skipping right with users, then the ability for content owners to pay (essentially share their advertising revenues) with users is lower if they want to enter into such a transaction. Such a payment could be achieved, though, through reduced user fees for those who disable channel skipping. Even there, though, dividing among all content owners might be difficult.
Normatively, this feels a bit yucky. It seems wrong that consumers should pay more to content providers for the right to automate something they already have the right to do - skip commercials. However, we have to separate the normative from the transactional analysis - for this mind experiment, at least.
Commercials are a key part of how shows get made, and good shows really do go away if there aren't enough eyeballs on the commercials. Thus, we want there to be an efficient transaction that allows for metered advertising and content in a way that both users and networks get the benefit of whatever bargain they are willing to make.
There are a couple of other relevant factors that imply to me that the most efficient allocation of this right is with the network:
1. DISH only allows skipping after 1AM on the day the show is recorded. This no doubt militates in favor of fair use, because most people watch shows on the day they are recorded (or so I've read, I could be wrong). However, it also shows that the time at which the function kicks in can be moved, and thus negotiated and even differentiated among customers that pay different amounts. Some might want free viewing with no skipping, some might pay a large premium for immediate skipping. If we give the user the right to skip whenever, it is unlikely that broadcasters can pay users not to skip, and this means they are stuck in a world with maximum skipping - which kills negotiation to an efficient middle.
2. The skipping is only available for broadcast tv primetime recordings - not for recordings on "cable" channels, where providers must pay for content. Thus, there appears to already be a payment structure in practice - DISH is allowing for skipping on some networks and not others, which implies that the structure for efficient payments are already in place. If, for example, DISH skipped commercials on TNT, then TNT would charge DISH more to carry content. The networks may not have that option due to "must carry" rules. I suspect this is precisely why DISH skips for broadcasters - because it can without paying. In order to allow for bargaining however, given that networks can't charge more for DISH to carry content is to vest the right with networks and let the market take over.
These are my gut thoughts from an efficiency standpoint. Others may think of ways to allow for bargaining to happen by vesting rights with users. As a user, I would be happy to hear such ideas.
This is my last post for the month - time flies! Thanks to Prawfs again for having me, and I look forward to guest blogging in the future. As a reminder, I regularly blog at Madisonian.
Tuesday, May 29, 2012
School of Rock
I had a unique experience last Friday, teaching some copyright law basics to music students at a local high school. The instructor invited me to present to the class in part because he wanted a better understanding of his own potential liability for arranging song for performances, and in part because he suspected his students were, by and large, frequently downloading music and movies without the permission of copyright owners, and he thought they should understand the legal implications of that behavior. The students were far more interested in the inconsistencies they perceived in the current copyright system. I'll discuss a few of those after the break.
First, the Copyright Act grants the exclusive right to publicly perform a musical work, or authorize such a performance, to the author of the work, but there is no right public performance right granted to the author or owner of a sound recording. See 17 U.S.C. § 114. In other words, Rod Temperton, the author of the song "Thriller," has the right to collect money paid to secure permission to publicly perform the song, but neither Michael Jackson's estate nor Epic Records holds any such right, although it's hard to discount the creative choices of Michael Jackson, Quincy Jones and their collaborators in making much of what the public values about that recording. To those who had tried their hands at writing songs, however, the disparity made a lot of sense because "Thriller" should be Temperton's song because of his creative labors.
Second, the Copyright Act makes specific allowance for what I call "faithful" cover tunes, but not beat sampling or mashups. If a song (the musical work) has been commercially released, another artist can make a cover of the song and sell recordings of it without securing the permission of the copyright owner, so long as the cover artist provides notice, pays a compulsory license (currenty $0.091 per physical or digital recording) and doesn't change the song too much. See 17 U.S.C. § 115. If the cover artist makes a change in "the basic melody or fundamental character of the work," then the compulsory license in unavailable, and the cover artist must get permission and pay what the copyright owner asks. In addition, the compulsory license does not cover the sound recording, so there is no compulsory license for a "sampling right." Thus, Van Halen can make a cover of "Oh, Pretty Woman," without Roy Orbison's permission, but Two Live Crew cannot (unless the rap version ends up qualifying for the fair use privilege).
It was also interesting to me that at least one student in each class was of the opinion that once the owner of a copyrighted work put the work on the Internet, the owner was ceding control of the work, and should expect people to download it for free. It's an observation consistent with my own analysis about why copyright owners should have a strong, if not absolute, right to decide if and when to release a work online.
On a personal level, I confirmed a suspicion about my own teaching: if I try to teach the same subject six different times on the same day, it is guaranteed to come out six different ways, and indeed, it is likely there will be significant differences in what I cover in each class. This is in part because I have way more material at my fingertips than I can cram into any 45 minute class, and so I can be somewhat flexible about what I present, and in what order. I like that, because it allows me to teach in a manner more responsive to student questions. On the other hand, it may expose a failure to determine what are the 20-30 minutes of critical material I need to cover in an introduction to copyright law.
Friday, May 25, 2012
Using empirical methods to analyze the effectiveness of persuasive techniques
Slate Magazine has a story detailing the Obama campaign's embracement of empirical methods to assess the relative effectiveness of political advertisements.
To those familiar with the campaign’s operations, such irregular efforts at paid communication are indicators of an experimental revolution underway at Obama’s Chicago headquarters. They reflect a commitment to using randomized trials, the result of a flowering partnership between Obama’s team and the Analyst Institute, a secret society of Democratic researchers committed to the practice, according to several people with knowledge of the arrangement. ...
The Obama campaign’s “experiment-informed programs”—known as EIP in the lefty tactical circles where they’ve become the vogue in recent years—are designed to track the impact of campaign messages as voters process them in the real world, instead of relying solely on artificial environments like focus groups and surveys. The method combines the two most exciting developments in electioneering practice over the last decade: the use of randomized, controlled experiments able to isolate cause and effect in political activity and the microtargeting statistical models that can calculate the probability a voter will hold a particular view based on hundreds of variables.
Curiously, this story comes on the heels of a New York Times op-ed questioning the utility and reliability of social science approaches to policy concerns and a movement in Congress to defund the political science studies program at NSF.
Wednesday, May 16, 2012
Contrarian Statutory Interpretation Continued (CDA Edition)
Following my contrarian post about how to read the Computer Fraud and Abuse Act, I thought I would write about the Communication's Decency Act. I've written about the CDA before (hard to believe it has been almost 3 years!), but I'll give a brief summary here.
The CDA provides immunity from the acts of users of online providers. For example, if a user provides defamatory content in a comment, a blog need not remove the comment to be immune, even if the blog receives notice that the content is defamatory, and even if the blog knows the content is defamatory.
I agree with most of my colleagues who believe this statute is a good thing for the internet. Where I part ways from most of my colleagues is how broadly to read the statute.
Since this is a post about statutory interpretation, I'll include the statute:
Section 230(c)(1) of the CDA states that:
No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.
In turn, an interactive computer service is:
any information service, system, or access software provider that provides or enables computer access by multiple users to a computer server, including specifically a service or system that provides access to the Internet and such systems operated or services offered by libraries or educational institutions.
Further, an information content provider is:
any person or entity that is responsible, in whole or in part, for the creation or development of information provided through the Internet or any other interactive computer service.
So, where do I clash with others on this? The primary area is when the operators of the computer service make decisions to publish (or republish) content. I'll give three examples that courts have determined are immune, but that I think do not fall within the statute:
- Web Site A pays Web Site B to republish all of B's content on Site A. Site A is immune.
- Web Site A selectively republishes some or all of a story from Web Site B on Site A. Site A is immune.
- Web Site A publishes an electronic mail received by a reader on Site A. Site A is immune.
These three examples share a common thread: Site A is immune, despite selectively seeking out and publishing content in a manner that has nothing to do with the computerized processes of the provider. In other words, it is the operator, not the service, that is making publication determinations.
To address these issues, cases have focused on "development" of the information. One case, for example, defines development as a site that "contributes materially to the alleged illegality of the conduct." Here, I agree with my colleagues that development is being defined too broadly to limit immunity. Development should mean that the provider actually creates the content that is displayed. For that reason, I agree with the Roommates.com decision, which held that Roommates developed content by providing pre-filled dropdown lists that allegedly violated the Fair Housing Act. It turns out that the roommate postings were protected speech, but that is a matter of substance, and not immunity. The fact that underlying content is eventually vindicated does not mean that immunity should be expanded. To the extent some think that the development standard is limited only to development of illegal content (something implied by the text of the Roommates.com decision), I believe that is too limiting. The question is the source of the information, not the illegality of it.
The burning issue is why plaintiffs continue to rely on "development" despite its relatively narrow application. The answer is that this is all they currently have to argue, and that is where I disagree with my colleagues. I believe the word "interactive" in the definition must mean something. It means that the receipt of content must be tied to the interactivity of the provider. In other words, receipt of the offending content must be automated or otherwise interactive to be considered for immunity.
Why do I think that this is the right reading? First, there's the word "interactive." It was chosen for a reason. Second, the definition of "information content provider" identifies information "provided through the Internet or any other interactive computer service." (emphasis added). This implies that the provision of information should be based on interactivity or automation.
There is support in the statute for only immunizing information directly provided through interactivity. Section, 230(d), for example, requires interactive service providers to notify their users about content filtering tools. This implies that the information being provided is through the interactive service. Sections 230(a) and (b) describe the findings and policy of Congress, which describe interactive services as new ways for users to control information and for free exchange of ideas.
I think one can read the statute more broadly than I am here. But I also believe that there is no reason to do so. The primary benefit of Section 230 is a cost savings mechanism. There's is no way many service providers can screen all the content on their websites for potentially tortious activity. There's just no filter for that.
Allowing immunity for individualized editorial decisions like paying for syndicated content, picking and choosing among emails, and republishing stories from other web sites runs directly counter to this cost saving purpose. Complaining that it costs too much to filter interactive user content is a far cry from complaining that it costs to much to determine whether an email is true before making a noninteractive decision to republish it. We should want our service providers to expend some effort before republishing.
Fair Use and Electronic Reserves
For several years Georgia State was involved in litigation over the fair use doctrine. Specifically a consortium of publishers backed by Oxford, Cambridge and Sage sued Georgia State over copyright violations by many of the faculty. Many of my colleagues in the department were specifically named in the suit. A decision has now been rendered. You can read abou the decision here, and you can read the decision here.
The Court backed Georgia State in almost every instance, finding no copyright violation. However, the Court did lay down some rules - in particular you can use no more than 10% or one chapter, whichever is shorter, of any book.
Oh, and my colleagues were all found to have not violated copyright laws. For two of them the Court found that the plaintiffs could even prove a copyright.
Friday, May 11, 2012
App Enables Users to File Complaints of Airport Profiling
Following the terrorist attacks of September 11, 2001, Muslims and those perceived to be Muslim in the United States have been subjected to public and private acts of discrimination and hate violence. Sikhs -- members of a distinct monotheistic religion founded in 15th century India -- have suffered the "disproportionate brunt" of this post-9/11 backlash. There generally are two reasons for this. The first concerns appearance: Sikh males wear turbans and beards, and this visual similiarity to Osama bin Laden and his associates made Sikhs an accessible and superficial target for post-9/11 emotion and scrutiny. The second relates to ignorance: many Americans are unaware of Sikhism and of Sikh identity in particular.
Accordingly, after 9/11, Sikhs in the United States have been murdered, stabbed, assaulted, and harassed; they also have faced discrimination in various contexts, including airports, the physical space where post-9/11 sensitivities are likely and understandably most acute. The Sikh Coalition, an organization founded in the hours after 9/11 to advocate on behalf of Sikh-Americans, reported that 64% of Sikh-Americans felt that they had been singled-out for additional screening in airports and, at one major airport (San Francisco International), nearly 100% of turbaned Sikhs received additional screening. (A t-shirt, modeled here by Sikh actor Waris Ahluwalia and created by a Sikh-owned company, makes light of this phenomenon.)
In response to such "airport profiling," the Sikh Coalition announced the launch of a new app (Apple, Android), which "allows users to report instances of airport profiling [to the Transportation Security Administration (TSA)] in real time." The Coalition states that the app, called "FlyRights," is the "first mobile app to combat racial profiling." The TSA has indicated that grievances sent to the agency by way of the app will be treated as official complaints.News of the app's release has generated significant press coverage. For example, the New York Times, ABC, Washington Post, and CNN picked up the app's announcement. (Unfortunately, multiple outlets could not resist the predictable line, 'Profiled at the airport? There’s an app for that.') Wade Henderson, president and CEO of The Leadership Conference on Civil and Human Rights and The Leadership Conference Education Fund, tweeted, "#FlyRights is a vanguard in civil and human rights."
It will be interesting to see whether this app will increase TSA accountability, quell profiling in the airport setting, and, more broadly, trigger other technological advances in the civil rights arena.
Wednesday, May 09, 2012
Oracle v. Google: Digging Deeper
This follows my recent post about Oracle v. Google. At the behest of commenters, both online and offline, I decided to dig a bit deeper to see exactly what level of abstraction is at issue in this case. The reason is simple: I made some assumptions in the last post about what the jury must have found, and it turns out that the assumption was wrong. Before anyone accuses me of changing my mind, I want to note that in my last post I made a guess, and that guess was wrong once I read the actual evidence. My view of the law hasn't changed. More after the jump.
For the masochistic, Groklaw has compiled the expert reports in an accessible fashion here and here. Why do I look at the reports, and not the briefs? It turns out that lawyers will make all sorts of arguments about what the evidence will say, but what is really relevant is the evidence actually presented. The expert reports, submitted before trial, are the broadest form of evidence that can be admitted - the court can whittle down what the jury hears, but typically experts are not allowed to go much beyond their reports.
These reports represent the best evidentiary presentation the parties have on the technical merits. It turns out that as a factual matter, both reports overlap quite a bit, and neither seems "wrong" as a matter of technical fact. I would sure hope so - these are pretty well respected professors and, quite frankly, the issues in this case are just not that complicated from a coding standpoint. (Note: for those wonder what gives me the authority to say that, I could say a lot, but I'll just note that in a prior life I wrote a book about software programming for an electronic mail API).
What level of abstraction was presented and argued to the jury? As far as I can tell from the reports, other than a couple or three routines that were directly copied, the Oracle's expert found little or no similar structures or sequences in the main body source code - the part that actually does the work. The only similarity - and it was nearly identical - was in the structure, sequence and organization of the grouping of function names, and the "packages" or files that they were located in.
For computer nerds, also identical were function names, parameter orders, and variable structures passed in as parameters. In other words, the header files were essentially identical. And they would have to be, if the goal is to have a compatible system. The inputs (the function names and parameters) and the outputs need to be the same. The only way you can disallow this usage of the API is to say that you cannot create an independent software program (even one of this size) that mimics the inputs and outputs of the original program.
To say that would be bad policy, and as I discuss below, probably not in accordance with precedent. This is why the experts are both right. Oracle's expert says they are identical, and Google copied because that was the best way to lure application developers - by providing compatibility (and the jury agreed, as to the copying part). Google's expert says, so what? The only thing copied was functional, and that's legal. It's this last part that a) led to the hung jury, and b) the court will have to rule on.
In my last post, I assumed that the level of abstraction must have been at a deeper level than just the names of the methods. Why did I do that?
First, the court's jury instructions make clear that function names are not at issue. But I guess the court left it to the jury whether the collection could be infringed.
Second, the idea that an API could be infringed is usually something courts decide well in advance of trial, and it's a question that doesn't usually make it to trial.
Third, based on media accounts, it appeared that there was more testimony about deeper similarities in the code. The copied functions, I argued in my prior post, supported that view. Except that there were no other similarities. I think it is a testament to Oracle's lawyers (and experts) that this misperception of a dirty clean room shone through in media reports, because the actual evidence belies the media accounts.
This is why I decided to dig deeper, and why one should not rely on second hand reports of important evidence. Based on my reading of the reports (and I admit that I could be missing something - I wasn't in the courtroom), I think that the court will have no choice but to hold that the collection of API names is uncopyrightable - at least at this level of abstraction and claimed infringement.
To the extent that there are bits of non-functional code, I would say that's probably fair use as a matter of law to implement a compatible system. I made a very similar argument in an article I wrote 12 years ago - long before I went into academia.
Prof. Boyden asked in a comment to my prior post whether there was any law that supported the copying of APIs structure and header files. I think there is: Lotus v. Borland. That case is famous for allowing Borland to mimic the Lotus structure, but there was also an API of sorts. Lotus macros were based on the menu structure, and to provide program compatiblity with Lotus, Borland implemented the same structure. So, for example, in Lotus, a user would hit "/" to bring up the menus, "F" to bring up the file menu, and "O" to bring up the open menu. As a result, the macro "/FO" would mimic this, to bring up the open menu.
Borland's product would "read" macro programs written for Lotus, and perform the same operation. No underlying similarity of the computer code, but an identical API that took the same inputs to create the same output the user expected.
Like the lower court here, the lower court there found infringement of the structure, sequence, and organization of the menu structure. Like the lower court here, the court there found it irrelevant that Borland got the menu structure from third-party books rather than Lotus's own product. (Here, Google asserts that it got the API's from Apache Harmony, a compatible Java system, rather than the Java documents themselves). There is some dispute about whether Sun sanctioned the Apache project, and what effect that should have on the case. I think that the Harmony is a red herring.The reality is that it does not matter either way - a copy is a copy is a copy - if the copy is illicit that is.
In Lotus, the lower court found the API creative and copyrightable, the very question facing the court here. On appeal, however, the First Circuit ruled that the API was a method of operation, likening it to the buttons on a VCR. I think that's a bit simplistic, but it was definitely the right ruling. The case went up to the Supreme Court, and it was a blockbuster case, expected to -- once and for all -- put this question to rest.
Alas, the Supreme Court affirmed without opinion by an evenly divided court. And the circuit court ruling stood. And it still stands - the court never took another case, and the gist of Lotus v. Borland has been applied over and over, but rarely as directly as it might apply here.
Wholesale, direct compatibility copying of APIs just doesn't happen very often, and certainly not on the scale and with the stakes of that at issue here. Perhaps that is why there is no definitive case holding that an entire API structure is uncopyrightable. You would think we would have by 2012, but nope. Lotus comes close, but it is not identical. In Lotus, the menu structure was much smaller, and the names and structure were far less creative. Further, the concern was macro programming written by users for internal use that would not allow them to switch to a new spreadsheet program. Java programs, on the other hand, are designed to be distributed to the public in most cases.
Then again, the core issue is the same: the ability to switch the underlying program while maintaining compatibility of programs that have already been written. Based on this similarity, my prediction is that Judge Alsup will say that the collection of names is not copyrightable, or at the very least usage of the API in this manner is fair use as a matter of law. We'll see if I'm right, and whether an appeals court affirms it.
Monday, May 07, 2012
Oracle v. Google - Round I jury verdict (or not)
The jury came back today with its verdict in round one of the epic trial between two giants: Oracle v. Google. This first phase was for copyright infringement. In many ways, this was a run of the mill case, but the stakes are something we haven't seen in a technology copyright trial in quite some time.
Here's the short story of what happened, as far as I can gather.
1. Google needed an application platform for its Android phones. This platform allows software developers to write programs (or "apps" in mobile device lingo) that will run on the phone.
2. Google decided that Sun's (now Oracle's) Java was the best way to go.
3. Google didn't want to pay Sun for a license to a "virtual machine" that would run on Android phones.
4. Google developed its own virtual machine that is compatible with the Java programming language. To do so, Google had to make "APIs" that were compatible with Java. These APIs are essentially modules that provide functionality on the phone based on a keywords (instructions) from a Java language computer program. For example, if I want to display "Hello World" on the phone screen, I need only call print("Hello World"). The API module has a bunch of hidden functionality that takes "Hello World" and sends it out to the display on the screen - manipulating memory, manipulating the display, etc.
5. The key dispute is just how much of the Java source code was copied, if any to create the Google version.
The jury today held the following:
1. One small routine (9 lines) was copied directly - line for line. The court said no damages for this, but this finding will be relevant later
2. Google copied the "structure, sequence, and organization" of 37 Java API modules. I'll discuss what this means later.
3. There was no finding on whether the copying was fair use - the jury deadlocked.
4. Google did not copy any "documentation" including comments in the source code.
5. Google was not fooled into thinking it had a license from Sun.
To understand any of this, one must understand the levels of abstraction in computer code. Some options are as follows:
A. Line by line copying of the entire source code.
B. Line by line paraphrasing of the source code (changing variable names, for example, but otherwise idential lines).
C. Copying of the structure, sequence and organization of the source code - deciding what functions to include or not, creative ways to implement them, creative ways to solve problems, creative ways to name and structure variables, etc. (The creativity can't be based on functionality)
D. Copying of the functionality, but not the stucture, sequence and organization - you usually find this with reverse engineering or independent development
E. Copying of just the names of functions with similar functionality - the structure and sequence is the same, but only as far as the names go (like print, save, etc.). The Court ruled already that this is not protected.
F. Completely different functionality, including different structure, sequence, organization, names, and functionality.
Obviously F was out if Google wanted to maintain compatibility with the Java programming language (which is not copyrightable).
So, Google set up what is often called a "cleanroom." The idea is not new - AMD famously set up a cleanroom to develop copyrighted aspects of its x86 compatible microprocessors back in the early 1990's. Like Google now (according to the jury), AMD famously failed to keep its cleanroom clean.
Here's how a cleanroom works. One group develops a specification of functionality for each of the API function names (which are, remember, not protected - people are allowed to make compatible programs using the same names, like print and save). Ideally, you do this through reverse engineering, but arguably it can be done by reading copyrighted specifications/manuals, and extracting the functionality. Quite frankly, you could probably use the original documentation as well, but it does not appear as "clean" when you do so.
Then, a second group takes the "pure functionality" description, and writes its own implementation. If it is done properly, you find no overlapping source code or comments, and no overlapping structure, sequence and organization. If there happens to be similar structure, sequence and organization, then the cleanroom still wins, because that similarity must have been dictated by functionality. After all, the whole point of the cleanroom is that the people writing the software could not copy because they did not have the original to copy from.
So, where did it all go wrong? There were a few smoking guns that the jury might have latched on to:
1. Google had some emails early on that said there was no way to duplicate the functionality, and thus Google should just take a license.
2. Some of the code (specifically, the 9 lines) were copied directly. While not big in itself, it makes one wonder how clean the team was.
3. The head of development noted in an email that it was a problem for the cleanroom people to have had Sun experience, but some apparently did.
4. Oracle's expert testified (I believe) that some of the similarities were not based on functionality, or were so close as to have been copied. Google's expert, of course, said the opposite, and the jury made its choice. It probably didn't help Google that Oracle's expert came from hometown Stanford, while Google's came from far-away Duke.
So, the jury may have just discounted the Google cleanroom story, and believed Oracle's. And that's what it found. As someone who litigated many copyight cases between competing companies, this is not a shocking outcome. This issue will not doubt bring the copyright v. functionality issue to the forefront (as it did in Lotus v. Borland and Intel v. AMD), this stuff is bread and butter for most technology copyright lawyers. It's almost always factually determined. Only the scope of this case is different in my book - everything else looks like many cases I've litigated (and a couple that I've tried).
So, what happens now in the copyright phase? (A trial on patent infringement started today.) Judge Alsup has two important decisions to make.
First, the court has to decide what to do with the fair use ruling. Many say that a mistrial is warranted since fair use is a question of fact and the jury deadlocked. I'm not so sure. The facts on fair use are not really disputed here - only the legal interpretation of them; my experience is that courts are more than willing to make a ruling one way or the other when copying is clear (as the jury now says it is). I don't know what the court will do, but my gut says no fair use here. My experience is that failed cleanrooms fail fair use - it means that what was copied was more than pure functionality, and it is for commercial use with market substitution. The only real basis for fair use is that the material copied was pure functionality, and that's the next inquiry.
Second, the court must determine whether the structure, sequence, and organization of these APIs can be copyrightable, or whether they are pure functionality. I don't know the answer to that question. It will depend in large part on:
a. whether the structure, etc., copied was at a high level (e.g. structure of functions) or at a low level (e.g. line by line and function by function);
b. the volume of copied (something like 11,000 lines is at issue);
c. the credibility of the experts in testifying to how much of structure that is similar is functionally based. On a related note, the folks over at groklaw think for the most part think this is not copyrightable. They have had tremendous coverage of this case.
I've been on both sides of this argument, and I've seen it go both ways, so I don't have any predictions. I do look forward to seeing the outcome, though. It has been a while since I've written about copyright law and computer software; this case makes me want to rejoin the fray.
Thursday, May 03, 2012
When a Good Interpretation is the Wrong One (CFAA Edition)
Hi, and thanks again to Prawfs for having me back. In my first post, I want to revisit the CFAA and the Nosal case. I wrote about this case back in April 2011 (when the initial panel decision was issued), and again in December (when en banc review was granted). It's hard to believe that it has been more than a year!
I discuss the case in detail in the other posts, but for the busy and uninitiated, here is the issue: what does it mean to "exceed authorized access" to a computer? In Nosal, the wrongful act was essentially trade secret misappropriation where the "exceeded authorization" was violation of a clear "don't use our information except for company benefit" type of policy. Otherwise, the employees had access to the database from which they obtained information as part of their daily work.
Back in April, I argued that the panel basically got the interpretation of the statute right, but that the interpretation was so broad as to be scary. Orin Kerr, who has written a lot about this, noted in the comments that such a broad interpretation would be void for vagueness because it would ensnare too much everyday, non-wrongful activity. Though I'm not convinced that the law supports his view, it wouldn't break my heart if that were the outcome. But that's not the end of the story.
Last month, the Ninth Circuit finally issued the en banc opinion in the Nosal case. The court noted all the scary aspects of a broad interpretation, trotting out the parade of horribles showing innocuous conduct that would violate the broadest reading of the statute. As the court notes: "Ubiquitous, seldom-prosecuted crimes invite arbitrary and discriminatory enforcement." We all agree on that.
The solution for the court was to narrowly interpret what "exceeds authorized access" means: "we hold that 'exceeds authorized access' in the CFAA is limited to violations of restrictions on access to information, and not restrictions on its use." (emphasis in original).
On the one hand, this is a normatively "good" interpretation. The court applies the rule of lenity to not outlaw all sorts of behavior that shouldn't be outlawed and that was likely never intended to be outlawed. So, I'm not complaining about the final outcome.
On the other hand, I can't get over the fact that the interpretation is just plain wrong as a matter of statutory interpretation. Here are some of the reasons why:
1. The term "exceeds authorized access" is defined in the statute: "'exceeds authorized access' means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." The statute on its face makes clear that exceeding access is not about violating an access restriction, but instead about using access to obtain information that one is not so entitled to obtain. To say that a use restriction cannot be part of the statute simply rewrites the definition.
2. They key section of the statute is not about use of information at all. Section 1030(a)(2) outlaws access to a computer, where such access leads to obtaining (including viewing) of information. So, of course exceeding authorized access should deal with an access restriction, but what is to stop everyone from rewriting their agreements conditionally: "Your access to this server is expressly conditioned on your intent at the time of access. If your intent is to use the information for nefarious purposes, then your access right is revoked." The statutory interpretation can't be so easily manipulated, but it appears to be.
3. Even if you accept the court's reading as in line with the statute, it still leaves much uncertainty in practice. For example, the court points to Google's former terms of service that disallowed minors from using Google: You may not use the Services and may not accept the Terms if . . . you are not of legal age to form a binding contract with Google . . . .” I agree that it makes little sense for all minors who use Google to be juvenile delinquents. But read the terms carefully - they are not about use of information; they are about permission to access the services. If you are a minor, you may not use our services (that is, access our server). I suppose this is a use restriction because the court used it as an example, but that's not so clear to me.
4. The court states that Congress couldn't have meant exceeds authorized access to be about trade secret misappropriation and really only about hacking. 1030(a)(1)(a) belies that reading. That section outlaws exceeding authorized access to obtain national secrets and causing them "to be communicated, delivered, or transmitted, or attempt[ing] to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it." That sounds a lot like misappropriation to me, and I bet Congress had a situation like Nosal in mind.
5. In fact, trade secrets appear to be exactly what Congress had in mind. The section that would ensnare most unsuspecting web users, 1030(a)(2) (which bars "obtaining" information by exceeding authorized access), was added in the same public law as the Economic Espionage Act of 1996 - the federal trade secret statute. The senate reports for the EEA and the change to 1030 were issued on the same day. As S. Rep. 104-357 makes clear, the addition was to protect the privacy of information on civilian computers. Of course, this helps aid a narrower reading - if information is not private on the web, then perhaps we should not be so concerned about it.
6. On a related note, the court's treatment of the legislative history is misleading. The definition of "exceeds authorized access" was changed in 1986. As the court notes in a footnote:
[T]he government claims that the legislative history supports itsinterpretation. It points to an earlier version of the statute, which defined“exceeds authorized access” as “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend.” But that language was removed and replaced by the current phrase and definition.
So far, so good. In fact, this change alone seems to support the court's view, and I would have stopped there. But the the court goes on to state:
And Senators Mathias and Leahy—members of theSenate Judiciary Committee—explained that the purpose of replacing the original broader language was to “remove from the sweep of the statute one of the murkier grounds of liability, under which a[n] . . . employee’s access to computerized data might be legitimate in some circumstances, but criminal in other (not clearly distinguishable) circumstances.”
This reading is just not accurate in content or spirit. I reproduce below sections of S. Rep. 99-472, the legislative history cited by the court:
[On replacing "knowing" access with "intentional" access] This is particularly true in those cases where an individual is authorized to sign onto and use a particular computer, but subsequently exceeds his authorized access by mistakenly entering another computer file or data that happens to be accessible from the same terminal. Because the user had ‘knowingly’ signed onto that terminal in the first place, the danger exists that he might incur liability for his mistaken access to another file. ... The substitution of an ‘intentional’ standard is designed to focus Federal criminal prosecutions on those whose conduct evinces a clear intent to enter, without proper authorization, computer files or data belonging to another.. . .[Note: (a)(3) was about access to Federal computers by employees. Access to private computers was not added for another 10 years. At the time (a)(2) covered financial information.] The Committee wishes to be very precise about who may be prosecuted under the newsubsection (a)(3). The Committee was concerned that a Federal computer crime statute not be so broad as to create a risk that government employees and others who are authorized to use a Federal Government computer would face prosecution for acts of computer access and use that, while technically wrong, should not rise to the levelof criminal conduct. At the same time, the Committee was required to balance its concern for Federal employees and other authorized users against the legitimate need to protect Government computers against abuse by ‘outsiders.’ The Committee struck that balance in the following manner.In the first place, the Committee has declined to criminalize acts in which the offending employee merely ‘exceeds authorized access' to computers in his own department ... It is not difficult to envision an employee or other individual who, while authorized to use a particular computer in one department, briefly exceeds his authorized access and peruses data belonging to the department that he is not supposed to look at. This is especially true where the department in question lacks a clear method of delineating which individuals are authorized to access certain of its data. The Committee believes that administrative sanctions are more appropriate than criminal punishment in such a case. The Committee wishes to avoid the danger that every time an employee exceeds his authorized access to his department's computers—no matter how slightly—he could be prosecuted under this subsection. That danger will be prevented by not including ‘exceeds authorized access' as part of this subsection's offense. [emphasis added]Section 2(c) substitutes the phrase ‘exceeds authorized access' for the more cumbersome phrase in present 18 U.S.C. 1030(a)(1) and (a)(2), ‘or having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend’. The Committee intends this change to simplify the language in 18 U.S.C. 1030(a)(1) and (2)... [note: not to change the meaning, though obviously it does]
[And finally, the quote in the Nosal case, which were "additional" comments in the report, not the report of the committee itself]: [1030(a)(3)] would eliminate coverage for authorized access that aims at ‘purposes to which such authorization does not extend.’ This removes from the sweep of the statute one of the murkier grounds of liability, under which a Federal employee's access to computerized data might be legitimate in some circumstances, but criminal in other (not clearly distinguishable) circumstances that might be held to exceed his authorization.
Tuesday, April 17, 2012
“Breaking and Entering” Through Open Doors: Website Scripting Attacks and the Computer Fraud and Abuse Act, Part 2
Two notes: 1) Apologies to Prawfs readers for the delay in this post. It took my student and I longer than anticipated to complete some of the technical work behind this idea. 2) This post is a little longer than originally planned, because last week the Ninth Circuit en banc reversed a panel decision in United States v. Nosal which addressed whether the CFAA extends to violations of (terms of) use restrictions. In reversing the panel decision, the Ninth Circuit found the CFAA did *not* extend to such restrictions.
The idea for this post originally arose when I noticed I was able to include a hyperlink in a comment I made on a Prawfs' post. One of my students (Nick Carey) had just finished a paper discussing the applicability of the Computer Fraud and Abuse Act (CFAA) to certain types of cyberattacks that would exploit the ability to hyperlink blog comments, so I contacted Dan and offered to see if Prawfs was at risk, as it dovetailed nicely with a larger project I'm working on regarding regulating cybersecurity through criminal law.
The good news: it's actually hard to "hack" Prawfs. As best we can tell the obvious vulnerabilities are patched. It got me thinking, though, that as we start to clear away the low-hanging fruit in cybersecurity through regulatory action, focus is likely to shift to criminal investigations to address more sophisticated attackers.
Sophisticated attackers often use social engineering as a key part of their attacks. Social engineering vulnerabilities generally arise when there is a process in place to facilitate some legitimate activity, and when that process can be corrupted -- by manipulating the actors who use it -- to effect an outcome not predicted (and probably not desired). Most readers of this blog likely encounter such attacks on a regular basis, but have (hopefully!) been trained or learned how to recognize such attacks. One common example is the email, purportedly from a friend, business, or other contact, that invites you to click on a link. Once clicked on, this link in fact does not lead to the "exciting website" your friend advertised, but rather harvests the username and password for your email account and uses those for a variety of evil things.
I describe this example, which hopefully resonates with some readers (if not, be thankful for your great spam filters!), because it resembles the vulnerability we *did* find in Prawfs. This vulnerability, which perhaps is better called a design choice, highlights the tension in legal solutions to cybercrime I discuss here. Allowing commenters to hyperlink is a choice -- one that forms the basis for the "open doors" component of this question: should a user be held criminally liable under federal cybercrime law for using a website "feature" in a way other than that intended (or perhaps desired) by the operators of a website, but in a way that is otherwise not unlawful.
Prawfs uses TypePad, a well-known blogging software platform that handles (most) of the security work. And, in fact, it does quite a good job -- as mentioned above, most of the common vulnerabilities are closed off. The one we found remaining is quite interesting. It stems from the fact that commenters are permitted to use basic HTML (the "core" language in which web pages are written) in writing their comments. The danger in this approach is that it allows an attacker to include malicious "code" in their comments, such as the type of link described above. Since the setup of TypePad allows for commenters to provide their own name, it is also quite easy for an attacker to "pretend" to be someone else and use that person's "authority" to entice readers to click on the dangerous link. The final comment of Part 1 provides an example, here.
A simple solution -- one to which many security professionals rush -- is just to disable the ability to include HTML in comments. (Security professionals often tend to rush to disable entirely features that create risk.) Herein lies the problem: there is a very legitimate reason for allowing HTML in comments; it allows legitimate commenters to include clickable links to resources they cite. As we've seen in many other posts, this can be a very useful thing to do, particularly when citing opinions or other blog posts. Interestingly, as an aside, I've often found this tension curiously to resemble that found in debates about restricting speech on the basis of national security concerns. But that is a separate post.
Cybercrime clearly is a substantial problem. Tradeoffs like the one discussed here present one of the core reasons the problem cannot be solved through technology alone. Turning to law -- particularly regulating certain undesired behaviors through criminalization -- is a logical and perhaps necessary step in addressing cybersecurity problems. As I have begun to study this problem, however, I have reached the conclusion that legal solutions face a structurally similar set of tradeoffs as do technical solutions.
The CFAA is the primary federal law criminalizing certain cybercrime and "hacking" activities. The critical threshold in many CFAA cases is whether a user has "exceeded authorized access" (18 U.S.C. § 1030(a)) on a computer system. But who defines "authorized access?" Historically, this was done by a system administrator, who set rules and policies for how individuals could use computers within an organization. The usernames and passwords we all have at our respective academic institutions, and the resources those credentials allow us to access, are an example of this classic model.
What about a website like Prawfs? Most readers don't use a login and password to read or comment, but do for posting entries. Like most websites, there is a policy addressing (some of) the aspects of acceptable use. That policy, however can change at any time and without notice. (There are good reasons this is the case, the simplest being it is not practical to notify every person who ever visits the website of any change to the policy in advance of such changes taking effect.) What if a policy changes, however, in a way that makes an activity -- one previously allowed -- now impermissible? Under a broad interpretation of the CFAA, the user continuing to engage in the now impermissible activity would be exceeding their authorized access, and thereby possibly running afoul of the CFAA (specifically (a)(2)(C)).
Some courts have rejected this broad interpretation, perhaps most famously in United States v. Lori Drew, colloquially known as the "MySpace Mom" case. Other courts have accepted a broader view, as discussed by Michael Risch here and here. I find the Drew result correct, if frustrating, and the (original) Nosal result scary and incorrect. Last week, the Ninth Circuit en banc reversed itself and adopted a more Drew-like view of the CFAA. I am particularly relieved by the majority's understanding of the CFAA overbreadth problem:
The government’s construction of the statute would expand its scope far beyond computer hacking to criminalize any unauthorized use of information obtained from a computer. This would make criminals of large groups of people who would have little reason to suspect they are committing a federal crime. While ignorance of the law is no excuse, we can properly be skeptical as to whether Congress, in 1984, meant to criminalize conduct beyond that which is inherently wrongful, such as breaking into a computer.
(United States v. Nosal, No. 10-10038 (9th Cir. Apr. 10, 2012) at 3864.)
I think the court recognizes here that an overbroad interpretation of the CFAA is similar to extending a breaking and entering statute to just walking in an open door. The Ninth Circuit appears to adopt similar thinking, noting that Congress' original intent was to address the issue of hackers breaking into computer systems, not innocent actors who either don't (can't?) understand the implications of their actions or don't intend to "hack" a system when they find the system allows them to access a file or use a certain function:
While the CFAA is susceptible to the government’s broad interpretation, we find Nosal’s narrower one more plausible. Congress enacted the CFAA in 1984 primarily to address the growing problem of computer hacking, recognizing that, “[i]n intentionally trespassing into someone else’s computer files, the offender obtains at the very least information as to how to break into that computer system.” S. Rep. No. 99-432, at 9 (1986) (Conf. Rep.).
(Nosal at 3863.)
Obviously the Ninth Circuit is far from the last word on this issue, and the dissent notes differences in how other Circuits have viewed the CFAA. I suspect at some point, unless Congress first acts, the Supreme Court will end up weighing in on the issue. Before that, I hope to produce some useful thoughts on the issue, and eagerly solicit feedback from Prawfs readers. I've constructed a couple of examples below to illustrate this in the context of the Blawg.
Consider, for example, a change in a blog's rules restricting what commenters may link to in their comments. Let's assume that, like Prawfs, currrently there are no specific posted restrictions. Let's say a blog decided it had a serious problem with spam (thankfully we don't here at Prawfs), and wanted to address this by adjusting the acceptable use policy for the blog to prohibit linking to any commercial product or service. We probably wouldn't feel much empathy for the unrelated spam advertisers who filled the comments with useless information about low-cost, prescriptionless, mail-order pharmaceuticals. We definitely wouldn't about the advance-fee fraud advertisers. But what about the practitioner who is an active participant in the blog, contributes to substantive discussions, and occassionally may want to reference or link to their practice in order to raise awareness?
Technically, all three categories of activity would violate (the broad interpretation of) (a)(2)(C). Note that the intent requirement -- or lack thereof -- in (a)(2)(C) is a key element of why these are treated similarly: the only "intent" required for violation is intent to access. (a)(2)(C) does not distinguish among actors' intent beyond this. As I have commented elsewhere (scroll down), one can easily construct scenarios under a "scary" reading of the CFAA where criminal law might be unable to distinguish between innocent actors lacking any reasonable element of what we traditionally consider mens rea, and malicious actors trying to takeover or bring down information systems. At the moment, I tend to think there's a more difficult problem discerning intent in the "gray area" examples I constructed here, particularly the Facebook examples when a username/password is involved. But I wonder what some of the criminal law folks think about whether intent really *is* harder, or if we could solve that problem with better statutory construction of the CFAA.
Finally, I've added one last comment to the original post (Part 1) that highlights both how easy it is to engage in such hacking (i.e., this isn't purely hypothetical) and how difficult it is to address the problem with technical solutions (i.e., those solutions would have meant none of this post -- or of my comments on the Facebook passwords post -- could have contained clickable links). I also hope it adds a little bit of "impact factor." The text of the comment explains how it works, and also provides an example of how it could be socially engineered.
In sum, the lack of clarity in the CFAA, and the resulting "criminalization overbreadth," is what concerns me -- and, thankfully, apparently the Ninth Circuit. In the process of examining whether Prawfs/TypePad had any common vulnerabilities, it occurred to me that in the rush to defend against legitimate cybercriminals, there may develop significant political pressure to over-criminalize other activities which are not proper for regulation through the criminal law. We have already seen this happen with child pornography laws and sexting. I am extremely interested in others' thoughts on this subject, and hope I have depicted the problem in a way digestible to non-technical readers!
Thursday, March 22, 2012
Wired, and ThreatenedI have a short op-ed on how technology provides both power and peril for journalists over at JURIST. Here's the lede:
Journalists have never been more empowered, or more threatened. Information technology offers journalists potent tools to gather, report and disseminate information — from satellite phones to pocket video cameras to social networks. Technological advances have democratized reporting... Technology creates risks along with capabilities however... [and] The arms race of information technology is not one-sided.
Wednesday, February 22, 2012
“Breaking and Entering” Through Open Doors: Website Scripting Attacks and the Computer Fraud and Abuse Act, Part 1
IMPORTANT: clicking through to the main body of this post
Seriously. Please read more below before clicking through to the post!
Thank you Dan, Sarah, and the other Prawfs hosts for giving me the opportunity to guest Blawg! I will be writing about a project I am currently working on with one of my students (Nick Carey), examining common website cybersecurity vulnerabilities in the context of cybercrime law.
The purpose of this post is to examine these (potential) cybersecurity vulnerabilities in PrawfsBlawg. It is the first of what I hope will be a few posts examining how current federal cybercrime law (the Computer Fraud and Abuse Act, or CFAA) applies to certain Internet activities that straddle the line between aggressive business practices and criminal intent.
While certainly possible to analyze these without a public post, making the post public provides more opportunity to showcase these vulnerabilities in a way that brings the debate to life without the "risk" of engaging attackers set on causing damage.
As other scholars have observed, judicial references to the CFAA notably increased over the past decade. Part 2 of this post, which will be forthcoming after we identify which vulnerabilities are (and are not) present in the Blawg, will provide a more substantive treatment of the legal issues involved and a (better) place for discussion.