The Congressional Corral

The future of digital technology is in the hands of the U.S. Congress

3 min read
The Congressional Corral

Rip. Mix. Burn. Empowering freedom...or simple piracy? For now, technologies for ripping, mixing, and burning are lawful to manufacture and distribute in the United States. But for how much longer? The motion picture industry, among other groups of copyright holders, wants Congress to mandate that standard technical protection be installed in all digital media devices. In March 2002, Senator Ernest ("Fritz") Hollings (D-S.C.), with the endorsement of Senator Dianne Feinstein (D-Calif.) and others, introduced legislation to do just that.

His Consumer Broadband and Digital Television Promotion Act (CBDTPA) would give representatives of technology companies, copyright holders, and consumer groups 12 months to agree on such "standard technical measures." The act would require the Federal Communications Commission (FCC) to conduct a rulemaking that would lead to the requirement that a standard protection measure be embedded in every digital media device. This latter term is broadly enough defined to include general-purpose computers. Making or distributing digital media devices without the standard measure, or removing or altering the measure, would be illegal and, if done for profit, would be a felony.

special report copy protection graphic

CBDTPA is unlikely to be enacted any time soon, now that the recording industry has allied itself with the Business Software Alliance and the Computer Systems Policy Project (both in Washington, D.C.) against government mandates of such measures. However, the motion picture industry may well persuade the FCC to adopt the so-called broadcast flag technology as a mandatory standard for digital TV tuners and related technologies; the FCC is considering it now. This would require tuners to recognize a digital flag embedded in broadcast signals indicating that the signals cannot be redistributed to any device lacking specified standard security measures. Makers of all sorts of products for home entertainment systems would be affected.

Philips Electronics North America Corp. (New York City) is not pleased with the proposed broadcast flag. In its reply to the FCC, it asserts that if the proposal were adopted, it "would require the FCC to impose an invasive regulatory regime affecting virtually all consumer electronics devices and computer equipment within the home network."

But such rules are not entirely new. Two government mandates of technical measures to protect copyrighted works already exist in U.S. law. One is the 1992 Audio Home Recording Act, which requires consumer digital audio recording devices to contain serial copy management system (SCMS) chips, which allow unlimited first-generation digital copies, but degrade second- and third-generation digital copies. The second is in the 1998 Digital Millennium Copyright Act (DMCA), which requires makers of videotape recorders to install Macrovision's copy control technology to prevent unauthorized copying.

Universal adoption of standard technical protection measures could also come through standards-setting by industry groups. This would have virtually the same effect in the marketplace as a legislative mandate, but happen without input from consumers. For instance, the motion picture and consumer electronics industries reached agreement in 1995 on the content scramble system (CSS) as a standard technical protection measure for DVD discs and players. According to this agreement, CSS must be installed in all DVD players as a condition of the license granted for key patents on DVD components. Standards-setting processes concerning digital rights management (DRM) technologies, which identify content and restrict its usage as designated by the copyright holder, aim for similar results.

It's already against the law in the United States and some other nations to break copy protection like CSS, because the DMCA prohibits circumvention of technical measures used by copyright owners to control access to their works. (The European Union's directive on copyright and the information society forbids all acts of circumvention, and unlike the DMCA, it makes no exceptions, not even one for encryption research.) Related rules forbid manufacture and distribution of technologies primarily produced to circumvent any access controls. Seemingly, Congress intended to allow reverse engineering of use or copy controls to enable fair and other noninfringing uses. But this intent has been undermined by widespread adoption of persistent access controls, such as CSS, so that any reverse engineering—even of one's own DVD to make a fair-use clip of a movie—arguably violates the DMCA rules. (Although the European Union directive contains no fair-use hacking exceptions, the laws of Australia and some other nations seem to permit it.)

Representative Zoe Lofgren (D-Calif.) introduced in the House a bill to amend the DMCA to allow such fair-use circumvention: the BALANCE (Benefit Authors without Limiting Advancement or Net Consumer Expectations) Act of 2003. Representative Rick Boucher (D-Va.) earlier introduced the Digital Media Consumers' Rights Act of 2002, which would permit circumvention for noninfringing purposes and also amend provisions against developing tools to allow scientific research that tight interpretations of the DMCA now make risky.

The outcome of these legislative battles is, at this point, not easy to predict. What can be foreseen is that it will affect not only what consumers do with technology, but also the very progress of technology itself.

The Conversation (0)

System Sniffs Out Trojans in Electromagnetic Emissions

Startup Aether Argus' system spotted trojans in an AI accelerator card and more

3 min read
Aether Argus

Is that a warplane or a commercial airliner? Mistaking one for the other has had truly tragic consequences. So if you've got an automated system doing it, you better know for sure that it hasn't been compromised with a malicious hardware trojan somewhere along the supply chain.

It's such scenarios that the Defense Advanced Research Agency (DARPA) is hoping to defeat with a project called SHEATH (for Safeguards against Hidden Effects and Anomalous Trojans in Hardware), which recently wrapped up its 18-month run. The result? A system called TEMPEST that can tell if part of a computer has been compromised just from its electromagnetic emissions. Engineers from Aether Argus, in Atlanta, revealed the system and its results this week at DARPA's annual Electronics Resurgence Initiative Summit.

Keep Reading ↓ Show less

Inspire Kids to Study STEM with These Educational Resources

A new portal includes best practices, programs, and events

2 min read

Careers in science, technology, engineering, and mathematics are on the rise around the world. According to the U.S. Bureau of Labor Statistics, STEM careers were expected to grow by nearly 9 percent between 2017 and 2029. The Economic Times reported that India experienced a 44 percent increase in STEM jobs from 2016 to 2019. The Danish Technological Institute estimated that the European STEM labor market would grow by 12.1 percent from 2013 to 2025.

It is crucial to teach preuniversity students about the potential of STEM careers through outreach programs. To help increase the number of qualified professionals, IEEE has created the IEEE Pre-University Volunteer STEM Portal.

Keep Reading ↓ Show less

How to Write Exceptionally Clear Requirements: 21 Tips

Avoid bad requirements with these 21 tips

1 min read

Systems Engineers face a major dilemma: More than 50% of project defects are caused by poorly written requirements. It's important to identify problematic language early on, before it develops into late-stage rework, cost-overruns, and recalls. Learn how to identify risks, errors and ambiguities in requirements before they cripple your project.