Year: 2003
-
Comments on the Proposed Encryption Penalties
A new anti-terrorism bill criminalizes some uses of encryption: Sec. 2801. Unlawful use of encryption (a) Any person who, during the commission of a felony under Federal law, knowingly and willfully encrypts any incriminating communication or information relating to that felony – (1) in the case of a first offense under this section, shall be…
-
CCIA Files Antitrust Complaint against Microsoft
The Computer and Communications Industry Association, a trade group, has filed a lengthy antitrust complaint against Microsoft with European authorities. The complaint centers on allegedly anticompetitive aspects of Windows XP. Here is an AP story; here is CCIA’s summary of the complaint. According to CCIA, they are accusing Microsoft of: Bundling multiple Microsoft products with…
-
Terrorist Website Hoaxer Responds
Brian McWilliams, who perpetrated the terrorist website hoax I wrote about yesterday, has now posted his response, including a quasi-apology. [Link credit: Politech]
-
Static Control Files for DMCA Exemption
I wrote previously about the lawsuit filed by printer maker Lexmark against Static Control, a maker of toner cartridge remanufacturing parts. Lexmark claims that Static Control is violating the DMCA by making toner cartridges that do what is necessary to work in Lexmark printers. The Copyright Office has allowed Static Control to file a late…
-
Terrorist Website Hoax
This one leaves me speechless. According to a fascinating story over at ComputerWorld, tech journalist Brian McWilliams has admitted to running a hoax website that claimed to be the site of a scary real-world terrorist group. He even arranged to have the fake site “defaced” by (fictitious) anti-terrorist hackers, and he created a hoax message…
-
Valenti Interview
If you’re interested in technology regulation, don’t miss Derek Slater’s interview with MPAA chief Jack Valenti, in Harvard Political Review. Slater asks only four questions about copyright and technology, but in answering those four short questions Valenti manages to display amazing ignorance of both copyright law and technology. Don’t believe me? Here is Valenti on…
-
Still More on Programs vs. Data
My previous postings on the program vs. data distinction have drawn quite a few comments. (To see them, click the “followups” links on my previous postings.) I’m going to let the conversation settle a bit before commenting again. But just to stir things up, here is another challenging case. Some programs are never meant to…
-
Spread of the Slammer/Sapphire Worm
A new paper by well-regarded networking researchers analyzes the spread of the recent Slammer/Sapphire worm. The worm spread at astonishing speed, doubling the number of infected hosts every 8.5 seconds, and infecting 90% of the susceptible machines on the Net within ten minutes. Researchers had predicted that such fast-spreading worms could exist, but this is…
-
More on Programs vs. Data
Karl-Friedrich Lenz reacts to my previous posting on how to distinguish programs from data, by insisting on the importance of having a simple definition of “program.” He is right about the value of a simple definition. And he is right to observe that my previous posting doesn’t argue against the existence of such a definition,…
-
Standards, or Collusion?
John T. Mitchell at InteractionLaw writes about the potential antitrust implications of backroom deals between copyright owners and technology makers. If a copyright holder were to agree with the manufacturers of the systems for making lawful copies and of the systems for playing them to eliminate all trade in lawful copies unless each transaction (each…