Copyrightcontraband
-
Upload
eddan-katz -
Category
Documents
-
view
1.077 -
download
0
description
Transcript of Copyrightcontraband
![Page 1: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/1.jpg)
Copyright Contraband
E d d a n K a t zE x e c u t i v e D i r e c t o r
I n f o r m a t i o n S o c i e t y P r o j e c t
4 S 2 0 0 7V a n c o u v e r , C a n a d aN o v e m b e r 2 , 2 0 0 6
1Wednesday, December 29, 2010
![Page 2: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/2.jpg)
Digital Piracy
Criminalization of Copyright
NET Act
DMCA
Banning of Technology
P2P Networks
Circumvention Devices
2Wednesday, December 29, 2010
![Page 3: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/3.jpg)
The House Report further commented on the novelty of such a ban, concluding that Congress has "historically advanced th[e] constitutional objective" of the Copyright Clause of the Constitution by "regulating the use of information—not the devices or means by which the information is delivered or used by information consumers—and by ensuring an appropriate balance between the interests of copyright owners and information users."
The Senate Report was also cognizant of the moral agency problem and the means-ends relationship when it noted that the circumvention device bans “drafted carefully to target 'black boxes,' and to ensure that legitimate multipurpose devices can continue to be made and sold."
3Wednesday, December 29, 2010
![Page 4: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/4.jpg)
Morality in Digital Network Environments
Entertainment Industry Framing
File-Sharing is Stealing
Hacker Tools as Virus
Technology & Responsibility
Unraveling the Property Paradigm
Misattribution of Moral Agency in Technology
Towards an Ethics of Access to Knowledge
4Wednesday, December 29, 2010
![Page 5: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/5.jpg)
"In a common source epidemic, as where members of a population contract a non-contagious disease from a poisoned well, the disease spreads only by exposure to the common source. If one eliminates the common source, or closes the contaminated well, the epidemic is stopped."
The point of the analogy was to make it apparent that stopping "the source" of the disease, in this case DeCSS dissemination, will not prevent further spread; the "disease" can travel from person to person and is not easily stopped. Judge Kaplan continued in a detailed explanation of how DeCSS and a communicable disease are similar, likening infringement to a disease outbreak and presumably the 2600 web site as the poisoned well. Kaplan's sarcasm is revealed when he notes that the "disease metaphor breaks down principally at the final point. Individuals infected with the real disease become sick, usually are driven by obvious self-interest to seek medical attention, and are cured of the disease if medical science is capable of doing so. Individuals infected with the 'disease' of capability of circumventing measures controlling access to copyrighted works in digital form, however, do not suffer from having that ability … their self-interest will motivate some to misuse the capability, a misuse that, in practical terms, often will be untraceable."
5Wednesday, December 29, 2010
![Page 6: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/6.jpg)
Isolating Criminal Copyright
Criminal Law appeals to Moral Justification
Distinguish from deterrence & harm-based
Actus Reus & Mens Rea
Causation - temporal & spatial distances
Intentionality - multiple uses of technology
Copyright Contraband
Penalizing Design & Functionality
6Wednesday, December 29, 2010
![Page 7: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/7.jpg)
technology & responsibility
Ethical Notion Closely Related to Liability
Provides bright line at copyright contraband
Points of Inquiry: Designer, Distributor, User
Technology as Mediator for Human Action
Three Conceptual Frameworks
Instrumentalist Approach
Capabilities Approach
Ideology Approach
7Wednesday, December 29, 2010
![Page 8: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/8.jpg)
Instrumentalist Approach
Means-Ends Relationship
Widest Application across Technologies
Clarity of Technology as Value-Neutral
Descriptive Shortcomings in Cyberspace
Causal Distance in Self-Regulating Machines
Interconnectedness of Networks
Fails to account for Designer or Engineer
8Wednesday, December 29, 2010
![Page 9: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/9.jpg)
The causal chain of information-processing technology is further distributed into three stages between the design and the action. In the program design stage, the software engineer encodes a design into a language that can be translated by the computer. The second stage consists of the computer turning the programmed design into a set of working instructions in machine-readable form. The final stage is the performance of its functions according to the instructions.
9Wednesday, December 29, 2010
![Page 10: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/10.jpg)
Capabilities Approach
General Purpose Technologies
Move from particular ends to potential purpose
define by risk of harm & secondary effects
Actual uses Secondary to potential uses
overburdens ordinary uses
tendency to inflate harms
Between Designer & Functionality
requires anticipation of improper & misuse
Blurs functionality of device & intention of designer
10Wednesday, December 29, 2010
![Page 11: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/11.jpg)
Though it is a thin line between looking to the functionality to discern the designer’s intent and assigning intent to functionality, the moral implications of the two are significantly different.
11Wednesday, December 29, 2010
![Page 12: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/12.jpg)
Ideology ApproachVast Infrastructures Organizing Life
Beyond Means-Ends Relationship
Technological Embodiment of Values
Diffusion of Causation
Networks and Platforms of Information
Technology as Self-Sustaining System
Clash of Ideologies
Evaluation of Overall Impact of Technologies
Open vs. Proprietary Architectures
12Wednesday, December 29, 2010
![Page 13: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/13.jpg)
P2P: the Prosthetics of Piracy?
Relationship of Users to Technology Design
Distributed File-Sharing Networks
Levels of Participation as Proxy for Action
NET Act: The Network’s Intent
Making Available without Profit Motive
Criminal Liability for Ordinary Users
Intentionality Imputed to the Network Itself
13Wednesday, December 29, 2010
![Page 14: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/14.jpg)
P2P II
Ideology of Peer Production
Alternative Distribution System
Distinct from Piracy Harm
14Wednesday, December 29, 2010
![Page 15: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/15.jpg)
DRM: Ideology of Permission
Technology Regulating Behavior
TPMs as Para-Copyright
Preempts Unauthorized Uses
DMCA: Second-Hand Infringement
Replaces Betamax Capabilities Approach
Ban on Circumvention Devices
Functionality of Circumvention Separate from Activity
15Wednesday, December 29, 2010
![Page 16: Copyrightcontraband](https://reader033.fdocuments.net/reader033/viewer/2022051817/548cff6ab479597a588b4622/html5/thumbnails/16.jpg)
DRM II
Proprietary vs. Open Architectures
Trafficking as Communicable Disease
The Politics of Decrypting Closed Systems
16Wednesday, December 29, 2010