password-cracking by journalists...
Arnold G. Reinhold
reinhold at world.std.com
Mon Jan 21 10:30:02 EST 2002
At 8:57 PM -0800 1/20/02, Karsten M. Self wrote:
>...
>Note that my reading the language of 1201 doesn't requre that the work
>being accessed be copyrighted (and in the case of Afghanistan, there is
>a real question of copyright status), circumvention itself is
>sufficient, regardless of status of the specific work accessed:
>
> 17 USC 1201(a)(1)(A):
> No person shall circumvent a technological measure that
> effectively controls access to a work protected under
> this title.
>
>...if the measure controls access to _a_ work protected under 17 USC,
>than _any_ circumvention is illegal, whether or not that circumvention
>affects a protected work?
>
>I don't see the statuatory exceptions as covering the case of the WSJ.
>
Circumvention is defined in 17 USC 1201 (a) (3):
"As used in this subsection - (A) to ''circumvent a technological
measure'' means to descramble a scrambled work, to decrypt an
encrypted work, or otherwise to avoid, bypass, remove, deactivate, or
impair a technological measure, without the authority of the
copyright owner; ...
I'd read that as implying that the law is talking about a copyrighted
work; otherwise if someone encrypts text in the public domain, no one
would be allowed to decrypt it. But an aggressive prosecutor might
adopt your interpretation. It's a very poorly written law with great
potential for abuse.
Arnold Reinhold
Who is not a lawyer and is not offering legal advice
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list