The HD-DVD key fiasco

James S. Tyre jstyre at jstyre.com
Wed May 2 15:45:49 EDT 2007


At 02:15 PM 5/2/2007 -0400, Perry E. Metzger wrote:

>I would be interested in further legal
>discussion of the DMCA's ability to control the publication of mere
>cryptographic keys, and in further technical discussion of AACS
>and similar DRM technologies.

(Links at the site, posted by EFF Senior IP Attorney Fred von Lohmann)
http://www.eff.org/deeplinks/archives/005229.php
09 f9: A Legal Primer
May 02, 2007

As was reported back in February, an enterprising hacker unearthed 
and posted one of the decryption keys used by AACS to decode HD-DVD 
movies (other keys and exploits have been made available in the weeks 
since). Now the AACS-LA (the entity that licenses AACS to makers of 
HD-DVD players) has set its lawyers on the futile mission of trying 
to get every instance of at least one key (hint: it begins with 09 
f9) removed from the Internet.

Predictably, this legal effort has backfired, resulting in eternal 
Internet fame for the key in question. In addition to having been 
posted on hundreds of thousands of web sites (and resulting in the 
temporary shutdown of Digg.com), the key has already spawned a song, 
a quiz, a domain name, and numerous T-shirts.

So now might be a good time to review a few of the basic legal issues 
raised by the posting of the keys. (This is an overview of the legal 
landscape, not legal advice, and I am not expressing any view about 
how a case might come out if AACS-LA sued anyone.)

What is the AACS-LA's argument? In its takedown letters, the AACS-LA 
claims that hosting the key violates the DMCA's ban on trafficking in 
circumvention devices. The DMCA provides that:

     No person shall ... offer to the public, provide, or otherwise 
traffic in any technology, product, service, device, component, or 
part thereof that that -

     (A) is primarily designed or produced for the purpose of 
circumventing a technological measure that effectively controls 
access to a work protected under this title;

     (B) has only limited commercially significant purpose or use 
other than to circumvent a technological measure that effectively 
controls access to a work protected under this title; or

     (C) is marketed by that person or another acting in concert with 
that person with that person's knowledge for use in circumventing a 
technological measure that effectively controls access to a work 
protected under this title.

The AACS-LA presumably would argue that the key is a "component" or 
"part" of a "technology" that circumvents AACS. Moreover, AACS-LA 
would likely argue that the key was "primarily ... produced" to 
circumvent AACS, that is has no other commercially significant 
purpose, and that it is being "marketed" for use in a circumvention 
technology. The takedown letters seem to take the position that both 
the poster and the hosting provider are engaged in "trafficking."

The AACS-LA will also doubtless point to the DMCA cases brought 
against 2600 magazine for posting the DeCSS code back in 2000 (EFF 
was counsel to the defendant). In that case, both the district court 
and court of appeals concluded that posting DeCSS to a website 
violated the DMCA.

Who can sue over the posting of the key? The DMCA entitles "anyone 
injured by a violation" to bring a civil lawsuit seeking damages 
(including statutory damages ranging between $200 and $2500 for each 
"offer"). In addition, if a person violates the DMCA "willfully and 
for purposes of commercial gain," a federal prosecutor could bring 
criminal charges (with the famous exception of the Sklyarov case, 
however, criminal prosecutions have generally been limited to 
situations where the DMCA violation was also accompanied by evidence 
of commercial piracy).

What about just linking to a place where the key is posted? The 
courts in the DeCSS case wrestled with the proper test to apply when 
someone links to a location where a circumvention tool can be found. 
Ultimately, the district court held that an injunction against 
linking could be issued after a final judgment if a the plaintiff 
could show, by clear and convincing evidence,

     "that those responsible for the link (a) know at the relevant 
time that the offending material is on the linked-to site, (b) know 
that it is circumvention technology that may not lawfully be offered, 
and (c) create or maintain the link for the purpose of disseminating 
that technology."


The court of appeals upheld that ruling, while admitting that the 
issue presented a difficult First Amendment question.

What about the DMCA safe harbors? While no court has ruled on the 
issue, AACS-LA will almost certainly argue that the DMCA safe harbors 
do not protect online service providers who host or link to the key 
(the AACS-LA takedown letters do not invoke the DMCA 
"notice-and-takedown" provisions, nor do they include the required 
elements for such a takedown, thereby signaling the AACS-LA position 
on this). The DMCA safe harbors apply to liabilities arising from 
"infringement of copyright." Several courts have suggested that 
trafficking in circumvention tools is not "copyright infringement," 
but a separate violation of a "para-copyright" provision.

It's difficult to say how a court would rule on this question, but it 
does create a specter of monetary liability for hosting providers, 
even if they otherwise comply with the "notice-and-takedown" 
procedures required by the DMCA safe harbors.

Is the key copyrightable? It doesn't matter. The AACS-LA takedown 
letter is not claiming that the key is copyrightable, but rather that 
it is (or is a component of) a circumvention technology. The DMCA 
does not require that a circumvention technology be, itself, 
copyrightable to enjoy protection.

For more information about the continuing melt-down of AACS 
generally, as well as details regarding the various keys and how they 
interact, be sure to read the coverage on Doom9's forums, Freedom to 
Tinker, and Engadget, which have been doing the best job reporting on 
developments.

Posted by Fred von Lohmann at 09:36 AM | Permalink | Technorati



--------------------------------------------------------------------
James S. Tyre                                      jstyre at jstyre.com
Law Offices of James S. Tyre          310-839-4114/310-839-4602(fax)
10736 Jefferson Blvd., #512               Culver City, CA 90230-4969
Co-founder, The Censorware Project             http://censorware.net
Policy Fellow, Electronic Frontier Foundation     http://www.eff.org

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list