13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 - Caveat Hacker 185<br />

opposed to copyright law). Thus, if <strong>the</strong> use of CSS prevents you from<br />

fast-forwarding through <strong>the</strong> commercials on a DVD movie — it is still<br />

unlawful to “circumvent” that restriction.<br />

Note here that <strong>the</strong> notion of “effective” here is not connected to<br />

cryptographic efficacy. Even weak encryption is “effective” under <strong>the</strong><br />

DMCA because <strong>the</strong> ordinary person could not defeat it.<br />

Circumvention Technologies<br />

The DMCA protects technical measures in a second way: its “anti-device”<br />

provisions outlaw <strong>the</strong> manufacture and distribution of technologies that<br />

enable circumvention. 36 Continuing <strong>the</strong> “breaking and entering” metaphor,<br />

spokesmen for <strong>the</strong> copyright industry liken circumvention technologies to<br />

“burglars’ tools,” which are illegal in many states.<br />

Section 1201 of <strong>the</strong> DMCA states that “[n]o person shall manufacture,<br />

import, offer to <strong>the</strong> public, provide, or o<strong>the</strong>rwise traffic in any technology,<br />

product, service, device, component, or part <strong>the</strong>reof ” if it has one or more<br />

of <strong>the</strong> following three characteristics: (1) if it is “primarily designed or<br />

produced for <strong>the</strong> purpose of circumventing [technical] protection,” (2) if it<br />

has “only limited commercially significant purpose or use o<strong>the</strong>r than to<br />

circumvent [technical] protection,” or (3) if it is “marketed by that person or<br />

ano<strong>the</strong>r acting on its behalf with that person’s knowledge for use in<br />

circumventing technical protection.”<br />

Note that <strong>the</strong>se provisions apply not only to <strong>the</strong> new right of “access<br />

control,” but to <strong>the</strong> rights of copyright owners generally. Thus, technologies<br />

that would circumvent copy-protection measures for CDs can be<br />

unlawful under <strong>the</strong>se provisions.<br />

Recall <strong>the</strong> two examples just given. In <strong>the</strong> 2600 case, at issue was <strong>the</strong> DeCSS<br />

program, which enables people to decrypt DVD movies protected by CSS.<br />

DeCSS was found to be a prohibited circumvention technology. In <strong>the</strong><br />

censorware example, <strong>the</strong> DMCA exemption permits <strong>the</strong> act of decryption,<br />

but it says nothing about whe<strong>the</strong>r a censorware researcher can make available<br />

<strong>the</strong> computer program used to decrypt <strong>the</strong> encrypted blacklist, or even<br />

<strong>the</strong> details of <strong>the</strong> method of decryption.<br />

Navigating <strong>the</strong> DMCA’s Exemptions<br />

Just as you can’t reverse-engineer object code without decompiling or<br />

dissassembling it, you can’t reverse-engineer a technical protection measure<br />

without circumventing it. Moreover, you often need a technological device<br />

or tool to actually perform reverse engineering, so <strong>the</strong> ban on circumvention<br />

technologies also restricts reverse engineering.<br />

36 The DMCA covers two different kinds of technologies based on<br />

what <strong>the</strong>y protect: technologies that “effectively control access<br />

to [copyrighted] works,” Sec. 1201(a)(2) and technologies that<br />

“effectively protect[] a right of a copyright owner . . . in a work or<br />

a portion <strong>the</strong>reof.” Sec. 1201(b)(1).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!