HOT SEAT
Big Media has become adept at using lawsuits to smother centralized file-swapping services like Napster. But peer-to-peer networks that have no central server are another matter — thereés no one to sue. Representative Howard Berman (D-California) has drafted a bill that would exempt copyright owners from computer-fraud laws if they fight back using measures such as-interdiction, decoy, redirection, file-blocking, and spoofing.é Some might call it vigilantism. Berman calls it-technological self-help.é
WIRED: Empowering businesses to act against P2P networks is an extreme response to piracy.
BERMAN: Ités less draconian than the notion that no piece of hardware can be produced unless it has protective technology mandated by the government. The beauty of my approach is that it empowers copyright owners but also puts limits on their ability to go beyond merely protecting their property. They canét do anything that would damage the people using the networks.
How can you make sure of that?
We would require copyright owners using disruptive technologies to submit them to the Justice Department. And we let P2P participants take a copyright owner to court if their computer is damaged.
What will constitute probable cause for a copyright owner to take action? If a company can take action against a network unilaterally, isnét that a violation of due process?
I donét need the governmentés permission to lock my doors. And you donét need the governmentés permission to encrypt your own communications. All this legislation does is empower private property owners to use that sort of technological self-help. This is not an effort to take the government adjudicatory process and delegate it to private parties.
Thereés a big difference between dead bolts and dirty tricks.
Whatés the dirty trick? I thought the dirty trick was downloading something you donét own, didnét buy, didnét rent. And doing so in a fashion that no one could possibly think is within the reasonable definition of fair use. That, to me, is the dirty trick. Some of these methods, like spoofing and interdiction, arenét dirty tricks at all but sensible, reasonable, and appropriate ways to protect property.
Not everyone uses P2P technology to pirate songs. Wonét messing with these networks deny legitimate as well as illegitimate uses?
While these P2P networks have some usefulness, there really canét be any doubt that their primary use is sharing millions, perhaps billions, of copyrighted works. This bill fundamentally affects their whole business method.
VIEW
How does the digital camera change the nature of photography?
Sorry, Wrong Number
Vigilante Justice for Copyright Holders
Taking It in the Glut