HOME PC Alamode About Us HELP
Reviews Columns Features Archives Other  


 Computer Law

Did he really say that?
August 2002


Bill Wood is an Assistant City Attorney, in the San Antonio City Attorney's Office. He practices real estate and technology law for the city .

Sometimes I read something that I just don’t believe. That happened to me recently when I read an article in the July 1, 2002 issue of eWeek magazine. It reported that a member of Congress, Rep. Howard Berman, had delivered a speech in which he said,  “Peer-to-peer networks are hotbeds of copyright piracy and that legislation is needed to help artists and companies protect themselves.” It went on to report that he intended to introduce legislation that would allow copyright holds to use self-help remedies to protect themselves. Specifically, it mentioned: file blocking, spoofs, decoys and interdiction as possible techniques that would be allowed.

In other words, they would search other people’s computers without a search warrant looking for files that allegedly infringe on copyrights despite the fact that some of those activities may be illegal under current federal law. Further, they would be free to take “self-help” action to stop the sharing of copyright protected files without court action or independent review.

A visit to the Congressman’s Website carried not only a copy of that speech to the Computer and Communications Industry Association (Berman Announces Legislation to Foil Peer to Peer Piracy but a position paper in which he has these observations: 

One approach for dealing with P2P piracy that has not been adequately explored is whether it could be addressed, at least partially, through technological self-help measures. 

Copyright owners could employ a variety of technological tools to prevent the distribution of copyrighted works over a P2P network.  Interdiction, decoy, redirection, file blocking, and spoofing technologies can help prevent unauthorized P2P distribution. 

The day for cleaning up P2P networks through court action may now be past . . . It may be that truly decentralized P2P systems cannot be shut down, either by a court or technologically, unless the client P2P software is removed from each and every file trader's computer.

Congress should free copyright creators and owners to develop and deploy technological tools for addressing P2P piracy.  We could do this by creating a safe harbor from liability for copyright owners that use technological means to prevent the unauthorized distribution of their copyrighted works via P2P networks.

It appears that he did say what eWeek had reported and more. He went so far as to say that some federal laws, such as the Computer Fraud and Abuse Act, currently make the activities he proposed illegal. His solution? The copyright holders would enjoy an exemption to authorize them to seek out and destroy the offending files trading. 

What is P2P or peer to peer? In general terms, a P2P system enables multiple computers to share certain files. The owners of the computers must set up a system to identify which files are available. There is no central repository for the files, and each computer as a peer of every other computer in the system makes some of its files available to other users. As pointed out by the Congressman, P2P systems do allow computer owners to use the Internet to share music files and other protected content without paying royalties. What he doesn’t address are the many valuable uses for P2P networks, and I’m concerned that his approach will generate unintended consequences to those legitimate uses.

He does have at least one valid point. Theft is theft and theft is wrong. I agree that copyright infringement can be theft. However, some uses of copyright protected material without permission from the owner is perfectly legal. Education, research and criticisms are examples of “fair use” exceptions to the general copyright protection.

It is just as true that trespass is trespass. (Yes, I know that trespass is commonly an entry upon another’s real property, but there is no legal reason why entry into one’s computer without permission wouldn’t also be a trespass. The USA Patriot Act was passed by Congress in response to the terrorist attacks on the United States and it actually has a definition of a “Computer Trespasser” that seems to protect any computer used in interstate commerce. What computer hooked to the Internet isn’t used in Interstate Commerce?) There is a process under law for dealing with theft. If you think someone has stolen your property you can either report it to police or sue in court. Even the police don’t have the right to go into someone’s house without permission to search for your property unless they obtain a search warrant.

For the Congressman to make the statement that litigation in the courts is no longer a viable option for copyright owners is too much for me. Even under the recently passed Patriot Act the government must make a showing before a federal judge before it intercepts on-line traffic. Is the Congressman implying that any large copyright holder should have more rights to snoop through your computer than the FBI has hunting for terrorists?

As we all know with technology, mistakes happen. Software has bugs. Hardware fails. Congressman Berman, who incidentally represents the Los Angeles area, did indicate that there should be strong remedies for those who are wrongly damaged, 

... such legislation should ensure that a P2P file-trader who has been subjected to technological self-help measures has effective remedies if he believes a copyright owner has acted improperly.
He points out that the copyright owners should not be allowed to damage someone else’s computer.

But, with no burden upon the copyright owner to show an impartial judge that the intrusion is necessary, the only recourse would be for the innocent party to sue the copyright owner. If litigation is too burdensome for the owners, would it be any less burdensome for a truly innocent party seeking redress for the trespass?
Also, would the owners do the deeds themselves or contract it out to investigation companies with no assets to satisfy a judgment? To be truly effective the full resources of the copyright owners must back the remedy for the innocent party.

The technology already exists to do it a different way. The Washington Post reported that the motion picture association had contracted with a company to search for illegal copies of motion pictures on the Internet.  However the motion picture association program doesn’t include the self-help provisions proposed by Rep. Berman. Their efforts rely upon traditional cease and desist letters and contacts with the ISP’s that maintain the servers. According to the Post, the MPAA sent out more than 50,000 letters last year and expects to send out more this year. So long as they are searching public directories and files and then taking the case through the established channels that provide both sides a fair hearing, I have no problem with it.

But, if Congress approves the Berman initiative, what lawyer would ever advise a client to use P2P systems — even in situations that have nothing to do with copyright material? If another entity has legal sanction to enter, search and take self-help action just because the computers are part of a P2P system then it could never be used for sensitive information. In short, the client would be setting its system up as a target for intrusion by copyright owners searching for an illegal copy of some song.

In a perfect world, everyone would respect everyone else and their property. When things don’t go perfectly, the court system is still a better system for handling allegations of copyright infringement than the proposed self-help system. 


Copyright© 1996-2010
Alamo PC Organization, Inc.
San Antonio, TX USA