30 Days of DRM - Day 10: Security Research (Circumvention Rights)
|| Print ||
Monday August 28, 2006
Given the priority currently accorded to security concerns, it is difficult to understand how any government would be willing to undermine security in the name of copyright. That is precisely what has occurred in the United States, however, where computer security researchers have faced a significant chilling effect on their research due to legal threats from the DMCA. The U.S. cases are fairly well known: they include Princeton professor Edward Felten facing a potential suit from the RIAA when he planned to disclose his research findings in identifying the weaknesses of an encryption program and Dmitri Sklyarov, a Russian software programmer, spending a summer in jail after presenting a paper at a conference in Las Vegas that described his company's program that defeated the encryption on the Adobe eReader.
Even more compelling are recent comments from Professor Felten at a conference at the University of Michigan.
Felten told attendees that for every two hours he spends researching in the lab, he spends one hour with lawyers discussing what he can and cannot reveal in his research. Moreover, he advised that he has self-censored every research paper (with the exception of his work that brought the legal threats from the RIAA) and that he was aware of the Sony rootkit threat months before it was publicly disclosed but did not break that story due to legal concerns. In light of these events, Felten acknowledged that many potential security research scientists were choosing alternative career paths in order to avoid the legal hassles now associated with computer security research.
These same concerns were echoed in Canada in a 2005 letter from the Digital Security Coalition to the then-Ministers of Canadian Heritage and Industry. The letter noted that:
Understand that the science and business of digital security implicates the practical application of circumvention technologies. To understand security threats, researchers must understand security weaknesses. We are not in the business of circumventing technological safeguards for the purposes of exploiting the weaknesses we find; rather, we are in the businesses of finding and addressing those weaknesses.
Security weaknesses are best found - and addressed - when a variety of security researchers examine a platform or application. The odds of one party devising the best response to a security issue are slim; the likelihood of an optimal response improves significantly when a community of security researchers has the opportunity to examine and test a platform or application. Anti-circumvention laws throw a shroud of legal risk over that community, and dampen security research at the edges. Simply, anti-circumvention laws that provide for excessive control make for bad security policy.
Any new legislation must ensure that researchers and the companies typified by the Digital Security Coalition (which include Canadian leaders such as Third Brigade, Certicom, and Borderware Technologies) are free to conduct their work and to publish their results without fear of legal threats arising from anti-circumvention provisions. If Canada is to establish a U.S.-style DMCA, it must include an explicit circumvention right that covers security research (both the activity and its dissemination) in academic and commercial settings.
Monday August 28, 2006
We want to enhance competition and investment in this country, and this is why we adopted this policy back in 2008 for the AWS spectrum. Let me say that the price went down by an average of 11% since then, and we will continue this way with the 700 megahertz spectrum. We launched consultation with the industry to make sure that we enhance competition and provide better choice and better rates for our consumers.
Last week I wrote about the National Post seeking $150 licences for posting short excerpts online. It appears that the paper has now dropped the system.Mar.12/13Comments (1)