Computer underground Digest Sun Oct 26, 1997 Volume 9 : Issue 77 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.77 (Sun, Oct 26, 1997) File 1--Telerights II - Current Digital Copyright Controversy File 2--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 26 Oct 1997 13:46:48 -0600 (CST) From: Wade Riddick <riddick@MAIL.LA.UTEXAS.EDU> Subject: File 1--Telerights II - Current Digital Copyright Controversy Open Letter to Chairman Tauzin Concerning the Current Digital Copyright Controversy (c) 1997 By Wade Riddick All rights reserved Circulate freely without alteration The following is an edited version of an open letter sent to House Telecommunications Subcommittee Chairman Billy Tauzin (R-Houma, LA) calling for legislative action (and in some instances, inaction). It is an overview of market forces involved in the current digital copyright debate and an analysis of the broad evolutionary changes occurring in technology. Because of its general nature, more advanced readers will no doubt find some technical inconsistencies and omissions. I make it available to encourage you to support Chairman Tauzin and others in Congress in their effort to forge a compromise between the conflicting interests involved. This is not easy work and our representatives deserve our assistance and sympathy in this matter. Wade Riddick Department of Government University of Texas-Austin RIDDICK@JEEVES.LA.UTEXAS.EDU ---------------------------------------------------------- -- The Honorable Billy Tauzin 2183 Rayburn House Office Building Washington, DC 20515 (o)202-225-4031 Dear Chairman Tauzin, 10/23/97 My name is Wade Riddick. I am in graduate school studying political science at the University of Texas, with a particular focus on technology and economic regulation. As a fellow Louisiana citizen, I have for some time followed your work on HDTV, data privacy and encryptionA0issues with keen interest, most recently with respect to H.R. 2368. You are one of the few members of Congress witha deep understanding of the concerns involved and the balance that must be struck between public and private interests to make the digital economy work. I am writing to bring to your attention the important way in which these issues intersect with respect to digital copyrights and the opportunity this provides you. As you know, the Internet Service Provider (ISP) liability problem has recently flared up again on Capitol Hill, which is disappointing. There is a fairly simple method for creating strong digital property rights which will benefit both authors and consumers-namely through the use of public key encryption-and yet, for several years now, the industry has been at loggerheads over whether and how to do this. I believe Congress can provide the leadership to unite these diverse and often opposing viewpoints. A little over a year ago, I proposed just such a solution that would favor most parties in this debate (_BYTE Magazine_, Feb. '96). My work is by no means unique and in the following year several companies including powerhouses like Xerox and IBM have moved forward in marketing various components of this digital copyright enforcement model. However, these commercial solutions have tended to be closed, proprietary in design and niche oriented. Their development has also tended to exclude players outside the computer industry, where lies much of the impetus for making harmful revisions to the copyright law. Because no uniform standards exist, companies have been reluctant to invest in these systems and use them to sell their most valuable forms of property. It is no surprise given the relative youth of the computer industry that it lacks the political experience necessary to forge a broad consensus and lay the foundations for the public infrastructureA0necessary to address these digital concerns. Bold (and incorrect) statements like 'information wants to be free' frequently leave copyright holders ill at ease and casting about for ways to strengthen their rights. Congress, however, is in a position to bring these opposing sides together, reduce the anxiety surrounding such solutions and create a level playing field of benefit to the greater economy. If I may, I would like to briefly outline how such a copyright system would function, how it would benefit the currently squabbling interest groups, what kind of opposition it might encounter and why Congress should get involved in brokering a settlement. My personal position on digital IP reform is quite simple; I do not have one. I believe it is first necessary to enforce current property rights before we can address their inadequacies. The existing copyright code provides adequate *legal* protection for authors and gives them the ability to seek restitution for their work. What is lacking electronically is a *practical* means of enforcing these rights which makes it easy for consumers to comply with the law. My research goal has been to discover and then advocate such methods in the hopes that we can return to more of an open market in intellectual property. I believe that if someone buys a book in hardback, they ought tobe able to buy, 'own' and resell its digital 'copy' in exactly the same fashion they can with the physical document. Decisions like 'renting' software are most efficiently left to free enterprise and not mandated in the law. Once intellectual property is open to rental, lease, outright purchase and even bundling like financial options-just as any other form of property-then its market will expand as fruitfully as other capital markets have in the last decade. The more flexible the law is in rewarding entrepreneurs, the more complex, developed and profitable the marketplace will become. I do not believe this will come about by adding further restrictions and regulations2E How will it happen? The technical alterations which must be made to digital 'publishing' are quite simple, though they require a great deal of forethought and coordinat ion among many companies to implement. The changes rely on one basic foundation of digital communication-that while information can be easily *copied*, it cannot always be easily *used*. The best example of this is encryption. Without the proper key, any encrypted document is worthless. If that key can be protected and monitored by networking utilities, then the entire document can be tracked as well without regard to how its encrypted form is duplicated. This thinking is the basis of many different efforts in digital copyright protection. Under a system which I call telerights and others call 'cryptolopes' (or, more generally, 'digital libraries') *each* copy of a document which is published for sale is encrypted with a key unique to that document, thus personalizing the copy for each purchaser. In the accompanying diagram, I have outlined four different steps to illustrate how such a system works. In the first stage, the publisher creates several different copies of the same document using distinct private encryption keys. The public key is later passed out to read the document. Because of the nature of public key encryption, only the owner of the private key (the publishing house) can ever fix content into a publishable form that matches the public key. This makes it impossible for an outsider to switch content and steal property during the transaction process. A special bank or escrow agent is used to complete the actual sale, thereby shielding the user's identity from the publisher in much the same way cash does in a bookstore. The publisher collects payment and passes along the encrypted document, together with a small signature which combines information about the publisher, the document and the privileges granted to a user. By using a signature to communicate about the document, it is not necessary to reveal the nature of the content in any transaction. The escrow agent forwards the user's identity to a bookstore, which al so collects a copy of the signature and the actual public key from the publisher. When the user is ready to 'view' the document-and this could include anything from running PC software to listening to music-he sends the signature to the bookstore which returns the public key. Because these bits of data are very small, this process requires very little time to complete. Even on a fairly slow modem, up to a dozen keys per second can be transmitted compared to the minutes or hours it would take to re-download, say, a large movie. (Pay Per View films and digital TV broadcasts could avoid this speed problem by transmitting each frame in a series of single smaller documents). When the user requests the key, the bookstore notifies the publisher that his particular key is in use, allowing them to search other bookstores for evidence that the key has been pirated (e.g., someone else is using it simultaneously). If it has been, then the publisher can either block access and contact the owner or go to the extreme of invalidate the key and starting an investigation, depending on whatever prior arrangement was reached at the time of sale. Notice how this puts the burden of preventing intellectual property theft on the actual purchaser of the material and not the publisher, which is as it should be with any form of property that is sold. It becomes the user's du ty to keep copies of his document out of circulation, incurring a significant risk of having his key invalidated if he carelessly 'loans out' his material or fails to take other precautions. It is *his* property that is stolen in any act of piracy. The crucial part of this process-and where the need for corporate coordination is most evident-comes in the safeguards which must be built into the user's computer itself. When the machine receives the key in the final part of the third stage, it is placed in a tamper resistant area of RAM where it is used to decrypt the document. This is essentially a portion of the computer that is tied into the network and off limits to the user. These types of secure memory are already widely used in many inexpensive smart cards and, even when combined with the other alterations, should only add a few dollars to the physical cost of a PC. When the user finishes viewing the document in the final stage, the key and decrypted content are erased and a message is sent back to the bookstore (and on to the publisher) informing them the material is secured again. The user, of course, retains the encrypted document to store and do with as he pleases. He may make unlimited multiple backups of his information without raising the author's fears of illicit use. He can also move copies around between his home and office or take them on vacations and business trips. While this method of protection may seem quite simple, it changes a variety of important behaviors in the marketplace, giving digital materials the properties we have come to appreciate in most physical goods. For example, users could band together to purchase one copy of a book and shareit among themselves at prearranged times, much like a household can now 'share' software. Several public libraries could pool their meager funds and purchase a single copy of an expensive document that would be available to patrons from several geographic areas to check out. Users could also carry materials cr oss country and access them from several different computers, provided they take the proper precautions. What is truly interesting is the way such an arrangement would expand the publishing world. The low cost of digital distribution would be turned from a drawback into an advantage. Individuals could very inexpensively sell thei r own content or repackage and distribute the content of others, adding valuein any of a dozen ways. By collecting a fee for what was once considered piracy, such distributors would be encouraged through market incentives to enforce the property rights of other publishers. A new rental market would also be opened. Users would be able to loan out their copies or even rent them by acting, in effect, as their own publisher. They could encrypt an item they have purchased with their own set of keys and just follow the four steps again, this time from the seller's point of view. Getting to the real content would require the borrower to go through both keys. The borrower would have to go through both keys to get to the real content. 'Returning' such borrowed material would be quite easy. The bookstore would be instructed to simply stop honoring the new signature after a given period of time. Thus keeping track of materials on loan in a public library would become automatic, not to say inexpensive. Material could be republished this way several times. Indeed, multiple copyright holders could easily mix their work together and get reimbursed according to a prearranged formula, thus simplifying, for example, the negotiations a movie producer might have to go through to acquire the rights of a hit song for the soundtrack. This infrastructure could also be used as a broadcast conduit for ostensibly free information. As I pointed out earlier, only those individuals with the private key can publish material that matches the public key. A television network, in order to protect its advertisers from having their messages stripped out, could encode their signals with a single key whose brother would then be provided freely to the public. Rebroadcasters would not be able to piggyback their own commercials over legitimate ones and users who 'tape' the programs would not be able to avoid the commercials without purchasing separate, clean copies. And by tracking requests for the public key, networks could also assemble valuable demographic numbers. By breaking up the information needed to pay for and use copyrighted materials and limiting the players to their own spheres of self-interest, this process reinforces not only royalty collections but also privacy rights. Bookstores, for instance, would be in the business of monitoring keys, the one duty they are contracted with both parties to perform. A bookstore would have no interest in the type of content it was monitoring the same way the phone company has no interest in what two parties are saying, only in making the connection. Likewise a publisher would not care who in particular buys their product, only that they can collect their money and stem losses from piracy. They might like to know demographic information about their consumers, but this could be collected quite easily though a third party auditor who could scan bookstore records on behalf of the entire publishing industry, stripping away individual user identities before matching the pertinent statistics up with the nature of the content. In this way, user privacy can be protected while still allowing businesses to acquire the much needed marketing information which benefits everyone. Of course, as with any financial transaction, allowances would have tobe made for other types of auditing to prevent piracy and money laundering andto insure proper bookkeeping standards-but these last two issues will have to be faced in the broader context of digital commerce anyway and proper benchmar ks for such regulation already exist in the financial world. The first issue, piracy, actually becomes much easier to deal with under this system. In order to make money, a pirate will either have to enter the market as a legitimate publisher (in essence 'publishing' stolen material) or he will have to settle for selling the decrypted content and disguising his profits. Given the ease of legal republishing and assuming that digital distribution will vastly lower prices, pirates should usually opt to go legitimate as redistributors of goods. On the user side, most consumers should shy away from purchasing decrypted goods, particularly if the costs of the commercial items can be lowered sufficiently. In any event, one thing would stand in the way of exchanging pirated goods, decrypted or not: watermarks. It is becoming quite easy to insert permanent, indelible watermarks into audio and video information to identify the true author and purchaser. The user's computer could be instructed to scan for one of these marks in a random audit of a decrypted document and then forwarding it on to the bookstore or a third party association specifically set up to check for stolen goods. This would provide a check on unscrupulous publishers who dupe well-meaning consumers, vastly increasing the risk associated with trafficking in pirated goods. What I have just outlined is only one possible way to structure digital copyright transactions. A user's identity and privacy, for instance, could easily be shielded much earlier in the process. The network provider might simply send the bank a guaranteed pseudonym and retain all the user's personal information to themselves. One could also add more privacy through multiple banks and escrow agents in the transaction. As well, the bookstore does no t necessarily need to hold the actual decryption key. It could merely act asa conduit through which the key passes in a private channel to the user. Should the publisher go bankrupt or cease operations, the user could rely on a thi rd party warehouse agreed to with the publisher for archiving keys. I will turn now to the political questions involved in developing sucha system. This model makes two key technical assumptions, neither of which is far-fetched but both of which lie at the heart of Hollywood's fears. The first assumption is that the personal computer will become the ubiquitous device through which we consume information. The second is that every one of these computers will have a continuous network connection out of the home. In terms of technical advances, neither of these are terribly difficult obstac les to overcome. The know-how exists; it only needs deployment in high volume consumer goods. The question is who will pay for it and who will try to throw up regulatory hurdles. On the hardware side, it is becoming increasingly clear that advanced computing power will in a few years penetrate homes to the same degree that telephones and TVs have, perhaps even replacing both devices. It makes little difference whether the end product will be a smart TV or a PC adapted to accept multimedia broadcasts. Right now, the abilities of these devices to quickly and cheaply reproduce digital information in volume has copyright holders justifiably worried. So far, their response has been quite typical2E They have either tried to retard these advances through litigation turned to dedicated hardware like DVD players which limit the flow of information. This is not a viable long term strategy. Computing history is littered with the remains of dedicated platforms and proprietary designs. DVDs are simply one more data storage format in a long line. It is inevitable that consumers will acquire some kind of mass storage technology and eventually some arrangement of two-way accounting between publishers and consumers must be agreed to. Whether publishers like it or not, PCs will become widespread, will overwhelm any dedicated player and any long term solution must take th is into account. The mistake made in past DVD negotiations is not that encryption was used, but that it was not taken far enough. DVD keys are tied into the players themselves, which in turn are geared toward distinct geographic regions. The goal, basically, is to prevent Chinese pirates from cracking the code in their region and then distributing movies released in China back in to the U.S. If these keys were geared to the individual purchaser instead of an arbitrary region, then Chinese utilities could be given a small financial incentive to monitor and enforce the copyrights as key managers. But Hollywood interests did not turn to encryption with this goal in mind. They did so to protect their current distribution system using the same logic that saved them from the analog electronics revolution of the VCR. When you copy a movie onto videotape, its quality degrades quickly-as does that of CDs transferred to audiotape. Digital technology eliminates this problem, but Hollywood has sought to use these same methods to reign in pirates. In the case of Digital Audio Tape, individual recorders are specifically designed to degrade the signal when copies are made. However, the worlds of software and movies are in for a rude collision2E Computer data cannot tolerate any such degradation. Mass storage devices like CDs, hard drives and tape backups must do their jobs of reproduction perfectly. So far the entertainment industry has been protected by the high costs of devices like CD-ROM burners, but as prices for them drop rapidly and they become standard components in computers the consumer electronics and PC industries will inevitably collide. The second assumption this new copyright system makes is that homes will have a continuous network connection. Technically, this is not an onerous requirement for the kind of model I have outlined. Most homes already havea continuous cable feed, often times bi-directional. Several companies are also working on using power lines to transmit information continually into and out of electrical sockets. By the time such a copyright management system could be developed and marketed, these technologies will probably be widely available to consumers. Even if they are not, the system I have proposed can work with the intermittent contact of a regular phone line. Indeed the phone, coupled with the video store, becomes more efficient at delivering movies than cable. The data required to transmit a key is minuscule compared to that o f constantly rebroadcasting a movie on Pay-Per-View each time a viewer wants to watch it. Politically, however, the issue of network connections is a more subtle problem that tends to be finessed differently by different players. Here the focus of the fight is not on preventing piracy from happening, as it is with DVD players, but in shifting around the legal liability once it does happen2E The main target for the entertainment industry are the Internet Service Providers (ISPs) who supply networking services to personal computer owners2E Since ISPs lack the tools to track piracy on every PC plugged into their network, they have little choice but to try to claim that they are not in the content business and seek protection under the common carrier statutes. This is indeed an ironic trend. Most companies in the aftermath of the 1996 Telecommunications Act have been more than happy to jump feet first into the content business. Just the opposite is true for ISPs. Copyright liability legislation being considered would vastly increase their costs with little or no reward on their part for enforcing any of these laws. The phone companies, who are ambivalent about the internet and have not yet fully committed to being ISPs, are happy to stand by and watch their ISP competitors get taken to the cleaners on this issue. Not only does it clear the ISP field for the bells to enter (by vastly increasing the administrative costs of regulatory compliance-something they are very good at), it also knocks out all the companies who are competing with their phone business by using the internet. Both ISPs and the Bells must be convinced that they can profit from the liability 'problem' by collecting key management fees. When ISPs object th at they are not in the business of monitoring content, pay them to make it in their interest. Turn that liability into an advantage by making them a rewarded part of the 'publishing' process. Allow them to collect a toll for keeping track of this valuable information. Convince publishers, in turn, that such fees are be minimal compared to the money they would save through digital distribution. In this part of the fight, phone companies are potentially your savviest ally if they can be convinced in the merits of altering the copyright landscape. They already have an extensive accounting infrastructure that could easily track these multiple individual transactions (unlike cable companies and most ISPs). The Bells are also far more experienced with these kinds of large industry negotiations and lobbying efforts, particularly on the international front where much work would have to be done. The one major objection the bells might have lies in moving closer to a packet switched network. However, confounding any such rapprochement among the industries is the decision of the 1996 Telecommunications Act to further blur the barriers between content carriers and producers. There is ample incentive now for companies who act as both a creator and distributor of content to use both to their advantage. Microsoft, for instance, can propose proprietary software solutions that only benefit *its* MSN network and *its* content partners and/or charge others an exorbitant fee for the same service. Its recent acquisition of Web TV and its investments in the cable industry only multiply the possibilities. Under a telerights-like system, users would no long be locked in to particular channels of distribution when they buy a product. A user on the Microsoft Network, for instance, could purchase advice formerly supplied only through AOL. Producers would cut deals with bookstores based on the price of monitoring their keys, not on the type of digital content they provided. I f this blur is allowed to persist without clear regulatory controls, one might see a market restriction tantamount to, say, only Merrill Lynch traders being allowed to buy and sell IBM stock. The problem is more pernicious within movie studios themselves where content and distribution have been wed the longest. For decades studios have relied on the huge expense of developing negatives of film stock and making and distributing prints as ways of protecting their property from piracy-aided by the fact that theaters are also a relatively public business. The new analog technologies of VCRs and cable-TV were adapted to this mold closely enough to suit Hollywood's expectations and they are now merely extra stages in a film's release. And in some case, companies like Disney have sought even better integration by combining with broadcast and cable entities. Under this new copyright model the increased profits due to gains in efficiency should benefit most publishing *and* distributing operations-provided the two can be separated-but the movie making business continues to be a tightly knit industry and, if not properly appeased, may prove a further obstacle to change. The key problem will probably center around formats of distribution. Once a film goes from theatrical release (where it can be closely tracked) to digital consumer form, the *type* of format it is distributed on becomes irrelevant. Bits are bits whether delivered over a cable connection, the airwaves, the phone or purchased on a disk platter. Indeed, consumers may choose to forgo spending the extra dollars on, say, printed liner notes or fancy box artwork and instead have material copied directly to their own blank disks. Freeing the market this way will, no doubt, prove beneficial for consumers, the industries and the country as a whole but not without first having an impact on advertising and marketing in the film industry (if not to say the entire video rental/retail and cable/broadcast sectors). As I have pointed out, most of the friction in the digital copyright fight has centered on the two fronts of computer hardware and networking liability. This conflict would be more profitable for all parties concerned if it were not split in this fashion. As it stands, ISPs cannot turn the lobbying pressure around to encourage PC makers to build monitoring devices into their products. It raises the traditional hackles of Big Brother intrusion even though phone companies already keep track of this kind of information. Computer companies, in turn, cannot rely on ISPs to alleviate the fear film makers have about the copying abilities of things like DVD drives. ISPs have to claim they are not in the content monitoring business because they are not even in a position to develop the necessary hardware tools. The result is two separate industry battles inching forward. It must be the business of Congress to address all of these concerns at the same time. Despite this muddied copyright terrain, some companies have already sensed the underlying logic of the convergence. They have tried to bridge the gap on their own but so far their efforts have been fragmented and far from comprehensive. IBM, for example, has proposed a system called cryptolopes which sends purchased information across the internet in encrypted form. However it lacks the ability to protect and track such information once it is downstream. Xerox's work on digital libraries-which perhaps comes closest to the ideal-is not currently geared toward the consumer PC market. Neither company's system shows any signs of turning into a universal data standard for conveying books, movies, music and other consumer goods. One of the most interesting recent innovations comes out of the DVD industry itself. Circuit City is developing a special rentable DVD movie format that makes consumers dial over the telephone for the unlocking key if they decide to purchase the material. Unfortunately, this appears to be a one time call and, once again, it is far from being an industry standard product. Neither is it adapted for the most important digital appliance, the personal computer, nor can it handle any of the vast array of other forms of information like CDs and computer software. These partial efforts are not enough. As you can see, the problems the market has had to date in reaching a solution are mostly organizational and not technological. For the public good, a unified method of handling copyrighted information needs to be developed to ensure that we do not havea single market based on competing and mutually exclusive currencies of transaction. Congress can encourage this by simplifying copyright liability and transferring back to the buyer all the digital ownership rights that have been stripped away (e.g. rental rights)-provided of course that this information can be delivered in a properly monitored, encrypted form. This will give ISPs a happy medium for accepting responsibility for the copyrighted information passing through them. To do this, Congress will need to prod the ignorant sectors of each industry and educate them about one another. Experts with deep understandings of all three parts of the economy need to be assembled to bridge this gap and help Congress provide leadership on this issue by creating incentives for companies to collaborate on copyright enforcement systems. To do this it may be necessary to sharpen the legal distinction between content and network service providers. Without some sort of Chinese wall, these operations will have the incentive to piggyback on one another to compete unfairly. One might see certain bookstores refusing to honor keys with signatures that come from other publishers-a situation equivalent to phone companies refusing to take one another's calls. Congress also needs to provide a stable landscape for the legal use of encryption. The way to do so-in this particular context only-is to *entirely ignore* the wider controversy. The type of encryption needed for this infrastructure project is key escrow by its very nature, something which no one should object to. By avoiding Fourth Amendment issues altogether, you can also avoid any unnecessary complications in the discussions. Stress instead the financial need publishers and consumers will have for using trusted third parties to monitor their agreements. If a publisher goes bankrupt, buyers should be able to retain ownership of their goods. Bookstores can ensure this by holding on to an extra copy of the key and acting, in effect, as a third party repository. If the key escrow issue is treated properly in this context, everyone can win. The proper contractual model for this type of relationship comes out t he computer programming industry. When companies contract out specialized software, they often have concerns about what will happen to the source code if the company they hire goes out of business. The programmers, on the other hand, do not want to allow their clients access to the code since that negates the value of future service and upgrade contracts. Both parties typically turn to a trusted third entity who is paid to hold on to a copy of the source code as insurance against such eventualities. By citing this example as your justification for key escrow you can reduce the friction between civil libertarians and national security concerns. I would also encourage you in particular, Mr. Chairman, to continue your dual work on both strengthening privacy rights and reinforcing public identities on the internet. Give companies solid guidelines for protecting individual privacy without stripping away the crucial ability to collect important marketing information. Also continue your work to secure public discourse on the internet. Go beyond requiring spammers to use their real email addresses and take steps to prevent all other forms of spoofing. Require businesses to use their own addresses and email accounts. A pirate can thwart this kind of copyright enforcement system if he pretends to be a bookstore and intercepts its traffic. This particular problem has implications well beyond the digital copyright issue. If spoofing cannot be prevented, both through technical and legal measures, then large chunks of the digital economy simply will not work. Finally, some of the things like fair use which we have come to love about the copyright law must be adapted for the digital age. Methods of quotation and incorporation must be worked out. My personal suggestion is to force companies to grant automatic key approval to any individual claiming a fair use exemption. This could, perhaps, be done by having a public agency like the Library of Congress act as a 'bookstore' for keys. In the event of a dispute, the publisher could request some type of arbitration procedure and, if unsatisfied, could challenge the fair use in court. Since the key would always be monitored there would be a clear auditing trail and damages wouldbe easier to determine than they are today. In closing, I would like to point out that time is a critical factor here. One technical obstacle I have not covered is the cost of writing software for this system. Since the methods of delivering high volume digital information to consumers have yet to be worked out, cost right now is not a critical issue. It can be bundled into the general expense of developing the 'information superhighway.' However, if too much time passes and individual companies realize too late that a new copyright enforcement system is in their interests, then the upgrade effort could be considerable, particularly with respect to the needed PC hardware. So while this idea for copyright enforcement is simple, speed is of the essence. Its implementation is complex and requires agreement among several powerful players, some of whom may be risk averse and may feel it is opposed to their true interests. With very few exceptions, I believe most industries will benefit and the market for digital goods will be vastly enhanced, providing the economy with even greater stimulus than we have seen in the '90s. By properly adapting encryption technology to give networking authorities the ability to track such information, we can decentralize the distribution process, cut costs and expand the market for digital intellectual property. This kind of delivery can occur over the phone, the cable system and even through HDTV broadcasts. All of these industries stand to expand their markets and raise profits for copyright holders if they can 1) agree on a standard form of protected digital distribution, 2) get the computer companies to implement it (perhaps with a government mandate), 3) stop tampering with the existing copyright and liability laws in ways that discourage this and 4) negotiate with foreign governments to pull them into such a system. These goals will eventually be accomplished through marketplace experimentation already underway. However, the pain of trial and error and non-standardization can be avoided now with a little forward-looking leadership. The various industries involved need to be educated about the future opportunities digital technology will provide them with and a legal path needs to be set down which eases the transition. For purposes of brevity I have not discussed several important issues pertaining to this idea, so this letter may raise more questions with you than it answers. If you or other parties would like to pursue this, please contact me. At this point in my career, I am not in much of a position to implement this idea beyond using my powers of persuasion and the time is drawing close when leadership from within industry and government must take over. Sincerely, Wade Riddick Department of Government University of Texas-Austin RIDDICK@JEEVES.LA.UTEXAS.EDU --------------------------------------------------------------------------- -- Telerights Digital Copyright Enforcement Model 3D3D Step 1 3D3D Publication 3D3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D Private key A'; Public Key A Original Document -+----->----------------------------> Copy A ! ! Private key B'; Public Key B +-------->-------------------------> Copy B ! ! Private key C'; Public Key C +------------>---------------------> Copy C 3D3D Step 2 3D3D Purchasing Copy A 3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D Signature A + Key A Publisher ------->-------------------------> Bookstore (ignorant of ^ ! ^ content) ! v ! $ ! ! Copy A (content) ! ! ! + Signature A ! ^ ! ! ! v user's identity ! Escrow agent/bank --------->----------------------+ (renders the buyer anonymous to the publisher) ^ ! ! v $ ! ! Copy A (content) ! ! + Signature A ^ ! ! v A0 user 3D3D Step 3 3D3D Using Copy A 3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D Publisher ^ Key A ! The document +------<----- Copy A <----------------------<-----+ ! w/ Signature A ! ^ ! ^ is in use v ! ! ! document ->-----> user ->-------------------------> Bookstore Signature A 3D3D Step 4 3D3D Finishing up 3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D3D 3D3D3D3D3D3D3D3D3D3D3D3D3D Publisher Copy A (keep) ^ ^ ! finished ! finished ! trash <--------<---- user ------>-----------------> Bookstore Key A + document ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 2--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.77 ************************************