Return-Path: <sentto-279987-5033-1027434175-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 23 Jul 2002 07:27:07 -0700 (PDT) Received: (qmail 1492 invoked by uid 510); 23 Jul 2002 14:22:03 -0000 Received: from n26.grp.scd.yahoo.com (66.218.66.82) by all.net with SMTP; 23 Jul 2002 14:22:03 -0000 X-eGroups-Return: sentto-279987-5033-1027434175-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.193] by n26.grp.scd.yahoo.com with NNFMP; 23 Jul 2002 14:22:55 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 23 Jul 2002 14:22:55 -0000 Received: (qmail 12570 invoked from network); 23 Jul 2002 14:22:54 -0000 Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 23 Jul 2002 14:22:54 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 23 Jul 2002 14:22:53 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6NEOkw27717 for iwar@onelist.com; Tue, 23 Jul 2002 07:24:46 -0700 Message-Id: <200207231424.g6NEOkw27717@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 23 Jul 2002 07:24:46 -0700 (PDT) Subject: [iwar] [fc:Bad.Legislation.Could.Sabotage.the.Digital.Age] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: *** Bad Legislation Could Sabotage the Digital Age By ANDREW S. GROVE Wall Street Journal Last month, Sen. Fritz Hollings (D., S.C.) introduced a bill that is a bigger threat to America's information tech- nologies industry than the recession or any external chal- lenge yet encountered in its history. Misleadingly called the "Consumer Broadband and Digital Television Promotion Act," the bill was stimulated by the entertainment industry in order to protect its copyrighted content from the en- croachment of digital technology; in fact, some wags refer to it as the "Disney bill." If enacted, the legislation would make it illegal for American electronics and software producers to sell a "digital media device" unless the device "includes and utilizes standard security technologies that adhere to the security system standards" as defined by the Federal Commu- nications Commission. Further, if the industry fails to arrive at these "standard security technologies" within one year, the FCC will force a standard upon it. Advancing technology has always presented challenges to the established order of the entertainment industry. The music and motion picture industries, for example, resisted the appearance of audio and video tape-recording and, later, DVDs. And yet the entertainment industry has shown a remark- able ability to turn these threats into highly lucrative new businesses when they ultimately accepted the inevitable march of technology. Today's technology is bringing great benefits through digitalization of music and video. Digital content is far more flexible, diverse and of better quality and higher fidelity than material prepared by older, analog means. The explosion in digital devices enables millions of people to enjoy music and movies when they want, where they want, and in whatever order they desire. How can such a beneficial technology create problems? The challenge is that digital content can be copied without loss of fidelity, stored in hundreds of millions of home computers, and readily distributed on electronic net- works, including the Internet. The very ease with which digital content can be faithfully copied and quickly dis- tributed makes the entertainment companies, which have a proprietary right to such content, want to build moats around the castles containing their crown jewels. As digital technology has spread, there has been an exponential in- crease in the search for more stringent content protection methods and more robust technologies to deepen and widen the moat. Several issues arise, however. First, is unbreachable digital content protection even technologically possible? Six years of effort between members of the technology and the content industries have resulted in specific shields but no comprehensive defense system. For instance, technology has been generated and deployed that protects the content of DVD movies from being copied. This technology is embedded in the movies at the time the DVD is created and is now con- tained with every disc that is sold to the consumer. But how do you protect against the copying and trans- mission of music and videos that are already in people's hands and are moving around the Internet, without such content-protection software being embedded in them in the first place? In other words, what do you do about the horse that has already left the barn? In their horror over the spread of such content, some members of the entertainment industry now propose that the computer industry should police every digital message, looking for secret marks or comparing every piece of music and video to a database of all copyrighted material in existence, then block transmission if a match is found. The infrastructure required to perform this task boggles the mind. The costs would be staggering. Legal questions abound. Imagine the post office being required to open every envel- ope to inspect it for contraband. The second question is, assuming effective protection schemes are possible, who should implement them? Is it the responsibility of the technology industry to protect other industries from the challenges that a new technology can bring? Were the manufacturers of printing presses forced to protect the monks? Was the PC industry forced to protect the mainframe computer industry? Why is this case any different? But the third and biggest question is, should such protection be done at all by anyone? There is an alterna- tive, although the entertainment industry has been reluctant to pursue it with any degree of conviction. That is, to embrace what the technology offers and provide legitimate content to their consumers with even greater ease of use than the illegitimate alternatives that they are fighting. In other words, instead of devoting all that incredible energy to widening the moat, build broad bridges across it. Let consumers enjoy music and video when and where they want. Enrich these products with extra features, extra information, interactivity, automatic connections to central databases -- all the on-tap possibilities of digital media. Charge a fair sum for providing this convenience and these features, and reap the benefits of an exploding consumer base. Would this work? History suggests that it would. Reve- nues from VHS video sales, for example, now exceed box- office revenues. DVDs (which, remember, are a digital medi- um) were introduced just a few short years ago and already generate revenues in the billions of dollars. Sure, embrac- ing digital technology this way has its risks, but they are nowhere near the risks presented by the legislation current- ly before Congress. A generation of people in their most impressionable years is being trained that all digital content is free, copyrighted or not. Stifling digital media through overregu- lation will only drive them toward piracy. If the Consumer Broadband and Digital Television Promotion Act becomes law, they may never open their wallets again. <a href="http://online.wsj.com/article/0,,SB1018217374325804160,00.html?mod=opinion%5">http://online.wsj.com/article/0,,SB1018217374325804160,00.html?mod=opinion%5> Fmain%5Fcommentaries ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/NsdPZD/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT