CS 335 Reading for March 17:
Copyright Liability and Computer Networks


On March 17, 2004, Ethan Preston will conduct the lecture for CS 335. Mr. Preston is a attorney with Aronberg, Golgehn, Davis & Garmisa, whose practice includes commercial litigation and computer law. The assigned reading and the lecture for this class are meant to provide you with some familiarity with the issues raised (including liability) by copyright law in the context of networked computers. In particular, this class is intended to provide you with a background in copyright law and peer-to-peer networks.

The reading assigned for this class is substantial. However, a number of the readings ask you to skim the reading except for specific pages or to skim the entire reading. While the readings to be skimmed bear to the subject matter, they are either not central to our discussion or should simply not require a lot of your time. The assigned reading includes a number of discretionary readings. These discretionary readings are intended to provide you with additional resources if a topic is interesting to you, but they will not be covered in class. Some of the readings have questions underneath them. You are asked to think about these questions after you have done the reading and form an opinion. The discussion in the March 17 is class will give you an opportunity to express your reactions to the readings and exchange them with the other students.

I.    Criminal Copyright Infringement and Warez
SKIM the criminal copyright infringement statues:
http://www4.law.cornell.edu/uscode/17/506.html
http://www4.law.cornell.edu/uscode/18/2319.html
(Question: Look at 17 U.S.C. § 506(a)(2) and 18 U.S.C. § 2319(c)(3). How easy is it to be criminally liable under the copyright statutes?)

READ Justice Department's investigation into warez groups (criminal copyright enforcement):
http://cybercrime.gov/ob/OBorg&pr.htm
(Question: What is the typical motivation for individuals in the warez scene?)

READ the federal investigation of "Fastlane" group, which used sophisticated technical measures to avoid identification:
http://www.cybercrime.gov/fastlane.htm
(Question: If the defendants' obfuscation efforts were so sophisticated, how were they identified?)

SKIM to see how a defendant's criminal liability for copyright infringement is calculated under the United States Sentencing Guidelines:
http://www.ussc.gov/2003guid/tabcon03_1.htm
http://www.ussc.gov/2003guid/2b5_3.htm
http://www.ussc.gov/2003guid/5a.htm

II.    Peer-to-Peer Networks and Civil Liability
READ SECTIONS I, II and III of the Electronic Frontier Foundation's analysis of copyright liability in the context of computer networks and summary of recent caselaw:
http://eff.org/IP/P2P/p2p_copyright_wp.php
If you don't read anything else for this class, read this.
(Question: What does the EFF recommend most strongly for staying out of trouble?)

READ PAGES 3 to 5 and 11 to 18 of the 2003 decision of the Seventh Circuit Court of Appeals in Chicago on the Aimster sytem:
http://www.ca7.uscourts.gov/op3.fwx?submit1=showop&caseno=02-4125.PDF
(Question: What special feature did Aimster/Deep use to try to avoid copyright liability? Why was Aimster/Deep unsuccessful?)

DISCRETIONARY READING: The MGM v. Grokster decision from a federal trial court in Los Angeles:
http://www.eff.org/IP/P2P/MGM_v_Grokster/030425_order_on_motions.pdf
(Question: How are Grokster and Streamcast different from Napster? From Aimster? If Kazaa/Sharman controls Grokster's "supernodes," where does that leave Kazaa/Sharman?)

III.    Technical Responses to Legal Issues on Peer-to-Peer Networks
SKIM a news article on the RIAA flooding peer-to-peer networks with spoofed files:
http://www.siliconvalley.com/mld/siliconvalley/3560365.htm

SKIM an article about the economic problems the Gnutella network faces:
http://www.firstmonday.dk/issues/issue5_10/adar/index.html
(Questions: How many people provide the lion's share of files on the Gnutella network? If you were a lawyer for the RIAA trying to stop file-sharing, who would you sue? If the majority of the files on a particular peer-to-peer network were taken down, how attractive would that network be?) 

SKIM a whitepaper on Freenet's architecture and technical features:
http://freenet.sourceforge.net/papers/freenet-ieee.pdf
(Question: Does Freenet's architecture and technical features insulate Freenet node operators from copyright liability? Think about Aimster.)

DISCRETIONARY READING: A law review on Freenet's survivability in the legal system:
http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php
(Question: If people can be sued for millions of dollars for operating a Freenet node, but know that the Freenet system will continue to operate even if they shut their node down, how many would still operate a Freenet node?)

IV.    Legal Strategies for Peer-to-Peer Networks
READ a news article about Kazaa/Sharman's legal structure:
http://www.chron.com/cs/CDA/printstory.hts/tech/1759841
(Question: What is Kazaa/Sharman's strategy for staying out of legal trouble?)

DISCRETIONARY READING: A law review on the financial laws of Vanuatu:
http://www.vanuatu.usp.ac.fj/journal_splaw/Working_Papers/Herman1.html
(Question: How might have Vanuatu's laws influenced Sharman's choices?)

DISCRETIONARY READING: My post on how to protect peer-to-peer systems from copyright liability, and a law review giving a more in-depth discussion of arbitration in the context of software (pages 45 through 53):
http://research.yale.edu/lawmeme/modules.php?name=News&file=comments&sid=1259&tid=2996&mode=flat&order=1&thold=-1
http://web.hamline.edu/law/pages/lawreview/ pdf_files/Sandeen.pdf