Feeds

Young DeCSS developer rudely arrested

MPAA overkill crosses the Atlantic

  • alert
  • submit to reddit

Seven Steps to Software Security

Norwegian police, leaping to action at the bidding of American commercial powers, raided the home of 16-year-old DeCSS developer Jon Johansen on Tuesday, arresting the lad and confiscating his computers for evidence. Following several hours of questioning, young Johansen was charged with gaining unauthorised access to data and copyright infringement, serious allegations for which he could serve time in gaol if convicted. The recent release of DeCSS, a program which cracks certain security features of DVDs, has terrified the entertainment industry, represented by the Motion Picture Association of America (MPAA), and inspiring it to pursue numerous legal remedies with an almost bloodthirsty enthusiasm. Johansen maintains that the purpose of DeCSS is merely to make DVD media viewable to Linux users. The entertainment industry sees it as means of making illegal copies of DVD media and distributing them easily via the Internet. The core issue to be decided in court is whether DeCSS poses a significant threat to copyrights. Opinions vary, but The Register received several comments from vigilant readers on a previous story where we observed that DeCSS can be used to crack DVD copyright protection, and so enable users to save DVD content to a hard disk for subsequent distribution via Internet download. We were more than once referred to a "Journalist's Fact Sheet" at OpenDVD.org, which notes that "the [DVD] encryption only hinders playback. It is possible to (illegally) copy a DVD disk without decrypting anything! You can do this because the decryption is done at play time and doesn't have anything to do with copying." Several of our readers mistook this assertion for evidence that DeCSS can't be used to make illegal, decrypted copies of DVD disks. Not quite right: the DVD Content Scrambling System (CSS) was cracked in the course of rendering the format available to 'unauthorised' media viewers such as one might use with Linux, and this means that DeCSS can in fact be abused as the MPAA fears. This is not to say that Johansen's intention in developing DeCSS is other than he claims, or to say that DeCSS will necessarily be abused, but clearly it can be (and, let's be real here, undoubtedly will be). It's the CSS decryption, not the fact that a Linux viewer can be enabled, that terrifies the MPAA. Of course one could make copies a still-encrypted DVD without DeCSS, but that's hardly what's got the MPAA in hysterics. The fear is that decrypted DVD content will find itself propagating wildly and inexpensively via Internet download throughout Russia, China, South Korea and Taiwan, where cheap, pirated copies of Western movies and music outnumber legal copies by at least a hundred to one. Now add a freeware 'unauthorised' viewer, and voila! pirate DVDs will work with your buggy, bootleg copy of Windows in Chinese too. With that in mind, we must allow that the MPAA has ample reason for concern, even if its behaviour has been irredeemably pissy and embarrassingly un-manly. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.