Feeds

MPAA on legal warpath with 2600 again

Popular hacker site sued for DeCSS linking

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

The powerful Motion Picture Association of America (MPAA) lobbying outfit has taken another heavy-handed swipe at the DeCSS utility programme which enables users to decrypt the playback protection of DVDs and run them on unauthorised players. The group has named 2600.com publisher Eric Corley, aka Emmanuel Goldstein, in a complaint lodged with the district court in New York requesting a second injunction against Corley, this time to stop him from linking to other sites which offer the DeCSS programme for download. The MPAA successfully sued 2600, a popular hackers' newsletter, winning an injunction which prohibits the site from distributing the programme back in January. Corley has obeyed the court order, but has since provided links to other sites where the forbidden utility can still be found. "He is transporting individuals electronically to locations in order to facilitate the illegal copying of DVDs. His behaviour is analogous to driving someone to a home so that they may burglarise the home," MPAA President Jack Valenti said in his typically overblown rhetorical style. The court may not see it that way. In a recent decision involving Ticketmaster and Tickets.com, the judge found that hyperlinking is "analogous to using a library's card index to get reference to particular items." That strikes us as a more accurate description of the process than Valenti's. This will be an important case; the core question is whether a link to illegal content is itself illegal, and that has implications reaching far outside the MPAA's sad little theatre of acrimony and intimidation. Links to such content as racist hate speech, bomb-making instructions and child pornography all have the potential to be affected by the upcoming decision. The court must respond within 21 days. The MPAA says it expects a favourable decision, but we are not so sure. In any event, this is a true can of worms which may see scores of peripheral players trotting onto the field and filing appeals in diverse venues, and could eventually end up before the Supreme Court. ®

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.