Terror attacks usher in copy controlled hardware

A Wake Up Call

  • alert
  • submit to reddit

Senator Hollings' SSSCA legislation - which makes copy-controlled hardware mandatory (and circumventing it illegal) - has received remarkably little attention since it was revealed ten days ago. No petitions, no EFF Alert (as yet), and very little public uproar.

But according to Andre Hedrick, who publicly fought attempts to put CPRM copy controls into the storage format, the Security Systems Standards and Certification Act provides a perfect platform for the anti-encryption lobby.

He rates the legislation's chance of success as "very high", and even higher after the terrorist atrocities last week.

And CPRM, which after the furore earlier this year sidelined for use in 'removable' media (CF, MMC) only, fits the bill perfectly.

Hedrick is outraged that the PC industry will foot the bill for protecting Hollywood's assets:

"When you place your wares out in an insecure environment, you must expect losses. "The last time I checked, when you need a bodyguard, you have to pay somebody to protect you. They're asking the storage industry to pay," he says.

Hedrick is concerned that the "Digital Security" aspects of the legislation will make honest people criminals, he says, and criminals untouchable. As it stands, the Hollings Bill puts media forensics beyond the law. "Justice can not be served as one has to break the law to protect the law," he told us.

Microsoft succeeded in having the media key unique identifier ratified by the T.13 ATA committee, and although its main usefulness to the Beast is in providing a seed for Windows Product Activation, it also contributes a seed for Microsoft's version of CPRM, he says.

So where are the lobbyists?

Jonathan Potter of the Digital Media Association told us he thought the SSSCA has "no chance" of becoming law.

Unofficially we gather that the Electronic Frontier Foundation views the SSSCA as a distraction from the main business in hand: the DMCA. Stanton McCandish told us today that a position paper was in fact being prepared. Given the hysteria over wiretapping a bill with 'Security' stamped all over looks set to be received more favourably. It's time to fight the unthinkable. ®

Related Stories

'Killer DMCA' to mandate digital-rights compliant hardware
CPRM on ATA: Full Coverage


Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.