Feeds

Congress unlocks US cellphones

But censorware research is illegal, again

The essential guide to IT transformation

The US copyright office will permit mobile phone subscribers to unlock their phones, allowing them to be used by rival network providers.

It's a right that's taken for granted in most of the GSM world, where there's little operators can do to stop it.

But US carriers, being the enlightened souls that they are (lowest form of wit - ed.) used fear created by the 1998 Digital Millenium Copyright Act to prevent unlocking. The DMCA outlawed the circumvention of technological protection measures on copyright works - with few exemptions. It promised to permit the US Congress' copyright office to review these exemptions from time to time.

Now, in its third review of permissible DMCA exemptions, the US Congress' copyright librarian has lifted the fear of prosecution from unlockers:

"Computer programs in the form of firmware that enable wireless telephone handsets to connect to a wireless telephone communication network, when circumvention is accomplished for the sole purpose of lawfully connecting to a wireless telephone communication network."

Another new exemption has been introduced for security researchers investigating DRM on sound recordings, or videos with sound recordings, that are distributed on CD.

You can thank hapless Sony, who distributed the notorious "rootkit"-style DRM last year, for raising the profile of that issue.

The measure permits researchers to circumvent copyright protection measures - "...when circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities."

That's the end of the good news.

When the last review of DMCA exemptions took place in 2003, researcher Seth Finkelstein won an exemption for similar researchers, and academics, investigating censorware blacklists.

(This is a subject close to our hearts: in 2001 a censorware company blocked access to The Register for millions of readers because it didn't like a story we'd written about one of their products.)

Until Finkelstein's exemption, it was illegal to figure out what sites the censorware companies were blocking - and they didn't have to tell you. The "filter" vendor was cop, jury and hanging judge.

(You can read the new exemptions here, and compare them to the 2003 list).

Seth decided not to pursue the issue this time round, citing the stress of facing legal threats and personal harassment in his lonely crusade - as he explained here.

Amazingly, no one amongst the law schools, think tanks and "activist" community - who rarely miss the opportunity to talk about free speech - stepped in to take his place and challenge the blacklist companies. As a result, the exemption has been lost.

Seems like it's easier to talk about freedom, than actually fight for it.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.