Feeds

Amazon Kindle doomed to repeat Big Brother moment

How it's broke and why it can't be fixed

Combat fraud and increase customer satisfaction

The Kindle Conundrum

Amazon insists that it is the last time. In a canned statement sent over email, the company says it's changing its systems "so that in the future we will not remove books from customers’ devices in these circumstances." But the law may say otherwise.

Amazon doesn't distribute books to the Kindle over the public internet. Etexts are downloaded via a private wireless network dubbed "Whispernet," and the company has shown it has the technical power to vanish those titles at any time. If a copyright holder sued for the removal of a title, a judge may very well force Amazon to remove it.

"Amazon has the capacity to control the bits after they've left the store," says Santa Clara University law professor and tech law blogger Eric Goldman. "I'm reasonably confident that what promoted Amazon to wipe the bits off of people's devices was them asking themselves 'How are we going to explain to a judge that we have the capacity to wipe bits from the device but we sat back and chose not to use it?'"

If you're running a website and someone posts copyrighted content, you're legally protected if you remove the content on request, thanks to the safe harbor built into the US Digital Millennium Copyright Act. You needn't worry about anyone who has already consumed or downloaded the content. But the Kindle isn't a website.

"This is not a classic DMCA environment," says Peter Brantley, director of the Internet Archive, overseeing efforts to scan library texts and put them online with un-Google-like respect for copyright.

"It's not as if Amazon is an internet service provider providing a particular kind of application." Instead, Amazon is licensing content on a private network. You could argue that DMCA rules apply to the end-user device as well.

"Used to be, stuff was on the server or stuff was on the client. Now it's a little bit more complicated. Stuff might be partially on the server and partially on the client, and the server might have the capacity to control what's going on on the client," Goldman says.

"The judge might say that the network is the full bundle - store, wireless network, device. And if that's the case, the full bundle would be governed by standard copyright law."

But there's very little precedent here. Even Goldman and Brantley - both steeped in the vagaries of online law - are at pains to sift through Amazon's position. Which only reinforces the notion that Amazon can't possibly say that its Big Brother moment won't be repeated.

"We're entering these new domains where what acquisition means and what ownership means has not been well demarcated," Brantley says. "Even if Amazon vows to never again under these circumstances grab and delete a book off of a Kindle, there are other circumstances where they might be compelled to do that."

Hold tight to that Orwell paperback. And be careful of the flame. ®

3 Big data security analytics techniques

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.