Feeds

Amazon Kindle doomed to repeat Big Brother moment

How it's broke and why it can't be fixed

Internet Security Threat Report 2014

The Kindle Conundrum

Amazon insists that it is the last time. In a canned statement sent over email, the company says it's changing its systems "so that in the future we will not remove books from customers’ devices in these circumstances." But the law may say otherwise.

Amazon doesn't distribute books to the Kindle over the public internet. Etexts are downloaded via a private wireless network dubbed "Whispernet," and the company has shown it has the technical power to vanish those titles at any time. If a copyright holder sued for the removal of a title, a judge may very well force Amazon to remove it.

"Amazon has the capacity to control the bits after they've left the store," says Santa Clara University law professor and tech law blogger Eric Goldman. "I'm reasonably confident that what promoted Amazon to wipe the bits off of people's devices was them asking themselves 'How are we going to explain to a judge that we have the capacity to wipe bits from the device but we sat back and chose not to use it?'"

If you're running a website and someone posts copyrighted content, you're legally protected if you remove the content on request, thanks to the safe harbor built into the US Digital Millennium Copyright Act. You needn't worry about anyone who has already consumed or downloaded the content. But the Kindle isn't a website.

"This is not a classic DMCA environment," says Peter Brantley, director of the Internet Archive, overseeing efforts to scan library texts and put them online with un-Google-like respect for copyright.

"It's not as if Amazon is an internet service provider providing a particular kind of application." Instead, Amazon is licensing content on a private network. You could argue that DMCA rules apply to the end-user device as well.

"Used to be, stuff was on the server or stuff was on the client. Now it's a little bit more complicated. Stuff might be partially on the server and partially on the client, and the server might have the capacity to control what's going on on the client," Goldman says.

"The judge might say that the network is the full bundle - store, wireless network, device. And if that's the case, the full bundle would be governed by standard copyright law."

But there's very little precedent here. Even Goldman and Brantley - both steeped in the vagaries of online law - are at pains to sift through Amazon's position. Which only reinforces the notion that Amazon can't possibly say that its Big Brother moment won't be repeated.

"We're entering these new domains where what acquisition means and what ownership means has not been well demarcated," Brantley says. "Even if Amazon vows to never again under these circumstances grab and delete a book off of a Kindle, there are other circumstances where they might be compelled to do that."

Hold tight to that Orwell paperback. And be careful of the flame. ®

Internet Security Threat Report 2014

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.