hayam****@users*****
hayam****@users*****
2004年 4月 24日 (土) 00:02:18 JST
*$BJF;JK!>J(BCCIPS$B$N8!;vC#$X$N%$%s%?%S%e!<(B $B%7%9%F%`$N%/%i%C%/Ey$N%3%s%T%e!<%?!<$rMQ$$$?HH:a!"5Z$S2;3Z%U%!%$%k6&M-$KBeI=$5$l$kCNE*:b;:8"$K4X$9$kHH:a$r<h$jDy$^$k(BDepartment of Justice$B$N(BCCIPS$B!J%3%s%T%e!<%?!<HH:a5Z$SCNE*:b;:8"%;%/%7%g%s!K$K=jB0$9$k8!;vC#$X$N%$%s%?%S%e!<$G$9!#(B $B;~;v%M%?$G$J$$$N$G!"K]Lu$O$=$s$J$K>G$i$:$K$$$3$&$H;W$$$^$9!#(Bbit by bit$B!*(B *$B;29M%Z!<%8(B $BK\2H%$%s%?%S%e!<!J(BQuestions for DoJ IP Attorneys Asked and Answered$B!K(B http://interviews.slashdot.org/interviews/03/07/24/1326224.shtml $BJF;JK!>J!J(BDepertment of Justice:DoJ$B!K$N%[!<%`%Z!<%8!'(B http://www.usdoj.gov/ DoJ$B$N(BCCIPS$B$N%[!<%`%Z!<%8!'(B http://www.cybercrime.gov/ DMCA$BF|K\8lLu!'(B http://www.isc.meiji.ac.jp/~sumwel_h/doc/code/DMCA-1.htm#1201 $BJF9qCx:n8"K!Bh#5>O!'(B http://www.cric.or.jp/gaikoku/america/america_c5.html#5 *$BL\<!(B #contents *$BK]Lu?J9T>u67!J>u67$K1~$8$F=$@5$*4j$$$7$^$9!K(B INTRODUCTORY COMMENTS$B!'2<Lu40N;(B Q1) $B!'2<Lu40N;(B Q2) $B!'2<Lu40N;(B Q3) $B!'2<Lu40N;(B Q4) $B!'2<Lu40N;(B Q5) $B!'2<Lu40N;(B Q6) $B!'2<Lu40N;(B Q7) $B!'2<Lu40N;(B Q8) $B!'2<Lu40N;(B Q9) $B!'2<Lu40N;(B Q10) $B!'2<Lu40N;(B Q11) $B!'2<Lu40N;(B Q12) $B!'2<Lu40N;(B Addendum $B!'2<Lu40N;(B *$BK]Lu!J%D%C%3%_D{@5Bg4?7^!K(B **INTRODUCTORY COMMENTS ''INTRODUCTORY COMMENTS'' Thank you all for posing such interesting questions. We have answered nine of the ten submitted questions below, but we are not in a position to answer number ten because it is specifically related to a civil case (that does not involve the Department of Justice). However, in an effort to give you your money's worth, we have answered two additional questions which you posed in the comments accompanying the original interview, but were not submitted to us by the Slashdot moderators. ''$B$O$8$a$K(B'' $B6=L#?<$$<ALd$r$7$F$/$l$?$9$Y$F$N?M$K46<U$7$?$$!#2f!9$O0J2<$GEj9F$5$l$?#1#08D$N<ALd$N$&$A#9$D$KEz$($5$;$F$b$i$C$F$$$k$,!"#1#0HVL\$N<ALd$OFC$KL1;v;v7o!JL1;v;v7o$K;JK!>J$O%?%C%A$7$F$$$J$$!K$K4XO"$7$F$$$k$?$a!"2f!9$OEz$($kN)>l$K$J$$!#$7$+$72f!9$O!"$"$J$?J}$+$iMB$+$C$?$b$N$K8+9g$&$b$N$r$*JV$7$7$h$&$HEXNO$7!"%*%j%8%J%k$N%$%s%?%S%e!<$K2C$($F!"(BSlashdot$B$N%b%G%l!<%?!<$K$OA*$P$l$J$+$C$?%3%a%s%H$NCf$+$i!"Fs$D$N<ALd$KEz$($5$;$F$b$i$C$F$$$k!#(B [* $B$7$+$7;d$?$A$O!"$"$J$?J}$,;YJ'$C$?$b$N$K8+9g$&$@$1$N$b$N$rM?$($k$?$a$KEXNO$7!"(B / $B$H$O$$$(!"$*MB$+$j$7$?J,$@$1$*JV$7$7$J$1$l$P$J$i$J$$$H9M$($F$$$^$9$+$i!"(B / $B$H$O$$$($*MB$+$j$7$?J,$O$*JV$7$7$h$&$H!"(B ; $B$d$o$i$+$$I=8=$r9M$($F$_$^$7$?(B ; $B8lHx$b4^$a$F(Bairhead$B$5$s$N$40U8+$r<h$jF~$l$F$_$^$7$?!J(Bmumumu, 2004/4/22)] '''(translated by mumumu)''' **Q1)What services for an open source copyright holder ''1) What services for an open source copyright holder - by bwt'' First, thank you doing this interview. Most people here take IP very seriously and want laws and law enforcement that do what the Constitution intended. Contrary to what many lay-people believe, open source software relies (heavily) on copyright and the legal system that assures those rights. In fact, among Slashdot readers are a large number of people who own copyrights to open source software. My question is what services your organization offers in practice to "real people". Our community creates software whose quality competes with that of multi-billion dollar corporations, so we clearly have a significant interest in having our own rights as authors protected. We all have no doubt that if Jack Valenti finds a website selling pirated versions of his movies that law enforcement will descend upon the infringer with a fury comparable to that wielded against drug smugglers and violent criminals. Few among us would really object to enforcing the law against such a clear violation, however, I cannot help but wonder if there is equity in the system. I wonder whether an individual author's rights as a copyright owner would be similary protected? For example, if substantial quantities of code that one of us has written ends up in a company's product in a way that clearly violates the terms of an open source licence, how would the infringed copyright holder go about seeking your services? What policy governs your decision whether or not to act on behalf of a copyright owner when a complaint is raised? What assures that the heavy hand of the law protects an individual's rights with the same fury that it defends those of the RIAA or a major software corporation? ''1) $B%*!<%W%s%=!<%9%=%U%H%&%'%"$NCx:n8"$rJ];}$9$k?M$K$H$C$FMx1W$K$J$k<h$jDy$^$j$C$F2?!)(B - bwt$B$K$h$k(B '' $B$^$:!"$3$N%$%s%?%S%e!<$K1~$8$F2<$5$C$F46<U$7$F$$$^$9!#$3$3$K$$$kKX$I$N?M!9$O!"CNE*=jM-8"$K4X$7$F??7u$K9M$($F$*$j!"7{K!$N@:?@$K$N$C$H$C$?K!N'!"$=$7$F$=$N$h$&$JK!$N<99T$rK>$s$G$$$^$9!#(B $BB?$/$NK!N'$NAG?M$,?.$8$F$$$k$3$H$H$O0[$J$k$N$G$9$,!"%*!<%W%s%=!<%9%=%U%H%&%'%"$OCx:n8"5Z$S$=$l$i$N8"Mx$rJ]>c$9$kK!%7%9%F%`$K!J$H$F$b6/$/!K0MB8$7$F$$$^$9!#<B:]!"(BSlashdot$B$NFI<T$NCf$K$O!"%*!<%W%s%=!<%9%=%U%H%&%'%"$KBP$9$kCx:n8"$rJ];}$7$F$$$kJ}$b$?$/$5$s$$$^$9!#;d$N<ALd$O!"$"$J$?J}$NAH?%$,<B:]$K!V8=<B$KB8:_$9$k?M!9!W$KBP$7$FDs6!$9$k%5!<%S%9$C$F2?$G$9$+!)(B $B$H$$$&$3$H$G$9!#;d$?$A$N%3%_%e%K%F%#$O%=%U%H%&%'%"$r:n$C$F$$$^$9$,!"$=$NIJ<A$O?t==2/%I%k5,LO$N4k6H$,:n$k$=$l$KI$E($9$k$b$N$G$9!#$=$l$f$($K;d$?$A$O!"Cx:n<T<+$i$N8"Mx$,J]8n$r<u$1$k$3$H$K=EBg$J4X?4$rJz$/$N$G$9!#2>$K(BJack Valenti$B$,3$B1HG$N1G2h$rHNGd$7$F$$$k%&%'%V%5%$%H$r8+$D$1$?$H$7$?$i!"?/32<T$KBP$7$F!"KcLt$NL)M"CD$d6'0-HHC#$KBP$7$F9T$o$l$k$N$KI$E($9$k7c$7$$<hDy$j$,9T$o$l$k$@$m$&$H$$$&$3$H$K5?$$$r$b$D?M$O$$$J$$$G$7$g$&!#(B $B$3$s$J$"$+$i$5$^$J0cK!9T0Y$KBP$7$F!"K!$r<99T$9$k$3$H$K0[$r>'$($k?M$OK\Ev$K$o$:$+$G$7$g$&!#$7$+$7!";d$OK!$N%7%9%F%`$,8xJ?$J$b$N$J$N$@$m$&$+$H5?Ld$K;W$o$6$k$r$($^$;$s!#Cx:n8"$N%*!<%J!<$H$7$F$N8D?M$NCx:n<T$N8"Mx$,!"F1$8$h$&$KJ]8n$5$l$k$N$G$7$g$&$+!)!!$?$H$($P!"2>$K;d$?$A$N$&$A$N$R$H$j$,=q$$$?$+$J$j$NNL$N%=!<%9%3!<%I$,!":G=*E*$K%*!<%W%s%=!<%9%i%$%;%s%9$NJ88@$KL@$i$+$KH?$9$k7A$G4k6H$N@=IJ$KAH$_9~$^$l$?>l9g$K!"8"Mx$r?/32$5$l$?Cx:n8"<T$O!"$I$N$h$&$K$7$F$"$J$?J}$N<h$jDy$^$j$r5a$a$?$i$h$$$N$G$7$g$&!)(B $B:[H=:;BA$K$J$C$?$H$-$K!"Cx:n8"$r;}$D?M$NMx1W$K$J$k$h$&$KK!$rE,MQ$9$k$+!"$7$J$$$+$r7hDj$9$k%]%j%7!<$C$F$I$N$h$&$J$b$N$G$7$g$&$+!)(B $B87$7$$K!N'$NDy$aIU$1$,!"(BRIAA$B$d<gMW$J%=%U%H%&%'%"2q<R$N8"Mx$rJ]8n$9$k$b$N$HF1DxEY$K8D?M$N8"Mx$rJ]8n$7$F$/$l$k$H$$$&J]>Z$,$I$3$K$"$k$N$G$7$g$&$+!)(B ''O$B!G(BLeary:'' Thanks for your question. The issues you raise are ones that we confront from time to time and we welcome the chance to address them here on Slashdot. In reviewing your question, and many that follow, it appears that some Slashdot readers feel that the Department of Justice only protects the IP rights of big corporations. That simply isn t the case. There is no doubt that large multi-national corporations are often victimized by piracy due in some measure to the popularity and pervasiveness of their products. But at the same time, there are also many others who are victimized, such as small mom and pop operations, and young developers trying to break into a crowded and competitive market. I imagine many Slashdot regulars fall into these categories. In deciding whether or not to prosecute an intellectual property case, we undertake a thorough examination of a number of factors. These include the nature and seriousness of the offense, the deterrent effect of the prosecution, the potential defendant s culpability, the potential defendant s history with respect to criminal activity, the likelihood of the prosecution leading to additional investigations of others, and the possible sentence or other consequences. Factors such as these, and not the identity of the victim, are the basis for prosecutorial decisions. We have made strong intellectual property rights enforcement a priority and we will continue to do so without regard to the size or market share of the victim(s). The prosecutions we undertake do in fact benefit real people. If you look at the people and organizations who have been victimized by the defendants we prosecute, you will see that we enforce the law without regard to who the victims may be and we have protected the rights of victim companies of all sizes. In one recent case, for example, we prosecuted individuals for pirating a significant amount of high-end application software. There were literally hundreds of victim companies, the vast majority of which were not large corporations. One victim company was a small software manufacturer located in the Midwest. They had one or two viable programs that sustained their entire operation of about ten employees, many of whom were family members of the owner. The company had spent many years developing its software, so the owner, of course, was devastated to find that his product had been pirated and was available for free on the Internet. His livelihood depended on the legitimate sale of only one or two software programs. If anyone thinks that piracy does not affect everyday people trying to succeed in business, they need look no further. The earnings of small operations like this are all put back into the business, to defray research and development costs and support further devel opment. They do not have the resources to employ investigators to track pirates or lawyers to vindicate their rights civilly. They simply have an idea and a product a product which was, in this case, pirated and distributed around the world. In regard to open source products, depending upon the facts, open source developers may seek to enforce their legal rights civilly, or, in cases where there has been willful infringement and certain criminal thresholds have been met, criminal prosecution may also be warranted. At this time, we are unaware of any referrals to law enforcement for open source license violations. As for reporting potential criminal infringement to law enforcement, the best way to do that is to contact your local FBI office. ''$B%*%l%"%j!<!'(B'' $B<ALd$7$F$/$l$F$"$j$,$H$&!#$"$J$?$,Ds5/$7$F$$$kLdBj$O;d$?$A$,EY!9D>LL$9$k$b$N$@$7!"$3$3(BSlashdot$B$G$3$&$7$?LdBj$K<h$jAH$a$k$3$H$O4j$C$F$b$J$$$3$H$@!#$"$J$?$N<ALd$d!"$"$H$KB3$/$?$/$5$s$N<ALd$r8+D>$7$F$$$k$H!"(BSlashdot$B$NFI<T$NCf$K$O;JK!>J$,Bg4k6H$NCNE*=jM-8"$@$1$rJ]8n$7$F$k$8$c$J$$$+$H46$8$F$$$k?M$,$$$k$h$&$@!#7h$7$F$=$&$G$O$J$$$s$@$1$I$M!#Bg5,LO$JB?9q @ R4k6H$,!"<+J,$?$A$N@=IJ$,Ia5Z$7$F$*$j!"$+$D?M5$$,$"$k$,8N$K!"$"$kDxEY3$B1HG$N5>@7$K$?$S$?$S$J$C$F$7$^$C$F$$$k$3$H$O5?$$$NM>CO$,$J$$!#$7$+$7Bg4k6H0J30$K$b!"2HB27P1D$NNm:Y4k6H$d!":.;($7$F$$$F6%Ah$N7c$7$$%^!<%1%C%H$K2%$j9~$_$r$+$1$h$&$H$7$F$$$k<c$$3+H/<TC#$N$h$&$J?M!9$b$^$?5>@7$K$J$C$F$$$k$s$@!#(BSlashdot$B$N>oO"C#$NB?$/$,!"$3$&$7$?%+%F%4%j$KJ,N`$5$l$k$H;d$O?dB,$7$F$$$k!#(B $BCNE*=jM-8"$K4X$9$k;v7o$rAJDI$9$k$+$7$J$$$+$r7h$a$k$H$-!"(B $B;d$?$A$OBt;3$NMW0x$rE0DlE*$KD4$Y$"$2$k!#$=$&$7$?MW0x$K$O!"?/329T0Y$N @ -<A$d=EBg @ -!"AJDI$9$k$3$H$K$h$k?/329T0Y$NM^;_8z2L!"Ho9p$K @ x:_E*$J2a<:$,$"$k$+H]$+!"@x:_E*$JHo9p$NHH:aNr!"B>$NDI2CE*$JD4::$K$D$J$,$kAJDI$N2DG=@-!"$=$7$F$"$jF@$k7:H3$NDxEY$d$=$NB>$N0x2L4X78$,4^$^$l$k!#$3$l$i$NMW0x$,AJDI$9$k$+$I$&$+$rH=CG$9$k4pAC$H$J$k$N$G$"$C$F!"Ho32<T$N?H85$O$=$&$G$O$J$$$N$@!#;d$?$A$OCNE*=jM-8"$rE,MQ$9$k$3$H$NM%@hEY$r$3$l$^$G$b>e$2$F$-$?$7!"Ho32<T!JC#!K$N%^!<%1%C%H%7%'%"$d5,LO$K$+$+$o$i$:$3$l$+$i$b$=$&$7$F$$$/$D$b$j$@!#(B $B;d$?$A$,AJDI$NG$L3$r0z$-<u$1$F$$$k$3$H$G!"8=<B$KB8:_$7$F$$$k?M!9$O<B:]$KBg$-$JMx1W$r<u$1$F$$$k!#;d$?$A$,AJDIBP>]$H$7$F$$$kHo9p$+$iHo32$r<u$1$?AH?%$d?M!9$r$h$/8+$l$P!"Ho32<T$,C/$G$"$C$F$b;d$?$A$OK!$rE,MQ$7$F$$$k$7!"Ho32<T$,$I$s$J5,LO$N4k6H$G$"$C$F$b!"8"Mx$rJ]8n$7$F$$$k$3$H$,$o$+$k$@$m$&!#(B $B:G6a5/$3$C$?$"$k;v7o$rNc$K5s$2$k$H!"%O%$%(%s%I$N%"%W%j%1!<%7%g%s%=%U%H$N3$B1HG$rAjEvNL:n$C$F$$$??M$?$A$r;d$?$A$,9pAJ$7$?!#J8;zDL$j2?I4$b$N4k6H$,Ho32$K$"$C$?$7!"$=$&$7$?4k6H$NBgH>$OBg4k6H$G$O$J$+$C$?!#Ho32$K$"$C$?4k6H$NCf$K!"Cf@>It$K$"$k>.$5$J%=%U%H%O%&%9$,$"$k!#$=$N2q<R$K$O!"Ls#1#0L>$N=>6H0w$,<u$1;}$D;v6HA4BN$r0];}$9$k$?$a$N!">-Mh @ -$,$"$k%=%U%H%&%'%"$O$R$H$D$+$U$?$D$7$+$J$+$C$?$7!"=>6H0w$NB?$/$,<RD9$N2HB2$@$C$?$N$@!#$3$N%=%U%H%O%&%9$O!"$=$N>-Mh @ -$N$"$k%=%U%H%&%'%"$r3+H/$9$k$N$K$?$/$5$s$NG/7n$rHq$d$7$F$-$?$?$a!"<RD9$O<+J,$?$A$N@=IJ$N3$B1HG$,:n$i$l!"%$%s%?!<%M%C%H$G%U%j!<$GMxMQ$G$-$k$3$H$rCN$C$F%7%g%C%/$r<u$1$?!#H`$N @ 87W$O$?$C$?$R$H$D$+$U$?$D$N%=%U%H%&%'%"$N @ 55,$NGd$j>e$2$K0MB8$7$F$$$?!#$b$7!"3$B1HG$,%S%8%M%9$G @ .8y$r<}$a$h$&$HEXNO$7$F$$$k$"$j$U$l$??M!9$KA4$/1F6A$rM?$($J$$$H9M$($k?M$,$$$k$J$i!"$=$&$$$&?M$O$=$l0J>e?<$/9M$($kI,MW$O$J$$!#$3$N$h$&$JNm:Y;v6H$N<}F~$O%S%8%M%9$KA4$FEjF~$5$l!"D4::8&5f$d3+H/%3%9%H!"$=$7$F>-Mh$N3+H/$K;H$o$l$k$N$@!#H`$i$K$O3$B1HG$rDI @ W$9$k$?$a$ND4::0w$d !"<+J,$?$A$N8"Mx$rCz=E$K9T;H$9$k$?$a$NJ[8n;N$r8[$&%j%=!<%9$J$I$J$$!#H`$i$O%"%$%G%#%"$H@=IJ$r;}$C$F$$$k$@$1$G$"$C$F!"$3$N;v7o$G$O!"$=$N@=IJ$N3$B1HG$,:n$i$l$F@$3&Cf$KG[I[$5$l$F$$$?$N$@!#(B $B%*!<%W%s%=!<%9%=%U%H%&%'%"$K4X$7$F$O!"<B:]$K5/$3$C$?$3$H$K$b$h$k$,!"3+H/<T$,CzG+$K<+J,$N8"Mx$r9T;H$7$h$&$HEXNO$9$k$+$b$7$l$J$$$7!"0U?^E*$J?/329T0Y$,$"$C$?>l9g$dHH:a9T0Y$NC<=o$,H/8+$5$l$?>l9g$O!"7:;v:[H=$X$b$C$F$$$/$3$H$b$*$=$i$/J]>Z$5$l$F$$$k$@$m$&!#$3$N>l9g!"%*!<%W%s%=!<%9%i%$%;%s%9$,<i$i$l$F$$$J$$$3$H$KBP$7$FK!E*$J@):[$KAJ$($k$+$I$&$+$O;d$?$A$K$O$o$+$i$J$$!#@x:_E*$J?/329T0Y$H$$$&HH:a$r;JK!Ev6I$KJs9p$9$k$3$H$K4X$7$F8@$($P!"0lHVNI$$J}K!$O$"$J$?$NCOJ}$K$"$k(BFBI$B$N;vL3=j$KO"Mm$r$H$k$3$H$@!#(B '''(translated by mumumu)''' **Q2)This won$B!G(Bt be taken seriously, but... ''2) This won$B!G(Bt be taken seriously, but... - by Maul'' .... I find it extremely hard to believe that your division truthfully represents the "people" of this country. It seems that your job is to help mega-corporations make "examples" out of college students and others who are too poor to defend themselves. Yes, sharing copyrighted music and films is a crime. However, I see no justification for the insane penalties associated with file sharing and priacy. It seems that companies can make up some absurd figure in the billions, claiming it to be actual damages, without any sort of proof they have really lost that much at all from file sharing. Can you please enlighten me as to why software and media "pirates" as well as other "computer criminals" are in many cases treated worse than rapists and violent criminals who use weapons? ''2) $B$^$H$b$K<u$1<h$C$F$b$i$($J$$$N$G$7$g$&$,(B... - Maul$B$K$h$k(B '' ...$B$"$J$?$NIt=p$,$3$N9q$N(B"$B9qL1(B"$B$r@?<B$KBeI=$7$F$$$k$H$OE~Dl?.$8$i$l$^$;$s!#(B $BIO$7$9$.$F<+J,$r<i$k$3$H$,$G$-$J$$Bg3X @ 8$d!"$=$NB>$N?M!9$KBP$9$k(B"$B8+$;$7$a(B"$B$r!"!VD6!W$,$D$/Bg4k6H$,:n$k$3$H$r=u$1$k$N$,$"$J$?$N$*;E;v$N$h$&$G$9$M!#(B $B$($(!"Cx:n8"$GJ]8n$5$l$?2;3Z$d1G2h$r6&M-$9$k$N$OHH:a$G$9$h!#$7$+$7$G$9$M!"3$B1HG$r:n$k$3$H$d%U%!%$%k6&M-$H$$$&9T0Y$KBP$7$F!"5$0c$$$H$7$+;W$($J$$@):[$r2]$9$3$H$r!"@5Ev2=$9$kM}M3$J$s$F$I$3$K$b$J$$$H;W$&$s$G$9$h!#(B $B!!4k6H$I$b$O$U$6$1$?D"?,$"$o$;$r==2/%I%kC10L$G$d$C$F!"$=$l$r<B:]$NB;32$G$"$k$+$N$h$&$K<gD%$9$k$3$H$@$C$F$G$-$k$s$@!#%U%!%$%k6&M-$N$;$$$G$=$l$@$1$NB;32$r<u$1$?$H$$$&>Z5r$J$s$FA4$/$J$$$N$K!#(B $B$J$<B?$/$N>l9g$K!"%=%U%H%&%'%"$d%a%G%#%"$N(B"$B3$B1HG(B"$B$d$=$NB>$N(B"$B%3%s%T%e!<%?!<HH:a(B"$B$,!"IX=wK=9T$dIp4o$r;H$&6'0-HH$h$j$b=E$$HH:a$H$7$F07$o$l$F$$$k$N$+!";d$K$O$C$-$j$H @ bL@$7$F$b$i$($^$;$s$+!)(B ''O$B!G(BLeary:'' Before answering your underlying question, which we do take seriously, let me address what has become a common misconception. The recent cases involving college students were civil suits brought by private parties, such as the Recording Industry Association of America (RIAA). The Department of Justice is not a party to these suits. We enforce our federal intellectual property laws through criminal prosecution, not through civil suits. Your question argues that the current sentencing structure for criminal intellectual property crimes is too severe and is based upon damage amounts that cannot be supported. First, note that the federal sentencing structure is established by Congress and the United States Sentencing Commission. As federal prosecutors, we work within these guidelines. Second, the sentencing guidelines reflect the serious harm that is caused by piracy. In our answer to the first question above, we gave just one example of a small developer who has been harmed by piracy. That situation is not unique. The amount of pirated material available online today is staggering. In the course of prosecuting piracy we have found servers containing over 20,000 titles of pirated software, movies, music and games. The value of the copyrighted material on servers like this is frequently in the millions of dollars. Factor in the number of times those titles are distributed over the Internet, and the damage amou nts skyrocket. The sentencing structure reflects this harm. Further, deterrence is a significant element in criminal sentencing not just in IP crimes, but in all crimes. Until recently, many people believed that piracy was a consequence-free activity and that it did not harm anyone. The sentences that have been handed down in recent prosecutions have begun to change that impression, and will deter others from engaging in similar conduct. By statute, a person convicted of one felony count of copyright infringement faces up to 5 years in prison (or 3 years, if convicted under the NET Act when the piracy was not done for commercial advantage or private financial gain). However, there are a number of factors that determine the actual criminal sentence a defendant receives, including the volume and retail value of pirated material involved, whether the defendant uploaded material to the Internet, and whether the defendant had a leadership role in a larger criminal organization. Also, a defendant's sentence may be reduced if, for example, he had a minor role in the criminal operation, or he accepts responsibility for his illegal conduct. The single biggest factor in determining a sentence under the U.S. Sentencing Guidelines is the infringement amount attributable to the defendant. While your question correctly notes this, please understand that neither industry nor the government has the ability to dictate this amount. In determining the amount of damage, the United States must provide evidence of the number and value of the copyrighted works infringed by the defendant to the Probation Office and the court prior to sentencing. The United States must provide evidence to support its position such as evidence of the value of the pirated works infringed by the defendant, the number of times the pirated works were reproduced or distributed, or, in some instances, the amount of money the defendant earned from his illegal activity. At the same time, the defendant may introduce evidence to establish what he believes is the appropriate valuation for sentencing purposes. Neither the U.S. Probation Office, which ultim ately recommends a sentencing range to the court in what is known as a pre-sentence report, nor the sentencing judge is bound by the government's claimed damage amount. The government's recommendation for a particular sentence is subject to multiple checks and balances. It is not simply the by-product of numbers offered by industry. We have to support and defend our position in a court of law which is the way it should be. Finally, while people convicted of intellectual property crimes do face serious consequences for their actions, they are not treated more severely than violent criminals such as rapists. The vast majority of prosecutions of violent criminals take place at the state and local level, not the federal level, which is where DOJ s jurisdiction lies. However, in those instances where there are federal violent crimes, the penalties are more severe than those imposed for copyright infringement. For example, as mentioned, the *maximum* sentence you can receive for one count of copyright infringement is 60 months, while the *minimum* for someone convicted federally of aggravated sexual assault is generally between 70 to 87 months. ''$B%*%l%"%j!<!'(B'' $B;d$?$A$O$"$J$?$,Ds5/$7$?<ALd$r??LLL\$K<u$1;_$a$F$$$k$o$1$@$,!"<ALd$KEz$($kA0$K!"$I$&$7$F$3$N$h$&$J8m2r$,0lHLE*$K$J$C$F$7$^$C$?$N$+$K$D$$$FOC$r$5$;$F$[$7$$!#Bg3X @ 8C#$r4,$-9~$s$@:G6a$NAJ>Y$O!"A4JF%l%3!<%I9)6H2q!J"((BRIAA$B!K$N$h$&$JL14V$NCDBN$K$h$C$F5/$3$5$l$?L1;vAJ>Y$@$C$?!#;JK!>J$O$3$l$i$NAJ>Y$K$O4XCN$7$F$$$J$$!#;d$?$A$OL1;vAJ>Y$G$O$J$/!"7:;vAJ>Y$rDL$8$FO"K.CNE*:b;:8"K!$r<99T$7$F$$$k$N$@!#(B $B$"$J$?$O!"7:K!>e$NCNE*:b;:$K4X$9$kHH:a$X$N7:H3$,8=:_=E$9$.$k$7!"$+$D$=$l$,N"IU$1$N$J$$B;323[$K4p$E$$$F$$$k$H<gD%$7$F$$$k$M!#O"K.$K$*$$$FNL7:$r2]$9@)EY$O!"O"K.5D2q$HNL7:6(5D2q$,@)Dj$7$?$b$N$G$"$k$3$H$K$^$:Cm0U$7$FM_$7$$!#O"K.$N8!;!Ev6I$H$7$F!";d$?$A$O$3$l$i$NNL7:$K4X$9$k%,%$%I%i%$%s$r4p$K$7$F9TF0$7$F$$$k!#<!$K!"NL7:$K4X$9$k%,%$%I%i%$%s$O!"3$B19T0Y$K$h$C$FH/@8$7$??<9o$JB;32$rH?1G$7$?$b$N$J$N$@!#(B $B>e$K$"$k0lHVL\$N<ALd$KBP$9$k2sEz$G!";d$?$A$O3$B1HG$r:n$i$l$k$3$H$K$h$C$FB;32$r<u$1$?>.5,LO$J3+H/<T$NNc$r$R$H$D$@$15s$2$?!#$3$&$$$&;vBV$ODA$7$/$J$$!#:#F|%*%s%i%$%s$GMxMQ$G$-$k3$B1HG$N@=IJ$NNL$O$H$F$D$b$J$/B?$$!#;d$?$A$,3$B1HG$r:n$k9T0Y$rAJDI$7$F$$$k4V$K!"%=%U%H%&%'%"!"1G2h!"2;3Z$=$7$F%2!<%`$N3$B1HG$,(B20000$B%?%$%H%k0J>e3JG<$5$l$?%5!<%P$rH/8+$7$?$3$H$b$"$k!#$3$N$h$&$J%5!<%P$K$"$k!"Cx:n8"$GJ]8n$5$l$?@=IJ$N2ACM$O?tI4K|%I%k$K$N$\$k$3$H$b$"$k!#$3$l$@$1$N?t$NB;32$,H/@8$9$kMW0x$H$7$F!"@=IJ$,%$%s%?!<%M%C%H$rDL$8$FG[I[$5$l$F$$$k$?$a$K!"B;32A4BN$,HtLvE*$K3HBg$9$k$3$H$,5s$2$i$l$k!#NL7:$O$3$&$7$?B;32$rH?1G$7$?$b$N$J$N$@!#(B $B$5$i$K8@$&$H!"CNE*:b;:$K4X$9$kHH:a$K8B$i$:!"A4$F$NHH:a$K$*$$$FM^;_NO$,=EMW$JMWAG$H$J$k!#(B $B:G6a$^$G!"3$B1HG$r:n$k9T0Y$O=EBg$J$b$N$G$b$J$$$7!"C/$b=}$D$1$J$$$b$N$@$HB?$/$N?M$,?.$8$F$$$?!#:G6a$NAJ>Y$G2<$5$l$F$$$kNL7:$N$*$+$2$G!"$3$&$7$?0u>]$OJQ$o$j$O$8$a$F$$$k$7!"B>$N?M$,;w$?$h$&$J9T0Y$KAv$k$N$r;W$$$H$I$^$k$h$&$K$J$k$@$m$&!#(B $BK!N'$K$h$C$F!"0l7o$NCx:n8"?/32:a$K$h$C$FM-:aH=7h$r<u$1$??M$O!"(B5$BG/0J2<$ND(Lr$r2J$5$l$k!#!J>&6HE*$JMx1W!"$b$7$/$O8D?ME*$K6bA,$rF@$k0J30$NL\E*$G3$B1HG$r:n$C$?>l9g$O(BNET$BK!!J"((BNo Electronic Theft Act$B!'(B1997$BG/EE;R@`Ep6X;_K!!K$K4p$E$$$F(B3$BG/0J2<$ND(Lr$,2J$5$l$k!K$7$+$7!"<B:]$K5/$-$?HH:a$NHo9p$,<u$1$kNL7:$r7h$a$kMW0x$K$OMM!9$J$b$N$,$"$j!"3$B1HG$N@=IJ$NNL!"$=$l$K4^$^$l$k>.Gd2A3J!"Ho9p$,3$B1HG$N@=IJ$r%$%s%?!<%M%C%H$K%"%C%W%m!<%I$7$?$+$I$&$+!"Bg5,LO$JHH:aAH?%$G;XF3E*$JLr3d$rC4$C$F$$$?$+$I$&$+$,4^$^$l$k!#$^$?2>$K!"Nc$($PHo9p$NHH:aAH?%$K$*$1$kLr3d$,=EMW$G$J$$>l9g$d!"Ho9p$,0cK!9T0Y$KBP$9$k @ UG$$rG'$a$?>l9g$K$O7:$,8:7:$5$l$k!#(B $B%"%a%j%+$NNL7:$K4X$9$k%,%$%I%i%$%s$K4p$E$$$F7:H3$r7h$a$k:]$K!"M#0l$N!":G$b=EMW$JMW0x$H$J$k$N$O!"Ho9p$K5/0x$9$kCNE*:b;:8"?/32$N9g7W$,$I$l$/$i$$$"$C$?$+$H$$$&$3$H$@!#<ALd$G$O @ 5$K$3$NE@$KCmL\$7$F$$$k$o$1$@$,!";:6H3&$d9T@/$K$O$3$N9g7W$r7hDj$9$kG=NO$,$J$$!#Ho32$NAm3[$r7h$a$k;~!"%"%a%j%+9g=09q$OHo9p$K$h$C$F?/32$5$l$?Cx:n8"$GJ]8n$5$l$?:nIJ$N?t$H$=$N2ACM$N>Z5r$r!"NL7:<jB3$-$K @ hN)$C$F:[H==j5Z$SJ]8n4Q;!=j$KDs=P$7$J$1$l$P$J$i$J$$!#%"%a%j%+9g=09q$O<+$i$NN)>l$r4S$/$?$a$K!">Z5r$rDs=P$7$J$/$F$O$J$i$J$$!#$?$H$($PHo9p$K$h$C$F3$B1HG$,:n$i$l$?:nIJ$N2ACM!"3$B1HG$,J#@=$5$l$FHRI[$5$l$?2s?t$N$h$&$J$b$N$@!#$H$-$K$OHo9p$,0cK!9T0Y$K$h$C$FF@$?$*6b$N9g7W$N>Z5r$rDs=P$9$k$3$H$,$"$k!#(B $BF1;~$K!"Ho9pB&$O7:$r2J$9L\E*$K8+9g$C$?!"<+J,$, @ 5$7$$$H9M$($F$$$kHo32$NI>2A3[$r>Z5r$H$7$F=P$7$F$/$k$+$b$7$l$J$$!#:G=*E*$K$O!"$I$l$/$i$$$N7:H3$r2J$9$Y$-$+$rH=7hA0$N%l%]!<%H$H$$$&7A$G:[H==j$K4+9p$9$kJ]8n4Q;!=j!"$=$7$F7:H3$r2J$9H=7h$N$I$A$i$b!"@/I\$,<gD%$9$kB;32$NNL$K94B+$5$l$J$$!#FCDj$N7:H3$KBP$9$k@/I\$N4+9p$OJ#?t$NM^@ )5Z$S6Q9U$K$h$C$F94B+$5$l$F$$$k!#$=$NB;32$NNL$O!";:6H3&$,Ds6!$9$k?tCM$NC1$J$kI{;:J*$G$O$J$$!#;d$?$A$O:[H==j$G!"<+J,C#$,$H$k$Y$-$H$5$l$kN)>l$r4S$-!"B>$N43>D$+$i<+$i$r<i$i$M$P$J$i$J$$$N$@!#(B $B:G8e$K!"CNE*:b;:8"?/32$N:a$GM-:aH=7h$r<u$1$??M$O!"<+J,$?$A$N9TF0$K8+9g$C$?87$7$$7k2L$KD>LL$9$k$3$H$K$J$k$,!"H`$i$OIX=wK=9THH$N$h$&$J6'0-HH$[$I87$7$$07$$$r<u$1$F$$$k$o$1$G$O$J$$!#6'0-HH$K4X$9$kAJ>Y$NBgH>$O!";JK!>J$N4I3m8"$,5Z$VO"K.%l%Y%k$G$O$J$/!"=#$^$?$OCOJ}%l%Y%k$G9T$o$l$F$$$k!#$7$+$7!"O"K.%l%Y%k$G:[$+$l$k6'0-HH$N>l9g!"$=$N7:H3$OCNE*:b;:8"?/32$K4X$9$kHH:a$K2J$5$l$k$=$l$h$j$b$O$k$+$K=E$$$b$N$@!#$?$H$($P!"4{$K=R$Y$?$h$&$K!"(B1$B7o$NCx:n8"?/32$K$D$-2J$5$l$&$k7:$O(B''$B:GBg$G(B''60$B%v7n$@$,!"O"K.%l%Y%k$G:[$+$l$k @ -E*K=9T$K2J$5$l$k7:H3$O!"0lHL$K(B''$B:G>.$G(B''70$B%v7n$+$i(B87$B%v7n$N4V$K$J$k!#(B '''(translated by mumumu)''' **Q3)Question regarding the DMCA and copyright terms ''3) Question regarding the DMCA and copyright terms - by rhadamanthus'' If DRM-included hardware does become the law via the CBDTPA (SSSCA) or any other legislation, how does this interact with regards to copyright expiration? The DMCA makes it illegal to circumvent such DRM, thereby basically enforcing perpetual protection of the work. If the work is perpetually protected via this combination of law and technology, how can it be copyrighted legitimately, since the work will never *really* be able to join the public domain? This is analogous to trade secrets vs. patents, unless measures are taken to ensure the DRM encryption is removed once the copyright term is over. Or would that be illegal through the DMCA as well? The DMCA states, "No person shall circumvent a technological measure that effectively controls access to a work protected under this title." The title referred to is title 17 of the US Code, which covers copyright. I can therefore assume that removing copyright protections on expired copyrights would not be against the law. However , the DMCA also forbids the selling of tools to circumvent the very same DRM. I find it hard to believe that the RIAA/MPAA would let these tools become available regardless of the user's intent and/or rights under copyright expiration rules. Any comments about this apparent paradox? ''3) DMCA$B!J"(%G%8%?%k%_%l%K%"%`Cx:n8"K!!K$HCx:n8"$N4|8B$K4X$9$k<ALd(B - rhadamanthus$B$K$h$k(B'' DRM$B$,AH$_9~$^$l$?%O!<%I%&%'%"$,(BCBDTPA(SSSCA)$B!"$^$?$O$=$NB>$NN)K!9T0Y$K$h$C$F5AL3$K$J$C$F$7$^$&$H!"(BDRM$B$HCx:n8"$N<:8z$H$N4V$N4X78$O$I$N$h$&$K$J$k$G$7$g$&$+!)(B DMCA$B$O$=$&$$$C$?(BDRM$B$r1*2s$9$k9T0Y$r0cK!$H$7$F$$$k$?$a!"4pK\E*$K!":nIJ$N915WE*$JJ]8n$r6/@)$9$k$b$N$K$J$k$G$7$g$&!#$b$7$3$N$h$&$KK!$H5;=Q$,O"7H$7$F$7$^$&$H$J$k$H!"$=$N:nIJ$O(B''$B @ dBP$K(B''$B%Q%V%j%C%/%I%a%$%s$KCV$/$3$H$,$G$-$J$/$J$j$^$9(B[*]$B!#$h$C$F$3$&$7$?>l9g$K!"9gK!E*$KCx:n8"$r<hF@$9$k$K$O$I$&$7$?$i$h$$$N$G$7$g$&!)(B $B$R$H$?$SCx:n8"$,<:8z$9$k$H(BDRM$B$K$h$k0E9f2=$,2r=|$5$l$k$h$&$JBP:v$r;\$5$J$$$G$$$k$H!"FC5v$H4k6HHkL)$N4V$K$b;w$?$h$&$J4X78$, @ .N)$7$F$7$^$$$^$9(B[*]$B!#$=$l$H$b!"Cx:n8"$,<:8z$7$?;~$K(BDRM$B$K$h$k0E9f2=$r2r=|$9$k9T0Y$O(BDMCA$B$K>H$i$7$F$b0cK!$J$N$G$7$g$&$+!)(BDMCA$B$K$O!VK\JT$NFbMF$K$h$C$FJ]8n$5$l$?@=IJ$KBP$7$F!"%"%/%;%9$rM-8z$K5,@)$9$k5;=QE*$J<jCJ$r2??M$b1*2s$7$F$O$J$i$J$$(B[*]$B!W$HDj$a$i$l$F$$$^$9!#K\JT$H$$$&8l6g$O!"9g=09qK!Na=8Bh(B17$BJT$N$3$H$r;X$7$F$ *$j!"$3$l$OCx:n8"$NFbMF$rLVMe$7$F$$$^$9!#$=$l$f$($K!"Cx:n8"$,<:8z$7$?@=IJ$N%W%m%F%/%H$r2r=|$9$k9T0Y$OK!$KH?$7$F$$$J$$$H9M$($^$9!#$7$+$7!"(BDMCA$B$O!"B>$G$b$J$$(BDRM$B$r1*2s$9$k%D!<%k$rHNGd$9$k$3$H$r$b6X;_$7$F$$$^$9!#(BRIAA/MPAA$B$,!"Cx:n8"$,<:8z$7$?;~$N%k!<%k$K$N$C$H$C$F$$$k$H$$$&%f!<%6!<$N0U?^(B $B5Z$S(B/$B$^$?$O(B $B8"Mx$K$+$+$o$i$:!"$3$l$i$N%D!<%k$rMxMQ2DG=$K$9$k$H$O$H$F$b;W$($^$;$s!#$3$NL@$i$+$J5U @ b$K4X$7$F2?$+%3%a%s%H$rD:$1$^$9$+!)(B [* $B$=$N:nIJ$O(B''$B @ dBP$K(B''$B%Q%V%j%C%/%I%a%$%s$KCV$/$3$H$,$G$-$J$/$J$j$^$9!#(B / $B$=$N:nIJ$r(B''$B<B<AE*$K(B''$B%Q%V%j%C%/%I%a%$%s$KCV$/$3$H$O @ dBP$K$G$-$J$/$J$j$^$9!#(B / $B$=$N:nIJ$,(B''$B<B<AE*$K(B''$B%Q%V%j%C%/%I%a%$%s$K2C$o$k$3$H$O$"$j$($^$;$s!#(B ; $B!VI=LLE*$K$O%Q%V%j%C%/%I%a%$%s$K$J$k$1$I<B<AE*$K$O$=$&$J$i$J$$!"$H$$$&$3$H$b5/$3$k$@$m$&!W$H$$$&<gD%(B] [* $BFC5v$H4k6HHkL)$N4V$K$b;w$?$h$&$J4X78$, @ .N)$7$F$7$^$$$^$9!#(B / $BFC5v$*$h$S4k6HHkL)$N4X78$KN`;w$9$k$b$N$, @ .N)$7$F$7$^$$$^$9!#(B / $BFC5v$KBP$9$k4k6HHkL)$KN`;w$9$kB8:_$K$J$C$F$7$^$$$^$9!#(B ; $B!V!J;w$?$h$&$J4X78$,!KFC5v$H4k6HHkL)$N4V$K$b @ .N)$7$F$7$^$$$^$9!W$N$h$&$KFI$a$F$7$^$C$?!#(B2$BHVL\$NLuJ80F$OM&$_B-$N$h$&$J5$$b$9$k(B] [* $B!VK\JT$NFbMF$K$h$C$FJ]8n$5$l$?@=IJ$KBP$7$F!"%"%/%;%9$rM-8z$K5,@)$9$k5;=QE*$J<jCJ$r2??M$b1*2s$7$F$O$J$i$J$$!W(B / $B!VK\JT$N$b$H$KJ]8n$5$l$k:nIJ$X$N%"%/%;%9$r8z2LE*$K5,@)$9$k5;=QE*<jCJ$K$D$$$F!"2??M$b1*2s$7$F$O$J$i$J$$!W(B ; $BK!Na$NJ88@$H$7$F$O!VJ]8n$5$l$?!W$h$j$b!VJ]8n$5$l$k!W!VJ]8n$5$l$F$$$k!W$N$[$&$,<+A3$+$H;W$C$?!#(B ; $B!VM-8z$K5,@)$9$k(B/$B8z2LE*$K5,@)$9$k!W$K$D$$$F!#LuJ80F$G$O$H$j$"$($:!"2sEzItJ,$H$"$o$;$F!V8z2LE*$K5,@)$9$k!W$KE}0l$7$?(B] ''O$B!G(BLeary:'' I don t believe that the CBDTPA is under consideration in the current Congress, nor are we aware of other pending bills that would mandate the use of digital rights management systems. However, your question seems more focused on the DMCA, specifically the portions of the DMCA that govern anti-circumvention technologies, i.e. Section 1201 of Title 18. For purposes of answering this question, the term DMCA refers specifically to Section 1201. The DMCA prohibits trafficking (which includes manufacture, sale, distribution, importation, etc.) in tools (i.e., technologies, products, services, devices, etc.) that: (a) are primarily designed to circumvent, (b) are primarily marketed for use in circumventing, or (c) have limited commercially significant purpose or use other than circumventing, either one of the following: (1) a technological measure that effectively controls access to a work protected under this title [i.e., the Copyright Act] (see 18 U.S.C. Section) 1201(a)(2); or (2) a technological measure that effectively protects a right of a copyright holder under this title (see Section 1201(b(1)). The first type of control above will be referred to as an access control, the second as a copy control. In addition to the restrictions on trafficking, the DMCA also prohibits actual circumvention of access controls (see Sec. 1201(a)). The DMCA s main purpose is to help protect the rights of copyright holders. However, the DMCA was also designed in part to protect and preserve the rights of people who use copyrighted works. First, the DMCA expressly states that it is not intended to affect limitations on copyright or defenses to infringement such as fair use. Second, the DMCA contains a number of exceptions and exemptions that, for example, allow in some circumstances reverse engineering, encryption research, and certain actions by libraries and certain educational institutions. Third, while the DMCA prohibits the actual circumvention of access controls, it does not prohibit the actual circumvention of copy controls. As the district court in the Elcom case noted, Congress omitted a prohibition against circumventing copy controls specifically so that users could engage in fair use (and, presumably, to use works that enter the public domain). (See U.S. v. Elcom, Ltd., 203 F.Supp.2d 1111, 1020 (N.D.Cal. 2002) ). Your question deals with how the DMCA might affect works that have entered the public domain. As you know, copyright law grants copyright holders certain exclusive rights, such as the right to copy and distribute their work for a period of time. Currently, the length of the copyright term is the life of the author plus 70 years; for works made for hire, it is 95 years from first publication or 120 years from creation of the work (whichever comes first). After this term expires, works enter the public domain and are presumably available in some form that can be read, viewed, heard, etc., by the public. While a court could find that the DMCA allows the circumvention of protections on works in the public domain, the statute nonetheless prohibits trafficking in tools intended for use in circumventing controls on protected works. While those same tools could potentially be used to remove access or copy controls on works in the public domain, it may still be unlawful under the DMCA to traffic in them. We have not encountered any criminal case that involved this specific issue. Indeed, we are not aware of a court case either civil or criminal that has addressed this issue directly (although the district court in the Remeirdes case - the 2600 magazine case - acknowledged this issue, but because it was not central to the case before it, the court declined to elaborate). It is possible that the interplay between the DMCA and access to public domain works will be addressed through rule-making or legislation. The DMCA provides for a periodic review process by the Librarian of Congress, and the issue of circumvention of technological protections on public domain works was one of the issues raised in the most recent review session earlier this spring (See http://www.copyright.gov/1201/). ''$B%*%l%"%j!<!'(B'' $B;d$O(BCBDTPA$B$,:#$NO"K.5D2q$G8!F$Cf$@$H$O;W$o$J$$$7!"%G%8%?%kCx:n8"4IM}%7%9%F%`!J"((BDRM$B!K$r:NMQ$9$k$h$&5AL3IU$1$k$h$&$JB>$NK!0F$K$D$$$F$b;d$K$O$o$+$i$J$$!#$7$+$7$"$J$?$N<ALd$O(BDMCA$B!"FC$K5;=Q$r1*2s$9$k$3$H$r6X;_$9$k$h$&5,Dj$7$F$"$kItJ,!"$9$J$o$ABh(B18$BJT$N(B1201$B>r$K$h$jCmL\$7$F$$$k$h$&$@$M!#$3$N<ALd$KEz$($k$?$a$K!"(BDMCA$B$N!"FC$K(B1201$B>r$K$"$kMQ8l$N0UL#$K$D$$$FOC$r$7$h$&!#(B DMCA$B$O<!$N$h$&$J$b$N!J5;=Q!"@=IJ!"%5!<%S%9!"5!4oEy$r4^$`!K$NIT @ 5<h0z!J@=B$!"HNGd!"HRI[!"M"F~Ey!K$r6X;_$7$F$$$k!'(B (a) $B5;=QE*A<CV$r1*2s$9$k$3$H$r<g$?$kL\E*$H$7$F @ _7W$5$l$k$b$N(B (b) $B5;=QE*A<CV$r1*2s$9$k$3$H$KMxMQ$9$k$N$r<g$?$kL\E*$H$7$F(B $BHNGd$5$l$k$b$N!"$b$7$/$O(B (c) $B5;=QE*A<CV$r1*2s$9$k$3$H0J30$K$O!$$=$NL\E*5Z$SMxMQ$K$D$$$F!$(B $B>&6HE*$K$[$H$s$I0UL#$N$J$$$b$N(B $B5;=QE*A<CV$H$O<!$N$$$:$l$+$G$"$k!#(B (1) $BK\JT!JCx:n8"K!$N$3$H!"9g=09qK!Na=8$NBh(B18$BJT$r;2>H!K(B 1201$B>r(Ba$B9`(B2$B9f$K$h$jJ]8n$5$l$kCx:nJ*$X$N%"%/%;%9$r8z2LE*$K(B $B4IM}$9$k5;=QE*A<CV!"$b$7$/$O(B (2) $BK\JT!J(B1201$B>r(Bb$B9`(B1$B9f$r;2>H!K$K$h$C$FCx:n8"$rJ];}$7$F$$$k(B $B?M$N8"Mx$rJ]8n$9$k5;=QE*A<CV(B $B>e$K$"$k$O$8$a$N%?%$%W$N5,@)$O%"%/%;%9@)8B$K4X$7$F8 @ 5Z$7$F$*$j!"Fs$DL\$N%?%$%W$O%3%T!<$N@)8B$K4X$7$F8 @ 5Z$7$F$$$k!#IT @ 5<h0z$N@)8B$K2C$($F!"(BDMCA$B$O%"%/%;%9@)8B$rL@<(E*$K1*2s$9$k$3$H$b6X;_$7$F$$$k(B[*]$B!#!J(B1201$B>r(Ba$B9`$r;2>H!K!!(BDMCA$B$N<g$JL\E*$OCx:n8"$rJ];}$7$F$$$k?M$N8"Mx$r<i$k$3$H$@!#$7$+$7(BDMCA$B$O$"$kItJ,$GCx:n8"$GJ]8n$5$l$?:nIJ$r;H$&?M!9$N8"Mx$bJ]8n$7!"$+$D$=$l$r0];}$7$F$$$k$N$@!#(B [* $B>e$K$"$k$O$8$a$N%?%$%W$N5,@)$O%"%/%;%9@)8B$K4X$7$F8 @ 5Z$7$F$*$j!"Fs$DL\$N%?%$%W$O%3%T!<$N@)8B$K4X$7$F8 @ 5Z$7$F$$$k!#IT @ 5<h0z$N@)8B$K2C$($F!"(BDMCA$B$O%"%/%;%9@)8B$rL@<(E*$K1*2s$9$k$3$H$b6X;_$7$F$$$k!#(B / $B>e$K$"$k$O$8$a$N%?%$%W$N5,@)$O%"%/%;%95,@)$K4X$7$F8 @ 5Z$7$F$*$j!"Fs$DL\$N%?%$%W$O%3%T!<5,@)$K4X$7$F8 @ 5Z$7$F$$$k!#IT @ 5<h0z$N@)8B$K2C$($F!"(BDMCA$B$O%"%/%;%95,@)$rL@<(E*$K1*2s$9$k$3$H$b6X;_$7$F$$$k!#(B ; $BEv=i$NLu$G$O!V(Bcontrol$B!W$r!V5,@)!W!V4IM}!W!V@)8B!W$HLu$7J,$1$F$$$k$,!"$H$j$"$($:(B $B!V(Baccess ''control''$B!W"*!V%"%/%;%9(B''$B5,@)(B''$B!W!"(B $B!V(Bthe ''restrictions'' on trafficking$B!W"*!VIT @ 5<h0z$N(B''$B@)8B(B''$B!W!"(B $B!V(BDigital Rights ''Management''$B!W"*!V%G%8%?%k8"Mx(B''$B4IM}(B''$B!W!"$N$h$&$K$7$?!#$H$j$"$($:(B(3)$B$N<ALd2sEz$K$D$$$F$@$1!"$3$NJQ99$rLuJ8$KH?1G$5$;$?(B] $B$^$:Bh0l$K!"(BDMCA$B$OCx:n8"$K4X$9$k@)8B$d!"%U%'%"%f!<%9$N$h$&$J?/32$KBP$9$k93J[$K1F6A$r5Z$\$9$3$H$r0U?^$7$F$$$J$$$HL@<(E*$K=R$Y$F$$$k(B[*]$B!#BhFs$K!"(BDMCA$B$K$O$?$/$5$s$NNc305Z$SLH=|5,Dj$,$"$k!#$?$H$($P(BDMCA$B$O!"$"$k>u67$K$*$1$k%j%P!<%9%(%s%8%K%"%j%s%0$d0E9f2=$K4X$9$k8&5f!"0lDj$N650i5!4X$d?^=q4[$K$*$1$k0lIt$N9TF0$r5v2D$7$F$$$k!#Bh;0$K!"(BDMCA$B$O%"%/%;%95,@)$r<B:]$K1*2s$9$k$3$H$r6X$8$F$$$k$,!"%3%T!<5,@)$r<B:]$K1*2s$9$k$3$H$O6X$8$F$$$J$$!#(BElcom$BAJ>Y$K$*$$$FCOJ}:[H==j$,=R$Y$F$$$k$h$&$K!"O"K.5D2q$O!"FC$K%f!<%6!<$,%U%'%"%f!<%9$N8"Mx$r9T;H$G$-$k$k$h$&$K!J$+$D!"$*$=$i$/$@$,%Q%V%j%C%/%I%a%$%s$KB0$9$kCx:nJ*$r;HMQ$G$-$k$h$&$K!K%3%T!<$KBP$9$k@)8B$r1*2s$9$k$3$H$X$N6X;_5,Dj$r:o=|$7$?!#(B(U.S. v. Elcom, Ltd., 203 .Supp.2d 1111, 1020 N.D.Cal. 2002)$B$r;2>H(B) [* $B$^$:Bh0l$K!"(BDMCA$B$OCx:n8"$K4X$9$k@)8B$d!"%U%'%"%f!<%9$N$h$&$J?/32$KBP$9$k93J[$K1F6A$r5Z$\$9$3$H$r0U?^$7$F$$$J$$$HL@<(E*$K=R$Y$F$$$k!#(B / $B$^$:Bh0l$K!"(BDMCA$B$OCx:n8"$K4X$9$k@)8B$d?/32$KBP$9$k93J[!"$?$H$($P%U%'%"%f!<%9$J$I$K1F6A$r5Z$\$9$3$H$r0U?^$7$F$$$J$$$HL@<(E*$K=R$Y$F$$$k!#(B / $B$^$:Bh0l$K!"(BDMCA$B$G$OL@<(E*$K!"Cx:n8"$K4X$9$k@)8B$d?/32$KBP$9$k93J[$?$H$($P%U%'%"%f!<%9$J$I$K1F6A$r5Z$\$9$3$H$r0U?^$7$F$$$J$$!"$H=R$Y$i$l$F$$$k!#(B ; $B!V!X%U%'%"%f!<%9$N$h$&$J?/32!Y$KBP$9$k93J[$K(B...$B!W$HFI$a$F$7$^$C$?!#!VCx:n8"$K4X$9$k@)8B!W!V?/32$KBP$9$k93J[!W$N0lNc$,!V%U%'%"%f!<%9!W(B...$B$HFI$a$k$b$N$K$J$k$h$&9M$($?$1$l$I!"LuJ80F$b$&$^$/AH$_N)$F$i$l$F$$$J$$5$$,$9$k(B] $B$"$J$?$N<ALd$O!"%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$K(BDMCA$B$,$I$&1F6A$rM?$($k$+$K$D$$$F07$C$F$$$k!#CN$C$F$N$H$*$j!"Cx:n8"K!$OCx:nJ*$r%3%T!<$7$FHRI[$9$k8"Mx$K$D$-!"Cx:n8"<T$KGSB>E*8"Mx$r0lDj4|4VM?$($F$$$k!#8=:_!"Cx:n8"$NB8B34|4V$OCx:n8"<T$,;`K4$7$F$+$i(B70$BG/$@!#C"$7?&L3>e:n @ .$5$l$?Cx:nJ*$K4X$7$F$O!"$O$8$a$F8x3+$5$l$?$H$-$+$i(B95$BG/4V!":n @ .$5$l$?$H$-$+$i(B120$BG/4V$@!J4|4V$,C;$$J}$,M%@h$5$l$k!K!#$3$N4|4V$,2a$.$k$H!"Cx:nJ*$O%Q%V%j%C%/%I%a%$%s$KCV$+$l!"FI$s$@$j8+$?$jJ9$$$?$j$G$-$k7ABV$G8x=0$KMxMQ2DG=$K$J$k$H;W$o$l$k!#(B DMCA$B$,!"%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$NJ]8n$r1*2s$9$k$3$H$r5v2D$7$F$$$k$H$$$&H=7h$r:[H==j$,2<$92DG=@-$b$"$k$,!"$=$l$G$bK!$OJ]8n$5$l$?Cx:nJ*$N5,@)$r1*2s$9$k$3$H$r0U?^$7$F;H$o$l$k$b$N$rIT @ 5$K<h0z$9$k$3$H$r6X$8$F$$$k(B[*]$B!#$3$l$i$HF1$8$b$N$,!"%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$N%3%T!<5,@)$d%"%/%;%95,@)$r2r=|$9$k$?$a$K;H$o$l$k2DG=@-$b$"$k$,!"(BDMCA$B$K>H$i$9$H$3$l$i$r<h0z$9$k$3$H$OL$$@0cK!$H$J$k$@$m$&!#(B [* DMCA$B$,!"%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$NJ]8n$r1*2s$9$k$3$H$r5v2D$7$F$$$k$H$$$&H=7h$r:[H==j$,2<$92DG=@-$b$"$k$,!"$=$l$G$bK!$OJ]8n$5$l$?:nIJ$N5,@)$r1*2s$9$k$3$H$r0U?^$7$F;H$o$l$k$b$N$rIT @ 5$K<h0z$9$k$3$H$r6X$8$F$$$k!#(B / DMCA$B$O%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$NJ]8n$r1*2s$9$k$3$H$r5v2D$7$F$$$k!"$H$$$&H=7h$r:[H==j$,2<$92DG=@-$b$"$k$,!"$=$l$G$bK!Na$O!"J]8n$5$l$F$$$kCx:nJ*$N5,@)$r1*2s$9$k$3$H$r0U?^$7$F;H$o$l$k$b$N$rIT @ 5$K<h0z$9$k$3$H$r6X$8$F$$$k!#(B ; $B!V:[H==j$,$9$k$+$b$7$l$J$$H=CG!W$H!V @ .J82=$5$l$F$$$kK!5,!W$NBPN)$K$D$$$F=R$Y$F$$$k$N$G!"$=$l$,:]N)$D$h$&$KFIE @ 0LCV$rD4 @ 0$7!"!VK!!W$r6qBNE*$K!VK!Na!W$H$7$?!#(B ; $B2sEzItJ,$N!V(Bwork$B!W$O!"$3$NItJ,$N8eH>!V$=$l$G$bK!$OJ]8n$5$l$?:nIJ$N5,@)!W0J30$G$O!VCx:nJ*!W$H$J$C$F$$$?$N$G!"!VCx:nJ*!W$KE}0l$7!"$=$l$K$D$$$F$OK\J8$KH?1G$5$;$?!#!V(Bwork$B!W"*!V:nIJ!W!"!V(Bcopyrighted work$B!W"*!VCx:nJ*!W$G$b$$$$$+$J!)$H$b;W$C$?$1$I!"$3$N8e$N<ALd$H2sEz$r$A$c$s$HFI$s$G$J$$$N$GH=CG$G$-$:!#$3$l$h$jA0$G!V(Bwork$B!W"*!V@=IJ!W$H$J$C$F$$$kItJ,$b$"$C$?$,!"!V(Bproduct$B!W"*!V@=IJ!W!"!V(Bwork$B!W"*!VCx:nJ*(B/$B:nIJ!W$G$$$$$H;W$&!#(B] $B;d$?$A$O!"$3$NFC0[$JLdBj$r07$C$?7:;v;v7o$K=P2q$C$?$3$H$,$J$$!#(B $B<B:]!"L1;v;v7o$K$*$$$F$b7:;v;v7o$K$*$$$F$b!"$3$NLdBj$rD>@\07$C$?:[H=;vNc$r;d$?$A$OCN$i$J$$$N$@!#!J;(;o!V(B2600$B!W$N:[H=$GO"K.CO:[$O$3$NLdBj$rG'CN$7$F$$$?$,!"Cf?4E*$JLdBj$G$O$J$+$C$?$?$a$K?<F~$j$9$k$N$r$d$a$F$$$?!#!K(B $B%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$X%"%/%;%9$9$k$3$H$H!"(BDMCA$B$H$NAj8_:nMQ$K$D$$$F$O!"N)K!$b$7$/$O5,B'$r@)Dj$9$k>l$G07$o$l$k2DG=@-$,$"$k!#(BDMCA$B$OO"K.5D2q$N;J=q$K$h$C$FDj4|E*$K8+D>$7$,9T$o$l$F$*$j!"%Q%V%j%C%/%I%a%$%s$KCV$+$l$?Cx:nJ*$K$+$1$i$l$?5;=QE*$J%W%m%F%/%H$r1*2s$9$kLdBj$O!":#G/$N=U @ h$K9T$o$l$?:G?7$N8!F$2q5D$G$b<h$j>e$2$i$l$F$$$k!#(B(http://www.copyright.gov/1201/$B$r;2>H!K(B '''(translated by mumumu)''' **Q4)Going Native? ''4) Going Native? - by Andy_R '' Here in Britain, we recently shut down the governemental body that regulated our train services because they were tending to take the side of the small number of contact personnel at the train companies that they dealt with on a day to day basis rather than the side of the faceless multitiude of passengers who they only knew through a few angry mails. Given that your department will (in the vast majority on cases) be working on behalf of a very very small number of copyright-holding organisations against potentially millions of nearly anonymous file sharers, how will you prevent this 'going native' phenomenon biasing your investigations in favour of people you having a close working relationship with, and how will you defend yourselves against the inevitable accusations that you have 'gone native' and are a 'private police force' for the copyright holders? ''4)$B?F$7$$?M$N8*$r;}$D$3$H$,$"$j$^$9$+(B? - Andy_R$B$K$h$k(B'' $B$3$3%$%.%j%9$G$O!"EE<V$N1?9T$r4IM}$7$F$$$?9T@/$,JD:?$KDI$$9~$^$l$F$$$^$9!#$J$<$J$i9T@/B&$O!"(B2,3$BDL$N6l>p%a!<%k$rDL$8$F=i$a$FB8:_$rCN$k$h$&$J!"4i$,8+$($J$$Bg@*$N>h5R$G$O$J$/$F(B[*]$B!"F|!9<h0z$7$F$$$k>/?t$NE4F;2q<R$NC4Ev<T$KL#J}$9$k798~$,$"$C$?$+$i$G$9!#(B [* $B$5$i$K0ULu$G$9$,!V0lDL$N6l>p%a!<%k$0$i$$$G$OL5;k$5$l$F$7$^$&$h$&$J!"4i$N8+$($J$$Bg@*$N>h5R$G$O$J$/$F!W$J$I$G$O$I$&$G$7$g$&$+!)(B] $B2>$K$"$J$?$NIt=p$,!JBgItJ,$N;v7o$K$*$$$F!K$[$s$N$o$:$+$J?t$NCx:n8"$rJ];}$7$F$$$kAH?%$N$?$a$K!"@x:_E*$K?tI4K|$b$N?M?t$,$$$F!"$[$H$s$IF?L>$G%U%!%$%k6&M-$r9T$C$F$$$k?M!9$HBPN)$7$FF/$$$F$$$k$H$9$k$H!"$"$J$?$H6[L)$J4X78$rJ]$C$FF/$$$F$$$k?M!9$NL#J}$r$7$FA\::$,JP$C$F$7$^$&!V%M%$%F%#%V2=!W8=>]$r$I$&$d$C$F2sHr$9$k$*$D$b$j$G$9$+!)!!$=$7$FCx:n8"J];}<T$K!VL#J}!W$7$F!"H`$i$N$?$a$N!V;dE*$J7Y;!8"NO!W$K$J$j2<$,$C$F$k$8$c$J$$$+$H$$$&!"$"$J$?J}$,Hr$1$FDL$l$J$$HcH=$r$I$&$d$C$F$+$o$9$*$D$b$j$G$9$+!)(B ''O$B!G(BLeary:'' You ask an excellent question: how do we, as federal prosecutors, ensure that we retain independent judgment throughout the prosecutorial process? The decision to bring any criminal prosecution is significant and has serious consequences. For this reason, although we work with victims frequently, we work diligently to preserve our independent prosecutorial decision-making authority. As attorneys for the Department of Justice, our mission is to enforce the laws fully and fairly on behalf of the people of the United States. This is a responsibility we take very seriously. While we work with a wide range of victims, from large multi-national corporations to small mom and pop businesses, the ultimate responsibility for making prosecutorial decisions remains solely with us. Throughout the criminal justice process, there are checks on how we exercise our authority, including the citizens of the grand jury (who can reject our allegations), judges (who can dismiss charges or rule evidence inadmissible), and ultimately the citizens on the trial jury (who can acquit the defendant). However, even though these checks and balances are in place, from our perspective, it is still our responsibility to maintain appropriate boundaries at all times. As a result, we try always to exercise independent, unbiased prosecutorial judgment when reviewing cases referred to our office for prosecution. Although you may not hear about it, we frequently decide not to move forward with criminal charges even in instances where the victim wants us to do so. The public doesn't hear about the prosecutions that are declined, only those that go forward. The decision to prosecute or not is a decision based upon a full and independent evaluation of the facts, the evidence, and the law. By maintaining this standard, we work to preserve the integrity of the criminal justice process. ''$B%*%l%"%j!<!'(B'' $BO"K.8!;!41$H$7$F$N2f!9$,!"AJDI$N2aDx$GFHN)$7$?H=CG$r$I$&$d$C$F0];}$7$F$$$k$N$+$H$$$&<ALd$@$M!#$9$P$i$7$$<ALd$@!#7:;vAJDI$r9T$&$+$I$&$+$r7hDj$9$k$3$H$O$H$F$b=EMW$G$"$j!"=EBg$J7k2L$r$b$?$i$9$b$N$@!#$h$C$F2f!9$OHo32<T$HIQHK$KF/$$$F$$$k$,!"AJDI$r9T$&$+$I$&$+$r7h$a$k8"8B$NFHN)@-$r<i$k$?$a$K5$$r$D$1$FF/$$$F$$$k!#(B $B;JK!>J$N8!;!41$H$7$F$N2f!9$NG$L3$O!"%"%a%j%+9g=09q$N9qL1$rBeI=$7$FK!$r==J,$+$D8x @ 5$K<99T$9$k$3$H$@!#$3$N @ UL3$r2f!9$O=E$/<u$1;_$a$F$$$k!#2f!9$O5pBg$JB?9q @ R4k6H$+$i2HB27P1D$N;v6H<T$K;j$k$^$G!"9-HO$K$o$?$kHo32<T$HF/$$$F$$$k$,!"AJDI$r$9$k$+$I$&$+$N7hDj$K4X$9$k:G=*E*$J @ UG$$O2f!9$@$1$K$"$k!#(B $B7:;v:[H=$N%W%m%;%9A4BN$rDL$7$F!"2f!9$,$I$N$h$&$K8"8B$r9T;H$7$F$$$k$+$O%A%'%C%/$5$l$F$$$k!#%A%'%C%/$r9T$&?M!9$K$O!"BgGf?3$K;22C$7$F$$$k;TL1!JH`$i$O2f!9$N<gD%$r5qH]$9$k$3$H$,$G$-$k!K$d!":[H=41!JH`$i$O5/AJ$r5Q2<$7$?$j!"<u$1F~$l$i$l$J$$>Z5r$rM^@)$9$k!K!"$=$7$F:G=*E*$K$O>.Gf?3$K;22C$7$F$$$k;TL1!JH`$i$OHo9p$KL5:a$NI>7h$r2<$9$3$H$,$G$-$k!K$,4^$^$l$k!#$7$+$7;dC#$+$i8+$FH`$i$K$h$kM^@)$H6Q9U$,F/$$$F$$$k$h$&$K8+$($F$b!"E, @ Z$J@~0z$-$r>o$K0];}$7$F$$$/@UG$$O$$$^$@2f!9$K$"$k(B[*]$B!#(B [* $B$7$+$7;dC#$+$i8+$FH`$i$K$h$kM^@)$H6Q9U$,F/$$$F$$$k$h$&$K8+$($F$b!"E, @ Z$J@~0z$-$r>o$K0];}$7$F$$$/@UG$$O$$$^$@2f!9$K$"$k!#(B / $B$7$+$7H`$i$K$h$kM^@)$H6Q9U$,F/$$$F$$$k$H$O$$$C$F$b!"<+$i$N8+2r$H$7$F!";dC#$K$OE, @ Z$J@~0z$-$r>o$K0];}$7$F$$$/@UG$$,$"$k$H9M$($F$$$k!#(B / $B$7$+$7!"H`$i$K$h$kM^@)$H6Q9U$,F/$$$F$$$k$H$O$$$C$F$b!"E, @ Z$J@~0z$-$r>o$K0];}$7$F$$$/$N$O<+?H$N @ UG$$@$H$$$&$N$,!";dC#$N8+2r$@!#(B ; $B86J8$N!V(Bfrom our perspective,$B!W$H$$$&$N$OJ8$N8eH>!"$^$?$OA08eH>N>J}$K$+$+$C$F$$$k$+$H;W$$$^$7$?!#(B] $B7k2LE*$K!"2f!9$O<+J,C#$NIt=p$,AJDI$9$k$h$&$K$$$o$l$?;v7o$r8+D>$9:]$K!"AJDI$9$k$+$I$&$+$K4X$7$F!"FHN)$7$?!"JP$j$,$J$$H=CG$r$$$D$b$7$h$&$H$7$F$$$k!#J9$$$?$3$H$,$J$$$+$b$7$l$J$$$,!"5>@7<T$,7:;vAJDI$rK>$s$G$$$k;v7o$G$"$C$F$b!"7:;vAJDI$r9T$o$J$$$H$N7hDj$r;~!9$9$k$3$H$,$"$k(B[*]$B!#AJDI$9$k$+$7$J$$$+$N7hDj$O!";v<B!">Z5r!"$=$7$FK!$KBP$9$k==J,$+$DFHN)$7$?I>2A$K4p$E$$$F$$$k!#2f!9$O7:;v:[H=$N<jB3$-$N9b7i$5$r<i$k0Y$K!"$3$N4p=`$r<i$j$J$,$iF/$$$F$$$k$N$@!#(B[*] [* $B7:;vAJDI$r9T$o$J$$$H$N7hDj$r;~!9$9$k$3$H$,$"$k!#(B / $B7:;vAJDI$r9T$o$J$$$H7hDj$9$k$3$H$OEY!9$"$k!#(B] [* $B2f!9$O7:;v:[H=$N<jB3$-$N9b7i$5$r<i$k0Y$K!"$3$N4p=`$r<i$j$J$,$iF/$$$F$$$k$N$@!#(B / $B$3$N4p=`$r<i$k$3$H$K$h$C$F2f!9$O!"7:;v:[H=$N<jB3$-$N9b7i$5$r<i$k$Y$/EX$a$F$$$k$N$@!#(B ; $B$I$C$A$G$b$$$$$+$b$7$l$J$$!#$O$O$O!#(B] '''(translated by mumumu)''' **Q5)Background ''5) Background - by TrekkieGod'' Given that as IP lawyers at CCIPS part of your responsibilities is not only enforcing current laws, but also "reviewing new policy proposals, legislation, or international agreements related to IP", I'd like to know something about your overall technical background. A frequent gripe with the geeks here at Slashdot, myself included, is that apparently legislators are not sufficiently well informed to create IP laws, frequently proposing and enacting laws which either constrain individual rights in favor of protecting those of big corporations (like the DMCA), or are simply not effective, because they can never patch the frequently referred to "analog hole" which is always a required step for humans to get to the information. Given that for ethical reasons, you may not give your honest opinion on said legislation since you are required to enforce them, I'd simply like to know if I can trust that you are sufficiently well-informed to give council on these ever emerging new IP legislations. Do you feel that you truly have sufficient technical experience as opposed to your obvious legal ones? Can you elaborate on what type of experience you feel helps to qualify you to truly understand the ramification of these legislations? ''5) $B5;=QE*GX7J(B - TrekkieGod$B$K$h$k(B'' CCIPS$B$GCNE*:b;:8"$r07$&K!N'2H$H$7$F$N$"$J$?$N @ UL3$N$R$H$D$,!"8=9T$NK!$r<99T$9$k$3$H$@$1$G$O$J$/$F!"!V?7$7$$@/:v$dN)K!!"$b$7$/$OCNE*:b;:8"$K4X$9$k9q:]6(Dj$r%l%S%e!<$9$k$3$H!W$K$"$k$H$9$k$H!";d$O$"$J$?$N5;=QE*$JGX7J$K$D$$$F$$$/$D$+CN$j$?$$$H;W$C$F$$$^$9!#(B $B;d$r4^$`(BSlashdot$B$K$$$k(BGeek$BC#$O!"<!$N$h$&$JITK~$r;~!9O3$i$7$^$9!V5D0wC#$OCNE*:b;:8"$K4X$9$k$NN)K!$K==J,@:DL$7$F$$$J$$$7!"(B(DMCA$B$N$h$&$J!KBg4k6H$N8"Mx$rJ]8n$9$k$?$a$K8D?M$N8"Mx$r@)8B$9$kK!N'$rDs0F$7!"@.N)$5$;$?$j$b$9$k!#!W$b$7$/$O!"!V;~!98@$o$l$F$$$k!"?M4V$,>pJs$rF@$k$N$K>o;~I,MW$J%9%F%C%W$G$"$k(B"$B%"%J%m%0%[!<%k(B"$BLdBj$K%Q%C%A$r$"$F$k$3$H$b @ dBP$G$-$J$$$s$@$+$i!"C1$KE[$i$,L5G=$J$@$1$8$c$J$$$N!W$H!#(B $BNQM}E*$JM}M3$G!"K!$r<99T$7$J$1$l$P$J$i$J$$$+$iOCBj$K>e$C$F$$$kN)K!$K4X$7$FN(D>$J0U8+$r=R$Y$F$O$$$1$J$$$H$$$&$N$G$"$l$P!":#$^$G$K=P8=$7$??7$7$$CNE*:b;:8"$K4X$9$k$3$l$i$NN)K!$K4X$7$F%"%I%P%$%9$r$G$-$k$[$I!"$"$J$?$,N)K!$K==J,@:DL$7$F$$$k$H;d$,?.$8$F$h$$$N$+$I$&$+$@$1$r65$($F$/$@$5$$!#K!N'$N7P83$HHf3S$7$F!"$"$J$?$O==J,$K5;=QE*$J7P83$rK\Ev$K @ Q$s$G$$$k$H<+J,$G46$8$F$$$^$9$+!)(B $B$3$l$i$NN)K!$K4X$9$kLdBj$rK\Ev$KM}2r$G$-$k$[$I$N;q<A$r;}$D=u$1$K$J$C$F$$$k$H<+J,$G46$8$F$$$k7P83$O2?$J$N$+>\$7$/@bL@$G$-$^$9$+!)(B ''O$B!G(BLeary:'' Interesting question. While we are all lawyers at CCIPS, we come to our current positions from a wide range of backgrounds. We have attorneys who have policy and legislative experience. Other attorneys are former Assistant United States Attorneys with years of criminal trial experience. Others came from civil practice before joining the Criminal Division, and a number of us represented technology companies in private practice. Still others have substantial technical backgrounds apart from being lawyers. As a general rule, however, almost everyone in CCIPS is curious about technology and how it intersects with the law. Our interest in technology explains why so many of us are frequent Slashdot readers, and why working at CCIPS sparked our interest in the first place. One of the biggest misconceptions we confront regularly is that because we are law enforcement we must be opposed to technological innovation. This is simply not the case. The benefits of technology are numerous. We support and enjoy them. Yet, just as law enforcement must conduct itself so as not to unduly limit innovation, so too must we respond when technology is misused for illegal purposes. Because of our interest in technology and its effect on the laws we prosecute, the attorneys assigned to prosecute IP crimes spend time learning about new technologies as they are developed. This helps us not only keep pace with the latest innovations, but enhances our investigative and prosecutorial skills as well. As your question suggests, you can t determine how (or if) the law applies to technology unless you understand how the technology works. We learn a great deal about technology in the course of online investigations, many of which involve extremely sophisticated technology. We are also trained on an ongoing basis on various aspects of networks and technology in order to continue to develop and refine our skills. Finally, we draw upon the knowledge and perspective of technical experts from the investigative agencies as well as from the private sector. All of these factors combine to give us a better perspective on the relationship between law and technology. We are frequently called upon to review and consider various legislative proposals. In instances where we are asked to comment on a proposal, we have the requisite technical and legal background necessary to provide a detailed and comprehensive analysis of the proposed legislation. We view providing this type of input as one of our core responsibilities, and we work very hard to stay in touch with emerging technologies for this very reason. Thanks for your question. $B6=L#?<$$<ALd$@!#2f!9$OA40w(BCCIPS$B$K=jB0$9$kK!N'2H$@$,!"MM!9$J7PNr$r;}$D?M$?$A$,:#$NCO0L$K$D$$$F$$$k!#2f!9$O@/:v$NDs8@$dN)K!:n6H$N7P83$,$"$k8!;v$N=8CD$@!#B>$NIt=p$N8!;v$O!"7:;v:[H=$N7P83$r?tG/@Q$s$G$$$kO"K.8!;v$N%"%7%9%?%s%H$r$+$D$F$d$C$F$$$?!#7:;v;v7o$r07$&It=p$KG[B0$5$l$k0JA0$K!"L1;v$NJ[8n;N6HL3$r$d$C$F$$$?<T$b$$$k$7!"2f!9$N$&$A$NB?$/$O!"FH<+$K3+6H$7$F5;=Q4XO"2q<R$NBeM}?M$rL3$a$F$$$?!#K!N'2H$H$7$F$N7P83$H$OJL$K!"5;=QE*$J7PNr$r$+$J$j;}$D$b$N$b$$$k!#0lHLE*$J86B'$H$7$F!"(BCCIPS$B$K$$$k<TC#$NKX$I$O!"5;=Q!"5Z$S$=$l$,$I$N$h$&$KK!$H8r:x$9$k$+$K6/$$4X?4$,$"$k!#2f!9$,5;=Q$KBP$7$F4X?4$r;}$C$F$$$k$H$$$&$3$H$O!"2f!9$N$&$A$NB?$/$,(BSlashdot$B$N>oO"$G$"$k$3$H$d!"$=$b$=$b(BCCIPS$B$GF/$/$3$H$G5;=Q$K4X$9$k6=L#$,$+$-$?$F$i$l$k$H$$$&$3$H$G @ bL@$G$-$k!#(B $B2f!9$,<u$1$k:GBg$N8m2r$N$R$H$D$O!"K!$r<99T$7$F$$$k$,$f$($K!"2f!9$O5;=Q3W?7$KH?BP$7$J$/$F$O$J$i$J$$$H$$$&$b$N$@!#7h$7$F$=$s$J$3$H$O$J$$!#5;=Q$,M?$($F$/$l$kMx1W$OG|Bg$J$b$N$,$"$k!#2f!9$O5;=Q3W?7$r%5%]!<%H$7!"$=$NMx1W$r5}<u$7$F$$$k!#$@$,!"5;=Q3W?7$rITEv$KK8$2$J$$$h$&K!$N<99T$r9T$o$J$1$l$P$J$i$J$$$N$HF1MM$K!"5;=Q$,0cK!$J$d$jJ}$G8m$C$F;H$o$l$?>l9g$K$b2f!9$OH?1~$7$J$1$l$P$J$i$J$$$N$@!#(B $BCNE*:b;:8"$K4X$9$kHH:a$rAJDI$9$k$h$&L?$8$i$l$k8!;vC#$O!"@8$_=P$5$l$??7$?$J5;=Q$r3X$V$3$H$KBt;3$N;~4V$rHq$9!#$J$<$J$i5;=Q!"$=$7$F<99T$9$kK!$K5;=Q$,$I$&1F6A$9$k$+$K4X?4$r;}$C$F$$$k$+$i$@!#$3$&$9$k$3$H$G!":G?7$N5;=Q3W?7$N%Z!<%9$K$D$$$F$$$/$3$H$@$1$G$J$/!"D4::5Z$SAJDI$N%9%-%k$r$"$2$k$3$H$K$bLrN)$D!#$"$J$?$,<ALd$G8 @ 5Z$7$F$$$k$h$&$K!"%*%s%i%$%s>e$GD4::$r$7$F$$$k2aDx$G$b2f!9$O5;=Q$K4X$7$FB?$/$N$3$H$r3X$s$G$$$k$7!"$7$+$b$=$NB?$/$OHs>o$K @ vN}$5$l$?$b$N$@!#2f!9$O<+J,$N%9%-%k$rKa$-!"@vN}$5$l$?$b$N$K$7B3$1$k$?$a$K!"MM!9$JJ}LL$N%M%C%H%o!<%/$d5;=Q$K4X$7$F7QB3E*$K%H%l!<%K%s%0$r=E$M$F$b$$$k!#:G8e$K!"2f!9$OL14V4k6H$@$1$G$J$/!"@/I\$ND4::5!4X$K$$$k5;=Q$N%(%-%9%Q!<%H$NCN8+$b;29M$K$7$F$$$k!#(B $B$3$l$i$NMW0xA4$F$,$"$$$^$C$F!"2f!9$KK!$H5;=Q$N4X78$K4X$9$k$h$jNI$$;kLn$rM?$($F$/$l$k!#2f!9$O$h$/MM!9$JN)K!$NDs0F$r8!F$$7$?$j%l%S%e!<$7$?$j$9$k$h$&5a$a$i$l$k!#Ds0F$KBP$7$F%3%a%s%H$r5a$a$i$l$?>l9g!"$=$l$KBP$7$FJq3gE*$+$D>\:Y$JJ, @ O$r$9$k$?$a$N!"5;=Q5Z$SK!N'$K4X$7$FI,MW$J7PNr$,$"$k$3$H$,I,?\>r7o$H$J$k!#$3$&$7$?%"%I%P%$%9$rM?$($k$3$H$r2f!9$O<+J,C#$NCf?4E*$J @ UL3$H8+$J$7$F$$$k$7!"$^$5$K$3$&$$$&M}M3$G!"=P8=$7$F$/$k5;=Q$KDI$$$D$/0Y$K7|L?$KF/$$$F$$$k$N$@!#<ALd$7$F$/$l$F$"$j$,$H$&!#(B '''(translated by mumumu)''' **Q6)Terminology and newspeak ''6) Terminology and newspeak - by kafka93'' Given that from a legal standpoint (and, many would argue, an ethical one) there is a distinction between "copyright infringement"/IP violation and "theft", what views do you have on the regular and incorrect/misleading application of the latter term by such people as the RIAA and law enforcement? Such misuse of language seems disingenuous, and taints the arguments of those who might otherwise have valid points to make about the morality of misuse of intellectual property rights. It seems that if there are ethical arguments against piracy and other forms of copyright misuse, those arguments can and should be made on their own merits without the introduction of psychological wordplay apparently designed to confuse the public and cloud the debate. Accordingly, what steps are being taken to clarify the correct terminology and to avoid jingoistic use of words like 'theft', 'thieves' and 'stealing' amongst law enforcement and elsewhere? $BK!E*$J;k:B!J$=$7$F!"B?$/$N?M$,<gD%$9$k$h$&$KNQM}E*$J;k:B!K$G$O!"!VCx:n8"?/32!W$J$$$7CNE*=jM-8"?/32$H!"!V@`Ep!W$O6hJL$,$J$5$l$^$9$,!"$=$NDL>o$NMQ$$J}!"$=$7$F!"(BRIAA$B$d;JK!Ev6I$,9T$C$F$$$k!"8e<T$N8 @ MU$NIT @ 53N$J$$$78m2r$r>7$/$h$&$JMQ$$J}$K$D$$$F!"$I$N$h$&$J$48+2r$r$*;}$A$G$7$g$&$+!)!!$=$&$$$C$?8 @ MU$NMpMQ$OIT@?<B$K;W$($^$9$7!"$^$?!"CNE*=jM-8"$r0-MQ$9$k$H$$$&$3$H$NIJ @ -$K$D$$$F!"$=$&$G$J$1$l$P:,5r$"$kO @ E@$r;}$D$G$"$m$&$K$H$$$&5DO@$r1x$9$b$N$G$9!#(B $B3$B19T0Y$d$=$NB>$NCx:n8"0-MQJ}K!$K$D$$$F$NNQM}E*$J5DO@$,$"$k$H$9$l$P!"$=$&$$$C$?5DO@$O!"8x=0$r:.Mp$5$;5DO@$r$/$b$i$;$k$3$H$rL@$i$+$K0U?^$7$??4M}$J8 @ MUM7$S$r64$^$;$k$3$H$J$/!"$=$l$iFH<+$N%a%j%C%H$K$D$$$F$J$5$l$F$h$/!"$J$5$l$k$Y$-$G$b$"$j$^$9!#$7$?$,$C$F!";JK!Ev6I$G$bB>=j$K$*$$$F$b!"!V@`Ep!W!VE%K@$?$A!W!VEp$`$3$H!W$H$$$C$?8 @ MU$r9%@oE*$KMxMQ$9$k$N$OHr$1$k$Y$/@53N$JMQ8l$rL@$i$+$K$9$k$?$a$N%9%F%C%W$H$O$I$N$h$&$J$b$N$G$7$g$&$+!)(B ''O$B!G(BLeary:'' You're correct that words are important, in particular as they apply to characterizations of specific conduct. As you suggest, people with differing views on intellectual property enforcement should be careful not to overstate their case, nor should they do the opposite in an effort to minimize the effects of their conduct. Traditionally, theft involves taking something from another person without their permission. In short, you deprive that person of their property and they can no longer enjoy its use. Some have argued, particularly in the context of online or digital piracy, that infringement or misappropriation really doesn't deprive the victim of their product because it is merely being copied, so infringement or misappropriation is not truly theft. As criminal prosecutors, we focus on the conduct, regardless of the label that might be applied. That said, in the cases we prosecute, we believe that using the term theft is not misleading. While there may be technical differences between certain types of infringing activity, conduct that triggers the criminal statutes is analogous to theft. In some instances, piracy can actually be more damaging than traditional theft. Unlike traditional theft, where a person steals a specific number of tangible objects, one product in digital format can alone be used to generate hundreds of thousands of near-perfect digital copies within hours. In the case of software piracy, for example, the developer has not been deprived of his product in the traditional sense it has merely been copied. Yet, he faces the grim reality that his product is now available around the world, often for free, to anyone with a computer and an Internet connection. In very real terms, even though he retains his property, the digital victim is in a much worse position than the victim of a more traditional theft. To him, the theft is clear and the harm couldn t be more real. $B6D$kDL$j!#FCDj$N9T0Y$N @ -3JIU$1$K8 @ MU$rE,MQ$7$h$&$H$$$&$J$iFC$K!"8 @ MU$H$$$&$N$O=EMW$@!#CNE*=jM-8"$N<99T$K$D$$$F0[$J$C$?8+2r$r;}$D?M$O!"<+J,$i$N;v7o$K$D$$$F2aBg$K8@$&$3$H$O$7$J$$$h$&$K5$$r$D$1!"$^$?H?BP$K<+J,$i$N9T0Y$N1F6A$r2a>.$K$9$k$Y$-$G$b$J$$!#(B $BEAE}E*$K!"@`Ep$H$$$&$N$O!"5v2D$J$/B>?M$+$i2?$+$r<h$k$3$H$G @ 8$8$k!#$D$^$j!"B>?M$+$i$=$N?M$N:b;:$rC%$C$F!"$=$N?M$O$=$NMxMQ$r5}<u$9$k$3$H$,$b$&$G$-$J$/$J$C$F$7$^$&$H$$$&$3$H$@!#FC$K%*%s%i%$%s$d%G%8%?%k3$B19T0Y$NJ8L.$K$*$$$F$O!"$=$&$$$C$??/32$J$$$7CeI~$O!"C1$K%3%T!<$5$l$?$@$1$G$"$k$+$i!"K\Ev$K$=$NJ*$NHo32<T$+$iC%$&$o$1$G$O$J$/!"$7$?$,$C$F?/32$J$$$7CeI~$OK\Ev$O@`Ep$G$O$J$$$H<gD%$9$k<T$b$$$k!#(B $B2f!9$O!"7:;vAJDI$r$9$k<T$H$7$F!"MQ$$$i$l$k%i%Y%k$,$I$&$G$"$l!"$=$N9T0Y$KCeL\$7$F$$$k!#$H$O$$$(!"2f!9$,AJDI$9$k;v7o$K$*$$$F$O!"@`Ep$H$$$&MQ8l$N;HMQ$O8m2r$r>7$/$H$O9M$($F$$$J$$!#$"$k<o$N?/329T0Y$K$OK!5;=QE*$K0c$$$O$"$m$&$1$l$I!"7:;vK!$K?($l$k9T0Y$H$$$&E@$G@`Ep$HN`;w$7$?$b$N$G$"$k$N$@!#(B $B$$$/$D$+$N;vNc$G$O!"3$B19T0Y$H$$$&$N$OEAE}E*$J@`Ep$h$j$b!"<B:]$N$H$3$m!"B;32$,Bg$-$$!#<BBN$N$"$k$b$N$rFCDj$N?t$@$1Ep$`$H$$$&EAE}E*$J@`Ep$H$O0c$C$F!"%G%8%?%k$J7A<0$N@=IJ$O$=$l$,$?$C$?(B1$B8D$G$b!"?t;~4V$N4V$K$=$N$[$\40`z$J%G%8%?%k$JJ#@=J*$,(B10$BK|$b @ 8$^$l$F$7$^$&$b$N$G$"$k!#%=%U%H%&%'%"$N3$B19T0Y$K$D$$$F$O!"Nc$($P!"%=%U%H%&%'%"3+H/<T$O!"%3%T!<$5$l$?$@$1$H$$$&EAE}E*$J0UL#$K$*$$$F$O!"H`$N@=IJ$OC%$o$l$F$O$$$J$$!#$H$O$$$(!"H`$N@=IJ$,!"%3%s%T%e!<%?$r%$%s%?!<%M%C%H@\B34D6-$r;}$D@$3&Cf$NC/$7$b$K!"$7$P$7$PL5NA$G!";H$o$l$F$7$^$&$H$$$&87A3$?$k;v<B$KH`$OD>LL$9$k$N$G$"$k!#H`$,<+J,$N:b;:8"$rN1J]$7$F$$$?$H$7$F$b!"<B<AE*$K$O!"%G%8%?%k$N5>@7<T$O!"$h$jEAE}E*$J@`Ep$N5>@7<T$h$j$b$h$jNt0-$JN)>l$KCV$+$l$k$N$G$"$k!#$=$N?M$K$H$C$F$O$=$N@`Ep$OL@$i$+$@$7!"$=$N32$O<B:]E*$3$N>e$J$$$N$G$"$k!#(B '''(translated by yh)''' **Q7)Fair Use ''7) Fair Use - by El_Smack '' I hear the term "Fair Use" bandied about all the time in these discussions. From a legal standpoint, does it exist? Do I have a right, that will stand up in a court of law, to make a copy of software/music/data for my own personal use? If I do, does making an "uncopy-able" product violate that right? ''7) $B%U%'%"%f!<%9(B - El_Smack$B$K$h$k(B '' $BCNE*:b;:8"$K4X$9$k5DO@$G$O!"!V%U%'%"%f!<%9!W$H$$$&MQ8l$,;}$A=P$5$l$k$N$r$$$D$b<*$K$7$^$9!#K!E*$JN)>l$+$i$_$F!"%U%'%"%f!<%9$OB8:_$9$k$N$G$7$g$&$+!)!!%=%U%H%&%'%"!"2;3Z!"$=$NB>$N%G!<%?$r8D?M;HMQ$NL\E*$G%3%T!<$9$k$?$a$N!"K!Dn$G @ bF@NO$r$b$D8"Mx$O;d$K$"$k$N$G$7$g$&$+!)!!2>$K$"$k$H$9$k$H!"(B"$B%3%T!<$G$-$J$$(B"$B@=IJ$r:n$k$3$H$O$3$N8"Mx$r?/32$9$k9T0Y$J$N$G$7$g$&$+(B? ''O$B!G(BLeary:'' Great question. The term fair use is frequently misunderstood, and with good reason. The short answer to your question is that fair use does exist. It is an important and longstanding aspect of our intellectual property rights regime. Fair use is a doctrine that holds that although copyright laws grant the creators of copyrighted works certain exclusive rights in their works, the law must simultaneously allow citizens to engage in a degree of copying (or other conduct that would otherwise be infringing in the absence of a fair use doctrine) to allow for such things as comment, criticism, scholarship, and news reporting. The doctrine of fair use was originally adopted by judges ruling in early copyright cases. Ultimately, Congress incorporated the doctrine into the Copyright Act of 1976, where fair use is now codified at Section 107 of Title 17 of the U.S. Code. In creating section 107, Congress listed four factors to be considered in determining whether a use is fair or not: (1) the purpose and character of the use, including whether the use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. These factors are essentially the same factors that had been used over the years by judges, and Congress's stated intent was to preserve the fair use doctrine as it had evolved. However, as many courts have pointed out over the years, whether something constitutes fair use is very fact-specific. It is difficult to craft a clear, bright-line rule that explains which particular uses of a work are fair use and which are infringement. In short, the exact parameters of fair use are often determined based on the facts of specific cases. So yes, fair use does exist. Does it allow for some uses of copyrighted works that would otherwise be infringing in the absence of a fair use doctrine? Yes. Does fair use give a user a blanket license to infringe copyrighted works with impunity? No. Fair use is among the many factors that prosecutors consider when determining whether or not to bring criminal charges. Having said that, however, fair use is not typically at issue in the cases we decide to bring as criminal prosecutions. Rarely do the facts that we would consider for prosecution give rise to a (sustainable) fair use argument by the defendant or defendants although we certainly hear them from time to time. As to your final question, while there certainly is a right to fair use, it is not a violation of that right to make products that cannot be copied. Although such features may prove unpopular to some, ultimately it is for the marketplace to decide the viability of those products. ''$B%*%l%"%j!<!'(B '' $BBgJQNI$$<ALd$@!#%U%'%"%f!<%9$H8@$&MQ8l$O$?$S$?$S8m2r$5$l$F$$$k$7!"8m2r$5$l$k$N$,L5M}$b$J$$$H$3$m$,$"$k!#$"$J$?$N<ALd$K<jC;$KEz$($k$H!"%U%'%"%f!<%9$OB8:_$9$k!#$=$l$O2f!9$NCNE*:b;:8"@)EY$,;}$D!"=EMW$G!"D9G/B3$$$F$-$?9M$(J}$@!#%U%'%"%f!<%9$O!"Cx:n8"K!$,Cx:nJ*$r:n$C$??M$KBP$7$F0lDj$NGSB>E*8"Mx$rM?$($F$$$k$K$b$+$+$o$i$:!"%3%a%s%H$dHcH=!"8&5f!"$=$7$FJsF;$N$h$&$J9T0Y$r5v$9$?$a$K!"K!$O0l;~E*$K;TL1$KBP$7$F%3%T!<!J$b$7$/$O%U%'%"%f!<%9$N86B'$,$J$1$l$P!"Cx:n8"?/32$K$J$C$F$7$^$&$h$&$J9T0Y!K$r$"$kDxEY5v2D$7$J$1$l$P$J$i$J$$$H$$$&86B'$@!#(B $B%U%'%"%f!<%9$N86B'$O$b$H$b$H!"=i4|$NCx:n8"$K4X$9$kAJ>Y$GH=7h$r2<$7$F$$$?H=;v$K$h$C$F:NMQ$5$l$?$b$N$@!#:G=*E*$KO"K.5D2q$,(B1976$BG/Cx:n8"K!$K$3$N86B'$r<h$jF~$l!"8=:_$O9g=09qK!Na=8Bh(B17$BJT$N(B107$B>r$GL @ J82=$5$l$F$$$k!#O"K.5D2q$O(B107$B>r$r@)Dj$9$k$K$"$?$C$F!"%U%'%"%f!<%9$N8"Mx$r9T;H$9$k$3$H$, @ 5Ev$+$I$&$+$r7h$a$k$H$-$K9MN8$9$Y$-(B4$B$D$NMW7o$r$"$2$F$$$k!#(B (1)$BMxMQ$NL\E*$*$h$S @ -3J(B($BMxMQ$,>&6HE*@-3J$+Hs1DMx$N650iL\E*$+$r4^$`(B) (2)$BCx:nJ*$N @ -<A(B (3)$BCx:nJ*A4BN$H$N4XO"$GMxMQ$5$l$?ItJ,$NNL5Z$S$=$N=EMW @ -!"$+$D(B (4)$BCx:nJ*$N @ x:_E*;T>lKt$O2ACM$KBP$7$F!"Cx:nJ*$rMxMQ$9$k9T0Y$,5Z$\$91F6A(B $B$3$l$i$NMW7o$O!"D9G/H=;v$K$h$C$F;H$o$l$F$-$?$b$N$HK\<AE*$K$OF1$8$b$N$@!#O"K.5D2q$OH/E8$7$F$-$?%U%'%"%f!<%9$N86B'$r0];}$9$k$3$H$r0U?^$7$F!"%U%'%"%f!<%9$rL @ J82=$7$?$N$@!#$7$+$7$J$,$iD9G/$K$o$?$C$FB?$/$N:[H==j$,;XE&$7$F$-$?$h$&$K!"$"$k$b$N$,%U%'%"%f!<%9$NMW7o$r9=@.$9$k$+$I$&$+$O!"$^$5$K5/$3$C$?;v<B$K$h$C$F0[$J$k!#Cx:nJ*$N!"$I$NFCDj$N;H$$J}$,%U%'%"%f!<%9$G!"$I$NFCDj$N;H$$J}$,Cx:n8"?/32$K$J$k$+$r @ bL@$9$k!"L @ 2w$G!"L @ 3N$K@~0z$-$5$l$?%k!<%k$r:n$j>e$2$k$N$OFq$7$$!#MW$9$k$K!"%U%'%"%f!<%9$N @ 53N$JMW7o$O!"FCDj$N;vNcKh$K!"5/$3$C$?;v<B$K4p$E$$$FH=CG$5$l$k$3$H$,$"$k$H$$$&$3$H$@!#$=$&$H$b!"%U%'%"%f!<%9$OB8:_$9$k!#%U%'%"%f!<%9$O!"%U%'%"%f!<%9$N86B'$,$J$1$l$PCx:n8"?/32$K$J$C$F$7$^$&$h$&$J!"Cx:nJ*$N;H$$J}$NM>CO$rG'$a$k$b$N$+!)!!Ez$($O(BYes$B$@!#%U%'%"%f!<%9$OCx:n8"$r?/32$7$F7:H3$rLH$l$k$?$a$NJq3gE*$J%i%$%;%s%9$r%f!<%6!<$KM?$($k$b$N$J$N$+!)!!Ez$($O(BNo$B$@!#(B $B%U%'%"%f!<%9$O!"7:;v @ UG$$rLd$&$+$I$&$+$r7h$a$k$H$-$K8!;!Ev6I$,9MN8$9$kB?$/$NMW7o$K4^$^$l$k$b$N$@!#$7$+$78@$C$F$7$^$&$H!"2f!9$,7:;vAJDI$r9T$&$H7hDj$7$?;v7o$G$O!"%U%'%"%f!<%9$,AhE@$K$J$k$3$H$ODL>o$J$$!#2f!9$OHo9p?M$b$7$/$OHo9p?MC#$+$i@^$j$K?($l$F;v>p$rJ9$/$,!"2f!9$,AJDI$K$"$?$C$F9MN8$9$k;v<B$K$h$C$F!"H`$i$,!J5DO@$KBQ$($&$k!K%U%'%"%f!<%9$N5DO@$rDs5/$9$k$3$H$O$a$C$?$K$J$$!#$"$J$?$N:G8e$N<ALd$K4X$7$F$$$($P!"%U%'%"%f!<%9$N8"Mx$O3N$+$KB8:_$7$F$$$k$,!"%3%T!<$G$-$J$$@=IJ$r:n$k$3$H$,%U%'%"%f!<%9$N8"Mx$r?/32$9$k$3$H$K$O$J$i$J$$!#$=$N$h$&$J5!G=$OIT?M5$$K=*$o$k$+$b$7$l$J$$$,!":G=*E*$K$O;T>l$,!"$3$&$7$?@=IJ$NB8B32DG=@-$r7h$a$k$b$N$@!#(B '''(translated by mumumu)''' **Q8)distinctions ''8) distinctions - by newsdee '' Is a distinction made between different levels of IP infringement? I imagine that, from a legal standpoint, there should be a different point of view between a student that copies one software for personal use and a blatant thief who makes money out of selling the same copied software. However, this question has two assumptions: - The student would not use the software if it was not available (i.e. it is not a lost sale) - Both activities are infringing (i.e. this question is not seeking to justify the first case) I think this question is especially relevant since there are reports that the RIAA is now prosecuting students for "infringements" that are mostly gray areas (i.e. the infringement does not seem proven beyond a reasonable doubt, at least to the public). ''8)$B6hJL(B - newsdee$B$K$h$k(B'' $BCNE*=jM-8"?/32$NDxEY$N0c$$$G!"6hJL$H$$$&$N$,$J$5$l$k$s$G$7$g$&$+!)(B $BA[A|$9$k$K!"K!E*$J;k:B$+$i$O!"<+J,$G;H$&$?$a$K%=%U%H%&%'%"$r$R$H$D%3%T!<$9$k3X @ 8$H!"F1$8%3%T!<$7$?%=%U%H%&%'%"$G$b$=$l$rGd$j$5$P$$$F6bLY$1$r$9$k$"$/$I$$E%K@$H$G$O0c$&8+J}$,$J$5$l$k$Y$-$@$H;W$&$N$G$9!#(B $B$=$l$,$I$&$"$k$K$;$h!"$3$N<ALd$K$OA0Ds$,(B2$B$D$"$j$^$9!'(B - $B$=$N3X @ 8$O!"$=$N%=%U%H%&%'%"$,$b$7F~<j$G$-$J$$$b$N$G$"$l$P!";H$o$J$$$G$"$m$&!#!J$9$J$o$A!"$=$l$OHNGdCf$G$"$k!#!K(B - $B$I$A$i$N9T0Y$b?/329T0Y$G$"$k!J$9$J$o$A!"$3$N<ALd$O(B1$B$DL\$N;vNc$r @ 5Ev2=$rLO:w$9$k$b$N$G$O$J$$!#!K(B $B8=:_!"(BRIAA$B$O$[$H$s$I%0%l!<%>!<%s$J!V?/329T0Y!W!J$9$J$o$A!"$=$N?/329T0Y$O!"9gM}E*$J5?$$$rD6$($?$h$&$K$OBg=0$KBP$7>ZL@$,$J$5$l$F$J$$$h$&$K;W$&$N$G$9!#!K$N$H$,$G3X @ 8$?$A$r9pH/$7$F$$$k$N$G!"$3$N<ALd$OFC$K4XO"@-$,$"$k$b$N$@$H;W$C$F$$$^$9!#(B ''O$B!G(BLeary:'' Yes, there are distinctions made between different levels of infringement. Perhaps the most significant distinction is the difference between civil and criminal infringement. Historically, the vast majority of disputes about intellectual property rights enforcement have been dealt with in civil lawsuits, with the criminal law dealing with only a narrow subset of activity. Although there has been increased emphasis on criminal prosecution in recent years, it is still the case that most intellectual property enforcement is civil. The criminal copyright statutes don't allow anyone to be prosecuted unless he infringed a copy willfully, which is the most difficult type of intent to prove. The civil statutes, on the other hand, address infringement even if it was negligent or unintentional. Because we focus on the criminal IP laws, I will answer your question from that perspective. There are two levels of criminal violations within the criminal copyright code. There are misdemeanors, which carry a prison term of one year or less. And there are felonies, which carry prison sentences of over one year (more on this below). In general terms, infringement becomes a criminal matter (as opposed to civil) when it reaches a certain magnitude and when the conduct is willful. Within the criminal copyright statutes (17 U.S.C. sec. 506 and 18 U.S.C. sec. 2319) there are thresholds which must be met to trigger potential criminal sanctions. Simply put, these thresholds deal with the quantity and value of the works that are infringed. Your question talks about the blatant thief who makes money out of selling copied software. This highlights another important area within the criminal law. The criminal statutes make a distinction between for-profit and not-for-profit piracy. Someone who is convicted of piracy for commercial advantage or private financial gain is subject to a felony penalty of up to 5 years in prison. By contrast, someone who infringes for reasons other than commercial advantage or private financial gain faces a maximum penalty of 3 years in prison (under the NET Act). Be aware, however, that the term private financial gain can encompass situations where pirated products are distributed or reproduced for anything of value, including other pirated products. In those instances, defendants will be subject to the 5 year penalty. As we discussed earlier, there are a number of variables that determine a defendant s sentence in any particular case. However, these are the general distinctions made among various types of conduct which would be considered criminal in nature. Finally, your question references cases being brought by the RIAA. As we've noted above, the cases filed by the RIAA are private civil actions which do not involve the Department of Justice. Also, you referenced the "beyond a reasonable doubt" standard within your question. In a criminal trial, the government must prove the defendant's guilt beyond a reasonable doubt to every member of a jury of twelve citizens. However, this standard is applicable only in criminal cases, not to civil actions like those brought by private industry. Civil actions are governed by a lower standard of proof. ''$B%*%l%"%j!<!'(B'' $B$=$NDL$j!"?/32$NDxEY$N0c$$$G6hJL$,$J$5$l$k!#$*$=$i$/!"$b$C$H$b82Cx$J6hJL$O!"L1;v$G$N?/32$H7:;v$G$N$=$l$H$N0c$$$@!#=>Mh$+$i!"CNE*:b;:8"$K4X$9$kJ6Ah$N05E]E*B??t$OL1;vAJ>Y$G07$o$l$F$*$j!"7:;vK!$G07$C$F$$$k$N$O9T0Y$N69$$HO0O$N0lItJ,$K$9$.$J$$!#6aG/!"7:;vAJDI$,6/D4$5$l$F$-$F$$$k$H$$$&$b$N$N!"8=>u$O!"B?$/CNE*:b;:8"$,<99T$5$l$k$OL1;v$H$J$C$F$$$k!#7:;vCx:n8"K!$O!"8N0U$K%3%T!<$G?/32$r$9$k$3$H$,$J$$$+$.$j$O2??M$bAJDI$9$k$b$N$G$O$J$$!#$3$l$O!"N)>Z$9$Y$-8N0U$N%?%$%W$,$b$C$H$bFq$7$$$b$N$@!#L1;vK!$G$O5U$K!"$=$l$,!"2a<:$9$J$o$A0U?^E*$G$J$$$b$N$G$"$C$?$H$7$F$b!"?/32$r<gD%$9$k$3$H$,$G$-$k!#2f!9$,>GE@$rEv$F$F$$$k$N$O7:;v$NCNE*:b;:8"K!$@$+$i!"$3$N4QE@$+$i$4<ALd$K$*Ez$($9$k$3$H$K$7$h$&!#(B $B7:;v$NCx:n8"K!$K$*$$$F$O!"7:;v$N?/32$K(B2$B$D$N%l%Y%k$,$"$k!#7ZHH:a$,$"$k!#$3$l$O!"7:L3=j$K(B1$BG/0J2<Aw$j9~$^$l$k$H$$$&$b$N!#$=$l$+$i=EHH:a$,$"$k!#$3$l$O(B1$BG/$rD6$($k<B7:H=7h$G$"$k!J2<$K>\=R!K!#(B $B0lHLO@$H$7$F$O!"?/32$O!"$=$l$K$"$kDxEY$N?S$@$7$5$,$"$j!"$=$N9T0Y$,8N0U$G$"$l$P!"!JL1;v$NH?BP$H$$$&0UL#$G!K7:;v$NLdBj$H$J$k!#7:;vCx:n8"K!!J9g=09qK!E5Bh(B17$BJTBh(B506$B>r$*$h$SBh(B18$BJTBh(B2319$B>r!K$K$*$$$F$O!"M?$($k$Y$-7:;vH3$K8+9g$&ogCM$, @ _$1$i$l$F$$$k!#4JC1$K8@$&$H!"$=$l$i$NogCM$H$$$&$N$O!"?/32$5$l$?J*$NNL$H2ACM$K4X78$7$F$$$k$N$G$"$k!#(B $B$4<ALd$G$O!"%3%T!<$7$?%=%U%H%&%'%"$rGd$k$3$H$G6b$r2T$0$H$$$&O*9|$J@`Ep$K$D$$$F6D$C$F$$$k$,!"$3$l$O7:;vK!$K$"$kJL$N=EMW$JItJ,$r:]N)$?$;$k$b$N$@!#7:;vK!$O!"32B29T0Y$G$b!"1DMx$HHs1DMx$H$G$O6hJL$r$9$k!#>&6HE*$JJX1W$d;dE*$J6bA,>e$NMxF@$rL\E*$K3$B19T0Y$rHH$7$?<T$O!"=E:a$G(B5$BG/$^$G$N<B7:$H$J$k!#H?BP$K!">&6HE*$JJX1W$d;dE*$J6bA,>e$NMx1W$r$*$$$FB>$NM}M3$N$?$a$K?/32$r$7$?<T$O!"!J%$%s%?!<%M%C%HK!$N2<$G$O!K:G9b(B3$BG/7:L3=j$G2a$4$9$3$H$K$J$k!#$H$O$$$(5$$r$D$1$F$[$7$$$N$O!";dE*$J6bA,>e$NMx1W$H$$$&8 @ MU$,0UL#$9$k$N$O!"3$B1IJ$,2?$i$N2ACM$KN.DL$d:F @ 8;:$5$l$?>l9g$d$=$NB>$bJq4^$9$k$H$$$&$3$H$@!#$=$&$$$C$?>l9g$K$O!"Ho5?<T$O(B5$BG/$N7:$H$J$k$@$m$&!#(B $B @ h$K5DO@$7$?$h$&$K!"FCDj$N;v7o$G$O!"Ho5?<T$NNL7:$r7h$a$k$N$K!"$?$/$5$s$NMWAG$,$"$k!#$H$O$$$(!"@-<A$H$7$F7:K!$K?($l$k$H;W$o$l$kMM!9$J9T0Y$,$"$k$K$7$F$b!"AmB'E*$J6hJL$,$"$k$N$G$"$k!#(B $B:G8e$K!"$4<ALd$G$O(BRIAA$B$,5/$3$7$?:[H=$K$D$$$F6D$C$F$k$,!">e=R$7$?$h$&$K!"(BRIAA$B$,DsAJ$7$?;v7o$OL1;v$G$"$C$F!";JK!>J$O4XM?$7$F$$$J$$!#$^$?!"$4<ALd$G$O!V9gM}E*$J5?$$!J$N4p=`!K$rD6$($F!W$H6D$C$F$$$k$,!"7:;v:[H=$K$*$$$F$O!"@/I\B&$O!"(B12$B?M$N;TL1$+$i @ .$kGf?3CD$N%a%s%P!<$R$H$j$R$H$j$K9gM}E*$J5?$$$rD6$($FHo9p$N:a$N>ZL@$r$7$J$1$l$P$J$i$J$$!#$7$+$7$J$,$i!"$3$N4p=`$O!"7:;v:[H=$K$D$$$F$N$_E,MQ$G$-$k$b$N$G$"$C$F!"L14V6H3&$+$i5/$3$5$l$?L1;v$N$=$l$K$OE,MQ$G$-$J$$!#L1;v$O$h$j4K$d$+$J>Z5r$N4p=`$G$J$5$l$F$$$k$N$@!#(B '''(translated by hayami)''' **Q9)"... under penalty of perjury ..." ''9) "... under penalty of perjury ..." - by OWJones '' In copyright law, 17 USC Section 512(c)(3)(vi) states that all notifications of copyright violations sent to ISPs must contain > A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. (emphasis mine). Do you know of any cases in which the sender of an invalid takedown notice -- such as the RIAA claiming Penn State University Emeritus Professor Peter Usher's lecture on radio-selected quasars was, in fact, an mp3 from the musician Usher -- has been successfully charged with perjury? Or do you allow copyright holders some "fudge factor" with the perjury aspect, since 1. It was an mp3. 2. It did have the name of an RIAA-represented artist in the title, and 3. It was at a university. If copyright holders are allowed leeway, can we expect to see similarly loose definitions of perjury creep into the legal system? If the police are looking for a "Caucasian male, age 50-60, bald, 200-225 pounds," can I testify in a court of law that the 18 year-old caucasian male with a ponytail, weighing 140-150 pounds, is in fact the suspect since he is, after all, a caucasian male? I realize that's more than one question and that they're slightly loaded, but I'd appreciate any comments on how seriously the DoJ takes the perjury clause of the takedown notices. ''9)$B!V(B...$B56>Z$r$9$k$HH3B'$K(B...$B!W(B-OWJones$B$K$h$k(B '' $BCx:n8"K!$K$*$1$k!"9g=09qK!Na=8Bh(B17$BJT(B512$B>r(B(c)(3)(vi)$B$G$O!"(BISP$B$KAwIU$5$l$kA4$F$NCx:n8"?/32$NDLCN$O0J2<$N$b$N$,4^$^$l$J$1$l$P$J$i$J$$$HDj$a$i$l$F$$$^$9!#(B > $BDLCN$K5-:\$5$l$?>pJs$O @ 53N$G$"$k;]$NDD=R!"$*$h$S!"DLCN$r9T$&<T$,?/32$5$l$?$H<gD%$5$l$kGSB>E*8"Mx$NJ]M-<T$rBeM}$9$k<x8"$r<u$1$F$$$k;]$NDD=R!#(B''$B$3$N$3$H$K4X$7$F56>Z$r$9$k$HH3B'$K=h$9$k!#(B''($B6/D4<ALd<T(B) [* $B6/D4<ALd<T$H$O!"%5%V%8%'%/%H$K$b$J$C$F$$$k(B "under penalty of perjury"$B$NItJ,(B( http://interviews.slashdot.org/comments.pl?sid=71014&cid=6436540 )$B!#%$%s%?%S%e!<5-;vCf$G$O6/D4$O>C$($F$$$?(B] $BL58z$J56$j$NDLCN(B($BNc$($P(BRIAA$B$N!"%Z%s%7%k%P%K%"=#N)Bg3XL>M @ 65<x%T!<%?!<!&%"%C%7%c!<$N!"<+$i$NEEGH$GA*$s$@%/%(!<%5!<$K4X$9$k9V5A$,!"%_%e!<%8%7%c%s$G$"$k%"%C%7%c!<$N(Bmp3$B$G$"$C$?$H$$$&<gD%!K$rAw?.$7$?<T$r!"56>Z:a$G9pH/$9$k$3$H$K @ .8y$7$?H=Nc$rCN$C$F$$$k$G$7$g$&$+!#$"$k$$$O!"$"$J$?J}$O0J2<$N;v<B$,$"$C$?$+$i$H$$$C$F!"Cx:n8"<T$NL>A0$r!V$D$8$D$^$"$o$;!W$9$k$3$H$r5v$9$N$G$9$+!)(B 1. mp3$B%U%!%$%k$,B8:_$7$?!#(B 2. $B$=$N%?%$%H%k$K(BRIAA$B$,<($9%"!<%F%#%9%H$NL>A0$,B8:_$7!"$+$D(B 3. $B$=$N%U%!%$%k$,Bg3X$KB8:_$7$F$$$?!#(B $B2>$KCx:n8"<T$KBP$7$F:[NL$NM>CO$rG'$a$k$H$9$l$P!"$3$N;v7o$H;w$?4K$$56>Z$NDj5A$,K!@)EY$KJ6$l9~$`$3$H$rM=A[$G$-$^$9$h$M!)(B $B7Y;!$,!VGr?MCK @ -!"G/Np(B50-60$B!"%O%2!"(B200-225$B%]%s%I!W$H$$$&MF5?<T$rC5$7$F$$$k>l9g!";d$O!"BN=E(B140-150$B%]%s%I$G$"$k%]%K!<%F!<%k$N(B18$B:M$NGr?MCK @ -$,!"<B$O!"7k6IH`$OGr?MCK @ -$G$"$k$N$G!"MF5?<T$G$"$k$HK!Dn$G>Z8@$G$-$^$9$+(B? $B;d$O!"$3$l$,<ALd(B1$B$D$V$s$r1[$($k<ALd$G!"$=$l$i$,$o$:$+$KHO0O$r1[$($F$$$k$3$H$O$o$+$C$F$$$^$9!#$7$+$7!";d$O!"(BDoJ$B$,:o=|$NDLCN$N56>Z$NItJ,$r$I$l$/$i$$??7u$K<u$1$H$a$k$+$K4X$9$k$I$s$J%3%a%s%H$bI>2A$7$^$7$g$&!#(B ''O$B!G(BLeary:'' Your question raises an important point. We feel strongly that everyone should comply with the requirements of all laws. Legal process under the DMCA or any other provision of law should be undertaken with the utmost care and good faith. Failure to do so undermines the credibility and effectiveness of our legal system. Having said that, it appears your interpretation of the language in 512 (c)(3)(vi) is in error. The phrase "under penalty of perjury," applies to the representation that the complaining party is authorized to act on behalf of the copyright owner. It does not apply to the accuracy of the information about the alleged infringement. Quoting federal district Judge Bates in Verizon v. RIAA, The DMCA also requires a person seeking a subpoena to state, under penalty of perjury, that he is authorized to act on behalf of the copyright owner, 257 F. Supp.2d 244, at 262. In other words, the perjury clause may be violated if you seek a DMCA subpoena without the authorization of the copyright owner. We are unaware of any prosecutions for violating this provision of the DMCA at this time. ''$B%*%l%"%j!<(B'' $B$"$J$?$N<ALd$O=EMW$JLdBjDs5/$r$7$F$$$k$M!#2f!9$O!"C/$b$,K!$NMW7oA4$F$K=>$&$Y$-$@$H6/$/46$8$F$$$k!#(BDMCA$B$b$7$/$OB>$NK!N'$N5,Dj$K4p$E$/K!E*$J<jB3$-$O!":GBg8B$KCm0U$7!"$+$D@?<B$K9T$o$l$J$1$l$P$J$i$J$$!#$=$&$7$J$1$l$PK!@)EY$KBP$9$k?.Mj!"$=$7$FM-8z @ -$,32$5$l$F$7$^$&$@$m$&!#(B $B$H$O8@$&$b$N$N!"(B512$B>r(B(c)(3)(vi)$B$K4X$9$k$"$J$?$N2r<a$O8m$C$F$$$k$h$&$@!#!V56>Z$N@):[$N2<$K!W$N6g$O!"DLCN$r9T$&<T$,?/32$5$l$?$H<gD%$5$l$kGSB>E*8"Mx$NJ]M-<T$rBeM}$9$k<x8"$r<u$1$F$$$k$H$$$&I=8=$KEv$F$O$^$j$^$9!#$=$l$O!"?=$7N)$F$i$l$??/HH$K4X$9$k>pJs$N @ 53N$5$KEv$F$O$^$j$^$;$s!#O"K.6h(BBates$B:[H=41$N(BVerizon$BBP(BRIAA$B$NH=Nc$K$D$$$F=R$Y$k$H!#(BDMCA$B$O!"$5$i$KCx:n8"J]M-<T$rBeM}$9$k<x8"$r<u$1$F$$$k$H!"56>Z$N@):[$N2<$G!"=R$Y$k$3$H$r>$4->u$r5a$a$k?M$K!"(B257$B$*$h$S(B262$B$N(BF.Supp.2d 244$B$K4p$E$-MW5a$7$^$9!"8@$$$+$($l$P!"$"$J$?$,Cx:n8"=jM-<T$NG'2D$N$J$$(BDMCA$B>$4->u$r5a$a$l$P!"56>Z$N>r9`$N0cH?$H$J$k$+$b$7$l$^$;$s!#(B $B;d$?$A$O!"$3$N;~E@$K$*$$$F!"(BDMCA$B$N$3$N>r9`$N0cH?$G$N5/AJ$OCN$j$^$;$s!#(B '''(translated by oddmake)''' **Q10)Daniel Peng$B!G(Bs "MiniNapster" ''10) Daniel Peng$B!G(Bs "MiniNapster" - by Pxtl'' ''10) $B%@%K%(%k!&%Z%s$N!H%_%K!&%J%W%9%?!<!I(B - Pxtl$B$K$h$k(B'' What is your opinion on the case of Daniel Peng? The internet at large is angry at the treatment of Peng by the courts - many consider sites like the one Peng created to be "common carriers" - that is, all Peng's site did was list the files other users had chosen to put on the academic network to be freely downloaded. Was it his responsibility to ensure that all the files listed on the academic network (which, unlike Napster, was a network he did not operate or design) were legitamate? While he may have been personally involved in pirating files (that is, he may have personally downloaded files to his computer) that was not the focus of the lawsuit. Peng was placed into a legal battle where he had no chance at victory, and as such had to settle out of court. What is your opinion on this case, and ones like it? $B%@%K%(%k!&%Z%s$N;v7o$K$D$$$F$O$I$&$$$&$40U8+$r$*;}$A$G$9$+!)!!:[H=$G$NH`$N=h6x$KBP$7$F!"%$%s%?!<%M%C%HA4BN$GE\$j$N@<$,$"$,$C$F$$$^$9!#!=!=%Z%s$,!V%3%b%s!&%-%c%j%"!W$H$7$FAO$C$?$h$&$J%5%$%H$r!"B?$/$N?M$,8!F$$7$F$$$k$N$G$9!#$D$^$j!"%Z%s$N%5%$%H$G9T$o$l$?$N$O!"B>$N%f!<%6$,3X=Q%M%C%H%o!<%/$K:\$;$F$$$?%U%!%$%k$r!"<+M3$K%@%&%s%m!<%I$G$-$k$h$&$K%j%9%H$9$k$3$H$@$1$@$C$?$N$G$9!#3X=Q%M%C%H%o!<%/!J%J%C%W%9%?!<$H0[$J$j!"H`$O%M%C%H%o!<%/$r1?1D$7$F$$$J$$$7!"@_7W$b$7$F$$$^$;$s!K$K%j%9%H$5$l$?$9$Y$F$N%U%!%$%k$O9gK!E*$J$b$N$@$C$?$N$K!"$=$l$r3NJ]$7$?$3$H$K4X$7$FH`$K @ UG$$,$"$k$N$G$7$g$&$+!)!!8D?ME*$KH`$,3$B1HG$N%U%!%$%k$KL4Cf$K$J$C$F$$$?$N$+$b$7$l$J$$$N$K!"!J$D$^$j!"H`$,<+J,$N%Q%=%3%s$K8D?ME*$K%U%!%$%k$r%@%&%s%m!<%I$7$F$$$?$+$b$7$l$J$$$N$K!K!"$=$N$3$H$,AJ>Y$N>GE@$K$O$J$j$^$;$s$G$7$?!#%Z%s$O>!Mx$N%A%c%s%9$b$J$$K!DnF.Ah$KEj$2=P$5$l!"$f$($KOB2r$H$J$C$?$N$G$9!#$3$N;v7o$K$D$$$F!"$^$?$3$l$H;w$?$h$&$J;v7o$K$D$$$F$O!"$I$&$$$&$40U8+$r$*;}$A$G$9$+!)(B ''O$B!G(BLeary:'' ''$B%*%l%"%j!<!'(B'' The litigation involving Daniel Peng was a civil matter between private parties. I don't know any more about the case than what has appeared in the public press and other media. Therefore, as I mentioned at the outset, we simply cannot comment. However, as promised, we answered two additional questions which were not submitted to us by Slashdot moderators to make up for not answering this one. $B%@%K%(%k!&%Z%sMm$_$NAJ>Y$O;d?M4V$NL1;v$b$N$@!#;v7o$K$D$$$F$O!"JsF;$J$$$7B>$N%a%G%#%"$KI=$l$?0J>e$N$3$H$O;d$OCN$i$J$$!#$h$C$F!"KAF,$G8@$C$?$h$&$K!"%3%a%s%H$9$k$3$H$b$G$-$J$$!#$H$O$$$(!"$*LsB+$7$?$H$*$j!"$3$N<ALd$K$*Ez$($J$+$C$?Kd$a9g$o$;$H$7$F!"(BSlashdot$B$N%b%G%l!<%?$+$i$OA*$P$l$J$+$C$?<ALd$rB>$K(B2$B$D2sEz$5$;$F$$$?$@$$$?!#(B '''(translated by igrekasx)''' **Q11)Copy protection? ''11) Copy protection? - By Jucius Maximus'' ''11) $BIT @ 5%3%T!<$OKI;_$G$-$k!)(B - Jucius Maximus$B$K$h$k(B'' I am aware that companies spend large sums of money on holograms, authenticity cards, product activation schemes, anti-CD-copying schemes, serial numbers and so on. When investigating alleged copyright infringement, do you find that these anti-IP-infringement techniques have a real effect on preventing such things from happenning? Does copyright infringement go down when companies put up roadblocks like these or do the infringers get away with it nontheless? $B%[%m%0%i%`$d(Bauthenticity cards$B!"%W%m%@%/%H%"%/%F%#%Y!<%7%g%s5;=Q$d(BCD$B$N%3%T!<KI;_5;=Q!"$=$l$K%7%j%"%k%J%s%P!<Ey!9$K!"B?$/$N4k6H$,G|Bg$JHqMQ$r$+$1$F$$$^$9!#Cx:n8"?/32$N?=$7N)$F$K$D$$$FD4::$9$kCf$G!"$3$&$$$C$?CNE*:b;:8"?/32$KBP93$9$k5;=Q$,!"?/32$rKI;_$9$k$N$K<B:]$K8z2L$,$"$k$H$$$($^$9$+!)!!4k6H$,$3$N$h$&$J%P%j%1!<%I$rC[$/$3$H$K$h$C$FCx:n8"?/32$OKPLG$5$l$k$N$G$7$g$&$+!)!!$=$l$H$b!"$=$l$G$b?/32<T$OK!$NLV$NL\$r$/$0$C$F?/32$r$d$C$F$N$1$F$7$^$&$N$G$7$g$&$+!)(B ''O$B!G(BLeary:'' ''$B%*%l%"%j!<!'(B'' Copyright owners have indeed implemented a variety of methods for deterring unauthorized copying or counterfeiting of their works. Software makers in particular often apply very elaborate authentication features to the packaging and media for their software in order to distinguish genuine copies from counterfeits. In our experience, it appears that many of these methods have been effective at discouraging infringement and counterfeiting. For example, the use of unique authentication codes or serial numbers seems to have helped discourage some copying of software. The copy protection system used on DVDs seems to have been effective in discouraging many people from copying DVDs. And the advanced authentication methods used on software packaging (like holograms, watermarks, and edge-to-edge printing) have made the task of manufacturing counterfeits more difficult. In fact, some counterfeiters appear to have given up trying to beat the software makers at the authentication game, and instead now simply try to steal genuine packaging materials to package their counterfeit discs. Have these copy-protection or authentication features eliminated infringement and counterfeiting? No, but they have had a deterrent effect. $BCx:n8"J];}<T$O!"<+J,$N:nIJ$,IT @ 5$K%3%T!<$5$l$?$j56B$$5$l$?$j$9$k$N$rKI$0$?$a$K!"<B$KMM!9$JJ}K!$r<B8=$7$F$$$k!#%=%U%H%&%'%":n @ .<T$O!"K\J*$H%K%;%b%N$H$r6hJL$9$k$?$a!"%=%U%H%&%'%"$N%Q%C%1!<%8$d%a%G%#%"$KHs>o$KJ#;($JG'>ZJ}K!$r:NMQ$7$F$$$k!#(B $B2f!9$N7P83>e$+$i$$$($P!"$3$l$i$NJ}K!$NB?$/$,Cx:n8"?/32$d56B$$rAK;_$9$k$N$K8z2L$r$"$2$F$-$?$h$&$K;W$o$l$k!#$?$H$($P!"%f%K!<%/$JG'>Z%3!<%I$d%7%j%"%k%J%s%P!<$O!"%=%U%H%&%'%"$NIT @ 5%3%T!<$r$"$kDxEYKI$$$G$-$?!#(BDVD$B$K;HMQ$5$l$F$$$k%3%T!<KI;_%7%9%F%`$O!"B?$/$N?M$,(BDVD$B$rIT @ 5%3%T!<$7$h$&$H$9$k$N$rAK;_$7$F$-$?!#$^$?!"%=%U%H%&%'%"$N%Q%C%1!<%8$K;HMQ$5$l$F$$$k$h$j?J$s$@G'>ZJ}K!!J%[%m%0%i%`!"F)$+$7!"(Bedge-to-edge printing$B$J$I!K$O!"56B$IJ$r:n$k$3$H$r$h$j:$Fq$K$7$F$-$?!#;v<B!"56B$<T$NCf$K$O!"G'>ZGK$j%2!<%`$G%=%U%H%&%'%":n @ .<T$rBG$AIi$+$=$&$H$9$k$N$r$"$-$i$a$F!"K\J*$N%Q%C%1!<%8$rEp$s$G$-$F<+J,$?$A$,56B$$7$?%G%#%9%/$r5M$a$k<T$^$G8=$l$F$$$k$[$I$@!#$3$N$h$&$JIT @ 5%3%T!<KI;_5;=Q$dG'>ZJ}K!$,!"Cx:n8"?/32$d56B$$rKPLG$7$?$+!)!!H]!#$@$,M^;_8z2L$O$"$C$?$N$@!#(B '''(translated by haresu)''' **Q12)Foreign Agencies ''12) Foreign Agencies - By mitd '' ''12) $B309q$NA\::5!4X(B -mitd$B$K$h$k(B'' As a Canadian I am curious as to the co-operation you receive (if any) from agencies outside the US? Specifically Canada but also internationally in general. $B%+%J%@?M$H$7$F!";d$O!"$"$J$?$,JF9q30$N5!4X$+$i<u$1<h$k(B($B$b$7$"$l$P(B)$B6(NO$K4X$7$FCN$j$?$$$H;W$$$^$9!#FC$K%+%J%@$NA\::5!4X$+$i$G$9$,!"3$305!4X0lHL$K$D$$$FCN$j$?$$$G$9!#(B ''O$B!G(BLeary:'' Great question. For too long, people have believed that geographic boundaries shield them from the consequences of piracy. Over the past few years, we have been working to change that belief. The Department recognizes that in order to deal with piracy effectively, we must respond globally. This is true regarding both online piracy and traditional hard goods piracy cases. CCIPS has made international enforcement a priority. We have a number of tools, both formal and informal, for working internationally, including Mutual Legal Assistance Treaty Requests and Letters Rogatory. We are also able to employ the network of legal attaches stati****@U*****. Embassies around the world to help strengthen relationships with our foreign law enforcement counterparts and help build strong international cases. In general, international cooperation on intellectual property cases is becoming more effective each year. We do work on intellectual property cases with Canada and will continue to do so in the future. We are also currently working on cases in over a half a dozen other foreign nations. Over the past two years we have worked closely with investigators and prosecutors overseas in order to strengthen our own domestic prosecutions as well as support foreign prosecutions. We have traveled overseas to assist our foreign counter-parts and have welcomed forei gn agents to the U.S. to learn more about evidence we might have to support their prosecutions. Our office is currently working with the United States Attorney for the Eastern District of Virginia on the extradition from Australia of Hew Raymond Griffiths, a.k.a. bandido, the former leader of various warez groups, including DrinkOrDie and RiSC. In March 2003, a Federal Grand Jury sitting in the Eastern District of Virginia indicted Griffiths on charges of conspiracy to violate U.S. copyright laws; his extradition is being sought to face these charges. This is the first extradition of a foreign national for online copyright piracy. Although working internationally is time and resource intensive, it is essential to effective enforcement of intellectual property rights, and we are committed to addressing piracy wherever it occurs. $BBgJQNI$$<ALd$@!#$"$^$j$KD9$$4V!"?M!9$O!"COM}E*$J6-3&$K$h$C$FCx:n8"?/32$N7k2L$+$iJ]8n$5$l$k$H?.$8$F$-$?!#2a5n?tG/$K$o$?$C$F!"2f!9$O$=$N?.6D$rJQ$($k$?$a$KF/$$$F$-$?$N$@!#;JK!>J$O!"Cx:n8"?/32$KM-8z$KBP=h$9$k$?$a$K%0%m!<%P%k$KBP1~$7$J$1$l$P$J$i$J$$$HG'<1$7$F$$$k!#$3$l$O%*%s%i%$%s>e$G$NCx:n8"?/32!"$*$h$S=>Mh$N%b%N$N3$B19T0Y$N>l9g$NN>J}$K4X$7$F$"$F$O$^$k!#(B CCIPS$B$O9q:]E*$J<hDy$j$rM%@h;v9`$K$7$F$-$?!#2f!9$K$O!"7:;v6&=u>rLs$K4p$E$/MW @ A$d>Z?M?RLd0QBw=q$r4^$`!"9q:]E*$KF/$/$?$a$N8x<0$*$h$SHs8x<0$NB?$/$N<jCJ$,$"$k!#$5$i$K2f!9$O!"309q$GF1$8;E;v$r$7$F$$$kK!<99T5!4X$H$N4X78$r6/2=$7!"6/8G$G9q:]E*$JH=Nc$N9=C[$r;Y1g$9$k$?$a$K!"@$3&Cf$NJF9q$NBg;H4[$KG[CV$5$l$?K!L3$NBg;H4[0w$N%M%C%H%o!<%/$r;H$&$3$H$,$G$-$k!#0lHL$K!"CNE*:b;:;v7o$G$N9q:]6(NO$OG/$rDI$&Kh$K$h$jM-8z$K$J$C$F$-$F$$$k!#2f!9$O%+%J%@$HCNE*:b;:8";v7o$r=hM}$7$F$$$k$7!":#8e$b$=$&$7$?4X78$rB3$1$k$3$H$K$J$k$@$m$&!#$5$i$K8=:_H>%@!<%9$r1[$($k9q!9$H;v7o$N=hM}$K$"$?$C$F$$$k!#2a5n(B2$BG/$K$o$?$C$F!"2f!9$O309q$K$*$1$kK!$N<99T$r$r;Y1g$9$k$H$H$b$K!"9qFbK!$N<99T$r6/2=$9$k$?$a$K3$30$NA\::41$*$h$S8!;!41$H0l=o$K;E;v$r$7$F$-$?!#2f!9$O<+J,$?$A$HF1$8;E;v$r$9$k309q$N5!4X$r;Y1g$9$k$?$a$K309q$X$HIk$-!"K!$N?k9T$r;Y1g$9$k$?$a$K<+J,$?$A$,;}$C$F$$$k2DG=@-$N$"$k>Z5r$K4X$7$F9g=09q$KMh$FD4::$9$k309q$NA\::41$r<u$1F~$l$F$-$?$N$@!#(B $B;d$?$A$N%*%U%#%9$O!"8=:_%*!<%9%H%i%j%"$+$i%l%$%b%s%I!&%0%j%U%#%9(B($BJLL>!"(Bbandigo$B!#(BDrinkOrDie$B!"(BRiSC$B$r4^$`MM!9$J(Bwarez$B%0%k!<%W$N85%j!<%@!<(B)$B$r0z$-EO$7$F$b$i$&$?$a$KCO6hO"K.8!;v$H;E;v$r$7$F$$$k!#(B2003$BG/(B3$B7n$K!"%t%!!<%8%K%"=#ElItCO6hO"K.CO:[$NO"K.BgGf?3$O!"6&KE$7$FJF9q$NCx:n8"K!$K0cH?$7$?$+$I$G!"%0%j%U%#%9$r5/AJ$7$?!(H`$N0z$-EO$7$O$3$N:[H=$N5/AJ$N$?$a$K5a$a$i$l$F$$$k!#%*%s%i%$%sCx:n8"?/32$K$h$C$F!"309q?M$,0z$-EO$5$l$k$N$O$3$l$,$O$8$a$F$N$3$H$@!#(B $B9q:]E*$KF/$/$?$a$K$O;~4V$H;q8;$r=8Cf$5$;$kI,MW$,$"$k$,!"$3$l$OCNE*=jM-8"$rM-8z$K;\9T$9$k$?$a$KI,MW$J$3$H$@!#Cx:n8"?/32$,$I$3$G5/$3$m$&$H$b!"2f!9$O$=$l$r<h$jDy$^$k$?$a$KNO$r?T$/$7$F$$$k!#(B '''(translated by oddmake)''' **Addendum ''Addendum: '' Thanks again to everyone for submitting your questions. There were some great ones, and we regret that we cannot answer all of them. Thanks also to Slashdot for the opportunity to discuss these important issues. We look forward to additional opportunities to work with members of the online community to ensure that intellectual property rights are sufficiently protected. ''$BDI5-!'(B'' $B<ALd$r$7$F$/$l$?3'$5$s$K:F$S46<U$7$?$$!#AG @ 2$i$7$$<ALd$b$$$/$D$+$"$C$?$,!"$=$l$i$9$Y$F$KEz$($i$l$J$+$C$?$N$,;DG0$@!#$3$l$i$N=EMW$JLdBj$K4X$7$F!"5DO@$9$k5!2q$rM?$($F$/$l$?(BSlashdot$B$K$b46<U$9$k!#CNE*=jM-8"$,==J,$KJ]8n$5$l$k$3$H$rJ]>Z$9$k$?$a$K!"%*%s%i%$%s%3%_%e%K%F%#$N?M!9$HF/$/JL$N5!2q$r2f!9$O3Z$7$_$K$7$F$$$k!#(B '''(translated by mumumu)''' *$B%D%C%3%_!"%3%a%s%HMs!JLuJ8$KBP$9$k%D%C%3%_!"%3%a%s%HEyBg4?7^!K(B -$B$R$=$d$+$KI|3h!#=xJ8$+$i8lHx!"5Z$S9S:o$j$NLu$rD4 @ 0$7$F$$$-$^$9!#=xJ8$r<j;O$a$KD>$7$^$7$?!#(B -- [[mumumu]] &new{2004-04-22 ($BLZ(B) 09:39:21}; -$B0lHV:G8e$N!VDI5-!W$b=$@5!#(B -- [[mumumu]] &new{2004-04-22 ($BLZ(B) 12:38:41}; -Q12$B$rBgI}$K8+D>$7!#8lHx!";~@)$r8+D>$9$H$H$b$K!"!VHH:a?M0zEO$7!W$rC1$K!V0z$-EO$9$3$H!W$H$7$?!#(B -- [[mumumu]] &new{2004-04-22 ($BLZ(B) 13:49:29}; -Q9$B!VL58z$N:o=|$NDLCN$NAw?.<T$X$N9pH/$, @ .8y$7$?!?$&$^$/8@$C$?!?G'$a$i$l$?Nc$r!A!W$N$[$&$,M}2r$7$d$9$+$C$?$+$b$H:#99;W$C$?$j$7$F!#(B -- [[oddmake]] &new{2004-04-23 ($B6b(B) 16:29:19}; +-$B8f0U!dM}2r$7$d$9$+$C$?$+$b!!(BQ9$B$bBgI}$K8+D>$7Cf$G$9!#(B -- [[mumumu]] &new{2004-04-24 ($BEZ(B) 00:02:18}; #comment - 2004-03-02 (Tue) 21:20:00 ''[[airhead]]'' : $B=xJ88+D>$7!#!J$D$$$G$K!"@^$jJV$5$l$:2#D9$K$J$C$F$$$k2U>r=q$-ItJ,$r2~9T$7$^$7$?!K!#(B - 2004-01-09 (Fri) 23:15:00 ''[[airhead]]'' : (4)$B$D$$$F8+D>$7$7$^$7$?!#(B - 2003-12-19 (Fri) 08:20:00 ''[[airhead]]'' : (3)$B$D$$$F8+D>$7$7$^$7$?!#LuJ8$NCf$K=q$/$HFI$_$K$/$$$N$G!"LuJ8$N2<$KCm<a$N7A$G=q$-$^$7$?!#$D$$$G$K!"(B(9)$B$N<ALdItJ,$N0lIt$r86J8$N%^!<%/%"%C%W$HF1$8$/0zMQ$K$7!"N,>N(BCCCIP$B$r(BCCIPS$B$KD{@5!#(B - 2003-12-10 (Wed) 16:54:34 ''[[mumumu]]'' : hayami$B$5$a5Z$S;d$N2<Lu$rH?1G$5$;$^$7$?!#$3$l$G2<Lu$O0l1~A4$F=*$o$C$?$3$H$K$J$j$^$9!#2<Lu$K6(NO$7$F$/$@$5$C$?3'MM$K?<$/46<U$$$?$7$^$9!#$3$l$+$i9;@5$NCJ3,$K0\$j$?$$$H;W$$$^$9!#3'MM<+M3$JN)>l$G!J$G$-$l$P<+J,$,C4Ev$7$?0J30$NK]Lu$K!K2<LuA4BN$K%D%C%3%_$rF~$l$F$$$C$F$$$?$@$1$l$P$H;W$$$^$9!#(B - 2003-12-01 (Mon) 10:57:13 ''[[mumumu]]'' : yh$B$5$a$K$h$k(BQ6$B$rDI2C$7$^$7$?!#K\Ev$K$"$j$,$H$&$4$6$$$^$7$?!d(Byh$B$5$a(B - 2003-11-26 (Wed) 06:39:56 ''[[oddmake]]'' : Q9$B2<Lu!uHy=$@5$7$^$7$?!#(B - 2003-11-20 (Thu) 16:23:31 ''[[mumumu]]'' : Q4$B$N2sEzItJ,$rDI2C$7$^$7$?!#:#EY$O(BQ5$B$K<j$r$D$1$F$$$-$^$9(B - 2003-11-13 (Thu) 13:57:04 ''[[mumumu]]'' : Q4$B$N<ALdItJ,$rDI2C$7$^$7$?(B - 2003-11-13 (Thu) 05:36:21 ''[[mumumu]]'' : $BK]Lu?J9T>u67$rDI2C$7$^$7$?(B - 2003-11-13 (Thu) 05:20:33 ''[[mumumu]]'' : $B$D$?$J$$Lu$G$9$,:G8e$N(BAddendum$B$rDI2C$7$^$7$?(B - 2003-11-13 (Thu) 04:59:07 ''[[mumumu]]'' : Q7$B$N;D$j$rDI2C$7$^$7$?!#$^$?!"(BQ2$B$r(Bairhead$B$5$s$N%3%a%s%H$K4p$E$$$F=$@5$7$^$7$?!#:G8e$N%3%a%s%H$K$D$$$F$O(B[$B!!(B] $B$D$-$G=$@5$7$F:NMQ$7$?;]%3%a%s%H$7$F$"$j$^$9(B - 2003-11-11 (Tue) 18:50:48 ''[[mumumu]]'' : airhead$B$5$s!"(BQ2$B$X$N%3%a%s%H$"$j$,$H$&$4$6$$$^$9!#2H$K5"$C$F$+$i:Y$+$/FbMF$r8+$F$_$?$$$H;W$$$^$9!#(B - 2003-11-09 (Sun) 12:33:40 ''[[airhead]]'' : Q2$B$K$D$$$F$$$/$D$+0F$r!#;n83E*$K(B[[--Manued]]$B$r;H$C$F$_$^$7$?!#(B - 2003-11-06 (Thu) 13:50:15 ''[[mumumu]]'' : airhead$B$5$s$N$4;XE&$KBP$7$F2sEz$5$;$F$$$?$@$-!"$=$l$KBP$9$k=$@5$r(BQ1$B$KH?1G$5$;$^$7$?!#!!(Bhttp://slashdot.jp/comments.pl?sid=131534 - 2003-11-05 (Wed) 00:51:56 ''[[airhead]]'' : Q1$B$K$D$$$F!JD9$/$J$C$?$N$G!K!"(B http://slashdot.jp/journal.pl?op=display&uid=13423&id=166520 $B$K=q$-$^$7$?!#(B - 2003-11-04 (Tue) 19:07:51 ''[[mumumu]]'' : haresu$B$5$s$"$j$,$H$&$4$6$$$^$9!<!#;d$b(BQ7$B$NLu$rESCf$^$G$"$2$F$*$-$^$7$?!#(B - 2003-11-04 (Tue) 18:29:42 ''[[haresu]]'' : Q11$B$r$"$2$?$N$G$9$h!<!#(B - 2003-11-03 (Mon) 01:07:07 ''[[igrekasx]]'' : $B$9$C!"$9$$$^$;$s!#$4LBOG$r$*$+$1$7$F$*$j$^$9!#$=$l$+$i!"$"$j$,$H$&$4$6$$$^$7$?!#(B - 2003-11-02 (Sun) 21:56:17 ''[[mumumu]]'' : Q10$B$N<ALdItJ,$K4X$7$F!"F|K\8l$ND4 @ 0$b4^$a$F!"$+$J$j<j$rF~$l$^$7$?!#$40U8+$r@'Hs$*BT$A$7$F$*$j$^$9(B - 2003-11-02 (Sun) 21:55:12 ''[[mumumu]]'' : Q10$B$rO.$i$;$F$$$?$@$-$^$7$?!#(B5) $BK!DnF.Ah$K?H$rCV$+$5$l$F!!"*!!K!DnF.Ah$KEj$2=P$5$l(B (placed into a legal battle) - 2003-11-02 (Sun) 21:53:12 ''[[mumumu]]'' : Q10$B$rO.$i$;$F$$$?$@$-$^$7$?!#(B4)$BH`$,3$B1HG%U%!%$%k$K8D?ME*$K4X$o$C$F$$$?$G$"$m$&(B $B"*!!8D?ME*$KH`$,3$B1HG$N%U%!%$%k$KL4Cf$K$J$C$F$$$?$N$+$b$7$l$J$$$N$K(B(While he may have been personally involved in pirating files) : While...may...$B$H$"$C$?$N$G!"(Bmay..but$B$HF1MM$K2r<a$7$^$7$?(B - 2003-11-02 (Sun) 21:51:11 ''[[mumumu]]'' : Q10$B$rO.$i$;$F$$$?$@$-$^$7$?!#(B3) (which, unlike Napster, was a network he did not operate or design)$B$NLu$,H4$1$F$$$?$N$GDI2C(B - 2003-11-02 (Sun) 21:49:50 ''[[mumumu]]'' : Q10$B$rO.$i$;$F$$$?$@$-$^$7$?!#(B2)$B$_$s$J$OG[N8$KF~$l$F$$$k$N$G$9!!"*!!B?$/$N?M$,8!F$$7$F$$$k$N$G$9!J(B many consider sites$B!K(B - 2003-11-02 (Sun) 21:48:10 ''[[mumumu]]'' : Q10$B$rO.$i$;$F$$$?$@$-$^$7$?!#(B1) $B%$%s%?!<%M%C%H$G$O9-$/E\$j$,H/$5$l$F$$$^$9!!"*!!%$%s%?!<%M%C%HA4BN$GE\$j$N@<$,$"$,$C$F$$$^$9(B(The internet at large is angry ) - 2003-11-02 (Sun) 19:38:24 ''[[igrekasx]]'' : Q10$B$N2<Lu$r$"$2$^$7$?!#<+M3$K$$$8$C$F$/$@$5$$!#(B - 2003-11-02 (Sun) 17:08:05 ''[[oddmake]]'' : von$B$5$s$N%3%a%s%H$r$$$?$@$$$F=$@5$7$^$7$?(B - 2003-11-01 (Sat) 23:47:48 ''[[oddmake]]'' : Q12$B$N2<Lu$r40N;$G$9!#%D%C%3%_Bg4?7^!*(B - 2003-11-01 (Sat) 20:25:24 ''[[mumumu]]'' : Q3$B$N2<Lu$r40N;$5$;$^$7$?!#%D%C%3%_$*4j$$$7$^$9(B - 2003-11-01 (Sat) 17:18:46 ''[[mumumu]]'' : Wiki$B$r?7 @ _$7$^$7$?!#2<Lu5Z$S$=$l$X$N%D%C%3%_$r$I$7$I$7$*4j$$$7$^$9!#(B