The copyright cops strike again

Two researchers at a computer security conference are served cease-and-desist orders moments before they're scheduled to speak.

Topics: Copyright, Intellectual Property,

The copyright cops strike again

Score another win for the forces of copyright protection. On Saturday, two computer science students decided to cancel their presentation to a security conference in Atlanta after they were threatened with prosecution under, among other statutes, the Digital Millennium Copyright Act.

The researchers, Billy Hoffman and Virgil Griffith, were scheduled to talk about possible security vulnerabilities in the Blackboard Transaction System, a computerized debit-card system widely used on college campuses. But on Friday Blackboard obtained a temporary restraining order against Hoffman and Griffith, preventing them from presenting their findings; the pair were also sent cease-and-desist letters threatening further legal action. In addition, Blackboard’s attorneys sent a cease-and-desist letter to the organizer of the conference — a person who goes by the name “Rockit” — letting him know that he too could face prosecution if he allowed Hoffman and Griffith to present their findings at the event, an annual gathering of hackers known as Interz0ne.

Instead of the scheduled discussion, several hundred conference attendees were read the cease-and-desist letter, said Scott Milliken, an attendee. Attendees said they saw the case as a clear infringement on the First Amendment rights of the two students, and they contacted the Electronic Frontier Foundation and Lawrence Lessig, a Stanford law professor who specializes in copyright issues, seeking advice on what to do next.

Representatives for Blackboard balked at the claim that they were stifling free speech. They portrayed the students as being substantially different from mere security researchers. “I’ve met one of the individuals at a trade show, and he was a very nice young gentleman, but his definition of ‘research’ was very different from ours,” said Greg Baker, Blackboard’s vice president of product development. “The things these people are doing are not what I’d call research but is closer to damage — kind of like you or I going to an ATM machine and cutting the phone line and then listening in as to what happens on it. It’s them of their own volition doing damage to physical cables.”



“The local Bank of America,” added Michael Stanton, a spokesman for the firm, “may have a physical bank machine at its location, and if I were to publish a guide to take it apart, telling you how to pull apart a circuit board and monitor the history of what transactions take place, I think it certainly does not fall under the guise of research and it’s not an inherent security issue, either.”

The Blackboard system — known as CampusWide — allows students to use debit cards to conduct transactions at their college campuses: at dining halls, on vending machines, and in laundry rooms, among other places. Neither Hoffman nor Griffith could be immediately contacted for comment.

Hoffman, a computer engineering student at Georgia Tech who goes by the name “Acidus,” published his first exposé on security flaws he says he found in Blackboard in 2002, in the spring issue of 2600 magazine. The article, titled “CampusWide Wide Open,” seems to draw on published technical specifications of the system and on interviews with Blackboard experts to conclude that “there are several ways to cheat the system” and that it is “horribly insecure.”

Hoffman also writes about times he physically broke in to Blackboard equipment on campus. “This metal box has a handle and a lock,” he writes of one Blackboard device, “but the front of the handle and lock assemble has 4 flat head screws. I used a cheap metal knife and opened this locked box. Inside I found the LCM [Laundry Center Multiplexes] that controlled the laundry room I was in. Everything had ‘AT&T CampusWide Access Solution’ written on it, as well as lots of Motorola chips. Sadly this was early in my investigation, and I haven’t gone back to look again.”

Although he does not indicate that he has done any of these things, Hoffman tells how a person might be able to fool the system to “get another load of wash” in a laundry room, say, or to “make the Coke machine think money has been paid” and cause it to “spit out a Coke!” Hoffman writes, “You fool door readers as well if you could get to the wires that go from the reader and go to the magnet holding the door shut. Just send the correct pulses.”

According to a timeline of his research posted on the Web, Hoffman called the company to tell them of his findings and was “blown off.” Only then, he says, did he publish them. After Blackboard learned of his article, officials at Hoffman’s college questioned him — “I basically got reamed” — about his research, but the campus police did not file any charges against him.

On its face, the case is similar to one involving Ed Felten, a computer science professor at Princeton, who in 2001 declined to present his findings of security flaws in technology meant to secure music files after attorneys for the recording industry seemed to suggest they’d sue him under the DMCA. The recording industry’s apparent threat caused civil libertarians to say that the DMCA should be struck down because it threatened legitimate academic research, but the recording industry, in a sudden about-face, announced that it had never had any intention of suing Felten. A judge later dismissed Felten’s efforts to have a court rule that the recording industry never had a case in the first place.

This case is somewhat different from the Felten case, however, in that Blackboard is claiming violations not just of the DMCA but also of less controversial state and federal computer security laws; some of the research that Hoffman and Griffith did might have involved breaking in to systems on campus, an act that might be illegal under those other laws. Attorneys at the Electronic Frontier Foundation said they were investigating the case in order to decide whether the group should become involved.

“We’re concerned right off the bat when we hear of speakers at a conference being served with a [temporary restraining order] moments before they’re supposed to speak,” said Wendy Seltzer, an attorney at the EFF. “It’s the kind of thing that makes us nervous.”

One attendee at the conference — an engineer who goes by the name “Decius” — said that after the cease-and-desist letter was read to the group, “a few of us got up and decided that the best thing that we could do was to make as many people aware of what happened as possible. In addition to contacting the press, several individuals said they wished to contact universities using the system to say they were unhappy to hear it was not secure and were unhappy to hear that the company was behaving in this manner.”

Decius added: “We live in a society in which we are increasingly dependent on this high-tech infrastructure which our lives are arranged around, and if we can’t take these things apart and understand how they work, then I think we have a very serious threat to our freedom.”

A courtroom hearing on whether to make the temporary restraining orders against the two students permanent will be held Thursday.

Featured Slide Shows

  • Share on Twitter
  • Share on Facebook
  • 1 of 10
  • Close
  • Fullscreen
  • Thumbnails

    Romance novels need a canon

    "Bet Me" by Jennifer Crusie

    A contemporary romantic comedy set to Elvis Costello and lots of luxurious and sinful sugary treats.   Read the whole essay.

    Romance novels need a canon

    "Welcome to Temptation" by Jennifer Crusie

    Another of Crusie's romantic comedies, this one in the shadow of an ostentatiously phallic water tower.   Read the whole essay.

    Romance novels need a canon

    "A Gentleman Undone" by Cecilia Grant

    A Regency romance with beautifully broken people and some seriously steamy sex.   Read the whole essay.

    Romance novels need a canon

    "Black Silk" by Judith Ivory

    A beautifully written, exquisitely slow-building Regency; the plot is centered on a box with some very curious images, as Edward Gorey might say.   Read the whole essay.

    Romance novels need a canon

    "For My Lady's Heart" by Laura Kinsale

    A medieval romance, the period piece functions much like a dystopia, with the courageous lady and noble knight struggling to find happiness despite the authoritarian society.   Read the whole essay.

    Romance novels need a canon

    "Sweet Disorder" by Rose Lerner

    A Regency that uses the limitations on women of the time to good effect; the main character is poor and needs to sell her vote ... or rather her husband's vote. But to sell it, she needs to get a husband first ...   Read the whole essay.

    Romance novels need a canon

    "Frenemy of the People" by Nora Olsen

    Clarissa is sitting at an awards banquet when she suddenly realizes she likes pictures of Kimye for both Kim and Kanye and she is totally bi. So she texts to all her friends, "I am totally bi!" Drama and romance ensue ... but not quite with who she expects. I got an advanced copy of this YA lesbian romance, and I’d urge folks to reserve a copy; it’s a delight.   Read the whole essay.

    Romance novels need a canon

    "The Slightest Provocation" by Pam Rosenthal

    A separated couple works to reconcile against a background of political intrigue; sort of "His Gal Friday" as a spy novel set in the Regency.   Read the whole essay.

    Romance novels need a canon

    "Again" by Kathleen Gilles Seidel

    Set among workers on a period soap opera, it manages to be contemporary and historical both at the same time.   Read the whole essay.

  • Recent Slide Shows

Comments

0 Comments

Comment Preview

Your name will appear as username ( settings | log out )

You may use these HTML tags and attributes: <a href=""> <b> <em> <strong> <i> <blockquote>