Professional Documents
Culture Documents
Access To Knowledge in The Age of Intellectual Property 3
Access To Knowledge in The Age of Intellectual Property 3
edited by
Gaëlle Krikorian and Amy Kapczynski
Z O N E B O O K S • N E W Y O R K
2010
The publisher wishes to acknowledge the generous support
of the Open Society Institute.
k1401.a929 2010
346.04’8—dc22
2009054048
A Copyright Thriller versus
a Vision of a Digital Renaissance
Sarah Deutsch
607
to provide any further insight on what a “limited term” means, although it has
been expanded to the life of the author plus seventy years. And in an acknowl-
edgement of those bills that seek to expand the scope of copyright law, Section 209
extends copyright to broadcasting, databases, and fashion designs (with original-
ity to be determined by an “Originality Czar”). Many of these noncopyrightable
areas that seek protection under a copyright umbrella are already adequately pro-
tected under existing law (for example, databases are adequately protected under
contract law and theft of broadcast signals under a wide array of federal and state
laws), and they thrive without the need for additional copyright protection. The
mock bill acknowledges new “self-help” rights for copyright holders, including the
right to disable, interfere with, block, divert, or otherwise impair the unauthorized
exercise of any of their exclusive rights. For example, someone could find that files
have been removed from their computer or that tracking devices have been placed
on their hard drive under the auspices of “self-help.” The Federal Communications
Commission is empowered to adopt “Dragon Shield” copyright security standards,
which, among other attributes, are required to be “invincible.” In reference to both
the old proposed “Hollings Bill” and the Digital Millennium Copyright Act, it cre-
ates liability for any person who tampers with or undermines the Dragon Shield.
The final provision repeals the Copyright Act’s prohibition against the federal gov-
ernment owning copyrighted works and bears a bold copyright notice in the name
of the United States Congress.
608 deutsch
In this movie, The Authority has found it necessary to declare its first virtual
copyright war and would control the strategy, aided by an army of people and
robots. Just as in the movie Minority Report, an army of mechanical spiders would
crawl the Internet, scurry through the walls into suspects’ homes and comput-
ers, and search for infringements, taking whatever “self-help” measures might be
necessary. Perhaps they might destroy files and equipment, automatically deduct
fines and penalties from bank accounts, or publicize the faces and names of viola-
tors on huge screens like those in Times Square. The movie would not have a sat-
isfying element of conflict and violence unless the spiders also had the power to
“Terminate” (with a capital T) those that the Authority deems the worst offenders.
Of course, in our movie, due to years of “clarifications” to existing laws, what-
ever protections existed for individuals or third-party intermediaries long ago
have disappeared. The new laws have created seamless, one-click primary, sec-
ondary, and tertiary liability. Elders reminisce about their old iPods, Tivos, and
home networks as sad relics of the past. The old-timers recall that they used to
be able legitimately to stream content to different rooms of the house, space shift
recorded programming, and create libraries of time-shifted content. All the com-
panies who produced the old innovative products and services would have long
ago been sued out of existence. Most remaining black market “antiquities” would
have been seized and destroyed by the spiders. The Copyright Authority would
approve all new devices and administer all Internet services. The average citizen
would have almost no societal memory of the concept of privacy or reasonable
uses of copyrighted works, because rights and penalties for violations were doled
out like small electrical shocks to a submissive public.
The movie, however, would need a protagonist. Perhaps the protagonist
would be some deeply recessive genetic mutant who chooses to reject the rules.
It would be convenient if our protagonist’s great-great-grandfather might have
left an undiscovered cache of equipment, devices, and communications networks
as weapons to fight back against The Authority. And, of course, we would need
to figure out how to insert the requisite car chase scene, with the Authority and
squadron of spiders in hot pursuit.
But, this overexaggerated, nightmarish yarn would never pass muster in a real
Hollywood movie script. Note that in the real movie Be Kind, Rewind, the protago-
nists dangerously create and film their own retakes of famous Hollywood movies
after their entire inventory of movie rentals is accidentally erased. Their innova-
tive derivative works become huge word-of-mouth hits in their low-income com-
munity, and their video store’s business begins to thrive. But, the plot does not
permit this kind of creative success to continue. The studio executives show up to
enforce the protagonists’ copyright violations with a steamroller, destroying all the
610 deutsch
marketplace supporting this digital renaissance would profit equally from the dis-
tribution of creative content in both the physical and the virtual worlds.
Broadband speeds and services would continue to grow and with them supply
an endless array of interactive devices. Users would continuously send streams of
content across multiple platforms and devices. Almost any item capable of con-
taining electronics would become a new mobile device. Innovative and ubiquitous
payment systems would develop and along with them interfaces to interact with
our constant stream of content. Home networking would extend beyond the home,
and words such as “time shifting,” “space shifting,” and “format shifting” would
seem as obvious and antiquated as the “Information Superhighway.” Although dig-
ital rights management (DRM) and enforcement options would still exist, the need
for onerous DRM or expensive enforcement actions would not be nearly as great
in a world where the marketplace is thriving.
Large content companies would be thriving. They would profit from strong
partnership arrangements with Internet service providers, device manufacturers,
and other suppliers. Consumers would earn new income streams from individual
partnership arrangements with content companies and distributors.
Companies would share revenue with the public and reward the public for cre-
ating, distributing, and promoting new content in unique one-to-one communica-
tions. Notably, the ability to share content in a small community means that entire
specialized on-line communities could generate content and earn income in both
the physical and the virtual worlds. Groups might be devoted to a particular movie,
book, or music or might sell unique versions of derivative works. Profit-sharing
arrangements would benefit the creators, copyright owners, and users alike. And
of course, the newfound societal approval for creating derivative works would
now mean that we would laugh more (and live longer) as the best new parodies of
the century were celebrated and shared.
Our technology and content sectors would also embrace the business notion
of “creative disruptions.” Companies would understand that they must adapt to,
rather than fight changes that threaten their business models and seek innovative
ways to profit from those changes. For example, in the old days of telecommunica-
tions, criminals sought to profit from schemes to steal long-distance, international,
or cellular telecommunications services. As communications companies shifted to
selling generous buckets of minutes at reasonable and compelling price offerings,
this encouraged increased usage of their services, and the need to steal suddenly
seemed irrelevant. This is, after all, the history of the telephone industry, too: In
the old days, long-distance or “toll calls” were very expensive, so people used to
steal phone service through black-box devices and other schemes. They no longer
do that, because today, the cost of calls or the Internet is low enough that it’s not
notes
The opinions offered here are solely those of the author and do not reflect the opinions or
views of Verizon Communications.
1 Copyright liability applies to those who are either found primarily liable (direct infringe-
ment) or secondarily liable (contributory or vicarious infringement). The Grokster decision
explored the concept of whether one could be found secondarily liable for “inducing another
to infringe,” for example by taking purposeful steps in advertising infringing conduct. The
APRIL Act imagines that the chain of secondary liability should be further extended down to
indirect recipients of copyrighted works in the distribution chain.
612 deutsch