Microsystems Software, Inc. v. Scandinavia Online AB

Microsystems Software, Inc. v. Scandinavia Online AB

Microsystems Software, Inc. v. Scandinavia Online AB is a 2000 US District Court civil case, numbered 00-cv10488-EFH, in the United States District Court for the District of Massachusetts. It received considerable attention in the online community because it involved reverse engineering and cryptanalysis of content-control software, allegedly in violation of copyright law and a clickwrap license agreement.

In early 2000, Eddy L. O. Jansson and Matthew Skala reverse engineered the content-control package Cyber Patrol and published a report titled The Breaking of Cyber Patrol 4 detailing what they found, including a cryptanalysis of the CRC-32-based hash function that concealed the configuration password and Web site and Usenet newsgroup blacklists. They commented critically on the content of the blacklist, and highlighted apparent errors in it, innocuous sites and newsgroups blocked as objectionable for no visible reason. Along with the essay, they included software in C and Delphi demonstrating the attacks and allowing users to disable the package, change its configuration, or browse the blacklists in decrypted form. The break was widely reported on March 11, 2000. [1]

On March 15, Microsystems Software, the publisher of Cyber Patrol, and Mattel, its parent company, filed suit against Jansson, Skala, and the ISPs that hosted their personal Web sites, Scandinavia Online and Islandnet. They filed in US court, though Jansson and Scandinavia Online were located in Sweden and Skala and Islandnet were located in Canada. They alleged that the reverse engineering was copyright infringement by Jansson and Skala; that distributing the essay and software (or, in the case of Islandnet, the link on Skala's site pointing to the essay and software on Jansson's site) was copyright infringement by the ISPs; and that Jansson and Skala's actions constituted breach of the clickwrap license agreement on Cyber Patrol, interference with advantageous business relations, conversion, and theft of trade secrets. [2] Once the lawsuit became known, it attracted considerable attention from the online community, far overshadowing the discussion of the reverse engineering itself. [3]

In response to demands from the plaintiffs, Scandinavia Online deleted Jansson's Web site and Islandnet asked Skala to remove his link to Jansson's (now non-existent anyway) Web site. The document and software had already been mirrored on many sites worldwide, however. The plaintiffs asked for, and received, a temporary restraining order against distribution of what they termed the "bypass code", and were authorized to serve it by email on mirror sites, along with a subpoena demanding the identities of every Web user who accessed the information. [4] Some commentators dubbed these email-distributed subpoenas "spampoenas"; use of email for official service of court documents was, and remains, highly unusual if not absolutely unheard of. [5]

On March 27, Skala announced that he had settled the cases against him (including one filed in a Canadian court as well as the US case) out of court and that Jansson was close to doing the same, with an agreement to stop distributing the essay and software and assign its copyrights to the plaintiffs. [6] Other parties had become involved, however, including three mirror site operators associated with Peacefire and backed by the ACLU. The suit continued with the main issue being whether those mirror sites would also be forced to stop distributing the material. When their motions on that topic were dismissed, the mirror sites took that as an indication that they could continue to distribute it safely.

Meanwhile, some controversy erupted when news sources suggested that the exploit software had been released under the GPL, making any restriction on its distribution problematic. [7] Statements from Jansson and Skala denying any intention to place it under the GPL, the lack of any copyright notice in Skala's code, and a vague nonstandard GPL notice in Jansson's code, made it fall apart as a possible GPL test case. In 2001, Jansson stated on his Web site that he had in fact intended his code to be under the GPL after all, even if he had not put in the proper notices to make that stick. [8]

At the time of the case, the DMCA was not relevant because its enforcement was under suspension pending a review by the United States Copyright Office of whether exceptions to its provisions should be made. Lawrence Lessig nonetheless used the Microsystems case as an example of tension between the DMCA and the First Amendment in his essay Battling Censorware; and when the Copyright Office issued their rulemaking on DMCA exemptions, they also cited this case in their discussion of why reverse engineering of content-filter blacklists was one of only two categories of activities exempted.

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Business and Industry Review — ▪ 1999 Introduction Overview        Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… …   Universalium

  • Economic Affairs — ▪ 2006 Introduction In 2005 rising U.S. deficits, tight monetary policies, and higher oil prices triggered by hurricane damage in the Gulf of Mexico were moderating influences on the world economy and on U.S. stock markets, but some other… …   Universalium

  • Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… …   Wikipedia

  • Command key — The Command key The Command key, also historically known as the Apple key, open Apple key or meta key is a modifier key present on Apple Keyboards. The Command key s purpose is to allow the user to enter keyboard shortcut commands to GUI… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”