[14237] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Music's Struggle With Technology

daemon@ATHENA.MIT.EDU (R. A. Hettinga)
Mon Sep 22 10:35:26 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 22 Sep 2003 10:17:27 -0400
To: Clippable <rahettinga@earthlink.net>
From: "R. A. Hettinga" <rah@shipwright.com>
Cc: cryptography@metzdowd.com

<http://www.nytimes.com/2003/09/22/technology/22neco.html?position=&ei=5062&en=3549ae968c62427a&ex=1064894400&partner=GOOGLE&pagewanted=print&position=>

The New York Times


September 22, 2003
NEW ECONOMY

Music's Struggle With Technology
By JOHN SCHWARTZ


LIFE, like television, is full of reruns. And long-time watchers of
technology trends say the entertainment industry's attack on peer-to-peer
software - the technology at the heart of the song-swapping mania - follows
a familiar pattern.

Every technology can, of course, be used for evil or good purposes. Cars
can be used in bank robberies, and radiation can cure cancer. But many new
technologies go through a stage of demonization, and communications
technologies come in for an especially tough hit from people who feel
threatened by them.

Long before girding against the Internet, for example, the entertainment
industry objected to cassettes and videotapes because they would allow
people to copy music and programming without making additional payments.
Even FM radio was opposed by the record companies at the outset because the
high fidelity broadcasts were free. The early defenders of the industry did
not understand the ways that the power of the new communications tool would
help them market their goods to a broader audience.

The current fight over peer-to-peer technology closely resembles a grand
battle in the 1990's over encryption technology, which secures the contents
of communications from prying eyes. In that case, the opponent was not the
entertainment industry, but the Clinton administration and its law
enforcement and intelligence agencies, which tried to restrict the use and
spread of strong encryption ("crypto," in geekspeak). The technology was an
essential tool for businesses and consumers who wanted to protect privacy;
because of their resistance to the government crackdown, many encryption
restrictions have been lifted.

But, at the time, government officials argued that crypto, if unrestricted,
would bring disaster upon disaster. The Clinton administration encouraged
the adoption of encryption products with a "backdoor" that government could
unlock. "Uncrackable encryption will allow drug lords, terrorists and even
violent gangs to communicate with impunity," Louis J. Freeh, then director
of the F.B.I., testified before a Senate committee in 1997.

Similar accusations have been lodged against peer-to-peer - or P2P, as it
is commonly known - which also has the potential to become a powerful tool
for network communications and pooling computer resources. The
entertainment industry has tried to portray the networks as hotbeds of
crime and havens for child pornography. Yet many in the tech world say
there are so many possible uses for P2P that "it's impossible to imagine
them not being developed," said Lance Cottrell, the president and founder
of   a company that provides tools for enhancing privacy online. "Music was
just the first killer app, but I think it will be the first of many."

Mr. Cottrell said that efforts to restrict access to P2P technology will
not deter bad people but the efforts will hinder honest users. "People who
really desire to steal will find ways of doing it," he said. But as with
encryption, "restricting it means it is only available to the real bad
guys."

The potential public benefits - like new computer networks that make worker
collaboration easier, È la the entrepreneur Ray Ozzie's Groove Networks, or
clusters of PC's linked to pool their power and resources - could be
delayed in the P2P fight, just as the tug of war over cryptography hindered
the ability of business to protect communications and databases from
intruders, said Bruce Schneier, a security expert and author of "Beyond
Fear: Thinking Sensibly About Security in an Uncertain World." "In both
cases, a large well-funded organization is fighting the little guy."

The similarities do not stop there, Mr. Schneier said, because in both
cases legal remedies have been sought "to solve an inherently technological
problem." Those seeking to restrict the new technology are using "legal
intimidation" to fight their battles, he said. And, he predicted, the
ultimate outcome will be similar: "Strong crypto would inevitably be used.
Digital files are inevitably copyable." The real goal of the pushback  in
both cases, he said, is to delay change.

A former government official who fought on the opposite side of the crypto
battle from Mr. Schneier says the similarities between that fight and the
battle over file sharing are striking - but so are the differences. Stewart
Baker, former general counsel for the National Security Agency, said, "The
N.S.A. had a lot of clout, but it didn't have political action committees."
The entertainment industry's political influence has already manifested
itself in such laws as the Digital Millennium Copyright Act of 1998, which
made it easier to go after digital pirates.

But file trading has things going for it that encryption never did, Mr.
Schneier said: ease of use and products that millions of average consumers
crave. That popularity, he said, could eventually tip the balance in favor
of the file traders. Federal lawmakers are questioning the industry's
tactics, and he predicted that politicians at the state level - "where
intellectual property interests just haven't been active" in making
political contributions - would begin rising to the file traders' defense.
When that happens, he said, the tide is likely to turn, because "people who
have to buy their friends don't have any when it matters,'' he said.

"Money is nice, but voters matter," he added.

If Hollywood cares to learn from the crypto wars, the lesson might be that
it is more realistic to adapt to powerful technology, rather than
quixotically try to block it. "It's unstoppable," said Elan Oren, the chief
executive of iMesh, a peer-to-peer file sharing company based in Israel.

Technologies can be stubborn. Efforts to knock them down can send them
rebounding back with a new twist. In the case of encryption, the technology
continued to grow more powerful and researchers poked holes in the
government's weaker alternatives. In the case of peer-to-peer applications,
the makers have found increasingly clever ways to help traders act
anonymously, and without a centralized service that can be shut down.
"That's where the behavior of the industry up to now actually got us," Mr.
Oren said.

If pushed further, he said, the P2P makers will eventually offer complete
anonymity for users. If that happens, he predicted, "we'll see something
nobody wants, including the industry": a cumbersome and expensive system of
high-tech copyright protection required by law. Mr. Oren said he believed
that the industry could reshape itself to woo file traders, converting them
to file payers and saving their businesses. "If we convert 10 to 20
percent, it's a huge success," he said.

But for now, Mr. Oren says, he sees only counterproductive delays, and an
underlying attitude from industry that seems almost Luddite. "From 1999 to
2001, if you enabled the R.I.A.A. to have the plug of the Internet," he
said, referring to the Recording Industry Association of America, "they
would unplug it."


-- 
-----------------
R. A. Hettinga <mailto: rah@ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post