Sklyarov/ElcomSoft case sent to trial

Judge rejects constitution challenge to DMCA


The case against ElcomSoft, employers of freed Russian programmer Dmitry Sklyarov, will go to trial after a judge yesterday denied the company's motions to dismiss the case.

Judge Ronald Whyte of the Federal District Court for the Northern District of California ruled that Elcomsoft, which markets eBook formatter software, must face criminal charges. Rejecting two legal challenges, the judge ruled that the Digital Millennium Copyright Act's ban on copyright circumvention tools is constitutional even if the circumvention tools are used for legal purposes.

On Elcomsoft's First Amendment argument, Judge Whyte ruled that the computer program qualifies as speech, rejecting the government's argument that software is not speech. But the court then ruled that the First Amendment was satisfied because the government's purpose was to control the 'function' of the software rather than its 'content', and that the statute did not ban more speech than necessary to meet its goal of preventing piracy and promoting electronic commerce.

The court has scheduled a hearing for May 20, when a trial date will be set. The prosecution is the first case brought under America's controversial Digital Millennium Copyright Act (DMCA).

ElcomSoft is charged with supplying a tool that circumvents the copy protection in Adobe eBooks, which can be used in making audible copies of e-books for the blind, or copies of legitimately purchased electronic books. ElcomSoft's Advanced eBook Processor, which is legal in Russia, was sold over the Internet (though it has since been taken off the market).

Sklyarov was also indicted in the case, and spent a month in a US jail (and four months on bail) before striking a deal that allowed him to return to Russia in exchange for testifying in any case against ElcomSoft.

'Crime' and punishment

Sklyarov was arrested and slung into jail in July following a court case instigated by Adobe. The California software company pulled the legal trigger in response to a presentation made by the Russian programmer pointing out the shortcomings of eBook security at last year's Defcon conference in Las Vegas. He faced charges punishable by up to 25 years in jail and a $250,000 fine.

Adobe attracted huge opprobrium for its actions, and in the face of a self-inflicted public relations nightmare, quickly withdrew support for prosecution. However, the Department of Justice took up the reins and even though Sklyarov was released on bail of $50,000 in August, he still had to remain in the US until December, when a deal was made.

The case against ElcomSoft and Sklyarov has become a cause celebre among white hat hackers, who objected to jailing a programmer simply for coding and distributing software. There were also concerns that, at the behest of the entertainment industry, the DMCA was being applied in a way which would stymie legitimate security research and prevent 'fair use' of copyrighted material. Civil liberties groups, most notably the Electronic Frontier Foundation, and Internet activists have also campaigned hard on Sklyarov's behalf. ®

External Links

Judge Whyte's ruling
Digital Millennium Copyright Act (DMCA): "US v. Sklyarov" archive

Related Stories

Alan Cox attacks the European DMCA
US courts claim jurisdiction in Sklyarov case
ElcomSoft squares up to Feds in Sklyarov test case
ElcomSoft attacks DMCA in Sklyarov test case
Case against Dmitry Sklyarov dropped
MS eBook cracker keeps findings secret
Sklyarov boss exhibits cojones
Sklyarov freed on bail
Adobe Folds!
eBook security debunker arrested by Feds


Other stories you might like

  • Experts: AI should be recognized as inventors in patent law
    Plus: Police release deepfake of murdered teen in cold case, and more

    In-brief Governments around the world should pass intellectual property laws that grant rights to AI systems, two academics at the University of New South Wales in Australia argued.

    Alexandra George, and Toby Walsh, professors of law and AI, respectively, believe failing to recognize machines as inventors could have long-lasting impacts on economies and societies. 

    "If courts and governments decide that AI-made inventions cannot be patented, the implications could be huge," they wrote in a comment article published in Nature. "Funders and businesses would be less incentivized to pursue useful research using AI inventors when a return on their investment could be limited. Society could miss out on the development of worthwhile and life-saving inventions."

    Continue reading
  • Declassified and released: More secret files on US govt's emergency doomsday powers
    Nuke incoming? Quick break out the plans for rationing, censorship, property seizures, and more

    More papers describing the orders and messages the US President can issue in the event of apocalyptic crises, such as a devastating nuclear attack, have been declassified and released for all to see.

    These government files are part of a larger collection of records that discuss the nature, reach, and use of secret Presidential Emergency Action Documents: these are executive orders, announcements, and statements to Congress that are all ready to sign and send out as soon as a doomsday scenario occurs. PEADs are supposed to give America's commander-in-chief immediate extraordinary powers to overcome extraordinary events.

    PEADs have never been declassified or revealed before. They remain hush-hush, and their exact details are not publicly known.

    Continue reading
  • Stolen university credentials up for sale by Russian crooks, FBI warns
    Forget dark-web souks, thousands of these are already being traded on public bazaars

    Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.

    According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.

    "The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.

    Continue reading

Biting the hand that feeds IT © 1998–2022