919 lines
48 KiB
Plaintext
919 lines
48 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Feb 7, 1993 Volume 5 : Issue 11
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Copy Editor: Etaion Shrdlu, Junoir
|
||
|
||
CONTENTS, #5.11 (Feb 7, 1993)
|
||
File 1--Introduction to a Chat with the SPA
|
||
File 2--A Chat with the SPA
|
||
File 3--How does the SPA Calculate Piracy?
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
|
||
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
|
||
466893; and using anonymous FTP on the Internet from ftp.eff.org
|
||
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
|
||
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
|
||
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 29 Jan 93 23:49:21 CST
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Introduction to a Chat with the SPA
|
||
|
||
Over the past few months, CuD talked with severeal SPA staff about
|
||
their organization, goals, tactics, and membership. In CuD # 4.63, we
|
||
reposted several SPA position papers and summarized their broad goals.
|
||
Here, we attempt to present in more detail the SPA's view of its
|
||
organization, mission, and activities from their perspective.
|
||
|
||
We began our inquiry into the SPA knowing little about them other than
|
||
what we had read in the press. Press accounts seemed taken primarily
|
||
from SPA literature, which leave a number of questions unasked. We
|
||
also were initially influenced by the rumors and other sources of
|
||
information that portrayed the SPA as an evil entity inclined to
|
||
invoke the law for its own narrow interests. Between these two
|
||
extremes--an altruistic group devoted to high ideals and an
|
||
opportunistic frontier sheriff, we found considerable middle ground
|
||
and support for both views.
|
||
|
||
The SPA is divided into two fairly distinct, but somewhat overlapping,
|
||
groups. The first, represented by the SPA's General Fund, provides
|
||
the same services for members that any solid professional organization
|
||
does. It provides support, conferences, information, and other
|
||
assistance for members. The bulk of the SPA's activities are devoted
|
||
to these services, and from all accounts they do it well and take
|
||
justifiable pride in their accomplishments. The second, represented
|
||
by the SPA's Copyright Protection Fund (CPF) garners the publicity and
|
||
raises the questions that prompted our initial inquiries. Although
|
||
linguisticially awkward, the SPA calls each segment a "fund," rather
|
||
than a group or a division. Some have called the CPF cyber-tech
|
||
bounty hunters for its aggressive style in pursuing its targets and
|
||
using the threat of law to obtain out-of-court settlements that have
|
||
been has high as a half-million dollars. Those whom the SPA represent
|
||
justifies this style as a necessary method to protect software authors
|
||
from potential predators whose actions, if unchecked, reduce the
|
||
compensation for intellectual property.
|
||
|
||
We have said it before, and we'll repeat it: Both CuD editors are
|
||
unequivocally opposed to all forms of predatory behavior, whether by
|
||
the lawless or by those who ostensibly defend law. We strongly
|
||
believe that if one obtains software, whether conventional copyright
|
||
or shareware, and uses it regularly, it should be purchased. Period.
|
||
This is the official position of CuD, and it is the strong personal
|
||
view of both editors.
|
||
|
||
However, we also judge the "zero-tolerance" approach to copying and
|
||
distributing unpurchased software both unreasonable as a legal and
|
||
ethical stance, and ultimately unhealthy for the software industry and
|
||
for end-users. The recent passage of PL 102-561, the federal
|
||
anti-piracy bill (formerly S893) is an example of a bad law that
|
||
over-criminalizes "piracy," creates a broad category of offenses that
|
||
lump both minor lapses in judgement with serious predations, provides
|
||
an easy means for prosecutorial abuse, and gives a coercive weapon to
|
||
groups inclined to seek out-of-court settlements.
|
||
|
||
We are of two minds about the SPA. On one hand, their commitment to
|
||
members interests, their willingness to engage in educational
|
||
activities to raise the consciousness of end-users' obligations to
|
||
software publishers, and their devotion to their cause are laudable.
|
||
On the other hand, some of their tactics raise ethical questions, and
|
||
their hard-line stance on "zero-tolerance" are not.
|
||
|
||
Our intent in this and subsequent discussion of the SPA (and the
|
||
Business Software Alliance) is not simply to criticize them.
|
||
Instead, we hope to raise some of the issues underlying their methods
|
||
and philosophy for the purpose of striking a balance between the
|
||
rights of *both* publishers and users.
|
||
|
||
In our discussions, we found the SPA staff without exception to be
|
||
friendly and cooperative. They patiently answered repetitious
|
||
questions and promptly provided information that we requested.
|
||
Although we doubt that anything we say in CuD will influence them one
|
||
way or the other, we hope they interpret our critiques in subsequent
|
||
issues in the collegial spirit intended, and we invite them to engage
|
||
in dialogue with the past and future comments that we and other
|
||
readers provide.
|
||
|
||
One might ask why the SPA should bother engaging in dialogue in
|
||
Cu-Digest. Let me suggest a few reasons:
|
||
|
||
1) CuD's readers are primarily professional (computer types,
|
||
attorneys, law enforcement, media) and discussion would reach at least
|
||
40,000 people, probably closer to 60,000. Readers are obviously
|
||
computer-literate, and most are affected in some way by intellectual
|
||
property issues.
|
||
|
||
2) Engaging in dialogue is healthy. Conflicting views, when publicly
|
||
aired, can lead to sharpening of and changes in public thinking.
|
||
|
||
3) The SPA may have an image problem. Whatever they think they do,
|
||
their actions are clearly misunderstood by many people. Public
|
||
dialogue would give them the opportunity to reflect on the image and
|
||
to assess if it's the one most-appropriate to their goals.
|
||
|
||
4) The SPA's goal of educational outreach would be served by
|
||
contributing to the dialogue in CuD. Outreach is invaluable in
|
||
challenging people's thinking, raising issues, and imparting
|
||
information. For the SPA, the value is not whether people accept or
|
||
reject their methods, but rather that the simple act of discussing
|
||
them publicly serves to raise awareness about the problems and
|
||
stimulate people to think in new ways about proprietary information
|
||
for them. It's a no-lose situation for them.
|
||
|
||
5) The SPA staff came across as dedicated, well-meaning, and
|
||
honorable, which suggests that they would welcome a public dialogue.
|
||
|
||
We look forward to hearing from them.
|
||
|
||
------------------------------
|
||
|
||
Date: 30 Jan 93 01:03:34 CST
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 2--A Chat with the SPA
|
||
|
||
((MODERATORS' NOTE: The following is a summary of conversations with
|
||
SPA personnel between October, 1992 and January, 1993. The contacts,
|
||
especially Terri Childs (SPA Public Relations Manager), Illene
|
||
Rosenthal (SPA General Counsel), David Tremblay (Research Director),
|
||
and Katherine Borsecnik, were patient, cordial and open. They also
|
||
spoke slowly, allowing for occasional verbatim note-taking.
|
||
The narrative attempts to present the SPA from their own perspective.
|
||
We strongly encourage rational responses that address the issues raised)).
|
||
|
||
THE ORIGINS OF THE SPA
|
||
|
||
Ken Wasch, the founder and Executive Director of the SPA, was an
|
||
attorney working for the federal government in 1984. Perhaps because
|
||
the Beltway is an environment teeming with trade associations, he
|
||
recognized a need for a trade association for the rapidly growing PC
|
||
software industry. Unlike a professional association, which supports
|
||
individuals in furthering their professional career, a trade
|
||
association furthers the interests of companies in furthering their
|
||
enterprise. He perceived a need, and he hoped to fill the vacuum.
|
||
When 25 software companies signed up, the SPA officially came into
|
||
existence as a non-profit organization. His motivation, according to
|
||
one SPA staff person, was that he simply liked the software industry
|
||
and wanted to further its goals. The SPA was officially founded on
|
||
April 5, 1984. Its current staff of about two dozen people provides a
|
||
variety of services to software publishers and others.
|
||
|
||
SPA MEMBERSHIP
|
||
|
||
Unlike some associations, such as the Business Software Alliance, SPA
|
||
membership is open to any legitimate software or trade-related
|
||
company. SPA membership reached 1,000 in fall of 1992, and continues
|
||
to grow. As a trade association, it represents companies, *not*
|
||
individuals. So, if an individual wants to join, they do so as a
|
||
company. About two-thirds of the members are software developers, and
|
||
one-third are companies who support the software industry, including
|
||
venture capitalists, market researchers, public relations firms, and
|
||
companies whose clients are software manufacturers. The diversity of
|
||
membership is seen as one strength of the SPA, because it infuses a
|
||
variety of ideas and perspectives into programs and policy.
|
||
|
||
DUES AND BUDGET: SPA dues are assigned on an "ability-to-pay" sliding
|
||
scale, depending on the company's annual revenues. Dues range from
|
||
$750 to $125,000 a year. About 60 percent of the members pay in the
|
||
three lowest categories, which are $750, $850, and $1,000. Annual
|
||
dues for a small software company are about the same as the costs for
|
||
a one-year family subscription to cable a cable television full
|
||
service, and are therefore not prohibitive even for the smallest
|
||
companies.
|
||
|
||
EDUCATIONAL AND COPYRIGHT FUNCTIONS:
|
||
|
||
The SPA is divided into two divisions, each with a separate operating
|
||
budget. The first, the GENERAL SPA FUND, is the association's main
|
||
group with an annual operating budget of about $4.5 million. The
|
||
second, the COPYRIGHT PROTECTION FUND (CPF), has a budget of about
|
||
$2.86 million for fiscal year 1993. The term "fund" is used to refer
|
||
to each group, and does not refer only to a pool of money.
|
||
|
||
The general fund provides for rent, maintenance, conferences, and
|
||
salaries for the non-copyright protection personnel. The copyright
|
||
Protection Fund's budget provides for enforcement, educational
|
||
outreach activities such as producing videos, going into schools, and
|
||
publishing SPA brochures, which are given away or at nominal cost. The
|
||
question of how much the SPA spends on education is complex, because
|
||
both groups engage in educational activities. According to Katherine
|
||
Borsecnik:
|
||
|
||
Remember, our primary mission is to serve our members, who
|
||
are primarily software publishers. The copyright protection
|
||
fund is a separate fund that pays for all our anti-piracy
|
||
work, both the litigation and the education. The kind of
|
||
education that you mention, going into schools, or going
|
||
into businesses, or general speeches, all of that is related
|
||
to copyright and intellectual property, so it all comes out
|
||
of Copyright Protection Fund. We have a very large
|
||
education budget in the general fund that goes for things
|
||
like conferences for our members in the software
|
||
industry. . . . I think we're talking about two different
|
||
things here. You're talking about general education as
|
||
anti-piracy stuff. . . . So, the $2. 86 million budget includes
|
||
speeches, brochures, videos, and other information that goes
|
||
to end users. . . They are more expensive, because we do them
|
||
in large quantities, than our legal expenses.
|
||
|
||
The SPA's anti-piracy activities are its most visible and dramatic,
|
||
but they constitute only a portion of what the SPA does for members.
|
||
Ms. Borsecnik explained:
|
||
|
||
There's a laundry list of member benefits. We do a lot of market
|
||
research. A lot of companies join because that market
|
||
research is very valuable to them, and they'd never get the
|
||
kind of research that we do. So we do tons of market
|
||
research. We track sales in 25 diferent software categories
|
||
every single month. We also do market-specific end-user
|
||
studies....
|
||
|
||
And then we have a sales certification program, sort of like
|
||
in the recording industry, gold and platinum, and these are
|
||
programs that help companies with marketability programs,
|
||
those little labels they put on the box that say "certified,
|
||
100,000 sold" or whatever.
|
||
|
||
In addition, the general division does consumer and end-user studies
|
||
on education, provides salary studies, and distributes publications
|
||
that include newsletters, a recently-published book on distribution
|
||
channels, and lengthy articles. They also host three conferences a year.
|
||
They conduct an annual awards presenation modeled on the academy
|
||
awards, and this year 525 products are being nominated for 25
|
||
categories of awards.
|
||
|
||
THE COPYRIGHT PROTECTION FUND
|
||
|
||
The Copyright Protection Fund's staff includes one clerical position,
|
||
an administrative assistant, two or three non-attorney investigators,
|
||
and Illene Rosenthal, the SPA's general counsel and overseer of the
|
||
CPF. She and Ken Wasch, the SPA's Executive Director, are the
|
||
only two attorneys on staff.
|
||
|
||
The Copy Right Protection Fund, formed in 1985, is a separate subset
|
||
of the SPA. It was initially set up and funded by contributions by
|
||
some of the members to help "prime the pump" in the SPA's anti-piracy
|
||
efforts. After that initial pump-priming, it has been entirely
|
||
self-funded by litigtion settlements. A separate committee directs the
|
||
staff a to what kinds of actions to take and is the overseer of the
|
||
anti-piracy's efforts. Similar to a board of directors, the committee
|
||
includes members from the software industry. The dual goals are to
|
||
educate the public about acceptable software use and copyright law and
|
||
to litigate against those judged to abuse copyright law. The fund
|
||
filed its first suit in March, 1988, against "The Clone Store," a San
|
||
Leandro, Calif., computer dealer. The case was settled out of court
|
||
for $10,000.
|
||
|
||
The CPF has generated considerable publicity for its aggressive
|
||
reactive opposition to software piracy, but education, not
|
||
enforcement, is the division's professed primary goal. According to
|
||
staff.
|
||
|
||
The CPF produces brochures explaining copyright protection for
|
||
end-users, promotes awareness of the problem of "soft-lifting," a term
|
||
for using unauthorized copyright software akin to shoplifting, and
|
||
delivers its anti-piracy message to schools, business, and others.
|
||
The SPA's rap-video, "Don't Copy that Floppy" (reviewed in CuD #4.63)
|
||
is available at no cost. The SPA has also developed a program called
|
||
SPAUDIT intended to help end-users, especially companies and schools,
|
||
identify over 650 software programs of members that might be installed
|
||
on a personal computer. The program allows a user to first identify
|
||
which programs exist, and then sort out and remove those that might be
|
||
unpurchased. The program is about 43K and quite easy to use. However,
|
||
in using it on my own system, it identified 13 programs, but at least
|
||
four of the "hits" were false in that these programs were not on my
|
||
system. Nonetheless, the program, even if not particularly accurate,
|
||
possesses a symbolic function in that it raises the consciousness of
|
||
system supervisors and helps establish an ethos of attention to
|
||
outside software on "the boss's" computer.
|
||
|
||
THE CPF--SOFTWARE POLICE?
|
||
|
||
The CPF actively promotes a self-image of "software cop."
|
||
The June 17, 1991, issue of Information Week carried a cover graphic
|
||
similar to a 1940s' comic book: Two respectable looking office workers
|
||
are in their office when a super-hero in a suit and trenchcoat bursts
|
||
through the door, knocking it off its hinges. "Nobody Move! Keep your
|
||
hands away from those keyboards," he says. "Oh my gosh! It's the
|
||
SPA!!" exclaims a shocked male worker. "QUICK! Stash the disks!!" says
|
||
the female. Other advertisements, which it either sponsors or
|
||
endorses, carry the same law-and-order/piracy-will-get-you-jailed
|
||
theme. According to Ms. Rosenthal, the ads and the motif are intended
|
||
to be humorous and not necessarily literal, but they nonetheless
|
||
symbolize what many observers see as a simplistic ethos of harshly
|
||
punitive responses to what in fact is a complex problem. Whether
|
||
justified or not, the SPA has the reputation of simply "not getting
|
||
it" when it comes to possession or use of unpurchased software. It is
|
||
not that the SPA's critics condone theft or support the practice of
|
||
regularly and intentionally violating copyright protections. Rather,
|
||
critics point to what they judge to be questionable tactics in the
|
||
SPA's war on piracy. The SPA responds by stressing that the rights of
|
||
software publishers must be protected from rip-off and deprivation of
|
||
fair compensation for their labor.
|
||
|
||
TARGETING "PIRATES"
|
||
|
||
Contrary to public perception, SPA personnel indicate that they do not
|
||
target a particular group or type of offender. They respond to each
|
||
case individually and target those for whom there is "clear evidence"
|
||
of abuse. Despite their reputation for threats of litigation, they
|
||
stress that their primary strategy is to obtain voluntary compliance
|
||
with copyright law. CuD asked several staff members to explain,
|
||
step-by-step, how they respond to a complaint of copyright violations.
|
||
|
||
First, the SPA receives information from employees, whistle-blowers,
|
||
or private citizens who call its highly publicized "anti-piracy"
|
||
hotline (800-388-PIR8). They receive between 50-150 calls a week, but
|
||
only about 2 to 10 of these are pursued. The first step in pursuing a
|
||
case is to obtain as much information as possible. According to Illene
|
||
Rosenthal:
|
||
|
||
We want to know how long the person's been working,
|
||
where they've been working, what the relationship is they
|
||
have with the company....Obviously, we want to know as
|
||
much as possible. We want to know where the person
|
||
worked, how long they've worked there, how they know this
|
||
information, whether or not they've discussed it with
|
||
management, basically, everything you do in an
|
||
investigation. What specific programs are involved, how
|
||
many programs, illegal programs, there are. This kind of
|
||
information you're going to get over several phone calls.
|
||
You're not going to necessarily get it on the first phone
|
||
call. But, we do a thorough investigation, and when we're
|
||
comfortable with that information, what we're going to do
|
||
is pursue the case. If we're not comfortable with that
|
||
information, obviously we're not going to pursue the
|
||
case.
|
||
|
||
Depending on the evidence, the seriousness of the alleged offense, and
|
||
the motivation, one of several courses of action exist. The first is
|
||
THE RAID, which involves entering the alleged offender's premises and
|
||
searching the computer system(s). Second is an AUDIT LETTER, in which
|
||
the SPA provides a target with an opportunity to voluntarily comply
|
||
with a request to examine hard drives for "unauthorized" software. Third
|
||
is a CEASE AND DESIST LETTER, which is a letter notifying an alleged
|
||
offender that they may be in violation of copyright law and provides
|
||
the target with the opportunity to voluntarily stop the perceived
|
||
offense and avoid further action. The letter option allows the
|
||
company or BBS to do its own investigation and report back to the SPA.
|
||
|
||
The decision on which option to invoke depends on a number of criteria
|
||
on a case-by-case basis. According to Ms. Rosenthal:
|
||
|
||
We discuss this in a group of about seven of us, and we sit
|
||
down and discuss the cases, and we'll throw out the
|
||
various factors and sometimes we'll say, "Look, I need more
|
||
information," and they'll get back to the source to get more
|
||
information. But, ultimately, you get the information you
|
||
need so that you can feel as comfortable as possible taking
|
||
whatever action you decide to pursue or not pursue in a
|
||
given case. . . .We really look at each case on a
|
||
case-by-case basis. It's not that we're looking for
|
||
particular types of industries or particular types of
|
||
organizations. It's the information that comes out, the
|
||
quality of the information, the credibility of the
|
||
informant, the seriousness of the violation, the
|
||
willfulness of the violation, they're just all factors
|
||
that go into it.
|
||
|
||
The AUDIT LETTER presumes good faith on the part of the target. It
|
||
requests permission for SPA personnel to conduct a software audit on
|
||
the premises. In return, the SPA will forgo litigation. The SPA's
|
||
Background Information brochure identifies four principles in the SPA
|
||
software audit:
|
||
|
||
1. An SPA representative observes as the directories of each PC are
|
||
printed.
|
||
|
||
2. Directory information is compared with purchase records.
|
||
|
||
3. The company agrees up front to make a penalty payment to the SPA
|
||
Copyright Protection Fund in the amount equal to the retail price of
|
||
each illegal software program found during the course of the audit.
|
||
|
||
4. All unauthorized copies are destroyed, and the audited
|
||
company agrees to replace them with legitimate copies.
|
||
|
||
Critics argue that this policy constitutes a double penalty.
|
||
First, they claim, there is the equivalent of a coerced fine
|
||
in payment of software costs. Second, purchasing a copy of
|
||
each product found may exceed what some companies need or
|
||
even were aware they had on the systems. SPA supporters
|
||
counter by arguing the payments are voluntary and if the
|
||
company feels an injustice has occured, they are able to
|
||
pursue it through the litigation option.
|
||
|
||
According to SPA staff, it would be difficult for the target to erase
|
||
"evidence," because auditors normally have prior information of what
|
||
software exists and where it is located. "People have tried that
|
||
before and gotten caught," say staff. Staff also indicate that, when
|
||
they choose an audit option, they normally have a source of
|
||
information to inform them of whether the target is answering in good
|
||
faith or not. Although this presumably means an "inside source," SPA
|
||
staff stopped short of saying that it necessarily meant that the
|
||
informant was still employed for or involved with the target: "We
|
||
always have access to information when we send out the audit letters,"
|
||
according to Ms. Rosenthal. What happens if a target says "no!" to an
|
||
audit letter? "We sue 'em," she said.
|
||
|
||
The CEASE AND DESIST LETTER, the least intrusive of the options,
|
||
conveys the threat of a suit if the recipient fails to comply, but
|
||
generally the letter accomplishes the goal.
|
||
|
||
Although the SPA has NEVER actually gone to court against an alleged
|
||
software transgressor, to date they have initiated about 150 civil
|
||
actions. All have been settled out of court, largely on the basis of
|
||
the evidence. According to the SPA General Counsel, in only one case
|
||
has the SPA been "wrong." The SPA's Background Information sheet
|
||
(July, 1992), indicates that the Copyright Protection Fund's first law
|
||
suit was filed in March, 1988, against "The Clone Store," a San
|
||
Leandro, California, computer dealer. The case was settled for
|
||
$10,000. In a larger settlement, the SPA won $350,000 (plus attorneys'
|
||
feels) in a settlement against Parametrix, Inc., a Seattle-based
|
||
environmental and engineering consulting firm in 1991. The
|
||
information sheet also reveals that in 1991 the SPA won a settlement
|
||
with the University of Oregon Continuation Center for $130,000, which
|
||
included an agreement that the University organize and host a national
|
||
conference in Portland, Oregon, on copyright law and software use.
|
||
The University denied the allegations and, according to the University
|
||
legal counsel, the settlement in no way implied an admission or
|
||
concession of guilt.
|
||
|
||
Why would a company chose to settle if they are innocent? According
|
||
to one trial lawyer, it is often the most economically feasible.
|
||
Trials are costly, and even winning a case can be more costly than a
|
||
settlement. To lose can be even more costly. Hence, settling without
|
||
an admission of guilt, as insurance and other companies have learned,
|
||
can be the most rational strategy.
|
||
|
||
When calculating the dollar amount of a settlement, SPA personnel look
|
||
at a number of factors, including the amount of unlicensed software on
|
||
a system. However, staff indicate that rarely will they include or
|
||
respond to non-members' software that might be present, and focus
|
||
instead on their memberships' programs. Nor do members share in
|
||
settlement fees. All monetary awards are returned directly into the
|
||
Copyright Protection Fund to pay for education, salaries, and
|
||
other expenses. Ms. Borsecnik added:
|
||
|
||
All of the money for our settlements goes back into the
|
||
Copyright Protection Fund. The philosophy behind that is
|
||
that that's how we produce the educational materials.
|
||
Because, with the exception of one book that we charge for,
|
||
all of our materials are either free or nominal cost because
|
||
of postage. So our settlements help us continue our
|
||
educational activities. The companies that pay membership
|
||
dues don't pay for what we do on behalf of them in
|
||
copyright. It's all self-funded. They pay us money, and we
|
||
do a lot of other things. . . .education and publications, and
|
||
just tons of stuff we do that have nothing to do with
|
||
piracy. Those things are our primary mission. Piracy is
|
||
something in addition we do for them. They don't pay us
|
||
extra to do that.
|
||
|
||
SPA personnel resist the accusation that they are more interested
|
||
in litigating than in broader educational activities.
|
||
According to the General Counsel:
|
||
|
||
Our primary strategy is to get people to voluntarily comply
|
||
with the software laws. And, we do that by a two-fold
|
||
approach. The first is that we have an extremely effective
|
||
and extremely good educational program. We give over a
|
||
hundred lectures a year about the copyright laws and how to
|
||
manage software, we give a lot of free material, we have the
|
||
SPA audit kit, we have brochures that we give away for
|
||
free--we've given away over 60,000 brochures that, in
|
||
English, tell you what the copyright law is and what you
|
||
have to do to comply, we have videos that talk to you about
|
||
the software laws for about 12 minutes, we have educational
|
||
videos that we give to schools for free.
|
||
|
||
However, the SPA does feel that voluntary compliance requires
|
||
a threat, as the General Counsel explains:
|
||
|
||
((As a criminologist)), you're certainly aware that people are
|
||
unlikely to comply voluntarily if they think that there's no
|
||
risk to complying. This is the perfect situation of where you
|
||
really have to have some reasonable threat of enforcement or
|
||
there's really no incentive for most people to comply.
|
||
|
||
There is considerable debate among criminologists over the degree to
|
||
which coercion is necessary to constrain behavior, and according to
|
||
SPA data, software "piracy" steadily declined from 1989 to 1991. 1992
|
||
data is not yet available. In 1989, they estimated that about 48
|
||
percent of PC was pirated, declining to 37 percent in 1990, and 22
|
||
percent in 1991. This trend seems to challenge the view that
|
||
aggressive litigation has contributed to the decline, because the
|
||
heaviest SPA litigation and corresponding publicity has occured in the
|
||
past two years. Critics would suggest that education and emphasis on
|
||
"computer ethics" has been far more successful in curtailing illicit
|
||
use.
|
||
|
||
THE SHRINK-WRAP LICENSE
|
||
|
||
There is considerable disagreement between attorneys and others over
|
||
the legal status of shrinkwrap licenses. The SPA adheres to the view
|
||
that the shrinkwrap license is a legally binding agreement between an
|
||
end-user and the software author. A SHRINK-WRAP license is so-named
|
||
because most software programs come in a cellophane wrapping that
|
||
seals it.
|
||
|
||
The typical shrinkwrap licence, as typified by the package that
|
||
Microsoft's DOS 5.0 came in, provides among other things that 1) The
|
||
software is owned by the manufacturer, and the user is only licensing
|
||
it; 2) The user may install the program on one and only on one disk;
|
||
3) Only one backup/archival and no others may be made; 4) The user may
|
||
not decompile or disassemble the program; and 5) If the program is
|
||
transfered or given to another, no copies may be retained by the
|
||
original user.
|
||
|
||
Despite the many criticisms of these licenses, the SPA argues that
|
||
unsealing by breaking the cellophane is an explicit and unalterable
|
||
agreement that the user will abide by whatever restrictions on use and
|
||
copying are contained in the small print. Although nothing on point
|
||
has been established in a court of law, the SPA defends shrinkwrap as
|
||
a valid contract. Others, however, aren't so sure (see Lance Rose's
|
||
commentary in CuD 5.06).
|
||
|
||
SUMMARY
|
||
|
||
Whether one supports or opposes the SPA's methods, several points seem
|
||
clear:
|
||
|
||
1) The SPA is committed to serving its members, and does so
|
||
aggressively.
|
||
|
||
2) When discussing the SPA, care should be taken to distinguish
|
||
between its general activities and the Copyright Protection Fund.
|
||
|
||
3) The SPA's actions have been instrumental in raising the issues of
|
||
software piracy to a level that demands public dialogue regarding
|
||
whether and/or where an acceptable line should be drawn between
|
||
"zero-tolerance" and permissable fair-use.
|
||
|
||
4) The issues raised by the SPA's aggressive anti-piracy campaign
|
||
extend beyond a single organization or policy. They raise issues of
|
||
reconciling competing interests--those of publishers and
|
||
end-users--and of identifying appropriate social responses to alleged
|
||
transgressions. The issues also include resolving the problem of
|
||
applying familiar legal and ethical concepts and theories to changes
|
||
brought by revolutionary technology.
|
||
|
||
The SPA certainly deserves credit for raising the issues
|
||
of software abuse. However, some of its methods continue to be subject
|
||
to severe criticism. In the interstices between "zero-tolerance" and
|
||
fair-use lies considerable room for honest intellectual disagreement.
|
||
It is not sufficient for those of us who are critical of some of the
|
||
SPA's methods to simply sit back and take shots at their method. If we
|
||
don't like the methods, we are certainly bound to criticize them, but
|
||
we are also obligated to develop constructive alternatives to balance
|
||
the rights of both users and publishers. Among the questions we pose
|
||
to readers:
|
||
|
||
1) What, if any, are the acceptable limits of software copying and
|
||
distribution beyond those authorized by shrinkwrap licenses?
|
||
|
||
2) What legal sanctions ought be provided for the wide range of
|
||
possible infractions that recognize extreme abuse on one hand and
|
||
casual ethical lapses on the other?
|
||
|
||
3) How might current or future laws be revised or written that would
|
||
minimize potential prosecutorial abuse on one hand, but provide
|
||
sufficient sanctions for appropriate transgressions on the other?
|
||
|
||
4) When does "fair-use" become ripoff?
|
||
|
||
These and other issues will be explored in future issues.
|
||
|
||
((CONCLUDING NOTE: We invited the SPA to read this issue prior to
|
||
publication. We delayed it by over a week to provide them the
|
||
opportunity. We indicated that we would be amenable to correcting any
|
||
errors, and would be willing to revise whatever they found inaccurate
|
||
or unfair. I was given an email address, and it was confirmed as
|
||
correct. Several notes and two of the three files were sent. The third
|
||
was to be sent when I received confirmation of receipt. I received no
|
||
response. I left a message on the appropriate SPA staffer's answering
|
||
machine indicating that the files had been sent and reaffirmed
|
||
encouragement to read the files and provide feedback. I received no
|
||
answer as of Feb 7.
|
||
|
||
We encourage the SPA to engage in a dialogue over the issues to be
|
||
addressed in this and coming issues. If they are as serious about
|
||
public outreach and education as they repeatedly emphasized, we hope
|
||
they welcome the opportunity to engage in a dialogue with CuD
|
||
readers)).
|
||
|
||
------------------------------
|
||
|
||
Date: 01 Feb 93 22:51:51 CST
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 3--How does the SPA Calculate Piracy?
|
||
|
||
The Software Protection Association (SPA) estimates that software
|
||
piracy has declined between 1989-91. But, says the SPA, piracy still
|
||
cost the industry over $1.2 billion in lost revenues in 1991. Critics
|
||
argue that the piracy rate and its costs are grossly over-estimated.
|
||
The SPA believes that its estimates, while perhaps imperfect,
|
||
nonetheless are quite conservative and, if anything, significantly
|
||
underestimate the extent of software piracy. Who's right? How does
|
||
the SPA arrive at its estimates? The information below comes from SPA
|
||
documents and from SPA David Tremblay, SPA's Research Director.
|
||
|
||
Identifying and counting behaviors that are normally hidden presents
|
||
several methodological problems. Calculating the extent of piracy is
|
||
no exception. First, there is no victim in the traditional sense.
|
||
There are no snatched purses, dead bodies, empty bank accounts,
|
||
trashed computers, or other directly obvious signs of predation.
|
||
Therefore, we rarely have direct knowledge of an alleged "offense."
|
||
Second, the concepts used to define or measure an "offense" can pose
|
||
particular problems, because definitions are subject to imprecision.
|
||
Third, "victims" of piracy are often unaware that they are victims
|
||
until informed by someone who measures victimization, such as the SPA.
|
||
|
||
The "DARK FIGURE OF CRIME" is the knowledge-gap between crimes KNOWN
|
||
to have occured and crimes that ACTUALLY occured. No existing
|
||
methodolgy can precisely measure this dark figure, and even the most
|
||
sophisticated provide only approximations. It's therefore not
|
||
surprising that the SPA's attempts to measure the "dark figure of
|
||
piracy" face methodological problems.
|
||
|
||
The Methodology
|
||
|
||
Four sets of facts and an assumption underlie the SPA's methodology.
|
||
One set of facts is hardware sales from Dataquest, a marketing
|
||
research company in San Jose, Calif. The calculations begin by
|
||
determining the number of Intel- and MacIntosh-based PCs sold during a
|
||
given year.
|
||
|
||
The second set of data derives from an SPA reporting program in which
|
||
about 150 of the generally larger companies report their unit sales
|
||
and revenue to the SPA. The business applications sales are taken
|
||
from the report and used to estimate the the total unit sales of
|
||
software in the U.S. in a given year. Operating systems are excluded.
|
||
The data do not constitute a random sample, but are based on voluntary
|
||
self-reporting of the participating companies. This method is common
|
||
in survey research and, if used with caution, the lack of randomness
|
||
or representativeness of the population surveyed need not be a
|
||
problem.
|
||
|
||
The third set of facts is the average number of applications that
|
||
users are estimated to have on their personal computers. This body of
|
||
data comes from member research that is sent back to the SPA. The
|
||
members obtain this information from several sources, including
|
||
surveys of their own customer base and from returned registration
|
||
cards. The SPA estimates that the typical DOS (or Intel-based) PC user
|
||
has three applications, and the typical MacIntosh user has five. One
|
||
reason that Mac users may have more than Intel-based users is the ease
|
||
of use and the cross-learning between different Mac programs that
|
||
reduces the learning curve and better-integrates the Mac programs with
|
||
each other.
|
||
|
||
The fourth datum is the average price for a software program in a
|
||
given year. However, in calculating the total dollar volume of
|
||
revenues lost to piracy, David Tremblay indicates that "street value"
|
||
prices are factored in, rather than assuming that each program would
|
||
sell for market list price.
|
||
|
||
Finally, the methodology is based on the ASSUMPTION that all of the
|
||
units of software that are purchased in a calendar year are purchased
|
||
by or for use on PCS that are new that year. It assumes no application
|
||
sales to computers purchased in previous years.
|
||
|
||
These data are then plugged into a formula (figures are illustrative):
|
||
|
||
1. The PC hardware sales (in number of units) are multiplied by the
|
||
number of applications used. If there are 1 million Intel-based units
|
||
sold, and each has 3 commercial software applications (excluding the
|
||
operating system itself), we get a figure of 3 million.
|
||
|
||
2. The number of applications used is subtracted from the number of
|
||
applications purchased during that year. If 2.4 million applications
|
||
are sold, the difference is 600,000. This is assumed to be the number
|
||
of applications pirated.
|
||
|
||
3. The number of applications pirated is then multiplied by the
|
||
average cost of a software package, which has declined from $189 in
|
||
1989 to $152 in 1991.
|
||
|
||
David Tremblay candidly recognizes the methodological problems,
|
||
although he feels that, on balance, the problems understate rather
|
||
than overstate the level of piracy. He recognizes several market
|
||
problems that could affect the estimates (the skewing directions are
|
||
my own):
|
||
|
||
1) Since 1989, the average price per software application has
|
||
decreased. This skews DOWNWARD the proportion of dollar losses from
|
||
year to year.
|
||
|
||
2) Hardware sales have been revised downward by Dataquest, which
|
||
reduces the base number of PCs on which piracy estimates are based.
|
||
This skews the piracy estimate UPWARD.
|
||
|
||
3) Contrary to the assumption of "no application sales to installed
|
||
base," there is evidence that an increasing percentage of software is
|
||
being sold for use on existing PCs. This skews the piracy estimate
|
||
UPWARD.
|
||
|
||
There are additional problems. Among them:
|
||
|
||
1) The total software sales include sales of upgrades. This would
|
||
seem to under-estimate the extent of illicit software, because it
|
||
over-estimates the base-figure of software sold. For example, if 100
|
||
PCS are sold in a given year, and if each PC has an average of three
|
||
applications, we would expect 300 applications to be sold. If,
|
||
however, we find that only 270 applications are sold, the "piracy
|
||
score" would be 300-270= 30; 30/300 = .1, or ten percent. If upgrades
|
||
are included, and if 20 percent of sales are upgrades, that means
|
||
300-216 = 84; 84/300 = .28, or a 28 percent piracy rate. Including
|
||
upgrades skews the piracy estimate DOWNWARD but the costs of piracy
|
||
UPWARD.
|
||
|
||
This, however, is misleading, because the base number of applications
|
||
is taken for *all* PCs, not just the PCs purchased in the first year.
|
||
There is no evidence to suggest that the number of applications on a
|
||
PC declines overtime. The evidence, as the SPA acknowledges, is the
|
||
opposite. Hence, the base-figure of total applications (3) does not
|
||
give an accurate expectation of the expected number of software sales,
|
||
which would dramatically inflate the base of software sales. Consider
|
||
this example: Person A purchases a computer and three software
|
||
programs in 1989. Person A purchases two more programs in 1990, and
|
||
one in 1991. Person B purchases a computer in 1991 and three
|
||
applications in 1991. Assuming that they are the only ones who
|
||
purchased software or hardware in 1991, the average number of
|
||
installed applications on a PC is 4.5. The number of software sales in
|
||
1991 is 4. An awkward percentage aside, The piracy score is .5 (half a
|
||
program, or 12.5 percent piracy rate). In reality, all applications
|
||
can be matched to sales, but the method's assumptions inflate the
|
||
score. It's currently difficult to assess how severely inclusion of
|
||
installed applications on previously purchased computers exaggerates
|
||
the piracy figure. But, if the SPA's current piracy estimate of 20
|
||
percent is correct, even a small influence would produce a dramatic
|
||
inflation of the estimate. The SPA's method of including all
|
||
installed applications in its base data, while restricting comparison
|
||
to only applications purchased in the most recent year, is to my mind
|
||
a fatal flaw.
|
||
|
||
In short, the applications on a PC include not only applications
|
||
purchased the first year, but also include all those collected in
|
||
subsequent years. Further, even if upgrades are included (which would
|
||
push the piracy score DOWNWARD), the price of upgrades at street
|
||
prices is generally a fraction of cost for a program's first-purchase,
|
||
and failing to take this into account skews loss of revenue UPWARD.
|
||
|
||
2) A second problem involves the reliability (consistency) and validity
|
||
(accuracy) of reporting methods of company-generated data, especially
|
||
registration card data. It cannot be assumed that the methodological
|
||
procedures of different reporting companies are either consistent
|
||
among themselves (which means they may not be reporting the same
|
||
things) or that their procedures are uniformly accurate. Differing
|
||
definitions of concepts, variations in means of tracking and recording
|
||
data, or differences in representative are but a few of the problems
|
||
affecting reliability and validity. This could skew estimates EITHER
|
||
upward or downward.
|
||
|
||
3) The value of lost revenue also is dramatically inflated by other
|
||
questionable assumptions. For two reasons, it cannot be assumed that
|
||
every unpurchased program represents a lost sale. First, there is no
|
||
evidence to support, and much evidence to challenge, the assumption
|
||
that if I did not possess a copy of dBase or Aldus Pagemaker
|
||
"borrowed" from my employer that I would purchase it. The ethics of
|
||
such borrowing aside, such an act simply does not represent nearly
|
||
$1,000 of lost revenue. Second, as an actual example, I (and many
|
||
others at my university) have dBase and Word Perfect (and many other
|
||
programs) licitly installed on a home or office PC. These two programs
|
||
alone have a street value of about $700. I would include them as
|
||
"installed" programs in a survey. However, I did not purchase either
|
||
program. Hence, they would not show up in sales statistics, and would
|
||
therefore be attributed to "piracy." But, I did not obtain them
|
||
illicitly. They were obtained under a site license and are installed
|
||
licitly. Consider another example. When I purchased a PC in 1988, it
|
||
came (legitimately) loaded with two programs. I bought two more. Now,
|
||
I have four legitimate programs loaded, but only two would show up in
|
||
normal sales figures. It would seem, from the statistics, that I had
|
||
two "pirated" programs--two purchased, two unpurchased, even though
|
||
there were none. BOTH the piracy score and the lost revenue estimate
|
||
are skewed UPWARD.
|
||
|
||
Although the subject of a separate article, the SPA's method also
|
||
fails to consider the possibility that casual copying and sharing may
|
||
enhance rather than reduce sales by creating a "software culture" and
|
||
increasing the visibility and end-user facility with the products. If
|
||
sales are increased, it would skew the lost revenues UPWARD. Whatever
|
||
the result, this is an assumption that cannot be discarded without
|
||
strong empirical evidence.
|
||
|
||
These are just a few of the problems that inflate the overall picture
|
||
of piracy and why I cannot accept the figure given by the SPA as
|
||
accurate. And, if the piracy rate for 1991 is only about 20 percent
|
||
(and in decline), it would appear that--even if the problem is only
|
||
mildly inflated--the losses are far, far less (and the problem
|
||
therefore not as severe) as anti-piracy advocates claim. Yet, despite
|
||
dramatic evidence of decline on a variety of key indicators, SPA
|
||
rhetoric, its advocacy for broader and more punitive legislation, and
|
||
its lucrative aggressive litigation campaigns continue to escalate.
|
||
|
||
A caveat: David Tremblay, the SPA Research Directory, makes no claims
|
||
about total accuracy. He is also aware of and quick to point out some
|
||
of the methodological problems. He would not agree with my view of at
|
||
least some of the problems, and perhaps has antidotes for others. In
|
||
my own discussions with him, he was careful not to speak beyond the
|
||
data, and--like any good methodologist--approached the task of
|
||
calculating piracy as a puzzle. His own attitude, if I understood him
|
||
correctly, was that he's more than willing to modify the method with a
|
||
better procedure if one can be pointed out. Perhaps I misunderstood
|
||
him, but I was continually left with the impression that his goal was
|
||
not to "prove" a preferred outcome, but to refine the data and method
|
||
to provide as accurate an estimate possible, whatever answer it might
|
||
provide. In short, he has no preconceived ideological ax to grind in
|
||
coming up with his figures.
|
||
|
||
It should be noted that if a different methodology were used, it is
|
||
quite possible that both the extent of piracy and the lost revenue
|
||
costs *could* be much higher than the SPA's estimates. However, at
|
||
stake is *this* methodology. Contrary to SPA claims, *this*
|
||
methodology appears to INFLATE the frequency and costs.
|
||
|
||
This, however, does not alter the fact that SPA press releases and
|
||
other material appear to manipulate the data to promote a distorted
|
||
image of piracy. We can agree that there are those who unethically
|
||
(and illegally) profit from piracy, and we can agree that if one uses
|
||
a commercial software program regularly, payment should be made. This
|
||
does not mean that we must also accept the dramatic image of rampant
|
||
piracy and multi-billion dollar revenue loss by casual "chippers."
|
||
Software piracy is, according to SPA data, in dramatic decline.
|
||
Evidence suggests that this decline is the result of education and
|
||
awareness, rather than coercive litigation. At stake is not whether
|
||
we accept ripoff, but rather what we do about it. The statistical
|
||
method and its results do not seem sufficient to warrant increased
|
||
demands for tougher piracy laws or for expanding the law enforcement
|
||
attention to address what seems to be a declining problem.
|
||
|
||
If I am correct in judging that the SPA's estimate of piracy is
|
||
significantly inflated, then it seems that they are engaging in
|
||
hyperbole to justify its highly publicized litigation campaign. Some
|
||
might find this a good thing. My own concern, however, is that the
|
||
litigation campaign is a revenue-generating enterprise that--to use
|
||
the SPA's own promotional literature--resembles a law unto itself,
|
||
more akin to a bounty hunter than a public-interest group. The SPA
|
||
appears to have an image problem, and the root of the image problem
|
||
lies in some critics see as speaking beyond the data in describing
|
||
piracy and in using the law to fill its coffers. It is unfortunate
|
||
that the many valuable things the SPA does are overshadowed by its
|
||
self-laudatory high-profile image as a private law enforcement agency.
|
||
|
||
The methodology underlies an ideological opposition not just to
|
||
intellectual property, but to human interaction and socal norms. In
|
||
promoting a zero-tolerance attitude toward a strict definition of
|
||
"piracy" and rigid adherence to the limitations of shrinkwrap
|
||
licenses, the SPA would isolate the causal swapper and criminalize
|
||
along with major predators non-predators as well. As Richard Stallman,
|
||
a promoter of freeware, argues in the first issue of _Wired_ Magazine
|
||
(p. 34), violation of shrinkwrap is called piracy, but he views
|
||
sharing as being a "good neighbor:"
|
||
|
||
I don't think that people should ever make promises not to
|
||
share with their neighbor.
|
||
|
||
It's that gray area between being a good neighbor and crossing over
|
||
into unacceptable behavior that, to my mind, poses the dilemma over
|
||
which there is room for considerable honest intellectual disagreement.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.11
|
||
************************************
|
||
|
||
|