Category Archives: Copyright

Up for air & Question about 2010 test-bank scandal.

Obviously, I’ve been away from the blog. (Thanks Mosher for keeping things alive!)

So what have I been doing? As many know, I’ve been enjoying tutoring. With the upcoming semester, I wanted to get some stuff ready for when students are really motivated to do things. In that regard, I have a “moodle” site. Last year, I acquired several AP Physics C students one month before the test, and helped them with problems. Two of those students had found some ‘not officially disclosed’ Multiple Choice sections of AP Physics C. (I had not known these exist.) To answer their questions, I am coding alternate versions of questions now. It seems to me that kids who work the multiple choice practice early on identify their specific weak points more easily than those who bang their heads on the free-response before they are really ready to cope with those, so I’d like to have a supply of useful MC questions for students to practice them.

Of course copyright prevents me from distributing the actual versions. But I don’t see anything wrong with figuring out the proportion of kinematic questions that have equations vs. numbers for answers, nor noticing that the AP picks values for constants and time that would never require a student to use a calculator. Now that I know the ‘flavor’ of the questions, I wanted to code up versions that test the same notions but in a slightly different way. Once coded these can be used year after year likely even after the AP decides to somehow change their test in some way.

It always helps to do this quite a while before they are needed, to create them in one fell swoop and organize them in categories. I’ve been doing that. I’ve also been coding conceptual physics questions and organizing that dovetail a particular schools curriculum and doing a similar things for a UIC Phys 105 class. All of this is enjoyable, not at all difficult and so on. But it is a time sink.

But now for conversation! I’d like to hear people’s opinions on a very old scandal related to university students at University of Central Florida. It happened in 2010. The scandal is discussed here: here.

If I understand correctly:

  1. When preparing for their midterm, approximately 1/3rd students in a lecture class of 600 students studied for their midterm by using a questions from a test bank which turned out to be the one the professor also used. Reports indicate the test bank contained approximately 300 questions; the midterm contained 50. (I assume it was the textbook assigned for the course, but I’m not certain of that.)
  2. The professor detected the fact that students had done so in part by noticing statistical anomalies in the distribution of the test and in part because a student sent him a copy of the test bank the students had used.
  3. Different students have slightly different things to say about their use of the test bank. However, one of the main points students seem to make is the professor gave the the impression he wrote questions himself. That is: they did not come from a test bank and so thought they had merely found a good study aid.

I want to hear what others think, so I’m not going to share my opinion at length. (I can state that Jim and I were in violent agreement on our views. 🙂 But I’m not at all sure our views are in the majority. ) I’m going to hold off saying more until I hear what others interested in sharing their views think. (For what it’s worth, I suspect people will have a view and must will be unlikely to change it with conversation. It’s clear from discussions back in the day that lots of people have very strong views on this. I’m just curious to learn what people think about the incident.)

Naturally, there are videos. This one is a very upset professor accusing his students of cheating.

This is posted by students to explain why they believed he did not use questions from the test bank and so thought they were just studying.

Anyway: If you find this engaging, let me know what you think. Off topic allowed. (And yes, you may also discuss the fact that a large trove of questions for the new SAT leaked this summer. The home of a former employee of the College Board was raided by the FBI last week. If your kid is a junior in high school, they might be interested in this tidbit. )

Troll Linda Ellis Felled by GA Supreme Court

On Friday March 27, the Georgia Supreme Court ruled in favor of Matt Chan in his appeal of a lower court ruling finding ‘stalking’. My interpretation of the ruling— which I’ve read using my non-lawyer eyes– is the Court not only granted Chan’s appeal but

  1. They ruled in his favor 7-0. This was not a close call at all. Every single judge ruled for Chan.
  2. This was not a “first amendment beats stalking” case: Every single member of the court ruled Chan did not contact Ellis. Stalking through contact was the only mechanism of stalking even claimed in the lower court ruling against Chan. When overruling the lone (in my view demented) Judge Jordan, the Georgia Supreme Court overturned the conviction because– basically– the Ellis side did not provide evidence that indicated Chan stalked Ellis. American’s all understand that courts never actually clearanyone of a crime; courts always leave open the possibility that some evidence not presented to them exists somewhere. So one can’t go so far as to say the justices fully, 100% decreed Chan did not stalk. However, effectively they overturned his conviction ruling he did not stalk Ellis– or at least Judge Jordan’s ruling was not supported by the evidence presented to him in court.
  3. Sexally Explicit Death ThreatThe ruling was not based on a cursory exposure to the evidence presented in the lower court. I write this because Linda Ellis is suggesting that the difference in lower court ruling is the one based on ‘facts’ (and so implying the other is not.) At least that’s the argument I infer when Linda Ellis writes

    what it clarifies is that people tend to form an opinion without receiving all the facts. The initial judge had the facts…he received them in an all day hearing. Those that are not presented here for you. That’s why he (the judge) issued a permanent restraining order in the first place. 😉

    In fact, the seven justice of the Georgia Supreme court ruled after viewing copious amounts of evidence and reading arguments and counter arguments of legal representatives from both sides. Matt Chan had had the presence of mind to enter much of the forum content into the evidence when presenting to the lower court– thereby giving the justices access to that evidence. Moreover, the evidence included portions highlighted by representatives for Ellis’s side. Among these were examples of posts Ellis had used to convince the lower court that the ELI forum contained death threats and sexually explicit material. The image to the right is one Ellis’s lawyers highlighted– presumably because they consider that image some of the strongest evidence of “death threat”, and “sexually explicit”. (Other examples included someone linking to a youtube video of someone signing the child’s song “the worms crawl in the worm’s crawl out”– a song I have known since I was less than 7 years old and which we giggled to while singing at day camp.)

  4. This is not a “Federal law idemnifies forum owner who let his visitors stalk” ruling. While the Ellis side presented quite a bit of content written by visitors to Chan’s forum and complained that content not written by Chan demonstrated Chan was stalking, the Supreme courts argument that content– posted by third parites– would not be ruled stalking even if the content creators themselves were being accused of stalking. Chan didn’t need federal indemnity for permitting them to post that material because that material did not represent “contact” either.
  5. The ruling was not a technicality based on any sort of “cyber” element excluding “cyber” stalking form “stalking” . The court recognized that “contact” can occur on electronic media writing

    For purposes of the statute, one “contacts another person ”when he“ communicates with another person” through any medium, including an electronic medium

    So it’s rather clear the justices would consider ‘cyber contact’ to be a form of ‘contact’. However, non-contact remains non-contact whether the ‘non-contact’ occurs when someone talks to a third party while sitting on a bus, writes an article in a dead-tree newspaper or posts a comment on an electric forum. These discussion are not magically vaulted into the domain of “contact” merely because they occurred in cyber-space rather than meat space.

  6. The ruling was also not based on any sort of “technicality” related to Linda visiting the ELI form. I mention this because Linda Ellis is claiming so writing

    I had already been granted permanent protection from this guy and then it was taken away on a technicality

    in comments at a newspaper online forum.

In brief: The court ruled in Chan’s favor because the evidence presented by Ellis’s side did not support the claim Chan was guilty of stalking Ellis by “contacting” her. The lower court didn’t find him guilty of stalking her in any other ways possible under the Georgia statute– presumably because the lower court didn’t find evidence to support a guilty charge under other branches of the statutes. So: the lower courts ruling was overturned for lack of evidence of any “stalking”. The ruling was not close; it was not a technicality. The stalking ruling was overturned because Judge Jordan’s ruling was not supported by the evidence presented in court.

My hope. As some know, a huge amount of information discussing Linda Ellis’s distasteful money grasping business practices used to appear at Matt Chan’s ELI and was taken down as a result of Judge Jordan’s legally unsupportable ruling and ridiculous PPO preventing Matt from running a forum that discussed Linda Ellis in any way, shape or form. The duration of the PPO? Forever.

I hope the Ellis forum will re-appear shortly at ELI. I have two reasons for this wish:

First, re-publication will permit interested readers to view the posts Ellis and her legal representatives claimed demonstrate ‘stalking’, are ‘sexually explicit’ or amount to “death threats”. Full republication would permit the posts to be read in context. While many people might consider cartoon images of people with pants pulled won juvenile, crude or ineffective tactics, these sort of things are not “death threats”. Posting that sort in public for the amusement of third parties is not “stalking”. The lower court ruling against Chan was rightfully over turned. I applaud it and I’d like interested parties to see the forum to learn just how ridiculous the ruling was.

Second if the former forum content is re-posted, it will permit people to learn more about Ellis’s business practices some of which I highlighted here: Don’t Post Linda Ellis’s ‘The Dash’. While Linda Ellis may believe she is entirely justified in sending out heavy handed, scary letters demanding exorbitant amounts of money from those who posted her poem in extremely lightly trafficked back-waters of the web, I think she her behavior is outrageous. I think she should be publicly shamed. But if I am wrong and she is correct, she shouldn’t mind people discussing her business model in public. So the public discussion shouldn’t bother her one iota. Her behavior which involves filing restraining orders and DMCA takedowns which would have the effect of removing all discussion of her business practice suggests she would prefer people remain unaware that the sois-dissant life-affirming poetess cares more about extracting cash from those who post the dash than she cares about living a full-graceful life that exhibits care and kindness toward others. This suggests she is a hypocrite.

But my concern is not that she is a hypocrite. My concern is that scrubbing the internet of information about her business practices puts naive people who might publish her poem — possible in honor of the death of a loved one– at risk of receiving frightening letters demanding amounts of money they can ill afford to pay. Publicizing her practice might prevent some from posting the stupid poem and with luck will allow the trite thing to fall into obscurity where it rightfully belongs.

With that, I close my sermon. I invite those who wish to discuss copyright extortion, restraining order abuse, abuse of DMCA or any topic associated with the Chan and Ellis ruling to comment.

Update: I’m going to post links to other sites discussing this case which are appearing.

  1. Oscar Michelin posted a nice history of his involvement.

Other updates:
Linda appears to now be inviting comments at her facebook. This one looks at least as much of a “death threat” as the cartoon of people with their pants pulled down.
It’s been up 15 hours. Linda has posted within 9 hours. If she really thinks this sort of thing is a death threat, stalking and so on, and that a visitor to her facebook page thinks the other person writing it constitutes her writing it or her stalking, you’d think she’d take it down. Nope.

Dixon & Jones: Shows Lew wrong about Climate Change -Conspiracy Ideation link.

What an exciting weekend!
I went to a family reunion and missed publication of
Conspiracist Ideation as a Predictor of Climate-Science Rejection by Ruth M. Dixon and Jonathan A. Jones. I consider this paper important precisely because it engages the claimed link between conspiracy ideation and climate skepticism. Of course, there were may ways to see the link did not (and does not) exist, but writing a paper requires dressing up the discussion with good stat. Good for Dixon and Jones!

I got back at midnight last night. It’s clear that many things have been said– too many for me to track down. I’d actually like readers to catch me up on it.

Meanwhile another exciting thing happened which I did learn of while driving. It is not climate related. It’s ‘copyright troll related: The Georgia Supreme Court ruled on Chan v. Ellis”. The short story is they overturned Chan’s conviction of stalking on the grounds that there was no evidence of stalking. So: Basically, didn’t stalk. They didn’t need to touch the 1st amendment arguments which only would have mattered if (a) The GA statute had been written to violate 1A or (b) He had done something that violated the stalking statute but the punishment of a permanent protective order and permanent gag-order including take-down of speed by others had violated 1A.

Because I have read the GA ruling, I’ll be writing more on that later today. Meanwhile catch me up on Lew stories!

Possible copyright suit? (To Be Continued…)

It seems about time to start a new open thread. For most of you, that will be the only interesting part of this post.

Other than that… it’s going to be about an email I received which I suspect may have come from copyright troll Linda Ellis. I thought you might enjoy the email. If not.. carry on discussing other things.

Why do I suspect the email is from Linda Ellis (author of “The Dash”?

  1. It originates from IP 162.235.197.19 which resolves to Marietta, Georgia, United States (US), the city where I believe Linda Ellis resides.
  2. It alludes to a takedown notice. As some of you know, Linda Ellis sent a DMCA take down notice for content associated with this post which hot-links a parody image of Linda Ellis Poetess author of the inspirational life affirming people also known as “The Dash” shown as a troll.
  3. April Brown has just launched a site to promote her soon to be published book, Poetic Justice, . That book discusses Linda Ellis and provides some history about “The Dash” . If Linda learned of the new site, it may have placed her in a more “active” mode than previously and so triggered this email.

    By the way, I placed a pre-publication order for Poetic Justice but have not yet received nor read the book. I’m hoping the book does well, as I think the best way to deal with Linda’s Ellis’s business model is to make people aware of how it operates.

Of course I may be wrong. It’s possible someone else sent the email.

Today’s communique.
For those curious about the email, I have included the content of the email itself as well as the (very boring) entries form my access logs which show someone arriving from google image search,

To:
Webmaster

Name:
GP

Email:
goodprevails@gmail.com

Subject:
Damages $$$$$

Message:
Takedown notice was issued on copyrighted photo. Copyrighted photo was not removed. NOW is the damages phase. Google it. Talk to a lawyer because one will be talking to you soon. DAMAGE$ $$$$ 😉

Akismet Spam Check: passed
Sent from (ip address): 162.235.197.19
(162-235-197-19.lightspeed.tukrga.sbcglobal.net)
Date/Time: December 19, 2014 3:34 pm
Coming from (referer): http://rankexploits.com/musings/contact-lucia/
Using (user agent): Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2

So, I guess I should be expecting a process server to knock on my door any minute know. If so, yes, I’ll get a lawyer. Meanwhile, I’m not too worried about accusations of copyright violation over a hotlinked image.

As I wish to retain copies, here are the hits to the blog post:

162.235.197.19 - - [19/Dec/2014:07:26:36 -0800] "GET /musings/2013/dont-post-linda-elliss-the-dash/ HTTP/1.1" 200 54881 "http://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&ved=0CAMQjxw&url=http%3A%2F%2Frankexploits.com%2Fmusings%2F2013%2Fdont-post-linda-elliss-the-dash%2F&ei=ykKUVOv3NYamgwSJmoGICQ&bvm=bv.82001339,d.eXY&psig=AFQjCNGX3OVklaPAVYo7Fg91OLSbdH1TEw&ust=1419089193715121" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:40 -0800] "GET /musings/wp-content/plugins/akismet/_inc/form.js?ver=3.0.4 HTTP/1.1" 200 982 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:40 -0800] "GET /musings/wp-content/plugins/editable-comments/dialog/styles.css?ver=4.0.1 HTTP/1.1" 200 28426 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:40 -0800] "GET /musings/wp-content/uploads/2013/03/Turn_Around_Schools_Ellis_Took_Down-500x301.png HTTP/1.1" 304 167 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:41 -0800] "GET /musings/wp-content/uploads/2013/03/UnpopularityContest-500x406.png HTTP/1.1" 304 167 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:41 -0800] "GET /musings/wp-content/uploads/2013/03/Non-liability.png HTTP/1.1" 304 166 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:41 -0800] "GET /musings/wp-content/uploads/2013/03/Non-liability-500x206.png HTTP/1.1" 304 167 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:41 -0800] "GET /musings/wp-content/uploads/2013/03/Ellis_habit_of_editing-500x188.png HTTP/1.1" 304 167 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:41 -0800] "GET /musings/wp-content/plugins/BanNasties/avatars/today_image.php?uri=/GrizeldaPeering.jpg&Days=14352&Post=rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/&IP=162.235.197.19 HTTP/1.1" 200 1431 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
[...]
162.235.197.19 - - [19/Dec/2014:07:26:46 -0800] "GET /musings/contact-lucia/ HTTP/1.1" 200 81408 "http://rankexploits.com/musings/2013/dont-post-linda-elliss-the-dash/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:49 -0800] "GET /musings/wp-content/plugins/si-contact-form/captcha/images/refresh.png HTTP/1.1" 200 1376 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:49 -0800] "GET /musings/wp-content/plugins/si-contact-form/captcha/securimage_show.php?prefix=wrJcdEdHJhFSBpfG HTTP/1.1" 200 6578 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:50 -0800] "GET /musings/wp-includes/images/smilies/icon_sad.gif HTTP/1.1" 304 164 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:50 -0800] "GET /musings/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1 HTTP/1.1" 200 7484 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:50 -0800] "GET /musings/wp-content/plugins/si-contact-form/includes/fscf-scripts.js?ver=163 HTTP/1.1" 200 974 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:51 -0800] "GET /musings/wp-content/plugins/BanNasties/avatars/today_image.php?uri=/GrizeldaPeering.jpg&Days=14352&Post=rankexploits.com/musings/contact-lucia/&IP=162.235.197.19 HTTP/1.1" 200 1431 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:51 -0800] "GET /musings/wp-includes/js/jquery/jquery.js?ver=1.11.1 HTTP/1.1" 200 96093 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:26:52 -0800] "GET /musings/wp-includes/js/jquery/ui/jquery.ui.core.min.js?ver=1.10.4 HTTP/1.1" 200 4573 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"

[...]
162.235.197.19 - - [19/Dec/2014:07:34:00 -0800] "GET /musings/wp-content/plugins/si-contact-form/includes/ctf-loading.gif HTTP/1.1" 200 3037 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:33:59 -0800] "POST /musings/contact-lucia/ HTTP/1.1" 200 80230 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:34:02 -0800] "GET /musings/wp-content/plugins/BanNasties/avatars/today_image.php?uri=/GrizeldaPeering.jpg&Days=14352&Post=rankexploits.com/musings/contact-lucia/&IP=162.235.197.19 HTTP/1.1" 200 1430 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:34:05 -0800] "GET /musings HTTP/1.1" 301 497 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"
162.235.197.19 - - [19/Dec/2014:07:34:05 -0800] "GET /musings/ HTTP/1.1" 200 9484 "http://rankexploits.com/musings/contact-lucia/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/537.78.2 (KHTML, like Gecko) Version/7.0.6 Safari/537.78.2"

Anyway… carry on! Or if you are an attorney (or play on on the internet) feel free to speculate on whether we have entered the “Damages” phase.

What constitutes ‘hacking’?

On my previous post,Eli resorting to his usual ‘lack of detail’ mode of communication wrote “Simply put Brandon hacked system where the data was stored..”. That claim raises questions and resolves none. For example: which “system” does Eli think Brandon hacked? And which actions of Brandon’s constitute “hacking”? Also, Eli is not UQueensland, so unless the source for his claim is the UQueensland itself, there is no reason to believe he knows what actions they consider hacking, nor what evidence they think they have ‘hacking’ or some unspecified by them sort happened on some unspecified by them system.

That said: we do know some actions Brandon took, and we can discuss whether they might be “hacking”– or, since that word is used in a variety or ways some of which represent entirely legal and ethical activities, whether known actions by Brandon might be illegal under the CFA. Here’s one action:
Search_sksforum_threads
Brandon made http requests of the form “http://www.sksforum.org/thread.php?t=i&p=j” similar to those crawled and indexed by google show to the right. The sksforum.org server responded. That response included some html and javascript. The javascript code included a snippet that would forward a browser to another site (for example ‘wattsupwiththat.com’). Brandon recorded the links to the site. Brandon then did this multiple times and ultimately recorded roughly 18,000 links.

How do we know Brandon did this? He said so. Now the question is: is there any reason to believe this is illegal? I think not.

But others disagree. Over at Brandon’s site, a guy named Frank O’Dwyer seems to think that possibly we should think something about what Brandon did might be illegal based on the “Cuthburt” case in England or the “Weev” case in the US. I think examination of either of those cases suggest Brandon is free and clear because Brandon’s http: requests lack both the key feature that made Cuthburt illegal, and the one that might make “weev” illegal. (It’s not clear that what Weev did was illegal. But my point here is that what Brandon did is legal even if what weev did was not.)

Some might suspect I am now going to explain what Cuthburt and Weev did. Indeed I will.

Daniel Cuthburt: For reasons you can read at samizdata.net, Daniel Cuthburt an IT consultant working in the UK whose expertise was ‘penetration testing’ performed to two ‘pen tests’ on a web site.

The first test he used was the (dot dot slash, 3 times) ../../../ sequence. The ../ command is called a Directory Traversal which allows you to move up the hierarchy of a file.? The triple sequence amounts to a DTA (Directory Traversal Attack), allows you to move three times. It is not a complete attack as that would require a further command, it was merely a light “knock on the door”. The other test, which constituted an apostrophe( ‘ ) was also used.

For those not knowledgable about pen testing “move up the hierarchy of a file” means that if a server is flawed, adding this sequence to a url can permit a person to obtain access to files stored above the web folder. That is: they can get into the non-web accessible portions of the server. Someone making this request is never just trying to “surf the web”.

Any pen tester knows that the request they are making is not asking for pages the admin of a site intended to make publicly accessible and that no one is ‘authorized’ to request files that are stored above the root. Although the person at samizdata.net seems to agree with Cuthburt’s defense team that the sequences as just “knock on the door” and not a “break in”, these sorts of requests are not authorized whether or not the request contains ‘additional’ parameter that turn it into an “attack”. Cuthburt almost certainly knew all this; the court believed so and convicted him of computer misuse.

Cuthburt is not an example of someone ‘merely’ entering a URL into their address bar and hitting “enter”. This is someone creating something that looks like a ‘URL’ but which they know is not a URL, and submitting it knowing that that specific command entered is intended to give them access to material that is not on the web. (Note: they only succeed if a security flaw exists. Nevertheless, this is the purpose of that sort of request.)

For what it’s worth: my site automatically bans IPs that try that sequences. Many other sites do so as well. The reason they do so is these requests are never authorized and permitting people to make requests that are never authorized is a rather dangerous policy for any site. In this case, the system Cuthburt ‘tested’ detected the request, recorded the IP, the company informed the police of the attempt, Cuthburt was arrested and later convicted.

Before moving on to the much more complicated “Weev” case, let’s compare what Cuthburt did to what Brandon did. Did Brandon submit URLs that were designed to access material that was not in the web directory? No. He did not. The requests he made were designed to access material in the web directory of a public facing machine. So: the element that made Cuthburt’s http: request illegal is not found in Brandon’s request.

Now on to Andrew “Weev” Auernheime: In March 2013, Andrew “Weev” Auernheime, who is reputed to be an extremely dislikeable fellow was convicted under USA’s Computer Fraud and Abuse Act. Orin Kerr recently represented him pro-bono, and in April 2014 his conviction was overturned on the grounds that it was brought in the wrong jurisdiction. The weev is now out of the slammer. I’m not going to discuss whether what Weev did actually was illegal. Instead, I’m going to describe the describe the prosecutors case for which aspect of what he did was illegal. A link to the prosecutors brief in the appeal can be found at @ErrataRob ‘s blog (pdf).

When we read the prosecutors case, we can see the prosecutor went on and on and on about a particular feature of the URL’s Weev loaded– this feature has no parallel in what Brandon did. To discover the feature the prosecutor went on and on and on about, start by looking at the table of contents in the prosecutors brief in the appeal. We find a listing for “Argument”.

ARGUMENT
I. THE GOVERNMENT PRESENTED SUFFICIENT EVIDENCE TO PERMIT THE JURY TO FIND THAT THE CONSPIRATORS’ ACCESSING OF AT&T’S SERVERS WAS UNAUTHORIZED. . . . . . . 20
A. The Evidence Overwhelmingly Supported A Jury Finding That The Conspirators Improperly Accessed AT&T’s Computers By Impersonating Authorized Users. . . . . . . . . . . . . .24
B. The E-mail/ICC-ID Pairings On AT&T’s Server Were Neither Unprotected, Nor Open To The Public. . . . . . . . . . . . . . . . . . . . . . . 27
C. It Is Not A Bar To Prosecution Under The CFAA That The Victim Employed Bad Security. . . . . 33
D. Spitler’s Use Of Individual User’s ICC-IDs Is Not Fundamentally Different From Using Another Person’s Password. . . . . . . . . . . . . . 38
E. It Does Not Matter That The AT&T Server Responded As It Was Programmed To Do. . . . . . . .41
F. Neither This Prosecution, Nor the Government’s Interpretation Of The CFAA, Threatens To Criminalize Innocent Web Surfing By Ordinary Internet Users. . . . . . . . . . . . . . . . . 44
G. The Rule Of Lenity Has No Application Here. . . . . . . . . . . . . . . . . 45
H. The “White Hat” Computer Hacking Community Has Nothing To Fear From This Prosecution.47

(Italics mine. some ‘…’ trimmed.)
The argument describing why what ‘weev’ did violated the CFA is 27 pages long. For clarity, it’s worth mentioning that ‘weev’ was charged with conspiring to do things. The person who actually visited sites was named ‘Spitler’. So, you will read that “Spitler” actaully performed the illegal acts; weev conspired in these.

Notice above, the claimed illegal activity was not merely ‘loading obscure url’s”. The illegal activity was not loading ‘lots of’ obscure urls. It’s not “learning something AT&T did not want weev or Spitler to know”. It’s not even ‘doing something AT&T might disprefer.

The illegal activity involves “Impersonating Authorized Users” and accessing the servers in ways “Not Fundamentally different from Using Another Person’s Password“. The issue of “impersonating authorized users” and claiming what Weev did was analogous to “using another persons password” are essential to the prosecutors claim that what weev did was illegal because according to the prosecutor, the reason the access was unauthorized is that Spitler obtained access through “Misrepresenting”, “tricking” the server by and supplying something that is equivalent to a password. As a result of that trick, AT&T’s server pages to an unauthorized user– Spitler– when the only “authorized” user was the person who owned a particular Ipad. Moreover, even the authorized user was only authorized to access that page when using one specific Ipad, which that user owned.

To be a bit more specific, Spitler (weev’s ‘conspirator’) visited urls with the form below :
https://dcp2.att.com/OEPClient/openPage?ICCID=XXXXXXXXXX
XXXXXXXXXX&IMEI=0

A specific numeric value that corresponded to the ICCID of a specific IPad would be included in the place of ‘XXXXXXXXXXXXXXXXXXXX’, and Spitler discovered that if he used an ICCID of an IPad owned by an AT&T customer and if he also spoofed the user agent to ‘tell’ the AT&T server he was using an Ipad (which he was not using) then the server would reveal the email address of the owner of the IP with that particular ICCIC number. It is worth noting that ICCID numbers are unique and are assigned to specific devices.

According to the prosecution, the following behaviors represent Spitler (with whom ‘weev’ conspired) misrepresenting and tricking the AT&T computers so that weev could impersonate an authorized user and pretend he was using a specific Ipad.:

  1. AT&T had programmed their script with the intention that it only provide information to the owner of a specific Ipad and only when the owner was using that specific Ipad. That is: AT&T didn’t merely “prefer” the page only be accessed by one and only one person, AT&T had created code restriction intended to prevent anyone other than the owner of that specific IPad from accessing that site. So, under the prosecutors theory, each individual page Spitler loaded was intended to be viewed only by one authorized user and even that user could only access when using their IPad. Spoofing the user agent to represent the connecting device as an Ipad was an element in the ‘misrepresentation’ required to make the AT&T script “believe” that the person visiting was using an Ipad and so deliver the page to someone under conditions in which AT&T did not “authorize” them to view the page.
  2. AT&T had programmed their script to return special information when a specific value was provided in place of the ‘xxxxx’ in the code above. While sometimes values in query strings is merely a parameter used to pass information and achieve some sort of functionality, in the case of AT&T the specific parameter in ICCID=XXXXXXXXXXXXXXXXXXXX was intended to be or act as a password. The prosecutor notes the parameter is a unique identifier for a phone and as such is expected to be presented by one and only one person. From the prosecutions point of view, AT&T’s intention that it be a password pretty much makes it a password. Or at least it falls in the category of things that may be viewed as passwords and the decision whether it is or is not a password is up to the jury.

    In the words of the prosecutor

    Here, Spitler wrote code that allowed him, through the use of carefully designed URLs, to “spoof” the iPads of actual iPad owners, such that AT&T’s servers were fooled into treating Spitler’s accesses as though they were accesses by the true owners of the spoofed iPads. In other words, AT&T’s servers were tricked into returning information that its system was designed to return only to the actual iPad owners, and only when they were accessing AT&T’s servers through their iPads.

    This impersonation aspect here is key to the prosecutors case because the NJ code (which was included in the prosecutors complaint) makes it a crime “access without password based permission or code-based permission, or in violation of a code-based restriction by impersonating an authorized user.”

    Later, we read the prosecutor hammering away at the “impersonation” issue

    Moreover, even if this Court were to conclude that impersonating an authorized user does not constitute a violation of a “code-based restriction,” the New Jersey statute nevertheless was still violated. The instruction given by the Court, which permitted the jury to convict the defendant if there was a “violation of a code-based restriction by impersonating an authorized user,” A706, was based on New Jersey case law which clearly holds that impersonating an authorized user constitutes “unauthorized access.” See State v. Riley, 988 A.2d 1252, 1263 (N.J.Super.L. 2009) (“unauthorized access” occurred “where the defendant impersonated authorized users”) (citing State v. Gaikwad, 793 A.2d 39, 44

    (N.J.Super.A.D. 2002) (defendant convicted of illegally accessing a computer system had a consistent pattern of “impersonating the user”)). So whether it is a violation of a code-based restriction is really beside the point. Regardless of how it is characterized, impersonating an authorized user to gain access to a computer is the prototypical case of unauthorized access. The evidence that Spitler impersonated authorized users was overwhelming. By falsely telling the AT&T server that he was using an iPad, while supplying the unique ICC-ID of other people’s iPads, Spitler was impersonating other authorized users when he accessed AT&T’s server.

  3. The prosecutor further contends that weev and Spitler both “knew” that the pages they were accessing were intended to be viewed by one and only one person.

Now lets see if what brandon did contains the essential element in “weev”: That is, did loading url’s of the form “http://www.sksforum.org/thread.php?t=i&p=j” misrepresent or trick the server in anyway? Nope. Did Brandon think the pages were intended to be viewed by one and only one person? Nope. In fact, there are many reasons to believe they were intended to be viewed by many people — including those who found some of the links on Google.

Were the t=i&p=j intended to act as any sort of “password” when sksforum.org wrote the script? I very much doubt it. Had it been a ‘password’ would a person stumbling across it have any reason to suspect it was a “password” and that the uri was intended to be restricted to some group of people with special permission? Nope.

As far as I can tell, the i and j in the sksforum.org script these are what they appear to be: parameters. They are similar to p=N in the default URI’s created by wordpress sortware.

The URLs were not ‘secret’: URLs of this type were advertised by sksforum.org. In fact: the script was specifically crafted to leave these sorts of uris in our server logs rather than a second set whose existence the uri’s of the form ‘www.sksforum.org/thread.php?t=i&p=j’ were likely intended to conceal! These uri’s of the form ‘www.sksforum.org/thread.php?t=i&p=j’ appeared in server logs of admins — including those of Anthony Watts and Brandon Sholleberger himself. One would need to have a vivid imagination to conclude that the set ‘t=i&p=j’ with ‘i’ and ‘j’ as they appeared in Anthony Watt’s blog post was some sort of ‘special’ page which could be visited only by some group of “authorized users” that included Anthony Watts himself and the t=i&p=j’ represented a special ‘password’ one was using to represent oneself as “authorized”.

The fact that Google found some of these passwords, and visited…. well, I guess either Gooblebot “hacked” when it represented itself as “authorized” or Google and other bots were authorized. If the later, the case that Brandon couldn’t visit them is going to be pretty difficult to make as it would be nearly impossible for anyone to ‘know’ they were unauthorized. (In fact– I think everyone was ‘authorized’, even if sksforum.org might have hoped traffic would be light.)

But even if someone– possibly Eli or possible Frank O’Dwyer– were to insinuate that someone might find something illegal in something Brandon did the prosecutor in “Weev” certainly didn’t advance the theory that sort of access should be construed as unauthorized or illegal. The prosecutor in ‘weev’ construed tricking a server by providing ‘false’ credentials and so impersonating the indetity of an authorized user is illegal. That didn’t happen when Brandon requested pages from sksforum.org.

If someone like Eli or Frank think something Brandon did was illegal, it might be useful for them to say precisely what action violated what statute, and then explain their theory of how or why the action violates the statute. Pointing to examples in case law holding the actions similar to Brandon’s were found to violate the statute would be helpful. Examples of violations that involves actions might happen to share some perfectly legal elements (e.g loading a web page) but whose illegal elements do not exist in Brandon’s behavior is not helpful. Certainly the later sorts of examples aren’t going to convince anyone that Brandon’s actions constituted illegal hacking.

Update: The ruling in Weev’s appeal is at arstechnica (pdf). The conviction was waved for improper venue. The question regarding whether Weev’s behavior would have been an illegal violation of CFA is limited to footnote 5 which reads

5 We also note that in order to be guilty of accessing “without authorization, or in excess of authorization” under New Jersey law, the Government needed to prove that Auernheimer or Spitler circumvented a code- or password-based barrier to access. See State v. Riley, 988 A.2d 1252, 1267 (N.J. Super. Ct. Law Div. 2009). Although we need not resolve whether Auernheimer’s conduct involved such a breach, no evidence was advanced at trial that the account slurper ever breached any password gate or other code-based barrier. The account slurper simply accessed the publicly facing portion of the login screen and scraped information that AT&T unintentionally published.

My take on this is the appeals court was dubious about the prosecutors theory that merely loading the login screen by requesting an URL that included ICCID=XXXXXXXXXXXXXXXXXXXX with the ‘xxxx’ corresponding to a unique identifier for a particular IPad was tantamount to using a password. That said: this is just a footnote.

Eugene Volokh: On Brandon and U Queensland.

It seems every legal issue that ever comes up at climate blogs ends up discussed at The Volokh conspiracy. This time the post is by the founding blogger Eugene Volokh is commenting on Brandon’s letter. If things get really nasty and involve accusations of “hacking”, I suspect Orin Kerr will end up commenting. (Orin represented the “Weev” in a recent hacking appeal.)

Eugene, a 1st amendment and copyright scholar does provide a caveat at the outset.

I can’t speak to Australian law on this, but here is my view of American law, which I first blogged about in 2008:

He then continues, basically pointing out that letter can be and are copyright protected, but copy may be permissible under fair use. The four factors of fair use are discussed.

I”m going to send you to Eugene’s post to read more, but the summary is

If it weren’t for the unpublished nature of the letter, the Supreme Court’s Campbell v. Acuff-Rose (1994) decision, on which I rely in my quick analysis above, would copying of cease-and-desist letters almost open-and-shut fair use. The unpublished nature of the work undermines that in some measure (see, e.g., Harper & Row v. Nation Enterprises (1985)); but I still think a copier’s fair use argument in such a situation is quite strong.

Linda Ellis DMCA follow up.

Some of you are aware Serial DMCA writer and Author of The Dash sent a DMCA takedown notice to my hosting company requesting a take down of this image which is hosted elsewhere, but which I display using an inline link.

After receiving the notice, I pondered what to do. Finally, for multiple reasons, I decided I would write a counter DMCA. I sent along the boilerplate counterstrike information along accompanied with a detailed discussion of the reasons why the notion that this image violates Ms. Ellis copyright is incorrect in a number of regards. The Explanation. (Note: owning to the formatting, the first draft at the boiler plate was poor because some required information was in the attachment. So, we rewrote that and resubmitted co-locating all the pledge about not committing perjury and so on and so forth. Consequently, we lost a bit of time. But time was not of the essence here.)

Now: many will note that only the boilerplate was legally required (and Dreamhost agrees. That’s what they need.) However, the purpose of the additional information is to:

  • Explain to people in general why I stand firm that this is fair use explaining why I believe it is so.
  • Explain to people that even if the ‘anonmgur.com’ who hosting violated Ms. Ellis’s copyright, I believe my hyperlinking is not infringing anyway– or at least so the 9th circuit has found. (The 7th circuit has a similar finding in Flava Works). Note: hyperlinking might be infringing if I had uploaded to the other site, or if I encouraged others to upload so that I could later hyperlink. But that happens not to be the case. I simply noticed the link to the image elsewhere on the web and created a link myself.

In light of the first point, I will quote extensively from what I wrote in my letter to Dreamhost

2) To transform is not to infringe:

The next right Ms. Ellis relies upon is a rights-holder’s exclusive right to make derivative forms of the work. Based on the wording of the claimant’s take down request, it appears she may be unaware that the “fair use” provision of the copyright act permits creation and display of some derivatives without obtaining permission from the owner of the original’s copyright. Permissible use under the doctrine of “fair use” applies to “Linda Ellis Troll Caricature,” which is highly transformative. The transformation of expression and meaning is evident through side-by-side inspection of the two images.

[ A side by side image is inserted in the text here.-L]

The original “Author Linda Ellis” portrays Ms. Ellis as friendly, open approachable person with the sort of personality one might expect of the author of an inspirational poem advising listeners to consider the value of their actions during the short period of time between birth and death (i.e. One’s “Dash”). “Linda Ellis Troll Caricature” portrays her as an eerily gleeful, glowing-eyed, fang-tooth, gingivitis-stricken troll whose nature might inspire it to dedicate “Her Dash” to demand large monetary sums from those who may have quoted an inspirational poem advising listeners to consider the value of their actions during the short period of time between birth and death (i.e. “The Dash”).

A work is “transformative” –and therefore not infringing – when the new work does not “merely supersede the objects of the original creation” but rather “adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message.” Campbell v. Acuff-Rose Music Inc 510 U.S. 569 (1994). Even making an exact copy of a work may be transformative so long as the copy serves a different function than the original work, Kelly v. Arriba Soft Corp., 336 F.3d 811 at 818–19.( 9th Cir. 2003) For example, the First Circuit has held that the republication of photos taken for a modeling portfolio in a newspaper was transformative because the photos served to inform, as well as entertain. See Nunez v. Caribbean Int’l News Corp., 235 F.3d 18, 22–23 (1st Cir.2000).

The 9th Circuit, once again in Perfect 10, held that reducing the image from an actual image to a hyperlinked thumbnail was in and of itself transformative.” So once again this could end the analysis at this point. However, the linked image is itself a transformative use of the original image; only the hair of the two people displayed in the image is not transformed. “A use is considered transformative where an alleged infringer changes a . . . copyrighted work or uses a … copyrighted work in a different context such that the . . . work is transformed into a new creation.” Wall Data Inc. v. Los Angeles County Sheriff’s Department, 447 F.3d 769 (9th Cir. 2006). Can it be seriously argued that the Troll image does not transform the original image? Can an image be more transformative?

Furthermore, part of the fair use analysis requires examining whether the use supersedes or replaces the original use (it does not); whether the allegedly infringing use took more than was necessary of the original to make the transformation (it did not and in fact in Perfect 10 the defendant took 100% of the image but the court held that was needed to make the transformative use it wanted); and whether the use overly damaged the market for the original use (it did not – there is no market for the original use).

Therefore, the inline linked image was a proper, legal, transformative use of the original image.

(3) To parody is not to infringe:

The transformation in “Linda Ellis Troll” also parodies both the original image and the subject of the image. The former is parodied with regard to how the photographer chose to portray the subject and latter is parodied with the subjects own choice of self-representation on “about Linda” pages at her own site. Ms. Ellis’s representation is provided below,

[ An image proving that this is the image Ellis uses to represent herself is inserted in the text here. -L]

So this image also parodies Ms. Ellis’s online persona as a life-affirming poetess by declaring her as a “copyright troll.” Wikipedia defines copyright troll “as a pejorative term for a party that enforces copyrights it owns for purposes of making money through litigation, in a manner considered unduly aggressive or opportunistic, generally without producing or licensing the works it owns for paid distribution. Critics object to the activity because they believe it does not encourage the production of creative works, but instead makes money through the inequities and unintended consequences of high statutory damages provisions in copyright laws intended to encourage creation of such works.” http://en.wikipedia.org/wiki/Copyright_troll. While Ms. Ellis does own the work which is the subject matter of her trolling, her activities otherwise fit the definition.

Parody is an element of fair use; the “fair use defense” “permits the use of copyrighted works without the copyright owner’s consent under certain situations; the defense encourages and allows the development of new ideas that build on earlier ones, thus providing a necessary counterbalance to the copyright law’s goal of protecting creators’ work product.” Campbell v. Acuff-Rose Music Inc 510 U.S. 569, 575 (1994).

In the parody context, “the ‘amount and substantiality of portion used’ factor of the fair use defense to copyright infringement turns on the persuasiveness of a parodist’s justification for the particular copying done, and the extent of permissible copying varies with the purpose and character of the use; the analysis of this factor will also tend to address the market effect factor, by revealing the degree to which the parody may serve as a market substitute for the original or potentially licensed derivatives.” Northland Family Planning Clinic, Inc. v. Center for Bio-Ethical Reform, 868 F.Supp2 d.962 (C. Dist Calif. 2012).

Here, there is no chance this parody may serve as a market substitute. Copying Ms. Ellis’ face was necessary to parody her appearance and convert her to a “troll.” Under the above analysis therefore, this parody is a fair use of Ms. Ellis’ image.

The quoting covers much of what is in the pdf which contains additional discussion of the hyperlinking issues.

The current status is: Ms. Ellis sent no notice to Dreamhost and the image is restored. This action removes any liability from Dreamhost (who has acted in an exemplary fashion in this.) Ms. Ellis may still elect to sue me. That said: To avoid summary dismissal in any suit in the US, I’m pretty sure Linda Ellis must first register the copyright. I periodically search the Copyright records and as far as I can determine she has not registered this image which one would imagine was shot by someone else, though it might be a “selfie”. Who knows?

Update March 28: I am taking the liberty of adding links to posts that mention Linda Ellis’s take down notices. I’ll add links as I find them. I am also going to keep comments open on this thread, and open comments on all Linda Ellis threads.

  1. Greg Troy writes about the need for DMCA to be modified to make it easier to fine people who file false DMCA notices. Of course, unless one is granted access to discover after a case is pursued, the person on the receiving end of a takedown can almost never be certain an DMCA take down was actually false, but Linda’s history of sending takedowns at which are countered and not followed up with any suit is noted in that article. These have occurred at my site and April Brown’s site. (March 28)
  2. April Brown reports writing a counter DMCA when Linda Ellis filed a DMCA takedown. This takedown had great potential to damage Ms. Brown who uses videos to promote her auction busines. Brown’s youtube videos were restored. (March 28)

DMCA Takedown: Linda Ellis

Serial DMCA writer and Author of The Dash is at it again: issuing dubious DMCA takedowns. She sent my host one. I’m posting to solicit tips on writing a counter DMAC.

Some of you are familiar with Linda, who tends to send letters demanding very large sums of money to people who post her poem in practically un-circulated pdf newsletters, very lightly read blogs, and so on. When I wrote about this previously, I included a hotlinked parody image of a Linda-Ellis-Troll caricature similar to the one posted at copyright trolls and April Brown’s post about Linda Ellis.
I am contemplating writing a counter DMAC.

Of course writing such a counter-DMCA could potentionally trigger a time consuming counter productive lawsuit which Ellis might file in response. I’m fairly certain I would win. So it’s just a matter of “Is it worth the potential hassle and drama merely to keep a hotlink in a post?” I’m currently undecided. However, I generally advise people (myself included) that in these situations, it is usually best to avoid the drama. (Note that the Minnesotan’s for Global Warming took a similar tack when threatened by Mann with a suit about… whatever it was exactly. For that reason they are not now involved in what appears to be an endless suit like Mann vs. Steyn/Simberg/CEI/NRO. Queue the “Chilling Effects” music we play when we suspect attempts to censor speech. )

What I’m hoping for today is for legal-eagles or anyone with copyright experience to suggest how much information belongs in a counter-DMCA response. My main questions are :

  1. Should I be brief and merely state that I believe that the DMCA is mistaken? Or should I include some discussion of the specific issues? (I’ll discuss these below.)
  2. If I write do write this, what legal precedents should I consider? (Once I am aware of are discussed below.)

Alternatively, if someone could suggest path that will result in Ellis’s issuing this DMCA in a way that might highlight the whole story — including the issues surrounding her business plan that resulted in someone making that image in the first place– that might be a more time effective method of dealing this issue. After all: my priority in writing the post in which I embedded that image was to disseminate information about Linda Ellis’s business model.

Now returning to the direct copyright issue: Because I am contemplating the counter DMCA, I would like to invite feedback on my view that the DMCA tak-edown is mistaken, I am providing the main reasons why I believe DMCA is mistaken. My belief the DMCA is mistaken should be enough to permit me to write the counter-strike. Unfortunately, it would not be sufficient to permit me to prevail in court (should Ellis sue). To prevail, I would need to be (a) correct in my belief and (b) well represented. That said, if I am obviously wrong, I would like to know that. So, I would especially like the view of people who know copyright law to comment on my thoughts about where copying or display of this image might fall. (Note: I live in the the northern district of the 7th circuit.)

Here are the two main reasons I think I would prevail in court.

Reason I: The image is not and never was “displayed” at my site, or at least it is not “displayed” as that term is defined under US Copyright law which is the relevant definition in any suit alleging a copyright violation. That is: I do not host the image it is hosted elsewhere but displayed by means of an inline link. This is called “hotlinking”. Hotlinking has never been ruled “display” under US copyright law and has, in fact been ruled by the 9th Circuit court of Appeals to not fit the definition of “display” (see Perfect 10 v. Amazon.) Some might note that I live in the 7th circuit court of appeal which declined to treat Perfect 10 v. Amazon as a precedent when ruling inFlava. But it seems to me that Posner’s ruling in Flava protects me just as well as Perfect 10 would and as such reduces the uncertainty in rulings that might occur at any level below SCOTUS.

The relevant paragraph assessing whether myVidster was infringing by framing videos hosted elsewhere would seem to be

As the record stands (a vital qualification, given that the appeal is from the grant of a preliminary injunction and may therefore be incomplete), myVidster is not an infringer, at least in the form of copying or distributing copies of copyrighted work. The infringers are the uploaders of copyrighted work. There is no evidence that myVidster is encouraging them, which would make it a contributory infringer.

That is to say: as far as I can tell, Posner’s ruling ends up agreeing with the 9th circuit ruling. It’s just that being at the same circuit court level, he did not treat the 9th circuit as binding his court. (Lawyers, do correct me if I’m totally bungling this interpretation.)

Now, on to Reason II: The image posted is a transformative use of the original its use falls under fair use provisions of the copyright act. . My copying and display would not violate any copyright Linda Ellis holds even if I hosted it. (Note: I am of course, assuming Linda Ellis did not create this derivative image and that she does not own the copyright for the derivative image. In fact I don’t now who did create the image; I suspect one of two people. Neither of them has complained.)

There are four aspects to fair use. I think all four cut in favor of anyone and everyone being able to use the derivative image with permission of the author of the derivative image and without regard to the wishes or inclinations of the underlying image that was transformed. I’m not going to belabor all four. But I’ll touch on two, which I think with respect to this use are the most important:

Factor a: “Purpose and Character of Use”:
The purpose and character of the use is commentary and speech about Linda Ellis: that is to say, it attempts to make a statement about Linda Ellis through imagery. This is protected speech. To communicate an opinion about Linda Ellis (and use in articles commenting on her business model involving heavy copyright demands) the image in question was ‘transformed’; this would be evident by side by side inspection. (I would link, but I think I can’t do that until after I send a DMCA counter-strike!)

In the original image which currently displays on her “about page”,Linda Ellis’s eyes, complexion and teeth suggest a persona who might write sickly sweet poems ( www. linda-ellis. com/about-linda-ellis.html remove spaces to see). This fits her marketing spin as some sort of inspirational poetess. In the transformed image her eyes burn a fiery burning red, her skin has been rendered in a pebbly lizard like green, and she has been given a down hanging fang, all of which suggests the an evil fairy tale troll. After transformation, the image communicates the message “Linda Ellis is a Troll”, an opinion formed by some who are aware of her business practices aimed at demanding heavy fees for what amount to de minimus uses of her poem.

As far as I can determine, at least some courts interpret creating transformative images of the sort shown in the image Linda Ellis complains of in her DMCA filing both “transformative” and “parody”; the later enjoys broad protection. While some argue that parody requires the item copied must be parodied and the person transforming the image intends to parody the subject of the image, the judges ruling in Kiennitz v. Sconnie Nation LLC (W.D. Wis. Aug. 15, 2013) ( pdf) notes that the issue of “what is parodied” is not an either/or one. Transforming the expression conveyed by the can be viewed as parody aimed at the image itself which could be sufficient to deem this use parody. This is precisely what is happening here.

In any case however, parody is not the only transformative use that falls under fair use and in his ruling Judge Crocker cited a 2nd circuit court of appeals ruling in Cariou_v_Prince_-_2d_Cir_2013. I will leave it to interested readers to read that.

Factor B: The effect of the transformed images use as a market substitute for the original image: There is no effect on the market for that image of Linda Ellis or at least none that counts under copyright law. Note that this might seem to In the first place: this image is not commercially valuable to anyone other than Linda Ellis. There are no millions and zillions of people ‘out there’ who wish to specifically purchase images of Linda Ellis and I’m pretty sure she doesn’t even try to market this image. In anycase, no one who wants an original image of Linda Ellis would use the transformed version as a substitute. One might argue that the fact that the transformed images exists means Linda herself might no longer wish to use the original image because it’s no got “bad karma”, but that effect specifically does not count under copyright law.

The other two factors are “Nature of the copyrighted work” and “The amount and substantiality of the portion used in relation to the copyrighted work as a whole.” In Kienitz the judge ruled the former factor was a wash with equally strong points on both sides of the issue and that the balance favored the defendant when assessing the latter factor. If I understand, the Judge’s view is that those creative-non-factual elements that were in the original were precisely what was transformed and so not “copied”. I think the same would hold for the current image.

I think the use Ellis complains of would be permitted under our copyright law if either of reasons I or II applied. I think in fact both apply. My impression is nothing would prevent me from arguing that I think I applies, but even if it does not, then II applies. I welcome comments on my analysis, suggestions of other court cases that might apply, and general discussion about this. Thanks!

——
Notes: For the time being, to comply with my hosts requirements, I am not posting any links to the Linda-Ellis-Troll caricature. I think they have instructed me not to do so unless I first write a counter letter. You can read the letter Dreamhost sent me in DMCA_ELLIS.txt)

Update: I submitted the takedown request to chilling effects.

Don’t Post Linda Ellis’s ‘The Dash’.

This is a public service about announcement Linda Ellis’s “The Dash” that has nothing to do with climate change. I’m posting this content here because a previously existing forum to post discussions of Linda Ellis’s outrageous demands for $7500 settlements from unsuspecting infringers-often bereaved — was taken down due to a court order. Until such time as a new forum appears, I will periodically make posts when I read of a new specific copyright demand letter has been sent to someone for what appears to be either de minimus infringement or fair use posting of “The Dash” on someones blog or interior web page. I anticipate this will occur from time to time– if it begins to occur at a rate of more than once a week, I’ll write a script to segregate items in this category so that regular climate readers don’t have to worry about them while still permitting them to be crawled.

Today, I came across a web page at a web site run by Turn Around Schools an institute whose mission is to help teachers gain skills to help at risk students with the goal that every student should be provided an education that permits them to enter college. On that page, I found an indication that the poem “The Dash” previously appeared and had been taken down at the request of the author.Turn_Around_Schools_Ellis_Took_Down

The page also contains a link to the letter sent by the John Jolin, and employee of Linda Ellis, the author (pdf). That letter is very similar to one sent to many other people in the past. Recipients should be aware of the pattern behind this letter and know what is likely to occur if they receive it. My discussion doesn’t constitute legal advice– but it is worth having this context should you or your non-profit receive a similar one.

Among other things, the letter says this:

Because of the ease of infringement, federal law authorizes copyright owners, like Ms. Ellis, to automatically recover statutory damages of up to $30,000.00 for each copyright violation in ad-dition to the automatic recovery of all attorneys’ and costs involved in pursuing the copyright violation. 17 U.S.C. §§ 504(c)(1) and 505. If a court determines the infringement intentional or “willful,” the law authorizes a court to award statutory damages of up to $150,000.00 per copy-right violation. 17 U.S.C. § 504(c)(2). Courts will find “willful infringement” when someone continues to publish copyrighted material after receiving a letter like this from the copyright owner requesting its removal.

It is true that copyright owners can sometimes recover statutory damages for up to $150,000.00 per copy-right violation and also recoup attorney fees. However, it is also true that courts might interpret any particular act of copying as “fair use” or “de minimus”. In such a case, the courts could force the the copyright claimant to pay the defendants damages.

Also, there is nothing automatic about courts awarding $30,000 or attorney’s fees even if they identify a copyright violation. The U.S. Copyright office has this to say about damages in the event that a copyright violation occurred,

In a case where the copyright owner sustains the burden of proving, and the court finds, that infringement was committed willfully, the court in its discretion may increase the award of statutory damages to a sum of not more than $150,000. In a case where the infringer sustains the burden of proving, and the court finds, that such infringer was not aware and had no reason to believe that his or her acts constituted an infringement of copyright, the court in its discretion may reduce the award of statutory damages to a sum of not less than $200. The court shall remit statutory damages in any case where an infringer believed and had reasonable grounds for believing that his or her use of the copyrighted work was a fair use under section 107, if the infringer was: (i) an employee or agent of a nonprofit educational institution, library, or archives acting within the scope of his or her employment who, or such institution, library, or archives itself, which infringed by reproducing the work in copies or phonorecords; or (ii) a public broadcasting entity which or a person who, as a regular part of the nonprofit activities of a public broadcasting entity (as defined in section 118(f)) infringed by performing a published nondramatic literary work or by reproducing a transmission program embodying a performance of such a work.

This even when a copyright violation occurs, judgements of $30,000 and attorney’s fees are far from “automatic”. A judge might — at his discretion– deem a fine of $200 is appropriate. (Moreover, it’s possible some uses on blogs, forums, in death tributes and so on would simply be deemed “fair use” by the judge and no fine would be levied.)

Let us now move on to examine the level of damages suggested by the letter.

Based on your unauthorized use and contributing to the perpetual unlawful distribution of regis-tered copyrighted work of the Poem, we ask that you pay $7,500.00 to resolve our claims of trademark and copyright infringement.

Even if a person who accidentally posted The Dash on a low circulation blog did so in a manner that does not fall under “fair use”, this level of demand seems outrageous to me. After all: a judge is has discretion to award the poet as little as $200 and leave the poet to pay her own attorney’s fees. They might well do so in the case where they perceived the copying to technically violate copyright but in a rather trivial, non-commercial way that has little impact on possible commercialization of “The Dash”.

The letter demanding $7,500 continues with this:

We do not enjoy lawsuits and hope to not have to resort to the courts; however, Ms. Ellis has proven that she has, and will, protect the value and integrity of her copyrighted works. In the case of Ellis v. Aronson, filed in the Northern District of Georgia, Ms. Ellis received a judgment the amount of $269,000.00.1

In reality, it seems to me Ms. Ellis quite enjoys threatening suits.

As it happens, in Ellis v. Aronson, my understanding is Aronson published a book which he sold for money. He also backed out of a pre-existing agreement to pay Ms. Ellis. (See google cache of Scribbed document.) My understanding is that Ms. Ellis never collected– which is unfortunate for Ms. Ellis because Mr. Aronson’s infringement was quite egregious. It went well beyond inadvertent posting of a poem on the interior web page.

That said: the case is nearly irrelevant to any dispute between Ms. Ellis and someone who posts “The Dash” on the interior web page of a low traffic site. In reality, despite her threats, as far as one can determine, Ms. Ellis has never filed suit against someone who posted The Dash in a blog, in the guest book for a funeral site, in a death announcement printed in a condominium monthly news letter or any such similar use. My guess is she has never down so because she has good reason to believe a judge would award her $200 and no attorney’s fees leaving her with an out of pocket loss.

What should you do?
So, what should you do if you post this letter and (as will quite likely happen) receive a demand for $7,500? My advice is don’t post the stupid poem in the first place. But if you do, you can either consult an attorney (which usually costs a lot. But you could consider contacting Oscar Michelen who has a relatively inexpensive program to write a letter for you.), or do what I would do:

  1. Even if you believe your posting is permitted under fair use (and it may be) take down the poem. It is copyrighted and in those cases where copying doesn’t qualify as fair use, Linda does have a right to request you take it down.
  2. If you believe (or simply fear) your use might not fall under “fair use”, write a response letter that does not admit fault but states that to get this matter behind you, you are willing to offer $200 which you believe is the amount a judge would assess in this specific case if he found in favor of Ms. Ellis inadvertent infringement. Make the offer contingent on her agreeing to drop any claim and refuse to sign any confidentiality agreement that might prevent you from discussing your experience. My understanding is offers to settle are viewed on favorably by judges when assessing damages should Ellis take what seems to be the unprecedented step of suing someone who posts the poem on a web site, blog or funeral circular. You may of course continue to negotiate if you wish.
  3. Upload a copy of the email she sent you in a public forum like Scribd– or really anywhere; after you have done so, drop a link to the document in comment for this post. Example of letter Ellis of similar letters Linda has sent are available in google cache here; Google cache is not stable so I copied text of that letter from google cache copied and pasted here. (Note the similarity to the letter sent to the school).
  4. Consider finding news paper articles and PR pieces discussing Linda Ellis and The Dash and relate your experience. Help Linda protect her rights under copyright and warn people what can happen to those who inadvertently post the poem. Suggest they protect themselves by never posting the poem in a blog post, comments, a funeral commemorative or similar item. Warn those you know to avoid endangering others through public readings which serve to publicize the poem, thereby putting others at risk of later posting the poem.

Open Thread.

Feel free to discuss copyright, Linda Ellis, climate change… whatever. I don’t plan to discuss this poetess too much, but I will post from time to time until such time as another forum for publicizing her demands exists.

I’m going to go fire up “R” now so I can write a climate related post.

Other letters in google cache
Zampieri Dental Care 1396 Palisade Avenue Fort Lee, NJ 07024

RapidCity_Linda_Ellis: Non-liability
Rapid City, South Dakota appears to have paid Linda Ellis $2500. I would advise anyone who is inclined to negotiate a settle to refuse any settlement including a “Confidentiality Clause”. Of course, you do want the “no admission of guilt” part and should include that in any communications.
Ellis_habit_of_editing

Just for fun
Those familiar with Ellis knows she has the habit of posting things, then taking them down. Of course she’s free to do so, but it can be a bit amusing. This shows she posted something about the Matt Chan PPO order, then seems to have taken it down.


UnpopularityContest