Balkinization  

Thursday, December 15, 2011

The Stop Online Piracy Act's Anticircumvention Provisions

Guest Blogger

Wendy Seltzer

The House's Stop Online Piracy Act is in Judiciary Committee Markup today. As numerous protests, open letters,and advocacy campaignsacross the Web, this is a seriously flawed bill. Sen. Ron Wyden and Rep. Darell Issa's proposed OPEN Act points out, by contrast, some of the procedural problems.Here, I analyze just one of the problematic provisions of SOPA: a new"anticircumvention" provision (different from the still-problematic anti-circumvention of section1201). SOPA's anticircumvention authorizes injunctions against the provision of tools to bypass the court-ordered blocking of domains. Although it is apparently aimed at MAFIAAfire, the Firefox add-on that offered redirection for seized domains in the wake of ICE seizures,[1] the provision as drafted sweeps much more broadly. Ordinary security and connectivity tools could fall within its scope. If enacted, it would weaken Internet security and reduce the robustness and resilience of Internet connections.

The anticircumvention section, which is not present in the Senate's companion PROTECT-IP measure, provides for injunctions, on the action of the Attorney General:

(ii)against any entity that knowingly and willfully provides or offers to provide a product or service designed or marketed by such entity or by another in concert with such entity for the circumvention or bypassing of measures described in paragraph (2) [blocking DNS responses, search query results, payments, or ads] and taken in response to a court order issued under this subsection, to enjoin such entity from interfering with the order by continuing to provide or offer to provide such product or service. § 102(c)(3)(A)(ii)
As an initial problem, the section is unclear. Could it cover someone who designs a tool for"the circumvention or bypassing of" DNS blockages in general -- even if such a person did not specifically intend or market the tool to be used to frustrate court orders issued under SOPA? Resilience in the face of technological failure is a fundamental software design goal. As DNS experts Steve Crocker, et al. say in their Dec. 9 letter to the House and Senate Judiciary Chairs, "a secure application expecting a secure DNS answer will not give up after a timeout. It might retry the lookup, it might try a backup DNS server, it might even restart the lookup through a proxy service." Would the providers of software that looked to a proxy for answers --products "designed" to be resilient to transient DNS lookup failures --be subject to injunction? Where the answer is unclear, developers might choose not to offer such lawful features rather than risking legal attack. Indeed, the statute as drafted might chill the development of anti-censorship tools funded by our State Department.

Some such tools are explicitly designed to circumvent censorship in repressive regimes whose authorities engage in DNS manipulation to prevent citizens from accessing sites with dissident messages, alternate sources of news, or human rights reporting. (See Rebecca MacKinnon's NYT Op-Ed, Stop the Great Firewall of America. Censorship-circumvention tools include Psiphon, which describes itself as an "Open source web proxy designed to help Internet users affected by Internet censorship securely bypass content-filtering systems," and The Tor Project.) These tools cannot distinguish between Chinese censorship of Tiananmen Square mentions and U.S. copyright protection where their impacts -- blocking access to Web content -- and their methods -- local blocking of domain resolution -- are the same.

Finally, the paragraph may encompass mere knowledge-transfer. Does telling someone about alternate DNS resolvers, or noting that a blocked domain can still be found at its IP address -- a matter of historical record and necessary to third-party evaluation of the claims against that site -- constitute willfully "providing a service designed ... [for] bypassing" DNS-blocking? Archives of historic DNS information are often important information to legal or technical network investigations, but might become scarce if providers had to ascertain the reasons their information was being sought.

For these reasons among many others (such as those identified by my ISP colleague Nick, SOPA should be stopped.


Wendy Seltzer is a Senior Fellow at the Information Society Project at Yale Law School. You can reach her by e-mail at wendy.seltzer@yale.edu

Older Posts
Newer Posts
Home