Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Music Media Government The Courts News Your Rights Online

Safeguards For RIAA Hard Drive Inspection 276

NewYorkCountryLawyer writes "In SONY v. Arellanes, an RIAA case in Sherman, Texas, the Court entered a protective order (PDF) that spells out the following procedure for the RIAA's examination of the defendant's hard drive: (1) RIAA imaging specialist makes mirror image of hard drive; (2) mutually acceptable computer forensics expert makes make two verified bit images, and creates an MD5 or equivalent hash code; (3) one mirror image is held in escrow by the expert, the other given to defendant's lawyer for a 'privilege review'; (4) defendant's lawyer provides plaintiffs' lawyer with a 'privilege log' (list of privileged files); (5) after privilege questions are resolved, the escrowed image — with privileged files deleted — will be turned over to RIAA lawyers, to be held for 'lawyers' eyes only.' The order differs from the earlier order (PDF) entered in the case, in that it (a) permits the RIAA's own imaging person to make the initial mirror image and (b) spells out the details of the method for safeguarding privilege and privacy."
This discussion has been archived. No new comments can be posted.

Safeguards For RIAA Hard Drive Inspection

Comments Filter:
  • 1. Who pays for the neutral expert?

    2. Who makes the deletion of the privileged files?

    3. How are the privileged files going to be deleted?

  • Sounds like an RIAA troll to me. Yeah, like the RIAA is trying to help small business.
  • by Wonko the Sane ( 25252 ) * on Sunday April 22, 2007 @12:10AM (#18829189) Journal

    but I'd have a hard time coming up with reasons to feel sad if such a thing were to occur...
    How about the predictable knee-jerk reactions and new attacks on freedom that these events always cause?
  • by StefanJ ( 88986 ) on Sunday April 22, 2007 @12:23AM (#18829271) Homepage Journal
    It's like reading a procedures document from the Ministry of Information Retrieval.

    You just KNOW that the creepy bureaucratic gnomes who write up this stuff are going to have a hand in designing the "revised Internet" that's made the news lately.

    Your computer has been used to violate article IV of the The Working Artists' Protection Act. Please unlock your front door, sit on the ground, place your hands behind your head and wait quietly. Attempts to flee, contact the press, or hire legal counsel is a violation of the P.A.T.R.I.O.T. III Act and may result in detention in an Overseas Protective Facility.
  • Why a broken hash? (Score:1, Insightful)

    by Anonymous Coward on Sunday April 22, 2007 @12:31AM (#18829335)
    Isn't MD5 "broken"? Why choose such a hashing method when SHA-224, 256, 384 or 512 are all available and safe from collision attacks?
  • by zappepcs ( 820751 ) on Sunday April 22, 2007 @12:40AM (#18829407) Journal
    I have a similar question, possibly related. I have no less than 12 systems at home. On the very remote chance that I should even be accused by the RIAA, how would they know what system to look at, or which drive (I have quite a few) to look at for evidence. Who pays for that? Do they come in and simply confiscate everything? I might have hacked the DVR and moved my music there. I might be an upgrade junky and have upgraded every system that I own on a regular basis, including wiping the drives clean of any previous data. How do they figure they can tell the difference between my habits and someone trying to hide data?

    Are my computing habits putting me at risk if they should ask about my online activities? Should I be afraid? Should I be hiding stuff now?

    I don't download music or movies, but how do I prove that without having to go through such huge measures as going to court? The existence of MP3 files on my hard drive does not mean I've been downloading. If I buy a used system that has music files on it, am I guilty?

    My belief is that they don't have a right to look at it at all without hard evidence that I've been downloading illegally. The police are the only ones given the ability to search with probable cause only. Discovery for court purposes is one thing, do they search each defendant's home top to bottom to find any hidden hard drives? Do they 'interview' neighbors and friends to see if there is a missing hard drive they are just 'holding'?

    To me, this whole hard drive evidence thing is illegal in itself. What if a virus infected my machine as was being used to pass illegally downloaded files? What happens if the defendant's lawyer declares all data on the disk to be private, other than the OS files?

  • by jakosc ( 649857 ) * on Sunday April 22, 2007 @12:50AM (#18829479) Homepage
    I think 1 and 2 are consistent, it's just the numbering in the document isn't the order of events.

    How I read it, it's basically:

    1) Plaintiff, don't worry, you'll get access to the drive by March 21
    2-3) Defendent, don't worry, here's how we'll do it---first, you get to delete your private files

    IANAL, but that's how I read it. The summary's a bit confusing, and seems to suggest that #1 in the document has to occur before #2, which really doesn't make sense, as the GP points out.
  • by guruevi ( 827432 ) on Sunday April 22, 2007 @01:06AM (#18829579)
    Well, this comment has been posted since 2005 on Slashdot. Exactly the same in 2 other /. news posts:

    http://www.google.com/search?q=%22As+a+record+stor e+owner,+my+business+faces+ruin.+CD+sales+have+dro pped+through+the+floor.+People+aren't+buying+half+ as+many+CDs+as+they+did+just+a+year+ago.%22&hl=en& client=safari&rls=en&filter=0 [google.com]

    Well, you cold have at least updated your 12 year old record store and 'last year'.

    Next to you being an RIAA shill, if you DO have a store, you deserve to be out of business. Or bring some Dimmu Borgir into your 'christian' store.
  • by thePowerOfGrayskull ( 905905 ) <marc...paradise@@@gmail...com> on Sunday April 22, 2007 @01:36AM (#18829741) Homepage Journal

    1.A loaded S&W .357 for use on the RIAA trolls trying to gain access to my house.(Under Ky Law I may defend my personal property using deadly force if I deem it necessary)
    KY state law doesn't allow you to shoot a deputy sheriff for serving a search warrant. And that's what this would be.

    2.A good self destruct device (easy to built and arm) for the hard drive(renders it absolutely useless to any forensic expert,since it physically destroys the platters.)
    of course, now you've tampered with evidence (the small sound of an explosion may give it away), which is an actual crime as opposed to the copyright infringement which is not.
  • by twitter ( 104583 ) on Sunday April 22, 2007 @01:46AM (#18829805) Homepage Journal

    1. Who pays for the neutral expert? 2. Who makes the deletion of the privileged files? 3. How are the privileged files going to be deleted?

    If media files are all the RIAA trolls are interested in, it would be easy enough to make a script to extract them. Standard tools like find and tar do exactly that and do it well. Fancier tools could be made to look for id tags if the RIAA is paranoid about people changing filenames. It is this list of files that should be agreed on and only that should be coppied for examination beyond the "neutral" party.

    Asking for more is just abusive but that's what this is all about, isn't it? "A few dollars a song is all we ask," they tell us, "isn't everything we can take away worth more than that?" Muggers use similar logic when they brandish their weapons.

    While the change from "The RIAA gets everything it wants, so shut up." in these tiny details is nice, there's a long way to go before anything like justice is served and these searches start to look reasonable or lawful. Everyone in my house has a computer or two. The burden of identifying each and every file that might be embarrassing or abused is well beyond the average user. Even if you can do that, the details of the deletion are still troubling. I'd say that the RIAA system that makes the original mirror is something that can't be trusted to begin with and all bets are off from the first step.

    Unreasonable searches are disruptive and dangerous. The easiest way to see what a powerful weapon this can be is to imagine if MLK were alive today. The kinds of people who tapped his phones and told him to commit suicide [wikipedia.org] would be demanding his computers. Those who want to avoid harassment must give up many modern conveniences and efficiencies. The threat of revocation make the tools useless anyway. All it takes to end up on the list is an ISP.

    The only thing less reasonable than the "evidence" or motivation for these trials are the harsh penalties provided by law. Everyone of us faces the complete loss of property and livelyhoods at random, all to protect an industry from obvious technical obsolescence.

  • by Anonymous Coward on Sunday April 22, 2007 @03:16AM (#18830159)
    just set your computer's date to some random date in 1992 and tell the RIAA, "I never figured out how to set it properly"
  • by Skapare ( 16644 ) on Sunday April 22, 2007 @09:40AM (#18831321) Homepage

    A subpoena is supposed to not cause undue harm or burden. Since due process has not actually taken place (e.g. argue against it in court), the harm and burden is supposed to be limited. Preventing someone from using their computer is, IMHO, an undue harm and burden. This is the principle our laws came from (not that the laws actually implement it very well).

    In the "old days" (when such principles were established), evidence was generally written on paper. An order to preserve evidence would mean not destroying those papers. That would not have been an undue burden in most cases. Someone doing more stuff with papers is generally going to be buying more paper, or at the very least doing more writing in the remaining blank spaces of paper.

    The computer of today does not fit an analogy of paper. Perhaps the CDROM backups might. Using a computer typically does involve deleting old data and using the space for new data.

    But there is an even more extreme situation here. Microsoft Windows is so vulnerable to exploits that several things can end up destroying evidence, or exacerbating the burden. Infectious programs may cause damage or filesystem corruption. Spamware and spyware may be so pervasive that the only option is to wipe the disk and re-install the OS. It has happened to several of my friends and family (in many cases I've been the one to diagnose the problem and carry out the cure which first involved booting Linux to run "dd" to be damned sure the drive was wiped clean, before booting the Windows install disk to start all over). I actually recommend to people that they re-install Windows every 3 months if there are no visible signs of infection (or immediately if there are).

    Is it really the intent of the court to tell someone they must not clean out the infections in their computer, and must let the spamware keep popping up various ad windows, and must let their computer keep emailing spam to others on the internet? Will the court also extend that order to the ISP to prevent the user's account from being shut off due to all the spam coming through?

    Courts do need to learn a whole lot more about technology. And they sure aren't going to get it in an ex-parte hearing, especially with RIAA lawyers.

    IMHO, when a court has issued a subpoena that does cause harm and burden by preventing someone from using their computer, at least for more than a day or two, that court has overstepped its authority. Note that this is an opinion, not a description of how lawyers and judges have currently structured things (which is really wrong because of their lack of knowledge about technology). Fixing it, though, is going to be a tough issue for the future.

    But do keep in mind that lost evidence can be very easily the result not of the user, but of things beyond the user's control, at least if they keep using their computer. Tell me what you would think if a subpoena ordered you to shut your computer off, and not run it or use it at all, for 30 days, until they can get a bit image of the drive made (whether you did anything suspect or not)?

  • Pay for what you DL'd and you don't have to worry about a lawsuit....

    Nice to know you've been paying attention. After all, the RIAA never, ever causes trouble for those who are actually innocent, right?

  • by Anonymous Coward on Sunday April 22, 2007 @03:08PM (#18833431)
    Pull the AG defense.

    "I don't recall"

    If it's good enough for Congress, it's gotta be good enough for a judge.

Always draw your curves, then plot your reading.

Working...