Tech Law Journal Daily E-Mail Alert
February 16, 2009, Alert No. 1,900.
Home Page | Calendar | Subscribe | Back Issues | Reference
Congress Passes Spending Bill

2/13. The House and Senate both passed the conference report on HR 1 [LOC | WW], the huge spending bill.

The bill passed on nearly straight party line votes. The House approved the bill by a vote of 246-183. See, Roll Call No. 70. Democrats voted 246-7. Republicans voted 0-176.

The Senate approved the bill by a vote of 60-38. See, Roll Call No. 64. Democrats voted 57-0. Republicans voted 3-38. Sen. Susan Collins (R-ME), Sen. Olympia Snowe (R-ME), and Sen. Arlen Specter (R-PA) voted for the bill. Sen. Ted Kennedy (D-MA) did not vote.

For details on the content of the bill, see the following stories in TLJ Daily E-Mail Alert No. 1,899, February 13, 2009:
 • House and Senate to Vote on Conference Report on Spending Bill
 • Summary of Broadband Grants Provisions in Spending Bill
 • Spending Bill Includes More DTV Transition Funding
 • Spending Bill Includes Research Funding
 • Spending Bill Includes Smoot Hawley Provision

Douglas Elmendorf, Director of the Congressional Budget Office (CBO), wrote in a February 13, 2009, letter [8 pages in PDF] to Rep. Nancy Pelosi (D-CA), the Speaker of the House, and other Congressional leaders, that "CBO estimates that enacting the conference agreement for H.R. 1 would increase federal budget deficits by $185 billion over the remaining months of fiscal year 2009, by $399 billion in 2010, by $134 billion in 2011, and by $787 billion over the 2009-2019 period."

Jim Harper wrote in a short piece in the WashingtonWatch.com web site that "Our number crunching comes up with the following results: The bill costs the average U.S. family about $3,300, and it raises the national debt by about $7,700 per family."

Broadband Spending Provisions. The bill provides $4.7 Billion for broadband grants to be distributed by the National Telecommunications and Information Administration (NTIA), and another $2.5 Billion for broadband grants to be distributed by the Rural Utilities Service (RUS).

Kyle McSlarrow, head of the National Cable and Telecommunications Association (NCTA), stated in a release that "We applaud the U.S. House of Representatives passage of the economic stimulus package which establishes broadband as a national priority by promoting consumer adoption of broadband services and the deployment of broadband to unserved and underserved areas throughout the country. The measures adopted in the conference report will fuel our nation's investment in technology to map, modernize and expand our broadband infrastructure, helping drive our economic recovery with new jobs, better educational opportunities, and more efficient access to healthcare."

Grant Siefert, head of the Telecommunications Industry Association (TIA), stated in a release that "Broadband networks directly impact the productivity of our industries and our economy, and unequivocally affect public safety, education, health care, and countless other functions in Americans' daily lives ... Like any other infrastructure project, the deployment and use of broadband will significantly increase and maintain job growth well beyond the initial investment in the infrastructure, laptops and computing devices themselves. Broadband incentives are a necessary component of a 21st century stimulus package."

Walter McCormick, head of USTelecom, stated in a release that "We applaud the Senate and House for timely action on this important legislation. Like all Americans we want to see these stimulus efforts succeed in reviving our nation's economy and putting Americans back to work."

Smoot Hawley. This bill provides that "None of the funds appropriated or otherwise made available by this Act may be used for a project for the construction, alteration, maintenance, or repair of' a public building or public work unless all of the iron, steel, and manufactured goods used in the project are produced in the United States."

Gary Shapiro, head of the Consumer Electronics Association (CEA), stated in a release that "The `Buy American´ provisions in the stimulus bill will signal to our trading partners around the world that the United States is returning to the bad old days of protectionism and economic nationalism. Rather than stimulate the American economy, these provisions will lead to retaliation from abroad and cost precious jobs in the United States."

He said that "The lessons of Smoot-Hawley and the Great Depression are clear -- if we close our borders to international trade and artificially prop up our own industries, we deepen the global recession and further make ourselves vulnerable to a trade war."

Health IT. The bill provides $19 Billion for health information technology.

Sen. Patrick Leahy (D-VT), stated in the Senate on February 13, that this is "an investment in health information technology that takes meaningful steps to protect the privacy of all Americans."

He said that "Without adequate safeguards to protect health privacy, many Americans would simply not seek the medical treatment that they need for fear that their sensitive health information will be disclosed without their consent. Likewise, health care providers who perceive the privacy risks associated with health IT systems as inconsistent with their professional obligations would avoid participating in a national health IT system."

Sen. Patrick LeahySen. Leahy (at right) explained that the privacy provisions of the bill. "First, the provisions give each and every American the right to access his or her own electronic health records, and the right to timely notice of data breaches involving their health information. The recovery package also imposes critical restrictions on the sale of sensitive health data and on the use of Americans' health data for marketing purposes. Lastly, the legislation makes sure that the Secretary of the Department of Health and Human Services receives input from individuals with specific expertise in health information privacy and security, as the Secretary develops a national health information technology system."

The Institute for Policy Innovation (IPI) issued a statement on February 13 in which it argued that "creating centrally stored digital medical records creates the possibility ... that people in the government, and who knows how many others, will be able to access our personal medical information."

The IPI states that "medical scientists want access so they can data-mine aggregated medical information for research purposes". But, others "drawn to the collected data honey pot will not be so good-intentioned. So one question is whether government is competent to protect our information from ne’er-do-wells. Or simply put, can we trust the federal government to protect the privacy of our health data?"

The IPI asks how can a government that admits that there is "$60 billion a year in Medicare fraud", which has "been paying claims filed by doctors who had been dead for years", and "that leaks like a sieve", be trusted "with ensuring that our medical records are private and safe"?

Also on February 13, a grand jury of the U.S. District Court (SDFl) returned an indictment that charges six persons with conspiracy to commit health care fraud in connection with an alleged $10 Million Medicare fraud scheme. See, DOJ release.

E-Verify. The American Civil Liberties Union (ACLU) praised the Congress for deleting from the conference report a mandate that all entities receiving funds under the bill use the Department of Homeland Security's (DHS) E-Verify program.

The ACLU's Caroline Fredrickson stated in a release that "Removing the problematic employment verification provision from the economic stimulus package will help unemployed Americans get back to work".

She added that "E-Verify is known to create significant delays in hiring new employees, a consequence our economy and American workers should not have to suffer in such difficult economic times."

See also, the Cato Institute's November 24, 2008, short paper titled "Scrap E-Verify".

DC Circuit Rules in NCTA v. FCC

2/13. The U.S. Court of Appeals (DCCir) issued its opinion [14 pages in PDF] in NCTA v. FCC, denying a petition for review of the Federal Communications Commission's 2007 order regarding customer proprietary network information (CPNI) and 47 U.S.C. § 222.

This lets stand the FCC's rules that require service providers to obtain opt-in consent from a customer before disclosing a customer's CPNI to joint venture partners or independent contractors.

Statute. § 222 requires carriers to keep confidential the customer proprietary network information (CPNI) that they possess. The FCC implements this section with rules.

§ 222(a) provides that "Every telecommunications carrier has a duty to protect the confidentiality of proprietary information of, and relating to, other telecommunication carriers, equipment manufacturers, and customers, including telecommunication carriers reselling telecommunications services provided by a telecommunications carrier."

Background. The CPNI rulemaking that gave rise to this case began as a result of the August 30, 2005, petition for rulemaking filed by the Electronic Privacy Information Center's (EPIC) to address the problem of third party data brokers and private investigators who were obtaining CPNI from without authorization of customers.

Data brokers, private investigators, and Hewlett Packard lawyers, or their agents, were taking advantage of inadequate security through pretexting practices, such as pretending to be a customer seeking his own records.

See, story titled "HP Admits Spying on its Directors via Pretexting to Obtain Confidential Home Phone Records" in TLJ Daily E-Mail Alert No. 1,443, September 6, 2006.

The FCC adopted a notice of proposed rulemaking (NPRM) on February 10, 2006. See, story titled "FCC Adopts NPRM Regarding Privacy of Consumer Phone Records" in TLJ Daily E-Mail Alert No. 1,308, February 13, 2006. It released the text [34 pages in PDF] on February 14, 2006. The NPRM is FCC 06-10.

The FCC adopted the Report and Order under review on March 13, 2007. It released the text [PDF] on April 2, 2007. It is FCC 07-22 in CC Docket No. 96-115 and WC Docket No. 04-36.

The FCC order addresses issues other than pretexting. Pertinent to this proceeding, it modified its rules "to require carriers to obtain opt-in consent from a customer before disclosing a customer's CPNI to a carrier's joint venture partners or independent contractors for the purposes of marketing communications related services to that customer."

That is, the FCC received a petition for rulemaking, proceeded to conduct a rulemaking, but then issued rules addressing an issue not raised by the petition.

Meanwhile, the 109th Congress passed HR 4709, the "Telephone Records and Privacy Protection Act". It does address pretexting. See, story titled "Bush Signs Bill That Criminalizes Pretexting to Obtain Phone Records" in TLJ Daily E-Mail Alert No. 1,520, January 16, 2007.

Perhaps it should be noted too that pretexting and other social engineering practices, which were the original impetus for the EPIC's 2005 petition, as well as Congressional hearings and legislation, continue. See, related story in this issue titled "Guilty Plea Reveals Pretexting, Social Engineering and Hacking of Verizon Phone Systems".

NCTA Petition for Review. The National Cable & Telecommunications Association (NCTA) filed a petition for review [PDF] on August 7, 2007. It challenged only the FCC's rules requiring carriers and interconnected voice over internet protocol service providers to obtain opt in customer approval before disclosing CPNI to joint venture partners and independent contractors.

The NCTA argued that the opt-in requirement violates the First Amendment and is arbitrary and capricious.

Qwest and Verizon intervened in support of the NCTA. The EPIC and other groups and individuals filed an amicus curiae brief [PDF] in support of the FCC.

See also, the NCTA brief [99 pages in PDF], and the FCC's brief [85 pages in PDF].

The Court of Appeals heard oral argument on September 10, 2008.

Court of Appeals. The Court of Appeals denied the petition. Therefore, the FCC's opt-in rule stands.

The Court of Appeals noted that neither the NCTA nor its supporters challenge the constitutionality of § 222. It then wrote that "The question naturally arises: if the First Amendment did not bar Congress (in § 222) from requiring carriers to obtain their customers’ consent, how can it be that the First Amendment bars the Commission from implementing § 222 by requiring customer consent?" (Parentheses in original.)

The Court of Appeals held that the FCC's order satisfies the Supreme Court's test for First Amendment challenges to regulation of commercial speech, articulated in Central Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n of New York, 447 U.S. 557 (1980).

FCC Chairman Michael Copps stated in a release that "I am pleased by today's D.C. Circuit decision upholding the Commission's efforts to strengthen individual privacy protections. Telephone carriers today handle vast amounts of their customers' personal information, and in light of documented abuses of consumers' privacy, the Commission appropriately required carriers to institute additional safeguards to protect customers' personal information. Today's court decision upholding those safeguards should be a welcome development for all consumers, and the Commission will continue to be vigilant to ensure that their privacy is protected."

This case is NCTA v. FCC and USA, U.S. Court of Appeals for the District of Columbia, App. Ct. No. 07-1312, a petition for review of a final order of the FCC. Judge Randolph wrote the opinion of the Court of Appeals, in which Judges Rogers and Tatel joined.

Guilty Plea Reveals Pretexting, Social Engineering and Hacking of Verizon Phone Systems

1/29. The Office of the U.S. Attorney (USAO) for the Northern District of Texas announced that Matthew Douglas Weigman, a teenage delinquent, entered a plea of guilty in U.S. District Court (NDTex) to obstruction of justice and conspiring to obstruct justice.

What is significant about this case is that the underlying acts being investigated demonstrate how vulnerable Verizon's phone systems have been to pretexting, social engineering, and hacking. See. USAO release and CCIPS release [PDF] on the plea.

Weigman pled guilty to obstruction of justice, and conspiring to obstruct justice, in connection with his interference with Verizon's fraud investigator assigned to his case. Weigman was able to acquire the confidential phone records of this investigator.

The USAO's June 17, 2008, release regarding Weigman's indictment adds that he attempted but failed to "gain access to the Dallas U.S. Attorney's Office voice mail system".

The USAO's latest release lists various activities of Weigman and other conspirators.

This includes "unauthorized access to telecommunication company information stored on protected computers to obtain personal identifying information".

It includes use of "software and hardware configured to insert or modify telecommunication access devices and account information for telephone customers and employees to obtain free telephone service or to discontinue service for telephone subscribers".

The release states that they "would fraudulently obtain the personal identifiers of certain telecommunication employees and impersonate the customer of the targeted telephone number, impersonate the telecommunications employee capable of initiating changes to the targeted telephone number, and/or establish fraudulent telephone accounts."

It states that "When Verizon identified a phone line that Weigman had obtained by fraud in April 2008 and turned that phone line off, Weigman used the identities and authorization codes of Verizon employees to have the phone reactivated."

It also states that Weigman gained "unauthorized access to the phone system to conduct unauthorized electronic monitoring of Verizon employees' phones to harass the employee and obtain information about the status of the investigation against him".

The USAO also stated that other members of the conspiracy made spoof calls to emergencies services, made "it appear to emergency services that the call was actually made from the victim's residence", and therein fabricated stories of murders, guns, drugs and hostages.

It also states that "Weigman made more than 50 telephone calls to the Verizon Provisioning Center located in Irving, Texas, and using unauthorized access to their computers, obtained telecommunications services including Caller ID blocking and call forwarding. He also used these Verizon computers to establish new accounts and services to use in concealing the Caller ID of his coconspirators and to terminate services to victims. Weigman also made unauthorized access to these computers to obtain account subscriber information which was used to identify personal information for targeting new victims".

It also states that Weigman and others obtained "information by various means including ``social engineering´´ or pretexting of telephone calls to telecommunications company employees, ``war dialing,´´ and trafficking in pass phrases and access information with other phone ``phreakers,´´".

Finally, it states that Weigman "used their abilities to manipulate the phone system to listen to phone conversations without permission for both pleasure and financial gain".

The USAO states that Weigman is now 18, but that his criminal acts began in June of 2003.

About Tech Law Journal

Tech Law Journal publishes a free access web site and a subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year for a single recipient. There are discounts for subscribers with multiple recipients.

Free one month trial subscriptions are available. Also, free subscriptions are available for journalists, federal elected officials, and employees of the Congress, courts, and executive branch. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert are not published in the web site until two months after writing.

For information about subscriptions, see subscription information page.

Tech Law Journal now accepts credit card payments. See, TLJ credit card payments page.

Solution Graphics

TLJ is published by David Carney
Contact: 202-364-8882.
carney at techlawjournal dot com
P.O. Box 4851, Washington DC, 20008.

Privacy Policy
Notices & Disclaimers
Copyright 1998-2009 David Carney. All rights reserved.

In This Issue

This issue contains the following items:
 • Congress Passes Spending Bill
 • DC Circuit Rules in NCTA v. FCC
 • Guilty Plea Reveals Pretexting, Social Engineering and Hacking of Verizon Phone Systems
 • Kindle2's Text to Audio Feature and Copyright

Washington Tech Calendar
New items are highlighted in red.
Monday, February 16

George Washington's birthday observed. See, Office of Personnel Management's (OPM) list of 2009 federal holidays. The National Press Club will be closed.

The House will not meet the week of February 16-20.

The Senate will not meet the week of February 16-20.

10:00 AM. The Federal Trade Commission (FTC) is scheduled to begin its hearing in In the Matter of Whole Foods Markets, Inc. See, scheduling order [14 pages in PDF]. See also, story titled "DC Circuit Reverses in FTC v. Whole Foods" in TLJ Daily E-Mail Alert No. 1,802, July 29, 2008. Location: Room 532, FTC, 600 Pennsylvania Ave., NW.

5:00 PM. Deadline to register for the Federal Communications Bar Association's (FCBA) February 18 event titled "Investing in Foreign Telecoms Markets: Challenges and Opportunities". See, notice and registration page.

Tuesday, February 17

POSTPONED. Deadline for full power television stations to cease analog broadcasting. See, S 352 [LOC | WW], the "DTV Delay Act".

8:30 AM - 4:45 PM. The U.S.-China Economic and Security Review Commission will hold a meeting titled "China's Role in the Origins of and Response to the Global Recession". See, notice in the Federal Register, January 13, 2009, Vol. 74, No. 8, at Page 1768. Location: Room 562, Dirksen Building, Capitol Hill.

9:30 AM. The U.S. Court of Appeals (DCCir) will hear oral argument in Globalstar v. FCC, App. Ct. No. 08-1046. This is a petition for review of an FCC order regarding Big LEO spectrum. See, FCC brief [67 pages in PDF]. Judges Sentelle, Garland and Edwards will preside. Location: 333 Constitution Ave., NW.

10:00 AM. Deadline for all commenters, except foreign governments, to submit comments to the Office of the U.S. Trade Representative (OUSTR) regarding countries that deny adequate and effective protection of intellectual property rights or deny fair and equitable market access to U.S. persons who rely on intellectual property protection. These comments assist the OUSTR in fulfilling its obligations under Section 182 of the Trade Act Act of 1974. See, notice in the Federal Register, January 23, 2009, Vol. 74, No. 14, Page 4263-4264.

12:30 - 1:30 PM. The Federal Communications Bar Association's (FCBA) State and Local Practice Committee will host a brown bag lunch titled "Collaboration between States, Federal Government and Industry on Uniform Outage Reporting for Carriers". The speaker will be Tom Goode, General Counsel of the Alliance for Telecommunications Industry Solutions (ATIS). See, notice and registration page. Location: Renaissance Hotel, Meeting Room 3, 999 9th St., NW.

1:00 - 3:00 PM. The Federal Communications Commission's (FCC) World Radiocommunications Conference (WRC-11) Advisory Committee's Informal Working Group 2: Terrestrial Services will meet. See, notice and FCC's WRC-11 web site. Location: FCC, South Conference Room, 2nd floor, Room 2-B516, 445 12th St., SW.

3:00 - 5:00 PM. The Federal Communications Commission's (FCC) World Radiocommunications Conference (WRC-11) Advisory Committee's Informal Working Group 3: Space Services will meet. See, notice and FCC's WRC-11 web site. Location: FCC, South Conference Room, 2nd floor, Room 2-B516, 445 12th St., SW.

5:00 PM. Deadline to submit applications to the National Institute of Standards and Technology (NIST) for participation in its 2009 SURF grant programs. These are the NIST's Gaithersburg Summer Undergraduate Research Fellowship Program, and Boulder Summer Undergraduate Research Fellowship Program. The NIST distributes grants for, among other topics, electronics and electrical engineering, and information technology. See, notice in the Federal Register, December 30, 2008, Vol. 73, No. 250, at Pages 79817-79822.

Wednesday, February 18

10:00 AM - 12:00 NOON. The Federal Communications Commission's (FCC) World Radiocommunications Conference (WRC-11) Advisory Committee's Informal Working Group 1: Maritime, Aeronautical and Radar Services will meet. See, notice and FCC's WRC-11 web site. Location: 1800 North Kent St., Suite 1060, RTCM, Rosslyn, VA.

12:15 - 1:45 PM. The Federal Communications Bar Association's (FCBA) Young Lawyers Committee will host a brown bag lunch titled "Transitions -- How to Successfully Navigate a Move into a New Position". The speakers will include Marcia Shannon (Shannon & Manch), Dan Binstock (BCG Attorney Search), Peter Shields (Wiley Rein), Laura Rychak (Cox Enterprises), and (?) Anna Gomez. RSVP to Christy Hammond at chammond at wileyrein dot com. For more information or to submit anonymous questions for the speakers, contact Cathy Hilke at chilke at wileyrein dot com or Christina Langlois at clanglois at nualumni dot com. Location: Wiley Rein, 5th floor, 1750 K St., NW.

6:00 - 8:15 PM. The Federal Communications Bar Association (FCBA) will host an event titled "Investing in Foreign Telecoms Markets: Challenges and Opportunities". See, notice and registration page. The price to attend varies. Location: Bingham McCutchen, 11th floor, 2020 K St., NW.

Thursday, February 19

10:30 AM - 12:00 NOON. The Heritage Foundation will host an event titled "Taiwan: Ideal Candidate for Free Trade Agreement". The speakers will be Chris Padilla, Rupert Hammond-Chambers (U.S.-Taiwan Business Council), and Walter Lohman (Heritage). Location: Heritage, 214 Massachusetts Ave., NE.

11:00 - 2:00 PM. George Washington University's (GWU) law school's IP Speaker Series will host a lecture by Greg Vetter. See, notice. Location: Faculty Conference Center (B505), GWU law school.

12:15 PM. The Federal Communications Bar Association's (FCBA) Wireless Telecommunications Practice Committee will host a lunch titled "How can telecommunications technologies, specifically wireless technologies, lead the green revolution?". Location: Sidley Austin, 6th floor, 1501 K St., NW.

Friday, February 20

9:30 AM. The U.S. Court of Appeals (DCCir) will hear oral argument in Ad Hoc Telecommunications Users Committee v. FCC, App. Ct. No. 07-1426. This is a petition for review of an FCC forbearance decision. See, FCC brief [84 pages in PDF]. Judges Sentelle, Kavanaugh and Edwards will preside. Location: 333 Constitution Ave., NW.

12:15 - 1:45 PM. The New America Foundation (NAF) will host discussion of the book [Amazon] titled "Viral Spiral: How the Commons Built a Digital Republic of Their Own". The speakers will be David Bollier (author), Sascha Meinrath (NAF), and Michael Calabrese (NAF). See, notice and registration page. Location: NAF, 7th floor, 1630 Connecticut Ave., NW.

Extended deadline to submit reply comments to the Federal Communications Commission (FCC) regarding the Rural Cellular Association's (RCA) May 20, 2008, petition for rulemaking [25 pages in PDF] regarding "the widespread use and anticompetitive effects of exclusivity arrangements between commercial wireless carriers and handset manufacturers" and "rules that prohibit such arrangements". See, notice in the Federal Register, October 23, 2008, Vol. 73, No. 206, at Pages 63127-63128. This proceeding is RM No. 11497. See, FCC notice of extension [PDF], and notice of extension in the Federal Register, December 12, 2008, Vol. 73, No. 240, at Pages 75629-75630.

Deadline to submit comments to the National Science Foundation's (NSF) National Coordination Office for Networking Information Technology Research and Development (NCO/NITRD) that contain "promising game-changing ideas with the potential to reduce vulnerabilities to cyber exploitations by altering the cybersecurity landscape". See, notice in the Federal Register, December 30, 2008, Vol. 73, No. 250, at Pages 79919-79921.

Monday, February 23

The House will return from its one week recess.

10:00 AM - 12:00 NOON. The Federal Communications Commission's (FCC) World Radiocommunications Conference (WRC-11) Advisory Committee's Informal Working Group 4: Regulatory Issues will meet. See, notice and FCC's WRC-11 web site. Location: FCC, North Conference Room, 6th floor, Rooms 6-B112 and 6-B142, 445 12th St., SW.

Deadline to submit initial comments to the Federal Communications Commission (FCC) regarding the October 8, 2008, Petition for Rulemaking [18 pages in PDF] submitted by the CTIA regarding transitioning certain cellular licensing rules to a geographic market area based licensing system. See, FCC's Public Notice numbered DA 09-5, and notice in the Federal Register, January 22, 2009, Vol. 74, No. 13, at Pages 4036-4037. This proceeding is RM No. 11510.

Kindle2's Text to Audio Feature and Copyright

2/12. On February 9, Amazon put on sale the second version of its wireless book downloader and reader, named Kindle2. This version has speakers, and a feature named "Read to Me".

Amazon stated in its web site that "Now Kindle can read to you. With the new Text-to-Speech feature, Kindle can read every book, blog, magazine, and newspaper out loud to you."

17 U.S.C. § 106 lists the exclusive rights in copyrighted works. Neither § 106, nor the definitional section, 17 U.S.C. § 101, reference e-books, audio books, book readers, or text to audio features in book readers.

§ 106 provides, in part, that "Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following: (1) to reproduce the copyrighted work in copies or phonorecords; (2) to prepare derivative works based upon the copyrighted work; ... (4) in the case of literary ... works, ... to perform the copyrighted work publicly; ... and (6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission".

§ 101 defines "copies" as "material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device".

§ 101 defines "derivative work" as "a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted".

Amazon obtains licenses from copyright holders. Its web site discloses nothing about the provisions of such licenses that may pertain to any text to audio feature.

Nor does Amazon's web site make any assertions regarding whether or not its text to audio feature would violate any of the exclusive rights in copyrighted works, if it has a license that covers the text, but is silent as to text to audio features.

Nor does Amazon's web site disclose whether or not its text to audio feature creates any permanent, temporary or transient audio files.

17 U.S.C. § 121 provides a limitation to the § 106 exclusive rights for "copies or phonorecords of a previously published, nondramatic literary work if such copies or phonorecords are reproduced or distributed in specialized formats exclusively for use by blind or other persons with disabilities".

This limitation is inapplicable, to the extent that Amazon's text to audio feature is not "exclusively for use by blind or other persons with disabilities". While this text to audio feature will be used by blind persons, both the nature of the technology, and Amazon's marketing, indicate that the text to audio is not exclusively for blind or disabled persons.

Amazon is touting the advantages of this feature for people driving cars. This is also a major target market segment for audio books.

The Author's Guild (AG) published an item in its web site on February 12, 2009, that states that "This presents a significant challenge to the publishing industry."

The AG explained that "Audiobooks surpassed $1 billion in sales in 2007; e-book sales are just a small fraction of that. While the audio quality of the Kindle 2, judging from Amazon's promotional materials, is best described as serviceable, it's far better than the text-to-speech audio of just a few years ago. We expect this software to improve rapidly."

The AG recommended that "if you haven't yet granted your e-book rights to backlist or other titles, this isn't the time to start. If you have a new book contract and are negotiating your e-book rights, make sure Amazon's use of those rights is part of the dialog."

It added that "Publishers certainly could contractually prohibit Amazon from adding audio functionality to its e-books without authorization, and Amazon could comply by adding a software tag that would prohibit its machine from creating an audio version of a book unless Amazon has acquired the appropriate rights. Until this issue is worked out, Amazon may be undermining your audio market as it exploits your e-books."

The AG concluded that "Bundling e-books and audio books has been discussed for a long time in the industry. It's a good idea, but it shouldn't be accomplished by fiat by an e-book distributor."

There is not now any pending court case, or even a controversy, the parties to which have identified specific items in dispute and their legal interpretations.

The Kindle2 measures 8" x 5.3" x 0.36", weighs 10.2 ounces, and has a display with 600 x 800 pixel resolution at 167 ppi. It has about 1.4 GB of available storage. Users download books by wireless connection, for which there is no service plan or monthly fees. It uses Sprint Nextel's 3G EVDO network. It is on sale in the Amazon web site for $359.

More News

2/13. The Federal Communications Commission (FCC) adopted and released an order [5 pages in PDF] that extends "the analog license terms and adjust the construction permits for the full power television stations subject to to the DTV Delay Act. This Act was S 352 [LOC | WW]. President Obama signed it into law on February 11, 2009. It is now Public Law No. 111-4. This order also amends the FCC's Public Notice released on February 5, 2009, and Public Notice released on February 11, 2009. This order is FCC 09-9 in MB Docket No. 09-17.

2/13. The Federal Communications Commission (FCC) released a Public Notice [2 pages in PDF] regarding TV stations' responses to the FCC's requirements for analog termination on February 17, 2009. This item is DA 09-245. See also, story titled "FCC Makes Further DTV Transition Announcements" in TLJ Daily E-Mail Alert No. 1,898, February 12, 2009. Appendix A [2 pages in PDF] lists the 53 stations that certified that they will comply with the conditions set forth in the February 11, 2009, Public Notice [6 pages in PDF], which is FCC 09-7. Appendix B [1 page in PDF] lists the 10 stations that made an alternate showing. Appendix C [2 pages in PDF] lists the 43 stations that indicated that they no longer intend to terminate analog operations on February 17, 2009.

2/13. The National Telecommunications and Information Administration (NTIA) announced that the extended deadline to submit grants applications under the Low Power Television and Translator Digital to Analog Conversion Program is now June 12, 2009.

2/12. The Federal Communications Commission (FCC) published a Public Notice [2 pages in PDF] regarding the filing of FCC Form 477. This is the FCC semi-annual form for collection of data on local telephone and broadband internet access lines. It is due on March 2, 2009. This item is DA 09-231.

2/12. The Technology Policy Institute (TPI) published in its web site on February 12, 2009, a paper [PDF] titled "The Empirics of the Digital Divide: Can Duration Analysis Help?". The authors are Wei-Min Hu (Peking University Shenzhen Graduate School of Business) and James Prieger (Pepperdine University School of Public Policy). The paper is dated October 21, 2008. Prieger works at the Federal Communications Commission (FCC).

2/12. The Business Software Alliance (BSA) announced settlement of a copyright action against CaseData Corporation. The BSA stated in a release that "CaseData paid BSA $250,000 to settle claims that it had unauthorized copies of Adobe, Microsoft, and Symantec software installed on its computers. As part of the settlement, the company agreed to delete all unlicensed copies of software installed on its computers, acquire any licenses necessary to become compliant, and commit to implementing stronger software license management practices."

2/11. The Library of Congress's (LOC) Copyright Royalty Judges (CRJ) published a notice in the Federal Register that announces, describes, recites, and sets the effective date (March 31, 2009) of, four modifications to the royalty terms previously adopted by the CRJ in their final determination of rates and terms for the mechanical and digital phonorecord delivery statutory license, under 17 U.S.C. § 115. See, Federal Register, February 11, 2009, Vol. 74, No. 27, at  Pages 6832-6834. The CRJ issued its "final determination" on November 24, 2008. The Register of Copyright made two changes on January 26, 2009. See, story titled "Copyright Office Amends Copyright Royalty Judges' § 115 Determination" in TLJ Daily E-Mail Alert No. 1,888, January 28, 2009. The four changes announced by the CRJ on February 11 are a result of the two items announced by the Register of Copyright on January 26.

2/10. The Securities and Exchange Commission (SEC) published a notice in the Federal Register that announces, describes, recites, and sets various effective dates for, its new rules regarding the use of interactive data in financial reporting. See, Federal Register, February 10, 2009, Vol. 74, No. 26, at Pages 6775-6821.

2/10. Computer Associates (CA) announced in a release that "it has reached a settlement with Rocket Software, Inc. resolving CA’s claims of copyright infringement and trade secret misappropriation." It added that "Rocket has agreed to license technology from CA, including source code authored several years ago and related trade secrets that were the subject of the litigation."

2/6. The National Institute of Standards and Technology's (NIST) Computer Security Division released its draft [149 pages in PDF] of Special Publication 800-85A-1, titled "PIV Card Application and Middleware Interface Test Guidelines". The deadline to submit comments on this draft is February 28, 2009.

2/5. The National Institute of Standards and Technology's (NIST) Computer Security Division released its draft [209 pages in PDF] of Special Publication 800-53, Revision 3, titled "Recommended Security Controls for Federal Information Systems and Organizations". The deadline to submit comments on this draft is March 27, 2009.