right-to-read.html (23338B)
1 <!--#include virtual="/server/header.html" --> 2 <!-- Parent-Version: 1.96 --> 3 <!-- This page is derived from /server/standards/boilerplate.html --> 4 <!--#set var="TAGS" value="essays cultural access" --> 5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --> 6 <title>The Right to Read 7 - GNU Project - Free Software Foundation</title> 8 <style type="text/css" media="print,screen"><!-- 9 .announcement { 10 text-align: center; 11 box-sizing: border-box; 12 background: #f5f5f5; 13 border-left: .4em solid #5c5; 14 border-right: .4em solid #5c5; 15 border-top: .1em solid #5c5; 16 border-bottom: .1em solid #5c5; 17 margin: 2.5em auto; 18 } 19 #AuthorsNote ul, #AuthorsNote li { 20 margin: 0; 21 } 22 #AuthorsNote li p { 23 margin: 1em 0; 24 } 25 .emph-box { 26 background: #f7f7f7; 27 border-color: #e74c3c; 28 } 29 #AuthorsNote p.emph-box { 30 margin: 1em 6%; 31 } 32 #BadNews li p { text-indent: -.8em; } 33 #BadNews li p:before { 34 content: "\021D2"; 35 display: inline; 36 position: relative; 37 right: .5em; 38 } 39 #BadNews p.emph-box { 40 margin: 2.5em 6% 1em; 41 } 42 @media (min-width: 55em) { 43 #AuthorsNote .columns > p:first-child, 44 #AuthorsNote li p.inline-block { margin-top: 0; } 45 .update { font-style: italic; text-align: center; } 46 .table { display: table; } 47 .table-cell { 48 display: table-cell; 49 width: 50%; 50 vertical-align: middle; 51 } 52 .left { padding-right: .75em; } 53 .right { padding-left: .75em; } 54 }--> 55 <!--#if expr="$RTL_SCRIPT = yes" --> 56 <!-- 57 @media (min-width: 55em) { 58 .left { padding-left: .75em; padding-right: 0; } 59 .right { padding-right: .75em; padding-left: 0; } 60 }--> 61 <!--#endif --> 62 </style> 63 <!--#include virtual="/philosophy/po/right-to-read.translist" --> 64 <!--#include virtual="/server/banner.html" --> 65 <!--#include virtual="/philosophy/ph-breadcrumb.html" --> 66 <!--GNUN: OUT-OF-DATE NOTICE--> 67 <!--#include virtual="/server/top-addendum.html" --> 68 <div class="article"> 69 <h2 class="center">The Right to Read</h2> 70 71 <address class="byline center"> 72 by <a href="https://www.stallman.org/">Richard Stallman</a></address> 73 74 <p class="infobox c"> 75 From <cite>The Road To Tycho</cite>, a collection of 76 articles about the antecedents of the Lunarian 77 Revolution, published in Luna City in 2096. 78 </p> 79 <hr class="thin" /> 80 81 <div class="columns"> 82 <p> 83 For Dan Halbert, the road to Tycho began in college—when Lissa 84 Lenz asked to borrow his computer. Hers had broken down, and unless 85 she could borrow another, she would fail her midterm project. There 86 was no one she dared ask, except Dan.</p> 87 88 <p> 89 This put Dan in a dilemma. He had to help her—but if he lent 90 her his computer, she might read his books. Aside from the fact that 91 you could go to prison for many years for letting someone else read 92 your books, the very idea shocked him at first. Like everyone, he had 93 been taught since elementary school that sharing books was nasty and 94 wrong—something that only pirates would do.</p> 95 96 <p> 97 And there wasn't much chance that the SPA—the Software 98 Protection Authority—would fail to catch him. In his software 99 class, Dan had learned that each book had a copyright monitor that 100 reported when and where it was read, and by whom, to Central 101 Licensing. (They used this information to catch reading pirates, but 102 also to sell personal interest profiles to retailers.) The next time 103 his computer was networked, Central Licensing would find out. He, as 104 computer owner, would receive the harshest punishment—for not 105 taking pains to prevent the crime.</p> 106 107 <p> 108 Of course, Lissa did not necessarily intend to read his books. She 109 might want the computer only to write her midterm. But Dan knew she 110 came from a middle-class family and could hardly afford the tuition, 111 let alone her reading fees. Reading his books might be the only way 112 she could graduate. He understood this situation; he himself had had 113 to borrow to pay for all the research papers he read. (Ten percent of those 114 fees went to the researchers who wrote the papers; since Dan aimed for 115 an academic career, he could hope that his own research papers, if 116 frequently referenced, would bring in enough to repay this loan.)</p> 117 </div> 118 <div class="column-limit"></div> 119 120 <div class="columns"> 121 <p> 122 Later on, Dan would learn there was a time when anyone could go to the 123 library and read journal articles, and even books, without having to 124 pay. There were independent scholars who read thousands of pages 125 without government library grants. But in the 1990s, both commercial 126 and nonprofit journal publishers had begun charging fees for access. 127 By 2047, libraries offering free public access to scholarly literature 128 were a dim memory.</p> 129 130 <p> 131 There were ways, of course, to get around the SPA and Central 132 Licensing. They were themselves illegal. Dan had had a classmate in 133 software, Frank Martucci, who had obtained an illicit debugging tool, 134 and used it to skip over the copyright monitor code when reading 135 books. But he had told too many friends about it, and one of them 136 turned him in to the SPA for a reward (students deep in debt were 137 easily tempted into betrayal). In 2047, Frank was in prison, not for 138 pirate reading, but for possessing a debugger.</p> 139 140 <p> 141 Dan would later learn that there was a time when anyone could have 142 debugging tools. There were even free debugging tools available on CD 143 or downloadable over the net. But ordinary users started using them 144 to bypass copyright monitors, and eventually a judge ruled that this 145 had become their principal use in actual practice. This meant they 146 were illegal; the debuggers' developers were sent to prison.</p> 147 148 <p> 149 Programmers still needed debugging tools, of course, but debugger 150 vendors in 2047 distributed numbered copies only, and only to 151 officially licensed and bonded programmers. The debugger Dan used in 152 software class was kept behind a special firewall so that it could be 153 used only for class exercises.</p> 154 155 <p> 156 It was also possible to bypass the copyright monitors by installing a 157 modified system kernel. Dan would eventually find out about the free 158 kernels, even entire free operating systems, that had existed around 159 the turn of the century. But not only were they illegal, like 160 debuggers—you could not install one if you had one, without 161 knowing your computer's root password. And neither 162 the FBI nor 163 Microsoft Support would tell you that.</p> 164 </div> 165 <div class="column-limit"></div> 166 167 <div class="columns"> 168 <p> 169 Dan concluded that he couldn't simply lend Lissa his computer. But he 170 couldn't refuse to help her, because he loved her. Every chance to 171 speak with her filled him with delight. And that she chose him to ask 172 for help, that could mean she loved him too.</p> 173 174 <p> 175 Dan resolved the dilemma by doing something even more 176 unthinkable—he lent her the computer, and told her his password. 177 This way, if Lissa read his books, Central Licensing would think he 178 was reading them. It was still a crime, but the SPA would not 179 automatically find out about it. They would only find out if Lissa 180 reported him.</p> 181 182 <p> 183 Of course, if the school ever found out that he had given Lissa his 184 own password, it would be curtains for both of them as students, 185 regardless of what she had used it for. School policy was that any 186 interference with their means of monitoring students' computer use was 187 grounds for disciplinary action. It didn't matter whether you did 188 anything harmful—the offense was making it hard for the 189 administrators to check on you. They assumed this meant you were 190 doing something else forbidden, and they did not need to know what it 191 was.</p> 192 193 <p> 194 Students were not usually expelled for this—not directly. 195 Instead they were banned from the school computer systems, and would 196 inevitably fail all their classes.</p> 197 198 <p> 199 Later, Dan would learn that this kind of university policy started 200 only in the 1980s, when university students in large numbers began 201 using computers. Previously, universities maintained a different 202 approach to student discipline; they punished activities that were 203 harmful, not those that merely raised suspicion.</p> 204 </div> 205 <div class="column-limit"></div> 206 207 <div class="columns"> 208 <p> 209 Lissa did not report Dan to the SPA. His decision to help her led to 210 their marriage, and also led them to question what they had been 211 taught about piracy as children. The couple began reading about the 212 history of copyright, about the Soviet Union and its restrictions on 213 copying, and even the original United States Constitution. They moved 214 to Luna, where they found others who had likewise gravitated away from 215 the long arm of the SPA. When the Tycho Uprising began in 2062, the 216 universal right to read soon became one of its central aims.</p> 217 </div> 218 219 <div class="announcement reduced-width comment" role="complementary"> 220 <hr class="no-display" /> 221 <p><a href="https://www.defectivebydesign.org/ebooks.html"> 222 Join our mailing list about the dangers of e-books</a>.</p> 223 <hr class="no-display" /> 224 </div> 225 226 <div id="AuthorsNote"> 227 <h3>Author's Notes</h3> 228 229 <ul class="no-bullet"> 230 <li> 231 <div class="reduced-width"> 232 <p>This story is supposedly a historical article that will be written in 233 the future by someone else, describing Dan Halbert's youth under a 234 repressive society shaped by the unjust forces that use “pirate” as 235 propaganda. So it uses the terminology of that society. 236 I have tried to project it forwards into something more visibly 237 oppressive. See <a 238 href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>. 239 </p> 240 </div> 241 <div class="column-limit"></div> 242 </li> 243 244 <li> 245 <div class="reduced-width"> 246 <p>Computer-enforced restrictions on lending or reading books (and other 247 kinds of published works) are known as DRM, short for 248 “Digital Restrictions Management.” To 249 eliminate DRM, the Free Software Foundation has 250 established the <a href="https://www.defectivebydesign.org/">Defective by 251 Design</a> campaign. We ask for your support.</p> 252 253 <p>The Electronic Frontier Foundation, a separate organization not 254 related to the Free Software Foundation, also campaigns against 255 DRM.</p> 256 </div> 257 <div class="column-limit"></div> 258 </li> 259 </ul> 260 261 <p class="update"> 262 The following note has been updated several times since the first 263 publication of the story.</p> 264 265 <ul class="no-bullet"> 266 <li> 267 <div class="columns"> 268 <p> 269 The battle for the right to read is already being fought. Although it 270 may take 50 years for our past freedoms to fade into obscurity, most 271 of the specific repressive laws and practices described above have 272 already been proposed; some have been enacted into law in the US and 273 elsewhere. In the US, the 1998 Digital Millennium Copyright Act 274 (DMCA) gave explicit government backing to the 275 computer-enforced restrictions known as DRM, by making the 276 distribution of programs that can break DRM a crime. The European 277 Union imposed similar restrictions in a 2001 copyright directive, in a 278 form not quite as strong.</p> 279 280 <p> 281 The US campaigns to impose such rules on the rest of the world through 282 so-called “free trade” treaties. 283 <a href="https://stallman.org/business-supremacy-treaties.html"> 284 Business-supremacy treaties</a> is a more fitting term for them, since 285 they are designed to give business dominion over nominally democratic 286 states. The DMCA's policy of criminalizing programs that 287 break DRM is one of many unjust policies that these treaties impose 288 across a wide range of fields.</p> 289 290 <p> 291 The US has imposed DMCA requirements on Australia, Panama, Colombia 292 and South Korea through bilateral agreements, and on countries such as 293 Costa Rica through another treaty, CAFTA. Obama has escalated the 294 campaign with two new proposed treaties, the TPP and the TTIP. The 295 TPP would impose the DMCA, along with many other wrongs, on 12 296 countries on the Pacific Ocean. The TTIP would impose similar 297 strictures on Europe. All these treaties must be defeated, or 298 abolished.</p> 299 300 <p> 301 Even the World Wide Web Consortium has fallen under the shadow of the 302 copyright industry; it is on the verge of approving a DRM system as an 303 official part of the web specifications.</p> 304 </div> 305 <div class="column-limit"></div> 306 </li> 307 308 <li> 309 <div class="table"> 310 <div class="table-cell left"> 311 <p class="emph-box"> 312 Nonfree software tends to have <a href="/proprietary/">abusive 313 features of many kinds</a>, which lead to the conclusion that 314 <a href="/philosophy/free-software-even-more-important.html">you can 315 never trust a nonfree program</a>. We must insist on free (libre) 316 software only, and reject nonfree programs.</p> 317 </div> 318 319 <p class="table-cell right"> 320 With Windows Vista, Microsoft admitted it had built in a back door: 321 Microsoft can use it to forcibly install software 322 “upgrades,” even if users consider them rather to be 323 downgrades. It can also order all machines running Vista to refuse to 324 run a certain device driver. The main purpose of Vista's clampdown on 325 users was to impose DRM that users can't overcome. Of course, Windows 326 10 is no better.</p> 327 </div> 328 <div class="column-limit"></div> 329 </li> 330 331 <li> 332 <div class="columns"> 333 <p> 334 One of the ideas in the story was not proposed in reality until 2002. 335 This is the idea that the FBI and Microsoft will keep the 336 root passwords for your personal computers, and not let you have 337 them.</p> 338 339 <p> 340 The proponents of this scheme gave early versions names such as 341 “trusted computing” and “Palladium,” but as 342 ultimately put into use, it is called “secure boot.”</p> 343 344 <p> 345 What Microsoft keeps is not exactly a password in the traditional 346 sense; no person ever types it on a terminal. Rather, it is a 347 signature and encryption key that corresponds to a second key stored 348 in your computer. This enables Microsoft, and potentially any web 349 sites that cooperate with Microsoft, the ultimate control over what 350 the user can do on per own computer. Microsoft is likely to use that 351 control on behalf of the FBI when asked: it 352 already <a href="/proprietary/malware-microsoft.html">shows 353 the NSA security bugs in Windows</a> to exploit.</p> 354 355 <p> 356 Secure boot can be implemented in a way that permits the user to 357 specify the signature key and decide what software to sign. In 358 practice, PCs designed for Windows 10 carry only Microsoft's key, and 359 whether the machine's owner can install any other system (such as 360 GNU/Linux) is under Microsoft's control. We call this <em>restricted 361 boot</em>.</p> 362 </div> 363 <div class="column-limit"></div> 364 </li> 365 366 <li> 367 <div class="columns"> 368 <p> 369 In 1997, when this story was first published, the SPA was 370 threatening small Internet service providers, demanding they permit 371 the SPA to monitor all users. Most ISPs surrendered when 372 threatened, because they could not afford to fight back in court. One 373 ISP, Community ConneXion in Oakland, California, refused the demand 374 and was actually sued. The SPA later dropped the suit, 375 but the DMCA gave it the power it sought.</p> 376 377 <p> 378 The SPA, which actually stands for Software Publishers 379 Association, has been replaced in its police-like role by the Business 380 Software Alliance. The BSA is not, today, an official 381 police force; unofficially, it acts like one. Using methods 382 reminiscent of the erstwhile Soviet Union, it invites people to inform 383 on their coworkers and friends. A BSA terror campaign in 384 Argentina in 2001 made slightly veiled threats that people sharing 385 software would be raped in prison.</p> 386 </div> 387 <div class="column-limit"></div> 388 </li> 389 390 <li> 391 <div class="reduced-width"> 392 <p> 393 The university security policies described above are not imaginary. 394 For example, a computer at one Chicago-area university displayed this 395 message upon login:</p> 396 397 <blockquote><p> 398 This system is for the use of authorized users only. Individuals using 399 this computer system without authority or in the excess of their authority 400 are subject to having all their activities on this system monitored and 401 recorded by system personnel. In the course of monitoring individuals 402 improperly using this system or in the course of system maintenance, the 403 activities of authorized user may also be monitored. Anyone using this 404 system expressly consents to such monitoring and is advised that if such 405 monitoring reveals possible evidence of illegal activity or violation of 406 University regulations system personnel may provide the evidence of such 407 monitoring to University authorities and/or law enforcement officials. 408 </p></blockquote> 409 410 <p> 411 This is an interesting approach to the Fourth Amendment: pressure most 412 everyone to agree, in advance, to waive their rights under it.</p> 413 </div> 414 </li> 415 </ul> 416 <div class="column-limit"></div> 417 </div> 418 419 <div id="BadNews"> 420 <h3>Bad News</h3> 421 422 <p class="reduced-width"> 423 The battle for the right to read is going against us so far. 424 The enemy is organized, and we are not. 425 </p> 426 427 <div class="columns"> 428 <p>Today's commercial 429 e-books <a href="/philosophy/the-danger-of-ebooks.html"> abolish 430 readers' traditional freedoms</a>. Amazon's e-book reader product, 431 which I call the “<a 432 href="/philosophy/why-call-it-the-swindle.html">Amazon 433 Swindle</a>” because it's designed to 434 swindle readers out of the traditional freedoms of readers of books, 435 is run by software with several 436 demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian 437 functionalities</a>. Any one of them calls for rejecting the product 438 completely:</p> 439 440 <ul class="no-bullet"> 441 <li><p>It spies on everything the user does: it reports which book the 442 user is reading, and which page, and it reports when the user highlights 443 text, and any notes the user enters.</p></li> 444 445 <li><p>It has DRM, which is intended to block users from 446 sharing copies.</p></li> 447 448 <li><p>It has a back door with which Amazon can remotely erase any book. 449 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li> 450 451 <li><p class="inline-block">In case all that isn't Orwellian enough, there is a universal 452 back door with which Amazon can remotely change the software, and 453 introduce any other form of nastiness.</p></li> 454 </ul> 455 456 <p>Amazon's e-book distribution is oppressive, too. It identifies the 457 user and records what books the user obtains. It also requires users 458 to agree to an antisocial contract that they won't share copies with 459 others. My conscience tells me that, if I had agreed to such a 460 contract, the lesser evil would be to defy it and share copies anyway; 461 however, to be entirely good, I should not agree to it in the first 462 place. Therefore, I refuse to agree to such contracts, whether for 463 software, for e-books, for music, or for anything else.</p> 464 465 <p class="emph-box"> 466 If we want to stop the bad news and create some good news, we need 467 to organize and fight. Subscribe to the 468 FSF's <a href="https://www.defectivebydesign.org/"> Defective by Design</a> 469 campaign to lend a hand. You 470 can <a href="https://www.fsf.org/associate">join the FSF</a> to support 471 our work more generally. There is also a <a href="/help/help.html">list of ways 472 to participate in our work</a>. 473 </p> 474 </div> 475 </div> 476 <div class="column-limit"></div> 477 478 <h3 class="footnote">References</h3> 479 480 <ul> 481 <li>The administration's “White Paper”: Information 482 Infrastructure Task Force, Intellectual Property [<a 483 href="/philosophy/not-ipr.html">sic</a>] and the 484 National Information Infrastructure: The Report of the Working 485 Group on Intellectual Property [sic] Rights (1995).</li> 486 487 <li><a href="https://www.wired.com/1996/01/white-paper/">An 488 explanation of the White Paper: 489 The Copyright Grab</a>, Pamela Samuelson, <cite>Wired</cite>, 490 January 1st, 1996.</li> 491 492 <li><a href="https://law.duke.edu/boylesite/sold_out.htm">Sold Out</a>, 493 James Boyle, <cite>New York Times</cite>, March 31, 1996.</li> 494 495 <li><a href="https://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public Data or Private Data</a>, 496 Dave Farber, <cite>Washington Post</cite>, November 4, 1996.</li> 497 498 <li><a href="https://web.archive.org/web/20151113122141/http://public-domain.org/">Union for the Public 499 Domain</a>—an organization which aims to resist and 500 reverse the overextension of copyright and patent powers.</li> 501 </ul> 502 503 <div class="infobox extra" role="complementary"> 504 <hr /> 505 <p>This article appeared in the February 1997 issue of <cite>Communications 506 of the ACM</cite> (Volume 40, Number 2).</p> 507 </div> 508 509 <div class="edu-note c"><p id="fsfs">This essay is published in 510 <a href="https://shop.fsf.org/product/free-software-free-society/"><cite>Free 511 Software, Free Society: The Selected Essays of Richard 512 M. Stallman</cite></a>.</p></div> 513 </div> 514 515 </div><!-- for id="content", starts in the include above --> 516 <!--#include virtual="/server/footer.html" --> 517 <div id="footer" role="contentinfo"> 518 <div class="unprintable"> 519 520 <p>Please send general FSF & GNU inquiries to 521 <a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>. 522 There are also <a href="/contact/">other ways to contact</a> 523 the FSF. Broken links and other corrections or suggestions can be sent 524 to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p> 525 526 <p><!-- TRANSLATORS: Ignore the original text in this paragraph, 527 replace it with the translation of these two: 528 529 We work hard and do our best to provide accurate, good quality 530 translations. However, we are not exempt from imperfection. 531 Please send your comments and general suggestions in this regard 532 to <a href="mailto:web-translators@gnu.org"> 533 <web-translators@gnu.org></a>.</p> 534 535 <p>For information on coordinating and contributing translations of 536 our web pages, see <a 537 href="/server/standards/README.translations.html">Translations 538 README</a>. --> 539 Please see the <a 540 href="/server/standards/README.translations.html">Translations 541 README</a> for information on coordinating and contributing translations 542 of this article.</p> 543 </div> 544 545 <!-- Regarding copyright, in general, standalone pages (as opposed to 546 files generated as part of manuals) on the GNU web server should 547 be under CC BY-ND 4.0. Please do NOT change or remove this 548 without talking with the webmasters or licensing team first. 549 Please make sure the copyright date is consistent with the 550 document. For web pages, it is ok to list just the latest year the 551 document was modified, or published. 552 553 If you wish to list earlier years, that is ok too. 554 Either "2001, 2002, 2003" or "2001-2003" are ok for specifying 555 years, as long as each year in the range is in fact a copyrightable 556 year, i.e., a year in which the document was published (including 557 being publicly visible on the web or in a revision control system). 558 559 There is more detail about copyright years in the GNU Maintainers 560 Information document, www.gnu.org/prep/maintain. --> 561 562 <p>Copyright © 1996, 2002, 2007, 2009, 2012, 2014, 2016, 2021 563 Richard Stallman</p> 564 565 <p>This page is licensed under a <a rel="license" 566 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative 567 Commons Attribution-NoDerivatives 4.0 International License</a>.</p> 568 569 <!--#include virtual="/server/bottom-notes.html" --> 570 571 <p class="unprintable">Updated: 572 <!-- timestamp start --> 573 $Date: 2021/12/27 16:59:10 $ 574 <!-- timestamp end --> 575 </p> 576 </div> 577 </div><!-- for class="inner", starts in the banner include --> 578 </body> 579 </html>