Tech Law Journal Daily E-Mail Alert
July 26, 2002, 9:00 AM ET, Alert No. 478.
TLJ Home Page | Calendar | Subscribe | Back Issues
Rep. Berman Introduces Bill to Legalize Self Help Technologies to Disable P2P Piracy
7/25. Rep. Howard Berman (D-CA) introduced a bill that would permit copyright owners to employ self help technologies when their copyrighted works are infringed on peer to peer (P2P) networks. The bill is intended to enable the music and movie industries to legally engage in interdiction, decoys, redirection, file blocking, spoofs, or other technological tools, to prevent P2P piracy. See, text of bill [HTML], text of bill [PDF], and Rep. Berman's section by section summary.
Rep. Berman is the ranking Democrat on the House Judiciary Committee's Subcommittee on Court, the Internet and Intellectual Property. He also represents a Los Angeles area district. The bill's initial cosponsors are Rep. Howard Coble (R-NC), the Chairman of the Subcommittee, Rep. Lamar Smith (R-TX), and Rep. Robert Wexler (D-FL).
The bill would add a new Section 514 to Chapter 5 (pertaining to copyright infringement and its remedies) of Title 17 (the Copyright Act).
The bill provides, in its subsection (a), that "Notwithstanding any State or Federal statute or other law,  ... a copyright owner shall not be liable in any criminal or civil action for disabling, interfering with, blocking, diverting, or otherwise impairing the unauthorized distribution, display, performance, or reproduction of his or her copyrighted work on a publicly accessible peer-to-peer file trading network, if such impairment does not, without authorization, alter, delete, or otherwise impair the integrity of any computer file or data residing on the computer of a file trader."
To qualify for this immunity, the copyright owner must notify the Department of Justice (DOJ) "of the specific technologies the copyright owner intends to use to impair the unauthorized distribution, display, performance, or reproduction". However, such information is exempt from release under the Freedom of Information Act (FOIA), 5 U.S.C. § 552.
There is no requirement that the copyright owner provide advance notice to its target that it will employ self help technologies against it. Nor must the copyright owner notify its target afterwards. The bill does provide that "At the request of an affected file trader ... a copyright owner shall provide notice to the affected file trader or assignee ..." However, since the bill defines copyright owner as the owner of "an exclusive right under section 106 and any party authorized to act on the owner's behalf" the target may not know whom to request for information.
The bill provides for a very limited cause of action against a copyright owner who engages in self help remedies described by the bill. The bill provides, in subsection (d),  that "If ... a copyright owner knowingly and intentionally impairs the distribution, display, performance, or reproduction of a particular computer file or data, and has no reasonable basis to believe that such distribution, display, performance, or reproduction constitutes an infringement of copyright, and an affected file trader suffers economic loss in excess of $250 as a result of the act by the copyright owner, the affected file trader may seek compensation for such economic loss ..."
This subsection of the bill provides no injunctive remedy. The bill further defines "economic loss" as "monetary costs only". Before bringing suit, the affected file trader must first file an administrative complaint with the DOJ, and comply with its requirements. Moreover, the act of engaging in self help technologies to interfere with file trading alone cannot serve as the basis a legal action; the bill provides that "The cause of action established by this subsection shall only be available as a remedy against impairing actions that would not be lawful but for subsection (a)."
Rep. Berman explained his bill in a floor statement. He said that "the primary current application of P2P networks is unbridled copyright piracy. P2P downloads today consist largely of copyrighted music, and as download speeds improve, there has been a marked increase in P2P downloads of copyrighted software, games, photographs, karaoke tapes, and movies."
Rep. Berman also stated that "The massive scale of P2P piracy and its growing breadth represents a direct threat to the livelihoods of U.S. copyright creators, including songwriters, recording artists, musicians, directors, photographers, graphic artists, journalists, novelists, and software programmers. It also threatens the survival of the industries in which these creators work, and the seamstresses, actors, Foley artists, carpenters, cameramen, administrative assistants, and sound engineers these industries employ. As these creators and their industries contribute greatly both to the cultural and economic vitality of the U.S., their livelihoods and survival must be protected."
The bill does not address what technological measures are permissible. However, Rep. Berman commented on this subject. He said that "Technological innovation, as represented by the creation of P2P networks and their subsequent decentralization, has been harnessed to facilitate massive P2P piracy. It is worth exploring, therefore, whether other technological innovations could be harnessed to combat this massive P2P piracy problem. Copyright owners could, at least conceptually, employ a variety of technological tools to prevent the illegal distribution of copyrighted works over a P2P network. Using interdiction, decoys, redirection, file blocking, spoofs, or other technological tools, technology can help prevent P2P piracy."
Rep. Berman argued that this legislation is made necessary because "technological self-help measures may not be legal due to a variety of state and federal statutes, including the Computer Fraud and Abuse Act of 1986.  In other words, while P2P technology is free to innovate new, more efficient methods of P2P distribution that further exacerbate the piracy problem, copyright owners are not equally free to craft technological responses to P2P piracy." See also, Berman release.
News Analysis: The Berman Bill
7/25. Rep. Howard Berman's (D-CA) bill to permit copyright owners to employ self help technologies when their copyrighted works are infringed on peer to peer (P2P) networks is clearly intended to enable the music and movie industries to shut down the sorts of rampant copying that the Court in the Napster case found to constitute infringement. However, the bill is written with language broad enough to encompass a variety of other scenarios. The bill also provides the party engaging in self help remedies with wide discretion, and offers the target of the self help remedies very little recourse if self help remedies are abused.
While Rep. Berman referred to films, music recordings, photographs, and karaoke tapes in his floor statement, there is nothing in the bill that restricts the right of self help to infringement of copyrights in these media. For example, other content may be made available on a peer to peer network, such as political expression, religious discourse, educational materials, social commentary, and news coverage. These also may be subject to claims of copyright. And hence, P2P trading of these could be interfered with by the self help remedies legalized under this bill.
Also, while Rep. Berman referred to the "massive scale of P2P piracy" by networks such as Napster, the Berman bill provides a very minimal definition of what constitutes a peer to peer network. It could be something as small as two networked computers running file transfer software that are publicly accessible.
Moreover, while Rep. Berman referred to loss of compensation by copyright holders as a result of P2P piracy, there is nothing in the bill that restricts this right of self help to copyright holders who have lost compensation. That is, the right of self help could be exercised by a copyright holder to stop the dissemination of content that the copyright owner has not sold, and does not intend to sell. Hence, the self help technologies legalized by this bill could be used to prevent the dissemination of expression, rather than to prevent economic loss. Ford Motor Company, The Church of Jesus Christ of Latter Day Saints, or government entities might exercise the right of self help created by the Berman bill to suppress criticism.
Next, while the Berman bill provides for a private right of action for wrongful interference, in subsection (d), it is a very limited right of action. The bill requires that the party engaging in self help technological remedies must be a copyright owner, and have a "reasonable basis to believe" that there is an infringement, in order to avoid being held liable for wrongful conduct. Notably, many things that are required to prevail in a copyright infringement action, or to obtain certain remedies in infringement actions, are not required to obtain immunity from liability under this bill.
For example, there is no requirement of registration of copyright.
Second, negligent or unintentional interference is not actionable under the private right of action provided for in the bill. The Berman bill requires that the "copyright owner knowingly and intentionally impairs the distribution" to be held liable under subsection (d).
Third, there is no requirement of actual infringement to avoid liability. The "copyright owner" need only own one of the six exclusive rights of copyright, and have a "reasonable basis to believe" that there is an infringement. The "reasonable basis to believe" standard is a very low threshold.
Furthermore, the "reasonable reason to believe" test would appear to eliminate or weaken defenses to infringement available in a suit for infringement. At least, one might expect the parties engaging in self help remedies to assert that it does. For example, notwithstanding infringement of an exclusive right of copyright under Section 106, there are the rights of fair use (Section 107), rights of libraries (Section 108), and rights of teachers (Section 110). In a legal action for infringement, a defendant may raise any of these, and the court would engage in an analysis of the requirements of these sections.
However, under the Berman proposal, in an action against a party engaging in self help remedies, the "reasonable basis to believe" standard might displace an analysis under Sections 107, 108 or 110. For example, the self help party might argue that it can avoid Section 110 consequences by asserting, "I did not know that the computer I hacked was being used by an educational institutional for distance learning purposes." Likewise, the self help party might argue that Section 107 analysis is irrelevant, provided that it had a "reasonable basis to believe" that infringement occurred. Similarly, the defenses of fraud on the Copyright Office, misuse of copyright, limitations, laches, estoppel, and unclean hands might not be available.
It is perhaps also notable that the Berman bill, which adds a new section to the Copyright Act, defines "copyright owner". The Copyright Act already defines this term, at Section 101. The two definitions are different. The Berman bill states that "the term 'copyright owner' means a legal or beneficial owner of an exclusive right under section 106 and any party authorized to act on the owner's behalf." The Copyright Act states that a " ``Copyright owner´´, with respect to any one of the exclusive rights comprised in copyright, refers to the owner of that particular right."
The difference may be substantial. There are six enumerated exclusive rights of copyright in Section 106. Under the Berman bill, anyone who holds any exclusive right in a copyrighted work is a copyright owner, and can exercise the self help remedies against anyone who has infringed the copyrighted work. The infringement need not be of the exclusive right owned by the party engaging in self help. Also, under the Berman bill, an agent of a copyright owner could employ the actual self help remedies. Both of these characteristics would make it difficult for the target of the interference to know who is employing the interference.
The bill also provides for no effective notice to the party whose computer is interfered with, either before or after the interference. The copyright owner must give the Department of Justice advance notice, but this information is confidential. The copyright owner must give its target notice, but only if the target first asks for notice. But then, anyone who is able to ask for notice, does not need notice. Some parties who have been subjected to wrongful self help technological measures may find it difficult simply to establish whom to sue.
Finally, if a victim of interference succeeds in bringing and prevailing in an action against someone who has wrongfully interfered with his computer, the bill limits damages to "monetary costs only". The bill also does not list injunctive relief as an available remedy.
Edelman Sues N2H2
7/25. Benjamin Edelman filed a complaint [PDF] in U.S. District Court (DMass) against N2H2, Inc. seeking various declaratory and injunctive relief pertaining to copyright law.
This is essentially a policy oriented law suit brought by Edelman, and his ACLU attorneys, seeking broad declarations from the court that would have the effect of altering various aspects of copyright law, including the Digital Millennium Copyright Act (DMCA). They seek new and novel applications of the First Amendment and fair use. They also seek to generally make life miserable for the companies that make blocking software, and the schools and libraries that use this software.
Edelman is a first year law student at Harvard Law School, and a Technology Analyst at the Berkman Center for Internet and Society. He does research on Internet blocking programs, such as those made by N2H2. He is concerned about the erroneous over blocking of web sites. N2H2 encrypts its block lists; so he seeks to decrypt them, and then disseminate them.
He is represented by the ACLU. The attorneys listed on the complaint are Ann Beeson, Christopher Hansen, Kevin Bankston, and Sarah Wunsch. Beeson and Hansen have long been active in policy oriented litigation directed against the use blocking software by schools and libraries.
N2H2 makes software products that enable the blocking of web sites based upon certain criteria. Its product named Bess is sold to schools and libraries. Its product named Sentian is sold to businesses and government. These programs employ lists of web site URLs, based upon type of content, that can be blocked. There are block lists, for example, for pormography and gambling.
N2H2 states in its web site that it is a "a global Internet content filtering company. N2H2 software helps customers control, manage and understand their Internet use by filtering Web content, monitoring Internet access and delivering concise reports on user activity. These safeguards enable organizations of any size to limit potential legal liability, increase user productivity and optimize network bandwidth. N2H2's Bess and Sentian product lines are powered by N2H2's premium quality filtering database -- a list consistently recognized by independent and respected third-parties as the most effective in the industry."
The complaint states that "N2H2 refused Mr. Edelman's direct request for a copy of the block list. Thus, in order to conduct his research, Mr. Edelman must ``reverse engineer´´ N2H2's blocking program. ``Reverse engineering´´ is a process used to gain access to the functional elements of a software program in order to learn how it works." The complaint further states that his research will "consist of five primary steps: (1) reverse engineering a licensed copy of the blocking program in order to discover what measures prevent access to and copying of the block list; (2) creating and using a software tool (``the circumvention tool´´) to circumvent those measures and access the block list; (3) analyzing the block list to determine its accuracy; (4) publishing the results of his analysis and the block list; and (5) distributing his circumvention tool to facilitate other fair and non- infringing uses of the block list."
The complaint also states that "Using information derived through reverse engineering, Mr. Edelman intends to create a software tool to circumvent the block list’s protection measures. The sole function of this circumvention tool, when executed, will be to interoperate with the N2H2 blocking program in an attempt to circumvent the measures preventing access to and copying of the encrypted block list." Then, "After using his circumvention tool to create a readable copy of the block list, Mr. Edelman intends to use a variety of manual and automated systems to identify URLs on the list that have been miscategorized and therefore erroneously blocked by the program." Finally, the complaint states that he intends to publish analyzes of erroneous web site blocking by N2H2, publish N2H2's block lists, and disseminate his circumvention tool.
However, Edelman goes on to assert that N2H2 holds copyrights on its programs, and claims trade secrets. He asserts that he fears that his research could violate software license terms, the DMCA, and trade secrets, unless the Court declares that his planned research activities are protected by the free speech clause of the First Amendment, the fair use doctrine, and other legal theories.
The DMCA, 17 U.S.C. § 1201,  was enacted by the Congress in 1998. It provides at § 1201(a)(1) that "No person shall circumvent a technological measure that effectively controls access to a work protected under this title." It further provides at § 1201(a)(2) that "No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title."
Edelman seeks a wide range of declaratory relief. For example, he claims that "proposed circumvention of the access and/or copy control of N2H2's block list does not violate 17 U.S.C. § 1201(a)(1)" of the DMCA because it is protected fair use. He also claims that his "proposed creation and distribution of a software tool, for the purposes of achieving the circumvention ... does not violate 17 U.S.C. § 1201(a)(2) or 17 U.S.C. § 1201(b) of the DMCA, because" it is fair use, it enables the public to make fair use of the block lists, and because the tool will be capable of substantial non-infringing uses.
He also seeks a declaration that his actions would not violate N2H2's software license, on several grounds, including preemption by federal copyright law, unconscionability, misuse of copyright, and enforcement would be contrary to public policy.
He also seeks a declaration that he would not be liable for direct copyright infringement for any intermediate copying of the N2H2 program or the N2H2 block list because such copying is constitutionally protected by the First Amendment and or constitutes a fair use. See also, ACLU release.
People and Appointments
7/25. President Bush nominated Jeffrey White to be a Judge of the U.S. District Court (NDCal). White is a partner in the San Francisco office of Orrick Herrington & Sutcliffe. He is a litigator who focuses on employment trials, fraud, white collar crime, SEC investigations, antitrust, and other issues. He has represented Siebel Systems, Oracle and Lucent. See, White House release.
7/25. President Bush nominated Sandra Feuerstein to be a Judge of the U.S. District Court (EDNY). See, White House release.
7/25. President Bush nominated Kent Jordan to be a Judge of the U.S. District Court (DDel). See, White House release.
7/25. The Senate Banking Committee approved the nominations of Paul Atkins, Harvey Goldschmid, Cynthia Glassman, and Roel Campos to be a members of the Securities and Exchange Commission (SEC) on Thursday morning, July 25. The full Senate approved their nominations Thursday evening.
Reaction to the Berman Bill
7/25. Rep. Howard Berman's (D-CA) bill to permit copyright owners to employ self help technologies when their copyrighted works are infringed on peer to peer (P2P) networks has drawn praise from some groups representing copyright owners, but harsh criticism from some others.
Hilary Rosen, Ch/CEO of the Recording Industry Association of America (RIAA), praised the Rep. Berman's bill in a release. She said that "We applaud Congressman Berman for introducing bipartisan legislation that takes an innovative approach to combating the serious problem of Internet piracy. Online piracy undermines the growth of legitimate music sites and hurts all consumers in the long run -- every dollar lost to piracy is a dollar that cannot be invested in the fresh, new artists we have all come to expect and enjoy."
Rosen continued that "The current landscape for online music is dangerously one-sided, with the peer-to-peer pirates enjoying an unfair advantage. It makes sense to clarify existing laws to ensure that copyright owners -- those who actually take the time and effort to create an artistic work -- are at least able to defend their works from mass piracy. We look forward to working with Congressman Berman, Chairman Coble and other members of Congress on this important initiative."
Similarly, Jonathan Zuck, P/CEO of the Association for Competitive Technology (ACT), wrote a letter to Rep. Berman and other leaders of the House Judiciary Committee expressing support for the bill. He wrote that "Piracy is a significant challenge for the digital media and IT industry and we applaud your effort to promote technological rather than regulatory solutions. I must qualify this support by pointing out that when crafting copyright legislation, we should maintain a dialogue to avoid untended consequences that could harm small IT companies."
In contrast, Ed Black, P/CEO of the Computer & Communications Industry Association (CCIA) said in a release that "We reject the premise of this bill that content owners should be entitled to ‘vigilante justice’ for suspected copyright violations ... Hollywood moguls have long railed against illicit tampering with their protected content by ‘hackers’ and ‘Internet pirates.’ Now the Hollywood studios and the recording industry seek statutory authority for their own hacking, spoofing, and virus attacks, with the capability to shut down many Internet websites and services at their discretion."
"The breadth of the safe harbor provisions, combined with the severe limitations on suits by aggrieved parties, are really tantamount to license for content owners to strike wherever they see fit ... Our industry has recently experienced a rapid rise in cyber-attacks against our networks and secure systems, and the last thing we need is to create a protected group of hackers. No other industry has been deputized to prosecute its own enforcement actions, and we see no compelling reason to provide this enormous grant of power to Hollywood."
House Begins Consideration of Homeland Security Bill
7/25. The House began its consideration of HR 5005, the Homeland Security Act of 2002, a bill to create a new Department of Homeland Security. The House is scheduled to complete its consideration of the bill on Friday, July 26.
On July 24, the House Rules Committee adopted a rule for consideration of the bill that allows certain enumerated amendments to be offered. The full House approved this rule Thursday evening, July 25.
The House also agreed late on July 25 to the Cox Amendment [PDF], which provides specific examples of the types of critical cyber security infrastructure which the Undersecretary for Information Analysis and Infrastructure Protection must develop a plan to protect, the Israel Amendment [PDF], which establishes within the Department a Homeland Security Science and Technology Advisory Committee, and the Woolsey Amendment [PDF], which adds a new section to the bill creating a Homeland Security Institute as a federally funded research and development center.
See, Rules Committee summary of amendments that are in order. See also, texts of all amendments in PDF: Oberstar Costello Roemer Amendment, Young Amendment, Waxman Amendment, Cox Amendment, Israel Amendment, Rivers Amendment, Woolsey Amendment, Cardin Amendment, Hunter Amendment, Ose Amendment, Velazquez Issa Wilson Amendment, Hastings AmendmentKingston Amendment, Rogers Amendment, Rush Amendment, Shays Watson Amendment, Shays Amendment, Morella Amendment, Quinn Amendment, Waxman Frost Amendment, Armey Amendment, Turner AmendmentOberstar Menendez Amendment, Schakowsky Kucinich Mink Amendment, Tom Davis Amendment (which expands the existing FOIA exemption in the bill to other federal agencies as the Secretary of Homeland Security determines as appropriate), Chambliss Harman Shays Menendez Amendment, and Weldon Amendment.
Friday, July 26
The House will meet to resume consideration of HR 5005, the Homeland Security Act of 2002.
10:00 AM. The House Commerce Committee's Subcommittee on Commerce, Trade, and Consumer Protection will hold a hearing titled "Oath Taking, Truth Telling, and Remedies in the Business World". See, notice. Press contact: Ken Johnson or Jon Tripp at 202 225-5735. Location: Room 2123, Rayburn Building.
Deadline to submit reply comments to the FCC regarding its Declaratory Ruling and Second Further Notice of Proposed Rulemaking clarifying that providers of Internet protocol telecommunications relay services are eligible for reimbursement from the Interstate TRS Fund. See, FCC notice [PDF].
Monday, July 29
9:00 AM - 5:00 PM. Day one of a two day meeting of the Federal Accounting Standards Advisory Board (FASAB). RSVP by July 22 by calling 202 512-7350. See, notice in Federal Register. Location: Room 5N30, GAO Building.
1:30 - 3:30 PM. The FCC's WRC-03 Advisory Committee, Informal Working Group 7: Regulatory Issues and Future Agendas, will hold a meeting. See, notice [PDF]. Location: The Boeing Company, 1200 Wilson Blvd., Arlington, VA.
Deadline to submit comments to the FCC's regarding its Annual Assessment of the Status of Competition in the Market for the Delivery of Video Programming. See, notice in Federal Register.
Tuesday, July 30
8:30 AM - 12:00 NOON. The Information Technology Association of America (ITAA) and the Center for Strategic and International Studies (CSIS) will host a conference titled "Wireless Security: Challenges and Solutions". Richard Clarke, Special Advisor to the President for Cyberspace Security, will give the keynote address at 8:50 AM. See, notice and agenda. RSVP by July 26, 2002 to kwoolley @itaa.org or 703 284-5323. Location: CSIS, 1800 K Street, NW.
9:00 AM - 5:00 PM. Day two of a two day meeting of the Federal Accounting Standards Advisory Board (FASAB). RSVP by July 22 by calling 202 512-7350. See, notice in Federal Register. Location: Room 5N30, GAO Building.
9:30 AM. The Senate Commerce Committee will hold a hearing "to examine finances in the telecommunications marketplace, focusing on maintaining the operations of essential communications facilities". Press contact: Andy Davis at 202 224-6654. Location: Room 253, Russell Building.
10:00 AM - 12:00 NOON. The State Department's International Telecommunication Advisory Committee (ITAC) will meet. See, notice in Federal Register. Location: Room 5533, State Department.
1:30 - 4:30 PM. The U.S. Trade Representative's Industry Sector Advisory Committee on Services (ISAC-13) will hold a meeting. The meeting will be open from 1:30 until 2:10. The remainder of the meeting is closed. See, notice in Federal Register. Location: Room 6087B, Department of Commerce, 14th Street and Constitution Ave., NW.
Wednesday, July 31
10:00 AM. The Senate Judiciary Committee will hold a hearing to examine class action litigation issues. Press contact: Mimi Devlin at 202 224-9437. Location: Room 226, Dirksen Building.
11:30 AM - 12:30 PM. The U.S. Chamber of Commerce will host a luncheon titled "The President's Homeland Security Strategy: Implications for Business". The speaker will be Tom Ridge. The price to attend is $55 for members and $95 for non-members. See, notice. Location: 1615 H Street, NW.
12:30 PM. Sen. Max Baucus (D-MT) will give a luncheon speech. Location: Ballroom, National Press Club, 529 14th St. NW, 13th Floor.
Second of three deadlines to submit proposals to the National Institute of Standards and Technology (NIST) for FY 2002 Advanced Technology Program (ATP) funds. See, notice in Federal Register, April 18, 2002, Vol. 67, No. 75, at Pages 19160 - 19164.
Thursday, August 1
9:00 AM - 3:00 PM. The Federal Communications Commission's (FCC) Spectrum Policy Task Force will hold a public workshop titled "Experimental Licenses and Unlicensed Spectrum". See, FCC notice [PDF]. Webcast. Location: FCC, Commission Meeting Room, 445 12th Street, SW.

2:00 PM. The Senate Judiciary Committee will hold a hearing on pending judicial nominations. Press contact: Mimi Devlin at 202 224-9437. Location: Room 226, Dirksen Building.


Deadline to submit comments to the Federal Communications Commission (FCC) regarding Qwest Communications' Section 271 application for authorization to provide in region interLATA service in the states of Montana, Utah, Washington and Wyoming. See, FCC public notice [PDF]. This is WC Docket No. 02-189.

Friday, August 2
9:00 AM - 3:00 PM. The FCC's Spectrum Policy Task Force will hold a public workshop titled "Interference Protection". See, FCC notice [PDF]. Webcast. Location: FCC, Commission Meeting Room, 445 12th Street, SW.
Deadline to submit comments to the Federal Communications Commission (FCC) in response to its request for comments on the draft of its revised strategic plan for 2003-2008. See, FCC notice [PDF].
Deadline to submit comments to the FCC in response to its request for comments on the FCC's Office of Plans and Policy's (OPP) Working Paper No. 35 [PDF], titled "Horizontal Concentration in the Cable Television Industry: An Experimental Analysis" authored by Mark Bykowsky, Anthony Kwasnica and William Sharkey. See, Public Notice [PDF].
Bush Makes Judicial Appointments a Campaign Issue
7/25. President Bush gave a speech at an Elizabeth Dole for Senate dinner in Greensboro, North Carolina. He argued that judicial appointments is a reason why voters should elect Republican Senators, and thus return control of the Senate to the Republicans.
He said this. "You know else why I need Elizabeth Dole? I want my judges to get a fair hearing. I picked -- I nominated good people to serve on the bench, good, qualified, distinguished Americans -- like Terry Boyle. I put his name out there. I put his name out there 14 months ago, and he can't get a hearing. I nominated a fabulous woman from Texas named Pricilla Owen, a great jurist ranked at the highest rating by the ABA, ran twice statewide in Texas and won. And yet, when you listen to the rhetoric up there, it's all politics in Washington, D.C. They're not willing to give these judges their fair shake and a fair due. It's time to get the Senate in the hands of people who will approve the good jurists I send, so we can have a federal bench that will not -- that will strictly interpret the Constitution of the United States of America." 
About Tech Law Journal
Tech Law Journal publishes a free access web site and subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year. However, there are discounts for entities with multiple subscribers. Free one month trial subscriptions are available. Also, free subscriptions are available for law students, journalists, elected officials, and employees of the Congress, courts, and executive branch, and state officials. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert and news items are not published in the web site until one month after writing. See, subscription information page.

Contact: 202-364-8882; E-mail.
P.O. Box 4851, Washington DC, 20008.
Privacy Policy
Notices & Disclaimers
Copyright 1998 - 2002 David Carney, dba Tech Law Journal. All rights reserved.