6 Class 7: Code As Speech 6 Class 7: Code As Speech

6.1 Universal City Studios, Inc. v. Reimerdes 6.1 Universal City Studios, Inc. v. Reimerdes

111 F.Supp.2d 294 (2000)

UNIVERSAL CITY STUDIOS, INC., et al., Plaintiffs,
v.
Shawn C. REIMERDES, et al., Defendants.

No. 00 Civ. 0277 (LAK).

United States District Court, S.D. New York.

August 17, 2000.
As Amended September 6, 2000.

[295] [296] [297] [298] [299] [300] [301] [302] Leon P. Gold, Jon A. Baumgarten, Charles S. Sims, Scott P. Cooper, William M. Hart, Michael M. Mervis, Carla M. Miller, Proskauer Rose LLP, New York City, for Plaintiffs.

Martin Garbus, George E. Singleton, David Y. Atlas, Edward Hernstadt, Frankfurt, Garbus, Klein & Selz, P.C., New York City, for Defendants.

OPINION

KAPLAN, District Judge.

Plaintiffs, eight major United States motion picture studios, distribute many of their copyrighted motion pictures for home use on digital versatile disks ("DVDs"), which contain copies of the motion pictures in digital form. They protect those motion pictures from copying by using an encryption system called CSS. CSS-protected motion pictures on DVDs may be viewed only on players and computer drives equipped with licensed technology that permits the devices to decrypt and play — but not to copy — the films.

Late last year, computer hackers devised a computer program called DeCSS that circumvents the CSS protection system and allows CSS-protected motion pictures to be copied and played on devices that lack the licensed decryption technology. Defendants quickly posted DeCSS on their Internet web site, thus making it readily available to much of the world. Plaintiffs promptly brought this action under the Digital Millennium Copyright Act (the "DMCA")[1] to enjoin defendants from posting DeCSS and to prevent them from electronically "linking" their site to others that post DeCSS. Defendants responded with what they termed "electronic civil disobedience" — increasing their efforts to link their web site to a large number of [304] others that continue to make DeCSS available.

Defendants contend that their actions do not violate the DMCA and, in any case, that the DMCA, as applied to computer programs, or code, violates the First Amendment.[2] This is the Court's decision after trial, and the decision may be summarized in a nutshell.

Defendants argue first that the DMCA should not be construed to reach their conduct, principally because the DMCA, so applied, could prevent those who wish to gain access to technologically protected copyrighted works in order to make fair — that is, non-infringing — use of them from doing so. They argue that those who would make fair use of technologically protected copyrighted works need means, such as DeCSS, of circumventing access control measures not for piracy, but to make lawful use of those works.

Technological access control measures have the capacity to prevent fair uses of copyrighted works as well as foul. Hence, there is a potential tension between the use of such access control measures and fair use. Defendants are not the first to recognize that possibility. As the DMCA made its way through the legislative process, Congress was preoccupied with precisely this issue. Proponents of strong restrictions on circumvention of access control measures argued that they were essential if copyright holders were to make their works available in digital form because digital works otherwise could be pirated too easily. Opponents contended that strong anti-circumvention measures would extend the copyright monopoly inappropriately and prevent many fair uses of copyrighted material.

Congress struck a balance. The compromise it reached, depending upon future technological and commercial developments, may or may not prove ideal.[3] But the solution it enacted is clear. The potential tension to which defendants point does not absolve them of liability under the statute. There is no serious question that defendants' posting of DeCSS violates the DMCA.

Defendants' constitutional argument ultimately rests on two propositions — that computer code, regardless of its function, is "speech" entitled to maximum constitutional protection and that computer code therefore essentially is exempt from regulation by government. But their argument is baseless.

Computer code is expressive. To that extent, it is a matter of First Amendment concern. But computer code is not purely expressive any more than the assassination of a political figure is purely a political statement. Code causes computers to perform desired functions. Its expressive element no more immunizes its functional aspects from regulation than the expressive motives of an assassin immunize the assassin's action.

In an era in which the transmission of computer viruses — which, like DeCSS, are simply computer code and thus to some degree expressive — can disable systems upon which the nation depends and in which other computer code also is capable of inflicting other harm, society must be able to regulate the use and dissemination [305] of code in appropriate circumstances. The Constitution, after all, is a framework for building a just and democratic society. It is not a suicide pact.

I. The Genesis of the Controversy

As this case involves computers and technology with which many are unfamiliar, it is useful to begin by defining some of the vocabulary.

A. The Vocabulary of this Case

1. Computers and Operating Systems

A computer is "a digital information processing device .... consist[ing] of central processing components . . . and mass data storage .... certain peripheral input/output devices . . ., and an operating system." Personal computers ("PCs") are computers designed for use by one person at a time. "[M]ore powerful, more expensive computer systems known as `servers' . . . are designed to provide data, services, and functionality through a digital network to multiple users."[4]

An operating system is "a software program that controls the allocation and use of computer resources (such as central processing unit time, main memory space, disk space, and input/output channels). The operating system also supports the functions of software programs, called `applications,' that perform specific user-oriented tasks.... Because it supports applications while interacting more closely with the PC system's hardware, the operating system is said to serve as a `platform.'"[5]

Microsoft Windows ("Windows") is an operating system released by Microsoft Corp. It is the most widely used operating system for PCs in the United States, and its versions include Windows 95, Windows 98, Windows NT and Windows 2000.

Linux, which was and continues to be developed through the open source model of software development,[6] also is an operating system.[7] It can be run on a PC as an alternative to Windows, although the extent to which it is so used is limited.[8] Linux is more widely used on servers.[9]

2. Computer Code

"[C]omputers come down to one basic premise: They operate with a series of on and off switches, using two digits in the binary (base 2) number system — 0 (for off) and 1 (for on)."[10] All data and instructions input to or contained in computers therefore must be reduced the numerals 1 and 0.[11]

"The smallest unit of memory in a computer," a bit, "is a switch with a value of [306] 0(off) or 1(on)."[12] A group of eight bits is called a byte and represents a character — a letter or an integer.[13] A kilobyte ("K") is 1024 bytes, a megabyte ("MB") 1024 kilobytes, and a gigabyte ("GB") 1024 megabytes.[14]

Some highly skilled human beings can reduce data and instructions to strings of 1's and 0's and thus program computers to perform complex tasks by inputting commands and data in that form.[15] But it would be inconvenient, inefficient and, for most people, probably impossible to do so. In consequence, computer science has developed programming languages. These languages, like other written languages, employ symbols and syntax to convey meaning. The text of programs written in these languages is referred to as source code.[16] And whether directly or through the medium of another program,[17] the sets of instructions written in programming languages — the source code — ultimately are translated into machine "readable" strings of 1's and 0's, known in the computer world as object code, which typically are executable by the computer.[18]

The distinction between source and object code is not as crystal clear as first appears. Depending upon the programming language, source code may contain many 1's and 0's and look a lot like object code or may contain many instructions derived from spoken human language. Programming languages the source code for which approaches object code are referred to as low level source code while those that are more similar to spoken language are referred to as high level source code.

All code is human readable. As source code is closer to human language than is object code, it tends to be comprehended more easily by humans than object code.

3. The Internet and the World Wide Web

The Internet is "a global electronic network, consisting of smaller, interconnected networks, which allows millions of computers to exchange information over telephone wires, dedicated data cables, and wireless links. The Internet links PCs by means of servers, which run specialized operating systems and applications designed for servicing a network environment."[19]

Internet Relay Chat ("IRC") is a system that enables individuals connected to the Internet to participate in live typed discussions.[20] Participation in an IRC discussion requires an IRC software program, which sends messages via the Internet to the IRC server, which in turn broadcasts the messages to all participants. The IRC [307] system is capable of supporting many separate discussions at once.

The World Wide Web (the "Web") is "a massive collection of digital information resources stored on servers throughout the Internet. These resources are typically provided in the form of hypertext documents, commonly referred to as `Web pages,' that may incorporate any combination of text, graphics, audio and video content, software programs, and other data. A user of a computer connected to the Internet can publish a page on the Web simply by copying it into a specially designated, publicly accessible directory on a Web server. Some Web resources are in the form of applications that provide functionality through a user's PC system but actually execute on a server."[21]

A web site is "a collection of Web pages [published on the Web by an individual or organization] .... Most Web pages are in the form of `hypertext'; that is, they contain annotated references, or `hyperlinks,' to other Web pages. Hyperlinks can be used as cross-references within a single document, between documents on the same site, or between documents on different sites."[22]

A home page is "one page on each Web site ... [that typically serves as] the first access point to the site. The home page is usually a hypertext document that presents an overview of the site and hyperlinks to the other pages comprising the site."[23]

A Web client is "software that, when running on a computer connected to the Internet, sends information to and receives information from Web servers throughout the Internet. Web clients and servers transfer data using a standard known as the Hypertext Transfer Protocol (`HTTP'). A `Web browser' is a type of Web client that enables a user to select, retrieve, and perceive resources on the Web. In particular, Web browsers provide a way for a user to view hypertext documents and follow the hyperlinks that connect them, typically by moving the cursor over a link and depressing the mouse button."[24]

4. Portable Storage Media

Digital files may be stored on several different kinds of storage media, some of which are readily transportable. Perhaps the most familiar of these are so called floppy disks or "floppies," which now are 3½ inch magnetic disks upon which digital files may be recorded.[25] For present purposes, however, we are concerned principally with two more recent developments, CD-ROMs and digital versatile disks, or DVDs.

A CD-ROM is a five-inch wide optical disk capable of storing approximately 650 MB of data. To read the data on a CD-ROM, a computer must have a CD-ROM drive.

DVDs are five-inch wide disks capable of storing more than 4.7 GB of data. In the application relevant here, they are used to hold full-length motion pictures in digital form. They are the latest technology for private home viewing of recorded motion pictures and result in drastically improved audio and visual clarity and quality of motion pictures shown on televisions or computer screens.[26]

[308] 5. The Technology Here at Issue

CSS, or Content Scramble System, is an access control and copy prevention system for DVDs developed by the motion picture companies, including plaintiffs.[27] It is an encryption-based system that requires the use of appropriately configured hardware such as a DVD player or a computer DVD drive to decrypt, unscramble and play back, but not copy, motion pictures on DVDs.[28] The technology necessary to configure DVD players and drives to play CSS-protected DVDs[29] has been licensed to hundreds of manufacturers in the United States and around the world.

DeCSS is a software utility, or computer program, that enables users to break the CSS copy protection system and hence to view DVDs on unlicensed players and make digital copies of DVD movies.[30] The quality of motion pictures decrypted by DeCSS is virtually identical to that of encrypted movies on DVD.[31]

DivX is a compression program available for download over the Internet.[32] It compresses video files in order to minimize required storage space, often to facilitate transfer over The Internet or other networks.[33]

B. Parties

Plaintiffs are eight major motion picture studios. Each is in the business of producing and distributing copyrighted material including motion pictures. Each distributes, either directly or through affiliates, copyrighted motion pictures on DVDs.[34] Plaintiffs produce and distribute a large majority of the motion pictures on DVDs on the market today.[35]

Defendant Eric Corley is viewed as a leader of the computer hacker community and goes by the name Emmanuel Goldstein, after the leader of the underground in George Orwell's classic, 1984.[36] He and his company, defendant 2600 Enterprises, Inc., together publish a magazine called 2600: The Hacker Quarterly, which Corley founded in 1984,[37] and which is something of a bible to the hacker community.[38] The name "2600" was derived from the fact that hackers in the 1960's found that the transmission of a 2600 hertz tone over a long distance trunk connection gained access to "operator mode" and allowed the user to explore aspects of the telephone system that were not otherwise accessible.[39] Mr. Corley chose the name because he regarded it as a "mystical thing,"[40] commemorating something that he evidently admired. Not surprisingly, 2600: The Hacker Quarterly has included articles on such topics as how to steal an Internet domain name,[41] access other people's e-mail,[42] intercept cellular phone calls,[43] and break into the computer systems [309] at Costco stores[44] and Federal Express.[45] One issue contains a guide to the federal criminal justice system for readers charged with computer hacking.[46] In addition, defendants operate a web site located at ("2600.com"), which is managed primarily by Mr. Corley and has been in existence since 1995.[47]

Prior to January 2000, when this action was commenced, defendants posted the source and object code for DeCSS on the 2600.com web site, from which they could be downloaded easily.[48] At that time, 2600.com contained also a list of links to other web sites purporting to post DeCSS.[49]

C. The Development of DVD and CSS

The major motion picture studios typically distribute films in a sequence of so-called windows, each window referring to a separate channel of distribution and thus to a separate source of revenue. The first window generally is theatrical release, distribution, and exhibition. Subsequently, films are distributed to airlines and hotels, then to the home market, then to pay television, cable and, eventually, free television broadcast. The home market is important to plaintiffs, as it represents a significant source of revenue.[50]

Motion pictures first were, and still are, distributed to the home market in the form of video cassette tapes. In the early 1990's, however, the major movie studios began to explore distribution to the home market in digital format, which offered substantially higher audio and visual quality and greater longevity than video cassette tapes.[51] This technology, which in 1995 became what is known today as DVD,[52] brought with it a new problem — increased risk of piracy by virtue of the fact that digital files, unlike the material on video cassettes, can be copied without degradation from generation to generation.[53] In consequence, the movie studios became concerned as the product neared market with the threat of DVD piracy.[54]

Discussions among the studios with the goal of organizing a unified response to the piracy threat began in earnest in late 1995 or early 1996.[55] They eventually came to include representatives of the consumer electronics and computer industries, as well as interested members of the public,[56] and focused on both legislative proposals and technological solutions.[57] In 1996, Matsushita Electric Industrial Co. ("MEI") and Toshiba Corp., presented — and the studios adopted — CSS.[58]

CSS involves encrypting, according to an encryption algorithm,[59] the digital [310] sound and graphics files on a DVD that together constitute a motion picture. A CSS-protected DVD can be decrypted by an appropriate decryption algorithm that employs a series of keys stored on the DVD and the DVD player. In consequence, only players and drives containing the appropriate keys are able to decrypt DVD files and thereby play movies stored on DVDs.

As the motion picture companies did not themselves develop CSS and, in any case, are not in the business of making DVD players and drives, the technology for making compliant devices, i.e., devices with CSS keys, had to be licensed to consumer electronics manufacturers.[60] In order to ensure that the decryption technology did not become generally available and that compliant devices could not be used to copy as well as merely to play CSS-protected movies, the technology is licensed subject to strict security requirements.[61] Moreover, manufacturers may not, consistent with their licenses, make equipment that would supply digital output that could be used in copying protected DVDs.[62] Licenses to manufacture compliant devices are granted on a royalty-free basis subject only to an administrative fee.[63] At the time of trial, licenses had been issued to numerous hardware and software manufacturers, including two companies that plan to release DVD players for computers running the Linux operating system.[64]

With CSS in place, the studios introduced DVDs on the consumer market in early 1997.[65] All or most of the motion pictures released on DVD were, and continue to be, encrypted with CSS technology.[66] Over 4,000 motion pictures now have been released in DVD format in the United States, and movies are being issued on DVD at the rate of over 40 new titles per month in addition to re-releases of classic films. Currently, more than five million households in the United States own DVD players,[67] and players are projected to be in ten percent of United States homes by the end of 2000.[68]

DVDs have proven not only popular, but lucrative for the studios. Revenue from their sale and rental currently accounts for a substantial percentage of the movie studios' revenue from the home video market.[69] Revenue from the home market, in [311] turn, makes up a large percentage of the studios' total distribution revenue.[70]

D. The Appearance of DeCSS

In late September 1999, Jon Johansen, a Norwegian subject then fifteen years of age, and two individuals he "met" under pseudonyms over the Internet, reverse engineered a licensed DVD player and discovered the CSS encryption algorithm and keys.[71] They used this information to create DeCSS, a program capable of decrypting or "ripping" encrypted DVDs, thereby allowing playback on non-compliant computers as well as the copying of decrypted files to computer hard drives.[72] Mr. Johansen then posted the executable code on his personal Internet web site and informed members of an Internet mailing list that he had done so.[73] Neither Mr. Johansen nor his collaborators obtained a license from the DVD CCA.[74]

Although Mr. Johansen testified at trial that he created DeCSS in order to make a DVD player that would operate on a computer running the Linux operating system,[75] DeCSS is a Windows executable file; that is, it can be executed only on computers running the Windows operating system.[76] Mr. Johansen explained the fact that he created a Windows rather than a Linux program by asserting that Linux, at the time he created DeCSS, did not support the file system used on DVDs.[77] Hence, it was necessary, he said, to decrypt the DVD on a Windows computer in order subsequently to play the decrypted files on a Linux machine.[78] Assuming that to be true,[79] however, the fact remains that Mr. Johansen created DeCSS in the full knowledge that it could be used on computers running Windows rather than Linux. Moreover, he was well aware that the files, once decrypted, could be copied like any other computer files.

In January 1999, Norwegian prosecutors filed charges against Mr. Johansen stemming from the development of DeCSS.[80] The disposition of the Norwegian case does not appear of record.

E. The Distribution of DeCSS

In the months following its initial appearance on Mr. Johansen's web site, DeCSS has become widely available on the Internet, where hundreds of sites now purport to offer the software for download.[81] A few other applications said to decrypt CSS-encrypted DVDs also have appeared on the Internet.[82]

[312] In November 1999, defendants' web site began to offer DeCSS for download.[83] It established also a list of links to several web sites that purportedly "mirrored" or offered DeCSS for download.[84] The links on defendants' mirror list fall into one of three categories. By clicking the mouse on one of these links, the user may be brought to a page on the linked-to site on which there appears a further link to the DeCSS software.[85] If the user then clicks on the DeCSS link, download of the software begins. This page may or may not contain content other than the DeCSS link.[86] Alternatively, the user may be brought to a page on the linked-to site that does not itself purport to link to DeCSS, but that links, either directly or via a series of other pages on the site, to another page on the site on which there appears a link to the DeCSS software.[87] Finally, the user may be brought directly to the DeCSS link on the linked-to site such that download of DeCSS begins immediately without further user intervention.[88]

F. The Preliminary Injunction and Defendants' Response

The movie studios, through the Internet investigations division of the Motion Picture Association of America ("MPAA"), became aware of the availability of DeCSS on the Internet in October 1999.[89] The industry responded by sending out a number of cease and desist letters to web site operators who posted the software, some of which removed it from their sites.[90] In January 2000, the studios filed this lawsuit against defendant Eric Corley and two others.[91]

After a hearing at which defendants presented no affidavits or evidentiary material, the Court granted plaintiffs' motion for a preliminary injunction barring defendants from posting DeCSS.[92] At the conclusion of the hearing, plaintiffs sought also to enjoin defendants from linking to other sites that posted DeCSS, but the Court declined to entertain the application at that time in view of plaintiffs' failure to raise the issue in their motion papers.[93]

Following the issuance of the preliminary injunction, defendants removed DeCSS from the 2600.com web site.[94] In what they termed an act of "electronic civil disobedience,"[95] however, they continued to support links to other web sites purporting to offer DeCSS for download, a list which had grown to nearly five hundred by July 2000.[96] Indeed, they carried a banner [313] saying "Stop the MPAA" and, in a reference to this lawsuit, proclaimed:

"We have to face the possibility that we could be forced into submission. For that reason it's especially important that as many of you as possible, all throughout the world, take a stand and mirror these files."[97]

Thus, defendants obviously hoped to frustrate plaintiffs' recourse to the judicial system by making effective relief difficult or impossible.

At least some of the links currently on defendants' mirror list lead the user to copies of DeCSS that, when downloaded and executed, successfully decrypt a motion picture on a CSS-encrypted DVD.[98]

G. Effects on Plaintiffs

The effect on plaintiffs of defendants' posting of DeCSS depends upon the ease with which DeCSS decrypts plaintiffs' copyrighted motion pictures, the quality of the resulting product, and the convenience with which decrypted copies may be transferred or transmitted.

As noted, DeCSS was available for download from defendants' web site and remains available from web sites on defendants' mirror list.[99] Downloading is simple and quick — plaintiffs' expert did it in seconds.[100] The program in fact decrypts at least some DVDs.[101] Although the process is computationally intensive, plaintiffs' expert decrypted a store-bought copy of Sleepless in Seattle in 20 to 45 minutes.[102] The copy is stored on the hard drive of the computer. The quality of the decrypted film is virtually identical to that of encrypted films on DVD.[103] The decrypted file can be copied like any other.[104]

The decryption of a CSS-protected DVD is only the beginning of the tale, as the decrypted file is very large — approximately 4.3 to 6 GB or more depending on the length of the film[105] — and thus extremely cumbersome to transfer or to store on portable storage media. One solution to this problem, however, is DivX, a compression utility available on the Internet that is promoted as a means of compressing decrypted motion picture files to manageable size.[106]

DivX is capable of compressing decrypted files constituting a feature length motion picture to approximately 650 MB at a compression ratio that involves little loss of quality.[107] While the compressed sound and graphic files then must be synchronized, a tedious process that took plaintiffs' expert between 10 and 20 hours,[108] the task is entirely feasible. Indeed, having compared a store-bought DVD with portions of a copy compressed and synchronized with DivX (which often are referred to as "DivX'd" motion pictures), the Court finds that the loss of quality, at least [314] in some cases, is imperceptible or so nearly imperceptible as to be of no importance to ordinary consumers.[109]

The fact that DeCSS-decrypted DVDs can be compressed satisfactorily to 650 MB is very important. A writeable CD-ROM can hold 650 MB.[110] Hence, it is entirely feasible to decrypt a DVD with DeCSS, compress and synchronize it with DivX, and then make as many copies as one wishes by burning the resulting files onto writeable CD-ROMs, which are sold blank for about one dollar apiece.[111] Indeed, even if one wished to use a lower compression ratio to improve quality, a film easily could be compressed to about 1.3 GB and burned onto two CD-ROMs. But the creation of pirated copies of copyrighted movies on writeable CD-ROMs, although significant, is not the principal focus of plaintiffs' concern, which is transmission of pirated copies over the Internet or other networks.

Network transmission of decrypted motion pictures raises somewhat more difficult issues because even 650 MB is a very large file that, depending upon the circumstances, may take a good deal of time to transmit. But there is tremendous variation in transmission times. Many home computers today have modems with a rated capacity of 56 kilobits per second. DSL lines, which increasingly are available to home and business users, offer transfer rates of 7 megabits per second.[112] Cable modems also offer increased bandwidth. Student rooms in many universities are equipped with network connections rated at 10 megabits per second.[113] Large institutions such as universities and major companies often have networks with backbones rated at 100 megabits per second.[114] While effective transmission times generally are much lower than rated maximum capacities in consequence of traffic volume and other considerations, there are many environments in which very high transmission rates may be achieved.[115] Hence, transmission times ranging from three[116] totwenty minutes[117] to six hours[118] or more for a feature length film are readily achievable, depending upon the users' precise circumstances.[119]

At trial, defendants repeated, as if it were a mantra, the refrain that plaintiffs, as they stipulated,[120] have no direct evidence of a specific occasion on which any person decrypted a copyrighted motion picture with DeCSS and transmitted it over the Internet. But that is unpersuasive. Plaintiffs' expert expended very little effort to find someone in an IRC chat room who exchanged a compressed, decrypted copy of The Matrix, one of plaintiffs' copyrighted motion pictures, for a [315] copy of Sleepless in Seattle.[121] While the simultaneous electronic exchange of the two movies took approximately six hours,[122] the computers required little operator attention during the interim. An MPAA investigator downloaded between five and ten DVD-sourced movies over the Internet after December 1999.[123] At least one web site contains a list of 650 motion pictures, said to have been decrypted and compressed with DivX, that purportedly are available for sale, trade or free download.[124] And although the Court does not accept the list, which is hearsay, as proof of the truth of the matters asserted therein, it does note that advertisements for decrypted versions of copyrighted movies first appeared on the Internet in substantial numbers in late 1999, following the posting of DeCSS.[125]

The net of all this is reasonably plain. DeCSS is a free, effective and fast means of decrypting plaintiffs' DVDs and copying them to computer hard drives. DivX, which is available over the Internet for nothing, with the investment of some time and effort, permits compression of the decrypted files to sizes that readily fit on a writeable CD-ROM. Copies of such CD-ROMs can be produced very cheaply and distributed as easily as other pirated intellectual property. While not everyone with Internet access now will find it convenient to send or receive DivX'd copies of pirated motion pictures over the Internet, the availability of high speed network connections in many businesses and institutions, and their growing availability in homes, make Internet and other network traffic in pirated copies a growing threat.

These circumstances have two major implications for plaintiffs. First, the availability of DeCSS on the Internet effectively has compromised plaintiffs' system of copyright protection for DVDs, requiring them either to tolerate increased piracy or to expend resources to develop and implement a replacement system unless the availability of DeCSS is terminated.[126] It is analogous to the publication of a bank vault combination in a national newspaper. Even if no one uses the combination to open the vault, its mere publication has the effect of defeating the bank's security system, forcing the bank to reprogram the lock. Development and implementation of a new DVD copy protection system, however, is far more difficult and costly than reprogramming a combination lock and may carry with it the added problem of rendering the existing installed base of compliant DVD players obsolete.

Second, the application of DeCSS to copy and distribute motion pictures on DVD, both on CD-ROMs and via the Internet, threatens to reduce the studios' revenue from the sale and rental of DVDs. It threatens also to impede new, potentially lucrative initiatives for the distribution of motion pictures in digital form, such as video-on-demand via the Internet.[127]

In consequence, plaintiffs already have been gravely injured. As the pressure for and competition to supply more and more users with faster and faster network connections grows, the injury will multiply.

II. The Digital Millennium Copyright Act

A. Background and Structure of the Statute

In December 1996, the World Intellectual Property Organization ("WIPO"), held a diplomatic conference in Geneva that led to the adoption of two treaties. Article 11 of the relevant treaty, the WIPO Copyright [316] Treaty, provides in relevant part that contracting states "shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law."[128]

The adoption of the WIPO Copyright Treaty spurred continued Congressional attention to the adaptation of the law of copyright to the digital age. Lengthy hearings involving a broad range of interested parties both preceded and succeeded the Copyright Treaty. As noted above, a critical focus of Congressional consideration of the legislation was the conflict between those who opposed anti-circumvention measures as inappropriate extensions of copyright and impediments to fair use and those who supported them as essential to proper protection of copyrighted materials in the digital age.[129] The DMCA was enacted in October 1998 as the culmination of this process.[130]

The DMCA contains two principal anti-circumvention provisions. The first, Section 1201(a)(1), governs "[t]he act of circumventing a technological protection measure put in place by a copyright owner to control access to a copyrighted work," an act described by Congress as "the electronic equivalent of breaking into a locked room in order to obtain a copy of a book."[131] The second, Section 1201(a)(2), which is the focus of this case, "supplements the prohibition against the act of circumvention in paragraph (a)(1) with prohibitions on creating and making available certain technologies ... developed or advertised to defeat technological protections against unauthorized access to a work."[132] As defendants are accused here only of posting and linking to other sites posting DeCSS, and not of using it themselves to bypass plaintiffs' access controls, it is principally the second of the anticircumvention provisions that is at issue in this case.[133]

B. Posting of DeCSS

1. Violation of Anti-Trafficking Provision

Section 1201(a)(2) of the Copyright Act, part of the DMCA, provides that:

"No person shall ... offer to the public, provide or otherwise traffic in any technology ... that —

"(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act];

"(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under [the Copyright Act]; or

[317] "(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act]."[134]

In this case, defendants concededly offered and provided and, absent a court order, would continue to offer and provide DeCSS to the public by making it available for download on the 2600.com web site. DeCSS, a computer program, unquestionably is "technology" within the meaning of the statute.[135] "[C]ircumvent a technological measure" is defined to mean descrambling a scrambled work, decrypting an encrypted work, or "otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner,"[136] so DeCSS clearly is a means of circumventing a technological access control measure.[137] In consequence, if CSS otherwise falls within paragraphs (A), (B) or (C) of Section 1201(a)(2), and if none of the statutory exceptions applies to their actions, defendants have violated and, unless enjoined, will continue to violate the DMCA by posting DeCSS.

a. Section 1201(a)(2)(A)

(1) CSS Effectively Controls Access to Copyrighted Works

During pretrial proceedings and at trial, defendants attacked plaintiffs' Section 1201(a)(2)(A) claim, arguing that CSS, which is based on a 40-bit encryption key, is a weak cipher that does not "effectively control" access to plaintiffs' copyrighted works. They reasoned from this premise that CSS is not protected under this branch of the statute at all. Their post-trial memorandum appears to have abandoned this argument. In any case, however, the contention is indefensible as a matter of law.

First, the statute expressly provides that "a technological measure `effectively controls access to a work' if the measure, in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to a work."[138] One cannot gain access to a CSS-protected work on a DVD without application of the three keys that are required by the software. One cannot lawfully gain access to the keys except by entering into a license with the DVD CCA [318] under authority granted by the copyright owners or by purchasing a DVD player or drive containing the keys pursuant to such a license. In consequence, under the express terms of the statute, CSS "effectively controls access" to copyrighted DVD movies. It does so, within the meaning of the statute, whether or not it is a strong means of protection.[139]

This view is confirmed by the legislative history, which deals with precisely this point. The House Judiciary Committee section-by-section analysis of the House bill, which in this respect was enacted into law, makes clear that a technological measure "effectively controls access" to a copyrighted work if its function is to control access:

"The bill does define the functions of the technological measures that are covered — that is, what it means for a technological measure to `effectively control access to a work' ... and to `effectively protect a right of a copyright owner under this title' .... The practical, common-sense approach taken by H.R.2281 is that if, in the ordinary course of its operation, a technology actually works in the defined ways to control access to a work ... then the `effectiveness' test is met, and the prohibitions of the statute are applicable. This test, which focuses on the function performed by the technology, provides a sufficient basis for clear interpretation."[140]

Further, the House Commerce Committee made clear that measures based on encryption or scrambling "effectively control" access to copyrighted works,[141] although it is well known that what may be encrypted or scrambled often may be decrypted or unscrambled. As CSS, in the ordinary course of its operation — that is, when DeCSS or some other decryption program is not employed — "actually works" to prevent access to the protected work, it "effectively controls access" within the contemplation of the statute.

Finally, the interpretation of the phrase "effectively controls access" offered by defendants at trial — viz., that the use of the word "effectively" means that the statute protects only successful or efficacious technological means of controlling access — would gut the statute if it were adopted. If a technological means of access control is circumvented, it is, in common parlance, ineffective. Yet defendants' construction, if adopted, would limit the application of the statute to access control measures that thwart circumvention, but withhold protection for those measures that can be circumvented. In other words, defendants would have the Court construe the statute to offer protection where none is needed but to withhold protection precisely where protection is essential. The Court declines to do so. Accordingly, the Court holds that CSS effectively controls access to plaintiffs' copyrighted works.[142]

(2) DeCSS Was Designed Primarily to Circumvent CSS

As CSS effectively controls access to plaintiffs' copyrighted works, the only remaining question under Section 1201(a)(2)(A) is whether DeCSS was designed primarily to circumvent CSS. The [319] answer is perfectly obvious. By the admission of both Jon Johansen, the programmer who principally wrote DeCSS, and defendant Corley, DeCSS was created solely for the purpose of decrypting CSS — that is all it does.[143] Hence, absent satisfaction of a statutory exception, defendants clearly violated Section 1201(a)(2)(A) by posting DeCSS to their web site.

b. Section 1201(a)(2)(B)

As the only purpose or use of DeCSS is to circumvent CSS, the foregoing is sufficient to establish a prima facie violation of Section 1201(a)(2)(B) as well.

c. The Linux Argument

Perhaps the centerpiece of defendants' statutory position is the contention that DeCSS was not created for the purpose of pirating copyrighted motion pictures. Rather, they argue, it was written to further the development of a DVD player that would run under the Linux operating system, as there allegedly were no Linux compatible players on the market at the time.[144] The argument plays itself out in various ways as different elements of the DMCA come into focus. But it perhaps is useful to address the point at its most general level in order to place the preceding discussion in its fullest context.

As noted, Section 1201(a) of the DMCA contains two distinct prohibitions. Section 1201(a)(1), the so-called basic provision, "aims against those who engage in unauthorized circumvention of technological measures.... [It] focuses directly on wrongful conduct, rather than on those who facilitate wrongful conduct...."[145] Section 1201(a)(2), the anti-trafficking provision at issue in this case, on the other hand, separately bans offering or providing technology that may be used to circumvent technological means of controlling access to copyrighted works.[146] If the means in question meets any of the three prongs of the standard set out in Section 1201(a)(2)(A), (B), or (C), it may not be offered or disseminated.

As the earlier discussion demonstrates, the question whether the development of a Linux DVD player motivated those who wrote DeCSS is immaterial to the question whether the defendants now before the Court violated the anti-trafficking provision of the DMCA. The inescapable facts are that (1) CSS is a technological means that effectively controls access to plaintiffs' copyrighted works, (2) the one and only function of DeCSS is to circumvent CSS, and (3) defendants offered and provided DeCSS by posting it on their web site. Whether defendants did so in order to infringe, or to permit or encourage others to infringe, copyrighted works in violation of other provisions of the Copyright Act simply does not matter for purposes of Section 1201(a)(2). The offering or provision of the program is the prohibited conduct — and it is prohibited irrespective of why the program was written, except to whatever extent motive may be germane to determining whether their conduct falls within one of the statutory exceptions.

2. Statutory Exceptions

Earlier in the litigation, defendants contended that their activities came within several exceptions contained in the DMCA and the Copyright Act and constitute fair use under the Copyright Act. Their post-trial memorandum appears to confine their argument to the reverse engineering exception.[147] In any case, all of their assertions are entirely without merit.

a. Reverse engineering

Defendants claim to fall under Section 1201(f) of the statute, which provides [320] in substance that one may circumvent, or develop and employ technological means to circumvent, access control measures in order to achieve interoperability with another computer program provided that doing so does not infringe another's copyright[148] and, in addition, that one may make information acquired through such efforts "available to others, if the person [in question] ... provides such information solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement...."[149] They contend that DeCSS is necessary to achieve interoperability between computers running the Linux operating system and DVDs and that this exception therefore is satisfied.[150] This contention fails.

First, Section 1201(f)(3) permits information acquired through reverse engineering to be made available to others only by the person who acquired the information. But these defendants did not do any reverse engineering. They simply took DeCSS off someone else's web site and posted it on their own.

Defendants would be in no stronger position even if they had authored DeCSS. The right to make the information available extends only to dissemination "solely for the purpose" of achieving interoperability as defined in the statute. It does not apply to public dissemination of means of circumvention, as the legislative history confirms.[151] These defendants, however, did not post DeCSS "solely" to achieve interoperability with Linux or anything else.

Finally, it is important to recognize that even the creators of DeCSS cannot credibly maintain that the "sole" purpose of DeCSS was to create a Linux DVD player. DeCSS concededly was developed on and runs under Windows — a far more widely used operating system. The developers of DeCSS therefore knew that DeCSS could be used to decrypt and play DVD movies on Windows as well as Linux machines. They knew also that the decrypted files could be copied like any other unprotected computer file. Moreover, the Court does not credit Mr. Johansen's testimony that he created DeCSS solely for the purpose of building a Linux player. Mr. Johansen is a very talented young man and a member of a well known hacker group who viewed "cracking" CSS as an end it itself and a means of demonstrating his talent and who fully expected that the use of DeCSS would not be confined to Linux machines. Hence, the Court finds that Mr. Johansen and the others who actually did develop DeCSS did not do so solely for the purpose of making a Linux DVD player if, indeed, developing a Linux-based DVD player was among their purposes.

Accordingly, the reverse engineering exception to the DMCA has no application here.

b. Encryption research

Section 1201(g)(4) provides in relevant part that:

"Notwithstanding the provisions of subsection (a)(2), it is not a violation of that subsection for a person to —

"(A) develop and employ technological means to circumvent a technological measure for the sole purpose of that person performing the acts of good faith encryption research described in paragraph (2); and

"(B) provide the technological means to another person with whom he or she is working collaboratively for the purpose of conducting the acts of good faith encryption research described in paragraph (2) or for the purpose of having that other person verify his or her acts [321] of good faith encryption research described in paragraph (2)."[152]

Paragraph (2) in relevant part permits circumvention of technological measures in the course of good faith encryption research if:

"(A) the person lawfully obtained the encrypted copy, phonorecord, performance, or display of the published work;

"(B) such act is necessary to conduct such encryption research;

"(C) the person made a good faith effort to obtain authorization before the circumvention; and

"(D) such act does not constitute infringement under this title...."[153]

In determining whether one is engaged in good faith encryption research, the Court is instructed to consider factors including whether the results of the putative encryption research are disseminated in a manner designed to advance the state of knowledge of encryption technology versus facilitation of copyright infringement, whether the person in question is engaged in legitimate study of or work in encryption, and whether the results of the research are communicated in a timely fashion to the copyright owner.[154]

Neither of the defendants remaining in this case was or is involved in good faith encryption research.[155] They posted DeCSS for all the world to see. There is no evidence that they made any effort to provide the results of the DeCSS effort to the copyright owners. Surely there is no suggestion that either of them made a good faith effort to obtain authorization from the copyright owners. Accordingly, defendants are not protected by Section 1201(g).[156]

c. Security testing

Defendants contended earlier that their actions should be considered exempt security testing under Section 1201(j) of the statute.[157] This exception, however, is limited to "assessing a computer, computer system, or computer network, solely for the purpose of good faith testing, investigating, or correcting [of a] security flaw or vulnerability, with the authorization of the owner or operator of such computer system or computer network."[158]

The record does not indicate that DeCSS has anything to do with testing computers, computer systems, or computer networks. Certainly defendants sought, and plaintiffs' granted, no authorization for defendants' activities. This exception therefore has no bearing in this case.[159]

d. Fair use

Finally, defendants rely on the doctrine of fair use. Stated in its most general terms, the doctrine, now codified in Section 107 of the Copyright Act,[160] limits the exclusive rights of a copyright holder by permitting others to make limited use of portions of the copyrighted work, for appropriate purposes, free of liability for copyright infringement. For example, it is permissible for one other than the copyright owner to reprint or quote a suitable part of a copyrighted book or article in certain circumstances. The doctrine traditionally has facilitated literary and artistic criticism, teaching and scholarship, and other socially useful forms of expression. [322] It has been viewed by courts as a safety valve that accommodates the exclusive rights conferred by copyright with the freedom of expression guaranteed by the First Amendment.

The use of technological means of controlling access to a copyrighted work may affect the ability to make fair uses of the work.[161] Focusing specifically on the facts of this case, the application of CSS to encrypt a copyrighted motion picture requires the use of a compliant DVD player to view or listen to the movie. Perhaps more significantly, it prevents exact copying of either the video or the audio portion of all or any part of the film.[162] This latter point means that certain uses that might qualify as "fair" for purposes of copyright infringement — for example, the preparation by a film studies professor of a single CD-ROM or tape containing two scenes from different movies in order to illustrate a point in a lecture on cinematography, as opposed to showing relevant parts of two different DVDs — would be difficult or impossible absent circumvention of the CSS encryption. Defendants therefore argue that the DMCA cannot properly be construed to make it difficult or impossible to make any fair use of plaintiffs' copyrighted works and that the statute therefore does not reach their activities, which are simply a means to enable users of DeCSS to make such fair uses.

Defendants have focused on a significant point. Access control measures such as CSS do involve some risk of preventing lawful as well as unlawful uses of copyrighted material. Congress, however, clearly faced up to and dealt with this question in enacting the DMCA.

The Court begins its statutory analysis, as it must, with the language of the statute. Section 107 of the Copyright Act provides in critical part that certain uses of copyrighted works that otherwise would be wrongful are "not ... infringement[s] of copyright."[163] Defendants, however, are not here sued for copyright infringement. They are sued for offering and providing technology designed to circumvent technological measures that control access to copyrighted works and otherwise violating Section 1201(a)(2) of the Act. If Congress had meant the fair use defense to apply to such actions, it would have said so. Indeed, as the legislative history demonstrates, the decision not to make fair use a defense to a claim under Section 1201(a) was quite deliberate.

Congress was well aware during the consideration of the DMCA of the traditional role of the fair use defense in accommodating the exclusive rights of copyright owners with the legitimate interests of noninfringing users of portions of copyrighted works. It recognized the contention, voiced by a range of constituencies concerned with the legislation, that technological controls on access to copyrighted works might erode fair use by preventing access even for uses that would be deemed "fair" if only access might be gained.[164] And it struck a balance among the competing interests.

[323] The first element of the balance was the careful limitation of Section 1201(a)(1)'s prohibition of the act of circumvention to the act itself so as not to "apply to subsequent actions of a person once he or she has obtained authorized access to a copy of a [copyrighted] work...."[165] By doing so, it left "the traditional defenses to copyright infringement, including fair use, ... fully applicable" provided "the access is authorized."[166]

Second, Congress delayed the effective date of Section 1201(a)(1)'s prohibition of the act of circumvention for two years pending further investigation about how best to reconcile Section 1201(a)(1) with fair use concerns. Following that investigation, which is being carried out in the form of a rule-making by the Register of Copyright, the prohibition will not apply to users of particular classes of copyrighted works who demonstrate that their ability to make noninfringing uses of those classes of works would be affected adversely by Section 1201(a)(1).[167]

Third, it created a series of exceptions to aspects of Section 1201(a) for certain uses that Congress thought "fair," including reverse engineering, security testing, good faith encryption research, and certain uses by nonprofit libraries, archives and educational institutions.[168]

Defendants claim also that the possibility that DeCSS might be used for the purpose of gaining access to copyrighted works in order to make fair use of those works saves them under Sony Corp. v. Universal City Studios, Inc.[169] But they are mistaken. Sony does not apply to the activities with which defendants here are charged. Even if it did, it would not govern here. Sony involved a construction of the Copyright Act that has been overruled by the later enactment of the DMCA to the extent of any inconsistency between Sony and the new statute.

Sony was a suit for contributory infringement brought against manufacturers of video cassette recorders on the theory that the manufacturers were contributing to infringing home taping of copyrighted television broadcasts. The Supreme Court held that the manufacturers were not liable in view of the substantial numbers of copyright holders who either had authorized or did not object to such taping by viewers.[170] But Sony has no application here.

When Sony was decided, the only question was whether the manufacturers could be held liable for infringement by those who purchased equipment from them in circumstances in which there were many noninfringing uses for their equipment. But that is not the question now before this Court. The question here is whether the possibility of noninfringing fair use by someone who gains access to a protected copyrighted work through a circumvention technology distributed by the defendants saves the defendants from liability under Section 1201. But nothing in Section 1201 so suggests. By prohibiting the provision of circumvention technology, the DMCA fundamentally altered the landscape. A given device or piece of technology might have "a substantial noninfringing use, and hence be immune from attack under Sony's construction of the Copyright Act — but nonetheless still be subject to suppression under Section 1201."[171] Indeed, [324] Congress explicitly noted that Section 1201 does not incorporate Sony.[172]

The policy concerns raised by defendants were considered by Congress. Having considered them, Congress crafted a statute that, so far as the applicability of the fair use defense to Section 1201(a) claims is concerned, is crystal clear. In such circumstances, courts may not undo what Congress so plainly has done by "construing" the words of a statute to accomplish a result that Congress rejected. The fact that Congress elected to leave technologically unsophisticated persons who wish to make fair use of encrypted copyrighted works without the technical means of doing so is a matter for Congress unless Congress' decision contravenes the Constitution, a matter to which the Court turns below. Defendants' statutory fair use argument therefore is entirely without merit.

C. Linking to Sites Offering DeCSS

Plaintiffs seek also to enjoin defendants from "linking" their 2600.com web site to other sites that make DeCSS available to users. Their request obviously stems in no small part from what defendants themselves have termed their act of "electronic civil disobedience" — their attempt to defeat the purpose of the preliminary injunction by (a) offering the practical equivalent of making DeCSS available on their own web site by electronically linking users to other sites still offering DeCSS, and (b) encouraging other sites that had not been enjoined to offer the program. The dispositive question is whether linking to another web site containing DeCSS constitutes "offer[ing DeCSS] to the public" or "provid[ing] or otherwise traffic[king]" in it within the meaning of the DMCA.[173] Answering this question requires careful consideration of the nature and types of linking.

Most web pages are written in computer languages, chiefly HTML, which allow the programmer to prescribe the appearance of the web page on the computer screen and, in addition, to instruct the computer to perform an operation if the cursor is placed over a particular point on the screen and the mouse then clicked.[174] Programming a particular point on a screen to transfer the user to another web page when the point, referred to as a hyperlink, is clicked is called linking.[175] Web pages can be designed to link to other web pages on the same site or to web pages maintained by different sites.[176]

As noted earlier, the links that defendants established on their web site are of several types. Some transfer the user to a web page on an outside site that contains a good deal of information of various types, does not itself contain a link to DeCSS, but that links, either directly or via a series of other pages, to another page on the same site that posts the software. It then is up to the user to follow the link or series of links on the linked-to web site in order to arrive at the page with the DeCSS link and commence the download of the software. Others take the user to a page on an outside web site on which there appears a direct link to the DeCSS software and which may or may not contain text or links other than the DeCSS link. The user has only to click on the DeCSS link to commence the download. Still others may directly transfer the user to a file on the linked-to web site such that the download of DeCSS to the user's computer automatically [325] commences without further user intervention.

The statute makes it unlawful to offer, provide or otherwise traffic in described technology.[177] To "traffic" in something is to engage in dealings in it,[178] conduct that necessarily involves awareness of the nature of the subject of the trafficking. To "provide" something, in the sense used in the statute, is to make it available or furnish it.[179] To "offer" is to present or hold it out for consideration.[180] The phrase "or otherwise traffic in" modifies and gives meaning to the words "offer" and "provide."[181] In consequence, the anti-trafficking provision of the DMCA is implicated where one presents, holds out or makes a circumvention technology or device available, knowing its nature, for the purpose of allowing others to acquire it.

To the extent that defendants have linked to sites that automatically commence the process of downloading DeCSS upon a user being transferred by defendants' hyperlinks, there can be no serious question. Defendants are engaged in the functional equivalent of transferring the DeCSS code to the user themselves.

Substantially the same is true of defendants' hyperlinks to web pages that display nothing more than the DeCSS code or present the user only with the choice of commencing a download of DeCSS and no other content. The only distinction is that the entity extending to the user the option of downloading the program is the transferee site rather than defendants, a distinction without a difference.

Potentially more troublesome might be links to pages that offer a good deal of content other than DeCSS but that offer a hyperlink for downloading, or transferring to a page for downloading, DeCSS. If one assumed, for the purposes of argument, that the Los Angeles Times web site somewhere contained the DeCSS code, it would be wrong to say that anyone who linked to the Los Angeles Times web site, regardless of purpose or the manner in which the link was described, thereby offered, provided or otherwise trafficked in DeCSS merely because DeCSS happened to be available on a site to which one linked.[182] But that is not this case. Defendants urged others to post DeCSS in an effort to disseminate DeCSS and to inform defendants that they were doing so. Defendants then linked their site to those "mirror" sites, after first checking to ensure that the mirror sites in fact were posting DeCSS or something that looked like it, and proclaimed on their own site that DeCSS could be had by clicking on the hyperlinks on defendants' site. By doing so, they offered, provided or otherwise trafficked in DeCSS, and they continue to do so to this day.

III. The First Amendment

Defendants argue that the DMCA, at least as applied to prevent the public dissemination of DeCSS, violates the First Amendment to the Constitution. They claim that it does so in two ways. First, they argue that computer code is protected speech and that the DMCA's prohibition of dissemination of DeCSS therefore violates defendants' First Amendment rights. Second, they contend that the DMCA is unconstitutionally [326] overbroad, chiefly because its prohibition of the dissemination of decryption technology prevents third parties from making fair use of plaintiffs' encrypted works, and vague. They argue also that a prohibition on their linking to sites that make DeCSS available is unconstitutional for much the same reasons.

A. Computer Code and the First Amendment

The premise of defendants' first position is that computer code, the form in which DeCSS exists, is speech protected by the First Amendment. Examination of that premise is the logical starting point for analysis. And it is important in examining that premise first to define terms.

Defendants' assertion that computer code is "protected" by the First Amendment is quite understandable. Courts often have spoken of certain categories of expression as "not within the area of constitutionally protected speech,"[183] so defendants naturally wish to avoid exclusion by an unfavorable categorization of computer code. But such judicial statements in fact are not literally true. All modes of expression are covered by the First Amendment in the sense that the constitutionality of their "regulation must be determined by reference to First Amendment doctrine and analysis."[184] Regulation of different categories of expression, however, is subject to varying levels of judicial scrutiny. Thus, to say that a particular form of expression is "protected" by the First Amendment means that the constitutionality of any regulation of it must be measured by reference to the First Amendment. In some circumstances, however, the phrase connotes also that the standard for measurement is the most exacting level available.

It cannot seriously be argued that any form of computer code may be regulated without reference to First Amendment doctrine. The path from idea to human language to source code to object code is a continuum. As one moves from one to the other, the levels of precision and, arguably, abstraction increase, as does the level of training necessary to discern the idea from the expression. Not everyone can understand each of these forms. Only English speakers will understand English formulations. Principally those familiar with the particular programming language will understand the source code expression. And only a relatively small number of skilled programmers and computer scientists will understand the machine readable object code. But each form expresses the same idea, albeit in different ways.[185]

There perhaps was a time when the First Amendment was viewed only as a limitation on the ability of government to censor speech in advance.[186] [327] But we have moved far beyond that. All modes by which ideas may be expressed or, perhaps, emotions evoked — including speech, books, movies, art, and music — are within the area of First Amendment concern.[187] As computer code — whether source or object — is a means of expressing ideas, the First Amendment must be considered before its dissemination may be prohibited or regulated. In that sense, computer code is covered or, as sometimes is said, "protected" by the First Amendment.[188] But that conclusion still leaves for determination the level of scrutiny to be applied in determining the constitutionality of regulation of computer code.

B. The Constitutionality of the DMCA's Anti-Trafficking Provision

1. Defendants' Alleged Right to Disseminate DeCSS

Defendants first attack Section 1201(a)(2), the anti-trafficking provision, as applied to them on the theory that DeCSS is constitutionally protected expression and that the statute improperly prevents them from communicating it. Their attack presupposes that a characterization of code as constitutionally protected subjects any regulation of code to the highest level of First Amendment scrutiny. As we have seen, however, this does not necessarily follow.

Just as computer code cannot be excluded from the area of First Amendment concern because it is abstract and, in many cases, arcane, the long history of First Amendment jurisprudence makes equally clear that the fact that words, symbols and even actions convey ideas and evoke emotions does not inevitably place them beyond the power of government. The Supreme Court has evolved an analytical framework by which the permissibility of particular restrictions on the expression of ideas must determined.

Broadly speaking, restrictions on expression fall into two categories. Some are restrictions on the voicing of particular ideas, which typically are referred to as content based restrictions. Others have nothing to do with the content of the expression — i.e., they are content neutral — but they have the incidental effect of limiting expression.

In general, "government has no power to restrict expression because of its message, its ideas, its subject matter, or its content...."[189] "[S]ubject only to narrow and well-understood exceptions, [the First Amendment] does not countenance governmental control over the content of messages expressed by private individuals."[190] In consequence, content based restrictions on speech are permissible only if they serve compelling state interests by the least restrictive means available.[191]

Content neutral restrictions, in contrast, are measured against a less exacting standard. Because restrictions of this type are not motivated by a desire to limit the message, they will be upheld if they serve a substantial governmental interest [328] and restrict First Amendment freedoms no more than necessary.[192]

Restrictions on the nonspeech elements of expressive conduct fall into the conduct-neutral category. The Supreme Court long has distinguished for First Amendment purposes between pure speech, which ordinarily receives the highest level of protection, and expressive conduct.[193] Even if conduct contains an expressive element, its nonspeech aspect need not be ignored.[194] "[W]hen `speech' and `nonspeech' elements are combined in the same course of conduct, a sufficiently important governmental interest in regulating the nonspeech element can justify incidental limitations on First Amendment freedoms."[195] The critical point is that nonspeech elements may create hazards for society above and beyond the speech elements. They are subject to regulation in appropriate circumstances because the government has an interest in dealing with the potential hazards of the nonspeech elements despite the fact that they are joined with expressive elements.

Thus, the starting point for analysis is whether the DMCA, as applied to restrict dissemination of DeCSS and other computer code used to circumvent access control measures, is a content based restriction on speech or a content neutral regulation. Put another way, the question is the level of review that governs the DMCA's anti-trafficking provision as applied to DeCSS — the strict scrutiny standard applicable to content based regulations or the intermediate level applicable to content neutral regulations, including regulations of the nonspeech elements of expressive conduct.

Given the fact that DeCSS code is expressive, defendants would have the Court leap immediately to the conclusion that Section 1201(a)(2)'s prohibition on providing DeCSS necessarily is content based regulation of speech because it suppresses dissemination of a particular kind of expression.[196] But this would be a unidimensional approach to a more textured reality and entirely too facile.

The "principal inquiry in determining content neutrality ... is whether the government has adopted a regulation of speech because of [agreement or] disagreement with the message it conveys."[197] The computer code at issue in this case, however, does more than express the programmers' concepts. It does more, in other words, than convey a message. DeCSS, like any other computer program, is a series of instructions that causes a computer to perform a particular sequence [329] of tasks which, in the aggregate, decrypt CSS-protected files. Thus, it has a distinctly functional, non-speech aspect in addition to reflecting the thoughts of the programmers. It enables anyone who receives it and who has a modicum of computer skills to circumvent plaintiffs' access control system.

The reason that Congress enacted the anti-trafficking provision of the DMCA had nothing to do with suppressing particular ideas of computer programmers and everything to do with functionality — with preventing people from circumventing technological access control measures — just as laws prohibiting the possession of burglar tools have nothing to do with preventing people from expressing themselves by accumulating what to them may be attractive assortments of implements and everything to do with preventing burglaries. Rather, it is focused squarely upon the effect of the distribution of the functional capability that the code provides. Any impact on the dissemination of programmers' ideas is purely incidental to the overriding concerns of promoting the distribution of copyrighted works in digital form while at the same time protecting those works from piracy and other violations of the exclusive rights of copyright holders.[198]

These considerations suggest that the DMCA as applied here is content neutral, a view that draws support also from City of Renton v. Playtime Theatres, Inc.[199] The Supreme Court there upheld against a First Amendment challenge a zoning ordinance that prohibited adult movie theaters within 1,000 feet of a residential, church or park zone or within one mile of a school. Recognizing that the ordinance did "not appear to fit neatly into either the `content based or the `content-neutral' category," it found dispositive the fact that the ordinance was justified without reference to the content of the regulated speech in that the concern of the municipality had been with the secondary effects of the presence of adult theaters, not with the particular content of the speech that takes place in them.[200] As Congress' concerns in enacting the anti-trafficking provision of the DMCA were to suppress copyright piracy and infringement and to promote the availability of copyrighted works in digital form, and not to regulate the expression of ideas that might be inherent in particular anti-circumvention devices or technology, this provision of the statute properly is viewed as content neutral.[201]

Congress is not powerless to regulate content neutral regulations that incidentally affect expression, including the dissemination of the functional capabilities of computer code. A sufficiently important governmental interest in seeing to it that computers are not instructed to perform particular functions may justify incidental restrictions on the dissemination of the expressive elements of a program. Such a regulation will be upheld if:

"it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that [330] interest."[202]

Moreover, "[t]o satisfy this standard, a regulation need not be the least speech-restrictive means of advancing the Government's interests."[203] "Rather, the requirement of narrow tailoring is satisfied `so long as the ... regulation promotes a substantial government interest that would be achieved less effectively absent the regulation.'"[204]

The anti-trafficking provision of the DMCA furthers an important governmental interest — the protection of copyrighted works stored on digital media from the vastly expanded risk of piracy in this electronic age. The substantiality of that interest is evident both from the fact that the Constitution specifically empowers Congress to provide for copyright protection[205] and from the significance to our economy of trade in copyrighted materials.[206] Indeed, the Supreme Court has made clear that copyright protection itself is "the engine of free expression."[207] That substantial interest, moreover, is unrelated to the suppression of particular views expressed in means of gaining access to protected copyrighted works. Nor is the incidental restraint on protected expression — the prohibition of trafficking in means that would circumvent controls limiting access to unprotected materials or to copyrighted materials for noninfringing purposes — broader than is necessary to accomplish Congress' goals of preventing infringement and promoting the availability of content in digital form.[208]

This analysis finds substantial support in the principal case relied upon by defendants, Junger v. Daley.[209] The plaintiff in that case challenged on First Amendment grounds an Export Administration regulation that barred the export of computer encryption software, arguing that the software was expressive and that the regulation therefore was unconstitutional. The Sixth Circuit acknowledged the expressive nature of computer code, holding that it therefore was within the scope of the First Amendment. But it recognized also that computer code is functional as well and said that "[t]he functional capabilities of source code, particularly those of encryption source code, should be considered when analyzing the governmental interest in regulating the exchange of this form of speech."[210] Indeed, it went on to indicate that the pertinent standard of review was that established in United States v. O'Brien,[211] the seminal speech-versus-conduct [331] decision. Thus, rather than holding the challenged regulation unconstitutional on the theory that the expressive aspect of source code immunized it from regulation, the court remanded the case to the district court to determine whether the O'Brien standard was met in view of the functional aspect of code.[212]

Notwithstanding its adoption by the Sixth Circuit, the focus on functionality in order to determine the level of scrutiny is not an inevitable consequence of the speech-conduct distinction. Conduct has immediate effects on the environment. Computer code, on the other hand, no matter how functional, causes a computer to perform the intended operations only if someone uses the code to do so. Hence, one commentator, in a thoughtful article, has maintained that functionality is really "a proxy for effects or harm" and that its adoption as a determinant of the level of scrutiny slides over questions of causation that intervene between the dissemination of a computer program and any harm caused by its use.[213]

The characterization of functionality as a proxy for the consequences of use is accurate. But the assumption that the chain of causation is too attenuated to justify the use of functionality to determine the level of scrutiny, at least in this context, is not.

Society increasingly depends upon technological means of controlling access to digital files and systems, whether they are military computers, bank records, academic records, copyrighted works or something else entirely. There are far too many who, given any opportunity, will bypass those security measures, some for the sheer joy of doing it, some for innocuous reasons, and others for more malevolent purposes. Given the virtually instantaneous and worldwide dissemination widely available via the Internet, the only rational assumption is that once a computer program capable of bypassing such an access control system is disseminated, it will be used. And that is not all.

There was a time when copyright infringement could be dealt with quite adequately by focusing on the infringing act. If someone wished to make and sell high quality but unauthorized copies of a copyrighted book, for example, the infringer needed a printing press. The copyright holder, once aware of the appearance of infringing copies, usually was able to trace the copies up the chain of distribution, find and prosecute the infringer, and shut off the infringement at the source.

In principle, the digital world is very different. Once a decryption program like DeCSS is written, it quickly can be sent all over the world. Every recipient is capable not only of decrypting and perfectly copying plaintiffs' copyrighted DVDs, but also of retransmitting perfect copies of DeCSS and thus enabling every recipient to do the same. They likewise are capable of transmitting perfect copies of the decrypted DVD. The process potentially is exponential rather than linear. Indeed, the difference is illustrated by comparison of two epidemiological models describing the spread of different kinds of disease.[214] In a common source epidemic, as where members of a population contract a non-contagious disease from a poisoned well, the disease spreads only by exposure to the common source. If one eliminates the source, or closes the contaminated well, the epidemic is stopped. In a propagated [332] outbreak epidemic, on the other hand, the disease spreads from person to person. Hence, finding the initial source of infection accomplishes little, as the disease continues to spread even if the initial source is eliminated.[215] For obvious reasons, then, a propagated outbreak epidemic, all other things being equal, can be far more difficult to control.

This disease metaphor is helpful here. The book infringement hypothetical is analogous to a common source outbreak epidemic. Shut down the printing press (the poisoned well) and one ends the infringement (the disease outbreak). The spread of means of circumventing access to copyrighted works in digital form, however, is analogous to a propagated outbreak epidemic. Finding the original source of infection (e.g., the author of DeCSS or the first person to misuse it) accomplishes nothing, as the disease (infringement made possible by DeCSS and the resulting availability of decrypted DVDs) may continue to spread from one person who gains access to the circumvention program or decrypted DVD to another. And each is "infected," i.e., each is as capable of making perfect copies of the digital file containing the copyrighted work as the author of the program or the first person to use it for improper purposes. The disease metaphor breaks down principally at the final point. Individuals infected with a real disease become sick, usually are driven by obvious self-interest to seek medical attention, and are cured of the disease if medical science is capable of doing so. Individuals infected with the "disease" of capability of circumventing measures controlling access to copyrighted works in digital form, however, do not suffer from having that ability. They cannot be relied upon to identify themselves to those seeking to control the "disease." And their self-interest will motivate some to misuse the capability, a misuse that; in practical terms, often will be untraceable.[216]

These considerations drastically alter consideration of the causal link between dissemination of computer programs such as this and their illicit use. Causation in the law ultimately involves practical policy judgments.[217] Here, dissemination itself carries very substantial risk of imminent harm because the mechanism is so unusual by which dissemination of means of circumventing access controls to copyrighted works threatens to produce virtually unstoppable infringement of copyright. In consequence, the causal link between the dissemination of circumvention computer programs and their improper use is more than sufficiently close to warrant selection of a level of constitutional scrutiny based on the programs' functionality.

Accordingly, this Court holds that the anti-trafficking provision of the DMCA as applied to the posting of computer code that circumvents measures that control access to copyrighted works in digital form is a valid exercise of Congress' authority. It is a content neutral regulation in furtherance of important governmental interests that does not unduly restrict expressive activities. In any case, its particular functional characteristics are such that the Court would apply the same level of scrutiny [333] even if it were viewed as content based.[218] Yet it is important to emphasize that this is a very narrow holding. The restriction the Court here upholds, notwithstanding that computer code is within the area of First Amendment concern, is limited (1) to programs that circumvent access controls to copyrighted works in digital form in circumstances in which (2) there is no other practical means of preventing infringement through use of the programs, and (3) the regulation is motivated by a desire to prevent performance of the function for which the programs exist rather than any message they might convey. One readily might imagine other circumstances in which a governmental attempt to regulate the dissemination of computer code would not similarly be justified.[219]

2. Prior Restraint

Defendants argue also that injunctive relief against dissemination of DeCSS is barred by the prior restraint doctrine. The Court disagrees.

Few phrases are as firmly rooted in our constitutional jurisprudence as the maxim that "[a]ny system of prior restraints of expression comes to [a] Court bearing a heavy presumption against its constitutional validity."[220] Yet there is a significant gap between the rhetoric and the reality. Courts often have upheld restrictions on expression that many would describe as prior restraints,[221] sometimes by [334] characterizing the expression as unprotected[222] and on other occasions finding the restraint justified despite its presumed invalidity.[223] Moreover, the prior restraint doctrine, which has expanded far beyond the Blackstonian model[224] that doubtless informed the understanding of the Framers of the First Amendment,[225] has been criticized as filled with "doctrinal ambiguities and inconsistencies result[ing] from the absence of any detailed judicial analysis of [its] true rationale"[226] and, in one case, even as "fundamentally unintelligible."[227] Nevertheless, the doctrine has a well established core: administrative preclearance requirements for and at least preliminary injunctions against speech as conventionally understood are presumptively unconstitutional. Yet that proposition does not dispose of this case.[228]

The classic prior restraint cases were dramatically different from this one. Near v. Minnesota[229] involved a state procedure for abating scandalous and defamatory newspapers as public nuisances. New York Times Co. v. United States[230] dealt with an attempt to enjoin a newspaper from publishing an internal government history of the Vietnam War. Nebraska Press Association v. Stuart[231] concerned a court order barring the reporting of certain details about a forthcoming murder case. In each case, therefore, the government sought to suppress speech at the very heart of First Amendment concern — expression about public issues of the sort [335] that is indispensable to self government. And while the prior restraint doctrine has been applied well beyond the sphere of political expression, we deal here with something new altogether — computer code, a fundamentally utilitarian construct, albeit one that embodies an expressive element. Hence, it would be a mistake simply to permit its expressive element to drive a characterization of the code as speech no different from the Pentagon Papers, the publication of a newspaper, or the exhibition of a motion picture and then to apply prior restraint rhetoric without a more nuanced consideration of the competing concerns.

In this case, the considerations supporting an injunction are very substantial indeed. Copyright and, more broadly, intellectual property piracy are endemic, as Congress repeatedly has found.[232] The interest served by prohibiting means that facilitate such piracy — the protection of the monopoly granted to copyright owners by the Copyright Act — is of constitutional dimension. There is little room for doubting that broad dissemination of DeCSS threatens ultimately to injure or destroy plaintiffs' ability to distribute their copyrighted products on DVDs and, for that matter, undermine their ability to sell their products to the home video market in other forms. The potential damages probably are incalculable, and these defendants surely would be in no position to compensate plaintiffs for them if plaintiffs were remitted only to post hoc damage suits.

On the other side of the coin, the First Amendment interests served by the dissemination of DeCSS on the merits are minimal. The presence of some expressive content in the code should not obscure the fact of its predominant functional character — it is first and foremost a means of causing a machine with which it is used to perform particular tasks. Hence, those of the traditional rationales for the prior restraint doctrine that relate to inhibiting the transmission and receipt of ideas are of attenuated relevance here. Indeed, even academic commentators who take the extreme position that most injunctions in intellectual property cases are unconstitutional prior restraints concede that there is no First Amendment obstacle to injunctions barring distribution of copyrighted computer object code or restraining the construction of a new building based on copyrighted architectural drawings because the functional aspects of these types of information are "sufficiently nonexpressive."[233]

To be sure, there is much to be said in most circumstances for the usual procedural rationale for the prior restraint doctrine: prior restraints carry with them the risk of erroneously suppressing expression that could not constitutionally be punished [336] after publication.[234] In this context, however, that concern is not persuasive, both because the enjoined expressive element is minimal and because a full trial on the merits has been held.[235] Accordingly, the Court holds that the prior restraint doctrine does not require denial of an injunction in this case.

3. Overbreadth

Defendants' second focus is the contention that Section 1201(a)(2) is unconstitutional because it prevents others from making fair use of copyrighted works by depriving them of the means of circumventing plaintiffs' access control system.[236] In substance, they contend that the anti-trafficking provision leaves those who lack sufficient technical expertise to circumvent CSS themselves without the means of acquiring circumvention technology that they need to make fair use of the content of plaintiffs' copyrighted DVDs.[237]

As a general proposition, "a person to whom a statute constitutionally may be applied may not challenge that statute on the ground that it conceivably may be applied unconstitutionally to others in situations not before the Court."[238] When statutes regulate speech, however, "the transcendent value to all society of constitutionally protected expression is deemed to justify `attacks on overly broad statutes with no requirement that the person making the attack demonstrate that his own conduct could not be regulated by a statute drawn with the requisite narrow specificity.'"[239] This is so because the absent third parties may not exercise their rights for fear of triggering "sanctions provided by a statute susceptible of application to protected expression."[240] But the overbreadth doctrine "is `strong medicine' .... employed ... with hesitation, and then `only as a last resort.'" because it conflicts with "the personal nature of constitutional rights and the prudential limitations on constitutional adjudication," including the importance of focusing carefully on the facts in deciding constitutional questions.[241] Moreover, the limited function of the overbreadth doctrine "`attenuates as the otherwise unprotected behavior that it forbids the State to sanction moves from `pure speech' toward conduct and that conduct — even if expressive — falls within the scope of otherwise valid criminal [337] laws....'"[242] As defendants concede, "where conduct and not merely speech is involved, . . . the overbreadth of a statute must not only be real, but substantial as well, judged in relation to the statute's plainly legitimate sweep."[243]

Factors arguing against use of the overbreadth doctrine are present here. To begin with, we do not here have a complete view of whether the interests of the absent third parties upon whom defendants rely really are substantial and, in consequence, whether the DMCA as applied here would materially affect their ability to make fair use of plaintiffs' copyrighted works.

The copyrighted works at issue, of course, are motion pictures. People use copies of them in DVD and other formats for various purposes, and we confine our consideration to the lawful purposes, which by definition are noninfringing or fair uses. The principal noninfringing use is to play the DVD for the purpose of watching the movie — viewing the images and hearing the sounds that are synchronized with them. Fair uses are much more varied. A movie reviewer might wish to quote a portion of the verbal script in an article or broadcast review. A television station might want to broadcast part of a particular scene to illustrate a review, a news story about a performer, or a story about particular trends in motion pictures. A musicologist perhaps would wish to play a portion of a musical sound track. A film scholar might desire to create and exhibit to students small segments of several different films to make some comparative point about the cinematography or some other characteristic. Numerous other examples doubtless could be imagined. But each necessarily involves one or more of three types of use: (1) quotation of the words of the script, (2) listening to the recorded sound track, including both verbal and non-verbal elements, and (3) viewing of the graphic images.

All three of these types of use now are affected by the anti-trafficking provision of the DMCA, but probably only to a trivial degree. To begin with, all or substantially all motion pictures available on DVD are available also on videotape.[244] In consequence, anyone wishing to make lawful use of a particular movie may buy or rent a videotape, play it, and even copy all or part of it with readily available equipment. But even if movies were available only on DVD, as someday may be the case, the impact on lawful use would be limited. Compliant DVD players permit one to view or listen to a DVD movie without circumventing CSS in any prohibited sense. The technology permitting manufacture of compliant DVD players is available to anyone on a royalty-free basis and at modest cost, so CSS raises no technological barrier to their manufacture. Hence, those wishing to make lawful use of copyrighted movies by viewing or listening to them are not hindered in doing so in any material way by the anti-trafficking provision of the DMCA.[245]

[338] Nor does the DMCA materially affect quotation of language from CSS-protected movies. Anyone with access to a compliant DVD player may play the movie and write down or otherwise record the sound for the purpose of quoting it in another medium.

The DMCA does have a notable potential impact on uses that copy portions of a DVD movie because compliant DVD players are designed so as to prevent copying. In consequence, even though the fair use doctrine permits limited copying of copyrighted works in appropriate circumstances, the CSS encryption of DVD movies, coupled with the characteristics of licensed DVD players, limits such uses absent circumvention of CSS.[246] Moreover, the anti-trafficking provision of the DMCA may prevent technologically unsophisticated persons who wish to copy portions of DVD movies for fair use from obtaining the means of doing so. It is the interests of these individuals upon which defendants rely most heavily in contending that the DMCA violates the First Amendment because it deprives such persons of an asserted constitutional right to make fair use of copyrighted materials.[247]

As the foregoing suggests, the interests of persons wishing to circumvent CSS in order to make lawful use of the copyrighted movies it protects are remarkably varied. Some presumably are technologically sophisticated and therefore capable of circumventing CSS without access to defendants' or other purveyors' decryption programs; many presumably are not. Many of the possible fair uses may be made without circumventing CSS while others, i.e., those requiring copying, may not. Hence, the question whether Section 1201(a)(2) as applied here substantially affects rights, much less constitutionally protected rights, of members of the "fair use community" cannot be decided in bloc, without consideration of the circumstances of each member or similarly situated groups of members. Thus, the prudential concern with ensuring that constitutional questions be decided only when the facts before the Court so require counsels against permitting defendants to mount an overbreadth challenge here.[248]

Second, there is no reason to suppose here that prospective fair users will be deterred from asserting their alleged rights by fear of sanctions imposed by the DMCA or the Copyright Act.

Third, we do not deal here with "pure speech." Rather, the issue concerns dissemination of technology that is principally functional in nature. The same consideration that warrants restraint in applying the overbreadth doctrine to statutes regulating [339] expressive conduct applies here. For reasons previously expressed, government's interest in regulating the functional capabilities of computer code is no less weighty than its interest in regulating the nonspeech aspects of expressive conduct.

Finally, there has been no persuasive evidence that the interests of persons who wish access to the CSS algorithm in order to study its encryption methodology or to evaluate theories regarding decryption raise serious problems. The statute contains an exception for good faith encryption research.[249]

Accordingly, defendants will not be heard to mount an overbreadth challenge to the DMCA in this context.

4. Vagueness

Defendants argue also that the DMCA is unconstitutionally vague because the terms it employs are not understandable to persons of ordinary intelligence and because they are subject to discriminatory enforcement.[250]

As the Supreme Court has made clear, one who "engages in some conduct that is clearly proscribed [by the challenged statute] cannot complain of the vagueness of the law as applied to the conduct of others."[251] There can be no serious doubt that posting a computer program the sole purpose of which is to defeat an encryption system controlling access to plaintiffs copyrighted movies constituted an "offer to the public" of "technology [or a] product" that was "primarily designed for the purpose of circumventing" plaintiffs' access control system.[252] Defendants thus engaged in conduct clearly proscribed by the DMCA and will not be heard to complain of any vagueness as applied to others.

C. Linking

As indicated above, the DMCA reaches links deliberately created by a web site operator for the purpose of disseminating technology that enables the user to circumvent access controls on copyrighted works. The question is whether it may do so consistent with the First Amendment.

Links bear a relationship to the information superhighway comparable to the relationship that roadway signs bear to roads but they are more functional. Like roadway signs, they point out the direction. Unlike roadway signs, they take one almost instantaneously to the desired destination with the mere click of an electronic mouse. Thus, like computer code in general, they have both expressive and functional elements. Also like computer code, they are within the area of First Amendment concern. Hence, the constitutionality of the DMCA as applied to defendants' linking is determined by the same O'Brien standard that governs trafficking in the circumvention technology generally.

There is little question that the application of the DMCA to the linking at issue in this case would serve, at least to some extent, the same substantial governmental interest as its application to defendants' posting of the DeCSS code. Defendants' posting and their linking amount to very much the same thing. Similarly, the regulation of the linking at issue here is "unrelated to the suppression of free expression" for the same reason as the regulation of the posting. The third prong of the O'Brien test as subsequently interpreted — whether the "regulation promotes a substantial government interest that would be achieved less effectively absent the regulation"[253] — is a somewhat closer call.

[340] Defendants and, by logical extension, others may be enjoined from posting DeCSS. Plaintiffs may seek legal redress against anyone who persists in posting notwithstanding this decision. Hence, barring defendants from linking to sites against which plaintiffs readily may take legal action would advance the statutory purpose of preventing dissemination of circumvention technology, but it would do so less effectively than would actions by plaintiffs directly against the sites that post. For precisely this reason, however, the real significance of an anti-linking injunction would not be with U.S. web sites subject to the DMCA, but with foreign sites that arguably are not subject to it and not subject to suit here. An anti-linking injunction to that extent would have a significant impact and thus materially advance a substantial governmental purpose. In consequence, the Court concludes that an injunction against linking to other sites posting DeCSS satisfies the O'Brien standard. There remains, however, one further important point.

Links are "what unify the [World Wide] Web into a single body of knowledge, and what makes the Web unique."[254] They "are the mainstay of the Internet and indispensable to its convenient access to the vast world of information."[255] They often are used in ways that do a great deal to promote the free exchange of ideas and information that is a central value of our nation. Anything that would impose strict liability on a web site operator for the entire contents of any web site to which the operator linked therefore would raise grave constitutional concerns, as web site operators would be inhibited from linking for fear of exposure to liability.[256] And it is equally clear that exposing those who use links to liability under the DMCA might chill their use, as some web site operators confronted with claims that they have posted circumvention technology falling within the statute may be more inclined to remove the allegedly offending link rather than test the issue in court. Moreover, web sites often contain a great variety of things, and a ban on linking to a site that contains DeCSS amidst other content threatens to restrict communication of this information to an excessive degree.

The possible chilling effect of a rule permitting liability for or injunctions against Internet hyperlinks is a genuine concern. But it is not unique to the issue of linking. The constitutional law of defamation provides a highly relevant analogy. The threat of defamation suits creates the same risk of self-censorship, the same chilling effect, for the traditional press as a prohibition of linking to sites containing circumvention technology poses for web site operators. Just as the potential chilling effect of defamation suits has not utterly immunized the press from all actions for defamation, however, the potential chilling effect of DMCA liability cannot utterly immunize web site operators from all actions for disseminating circumvention technology. And the solution to the problem is the same: the adoption of a standard of culpability sufficiently high to immunize the activity, whether it is publishing a newspaper or linking, except in cases in which the conduct in question has little or no redeeming constitutional value.

In the defamation area, this has been accomplished by a two-tiered constitutional standard. There may be no liability under the First Amendment for defamation of a public official or a public figure unless the plaintiff proves, by clear and convincing evidence, that the defendant published the offending statement with knowledge of its [341] falsity or with serious doubt as to its truth.[257] Liability in private figure cases, on the other hand, may not be imposed absent proof at least of negligence under Gertz v. Robert Welch, Inc.[258] A similar approach would minimize any chilling effect here.

The other concern — that a liability based on a link to another site simply because the other site happened to contain DeCSS or some other circumvention technology in the midst of other perfectly appropriate content could be overkill — also is readily dealt with. The offense under the DMCA is offering, providing or otherwise trafficking in circumvention technology. An essential ingredient, as explained above, is a desire to bring about the dissemination. Hence, a strong requirement of that forbidden purpose is an essential prerequisite to any liability for linking.

Accordingly, there may be no injunction against, nor liability for, linking to a site containing circumvention technology, the offering of which is unlawful under the DMCA, absent clear and convincing evidence that those responsible for the link (a) know at the relevant time that the offending material is on the linked-to site, (b) know that it is circumvention technology that may not lawfully be offered, and (c) create or maintain the link for the purpose of disseminating that technology.[259] Such a standard will limit the fear of liability on the part of web site operators just as the New York Times standard gives the press great comfort in publishing all sorts of material that would have been actionable at common law, even in the face of flat denials by the subjects of their stories. And it will not subject web site operators to liability for linking to a site containing proscribed technology where the link exists for purposes other than dissemination of that technology.

In this case, plaintiffs have established by clear and convincing evidence that these defendants linked to sites posting DeCSS, knowing that it was a circumvention device. Indeed, they initially touted it as a way to get free movies,[260] and they later maintained the links to promote the dissemination of the program in an effort to defeat effective judicial relief. They now know that dissemination of DeCSS violates the DMCA. An anti-linking injunction on these facts does no violence to the First Amendment. Nor should it chill the activities of web site operators dealing with different materials, as they may be held liable only on a compelling showing of deliberate evasion of the statute.

IV. Relief

A. Injury to Plaintiffs

The DMCA provides that "[a]ny person injured by a violation of section 1201 or 1202 may bring a civil action in an appropriate United States court for such violation."[261] For the reasons set forth above, plaintiffs obviously have suffered and, absent effective relief, will continue to suffer injury by virtue of the ready availability of means of circumventing the CSS access control system on their DVDs. Defendants nevertheless argue that they have [342] not met the injury requirement of the statute. Their contentions are a farrago of distortions.

They begin with the assertion that plaintiffs have failed to prove that decrypted motion pictures actually are available.[262] To be sure, plaintiffs might have done a better job of proving what appears to be reasonably obvious. They certainly could have followed up on more of the 650 movie titles listed on the web site described above to establish that the titles in fact were available. But the evidence they did adduce is not nearly as meager as defendants would have it. Dr. Shamos did pursue and obtain a pirated copy of a copyrighted, DivX'd motion picture from someone he met in an Internet chat room. An MPAA investigator downloaded between five and ten such copies. And the sudden appearance of listings of available motion pictures on the Internet promptly after DeCSS became available is far from lacking in evidentiary significance. In any case, in order to obtain the relief sought here, plaintiffs need show only a threat of injury by reason of a violation of the statute.[263] The Court finds that plaintiffs overwhelmingly have established a clear threat of injury by reason of defendants' violation of the statute.

Defendants next maintain that plaintiffs exaggerate the extent of the threatened injury. They claim that the studios in fact believe that DeCSS is not a threat.[264] But the only basis for that contention is a couple of quotations from statements that the MPAA or one or another studio made (or considered making but did not in fact issue) to the effect that it was not concerned about DeCSS or that it was inconvenient to use.[265] These statements, however, were attempts to "spin" public opinion.[266] They do not now reflect the actual state of affairs or the studios' actual views, if they ever did.

Third, defendants contend that there is no evidence that any decrypted movies that may be available, if any there are, were decrypted with DeCSS. They maintain that "[m]any utilities and devices ... can decrypt DVDs equally well and often faster and with greater ease than by using DeCSS."[267] This is a substantial exaggeration. There appear to be a few other so-called rippers, but the Court finds that DeCSS is usable on a broader range of DVDs than any of the others. Further, there is no credible evidence that any other utility is faster or easier to use than DeCSS. Indeed, the Court concludes that DeCSS is the superior product, as evidenced by the fact that the web site promoting DivX as a tool for obtaining usable copies of copyrighted movies recommends the use of DeCSS, rather than anything else, for the decryption step[268] and that the apparent availability of pirated motion pictures shot up so dramatically upon the introduction of DeCSS.[269]

[343] B. Permanent Injunction and Declaratory Relief

Plaintiffs seek a permanent injunction barring defendants from posting DeCSS on their web site and from linking their site to others that make DeCSS available.

The starting point, as always, is the statute. The DMCA provides in relevant part that the court in an action brought pursuant to its terms "may grant temporary and permanent injunctions on such terms as it deems reasonable to prevent or restrain a violation...."[270] Where statutes in substance so provide, injunctive relief is appropriate if there is a reasonable likelihood of future violations absent such relief[271] and, in cases brought by private plaintiffs, if the plaintiff lacks an adequate remedy at law.[272]

In this case, it is quite likely that defendants, unless enjoined, will continue to violate the Act. Defendants are in the business of disseminating information to assist hackers in "cracking" various types of technological security systems. And while defendants argue that they promptly stopped posting DeCSS when enjoined preliminarily from doing so, thus allegedly demonstrating their willingness to comply with the law, their reaction to the preliminary injunction in fact cuts the other way. Upon being enjoined from posting DeCSS themselves, defendants encouraged others to "mirror" the information — that is, to post DeCSS — and linked their own web site to mirror sites in order to assist users of defendants' web site in obtaining DeCSS despite the injunction barring defendants from providing it directly. While there is no claim that this activity violated the letter of the preliminary injunction, and it therefore presumably was not contumacious, and while its status under the DMCA was somewhat uncertain, it was a studied effort to defeat the purpose of the preliminary injunction. In consequence, the Court finds that there is a substantial likelihood of future violations absent injunctive relief.

There also is little doubt that plaintiffs have no adequate remedy at law. The only potential legal remedy would be an action for damages under Section 1203(c), which provides for recovery of actual damages or, upon the election of the plaintiff, statutory damages of up to $2,500 per offer of DeCSS. Proof of actual damages in a case of this nature would be difficult if not [344] virtually impossible, as it would involve proof of the extent to which motion picture attendance, sales of broadcast and other motion picture rights, and sales and rentals of DVDs and video tapes of movies were and will be impacted by the availability of DVD decryption technology. Difficulties in determining what constitutes an "offer" of DeCSS in a world in which the code is available to much of the world via Internet postings, among other problems, render statutory damages an inadequate means of redressing plaintiffs' claimed injuries. Indeed, difficulties such as this have led to the presumption that copyright and trademark infringement cause irreparable injury,[273] i.e., injury for which damages are not an adequate remedy.[274] The Court therefore holds that the traditional requirements for issuance of a permanent injunction have been satisfied. Yet there remains another point for consideration.

Defendants argue that an injunction in this case would be futile because DeCSS already is all over the Internet. They say an injunction would be comparable to locking the barn door after the horse is gone. And the Court has been troubled by that possibility. But the countervailing arguments overcome that concern.

To begin with, any such conclusion effectively would create all the wrong incentives by allowing defendants to continue violating the DMCA simply because others, many doubtless at defendants' urging, are doing so as well. Were that the law, defendants confronted with the possibility of injunctive relief would be well advised to ensure that others engage in the same unlawful conduct in order to set up the argument that an injunction against the defendants would be futile because everyone else is doing the same thing.

Second, and closely related, is the fact that this Court is sorely "troubled by the notion that any Internet user ... can destroy valuable intellectual property rights by posting them over the Internet."[275] While equity surely should not act where the controversy has become moot, it ought to look very skeptically at claims that the defendant or others already have done all the harm that might be done before the injunction issues.

The key to reconciling these views is that the focus of injunctive relief is on the defendants before the Court. If a plaintiff seeks to enjoin a defendant from burning a pasture, it is no answer that there is a wild fire burning in its direction. If the defendant itself threatens the plaintiff with irreparable harm, then equity will enjoin the defendant from carrying out the threat even if other threats abound and even if part of the pasture already is burned.

These defendants would harm plaintiffs every day on which they post DeCSS on their heavily trafficked web site and link to other sites that post it because someone who does not have DeCSS thereby might obtain it. They thus threaten plaintiffs with immediate and irreparable injury. They will not be allowed to continue to do so simply because others may do so as well. In short, this Court, like others than have faced the issued, is "not persuaded that modern technology has withered the strong right arm of equity."[276] Indeed, [345] the likelihood is that this decision will serve notice on others that "the strong right arm of equity" may be brought to bear against them absent a change in their conduct and thus contribute to a climate of appropriate respect for intellectual property rights in an age in which the excitement of ready access to untold quantities of information has blurred in some minds the fact that taking what is not yours and not freely offered to you is stealing. Appropriate injunctive[277] and declaratory relief will issue simultaneously with this opinion.

V. Miscellaneous Contentions

There remain for consideration two other matters, plaintiffs' application for costs and attorney's fees and defendants' pre-trial complaints concerning discovery.

The DMCA permits awards of costs and attorney's fees to the prevailing party in the discretion of the Court.[278] Insofar as attorney's fees are concerned, this is an exception to the so-called "American rule" pursuant to which each side in a litigation customarily bears its own attorney's fees. As this was a test case raising important issues, it would be inappropriate to award attorney's fees pursuant to the DMCA.[279] There is no comparable reason, however, for failing to award costs, particularly as taxable costs are related to the excessive discovery demands that the Court already has commented upon.[280]

A final word is in order in view of defendants' repeated pretrial claims that their discovery efforts were being thwarted. During the course of the trial, they applied for leave to take one deposition, which was granted. At no point did they make any showing that they were hampered in presenting their case or meeting the plaintiffs' case by virtue of any failure to obtain discovery. They applied for no continuance. They have not sought a new trial. And though they estimated that their case would take several weeks to present, the entire trial was completed in six days. Indeed, in the Court's view, the trial fully vindicated its pretrial assessment that there were, in actuality, very few genuinely disputed questions of material fact, and most of those involved expert testimony that was readily available to both sides.[281] Examination of the trial record will reveal that virtually the entire case could have been stipulated, although the legal conclusions to be drawn from the stipulated facts of course would have remained a matter of controversy.

VI. Conclusion

In the final analysis, the dispute between these parties is simply put if not necessarily simply resolved.

[346] Plaintiffs have invested huge sums over the years in producing motion pictures in reliance upon a legal framework that, through the law of copyright, has ensured that they will have the exclusive right to copy and distribute those motion pictures for economic gain. They contend that the advent of new technology should not alter this long established structure.

Defendants, on the other hand, are adherents of a movement that believes that information should be available without charge to anyone clever enough to break into the computer systems or data storage media in which it is located. Less radically, they have raised a legitimate concern about the possible impact on traditional fair use of access control measures in the digital era.

Each side is entitled to its views. In our society, however, clashes of competing interests like this are resolved by Congress. For now, at least, Congress has resolved this clash in the DMCA and in plaintiffs' favor. Given the peculiar characteristics of computer programs for circumventing encryption and other access control measures, the DMCA as applied to posting and linking here does not contravene the First Amendment. Accordingly, plaintiffs are entitled to appropriate injunctive and declaratory relief.

SO ORDERED.

[1] 17 U.S.C. § 1201 et seq.

[2] Shortly after the commencement of the action, the Court granted plaintiffs' motion for a preliminary injunction barring defendants from posting DeCSS. Universal City Studios, Inc. v. Reimerdes, 82 F.Supp.2d 211 (S.D.N.Y. 2000). Subsequent motions to expand the preliminary injunction to linking and to vacate it were consolidated with the trial on the merits. This opinion reflects the Court's findings of fact, conclusions of law and decision on the merits.

The Court notes the receipt of a number of amicus submissions. Although many were filed by defendants' counsel on behalf of certain amici, and therefore were of debatable objectivity, the amicus submissions considered as a group were helpful.

[3] David Nimmer, A Riff on Fair Use in the Digital Millennium Copyright Act, 148 U.PA. L.REV. 673, 739-41 (2000) (hereinafter A Riff on Fair Use).

[4] United States v. Microsoft Corp., 84 F.Supp.2d 9, 13 (D.D.C.1999). The quotations are from a finding of fact in the Microsoft case of which the Court, after notice to and without objection by the parties, takes judicial notice. Tr. at 1121. Subsequent references to Microsoft findings reflect similar instances of judicial notice without objection.

[5] United States v. Microsoft Corp., 84 F.Supp.2d at 13.

[6] Open source is a software development model by which the source code to a computer program is made available publicly under a license that gives users the right to modify and redistribute the program. The program develops through this process of modification and redistribution and through a process by which users download sections of code from a web site, modify that code, upload it to the same web site, and merge the modified sections into the original code. Trial transcript ("Tr.") (Craig) at 1008.

[7] Tr. (Pavlovich) at 936.

[8] Tr. (DiBona) at 994-95.

[9] Id.

[10] THE NEW YORK PUBLIC LIBRARY, SCIENCE DESK REFERENCE 496 (1995) (hereinafter SCIENCE DESK REFERENCE); see also Tr. (Felten) at 758-59; Hon. Shira A. Scheindlin & Jeffrey Rabkin, Electronic Discovery in Federal Civil Litigation: Is Rule 34 Up to the Task? 34 B.C.L.REV. 327, 333-35 (2000).

[11] Tr. (Felten) at 759; Scheindlin & Rabkin, 34 B.C.L.REV. at 333-35.

[12] SCIENCE DESK REFERENCE, at 501.

[13] Id.

[14] Id.

[15] See Tr. (Felten) at 759-60.

[16] The Court's findings with respect to the definitions of source code and object code are taken from the trial testimony of Robert Schumann, Tr. at 258, and Drs. Edward Felten, Tr. at 738-39, 757-63, David S. Touretzky, Tr. at 1065-91, and Andrew Appel, Tr. at 1096, and the deposition testimony of Dr. Harold Abelson, Ex. AZO at 34-37, 45-49. See also Ex. BBE.

[17] Frequently, programs written in such languages must be transformed or translated into machine readable form by other programs known as compilers.

[18] This to some degree is an oversimplification. Object code often is directly executable by the computer into which it is entered. It sometimes contains instructions, however, that are readable only by computers containing a particular processor, such as a Pentium processor, or a specific operating system such as Microsoft Windows. In such instances, a computer lacking the specific processor or operating system can execute the object code only if it has an emulator program that simulates the necessary processor or operating system or if the code first is run through a translator program that converts it into object code readable by that computer. Ex. BBE.

[19] United States v. Microsoft Corp., 84 F.Supp.2d at 13.

[20] Tr. (Shamos) at 67-68.

[21] United States v. Microsoft Corp., 84 F.Supp.2d at 13.

[22] Id. at 14.

[23] Id.

[24] Id.

[25] Not too many years ago, the most common transportable storage media were 5¼ inch flexible magnetic disks. Their flexibility led to their being referred to as "floppies." They have been replaced almost entirely with today's 3½ inch disks, which are enclosed in hard plastic housings and which therefore are not flexible or "floppy." The earlier name, however, has stuck.

[26] Tr. (King) at 403-04.

[27] Tr. (Shamos) at 24.

[28] Id. at 24-25.

[29] Such devices are referred to subsequently as compliant.

[30] Tr. (Shamos) at 25.

[31] Tr. (Schumann) at 273.

[32] Tr. (Ramadge) at 911.

[33] Id. at 911-12.

[34] Ex. 2.1-2.34; 3.1-3.34.

[35] Tr. (King) at 404.

[36] Tr. (Corley) at 787, 827.

[37] Tr. (Corley) at 777, 790, 795; Ex. 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16; 79 (Corley Dec.) ¶ 1.

[38] See Tr. (Corley) at 781.

[39] Tr. (Corley) 786-87.

[40] Id. at 787.

[41] Ex. 1.2 (Redomega Crim, How Domains Are Stolen, 2600: THE HACKER QUARTERLY, Summer 2000, at 43).

[42] Ex. 1.16 (Schlork, Snooping via MS-Mail, 2600: THE HACKER QUARTERLY, Winter 1996-97, at 28).

[43] Ex. 1.14 (Thomas Icom, Cellular Interception Techniques, 2600: THE HACKER QUARTERLY, Spring 1995, at 23).

[44] Ex. 1.12 (nux, Fun at Costco, 2600: THE HACKER QUARTERLY, Summer 1999, at 12).

[45] Ex. 1.19 (PhranSys Drak3, Hacking FedEx, 2600: THE HACKER QUARTERLY, Autumn 1997, at 14).

[46] Ex. 1.19 (Agent Steal, Busted! A Complete Guide to Getting Caught, 2600: THE HACKER QUARTERLY, Autumn 1997, at 6).

[47] Tr. (Corley) at 790; Ex. 52-54, 64, 79 (Corley Dec.) ¶ 20; 97.

Interestingly, defendants' copyright both their magazine and the material on their web site to prevent others from copying their works. Tr. (Corley) at 832; Ex. 96 (Corley Dep.) at 23-24.

[48] Tr. (Corley) at 791; Ex. 28.

[49] Tr. (Corley) at 791, 829, 848; Ex. 28.

[50] Tr. (King) at 402.

[51] Id. at 404, 468.

[52] Id. at 408, 468, 470.

[53] Id. at 404-05.

[54] Id. at 404-05, 468-70.

[55] Id. at 406.

[56] Id. at 405-06, 471, 476-78.

[57] Id. at 405, 470-71, 479.

[58] Id. at 406-07, 502-04.

[59] An algorithm is a recipe that contains instructions for completing a task. It can be expressed in any language, from natural spoken language to computer programming language. Ex. AZO (Abelson Dep.) at 9-10.

[60] The licensing function initially was performed by MEI and Toshiba. Subsequently, MEI and Toshiba granted a royalty free license to the DVD Copy Control Association ("DVD CCA"), which now handles the licensing function. Tr. (King) at 485-86, 510; Ex. XXY (Attaway Dep.) at 31. The motion picture companies themselves license CSS from the DVD CCA. Ex. XYY (Attaway Dep.) at 31-32.

[61] See, e.g., Ex. AHV §§ 5, 6.2.

[62] Tr. (King) at 450-51, 492-93; Ex. XXY (Attaway Dep.) at 61-62; Ex. AHV.

[63] The administrative fee is one million yen, now about $9,200, for each "membership category" selected by the licensee. Twelve membership categories are available, and one or more are selected by a licensee depending on the use which the licensee intends to make of the licensed technology. The membership categories are: content provider, authoring studio, DVD disc replicator, DVD player manufacturer, DVD-ROM drive manufacturer, DVD decoder manufacturer, descramble module manufacturer, authentication chip manufacturer for DVD-ROM drive, authenticator manufacturer for DVD decoder, integrated product manufacturer, and reseller. Ex. AJB, AIZ, AOV, AOU, AOQ.

[64] Tr. (King) at 437-38; see also Tr. (Pavolvich) at 961; Ex. BD.

[65] Tr. (King) at 408-09.

[66] Id. at 409.

[67] Id. at 417-18.

[68] Id. at 442.

[69] Revenue from the distribution of DVDs makes up approximately 35 percent of Warner Brothers' total worldwide revenue from movie distribution in the home video market. Id. at 403.

[70] Distribution in the home video market accounts for approximately 40 percent of Warner Brothers' total income from movie distribution. Id.

[71] Tr. (Johansen) at 619-22, 633, 639.

[72] Id. at 619-21, 634; (Schumann) at 246-48. Mr. Johansen testified that the "De" in DeCSS stands for "decrypt." Tr. (Johansen) at 628.

[73] Tr. (Johansen) at 622-23, 638; Ex. 9 at SCH-000846. Mr. Johansen did not post the source code on his Web site. Tr. (Johansen) at 635.

[74] Tr. (Johansen) at 620.

[75] Id. at 620.

[76] Id. at 621-22.

[77] Id. at 621-22, 624; (Stevenson) at 214.

[78] Tr. (Johansen) at 623.

[79] Substantial questions have been raised both at trial and elsewhere as to the veracity of Mr. Johansen's claim. See Ex. CS, at S10006 ("Our analysis indicates that the primary technical breakthroughs were developed outside of the Linux development groups.").

[80] Tr. (Johansen) at 626-27.

[81] Ex. 97, 107, 126.

[82] Tr. (Stevenson) at 217-18, 226-29; (Schumann) at 290, 338-41; (Johansen) at 641; (Reider) at 681-85. One, DOD (Drink or Die) Speed Ripper, does not work with all DVDs that DeCSS will decrypt. Id.; Ex.CS, at S10011; Ex. 9. Some of these programs perform only a portion of what DeCSS does and must be used in conjunction with others in order to decrypt the contents of a DVD. Tr. (Schuman) at 290, 338-39. Some of defendants' claims about these other means proved baseless at trial. See Tr. (Pavlovich) at 965-68.

[83] Tr. (Corley) at 791; Ex. 28.

[84] Tr. (Corley) at 791, 829, 848; Ex. 28.

[85] Tr. (Corley) at 829-30, 845.

[86] Id. at 831, 845.

[87] Id. at 829-30, 845.

[88] Id. at 830; (Shamos) at 38. As Mr. Corley testified, the download process generally begins with the appearance of a dialog box, or small window, prompting the user to confirm the location on the user's computer hard drive where the downloaded software will be stored. The actual download does not begin until the user provides the computer with this information. Tr. (Corley) at 830. It is possible also to create a link that commences the download immediately upon being clicked. See Tr. (Touretzky) at 1082-83.

[89] Tr. (Reider) at 652.

[90] Tr. (King) at 435, 548; (Reider) at 653; Ex. 55.

[91] The other two defendants entered into consent decrees with plaintiffs. Plaintiffs subsequently amended the complaint to add 2600 Enterprises, Inc. as a defendant.

[92] Preliminary Injunction, Jan. 20, 2000 (DI 6); Universal City Studios, Inc., 82 F.Supp.2d 211.

[93] Tr., Jan. 20, 2000 (DI 17) at 85.

[94] Tr. (Corley) at 791; Ex. 51.

[95] Tr. (Corley) at 834; Ex. 96 (Corley Dep.) at 151-53.

[96] Tr. (Corley) at. 791; Ex. 79 (Corley Dec.) ¶ 21; 126.

[97] Ex. 106.

[98] Tr. (Shamos) at 36-42; (Schumann) at 272-73; 265-66 (defendants' stipulation that their web site links to other sites containing executable copies of DeCSS).

[99] Tr. (Shamos) at 36-42; (Schumann) at 272-73.

[100] Tr. (Shamos) at 39-40; see also Ex. AYZ (Hunt Dep.) at 18.

[101] Tr. (Shamos) at 41-42; (Schumann) at 272-73.

[102] Tr. (Shamos) at 41-42, 156.

[103] Tr. (Schumann) at 273; Ex. AYZ (Hunt Dep.) at 26.

[104] Tr. (Johansen) at 628; see also Ex. AZN (Simons Dep.) at 48.

[105] Tr. (Shamos) at 42; (Ramadge) at 900.

[106] See Tr. (Shamos) at 54-56; Ex. 112-13.

[107] DivX effects what is known as "lossy" compression — it achieves its reduction in file size by eliminating some of the data in the file being compressed. The trick, however, is that it seeks to do so by eliminating data that is imperceptible, or nearly so, to the human observer. Tr. (Shamos) at 43-44; (Ramadge) at 882-98.

[108] Tr. (Shamos) at 51.

[109] Defendants produced an expert whose DivX of a DeCSS decrypted file was of noticeably lower quality than that of plaintiffs' expert's DivX'd film. The reasons for the difference are not clear. The Court is satisfied, however, that it is possible to make high quality 650 MB DivX'd copies of many films.

[110] Tr. (Ramadge) at 930.

[111] Tr. (Shamos) at 56-57.

The copies do not require resynchronization of the sound and graphics.

[112] Tr. (Shamos) at 95.

[113] Tr. (Shamos) at 89-90, 98; (Peterson) at 865; (Pavlovich) at 943.

[114] Tr. (Shamos) at 90; (Felten) at 772; (Peterson) at 879.

[115] See, e.g., Tr. (Peterson) at 861, 875-76.

[116] Id. (Shamos) at 87-88.

[117] Id.

[118] Id. at 77.

[119] It should be noted here that the transmission time achieved by plaintiff's expert, Dr. Shamos, almost certainly was somewhat skewed because the work was done late at night on a university system after the close of the regular school year, conditions favorable to high effective transmission rates due to low traffic on the system.

[120] Tr. (Schumann) at 334-36.

[121] Tr. (Shamos) at 68-76.

[122] Id. at 76-77.

[123] Ex. AYY (Reider Dep.) at 98-101; see also id. at 121-23.

[124] Ex. 116B.

[125] Tr. (Reider) at 661.

[126] Tr. (King) at 418.

[127] Id. at 420.

[128] WIPO Copyright Treaty, Apr. 12, 1997, Art. 11, S. Treaty Doc. No. 105-17 (1997), available at 1997 WL 447232.

[129] There is an excellent account of the legislative history of the statute. Nimmer, A Riff on Fair Use, 148 U.PA.L.REV. at 702-38.

[130] See generally S.REP. No. 105-190, 105th Cong., 2d Sess. ("SENATE REP."), at 2-8 (1998).

[131] H.R.REP. No. 105-551(I), 105th Cong., 2d Sess. ("JUDICIARY COMM.REP."), at 17 (1998).

[132] Id. at 18.

[133] Plaintiffs rely also on Section 1201(b), which is very similar to Section 1201(a)(2) except that the former applies to trafficking in means of circumventing protection offered by a technological measure that effectively protects "a right of a copyright owner in a work or a portion thereof" whereas the latter applies to trafficking in means of circumventing measures controlling access to a work. See generally 1 MELVILLE B. NIMMER & DAVID NIMMER, NIMMER ON COPYRIGHT ("NIMMER") § 12A.03[C] (1999). In addition, as noted below, certain of the statutory exceptions upon which defendants have relied apply only to Section 1201(a)(2).

[134] 17 U.S.C. § 1201(a)(2). See also 1 NIMMER § 12A.03[1][a], at 12A-16.

[135] In their Post-Trial Brief, defendants argue that "at least some of the members of Congress" understood § 1201 to be limited to conventional devices, specifically `black boxes,' as opposed to computer code. Def. Post-Trial Mem. at 21. However, the statute is clear that it prohibits "any technology," not simply black boxes. 17 U.S.C. § 1201(a)(2) (emphasis added).

[136] 17 U.S.C. § 1201(a)(3)(A).

[137] Decryption or avoidance of an access control measure is not "circumvention" within the meaning of the statute unless it occurs "without the authority of the copyright owner." 17 U.S.C. § 1201(a)(3)(A). Defendants posit that purchasers of a DVD acquire the right "to perform all acts with it that are not exclusively granted to the copyright holder." Based on this premise, they argue that DeCSS does not circumvent CSS within the meaning of the statute because the Copyright Act does not grant the copyright holder the right to prohibit purchasers from decrypting. As the copyright holder has no statutory right to prohibit decryption, the argument goes, decryption cannot be understood as unlawful circumvention. Def. Post-Trial Mem. 10-13. The argument is pure sophistry. The DMCA proscribes trafficking in technology that decrypts or avoids an access control measure without the copyright holder consenting to the decryption or avoidance. See JUDICIARY COMM.REP. at 17-18 (fair use applies "where the access is authorized"). Defendants' argument seems to be a corruption of the first sale doctrine, which holds that the copyright holder, notwithstanding the exclusive distribution right conferred by Section 106(3) of the Copyright Act, 17 U.S.C. § 106(3), is deemed by its "first sale" of a copy of the copyrighted work to have consented to subsequent sale of the copy. See generally 2 NIMMER §§ 8.11-8.12.

[138] Id. § 1201(a)(3)(B).

[139] RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, *9 (W.D.Wash. Jan.18, 2000).

[140] HOUSE COMM. ON JUDICIARY, SECTION-BY-SECTION ANALYSIS OF H.R.2281 AS PASSED BY THE UNITED STATES HOUSE OF REPRESENTATIVES ON AUGUST 4, 1998 ("SECTION-BY-SECTION ANALYSIS"), at 10 (Comm.Print 1998) (emphasis in original).

[141] H.R.REP. No. 105-551(II), 105th Cong., 2d Sess. ("COMMERCE COMM.REP."), at 39 (1998).

[142] Defendants, in a reprise of their argument that DeCSS is not a circumvention device, argue also that CSS does not effectively control access to copyrighted works within the meaning of the statute because plaintiffs authorize avoidance of CSS by selling their DVDs. Def. Post-Trial Mem. 10-13. The argument is specious in this context as well. See supra note 137.

[143] Tr. (Johansen) at 619; (Corley) 833-34.

[144] Def. Post-Trial Mem. at 2.

[145] 1 NIMMER § 12A.03[A], at 12A-15 (1999 Supp.).

[146] See id. § 12A.03[B], at 12A-25 to 12A-26.

[147] See Def. Post-Trial Mem. at 13.

[148] 17 U.S.C. §§ 1201(f)(1), (2).

[149] Id. § 1201(f)(3).

[150] Def. Post-Trial Mem. at 13-15.

[151] COMMERCE COMM.REP. at 43.

[152] 17 U.S.C. § 1201(g)(4).

[153] Id. § 1201(g)(2).

[154] Id. § 1201(g)(3).

[155] Ex. 96 (Corley Dep.) at 33.

[156] In any case, Section 1201(g), where its requirements are met, is a defense only to claims under Section 1201(a)(2), not those under Section 1201(b).

[157] Def.Mem. in Opp. to Prelim.Inj. (DI 11) at 11-12.

[158] Id. § 1201(j)(1).

[159] Like Section 1201(g), moreover, Section 1201(j) provides no defense to a Section 1201(b) claim.

[160] 17 U.S.C. § 107.

[161] Indeed, as many have pointed out, technological means of controlling access to works create a risk, depending upon future technological and commercial developments, of limiting access to works that are not protected by copyright such as works upon which copyright has expired. See, e.g., Nimmer, A Riff on Fair Use, 148 U.PA.L.REV. at 738-40; Hannibal Travis, Comment, Pirates of the Information Infrastructure: Blackstonian Copyright and the First Amendment, 15 BERKELEY TECH.L.J. 777, 861 (2000) (hereinafter Pirates of the Information Infrastructure); Yochai Benkler, Free as the Air to Common Use: First Amendment Constraints on Enclosure of the Public Domain, 74 N.Y.U.L.REV. 354, 421 (1999);

[162] Of course, one might quote the verbal portion of the sound track, rerecord both verbal and nonverbal portions of the sound track, and video tape or otherwise record images produced on a monitor when the DVD is played on a compliant DVD player.

[163] 17 U.S.C. § 107.

[164] See, e.g., COMMERCE COMM.REP. 25-26.

[165] JUDICIARY COMM.REP. 18.

[166] Id.

[167] 17 U.S.C. §§ 1201(a)(1)(B)-(E).

The rule-making is under way. 65 F.R. 14505-06 (Mar. 17, 2000); see also (visited July 28, 2000).

[168] 17 U.S.C. §§ 1201(d), (f), (g), (j).

[169] 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984).

[170] Id. at 443, 446, 104 S.Ct. 774.

[171] RealNetworks, Inc., 2000 WL 127311, at *8 (quoting 1 NIMMER § 12A.18[B], at 12A-130) (internal quotation marks omitted).

[172] SECTION-BY-SECTION ANALYSIS 9 ("The Sony test of `capab[ility] of substantial non-infringing uses,' while still operative in cases claiming contributory infringement of copyright, is not part of this legislation....").

[173] 17 U.S.C. § 1201(a)(2).

[174] Tr. (Schumann) at 275-76.

[175] Id. at 261-62.

[176] For example, a web page maintained by a radio station might provide a hyperlink to a weather report by programming its page to transfer the user to a National Weather Service site if the user clicks on the "weather" hyperlink.

[177] 17 U.S.C. § 1201(a)(2).

[178] See 2 THE COMPACT EDITION OF THE OXFORD ENGLISH DICTIONARY 3372 (1971).

[179] See 2 id. 2340.

[180] See 1 id. 1979.

[181] See, e.g., Strom v. Goldman, Sachs & Co., 202 F.3d 138, 146-47 (2d Cir.1999).

[182] See DVD Copy Control Ass'n, Inc. v. McLaughlin, No. CV 786804, 2000 WL 48512, *4 (Cal.Super. Jan. 21, 2000) ("website owner cannot be held responsible for all of the content of the sites to which it provides links"); Richard Raysman & Peter Brown, Recent Linking Issues, N.Y.L.J., Feb. 8, 2000, p. 3, col. 1 (same).

[183] Roth v. United States, 354 U.S. 476, 483, 77 S.Ct. 1304, 1 L.Ed.2d 1498 (1957) (obscenity). See also, e.g., Sable Communications of California, Inc. v. F.C.C., 492 U.S. 115, 124, 109 S.Ct. 2829, 106 L.Ed.2d 93 (1989) (obscenity); Bose Corp. v. Consumers Union of U.S., Inc., 466 U.S. 485, 504, 104 S.Ct. 1949, 80 L.Ed.2d 502 (1984) (libel, obscenity, fighting words, child pornography); Beauharnais v. People of State of Illinois, 343 U.S. 250, 266, 72 S.Ct. 725, 96 L.Ed. 919 (1952) (defamation); Chaplinsky v. State of New Hampshire, 315 U.S. 568, 571-72, 62 S.Ct. 766, 86 L.Ed. 1031 (1942) (fighting words).

[184] Robert Post, Encryption Source Code and the First Amendment, 15 BERKELEY TECH. L.J. 713, 714 (2000); see R.A.V. v. City of St. Paul, Minnesota, 505 U.S. 377, 382, 112 S.Ct. 2538, 120 L.Ed.2d 305 (1992) (statements that categories of speech are "unprotected" are not literally true; characterization indicates only that they are subject to content based regulation).

[185] The Court is indebted to Professor David Touretzky of Carnegie-Mellon University, who testified on behalf of defendants, for his lucid explication of this point. See Tr. (Touretzky) at 1066-84 & Ex. BBE, CCO, CCP, CCQ. As will appear, however, the point does not lead the Court to the same conclusion as Dr. Touretzky.

[186] LEONARD LEVY, FREEDOM OF SPEECH IN EARLY AMERICAN HISTORY: LEGACY OF SUPPRESSION passim (1960); see also 4 RONALD D. ROTUNDA & JOHN E. NOWAK, TREATISE ON CONSTITUTIONAL LAW § 20.5 (1999); 4 WILLIAM BLACKSTONE, COMMENTARIES ON THE LAWS OF ENGLAND 151-52 (1769).

[187] See, e.g., Hurley v. Irish-American Gay, Lesbian and Bisexual Group of Boston, 515 U.S. 557, 569, 115 S.Ct. 2338, 132 L.Ed.2d 487 (1995).

[188] Junger v. Daley, 209 F.3d 481, 485 (6th Cir.2000); Bernstein v. U.S. Dept. of Justice, 176 F.3d 1132, 1141, reh'g granted and opinion withdrawn, 192 F.3d 1308 (9th Cir.1999); Bernstein v. U.S. Dept. of State, 922 F.Supp. 1426, 1436 (N.D.Cal.1996) (First Amendment extends to source code); see Karn v. U.S. Dept. of State, 925 F.Supp. 1, 10 (D.D.C.1996) (assuming First Amendment extends to source code).

[189] Police Dept. of City of Chicago v. Mosley, 408 U.S. 92, 95-96, 92 S.Ct. 2286, 33 L.Ed.2d 212 (1972).

[190] Turner Broadcasting System, Inc. v. F.C.C., 512 U.S. 622, 641, 114 S.Ct. 2445, 129 L.Ed.2d 497 (1994); accord, R.A.V., 505 U.S. at 382-83, 112 S.Ct. 2538.

[191] Sable Communications of California, Inc. v. F.C.C., 492 U.S. at 126, 109 S.Ct. 2829.

[192] Turner Broadcasting System, Inc., 512 U.S. at 662, 114 S.Ct. 2445 (citing United States v. O'Brien, 391 U.S. 367, 377, 88 S.Ct. 1673, 20 L.Ed.2d 672 (1968)).

[193] See, e.g., United States v. O'Brien, 391 U.S. at 376, 88 S.Ct. 1673.

[194] During the Vietnam era, many who opposed the war, the draft, or both burned draft cards as acts of protest. Lower federal courts typically concluded or assumed that the expression inherent in this act of protest brought the behavior entirely within the scope of the First Amendment. THOMAS I. EMERSON, THE SYSTEM OF FREEDOM OF EXPRESSION 82 (1970). In United States v. O'Brien, 391 U.S. at 376, 88 S.Ct. 1673, however, the Supreme Court rejected "the view that an apparently limitless variety of conduct can be labeled `speech' whenever the person engaged in the conduct intends thereby to express an idea" and adopted a new approach, discussed below, to the regulation of expressive conduct as opposed to pure speech. Accord, Spence v. State of Washington, 418 U.S. 405, 410, 94 S.Ct. 2727, 41 L.Ed.2d 842 (1974). The point for present purposes is that the presence of expression in some broader mosaic does not result in the entire mosaic being treated as "speech."

[195] Id. at 376.

[196] Def. Post-Trial Mem. at 15-16.

[197] Ward v. Rock Against Racism, 491 U.S. 781, 791, 109 S.Ct. 2746, 105 L.Ed.2d 661 (1989); accord, Hill v. Colorado, ___ U.S. ___, ___, 120 S.Ct. 2480, 2491, 147 L.Ed.2d 597 (2000); Turner Broadcasting System, Inc., 512 U.S. at 642, 114 S.Ct. 2445; Madsen v. Women's Health Center, Inc., 512 U.S. 753, 763, 114 S.Ct. 2516, 129 L.Ed.2d 593 (1994).

[198] See generally Turner Broadcasting System, Inc., 512 U.S. at 646-49, 114 S.Ct. 2445 (holding that "must-carry" provisions of the Cable Television Consumer Protection and Competition Act of 1992 are content neutral in view of "overriding congressional purpose ... unrelated to the content of expression" manifest in detailed legislative history).

[199] 475 U.S. 41, 106 S.Ct. 925, 89 L.Ed.2d 29 (1986).

[200] Id. at 46-49, 106 S.Ct. 925; see also Young v. American Mini Theatres, Inc., 427 U.S. 50, 71 n. 34, 96 S.Ct. 2440, 49 L.Ed.2d 310 (1976).

[201] See Karn, 925 F.Supp. at 10 (regulations controlling export of computer code content neutral); Benkler, 74 N.Y.U.L.REV. at 413 (DMCA "content and viewpoint neutral").

[202] Turner Broadcasting System, Inc., 512 U.S. at 662, 114 S.Ct. 2445 (quoting O'Brien, 391 U.S. at 377, 88 S.Ct. 1673 (internal quotation marks omitted)); see also, e.g., United States v. Weslin, 156 F.3d 292, 297 (2d Cir. 1998).

[203] Turner Broadcasting System, Inc., 512 U.S. at 662, 114 S.Ct. 2445; see also Hill, ___ U.S. at ___, 120 S.Ct. at 2494.

[204] Ward, 491 U.S. at 799, 109 S.Ct. 2746 (quoting United States v. Albertini, 472 U.S. 675, 689, 105 S.Ct. 2897, 86 L.Ed.2d 536 (1985)).

[205] U.S. CONST., art. I, § 8 (Copyright Clause).

[206] COMMERCE COMM.REP. 94-95; SENATE REP. 21-22, 143.

[207] Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 558, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985).

[208] It is conceivable that technology eventually will provide means of limiting access only to copyrighted materials and only for uses that would infringe the rights of the copyright holder. See, e.g., Travis, 15 BERKELEY TECH.L.J. at 835-36; Mark Gimbel, Note, Some Thoughts on the Implications of Trusted Systems for Intellectual Property Law, 50 Stan. L.Rev. 1671, 1875-78 (1998); Mark Stefik, Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing, 12 BERKELEY TECH. L.J. 137, 138-40 (1997). We have not yet come so far.

[209] 209 F.3d 481 (6th Cir.2000).

[210] Id. at 485.

[211] 391 U.S. at 377, 88 S.Ct. 1673.

[212] 209 F.3d at 485.

[213] See Lee Tien, Publishing Software as a Speech Act, 15 BERKELEY TECH.L.J. 629, 694-701 (2000). Professor Tien's analysis itself has been criticized. Robert Post, Encryption Source Code and the First Amendment, 15 BERKELEY TECH.L.J. 715 (2000).

[214] This perhaps is not as surprising as first might appear. Computer "viruses" are other programs, an understanding of which is aided by the biological analogy evident in their name. See, e.g., Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess and Steve R. White, Fighting Computer Viruses, SCIENTIFIC AMERICAN, (visited Aug. 16, 2000) .

[215] DAVID E. LILIENFELD & PAUL D. STOLLEY, FOUNDATIONS OF EPIDEMIOLOGY 38-41 & Fig. 3-1 (3d ed.1994); JOHN P. Fox, CARRIE E. HALL & LILA R. ELVEBACK, EPIDEMIOLOGY-MAN AND DISEASE 246-47 (1970).

[216] Of course, not everyone who obtains DeCSS or some other decryption program necessarily will use it to engage in copyright infringement, just as not everyone who is exposed to a contagious disease contracts it. But that is immaterial. The critical point is that the combination of (a) the manner in which the ability to infringe is spread and (b) the lack of any practical means of controlling infringement at the point at which it occurs once the capability is broadly disseminated render control of infringement by controlling availability of the means of infringement far more critical in this context.

[217] See, e.g., Guido Calabresi & Jeffrey O. Cooper, New Directions in Tort Law, 30 VAL. U.L.REV. 859, 870-72 (1996).

[218] As has been noted above, some categories of speech, which often have been referred to inaccurately as "unprotected," may be regulated on the basis of their content. R.A.V., 505 U.S. at 382-83, 112 S.Ct. 2538. These have included obscenity and "fighting words," to name two such categories. The determination of the types of speech which may be so regulated has been made through a process termed by one leading commentator as "definitional" balancing — a weighing of the value of free expression in these areas against its likely consequences and the legitimate interests of government. Melville B. Nimmer, The Right to Speak from Times to Time: First Amendment Theory Applied to Libel and Misapplied to Privacy, 56 CAL.L.REV. 935, 942 (1968); see R.A.V., 505 U.S. at 382-83, 112 S.Ct. 2538. Thus, even if one accepted defendants' argument that the anti-trafficking prohibition of the DMCA is content based because it regulates only code that "expresses" the programmer's "ideas" for circumventing access control measures, the question would remain whether such code — code designed to circumvent measures controlling access to private or legally protected data — nevertheless could be regulated on the basis of that content. For the reasons set forth in the text, the Court concludes that it may. Alternatively, even if such a categorical or definitional approach were eschewed, the Court would uphold the application of the DMCA now before it on the ground that this record establishes an imminent threat of danger flowing from dissemination of DeCSS that far outweighs the need for unfettered communication of that program. See Landmark Communications, Inc. v. Commonwealth of Virginia, 435 U.S. 829, 842-43, 98 S.Ct. 1535, 56 L.Ed.2d 1 (1978).

[219] For example, one might imagine a computer program the object of which was to teach the user a particular view of a subject, e.g., evolution or creationism. Such a program, like this one, would be within the area of First Amendment concern and functional. Yet a regulation barring its use would be subject to a quite different analysis. Such a ban, for example, might be based on the content of the message the program caused the computer to deliver to the student-user and thus quite clearly be content based. Similarly, the function — teaching — would not involve the same likelihood that the dissemination would bring about a harm that the government has a legitimate right to prevent.

[220] U.S. v. Washington Post Co., 403 U.S. 713, 714, 91 S.Ct. 2140, 29 L.Ed.2d 822 (1971) (per curiam) (quoting Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 70, 83 S.Ct. 631, 9 L.Ed.2d 584 (1963)).

[221] See, e.g., Posadas de Puerto Rico Assoc. v. Tourism Co. of Puerto Rico, 478 U.S. 328, 106 S.Ct. 2968, 92 L.Ed.2d 266 (1986) (upholding restrictions on casino gambling advertising); Times Film Corp. v. Chicago, 365 U.S. 43, 81 S.Ct. 391, 5 L.Ed.2d 403 (1961) (upholding local ordinance requiring review of films by municipal officials as prerequisite to issuance of permits for public screening); Salinger v. Random House, Inc., 811 F.2d 90 (2d Cir.) (enjoining biographer's use of subject's unpublished letters as copyright infringement), cert. denied, 484 U.S. 890, 108 S.Ct. 213, 98 L.Ed.2d 177 (1987); Dallas Cowboys Cheerleaders v. Pussycat Cinema, Ltd., 604 F.2d 200 (2d Cir.1979) (enjoining distribution of film on ground that actresses' uniforms infringed plaintiff's trademark). See generally LAURENCE H. TRIBE, AMERICAN CONSTITUTIONAL LAW § 12-36, at 1045-46 (1988) (hereinafter TRIBE).

[222] See, e.g., Charles of the Ritz Group, Ltd. v. Quality King Distributors, Inc., 832 F.2d 1317 (2d Cir.1987) (upholding injunction against commercial slogan on ground that slogan created a likelihood of confusion and is therefore "beyond the protective reach of the First Amendment"); Vondran v. McLinn, No. 95-20296, 1995 WL 415153, *6 (N.D.Cal. July 5, 1995) (enjoining defendant's false and disparaging remarks regarding plaintiff's patented process for making fiber reinforced concrete on the ground that the remarks are not protected by the First Amendment).

[223] See, e.g., Times Film Corp. v. City of Chicago, 365 U.S. 43, 81 S.Ct. 391, 5 L.Ed.2d 403 (upholding local ordinance requiring review by city officials of all films as a prerequisite to grant of permit for public screening despite concerns of First Amendment violations); Posadas de Puerto Rico Associates, 478 U.S. 328, 106 S.Ct. 2968, 92 L.Ed.2d 266 (upholding restrictions on advertising despite finding that the advertising fell within ambit of First Amendment); Dallas Cowboys Cheerleaders, Inc., 604 F.2d 200 (enjoining distribution of film for trademark infringement despite claim that injunction violated distributor's First Amendment rights).

[224] 4 WILLIAM BLACKSTONE, COMMENTARIES ON THE LAWS OF ENGLAND 151-52 (1769).

[225] See Pittsburgh Press Co. v. Pittsburgh Com'n on Human Relations, 413 U.S. 376, 390, 93 S.Ct. 2553, 37 L.Ed.2d 669 (1973).

[226] Martin H. Redish, The Proper Role of the Prior Restraint Doctrine in First Amendment Theory, 70 VA.L.REV. 53, 54 (1983) (hereinafter "Redish"). See also LAURENCE H. TRIBE, AMERICAN CONSTITUTIONAL LAW § 12-34, at 1040-41 (2d ed.1988).

[227] John Calvin Jeffries, Jr., Rethinking Prior Restraint, 92 YALE L.J. 409, 419 (1983).

[228] Despite the conventional wisdom, it is far from clear that an injunction necessarily is a prior restraint. Our circuit, for example, has suggested that the prior restraint doctrine does not apply to content neutral injunctions. See e.g., Dallas Cowboys Cheerleaders, Inc., 604 F.2d at 206. At least one commentator persuasively has argued that there is little justification for placing injunctions, at least permanent injunctions issued after trial, in a disfavored constitutional position. Jeffries, 92 YALE L.J. at 426-34. Nevertheless, there is no reason to decide that question in this case. The following discussion therefore assumes that the permanent injunction plaintiff seeks would be a "prior restraint," although it concludes that it would not be unconstitutional.

[229] 283 U.S. 697, 51 S.Ct. 625, 75 L.Ed. 1357 (1931).

[230] 403 U.S. 713, 91 S.Ct. 2140, 29 L.Ed.2d 822 (1971).

[231] 427 U.S. 539, 96 S.Ct. 2791, 49 L.Ed.2d 683 (1976).

[232] See H.R.REP. 106-216, 106th Cong., 1st Sess. (1999) ("Notwithstanding [penalties for copyright infringement] copyright piracy of intellectual property flourishes, assisted in large part by today's world of advanced technologies. For example, industry groups estimate that counterfeiting and piracy of computer software cost the affected copyright holders more than $11 billion last year (others believe the figure is closer to $20 billion). In some countries, software piracy rates are as high as 97% of all sales. The U.S. rate is far lower (25%), but the dollar losses ($2.9 billion) are the highest worldwide. The effect of this volume of theft is substantial: lost U.S. jobs, lost wages, lower tax revenue, and higher prices for honest purchasers of copyrighted software. Unfortunately, the potential for this problem to worsen is great."); S.REP. 106-140, 106th Cong., 1st Sess. (1999) ("Trademark owners are facing a new form of piracy on the Internet caused by acts of `cybersquatting.'"); S.REP. 105-190, 105th Cong., 2d Sess. (1998) ("Due to the ease with which digital works can be copied and distributed worldwide virtually instantaneously, copyright owners will hesitate to make their works readily available on the Internet without reasonable assurance that they will be protected against massive piracy."); H.R.REP. 105-339, 105th Cong., 1st Sess. (1997) ("[C]opyright piracy flourishes in the software world.").

[233] Mark A. Lemley & Eugene Volokh, Freedom of Speech and Injunctions in Intellectual Property Cases, 48 DUKE L.J. 147, 210 & n. 275 (1998).

[234] See, e.g., Pittsburgh Press Co., 413 U.S. at 390, 93 S.Ct. 2553 ("The special vice of a prior restraint is that communication will be suppressed . . . before an adequate determination that it is unprotected by the First Amendment."); Lemley & Volokh, 48 DUKE L.J. at 200-02, 211; see Redish, 70 VA.L.REV. at 75-83.

[235] See Lemley & Volokh, 48 DUKE L.J. at 211-12, 215 (acknowledging that high likelihood of success diminishes risk of erroneous suppression of protected speech).

[236] Def. Post-Trial Mem. at 22-24.

[237] Id. at 22.

Defendants argue also that the DMCA as applied is overbroad in that "it would prohibit defendants from posting and making programs such as DeCSS available in any form, from English to any level of computer code." Id. The overbreadth doctrine, however, enables litigants to challenge a statute not merely because their own First Amendment rights are violated, but because the statute may cause others to abstain from constitutionally protected expression. Broadrick v. Oklahoma, 413 U.S. 601, 612, 93 S.Ct. 2908, 37 L.Ed.2d 830 (1973). This aspect of defendants' argument, which in any case is an overstatement, therefore does not refer to overbreadth in the sense relevant here.

[238] Broadrick, 413 U.S. at 610, 93 S.Ct. 2908.

[239] Gooding v. Wilson, 405 U.S. 518, 520-21, 92 S.Ct. 1103, 31 L.Ed.2d 408 (1972) (quoting Dombrowski v. Pfister, 380 U.S. 479, 486, 85 S.Ct. 1116, 14 L.Ed.2d 22 (1965)).

[240] Gooding, 405 U.S. at 521, 92 S.Ct. 1103.

[241] Los Angeles Police Dept. v. United Reporting Pub. Corp., 528 U.S. 32, 120 S.Ct. 483, 489, 145 L.Ed.2d 451 (1999) (quoting New York v. Ferber, 458 U.S. 747, 769, 102 S.Ct. 3348, 73 L.Ed.2d 1113 (1982) (quoting Broadrick, 413 U.S. at 613, 93 S.Ct. 2908)).

[242] Id. at 489 (quoting Ferber, 458 U.S. at 770, 102 S.Ct. 3348 (quoting Broadrick, 413 U.S. at 615, 93 S.Ct. 2908)).

[243] Broadrick, 413 U.S. at 612, 93 S.Ct. 2908.

[244] Tr. (King) at 441.

[245] Defendants argue that the right of third parties to view DVD movies on computers running the Linux operating system will be materially impaired if DeCSS is not available to them. However, the technology to build a Linux-based DVD player has been licensed by the DVD CCA to at least two companies, and there is no reason to think that others wishing to develop Linux players could not obtain licenses if they so chose. Tr. (King) at 437-38. Therefore, enforcement of the DMCA to prohibit the posting of DeCSS would not materially impair the ability of Linux users to view DVDs on Linux machines. Further, it is not evident that constitutional protection of free expression extends to the type of device on which one plays copyrighted material. Therefore, even assuming arguendo that the ability of third parties to view DVD movies on Linux systems were materially impaired by enforcement of the DMCA in this case, this impairment would not necessarily implicate the First Amendment rights of these third parties.

[246] CSS encryption coupled with the characteristics of compliant DVD players also forecloses copying of digital sound files. It is not clear, however, that this is a substantial impediment to copying sound from motion picture DVDs. A DVD can be played on a compliant player and the sound re-recorded. Whether the sound quality thus obtained would be satisfactory might well depend upon the particular use to which the copy was put.

[247] The same point might be made with respect to copying of works upon which copyright has expired. Once the statutory protection lapses, the works pass into the public domain. The encryption on a DVD copy of such a work, however, will persist. Moreover, the combination of such a work with a new preface or introduction might result in a claim to copyright in the entire combination. If the combination then were released on DVD and encrypted, the encryption would preclude access not only to the copyrighted new material, but to the public domain work. As the DMCA is not yet two years old, this does not yet appear to be a problem, although it may emerge as one in the future.

[248] Defendants argue that "there is now a full evidentiary record" and that the overbreadth issue therefore should be decided. Def. Post-Trial Mem. at 22 n. 11. With respect, the evidence as to the impact of the anti-trafficking provision of the DMCA on prospective fair users is scanty and fails adequately to address the issues.

This is not to minimize the interests of the amici who have submitted briefs in this case. The Court simply does not have a sufficient evidentiary record on which to evaluate their claims.

[249] 17 U.S.C. § 1201(g).

[250] Def. Post-Trial Mem. at 24.

[251] Village of Hoffman Estates v. Flipside, 455 U.S. 489, 495, 102 S.Ct. 1186, 71 L.Ed.2d 362 (1982).

[252] See 17 U.S.C. § 1201(a)(2)(A).

[253] Ward, 491 U.S. at 799, 109 S.Ct. 2746 (quoting United States v. Albertini, 472 U.S. 675, 689, 105 S.Ct. 2897, 86 L.Ed.2d 536 (1985)).

[254] ACLU v. Reno, 929 F.Supp. 824, 837 (E.D.Pa.1996), aff'd, 521 U.S. 844, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997).

[255] Richard Raysman & Peter Brown, Recent Linking Issues, N.Y.L.J., Feb. 8, 2000, p. 3, col. 1.

[256] Cf. New York Times Co. v. Sullivan, 376 U.S. 254, 271-73, 283-88, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964).

[257] Id. at 283, 84 S.Ct. 710; Curtis Pub. Co. v. Butts, 388 U.S. 130, 155, 87 S.Ct. 1975, 18 L.Ed.2d 1094 (1967); St. Amant v. Thompson, 390 U.S. 727, 731, 88 S.Ct. 1323, 20 L.Ed.2d 262 (1968); ROBERT D. SACK, SACK ON DEFAMATION § 1.2.4 (3d ed.1999).

[258] 418 U.S. 323, 347-38, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).

[259] In evaluating purpose, courts will look at all relevant circumstances. Sites that advertise their links as means of getting DeCSS presumably will be found to have created the links for the purpose of disseminating the program. Similarly, a site that deep links to a page containing only DeCSS located on a site that contains a broad range of other content, all other things being equal, would more likely be found to have linked for the purpose of disseminating DeCSS than if it merely links to the home page of the linked-to site.

[260] Tr. (Corley) at 820.

[261] 17 U.S.C. § 1203(a).

[262] Def. Post-Trial Mem. at 27-28.

[263] The statute expressly authorizes injunctions to prevent or restrain violations, 17 U.S.C. § 1203(b)(1), thus demonstrating that the requisite injury need only be threatened.

[264] Def. Post-Trial Mem. at 28.

[265] Id. at 28-29.

[266] See, e.g., Ex. AYZ (Hunt Dep.) at 94-104.

[267] Id. 30.

[268] Ex. 113.

[269] Defendants' argument would lack merit even if there were credible proof that other circumvention devices actually exist and produce results comparable to DeCSS. The available movies must have been decrypted with DeCSS or something else. As far as this record discloses, any such device or technology would violate the DMCA for the same reasons as does DeCSS. In consequence, this case comes within the principle of Summers v. Tice, 33 Cal.2d 80, 199 P.2d 1 (1948). Where, as here, two or more persons take substantially identical wrongful actions, one and only one of which had to be the source of the plaintiffs' injury, and it is equally likely that one inflicted the injury as the other, the burden of proof on causation shifts to the defendants, each of which is liable absent proof that its action did not cause the injury. See 4 Fowler V. Harper & Fleming James, Jr., THE LAW OF TORTS §§ 101-04 (2d ed.1996).

Defendants' efforts to avoid the consequences of this common sense principle are unpersuasive. They argue, for example, that plaintiffs may not invoke the theory unless they join as defendants everyone who may have contributed to the injury. Def. Post-Trial Mem. at 32 n. 18 (citing Ex. UZ). It would be difficult to imagine a more nonsensical requirement in the context of this case. Where, as here, harm is done by dissemination of information over the Internet, probably by a substantial number of people all over the world, defendants' proposed rule would foreclose judicial relief anywhere because joinder of all plainly would be impossible in any one place, and technology does not permit identification of which wrongdoer's posting or product led to which pirated copy of a copyrighted work.

[270] 17 U.S.C. § 1203(b)(1).

[271] See, e.g., S.E.C. v. Unique Financial Concepts, Inc., 196 F.3d 1195, 1199 n. 2 (11th Cir.1999) (injunction under Section 20(b) of the Securities Act of 1933, 15 U.S.C. § 77t(b), which permits an injunction "upon a proper showing," requires "a reasonable likelihood that the wrong will be repeated"); Commodity Futures Trading Com'n v. Hunt, 591 F.2d 1211, 1220 (7th Cir.1979) (same under Commodity Exchange Act, 7 U.S.C. § 13a-1(b)); S.E.C. v. Bausch & Lomb Inc., 565 F.2d 8, 18 (2d Cir.1977) (reasonable likelihood of future violations required under § 21(d) of Securities Exchange Act of 1934, 15 U.S.C. § 78u(d), which permits an injunction "upon a proper showing" where person "engaged or ... about to engage in" violation of statute).

[272] See, e.g., Rondeau v. Mosinee Paper Corp., 422 U.S. 49, 57, 95 S.Ct. 2069, 45 L.Ed.2d 12 (1975) (injunctive relief in private action under § 13(d) of the Securities Exchange Act of 1934, 15 U.S.C. § 78m(d), as added by the Williams Act, requires a showing of irreparable harm and inadequacy of legal remedies).

[273] Tough Traveler, Ltd. v. Outbound Prods., 60 F.3d 964, 967-68 (2d Cir.1995) (trademark); Fisher-Price, Inc. v. Well-Made Toy Mfg. Corp., 25 F.3d 119, 124 (2d Cir.1994) (copyright).

[274] See, e.g., Northwestern Nat'l Ins. Co. v. Alberts, 937 F.2d 77, 80 (2d Cir.1991) ("The irreparable injury requisite ... overlaps with the absent lack of adequate remedy at law necessary to establish the equitable rights."); Buffalo Forge Co. v. Ampco-Pittsburgh Corp., 638 F.2d 568, 569 (2d Cir.1981) ("There must also be a showing of irreparable harm, the absence of an adequate remedy at law, which is the sine qua non for the grant of such equitable relief.")

[275] Religious Technology Center v. Netcom On-Line Communication Services, Inc., 923 F.Supp. 1231, 1256 (N.D.Cal.1995).

[276] Com-Share, Inc. v. Computer Complex, Inc., 338 F.Supp. 1229, 1239 (E.D.Mich. 1971).

[277] During the trial, Professor Touretzky of Carnegie Mellon University, as noted above, convincingly demonstrated that computer source and object code convey the same ideas as various other modes of expression, including spoken language descriptions of the algorithm embodied in the code. Tr. (Touretzky) at 1068-69; Ex. BBE, CCO, CCP, CCQ. He drew from this the conclusion that the preliminary injunction irrationally distinguished between the code, which was enjoined, and other modes of expression that convey the same idea, which were not, id., although of course he had no reason to be aware that the injunction drew that line only because that was the limit of the relief plaintiffs sought. With commendable candor, he readily admitted that the implication of his view that the spoken language and computer code versions were substantially similar was not necessarily that the preliminary injunction was too broad; rather, the logic of his position was that it was either too broad or too narrow. Id. at 1070-71. Once again, the question of a substantially broader injunction need not be addressed here, as plaintiffs have not sought broader relief.

[278] 17 U.S.C. § 1203(b)(4)-(b)(5).

[279] See Fogerty v. Fantasy, Inc., 510 U.S. 517, 534, 114 S.Ct. 1023, 127 L.Ed.2d 455 (1994) (articulating factors relevant to fee awards under the Copyright Act).

[280] Universal City Studios, Inc. v. Reimerdes, 104 F.Supp.2d 334 (S.D.N.Y. 2000).

[281] The chief factual issue actually litigated at trial was the speed with which decrypted files could be transmitted over the Internet and other networks.

6.2 Universal City Studios, Inc. v. Corley 6.2 Universal City Studios, Inc. v. Corley

273 F.3d 429 (2nd Cir. 2001)

UNIVERSAL CITY STUDIOS, INC., PARAMOUNT PICTURES CORPORATION, METRO-GOLDWYN-MAYER STUDIOS INC., TRISTAR PICTURES, INC., COLUMBIA PICTURES INDUSTRIES, INC., TIME WARNER ENTERTAINMENT COMPANY, L.P., DISNEY ENTERPRISES INC., TWENTIETH CENTURY FOX FILM CORPORATION, PLAINTIFFS-APPELLEES,
v.
ERIC CORLEY, ALSO KNOWN AS EMMANUEL GOLDSTEIN, AND 2600 ENTERPRISES INC., DEFENDANTS-APPELLANTS,
UNITED STATES OF AMERICA, INTERVENOR.

Docket No. 00-9185.
UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT.
Argued: May 1, 2001.
Finally Submitted: May 30, 2001.
Decided: November 28, 2001.

[433] Kathleen Sullivan, Stanford, Cal. (Martin Garbus, Edward Hernstadt, Frankfurt Garbus Kurnit Klein & Selz, New York, N.Y.; Cindy A. Cohn, Lee Tien, Robin Gross, Elec. Frontier Found., San Francisco, Cal., on the brief), for Defendants-Appellants.

Charles S. Sims, New York, N.Y. (Leon P. Gold, Jon A. Baumgarten, Carla M. Miller, Matthew J. Morris, Proskauer Rose, New York, N.Y., on the brief), for Plaintiffs-Appellees.

Daniel S. Alter, Asst. U.S. Atty., New York, N.Y. (Mary Jo White, U.S. Atty., Marla Alhadeff, Asst. U.S. Atty., New York, N.Y., on the brief), for Intervenor United States of America.

(Prof. Peter Jazsi, Wash. College of Law, American Univ., Wash., D.C.; Prof. Jessica Litman, Wayne State Univ., Detroit, Mich.; Prof. Pamela Samuelson, Univ. of Cal. at Berkeley, Berkeley, Cal.; Ann Beeson, Christopher Hansen, American Civil Liberties Union Foundation, New York, N.Y., submitted a brief in support of Defendants-Appellants, for amici curiae American Civil Liberties Union et al.).

(Andrew Grosso, Wash., D.C., submitted a brief in support of Defendants-Appellants for amicus curiae ACM Committee on Law and Computing Technology).

(James S. Tyre, Culver City, Cal., submitted a brief in support of Defendants-Appellants, for amici curiae Dr. Harold Abelson et al.).

(Edward A. Cavazos, Gavino Morin, Cavazos, Morin, Langenkamp & Ferraro, Austin, Tex., submitted a brief in support of Defendants-Appellants, for amici curiae Ernest Miller et al.).

(Arnold G. Rheinhold, Cambridge, Mass., submitted a brief amicus curiae in support of Defendant-Appellant 2600 Enterprises, Inc.).

[434] (Prof. Julie E. Cohen, Georgetown Univ. Law Center, Wash., D.C., submitted a brief in support of Defendants-Appellants, for amici curiae intellectual property law professors).

(Jennifer S. Granick, Stanford, Cal., submitted a brief in support of Defendants-Appellants, for amici curiae Dr. Steven Bellovin et al.).

(Prof. Yochai Benkler, N.Y. Univ. School of Law, New York, N.Y.; Prof. Lawrence Lessig, Stanford Law School, Stanford, Cal., submitted a brief amici curiae in support of Defendants-Appellants).

(David A. Greene, First Amendment Project, Oakland, Cal.; Jane E. Kirtley, Erik F. Ugland, Silha Center for the Study of Media Ethics and Law, Univ. of Minn., Minneapolis, Minn.; Milton Thurm, Thurm & Heller, New York, N.Y., submitted a brief in support of Defendants-Appellants, for amici curiae Online News Ass'n et al.).

(Prof. Rodney A. Smolla, Univ. of Richmond School of Law, Richmond Va., submitted a brief in support of Plaintiffs-Appellees, for amici curiae Prof. Erwin Chemerinsky et al.).

(David E. Kendall, Paul B. Gaffney, Williams & Connolly, Wash., D.C.; David M. Proper, National Football League and NFL Properties, New York, N.Y.; Thomas J. Ostertag, Office of the Commissioner of Baseball, New York, N.Y., submitted a brief in support of Plaintiff-Appellees, for amici curiae Recording Ind. Ass'n of Am. et al.).

(Jeffrey L. Kessler, Robert G. Sugarman, Geoffrey D. Berman, Weil, Gotshal & Manges Llp, New York, N.Y., submitted a brief in support of Plaintiffs-Appellees, for amicus curiae DVD Copy Control Ass'n, Inc.).

Before: Newman and Cabranes, Circuit Judges, and Thompson,[*] District Judge.

Jon O. Newman, Circuit Judge.

When the Framers of the First Amendment prohibited Congress from making any law "abridging the freedom of speech," they were not thinking about computers, computer programs, or the Internet. But neither were they thinking about radio, television, or movies. Just as the inventions at the beginning and middle of the 20th century presented new First Amendment issues, so does the cyber revolution at the end of that century. This appeal raises significant First Amendment issues concerning one aspect of computer technology—encryption to protect materials in digital form from unauthorized access. The appeal challenges the constitutionality of the Digital Millennium Copyright Act ("DMCA"), 17 U.S.C. § 1201 et seq. (Supp. V 1999) and the validity of an injunction entered to enforce the DMCA.

Defendant-Appellant Eric C. Corley and his company, 2600 Enterprises, Inc., (collectively "Corley," "the Defendants," or "the Appellants") appeal from the amended final judgment of the United States District Court for the Southern District of New York (Lewis A. Kaplan, District Judge), entered August 23, 2000, enjoining them from various actions concerning a decryption program known as "DeCSS." Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 346 (S.D.N.Y. 2000) ("Universal II"). The injunction primarily bars the Appellants from posting DeCSS on their web site and from knowingly linking [435] their web site to any other web site on which DeCSS is posted. Id. at 346-47. We affirm.

Introduction

Understanding the pending appeal and the issues it raises requires some familiarity with technical aspects of computers and computer software, especially software called "digital versatile disks" or "DVDs," which are optical media storage devices currently designed to contain movies.[1] Those lacking such familiarity will be greatly aided by reading Judge Kaplan's extremely lucid opinion, Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000) ("Universal I"), beginning with his helpful section "The Vocabulary of this Case," id. at 305-09.

This appeal concerns the anti-trafficking provisions of the DMCA, which Congress enacted in 1998 to strengthen copyright protection in the digital age. Fearful that the ease with which pirates could copy and distribute a copyrightable work in digital form was overwhelming the capacity of conventional copyright enforcement to find and enjoin unlawfully copied material, Congress sought to combat copyright piracy in its earlier stages, before the work was even copied. The DMCA therefore backed with legal sanctions the efforts of copyright owners to protect their works from piracy behind digital walls such as encryption codes or password protections. In so doing, Congress targeted not only those pirates who would circumvent these digital walls (the "anti-circumvention provisions," contained in 17 U.S.C. § 1201(a)(1)), but also anyone who would traffic in a technology primarily designed to circumvent a digital wall (the "anti-trafficking provisions," contained in 17 U.S.C. § 1201(a)(2), (b)(1)).

Corley publishes a print magazine and maintains an affiliated web site geared towards "hackers," a digital-era term often applied to those interested in techniques for circumventing protections of computers and computer data from unauthorized access. The so-called hacker community includes serious computer-science scholars conducting research on protection techniques, computer buffs intrigued by the challenge of trying to circumvent access-limiting devices or perhaps hoping to promote security by exposing flaws in protection techniques, mischief-makers interested in disrupting computer operations, and thieves, including copyright infringers who want to acquire copyrighted material (for personal use or resale) without paying for it.

In November 1999, Corley posted a copy of the decryption computer program "DeCSS" on his web site, http://www.2600.com ("2600.com").[2] DeCSS is designed to circumvent "CSS," the encryption technology [436] that motion picture studios place on DVDs to prevent the unauthorized viewing and copying of motion pictures. Corley also posted on his web site links to other web sites where DeCSS could be found.

Plaintiffs-Appellees are eight motion picture studios that brought an action in the Southern District of New York seeking injunctive relief against Corley under the DMCA. Following a full non-jury trial, the District Court entered a permanent injunction barring Corley from posting DeCSS on his web site or from knowingly linking via a hyperlink to any other web site containing DeCSS. Universal II, 111 F. Supp. 2d at 346-47. The District Court rejected Corley's constitutional attacks on the statute and the injunction. Universal I, 111 F. Supp. 2d at 325-45.

Corley renews his constitutional challenges on appeal. Specifically, he argues primarily that: (1) the DMCA oversteps limits in the Copyright Clause on the duration of copyright protection; (2) the DMCA as applied to his dissemination of DeCSS violates the First Amendment because computer code is "speech" entitled to full First Amendment protection and the DMCA fails to survive the exacting scrutiny accorded statutes that regulate "speech"; and (3) the DMCA violates the First Amendment and the Copyright Clause by unduly obstructing the "fair use" of copyrighted materials. Corley also argues that the statute is susceptible to, and should therefore be given, a narrow interpretation that avoids alleged constitutional objections.

Background

For decades, motion picture studios have made movies available for viewing at home in what is called "analog" format. Movies in this format are placed on videotapes, which can be played on a video cassette recorder ("VCR"). In the early 1990s, the studios began to consider the possibility of distributing movies in digital form as well. Movies in digital form are placed on disks, known as DVDs, which can be played on a DVD player (either a stand-alone device or a component of a computer). DVDs offer advantages over analog tapes, such as improved visual and audio quality, larger data capacity, and greater durability. However, the improved quality of a movie in a digital format brings with it the risk that a virtually perfect copy, i.e., one that will not lose perceptible quality in the copying process, can be readily made at the click of a computer control and instantly distributed to countless recipients throughout the world over the Internet. This case arises out of the movie industry's efforts to respond to this risk by invoking the anti-trafficking provisions of the DMCA.

I. CSS

The movie studios were reluctant to release movies in digital form until they were confident they had in place adequate safeguards against piracy of their copyrighted movies. The studios took several steps to minimize the piracy threat. First, they settled on the DVD as the standard digital medium for home distribution of movies. The studios then sought an encryption scheme to protect movies on DVDs. They enlisted the help of members of the consumer electronics and computer industries, who in mid-1996 developed the Content Scramble System ("CSS"). CSS is an encryption scheme that employs an algorithm configured by a set of "keys" to encrypt a DVD's contents. The algorithm is a type of mathematical formula for transforming the contents of the movie file into gibberish; the "keys" are in actuality strings of 0's and 1's that serve as values for the mathematical formula. Decryption in the case of CSS requires a set of "player keys" [437] contained in compliant DVD players, as well as an understanding of the CSS encryption algorithm. Without the player keys and the algorithm, a DVD player cannot access the contents of a DVD. With the player keys and the algorithm, a DVD player can display the movie on a television or a computer screen, but does not give a viewer the ability to use the copy function of the computer to copy the movie or to manipulate the digital content of the DVD.

The studios developed a licensing scheme for distributing the technology to manufacturers of DVD players. Player keys and other information necessary to the CSS scheme were given to manufacturers of DVD players for an administrative fee. In exchange for the licenses, manufacturers were obliged to keep the player keys confidential. Manufacturers were also required in the licensing agreement to prevent the transmission of "CSS data" (a term undefined in the licensing agreement) from a DVD drive to any "internal recording device," including, presumably, a computer hard drive.

With encryption technology and licensing agreements in hand, the studios began releasing movies on DVDs in 1997, and DVDs quickly gained in popularity, becoming a significant source of studio revenue.[3] In 1998, the studios secured added protection against DVD piracy when Congress passed the DMCA, which prohibits the development or use of technology designed to circumvent a technological protection measure, such as CSS. The pertinent provisions of the DMCA are examined in greater detail below.

II. DeCSS

In September 1999, Jon Johansen, a Norwegian teenager, collaborating with two unidentified individuals he met on the Internet, reverse-engineered a licensed DVD player designed to operate on the Microsoft operating system, and culled from it the player keys and other information necessary to decrypt CSS. The record suggests that Johansen was trying to develop a DVD player operable on Linux, an alternative operating system that did not support any licensed DVD players at that time. In order to accomplish this task, Johansen wrote a decryption program executable on Microsoft's operating system.[4] That program was called, appropriately enough, "DeCSS."

If a user runs the DeCSS program (for example, by clicking on the DeCSS icon on a Microsoft operating system platform) with a DVD in the computer's disk drive, DeCSS will decrypt the DVD's CSS protection, allowing the user to copy the DVD's files and place the copy on the user's hard drive. The result is a very large computer file that can be played on a non-CSS-compliant player and copied, manipulated, and transferred just like any [438] other computer file.[5] DeCSS comes complete with a fairly user-friendly interface that helps the user select from among the DVD's files and assign the decrypted file a location on the user's hard drive. The quality of the resulting decrypted movie is "virtually identical" to that of the encrypted movie on the DVD. Universal I, 111 F. Supp. 2d at 308, 313. And the file produced by DeCSS, while large, can be compressed to a manageable size by a compression software called "DivX," available at no cost on the Internet. This compressed file can be copied onto a DVD, or transferred over the Internet (with some patience).[6]

Johansen posted the executable object code, but not the source code, for DeCSS on his web site. The distinction between source code and object code is relevant to this case, so a brief explanation is warranted. A computer responds to electrical charges, the presence or absence of which [439] is represented by strings of 1's and 0's. Strictly speaking, "object code" consists of those 1's and 0's. Trial Tr. at 759 (Testimony of Professor Edward Felton). While some people can read and program in object code, "it would be inconvenient, inefficient and, for most people, probably impossible to do so." Universal I, 111 F. Supp. 2d at 306. Computer languages have been written to facilitate program writing and reading. A program in such a computer language—BASIC, C, and Java are examples—is said to be written in "source code." Source code has the benefit of being much easier to read (by people) than object code, but as a general matter, it must be translated back to object code before it can be read by a computer. This task is usually performed by a program called a compiler. Since computer languages range in complexity, object code can be placed on one end of a spectrum, and different kinds of source code can be arrayed across the spectrum according to the ease with which they are read and understood by humans. See Trial Exhibits BBC (Declaration of David S. Touretzky), BBE (Touretzky Article: Source v. Object Code: A False Dichotomy). Within months of its appearance in executable form on Johansen's web site, DeCSS was widely available on the Internet, in both object code and various forms of source code. See Trial Exhibit CCN (Touretzky Article: Gallery of CSS Descramblers).

In November 1999, Corley wrote and placed on his web site, 2600.com, an article about the DeCSS phenomenon. His web site is an auxiliary to the print magazine, 2600: The Hacker Quarterly, which Corley has been publishing since 1984.[7] As the name suggests, the magazine is designed for "hackers," as is the web site. While the magazine and the web site cover some issues of general interest to computer users—such as threats to online privacy—the focus of the publications is on the vulnerability of computer security systems, and more specifically, how to exploit that vulnerability in order to circumvent the security systems. Representative articles explain how to steal an Internet domain name and how to break into the computer systems at Federal Express. Universal I, 111 F. Supp. 2d at 308-09.

Corley's article about DeCSS detailed how CSS was cracked, and described the movie industry's efforts to shut down web sites posting DeCSS. It also explained that DeCSS could be used to copy DVDs. At the end of the article, the Defendants posted copies of the object and source code of DeCSS. In Corley's words, he added the code to the story because "in a journalistic world, . . . [y]ou have to show your evidence . . . and particularly in the magazine that I work for, people want to see specifically what it is that we are referring to," including "what evidence . . . we have" that there is in fact technology that circumvents CSS. Trial Tr. at 823. Writing about DeCSS without including the DeCSS code would have been, to Corley, "analogous to printing a story about a picture and not printing the picture." Id. at 825. Corley also added to the article links that he explained would take the reader to other web sites where DeCSS could be found. Id. at 791, 826, 827, 848.

2600.com was only one of hundreds of web sites that began posting DeCSS near the end of 1999. The movie industry tried to stem the tide by sending cease-and-desist letters to many of these sites. These efforts met with only partial success; a number of sites refused to remove [440] DeCSS. In January 2000, the studios filed this lawsuit.[8]

III. The DMCA

The DMCA was enacted in 1998 to implement the World Intellectual Property Organization Copyright Treaty ("WIPO Treaty"), which requires contracting parties to "provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law." WIPO Treaty, Apr. 12, 1997, art. 11, S. Treaty Doc. No. 105-17 (1997), available at 1997 WL 447232. Even before the treaty, Congress had been devoting attention to the problems faced by copyright enforcement in the digital age. Hearings on the topic have spanned several years. See, e.g., WIPO Copyright Treaties Implementation Act and Online Copyright Liability Limitation Act: Hearing on H.R. 2281 and H.R. 2280 Before the Subcomm. on Courts and Intellectual Property of the House Comm. on the Judiciary, 105th Cong. (1997); NII Copyright Protection Act of 1995: Hearings on H.R. 2441 Before the Subcomm. on Courts and Intellectual Property of the House Comm. on the Judiciary, 104th Cong. (1996); NII Copyright Protection Act of 1995: Joint Hearing on H.R. 2441 and S. 1284 Before the Subcomm. on Courts and Intellectual Property of the House Comm. on the Judiciary and the Senate Comm. on the Judiciary, 104th Cong. (1995); H.R. Rep. No. 105-551 (1998); S. Rep. No. 105-190 (1998). This legislative effort resulted in the DMCA.

The Act contains three provisions targeted at the circumvention of technological protections. The first is subsection 1201(a)(1)(A), the anti-circumvention provision.[9] This provision prohibits a person from "circumvent[ing] a technological measure that effectively controls access to a work protected under [Title 17, governing copyright]." The Librarian of Congress is required to promulgate regulations every three years exempting from this subsection individuals who would otherwise be "adversely affected" in "their ability to make noninfringing uses." 17 U.S.C. § 1201(a)(1)(B)-(E).

The second and third provisions are subsections 1201(a)(2) and 1201(b)(1), the "anti-trafficking provisions." Subsection 1201(a)(2), the provision at issue in this case, provides:

No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that—

(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;

(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure [441] that effectively controls access to a work protected under this title.

Id. § 1201(a)(2). To "circumvent a technological measure" is defined, in pertinent part, as "to descramble a scrambled work . . . or otherwise to . . . bypass . . . a technological measure, without the authority of the copyright owner." Id. § 1201(a)(3)(A).

Subsection 1201(b)(1) is similar to subsection 1201(a)(2), except that subsection 1201(a)(2) covers those who traffic in technology that can circumvent "a technological measure that effectively controls access to a work protected under" Title 17, whereas subsection 1201(b)(1) covers those who traffic in technology that can circumvent "protection afforded by a technological measure that effectively protects a right of a copyright owner under" Title 17. Id. § 1201(a)(2), (b)(1) (emphases added). In other words, although both subsections prohibit trafficking in a circumvention technology, the focus of subsection 1201(a)(2) is circumvention of technologies designed to prevent access to a work, and the focus of subsection 1201(b)(1) is circumvention of technologies designed to permit access to a work but prevent copying of the work or some other act that infringes a copyright. See S. Rep. No. 105-190, at 11-12 (1998). Subsection 1201(a)(1) differs from both of these anti-trafficking subsections in that it targets the use of a circumvention technology, not the trafficking in such a technology.

The DMCA contains exceptions for schools and libraries that want to use circumvention technologies to determine whether to purchase a copyrighted product, 17 U.S.C. § 1201(d); individuals using circumvention technology "for the sole purpose" of trying to achieve "interoperability" of computer programs through reverse-engineering, id. § 1201(f); encryption research aimed at identifying flaws in encryption technology, if the research is conducted to advance the state of knowledge in the field, id. § 1201(g); and several other exceptions not relevant here.

The DMCA creates civil remedies, id. § 1203, and criminal sanctions, id. § 1204. It specifically authorizes a court to "grant temporary and permanent injunctions on such terms as it deems reasonable to prevent or restrain a violation." Id. § 1203(b)(1).

IV. Procedural History

Invoking subsection 1203(b)(1), the Plaintiffs sought an injunction against the Defendants, alleging that the Defendants violated the anti-trafficking provisions of the statute. On January 20, 2000, after a hearing, the District Court issued a preliminary injunction barring the Defendants from posting DeCSS. Universal City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211 (S.D.N.Y. 2000).

The Defendants complied with the preliminary injunction, but continued to post links to other web sites carrying DeCSS, an action they termed "electronic civil disobedience." Universal I, 111 F. Supp. 2d at 303, 312. Under the heading "Stop the MPAA [(Motion Picture Association of America)]," Corley urged other web sites to post DeCSS lest "we . . . be forced into submission." Id. at 313.

The Plaintiffs then sought a permanent injunction barring the Defendants from both posting DeCSS and linking to sites containing DeCSS. After a trial on the merits, the Court issued a comprehensive opinion, Universal I, and granted a permanent injunction, Universal II.

The Court explained that the Defendants' posting of DeCSS on their web site clearly falls within section 1201(a)(2)(A) of the DMCA, rejecting as spurious their claim that CSS is not a technological measure that "effectively controls access to a [442] work" because it was so easily penetrated by Johansen, Universal I, 111 F. Supp. 2d at 318, and as irrelevant their contention that DeCSS was designed to create a Linux-platform DVD player, id. at 319. The Court also held that the Defendants cannot avail themselves of any of the DMCA's exceptions, id. at 319-22, and that the alleged importance of DeCSS to certain fair uses of encrypted copyrighted material was immaterial to their statutory liability, id. at 322-24. The Court went on to hold that when the Defendants "proclaimed on their own site that DeCSS could be had by clicking on the hyperlinks" on their site, they were trafficking in DeCSS, and therefore liable for their linking as well as their posting. Id. at 325.

Turning to the Defendants' numerous constitutional arguments, the Court first held that computer code like DeCSS is "speech" that is "protected" (in the sense of "covered") by the First Amendment, id. at 327, but that because the DMCA is targeting the "functional" aspect of that speech, id. at 328-29, it is "content neutral," id. at 329,[10] and the intermediate scrutiny of United States v. O'Brien, 391 U.S. 367, 377 (1968), applies, Universal I, 111 F. Supp. 2d at 329-30. The Court concluded that the DMCA survives this scrutiny, id. at 330-33, and also rejected prior restraint, overbreadth, and vagueness challenges, id. at 333-39.

The Court upheld the constitutionality of the DMCA's application to linking on similar grounds: linking, the Court concluded, is "speech," but the DMCA is content-neutral, targeting only the functional components of that speech. Therefore, its application to linking is also evaluated under O'Brien, and, thus evaluated, survives intermediate scrutiny. However, the Court concluded that a blanket proscription on linking would create a risk of chilling legitimate linking on the web. The Court therefore crafted a restrictive test for linking liability (discussed below) that it believed sufficiently mitigated that risk. The Court then found its test satisfied in this case. Id. at 339-41.

Finally, the Court concluded that an injunction was highly appropriate in this case. The Court observed that DeCSS was harming the Plaintiffs, not only because they were now exposed to the possibility of piracy and therefore were obliged to develop costly new safeguards for DVDs, but also because, even if there was only indirect evidence that DeCSS availability actually facilitated DVD piracy,[11] the threat of piracy was very real, particularly as Internet transmission speeds continue to increase. Id. at 314-15, 342. Acknowledging that DeCSS was (and still is) widely available on the Internet, the Court expressed confidence in

the likelihood . . . that this decision will serve notice on others that "the strong right arm of equity" may be brought to bear against them absent a change in their conduct and thus contribute to a climate of appropriate respect for intellectual property rights in an age in which the excitement of ready access to [443] untold quantities of information has blurred in some minds the fact that taking what is not yours and not freely offered to you is stealing.

Id. at 345.

The Court's injunction barred the Defendants from: "posting on any Internet web site" DeCSS; "in any other way . . . offering to the public, providing, or otherwise trafficking in DeCSS"; violating the anti-trafficking provisions of the DMCA in any other manner, and finally "knowingly linking any Internet web site operated by them to any other web site containing DeCSS, or knowingly maintaining any such link, for the purpose of disseminating DeCSS." Universal II, 111 F. Supp. 2d at 346-47.

The Appellants have appealed from the permanent injunction. The United States has intervened in support of the constitutionality of the DMCA. We have also had the benefit of a number of amicus curiae briefs, supporting and opposing the District Court's judgment. After oral argument, we invited the parties to submit responses to a series of specific questions, and we have received helpful responses.

Discussion

I. Narrow Construction to Avoid Constitutional Doubt

The Appellants first argue that, because their constitutional arguments are at least substantial, we should interpret the statute narrowly so as to avoid constitutional problems. They identify three different instances of alleged ambiguity in the statute that they claim provide an opportunity for such a narrow interpretation.

First, they contend that subsection 1201(c)(1), which provides that "[n]othing in this section shall affect rights, remedies, limitations or defenses to copyright infringement, including fair use, under this title," can be read to allow the circumvention of encryption technology protecting copyrighted material when the material will be put to "fair uses" exempt from copyright liability.[12] We disagree that subsection 1201(c)(1) permits such a reading. Instead, it clearly and simply clarifies that the DMCA targets the circumvention of digital walls guarding copyrighted material (and trafficking in circumvention tools), but does not concern itself with the use of those materials after circumvention has occurred. Subsection 1201(c)(1) ensures that the DMCA is not read to prohibit the "fair use" of information just because that information was obtained in a manner made illegal by the DMCA. The Appellants' much more expansive interpretation of subsection 1201(c)(1) is not only outside the range of plausible readings of the provision, but is also clearly refuted by the statute's legislative history.[13] See Commodity Futures Trading [444] Commission v. Schor, 478 U.S. 833, 841 (1986) (constitutional doubt canon "does not give a court the prerogative to ignore the legislative will").

Second, the Appellants urge a narrow construction of the DMCA because of subsection 1201(c)(4), which provides that "[n]othing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products." This language is clearly precatory: Congress could not "diminish" constitutional rights of free speech even if it wished to, and the fact that Congress also expressed a reluctance to "enlarge" those rights cuts against the Appellants' effort to infer a narrowing construction of the Act from this provision.

Third, the Appellants argue that an individual who buys a DVD has the "authority of the copyright owner" to view the DVD, and therefore is exempted from the DMCA pursuant to subsection 1201(a)(3)(A) when the buyer circumvents an encryption technology in order to view the DVD on a competing platform (such as Linux). The basic flaw in this argument is that it misreads subsection 1201(a)(3)(A). That provision exempts from liability those who would "decrypt" an encrypted DVD with the authority of a copyright owner, not those who would "view" a DVD with the authority of a copyright owner.[14] In any event, the Defendants offered no evidence that the Plaintiffs have either explicitly or implicitly authorized DVD buyers to circumvent encryption technology to support use on multiple platforms.[15]

We conclude that the anti-trafficking and anti-circumvention provisions of the DMCA are not susceptible to the narrow interpretations urged by the Appellants. We therefore proceed to consider the Appellants' constitutional claims.

II. Constitutional Challenge Based on the Copyright Clause

In a footnote to their brief, the Appellants appear to contend that the DMCA, as construed by the District Court, exceeds the constitutional authority [445] of Congress to grant authors copyrights for a "limited time," U.S. Const. art. I, § 8, cl. 8, because it "empower[s] copyright owners to effectively secure perpetual protection by mixing public domain works with copyrighted materials, then locking both up with technological protection measures." Brief for Appellants at 42 n.30. This argument is elaborated in the amici curiae brief filed by Prof. Julie E. Cohen on behalf of herself and 45 other intellectual property law professors. See also David Nimmer, A Riff on Fair Use in the Digital Millennium Copyright Act, 148 U. Pa. L. Rev. 673, 712 (2000). For two reasons, the argument provides no basis for disturbing the judgment of the District Court.

First, we have repeatedly ruled that arguments presented to us only in a footnote are not entitled to appellate consideration. Concourse Rehabilitation & Nursing Center Inc. v. DeBuono, 179 F.3d 38, 47 (2d Cir. 1999); United States v. Mapp, 170 F.3d 328, 333 n.8 (2d Cir. 1999); United States v. Restrepo, 986 F.2d 1462, 1463 (2d Cir. 1993). Although an amicus brief can be helpful in elaborating issues properly presented by the parties, it is normally not a method for injecting new issues into an appeal, at least in cases where the parties are competently represented by counsel. See, e.g., Concourse Center, 179 F.3d at 47.

Second, to whatever extent the argument might have merit at some future time in a case with a properly developed record, the argument is entirely premature and speculative at this time on this record. There is not even a claim, much less evidence, that any Plaintiff has sought to prevent copying of public domain works, or that the injunction prevents the Defendants from copying such works. As Judge Kaplan noted, the possibility that encryption would preclude access to public domain works "does not yet appear to be a problem, although it may emerge as one in the future." Universal I, 111 F. Supp. 2d at 338 n.245.

III. Constitutional Challenges Based on the First Amendment

A. Applicable Principles

Last year, in one of our Court's first forays into First Amendment law in the digital age, we took an "evolutionary" approach to the task of tailoring familiar constitutional rules to novel technological circumstances, favoring "narrow" holdings that would permit the law to mature on a "case-by-case" basis. See Name.Space, Inc. v. Network Solutions, Inc., 202 F.3d 573, 584 n.11 (2d Cir. 2000). In that spirit, we proceed, with appropriate caution, to consider the Appellants' First Amendment challenges by analyzing a series of preliminary issues the resolution of which provides a basis for adjudicating the specific objections to the DMCA and its application to DeCSS. These issues, which we consider only to the extent necessary to resolve the pending appeal, are whether computer code is speech, whether computer programs are speech, the scope of First Amendment protection for computer code, and the scope of First Amendment protection for decryption code. Based on our analysis of these issues, we then consider the Appellants' challenge to the injunction's provisions concerning posting and linking.

1. Code as Speech

Communication does not lose constitutional protection as "speech" simply because it is expressed in the language of computer code. Mathematical formulae and musical scores are written in "code," i.e., symbolic notations not comprehensible to the uninitiated, and yet both are covered by the First Amendment. If someone [446] chose to write a novel entirely in computer object code by using strings of 1's and 0's for each letter of each word, the resulting work would be no different for constitutional purposes than if it had been written in English. The "object code" version would be incomprehensible to readers outside the programming community (and tedious to read even for most within the community), but it would be no more incomprehensible than a work written in Sanskrit for those unversed in that language. The undisputed evidence reveals that even pure object code can be, and often is, read and understood by experienced programmers. And source code (in any of its various levels of complexity) can be read by many more. See Universal I, 111 F. Supp. 2d at 326. Ultimately, however, the ease with which a work is comprehended is irrelevant to the constitutional inquiry. If computer code is distinguishable from conventional speech for First Amendment purposes, it is not because it is written in an obscure language. See Junger v. Daley, 209 F.3d 481, 484 (6th Cir. 2000).

2. Computer Programs as Speech

Of course, computer code is not likely to be the language in which a work of literature is written. Instead, it is primarily the language for programs executable by a computer. These programs are essentially instructions to a computer. In general, programs may give instructions either to perform a task or series of tasks when initiated by a single (or double) click of a mouse or, once a program is operational ("launched"), to manipulate data that the user enters into the computer.[16] Whether computer code that gives a computer instructions is "speech" within the meaning of the First Amendment requires consideration of the scope of the Constitution's protection of speech.

The First Amendment provides that "Congress shall make no law . . . abridging the freedom of speech. . . ." U.S. Const. amend. I. "Speech" is an elusive term, and judges and scholars have debated its bounds for two centuries. Some would confine First Amendment protection to political speech. E.g., Robert Bork, Neutral Principles and Some First Amendment Problems, 47 Ind. L.J. 1 (1971). Others would extend it further to artistic expression. E.g., Marci A. Hamilton, Art Speech, 49 Vand. L. Rev. 73 (1996).

Whatever might be the merits of these and other approaches, the law has not been so limited. Even dry information, devoid of advocacy, political relevance, or artistic expression, has been accorded First Amendment protection. See Miller v. California, 413 U.S. 15, 34 (1973) ("The First Amendment protects works which, taken as a whole, have serious literary, artistic, political, or scientific value. . . ." (emphasis added)); Roth v. United States, 354 U.S. 476, 484 (1957) (First Amendment embraces "[a]ll ideas having even the slightest redeeming social importance," including the "'advancement of truth, science, morality, and arts in general.'" (quoting 1 Journals of the Continental Congress 108 (1774))); Board of Trustees of Stanford University v. Sullivan, 773 F. Supp. 472, 474 (D.D.C. 1991) ("It is . . . settled . . . that the First Amendment protects scientific expression and debate just [447] as it protects political and artistic expression."); see also Kent Greenawalt, Speech, Crime and the Uses of Language 85 (1989) ("[A]ssertions of fact generally fall within a principle of freedom of speech. . . ."); cf. Virginia State Board of Pharmacy v. Virginia Citizens Consumer Council, Inc., 425 U.S. 748, 763 (1976) ("prescription drug price information" is "speech" because a consumer's interest in "the free flow of commercial information" may be "keener by far" than "his interest in the day's most urgent political debate").

Thus, for example, courts have subjected to First Amendment scrutiny restrictions on the dissemination of technical scientific information, United States v. Progressive, Inc., 467 F. Supp. 990 (W.D. Wis. 1979), and scientific research, Stanford University, 773 F. Supp. at 473, and attempts to regulate the publication of instructions,[17] see, e.g., United States v. Raymond, 228 F.3d 804, 815 (7th Cir. 2000) (First Amendment does not protect instructions for violating the tax laws); United States v. Dahlstrom, 713 F.2d 1423, 1428 (9th Cir. 1983) (same); Herceg v. Hustler Magazine, Inc., 814 F.2d 1017, 1020-25 (5th Cir. 1987) (First Amendment protects instructions for engaging in a dangerous sex act); United States v. Featherston, 461 F.2d 1119, 1122-23 (5th Cir. 1972) (First Amendment does not protect instructions for building an explosive device); see also Bernstein v. United States Department of State, 922 F. Supp. 1426, 1435 (N.D. Cal. 1996) ("Instructions, do-it-yourself manuals, [and] recipes" are all "speech").[18]

Computer programs are not exempted from the category of First Amendment speech simply because their instructions require use of a computer. A recipe is no less "speech" because it calls for the use of an oven, and a musical score is no less "speech" because it specifies performance on an electric guitar. Arguably distinguishing computer programs from conventional language instructions is the fact that programs are executable on a computer. But the fact that a program has the capacity to direct the functioning of a computer does not mean that it lacks the additional capacity to convey information, and it is the conveying of information that renders instructions "speech" for purposes of the First Amendment.[19] The information [448] conveyed by most "instructions" is how to perform a task.

Instructions such as computer code, which are intended to be executable by a computer, will often convey information capable of comprehension and assessment by a human being.[20] A programmer reading a program learns information about instructing a computer, and might use this information to improve personal programming skills and perhaps the craft of programming. Moreover, programmers communicating ideas to one another almost inevitably communicate in code, much as musicians use notes.[21] Limiting First Amendment protection of programmers to descriptions of computer code (but not the code itself) would impede discourse among computer scholars,[22] just as limiting protection for musicians to descriptions of musical scores (but not sequences of notes) would impede their exchange of ideas and expression. Instructions that communicate information comprehensible to a human qualify as speech whether the instructions are designed for execution by a computer or a human (or both).

Vartuli is not to the contrary. The defendants in Vartuli marketed a software program called "Recurrence," which would tell computer users when to buy or sell currency futures contracts if their computers were fed currency market rates. The Commodity Futures Trading Commission charged the defendants with violating federal law for, among other things, failing to register as commodity trading advisors for their distribution of the Recurrence software. The defendants maintained that Recurrence's cues to users to buy or sell were protected speech, and that the registration requirement as applied to Recurrence was a constitutionally suspect prior restraint. We rejected the defendants' constitutional claim, holding that Recurrence "in the form it was sold and marketed by the defendants" did not generate speech protected by the First Amendment. Vartuli, 228 F.3d at 111.

[449] Essential to our ruling in Vartuli was the manner in which the defendants marketed the software and intended that it be used: the defendants told users of the software to follow the software's cues "with no second-guessing," id., and intended that users follow Recurrence's commands "mechanically" and "without the intercession of the mind or the will of the recipient," id. We held that the values served by the First Amendment were not advanced by these instructions, even though the instructions were expressed in words. Id. We acknowledged that some users would, despite the defendants' marketing, refuse to follow Recurrence's cues mechanically but instead would use the commands as a source of information and advice, and that, as to these users, Recurrence's cues might very "well have been 'speech.'" Id. at 111-12. Nevertheless, we concluded that the Government could require registration for Recurrence's intended use because such use was devoid of any constitutionally protected speech. Id. at 112.

Vartuli considered two ways in which a programmer might be said to communicate through code: to the user of the program (not necessarily protected) and to the computer (never protected).[23] However, this does not mean that Vartuli denied First Amendment protection to all computer programs. Since Vartuli limited its constitutional scrutiny to the code "as marketed," i.e., as an automatic trading system, it did not have occasion to consider a third manner in which a programmer might communicate through code: to another programmer.

For all of these reasons, we join the other courts that have concluded that computer code, and computer programs constructed from code can merit First Amendment protection, see Junger, 209 F.3d at 484;[24] Bernstein, 922 F. Supp. at 1434-36; see also Bernstein, 176 F.3d at 1140-41; Karn v. United States Department of State, 925 F. Supp. 1, 9-10 (D.D.C. 1996) (assuming, without deciding, that source code with English comments interspersed throughout is "speech"), although the scope of such protection remains to be determined.

3. The Scope of First Amendment Protection for Computer Code

Having concluded that computer code conveying information is "speech" [450] within the meaning of the First Amendment, we next consider, to a limited extent, the scope of the protection that code enjoys. As the District Court recognized, Universal I, 111 F. Supp. 2d at 327, the scope of protection for speech generally depends on whether the restriction is imposed because of the content of the speech. Content-based restrictions are permissible only if they serve compelling state interests and do so by the least restrictive means available. See Sable Communications of California, Inc. v. FCC, 492 U.S. 115, 126 (1989). A content-neutral restriction is permissible if it serves a substantial governmental interest, the interest is unrelated to the suppression of free expression, and the regulation is narrowly tailored, which "in this context requires . . . that the means chosen do not 'burden substantially more speech than is necessary to further the government's legitimate interests.'" Turner Broadcasting System, Inc. v. FCC, 512 U.S. 622, 662 (1994) (quoting Ward v. Rock Against Racism, 491 U.S. 781, 799 (1989)).[25]

"[G]overnment regulation of expressive activity is 'content neutral' if it is justified without reference to the content of regulated speech." Hill v. Colorado, 530 U.S. 703, 720 (2000). "The government's purpose is the controlling consideration. A regulation that serves purposes unrelated to the content of expression is deemed neutral, even if it has an incidental effect on some speakers or messages but not others." Ward, 491 U.S. at 791. The Supreme Court's approach to determining content-neutrality appears to be applicable whether what is regulated is expression, see id. at 791-93 (regulation of volume of music), conduct, see O'Brien, 391 U.S. at 377, or any "activity" that can be said to combine speech and non-speech elements, see Spence v. Washington, 418 U.S. 405, 410-11 (1974) (applying O'Brien to "activity" of displaying American flag hung upside down and decorated with a peace symbol).

To determine whether regulation of computer code is content-neutral, the initial inquiry must be whether the regulated activity is "sufficiently imbued with elements of communication to fall within the scope of the First . . . Amendment[]." Id. at 409; see also Name.Space, 202 F.3d at 585. Computer code, as we have noted, often conveys information comprehensible to human beings, even as it also directs a computer to perform various functions. Once a speech component [451] is identified, the inquiry then proceeds to whether the regulation is "justified without reference to the content of regulated speech." Hill, 530 U.S. at 720.

The Appellants vigorously reject the idea that computer code can be regulated according to any different standard than that applicable to pure speech, i.e., speech that lacks a nonspeech component. Although recognizing that code is a series of instructions to a computer, they argue that code is no different, for First Amendment purposes, than blueprints that instruct an engineer or recipes that instruct a cook. See Supplemental Brief for Appellants at 2, 3.[26] We disagree. Unlike a blueprint or a recipe, which cannot yield any functional result without human comprehension of its content, human decision-making, and human action, computer code can instantly cause a computer to accomplish tasks and instantly render the results of those tasks available throughout the world via the Internet. The only human action required to achieve these results can be as limited and instantaneous as a single click of a mouse. These realities of what code is and what its normal functions are require a First Amendment analysis that treats code as combining nonspeech and speech elements, i.e., functional and expressive elements. See Red Lion Broadcasting Co. v. FCC, 395 U.S. 367, 386 (1969) ("[D]ifferences in the characteristics of new media justify differences in the First Amendment standards applied to them." (footnote omitted)).

We recognize, as did Judge Kaplan, that the functional capability of computer code cannot yield a result until a human being decides to insert the disk containing the code into a computer and causes it to perform its function (or programs a computer to cause the code to perform its function). Nevertheless, this momentary intercession of human action does not diminish the nonspeech component of code, nor render code entirely speech, like a blueprint or a recipe. Judge Kaplan, in a passage that merits extensive quotation, cogently explained why this is especially so with respect to decryption code:

[T]he focus on functionality in order to determine the level of scrutiny is not an inevitable consequence of the speech-conduct distinction. Conduct has immediate effects on the environment. Computer code, on the other hand, no matter how functional, causes a computer to perform the intended operations only if someone uses the code to do so. Hence, one commentator, in a thoughtful article, has maintained that functionality is really "a proxy for effects or harm" and that its adoption as a determinant of the level of scrutiny slides over questions of causation that intervene between the dissemination of a computer program and any harm caused by its use.

The characterization of functionality as a proxy for the consequences of use is accurate. But the assumption that the chain of causation is too attenuated to justify the use of functionality to determine the level of scrutiny, at least in this context, is not.

Society increasingly depends upon technological means of controlling access to digital files and systems, whether they are military computers, bank records, academic records, copyrighted works or something else entirely. There are far too many who, given any opportunity, will bypass security measures, [452] some for the sheer joy of doing it, some for innocuous reasons, and others for more malevolent purposes. Given the virtually instantaneous and worldwide dissemination widely available via the Internet, the only rational assumption is that once a computer program capable of bypassing such an access control system is disseminated, it will be used. And that is not all.

There was a time when copyright infringement could be dealt with quite adequately by focusing on the infringing act. If someone wished to make and sell high quality but unauthorized copies of a copyrighted book, for example, the infringer needed a printing press. The copyright holder, once aware of the appearance of infringing copies, usually was able to trace the copies up the chain of distribution, find and prosecute the infringer, and shut off the infringement at the source.

In principle, the digital world is very different. Once a decryption program like DeCSS is written, it quickly can be sent all over the world. Every recipient is capable not only of decrypting and perfectly copying plaintiffs' copyrighted DVDs, but also of retransmitting perfect copies of DeCSS and thus enabling every recipient to do the same. They likewise are capable of transmitting perfect copies of the decrypted DVD. The process potentially is exponential rather than linear.

. . . . .

These considerations drastically alter consideration of the causal link between dissemination of computer programs such as this and their illicit use. Causation in the law ultimately involves practical policy judgments. Here, dissemination itself carries very substantial risk of imminent harm because the mechanism is so unusual by which dissemination of means of circumventing access controls to copyrighted works threatens to produce virtually unstoppable infringement of copyright. In consequence, the causal link between the dissemination of circumvention computer programs and their improper use is more than sufficiently close to warrant selection of a level of constitutional scrutiny based on the programs' functionality.

Universal I, 111 F. Supp. 2d at 331-32 (footnotes omitted). The functionality of computer code properly affects the scope of its First Amendment protection.

4. The Scope of First Amendment Protection for Decryption Code

In considering the scope of First Amendment protection for a decryption program like DeCSS, we must recognize that the essential purpose of encryption code is to prevent unauthorized access. Owners of all property rights are entitled to prohibit access to their property by unauthorized persons. Homeowners can install locks on the doors of their houses. Custodians of valuables can place them in safes. Stores can attach to products security devices that will activate alarms if the products are taken away without purchase. These and similar security devices can be circumvented. Burglars can use skeleton keys to open door locks. Thieves can obtain the combinations to safes. Product security devices can be neutralized.

Our case concerns a security device, CSS computer code, that prevents access by unauthorized persons to DVD movies. The CSS code is embedded in the DVD movie. Access to the movie cannot be obtained unless a person has a device, a licensed DVD player, equipped with computer code capable of decrypting the CSS encryption code. In its basic function, [453] CSS is like a lock on a homeowner's door, a combination of a safe, or a security device attached to a store's products.

DeCSS is computer code that can decrypt CSS. In its basic function, it is like a skeleton key that can open a locked door, a combination that can open a safe, or a device that can neutralize the security device attached to a store's products.[27] DeCSS enables anyone to gain access to a DVD movie without using a DVD player.

The initial use of DeCSS to gain access to a DVD movie creates no loss to movie producers because the initial user must purchase the DVD. However, once the DVD is purchased, DeCSS enables the initial user to copy the movie in digital form and transmit it instantly in virtually limitless quantity, thereby depriving the movie producer of sales. The advent of the Internet creates the potential for instantaneous worldwide distribution of the copied material.

At first glance, one might think that Congress has as much authority to regulate the distribution of computer code to decrypt DVD movies as it has to regulate distribution of skeleton keys, combinations to safes, or devices to neutralize store product security devices. However, despite the evident legitimacy of protection against unauthorized access to DVD movies, just like any other property, regulation of decryption code like DeCSS is challenged in this case because DeCSS differs from a skeleton key in one important respect: it not only is capable of performing the function of unlocking the encrypted DVD movie, it also is a form of communication, albeit written in a language not understood by the general public. As a communication, the DeCSS code has a claim to being "speech," and as "speech," it has a claim to being protected by the First Amendment. But just as the realities of what any computer code can accomplish must inform the scope of its constitutional protection, so the capacity of a decryption program like DeCSS to accomplish unauthorized—indeed, unlawful—access to materials in which the Plaintiffs have intellectual property rights must inform and limit the scope of its First Amendment protection. Cf. Red Lion, 395 U.S. at 386 ("[D]ifferences in the characteristics of new media justify differences in the First Amendment standards applied to them.").

With all of the foregoing considerations in mind, we next consider the Appellants' First Amendment challenge to the DMCA as applied in the specific prohibitions that have been imposed by the District Court's injunction.

B. First Amendment Challenge

The District Court's injunction applies the DMCA to the Defendants by imposing two types of prohibition, both grounded on the anti-trafficking provisions of the DMCA. The first prohibits posting DeCSS or any other technology for circumventing CSS on any Internet web site. Universal II, 111 F. Supp. 2d at 346-47, ¶ 1(a), (b). The second prohibits knowingly linking any Internet web site to any other web site containing DeCSS. Id. at 347, ¶ 1(c). The validity of the posting and linking prohibitions must be considered separately.

1. Posting

The initial issue is whether the posting prohibition is content-neutral, since, as we have explained, this classification [454] determines the applicable constitutional standard. The Appellants contend that the anti-trafficking provisions of the DMCA and their application by means of the posting prohibition of the injunction are content-based. They argue that the provisions "specifically target . . . scientific expression based on the particular topic addressed by that expression—namely, techniques for circumventing CSS." Supplemental Brief for Appellants at 1. We disagree. The Appellants' argument fails to recognize that the target of the posting provisions of the injunction—DeCSS—has both a nonspeech and a speech component, and that the DMCA, as applied to the Appellants, and the posting prohibition of the injunction target only the nonspeech component. Neither the DMCA nor the posting prohibition is concerned with whatever capacity DeCSS might have for conveying information to a human being, and that capacity, as previously explained, is what arguably creates a speech component of the decryption code. The DMCA and the posting prohibition are applied to DeCSS solely because of its capacity to instruct a computer to decrypt CSS. That functional capability is not speech within the meaning of the First Amendment. The Government seeks to "justif[y]," Hill, 530 U.S. at 720, both the application of the DMCA and the posting prohibition to the Appellants solely on the basis of the functional capability of DeCSS to instruct a computer to decrypt CSS, i.e., "without reference to the content of the regulated speech," id. This type of regulation is therefore content-neutral, just as would be a restriction on trafficking in skeleton keys identified because of their capacity to unlock jail cells, even though some of the keys happened to bear a slogan or other legend that qualified as a speech component.

As a content-neutral regulation with an incidental effect on a speech component, the regulation must serve a substantial governmental interest, the interest must be unrelated to the suppression of free expression, and the incidental restriction on speech must not burden substantially more speech than is necessary to further that interest. Turner Broadcasting, 512 U.S. at 662. The Government's interest in preventing unauthorized access to encrypted copyrighted material is unquestionably substantial, and the regulation of DeCSS by the posting prohibition plainly serves that interest. Moreover, that interest is unrelated to the suppression of free expression. The injunction regulates the posting of DeCSS, regardless of whether DeCSS code contains any information comprehensible by human beings that would qualify as speech. Whether the incidental regulation on speech burdens substantially more speech than is necessary to further the interest in preventing unauthorized access to copyrighted materials requires some elaboration.

Posting DeCSS on the Appellants' web site makes it instantly available at the click of a mouse to any person in the world with access to the Internet, and such person can then instantly transmit DeCSS to anyone else with Internet access. Although the prohibition on posting prevents the Appellants from conveying to others the speech component of DeCSS, the Appellants have not suggested, much less shown, any technique for barring them from making this instantaneous worldwide distribution of a decryption code that makes a lesser restriction on the code's speech component.[28] It is true that the [455] Government has alternative means of prohibiting unauthorized access to copyrighted materials. For example, it can create criminal and civil liability for those who gain unauthorized access, and thus it can be argued that the restriction on posting DeCSS is not absolutely necessary to preventing unauthorized access to copyrighted materials. But a content-neutral regulation need not employ the least restrictive means of accomplishing the governmental objective. Id. It need only avoid burdening "substantially more speech than is necessary to further the government's legitimate interests." Id. (internal quotation marks and citation omitted). The prohibition on the Defendants' posting of DeCSS satisfies that standard.[29]

2. Linking

In considering linking, we need to clarify the sense in which the injunction prohibits such activity. Although the injunction defines several terms, it does not define "linking." Nevertheless, it is evident from the District Court's opinion that it is concerned with "hyperlinks," Universal I, 111 F. Supp. 2d at 307; see id. at 339.[30] A hyperlink is a cross-reference (in a distinctive font or color) appearing on one web page that, when activated by the point-and-click of a mouse, brings onto the computer screen another web page. The hyperlink can appear on a screen (window) as text, such as the Internet address ("URL") of the web page being called up or a word or phrase that identifies the web page to be called up, for example, "DeCSS web site." Or the hyperlink can appear as an image, for example, an icon depicting a person sitting at a computer watching a DVD movie and text stating "click here to access DeCSS and see DVD movies for free!" The code for the web page containing the hyperlink contains a computer instruction that associates the link with the URL of the web page to be accessed, such that clicking on the hyperlink instructs the computer to enter the URL of the desired web page and thereby access that page. With a hyperlink on a web page, the linked web site is just one click away.[31]

[456] In applying the DMCA to linking (via hyperlinks), Judge Kaplan recognized, as he had with DeCSS code, that a hyperlink has both a speech and a nonspeech component. It conveys information, the Internet address of the linked web page, and has the functional capacity to bring the content of the linked web page to the user's computer screen (or, as Judge Kaplan put it, to "take one almost instantaneously to the desired destination." Id.). As he had ruled with respect to DeCSS code, he ruled that application of the DMCA to the Defendants' linking to web sites containing DeCSS is content-neutral because it is justified without regard to the speech component of the hyperlink. Id. The linking prohibition applies whether or not the hyperlink contains any information, comprehensible to a human being, as to the Internet address of the web page being accessed. The linking prohibition is justified solely by the functional capability of the hyperlink.

Applying the O'Brien/Ward/Turner Broadcasting requirements for content-neutral regulation, Judge Kaplan then ruled that the DMCA, as applied to the Defendants' linking, served substantial governmental interests and was unrelated to the suppression of free expression. Id. We agree. He then carefully considered the "closer call," id., as to whether a linking prohibition would satisfy the narrow tailoring requirement. In an especially carefully considered portion of his opinion, he observed that strict liability for linking to web sites containing DeCSS would risk two impairments of free expression. Web site operators would be inhibited from displaying links to various web pages for fear that a linked page might contain DeCSS, and a prohibition on linking to a web site containing DeCSS would curtail access to whatever other information was contained at the accessed site. Id. at 340.

To avoid applying the DMCA in a manner that would "burden substantially more speech than is necessary to further the government's legitimate interests," Turner Broadcasting, 512 U.S. at 662 (internal quotation marks and citation omitted), Judge Kaplan adapted the standards of New York Times Co. v. Sullivan, 376 U.S. 254, 283 (1964), to fashion a limited prohibition against linking to web sites containing DeCSS. He required clear and convincing evidence

that those responsible for the link (a) know at the relevant time that the offending material is on the linked-to site, (b) know that it is circumvention technology that may not lawfully be offered, and (c) create or maintain the link for the purpose of disseminating that technology.

Universal I, 111 F. Supp. 2d at 341. He then found that the evidence satisfied his three-part test by his required standard of proof. Id.

In response to our post-argument request for the parties' views on various issues, including specifically Judge Kaplan's test for a linking prohibition, the Appellants replied that his test was deficient for not requiring proof of intent to cause, or aid or abet, harm, and that the only valid test for a linking prohibition would be one that could validly apply to the publication in a print medium of an address for obtaining prohibited material. Supplemental Brief for Appellants at 14. The Appellees and the Government accepted [457] Judge Kaplan's criteria for purposes of asserting the validity of the injunction as applied to the Appellants, with the Government expressing reservations as to the standard of clear and convincing evidence. Supplemental Brief for Appellees at 22-23; Supplemental Brief for Government at 19-21.

Mindful of the cautious approach to First Amendment claims involving computer technology expressed in Name.Space, 202 F.3d at 584 n.11, we see no need on this appeal to determine whether a test as rigorous as Judge Kaplan's is required to respond to First Amendment objections to the linking provision of the injunction that he issued. It suffices to reject the Appellants' contention that an intent to cause harm is required and that linking can be enjoined only under circumstances applicable to a print medium. As they have throughout their arguments, the Appellants ignore the reality of the functional capacity of decryption computer code and hyperlinks to facilitate instantaneous unauthorized access to copyrighted materials by anyone anywhere in the world. Under the circumstances amply shown by the record, the injunction's linking prohibition validly regulates the Appellants' opportunity instantly to enable anyone anywhere to gain unauthorized access to copyrighted movies on DVDs.[32]

At oral argument, we asked the Government whether its undoubted power to punish the distribution of obscene materials would permit an injunction prohibiting a newspaper from printing addresses of bookstore locations carrying such materials. In a properly cautious response, the Government stated that the answer would depend on the circumstances of the publication. The Appellants' supplemental papers enthusiastically embraced the arguable analogy between printing bookstore addresses and displaying on a web page links to web sites at which DeCSS may be accessed. Supplemental Brief for Appellants at 14. They confidently asserted that publication of bookstore locations carrying obscene material cannot be enjoined consistent with the First Amendment, and that a prohibition against linking to web sites containing DeCSS is similarly invalid. Id.

Like many analogies posited to illuminate legal issues, the bookstore analogy is helpful primarily in identifying characteristics that distinguish it from the context of the pending dispute. If a bookstore proprietor is knowingly selling obscene materials, the evil of distributing such materials can be prevented by injunctive relief against the unlawful distribution (and similar distribution by others can be deterred by punishment of the distributor). And if others publish the location of the bookstore, preventive relief against a distributor can be effective before any significant distribution of the prohibited materials has occurred. The digital world, however, creates a very different problem. If obscene materials are posted on one web site and other sites post hyperlinks to the first site, the materials are available for instantaneous worldwide distribution before any preventive measures can be effectively taken.

This reality obliges courts considering First Amendment claims in the context of the pending case to choose between two unattractive alternatives: either tolerate some impairment of communication in order [458] to permit Congress to prohibit decryption that may lawfully be prevented, or tolerate some decryption in order to avoid some impairment of communication. Although the parties dispute the extent of impairment of communication if the injunction is upheld and the extent of decryption if it is vacated, and differ on the availability and effectiveness of techniques for minimizing both consequences, the fundamental choice between impairing some communication and tolerating decryption cannot be entirely avoided.

In facing this choice, we are mindful that it is not for us to resolve the issues of public policy implicated by the choice we have identified. Those issues are for Congress. Our task is to determine whether the legislative solution adopted by Congress, as applied to the Appellants by the District Court's injunction, is consistent with the limitations of the First Amendment, and we are satisfied that it is.

IV. Constitutional Challenge Based on Claimed Restriction of Fair Use

Asserting that fair use "is rooted in and required by both the Copyright Clause and the First Amendment," Brief for Appellants at 42, the Appellants contend that the DMCA, as applied by the District Court, unconstitutionally "eliminates fair use" of copyrighted materials, id. at 41 (emphasis added). We reject this extravagant claim.

Preliminarily, we note that the Supreme Court has never held that fair use is constitutionally required, although some isolated statements in its opinions might arguably be enlisted for such a requirement. In Stewart v. Abend, 495 U.S. 207 (1990), cited by the Appellants, the Court merely noted that fair use "'permits courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster,'" id. (quoting Iowa State University Research Foundation, Inc. v. American Broadcasting Cos., 621 F.2d 57, 60 (2d Cir. 1980)); see also Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 560 (1985) (noting "the First Amendment protections already embodied in the Copyright Act's distinction between copyrightable expression and uncopyrightable facts and ideas, and the latitude for scholarship and comment traditionally afforded by fair use"). In Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994), the Court observed, "From the infancy of copyright protection, some opportunity for fair use of copyrighted materials has been thought necessary to fulfill copyright's very purpose, '[t]o promote the Progress of Science and useful Arts. . . .'"[33] Id. at 575 (citation omitted); see generally William F. Patry, The Fair Use Privilege in Copyright Law 573-82 (2d ed. 1995) (questioning First Amendment protection for fair use).

We need not explore the extent to which fair use might have constitutional protection, grounded on either the First Amendment or the Copyright Clause, because whatever validity a constitutional claim might have as to an application of the DMCA that impairs fair use of copyrighted materials, such matters are far beyond the [459] scope of this lawsuit for several reasons. In the first place, the Appellants do not claim to be making fair use of any copyrighted materials, and nothing in the injunction prohibits them from making such fair use. They are barred from trafficking in a decryption code that enables unauthorized access to copyrighted materials.

Second, as the District Court properly noted, to whatever extent the anti-trafficking provisions of the DMCA might prevent others from copying portions of DVD movies in order to make fair use of them, "the evidence as to the impact of the anti-trafficking provision[s] of the DMCA on prospective fair users is scanty and fails adequately to address the issues." Universal I, 111 F. Supp. 2d at 338 n.246.

Third, the Appellants have provided no support for their premise that fair use of DVD movies is constitutionally required to be made by copying the original work in its original format.[34] Their examples of the fair uses that they believe others will be prevented from making all involve copying in a digital format those portions of a DVD movie amenable to fair use, a copying that would enable the fair user to manipulate the digitally copied portions. One example is that of a school child who wishes to copy images from a DVD movie to insert into the student's documentary film. We know of no authority for the proposition that fair use, as protected by the Copyright Act, much less the Constitution, guarantees copying by the optimum method or in the identical format of the original. Although the Appellants insisted at oral argument that they should not be relegated to a "horse and buggy" technique in making fair use of DVD movies,[35] the DMCA does not impose even an arguable limitation on the opportunity to make a variety of traditional fair uses of DVD movies, such as commenting on their content, quoting excerpts from their screenplays, and even recording portions of the video images and sounds on film or tape by pointing a camera, a camcorder, or a microphone at a monitor as it displays the DVD movie. The fact that the resulting copy will not be as perfect or as manipulable as a digital copy obtained by having direct access to the DVD movie in its digital form, provides no basis for a claim of unconstitutional limitation of fair use. A film critic making fair use of a movie by quoting selected lines of dialogue has no constitutionally valid claim that the review (in print or on television) would be technologically superior if the reviewer had not been prevented from using a movie camera in the theater, nor has an art student a valid constitutional claim to fair use of a painting by photographing it in a museum. Fair use has never been held to be a guarantee of access to copyrighted material in order to copy it by the fair user's preferred technique or in the format of the original.

Conclusion

We have considered all the other arguments of the Appellants and conclude that [460] they provide no basis for disturbing the District Court's judgment. Accordingly, the judgment is affirmed.

[*] Honorable Alvin W. Thompson, United States District Court for the District of Connecticut, sitting by designation.

[1] DVDs are similar to compact disks (CDs), but differ, among other things, in that they hold far more data. For detailed information concerning DVDs and CDs, see "Fast Guide to CD/DVD" at http://searchWindowsManageability.techtarget.com/sDefinition/0,,sid_gci514667,00.html (last updated Aug. 3, 2001).

[2] "2600" has special significance to the hacker community. It is the hertz frequency ("a unit of frequency of a periodic process equal to one cycle per second," Webster's Third New International Dictionary 1061 (1993)) of a signal that some hackers formerly used to explore the entire telephone system from "operator mode," which was triggered by the transmission of a 2600 hertz tone across a telephone line, Trial Tr. at 786-87, or to place telephone calls without incurring long-distance toll charges, United States v. Brady, 820 F. Supp. 1346, 1355 & n.18 (D. Utah 1993). One such user reportedly discovered that the sound of a toy whistle from a box of Cap'n Crunch cereal matched the telephone company's 2600 hertz tone perfectly. Id. at 1355 n.18.

[3] By the end of 1997, most if not all DVDs that were released were encrypted with CSS. Trial Tr. at 409; Universal I, 111 F. Supp. 2d at 310. Moreover, DVD players were projected to be in ten percent of United States homes by the end of 2000. Trial Tr. at 442; Universal I, 111 F. Supp. 2d at 310. In fact, as of 2000, about thirty-five percent of one studio's worldwide revenues from movie distribution was attributable to DVD sales and rentals. Trial Tr. at 403; Universal I, 111 F. Supp. 2d at 310 n.69.

[4] An operating system works with the computer to perform the application's instructions. Generally, an executable application can be played only on the operating system for which it is designed, although interoperability has been improving. At the time of the trial, DeCSS could be run only on the Microsoft Windows operating system. Trial Tr. at 245 (Testimony of Robert W. Schumann).

[5] An item of some controversy, both in this litigation and elsewhere, is the extent to which CSS-encrypted DVDs can be copied even without DeCSS. The record leaves largely unclear how CSS protects against the copying of a DVD, as contrasted with the playing of a DVD on an unlicensed player. The Defendants' experts insisted that there is nothing about the way CSS operates that prevents the copying of a DVD. Declaration of Frank Stevenson ¶ 23 ("Bit-for-bit copying, which precisely duplicates the content of one DVD to another, results in a fully-playable product."); Trial Tr. at 751 (Testimony of Professor Edward Felten) (CSS "could [not] have prevented the encrypted content from being copied to somewhere else"); Deposition of Barbara Simons at 48-49, 77. Some of the Plaintiffs' experts countered simply that "copying to a hard drive is something that compliant DVD players are not allowed to do," without explaining why. Trial Tr. at 37 (Testimony of Dr. Michael I. Shamos); see also Deposition of John J. Hoy at 347-48; Deposition of Fritz Attaway at 83. Another expert indicated that while a DVD movie can be copied to a computer's hard drive in encrypted form, the movie cannot be played without a DVD actually present in the DVD drive. Deposition of Robert W. Schumann at 153; Second Supplemental Declaration of Robert W. Schumann ¶ 15. This expert did not identify the mechanism that prevents someone from copying encrypted DVDs to a hard drive in the absence of a DVD in the disk drive. However, none of this detracts from these undisputed findings: some feature of either CSS itself, or another (unidentified) safeguard implemented by DVD manufacturers pursuant to their obligations under the CSS licensing scheme, makes it difficult to copy a CSS-encrypted DVD to a hard drive and then compress that DVD to the point where transmission over the Internet is practical. See Universal I, 111 F. Supp. 2d at 338. Conversely, a DVD movie file without CSS encryption is easily copied, manipulated, and transferred. See id. at 313. In other words, it might very well be that copying is not blocked by CSS itself, but by some other protection implemented by the DVD player manufacturers. Nonetheless, in decrypting CSS, the DeCSS program (perhaps incidentally) sidesteps whatever it is that blocks copying of the files. While there may be alternative means of extracting a non-encrypted, copyable movie from a DVD—for example, by copying the movie along with its encryption "bit-by-bit," or "ripping" a DVD by siphoning movie file data after CSS has already been decrypted by a licensed player—DeCSS is the superior means of acquiring easily copyable movies, see id. at 342, and in fact, is recommended by a DVD compression web site as the preferred tool for obtaining a decrypted DVD suitable for compression and transmission over the Internet, see id. We acknowledge the complexity and the rapidly changing nature of the technology involved in this case, but it is clear that the Defendants have presented no evidence to refute any of these carefully considered findings by the District Court.

[6] The District Court determined that even at high speeds, typical of university networks, transmission times ranged from three minutes to six hours. The Court noted, however, that "the availability of high speed network connections in many businesses and institutions, and their growing availability in homes, make Internet and other network traffic in pirated copies a growing threat." Universal I, 111 F. Supp. 2d at 315.

[7] Defendant 2600 Enterprises, Inc., is the company Corley incorporated to run the magazine, maintain the web site, and manage related endeavors like merchandising.

[8] The lawsuit was filed against Corley, Shawn C. Reimerdes, and Roman Kazan. 2600 Enterprises, Inc., was later added as a defendant. At an earlier stage of the litigation, the action was settled as to Reimerdes and Kazan. See Universal II, 111 F. Supp. 2d at 346.

[9] For convenience, all references to the DMCA are to the United State Code sections.

[10] In a supplemental Order, the Court corrected a typographical error in its opinion in Universal I by changing the first sentence of the first full paragraph at 111 F. Supp. 2d 328 to read "Restrictions on the nonspeech elements of expressive conduct fall into the content-neutral category." Universal City Studios, Inc. v. Reimerdes, No. 00 Civ. 0277 (LAK) (S.D.N.Y. Aug. 17, 2001).

[11] For example, advertisements for pirated DVDs rose dramatically in number after the release of DeCSS on the web, and DVD file compression web sites recommend the use of DeCSS. Universal I, 111 F. Supp. 2d at 342.

[12] In Part IV, infra, we consider the Appellants' claim that the DMCA is unconstitutional because of its effect on opportunities for fair use of copyrighted materials.

[13] The legislative history of the enacted bill makes quite clear that Congress intended to adopt a "balanced" approach to accommodating both piracy and fair use concerns, eschewing the quick fix of simply exempting from the statute all circumventions for fair use. H.R. Rep. No. 105-551, pt. 2, at 25 (1998). It sought to achieve this goal principally through the use of what it called a "fail-safe" provision in the statute, authorizing the Librarian of Congress to exempt certain users from the anti-circumvention provision when it becomes evident that in practice, the statute is adversely affecting certain kinds of fair use. See 17 U.S.C. § 1201(a)(1)(C); H.R. Rep. No. 105-551, pt. 2, at 36 ("Given the threat of a diminution of otherwise lawful access to works and information, the Committee on Commerce believes that a 'fail-safe' mechanism is required. This mechanism would . . . allow the . . . [waiver of the anti-circumvention provisions], for limited time periods, if necessary to prevent a diminution in the availability to individual users of a particular category of copyrighted materials."). Congress also sought to implement a balanced approach through statutory provisions that leave limited areas of breathing space for fair use. A good example is subsection 1201(d), which allows a library or educational institution to circumvent a digital wall in order to determine whether it wishes legitimately to obtain the material behind the wall. See H.R. Rep. No. 105-551, pt. 2, at 41. It would be strange for Congress to open small, carefully limited windows for circumvention to permit fair use in subsection 1201(d) if it then meant to exempt in subsection 1201(c)(1) any circumvention necessary for fair use.

[14] This is actually what subsection 1201(a)(3)(A) means when read in conjunction with the anti-circumvention provisions. When read together with the anti-trafficking provisions, subsection 1201(a)(3)(A) frees an individual to traffic in encryption technology designed or marketed to circumvent an encryption measure if the owner of the material protected by the encryption measure authorizes that circumvention.

[15] Even if the Defendants had been able to offer such evidence, and even if they could have demonstrated that DeCSS was "primarily designed . . . for the purpose of" playing DVDs on multiple platforms (and therefore not for the purpose of "circumventing a technological measure"), a proposition questioned by Judge Kaplan, see Universal I, 111 F. Supp. 2d at 311 n.79, the Defendants would defeat liability only under subsection 1201(a)(2)(A). They would still be vulnerable to liability under subsection 1201(a)(2)(C), because they "marketed" DeCSS for the copying of DVDs, not just for the playing of DVDs on multiple platforms. See, e.g., Trial Tr. at 820.

[16] For example, a program (or part of a program) will give a computer the direction to "launch" a word-processing program like WordPerfect when the icon for WordPerfect is clicked; a program like WordPerfect will give the computer directions to display letters on a screen and manipulate them according to the computer user's preferences whenever the appropriate keys are struck.

[17] We note that instructions are of varied types. See Vartuli, 228 F.3d at 111. "Orders" from one member of a conspiracy to another member, or from a superior to a subordinate, might resemble instructions but nonetheless warrant less or even no constitutional protection because their capacity to inform is meager, and because it is unlikely that the recipient of the order will engage in the "intercession of . . . mind or . . . will" characteristic of the sort of communication between two parties protected by the Constitution, see id. at 111-12 (noting that statements in the form of orders, instructions, or commands cannot claim "talismanic immunity from constitutional limitations" but "should be subjected to careful and particularized analysis to ensure that no speech entitled to First Amendment protection fails to receive it"); Kent Greenawalt, Speech and Crime, Am. B. Found. Res. J. 645, 743-44 (1980).

[18] These cases almost always concern instructions on how to commit illegal acts. Several courts have concluded that such instructions fall outside the First Amendment. However, these conclusions never rest on the fact that the speech took the form of instructions, but rather on the fact that the instructions counseled the listener how to commit illegal acts. See, e.g., Rice v. Paladin Enterprises, Inc., 128 F.3d 233, 247-49 (4th Cir. 1997); United States v. Barnett, 667 F.2d 835, 842 (9th Cir. 1982). None of these opinions even hints that instructions are a form of speech categorically outside the First Amendment.

[19] Of course, we do not mean to suggest that the communication of "information" is a prerequisite of protected "speech." Protected speech may communicate, among other things, ideas, emotions, or thoughts. We identify "information" only because this is what computer programs most often communicate, in addition to giving directions to a computer.

[20] However, in the rare case where a human's mental faculties do not intercede in executing the instructions, we have withheld protection. See Vartuli, 228 F.3d at 111.

[21] Programmers use snippets of code to convey their ideas for new programs; economists and other creators of computer models publish the code of their models in order to demonstrate the models' vigor. Brief of Amici Curiae Dr. Harold Abelson et al. at 17; Brief of Amici Curiae Steven Bellovin et al. at 12-13; see also Bernstein v. United States Department of Justice, 176 F.3d 1132, 1141 (9th Cir.) (concluding that computer source code is speech because it is "the preferred means" of communication among computer programmers and cryptographers), reh'g in banc granted and opinion withdrawn, 192 F.3d 1308 (9th Cir. 1999).

[22] Reinforcing the conclusion that software programs qualify as "speech" for First Amendment purposes—even though they instruct computers—is the accelerated blurring of the line between "source code" and conventional "speech." There already exist programs capable of translating English descriptions of a program into source code. Trial Tr. at 1101-02 (Testimony of Professor Andrew Appel). These programs are functionally indistinguishable from the compilers that routinely translate source code into object code. These new programs (still apparently rudimentary) hold the potential for turning "prose" instructions on how to write a computer program into the program itself. Even if there were an argument for exempting the latter from First Amendment protection, the former are clearly protected for the reasons set forth in the text. As technology becomes more sophisticated, instructions to other humans will increasingly be executable by computers as well.

[23] Vartuli reasoned that the interaction between "programming commands as triggers and semiconductors as a conduit," even though communication, is not "speech" within the meaning of the First Amendment and that the communication between Recurrence and a customer using it as intended was similarly not "speech." Vartuli, 228 F.2d at 111.

[24] The reasoning of Junger has recently been criticized. See Orin S. Kerr, Are We Overprotecting Code? Thoughts on First-Generation Internet Law, 57 Wash. & Lee L. Rev. 1287 (2000). Prof. Kerr apprehends that if encryption code is First Amendment speech because it conveys "ideas about cryptography," Junger, 209 F.3d at 484, all code will be protected "because code will always convey information about itself." Kerr, supra, at 1291. That should not suffice, he argues, because handing someone an object, for example, a padlock, is a good way of communicating how that object works, yet a padlock is not speech. Id. at 1291-92. However, code does not cease to be speech just because some objects that convey information are not speech. Both code and a padlock can convey information, but only code, because it uses a notational system comprehensible by humans, is communication that qualifies as speech. Prof. Kerr might be right that making the communication of ideas or information the test of whether code is speech provides First Amendment coverage to many, perhaps most, computer programs, but that is a consequence of the information-conveying capacity of the programs, not a reason for denying them First Amendment coverage.

[25] The Supreme Court has used slightly different formulations to express the narrow tailoring requirement of a content-neutral regulation. In O'Brien, the formulation was "if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest." 391 U.S. at 377. In Ward, the formulation was "'so long as the . . . regulation promotes a substantial government interest that would be achieved less effectively absent the regulation.'" 491 U.S. at 799 (quoting United States v. Albertini, 472 U.S. 675, 689 (1985)). Ward added, however, that the regulation may not "burden substantially more speech than is necessary to further the government's legitimate interests." Id. (emphasis added). Turner Broadcasting quoted both the "no greater than is essential" formulation from O'Brien, see Turner Broadcasting, 512 U.S. at 662, and the "would be achieved less effectively" formulation from Ward, see id. Turner Broadcasting made clear that the narrow tailoring requirement is less demanding than the least restrictive means requirement of a content-specific regulation, id., and appears to have settled on the "substantially more" phrasing from Ward as the formulation that best expresses the requirement, id. That is the formulation we will apply.

[26] This argument is elaborated by some of the amici curiae. "In the absence of human intervention, code does not function, it engages in no conduct. It is as passive as a cake recipe." Brief of Amici Curiae Dr. Harold Abelson et al. at 26.

[27] More dramatically, the Government calls DeCSS "a digital crowbar." Brief for Intervenor United States at 19.

[28] Briefs of some of the amici curiae discuss the possibility of adequate protection against copying of copyrighted materials by adopting the approach of the Audio Home Recording Act of 1992, 17 U.S.C. § 1002(a), which requires digital audio tape recorders to include a technology that prevents serial copying, but permits making a single copy. See, e.g., Brief of Amici Curiae Benkler and Lessig at 15. However, the Defendants did not present evidence of the current feasibility of a similar solution to prevent serial copying of DVDs over the Internet. Even if the Government, in defending the DMCA, must sustain a burden of proof in order to satisfy the standards for content-neutral regulation, the Defendants must adduce enough evidence to create fact issues concerning the current availability of less intrusive technological solutions. They did not do so in the District Court. Moreover, we note that when Congress opted for the solution to serial copying of digital audio tapes, it imposed a special royalty on manufacturers of digital audio recording devices to be distributed to appropriate copyright holders. See 17 U.S.C. §§ 1003-1007. We doubt if the First Amendment required Congress to adopt a similar technology/royalty scheme for regulating the copying of DVDs, but in any event the record in this case provides no basis for invalidating the anti-trafficking provisions of the DMCA or the injunction for lack of such an alternative approach.

[29] We have considered the opinion of a California intermediate appellate court in DVD Copy Control Ass'n v. Bunner, 93 Cal.App.4th 648, 113 Cal.Rptr.2d 338 (2001) (Cal. Ct. App., 6th Dist. Nov. 1, 2001), declining, on First Amendment grounds, to issue a preliminary injunction under state trade secrets law prohibiting a web site operator from posting DeCSS. To the extent that DVD Copy Control disagrees with our First Amendment analysis, we decline to follow it.

[30] "Hyperlinks" are also called "hypertext links" or "active links."

[31] "Linking" not accomplished by a hyperlink would simply involve the posting of the Internet address ("URL") of another web page. A "link" of this sort is sometimes called an "inactive link." With an inactive link, the linked web page would be only four clicks away, one click to select the URL address for copying, one click to copy the address, one click to "paste" the address into the text box for URL addresses, and one click (or striking the "enter" key) to instruct the computer to call up the linked web site.

[32] We acknowledge that the prohibition on linking restricts more than Corley's ability to facilitate instant access to DeCSS on linked web sites; it also restricts his ability to facilitate access to whatever protected speech is available on those sites. However, those who maintain the linked sites can instantly make their protected material available for linking by Corley by the simple expedient of deleting DeCSS from their web sites.

[33] Although we have recognized that the First Amendment provides no entitlement to use copyrighted materials beyond that accorded by the privilege of fair use, except in "an extraordinary case," Twin Peaks Productions, Inc. v. Publications International, Ltd., 996 F.2d 1366, 1378 (2d Cir. 1993), we have not ruled that the Constitution guarantees any particular formulation or minimum availability of the fair use defense.

[34] As expressed in their supplemental papers, the position of the Appellants is that "fair use extends to works in whatever form they are offered to the public," Supplemental Brief for Appellants at 20, by which we understand the Appellants to contend not merely that fair use may be made of DVD movies but that the fair user must be permitted access to the digital version of the DVD in order to directly copy excerpts for fair use in a digital format.

[35] In their supplemental papers, the Appellants contend, rather hyperbolically, that a prohibition on using copying machines to assist in making fair use of texts could not validly be upheld by the availability of "monks to scribe the relevant passages." Supplemental Brief for Appellants at 20.

6.3 United States v. O'Brien 6.3 United States v. O'Brien

391 U.S. 367
88 S.Ct. 1673
20 L.Ed.2d 672
UNITED STATES, Petitioner,

v.

David Paul O'BRIEN. David Paul O'BRIEN, Petitioner, v. UNITED STATES.

Nos. 232, 233.
Argued Jan. 24, 1968.
Decided May 27, 1968.

          [Syllabus from pages 367-368 intentionally omitted]

Page 369

                    Solicitor Gen. Erwin N. Griswold for the United States.

          Marvin M. Karpatkin, New York City, for David Paul O'Brien.

           Mr. Chief Justice WARREN delivered the opinion of the Court.

          On the morning of March 31, 1966, David Paul O'Brien and three companions burned their Selective Service registration certificates on the steps of the South Boston Courthouse. A sizable crowd, including several agents of the Federal Bureau of Investigation, witnessed the event.1 Immediately after the burning, members of the crowd began attacking O'Brien and his companions. An FBI agent ushered O'Brien to safety inside the courthouse. After he was advised of his right to counsel and to silence, O'Brien stated to FBI agents that he had burned his registration certificate because of his beliefs, knowing that he was violating federal law. He produced the charred remains of the certificate, which, with his consent, were photographed.

          For this act, O'Brien was indicted, tried, convicted, and sentenced in the United States District Court for the District of Massachusetts.2 He did not contest the fact

Page 370

that he had burned the certificate. He stated in argument to the jury that he burned the certificate publicly to influence others to adopt his antiwar beliefs, as he put it, 'so that other people would reevaluate their positions with Selective Service, with the armed forces, and reevaluate their place in the culture of today, to hopefully consider my position.'

          The indictment upon which he was tried charged that he 'willfully and knowingly did multilate, destroy, and change by burning * * * (his) Registration Certificate (Selective Service System Form No. 2); in violation of Title 50, App., United States Code, Section 462(b).' Section 462(b) is part of the Universal Military Training and Service Act of 1948. Section 462(b)(3), one of six numbered subdivisions of § 462(b), was amended by Congress in 1965, 79 Stat. 586 (adding the words italicized below), so that at the time O'Brien burned his certificate an offense was committed by any person,

          'who forges, alters, knowingly destroys, knowingly mutilates, or in any manner changes any such certificate * * *.' (Italics supplied.)

          In the District Court, O'Brien argued that the 1965 Amendment prohibiting the knowing destruction or mutilation of certificates was unconstitutional because it was enacted to abridge free speech, and because it served no legitimate legislative purpose.3 The District Court rejected these arguments, holding that the statute on its face did not abridge First Amendment rights, that the court was not competent to inquire into the motives of Congress in enacting the 1965 Amendment, and that the

Page 371

Amendment was a reasonable exercise of the power of Congress to raise armies.

          On appeal, the Court of Appeals for the First Circuit held the 1965 Amendment unconstitutional as a law abridging freedom of speech.4 At the time the Amendment was enacted, a regulation of the Selective Service System required registrants to keep their registration certificates in their 'personal possession at all times.' 32 CFR § 1617.1 (1962).5 Wilful violations of regulations promulgated pursuant to the Universal Military Training and Service Act were made criminal by statute. 50 U.S.C. App. § 462(b)(6). The Court of Appeals, therefore, was of the opinion that conduct punishable under the 1965 Amendment was already punishable under the nonpossession regulation, and consequently that the Amendment served no valid purpose; further, that in light of the prior regulation, the Amendment must have been 'directed at public as distinguished from private destruction.' On this basis, the court concluded that the 1965 Amendment ran afoul of the First Amendment by singling out persons engaged in protests for special treatment. The court ruled, however, that O'Brien's conviction should be affirmed under the statutory provision, 50 U.S.C. App. § 462(b)(6), which in its view made violation of the nonpossession regulation a crime, because it regarded such violation to be a lesser included offense of the crime defined by the 1965 Amendment.6

Page 372

          The Government petitioner for certiorari in No. 232, arguing that the Court of Appeals erred in holding the statute unconstitutional, and that its decision conflicted with decisions by the Courts of Appeals for the Second7 and Eighth Circuits8 upholding the 1965 Amendment against identical constitutional challenges. O'Brien cross-petitioned for certiorari in No. 233, arguing that the Court of Appeals erred in sustaining his conviction on the basis of a crime of which he was neither charged nor tried. We granted the Government's petition to resolve the conflict in the circuits, and we also granted O'Brien's cross-petition. We hold that the 1965 Amendment is constitutional both as enacted and as applied. We therefore vacate the judgment of the Court of Appeals and reinstate the judgment and sentence of the District Court without reaching the issue raised by O'Brien in No. 233.

I.

          When a male reaches the age of 18, he is required by the Universal Military Training and Service Act to register with a local draft board.9 He is assigned a Selective Service number,10 and within five days he is issued a

Page 373

registration certificate (SSS Form No. 2).11 Subsequently, and based on a questionnaire completed by the registrant,12 he is assigned a classification denoting his eligibility for induction,13 and '(a)s soon as practicable' thereafter he is issued a Notice of Classification (SSS Form No. 110).14 This initial classification is not necessarily permanent,15 and if in the interim before induction the registrant's status changes in some relevant way, he may be reclassified.16 After such a reclassification, the local board 'as soon as practicable' issues to the registrant a new Notice of Classification.17

          Both the registration and classification certificates are small white cards, approximately 2 by 3 inches. The registration certificate specifies the name of the registrant, the date of registration, and the number and address of the local board with which he is registered. Also inscribed upon it are the date and place of the registrant's birth, his residence at registration, his physical description, his signature, and his Selective Service number. The Selective Service number itself indicates his State of registration, his local board, his year of birth, and his chronological position in the local board's classification record.18

          The classification certificate shows the registrant's name, Selective Service number, signature, and eligibility classification. It specifies whether he was so classified by his local board, an appeal board, or the President. It

Page 374

contains the address of his local board and the date the certificate was mailed.

          Both the registration and classification certificates bear notices that the registrant must notify his local board in writing of every change in address, physical condition, and occupational, marital, family, dependency, and military status, and of any other fact which might change his classification. Both also contain a notice that the registrant's Selective Service number should appear on all communications to his local board.

          Congress demonstrated its concern that certificates issued by the Selective Service System might be abused well before the 1965 Amendment here challenged. The 1948 Act, 62 Stat. 604, itself prohibited many different abuses involving 'any registration certificate, * * * or any other certificate issued pursuant to or prescribed by the provisions of this title, or rules or regulations promulgated hereunder * * *.' 62 Stat. 622. Under §§ 12(b)(1)—(5) of the 1948 Act, it was unlawful (1) to transfer a certificate to aid a person in making false identification; (2) to possess a certificate not duly issued with the intent of using it for false identification; (3) to forge, alter, 'or in any manner' change a certificate or any notation validly inscribed thereon; (4) to photograph or make an imitation of a certificate for the purpose of false identification; and (5) to possess a counterfeited or altered certificate. 62 Stat. 622. In addition, as previously mentioned, regulations of the Selective Service System required registrants to keep both their registration and classification certificates in their personal possession at all times. 32 CFR § 1617.1 (1962) (Registration Certificates);19 32 CFR § 1623.5

Page 375

(1962) (Classification Certificates).20 And § 12(b)(6) of the Act, 62 Stat. 622, made knowing violation of any provision of the Act or rules and regulations promulgated pursuant thereto a felony.

          By the 1965 Amendment, Congress added to § 12(b)(3) of the 1948 Act the provision here at issue, subjecting to criminal liability not only one who 'forges, alters, or in any manner changes' but also one who 'knowingly destroys (or) knowingly mutilates' a certificate. We note at the outset that the 1965 Amendment plainly does not abridge free speech on its face, and we do not understand O'Brien to argue otherwise. Amended § 12(b)(3) on its face deals with conduct having no connection with speech. It prohibits the knowing destruction of certificates issued by the Selective Service System, and there is nothing necessarily expressive about such conduct. The Amendment does not distinguish between public and private destruction, and it does not punish only destruction engaged in for the purpose of expressing views. Compare Stromberg v. People of State of California, 283 U.S. 359, 51 S.Ct. 532, 75 L.Ed. 1117 (1931).21 A law prohibiting destruction of Selective Service certificates no more abridges free speech on its face than a motor vehicle law prohibiting the destruction of drivers' licenses, or a tax law prohibiting the destruction of books and records.

Page 376

          O'Brien nonetheless argues that the 1965 Amendment is unconstitutional in its application to him, and is unconstitutional as enacted because what he calls the 'purpose' of Congress was 'to suppress freedom of speech.' We consider these arguments separately.

II.

          O'Brien first argues that the 1965 Amendment is unconstitutional as applied to him because his act of burning his registration certificate was protected 'symbolic speech' within the First Amendment. His argument is that the freedom of expression which the First Amendment guarantees includes all modes of 'communication of ideas by conduct,' and that his conduct is within this definition because he did it in 'demonstration against the war and against the draft.'

          We cannot accept the view that an apparently limitless variety of conduct can be labeled 'speech' whenever the person engaging in the conduct intends thereby to express an idea. However, even on the assumption that the alleged communicative element in O'Brien's conduct is sufficient to bring into play the First Amendment, it does not necessarily follow that the destruction of a registration certificate is constitutionally protected activity. This Court has held that when 'speech' and 'nonspeech' elements are combined in the same course of conduct, a sufficiently important governmental interest in regulating the nonspeech element can justify incidental limitations on First Amendment freedoms. To characterize the quality of the governmental interest which must appear, the Court has employed a variety of descriptive terms: compelling; 22 substantial;23 subordi-

Page 377

nating;24 paramount;25 cogent;26 strong.27 Whatever imprecision inheres in these terms, we think it clear that a government regulation is sufficiently justified if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest. We find that the 1965 Amendment to § 12(b)(3) of the Universal Military Training and Service Act meets all of these requirements, and consequently that O'Brien can be constitutionally convicted for violating it.

          The constitutional power of Congress to raise and support armies and to make all laws necessary and proper to that end is broad and sweeping. Lichter v. Uniter States, 334 U.S. 742, 755 758, 68 S.Ct. 1294, 1301—1303, 92 L.Ed. 1694 (1948); Selective Draft Law Cases, 245 U.S. 366, 38 S.Ct. 159, 62 L.Ed. 349 (1918); see also Ex parte Quirin, 317 U.S. 1, 25—26, 63 S.Ct. 1, 9—10, 87 L.Ed. 3 (1942). The power of Congress to classify and conscript manpower for military service is 'beyond question.' Lichter v. United States, supra, 334 U.S. at 756, 68 S.Ct. at 1302; Selective Draft Law Cases, supra. Pursuant to this power, Congress may establish a system of registration for individuals liable for training and service, and may require such individuals within reason to cooperate in the registration system. The issuance of certificates indicating the registration and eligibility classification of individuals is a legitimate and substantial administrative aid in the functioning of this system. And legislation

Page 378

to insure the continuing availability of issued certificates serves a legitimate and substantial purpose in the system's administration.

          O'Brien's argument to the contrary is necessarily premised upon his unrealistic characterization of Selective Service certificates. He essentially adopts the position that such certificates are so many pieces of paper designed to notify registrants of their registration or classification, to be retained or tossed in the wastebasket according to the convenience or taste of the registrant. Once the registrant has received notification, according to this view, there is no reason for him to retain the certificates. O'Brien notes that most of the information on a registration certificate serves no notification purpose at all; the registrant hardly needs to be told his address and physical characteristics. We agree that the registration certificate contains much information of which the registrant needs no notification. This circumstance, however, does not lead to the conclusion that the certificate serves no purpose, but that, like the classification certificate, it serves purposes in addition to initial notification. Many of these purposes would be defeated by the certificates' destruction or mutilation. Among these are:

          1. The registration certificate serves as proof that the individual described thereon has registered for the draft. The classification certificate shows the eligibility classification of a named but undescribed individual. Voluntarily displaying the two certificates is an easy and painless way for a young man to dispel a question as to whether he might be delinquent in his Selective Service obligations. Correspondingly, the availability of the certificates for such display relieves the Selective Service System of the administrative burden it would otherwise have in verifying the registration and classification of all suspected delinquents. Further, since both certificates are in the nature of 'receipts' attesting that the regis-

Page 379

trant has done what the law requires, it is in the interest of the just and efficient administration of the system that they be continually available, in the event, for example, of a mix-up in the registrant's file. Additionally, in a time of national crisis, reasonable availability to each registrant of the two small cards assures a rapid and uncomplicated means for determining his fitness for immediate induction, no matter how distant in our mobile society he may be from his local board.

          2. The information supplied on the certificates facilitates communication between registrants and local boards, simplifying the system and benefiting all concerned. To begin with, each certificate bears the address of the registrant's local board, an item unlikely to be committed to memory. Further, each card bears the registrant's Selective Service number, and a registrant who has his number readily available so that he can communicate it to his local board when he supplies or requests information can make simpler the board's task in locating his file. Finally, a registrant's inquiry, particularly through a local board other than his own, concerning his eligibility status is frequently answerable simply on the basis of his classification certificate; whereas, if the certificate were not reasonably available and the registrant were uncertain of his classification, the task of answering his questions would be considerably complicated.

          3. Both certificates carry continual reminders that the registrant must notify his local board of any change of address, and other specified changes in his status. The smooth functioning of the system requires that local boards be continually aware of the status and whereabouts of registrants, and the destruction of certificates deprives the system of a potentially useful notice device.

          4. The regulatory scheme involving Selective Service certificates includes clearly valid prohibitions against the alteration, forgery, or similar deceptive misuse of certifi-

Page 380

cates. The destruction or mutilation of certificates obviously increases the difficulty of detecting and tracing abuses such as these. Further, a mutilated certificate might itself be used for deceptive purposes.

          The many functions performed by Selective Service certificates establish beyond doubt that Congress has a legitimate and substantial interest in preventing their wanton and unrestrained destruction and assuring their continuing availability by punishing people who knowingly and wilfully destroy or mutilate them. And we are unpersuaded that the pre-existence of the nonpossession regulations in any way negates this interest.

          In the absence of a question as to multiple punishment, it has never been suggested that there is anything improper in Congress' providing alternative statutory avenues of prosecution to assure the effective protection of one and the same interest. Compare the majority and dissenting opinions in Gore v. United States, 357 U.S. 386, 78 S.Ct. 1280, 2 L.Ed.2d 1405 (1958).28 Here, the pre-existing avenue of prosecution was not even statutory. Regulations may be modified or revoked from time to time by administrative discretion. Certainly, the Congress may change or supplement a regulation.

          Equally important, a comparison of the regulations with the 1965 Amendment indicates that they protect overlapping but not identical governmental interests, and that they reach somewhat different classes of wrongdoers.29 The gravamen of the offense defined by the statute is the deliberate rendering of certificates unavailable for the various purposes which they may serve. Whether registrants keep their certificates in their per-

Page 381

sonal possession at all times, as required by the regulations, is of no particular concern under the 1965 Amendment, as long as they do not mutilate or destroy the certificates so as to render them unavailable. Although as we note below we are not concerned here with the nonpossession regulations, it is not inappropriate to observe that the essential elements of nonpossession are not identical with those of mutilation or destruction. Finally, the 1965 Amendment, like § 12(b) which it amended, is concerned with abuses involving any issued Selective Service certificates, not only with the registrant's own certificates. The knowing destruction or mutilation of someone else's certificates would therefore violate the statute but not the nonpossession regulations.

          We think it apparent that the continuing availability to each registrant of his Selective Service certificates substantially furthers the smooth and proper functioning of the system that Congress has established to raise armies. We think it also apparent that the Nation has a vital interest in having a system for raising armies that functions with maximum efficiency and is capable of easily and quickly responding to continually changing circumstances. For these reasons, the Government has a substantial interest in assuring the continuing availability of issued Selective Service certificates.

          It is equally clear that the 1965 Amendment specifically protects this substantial governmental interest. We perceive no alternative means that would more precisely and narrowly assure the continuing availability of issued Selective Service certificates than a law which prohibits their wilful mutilation or destruction. Compare Sherbert v. Verner, 374 U.S. 398, 407—408, 83 S.Ct. 1790, 1795—1796, 10 L.Ed.2d 965 (1963), and the cases cited therein. The 1965 Amendment prohibits such conduct and does nothing more. In other words, both the governmental interest and the operation of the 1965 Amendment are limited to the noncommuni-

Page 382

cative aspect of O'Brien's conduct. The governmental interest and the scope of the 1965 Amendment are limited to preventing harm to the smooth and efficient functioning of the Selective Service System. When O'Brien deliberately rendered unavailable his registration certificate, he wilfully frustrated this governmental interest. For this noncommunicative impact of his conduct, and for nothing else, he was convicted.

          The case at bar is therefore unlike one where the alleged governmental interest in regulating conduct arises in some measure because the communication allegedly integral to the conduct is itself thought to be harmful. In Stromberg v. People of State of California, 283 U.S. 359, 51 S.Ct. 532, 75 L.Ed. 1117 (1931), for example, this Court struck down a statutory phrase which punished people who expressed their 'opposition to organized government' by displaying 'any flag, badge, banner, or device.' Since the statute there was aimed at suppressing communication it could not be sustained as a regulation of noncommunicative conduct. See also, NLRB v. Fruit & Vegetable Packers Union, 377 U.S. 58, 79, 84 S.Ct. 1063, 1074, 12 L.Ed.2d 129 (1964) (concurring opinion).

          In conclusion, we find that because of the Government's substantial interest in assuring the continuing availability of issued Selective Service certificates, because amended § 462(b) is an appropriately narrow means of protecting this interest and condemns only the independent noncommunicative impact of conduct within its reach, and because the noncommunicative impact of O'Brien's act of burning his registration certificate frustrated the Government's interest, a sufficient governmental interest has been shown to justify O'Brien's conviction.

III.

          O'Brien finally argues that the 1965 Amendment is unconstitutional as enacted because what he calls the 'purpose' of Congress was 'to suppress freedom of

Page 383

speech.' We reject this argument because under settled principles the purpose of Congress, as O'Brien uses that term, is not a basis for declaring this legislation unconstitutional.

          It is a familiar principle of constitutional law that this Court will not strike down an otherwise constitutional statute on the basis of an alleged illicit legislative motive. As the Court long ago stated:

          'The decisions of this court from the beginning lend no support whatever to the assumption that the judiciary may restrain the exercise of lawful power on the assumption that a wrongful purpose or motive has caused the power to be exerted.' McCray v. United States, 195 U.S. 27, 56, 24 S.Ct. 769, 776, 49 L.Ed. 78 (1904).

          This fundamental principle of constitutional adjudication was reaffirmed and the many cases were collected by Mr. Justice Brandeis for the Court in State of Arizona v. State of California, 283 U.S. 423, 455, 51 S.Ct. 522, 526, 75 L.Ed. 1154 (1931).

          Inquiries into congressional motives or purposes are a hazardous matter. When the issue is simply the interpretation of legislation, the Court will look to statements by legislators for guidance as to the purpose of the legislature, 30 because the benefit to sound decision-making in-

Page 384

this circumstance is thought sufficient to risk the possibility of misreading Congress' purpose. It is entirely a different matter when we are asked to void a statute that is, under well-settled criteria, constitutional on its face, on the basis of what fewer than a handful of Congressmen said about it. What motivates one legislator to make a speech about a statute is not necessarily what motivates scores of others to enact it, and the stakes are sufficiently high for us to eschew guesswork. We decline to void essentially on the ground that it is unwise legislation which Congress had the undoubted power to enact and which could be reenacted in its exact form if the same or another legislator made a 'wiser' speech about it.

          O'Brien's position, and to some extent that of the court below, rest upon a misunderstanding of Grosjean v. American Press Co., 297 U.S. 233, 56 S.Ct. 444, 80 L.Ed. 660 (1936), and Gomillion v. Lighfoot, 364 U.S. 339, 81 S.Ct. 125, 5 L.Ed.2d 110 (1960). These cases stand, not for the proposition that legislative motive is a proper basis for declaring a statute unconstitutional, but that the inevitable effect of a statute on its face may render it unconstitutional. Thus, in Grosjean the Court, having concluded that the right of publications to be free from certain kinds of taxes was a freedom of the press protected by the First Amendment, struck down a statute which on its face did nothing other than impose

Page 385

just such a tax. Similarly, in Gomillion, the Court sustained a complaint which, if true, established that the 'inevitable effect,' 364 U.S., at 341, 81 S.Ct. at 127, of the redrawing of municipal boundaries was to deprive the petitioners of their right to vote for no reason other than that they were Negro. In these cases, the purpose of the legislation was irrelevant, because the inevitable effect—the 'necessary scope and operation,' McCray v. United States, 195 U.S. 27, 59, 24 S.Ct. 769, 777, 49 L.Ed. 78 (1904)—abridged constitutional rights. The statute attacked in the instant case has no such inevitable unconstitutional effect, since the destruction of Selective Service certificates is in no respect inevitably or necessarily expressive. Accordingly, the statute itself is constitutional.

          We think it not amiss, in passing, to comment upon O'Brien's legislative-purpose argument. There was little floor debate on this legislation in either House. Only Senator Thurmond commented on its substantive features in the Senate. 111 Cong.Rec. 19746, 20433. After his brief statement, and without any additional substantive comments, the bill, H.R. 10306, passed the Senate. 111 Cong.Rec. 20434. In the House debate only two Congressment addressed themselves to the Amendment—Congressmen Rivers and Bray. 111 Cong.Rec. 19871, 19872. The bill was passed after their statements without any further debate by a vote of 393 to 1. It is principally on the basis of the statements by these three Congressmen that O'Brienmakes his congressional-'purpose' argument. We note that if we were to examine legislative purpose in the instant case, we would be obliged to consider not only these statements but also the more authoritative reports of the Senate and House Armed Services Committees. The portions of those reports explaining the purpose of the Amendment are reproduced in the Appendix in their entirety. While both reports make clear a concern with the 'defiant'

Page 386

destruction of so-called 'draft cards' and with 'open' encouragement to others to destroy their cards, both reports also indicate that this concern stemmed from an apprehension that unrestrained destruction of cards would disrupt the smooth functioning of the Selective Service System.

IV.

          Since the 1965 Amendment to § 12(b)(3) of the Universal Military Training and Service Act is constitutional as enacted and as applied, the Court of Appeals should have affirmed the judgment of conviction entered by the District Court. Accordingly, we vacate the judgment of the Court of Appeals, and reinstate the judgment and sentence of the District Court. This disposition makes unnecessary consideration of O'Brien's claim that the Court of Appeals erred in affirming his conviction on the basis of the nonpossession regulation.31

          It is so ordered.

          Mr. Justice MARSHALL took no part in the consideration or decision of these cases.

                            APPENDIX TO OPINION OF THE COURT.

  PORTIONS OF THE REPORTS OF THE COMMITTEES ON ARMED SERVICES OF THE SENATE AND HOUSE EXPLAINING THE 1965 AMENDMENT.

          The 'Explanation of the Bill' in the Senate Report is as follows:

          'Section 12(b)(3) of the Universal Military Training and Service Act of 1951, as amended, provides, among other things, that a person who forges, alters, or changes

Page 387

a draft registration certificate is subject to a fine of not more than $10,000 or imprisonment of not more than 5 years, or both. There is no explicit prohibition in this section against the knowing destruction or mutilation of such cards.

          'The committee has taken notice of the defiant destruction and mutilation of draft cards by dissident persons who disapprove of national policy. If allowed to continue unchecked this contumacious conduct represents a potential threat to the exercise of the power to raise and support armies.

          'For a person to be subject to fine or imprisonment the destruction or mutilation of the draft card must be 'knowingly' done. This qualification is intended to protect persons who lose or mutilate draft cards accidentally.' S.Rep. No. 589, 89th Cong., 1st Sess. (1965). And the House Report explained:

          'Section 12(b)(3) of the Universal Military Training and Service Act of 1951, as amended, provides that a person who forges, alters, or in any manner changes his draft registration card, or any notation duly and validly inscribed thereon, will be subject to a fine of $10,000 or imprisonment of not more than 5 years. H.R. 10306 would amend this provision to make it apply also to those persons who knowingly destroy or knowingly mutilate a draft registration card.

          'The House Committee on Armed Services is fully aware of, and shares in, the deep concern expressed throughout the Nation over the increasing incidences in which individuals and large groups of individuals openly defy and encourage others to defy the authority of their Government by destroying or mutilating their draft cards.

          'While the present provisions of the Criminal Code with respect to the destruction of Government property

Page 388

may appear broad enough to cover all acts having to do with the mistreatment of draft cards in the possession of individuals, the committee feels that in the present critical situation of the country, the acts of destroying or mutilating these cards are offenses which pose such a grave threat to the security of the Nation that no question whatsoever should be left as to the intention of the Congress that such wanton and irresponsible acts should be punished.

          'To this end, H.R. 10306 makes specific that knowingly mutilating or knowingly destroying a draft card constitutes a violation of the Universal Military Training and Service Act and is punishable thereunder; and that a person who does so destroy or mutilate a draft card will be subject to a fine of not more than $10,000 or imprisonment of not more than 5 years.' H.R.Rep. No. 747, 89th Cong., 1st Sess. (1965) U.S. Congressional and Administrative News, p. 2890.

           Mr. Justice HARLAN, concurring.

          The crux of the Court's opinion, which I join, is of course its general statement, ante, at 377, that:

          'a government regulation is sufficiently justified if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest.'

          I wish to make explicit my understanding that this passage does not foreclose consideration of First Amendment claims in those rare instances when an 'incidental' restriction upon expression, imposed by a regulation which furthers an 'important or substantial' governmental interest and satisfies the Court's other criteria, in practice has the effect of entirely preventing a 'speaker'

Page 389

from reaching a significant audience with whom he could not otherwise lawfully communicate. This is not such a case, since O'Brien manifestly could have conveyed his message in many ways other than by burning his draft card.

           Mr. Justice DOUGLAS, dissenting.

          The Court states that the constitutional power of Congress to raise and support armies is 'broad and sweeping' and that Congress' power 'to classify and conscript manpower for military service is 'beyond question." This is undoubtedly true in times when, by declaration of Congress, the Nation is in a state of war. The underlying and basic problem in this case, however, is whether conscription is permissible in the absence of a declaration of war. 1 That question has not been briefed nor was it presented in oral argument; but it is, I submit, a question upon which the litigants and the country are entitled to a ruling. I have discussed in Holmes v. United States, 390 U.S. 936, 88 S.Ct. 1835, the nature of the legal issue and it will be seen from my dissenting opinion in that case that this Court has never ruled on

Page 390

the question. It is time that we made a ruling. This case should be put down for reargument and heard with Holmes v. United States and with Hart v. United States, 390 U.S. 956, 88 S.Ct. 1851, 20 L.Ed.2d 871, in which the Court today denies certiorari.2

          The rule that this Court will not consider issues not raised by the parties is not inflexible and yields in 'exceptional cases' (Duignan v. United States, 274 U.S. 195, 200, 47 S.Ct. 566, 71 L.Ed. 996) to the need correctly to decide the case before the court. E.g., Erie R. Co. v. Tompkins, 304 U.S. 64, 58 S.Ct. 817, 82 L.Ed. 1188; Terminiello v. City of Chicago, 337 U.S. 1, 69 S.Ct. 894, 93 L.Ed. 1131.

          In such a case it is not unusual to ask for reargument (Sherman v. United States, 356 U.S. 369, 379, n. 2, 78 S.Ct. 819, 2 L.Ed.2d 848, Frankfurter, J., concurring) even on a constitutional question not raised by the parties. In Abel v. United States, 362 U.S. 217, 80 S.Ct. 683, 4 L.Ed.2d 668, the petitioner had conceded that an administrative deportation arrest warrant would be valid for its limited purpose even though not supported by a sworn affidavit stating probable cause; but the Court ordered reargument on the question whether the warrant had been validly issued in petitioner's case. 362 U.S., at 219, n., par. 1, 80 S.Ct. at 687; 359 U.S. 940, 79 S.Ct. 720, 3 L.Ed.2d 674. In Lustig v. United States, 338 U.S. 74, 69 S.Ct. 1372, 93 L.Ed. 1819, the petitioner argued that an exclusionary rule should apply to the fruit of an unreasonable search by state officials solely because they acted in concert with federal officers (see Weeks v. United States, 232 U.S. 383, 34 S.Ct. 341, 58 L.Ed. 652; Byars v. United States, 273 U.S. 28, 47 S.Ct. 248, 71 L.Ed. 520). The Court ordered reargument on the question raised in a then pending case, Wolf v. People of State of Colorado, 338 U.S. 25, 69 S.Ct. 1359, 93 L.Ed. 1782, applicability of the Fourth Amendment to the States. U.S.Sup.Ct. Journal, October Term, 1947, p. 298. In Donaldson v. Read Magazine, 333 U.S. 178, 68 S.Ct. 591, 92 L.Ed. 628, the only issue presented,

Page 391

according to both parties, was whether the record contained sufficient evidence of fraud to uphold an order of the Postmaster General. Reargument was ordered on the constitutional issue of abridgment of First Amendment freedoms. 333 U.S., at 181—182, 68 S.Ct. at 593—594; Journal, October Term, 1947, p. 70. Finally, in Musser v. Utah, 333 U.S. 95, 96, 68 S.Ct. 397, 92 L.Ed. 562, reargument was ordered on the question of unconstitutional vagueness of a criminal statute, an issue not raised by the parties but suggested at oral argument by Justice Jackson. Journal, October Term, 1947, p. 87.

          These precedents demonstrate the appropriateness of restoring the instant case to the calendar for reargument on the question of the constitutionality of a peacetime draft and having it heard with Holmes v. United States and Hart v. United States.

1. At the time of the burning, the agents knew only that O'Brien and his three companions had burned small white cards. They later discovered that the card O'Brien burned was his registration certificate, and the undisputed assumption is that the same is true of his companions.

2. He was sentenced under the Youth Corrections Act, 18 U.S.C. § 5010(b), to the custody of the Attorney General for a maximum period of six years for supervision and treatment.

3. The issue of the constitutionality of the 1965 Amendment was raised by counsel representing O'Brien in a pretrial motion to dismiss the indictment. At trial and upon sentencing, O'Brien chose to represent himself. He was represented by counsel on his appeal to the Court of Appeals.

4. O'Brien v. United States, 376 F.2d 538 (C.A.1st Cir. 1967).

5. The portion of 32 CFR relevant to the instant case was revised as of January 1, 1967. Citations in this opinion are to the 1962 edition which was in effect when O'Brien committed the crime, and when Congress enacted the 1965 Amendment.

6. The Court of Appeals nevertheless remanded the case to the District Court to vacate the sentence and resentence O'Brien. In the court's view, the district judge might have considered the violation of the 1965 Amendment as an aggravating circumstance in imposing sentence. The Court of Appeals subsequently denied O'Brien's petition for a rehearing, in which he argued that he had not been charged, tried, or convicted for nonpossession, and that nonpossession was not a lesser included offense of mutilation or destruction. O'Brien v. United States, 376 F.2d 538, 542 (C.A.1st Cir. 1967).

7. United States v. Miller, 367 F.2d 72 (C.A.2d Cir. 1966), cert. denied, 386 U.S. 911, 87 S.Ct. 855, 17 L.Ed.2d 787 (1967).

8. Smith v. United States, 368 F.2d 529 (C.A.8th Cir. 1966).

9. See 62 Stat. 605, as amended, 65 Stat. 76, 50 U.S.C. App. § 453; 32 CFR § 1613.1 (1962).

10. 32 CFR § 1621.2 (1962).

11. 32 CFR § 1613.43a (1962).

12. 32 CFR §§ 1621.9, 1623.1 (1962).

13. 32 CFR §§ 1623.1, 1623.2 (1962).

14. 32 CFR § 1623.4 (1962).

15. 32 CFR § 1625.1 (1962).

16. 32 CFR §§ 1625.1, 1625.2, 1625.3, 1625.4, and 1625.11 (1962).

17. 32 CFR § 1625.12 (1962).

18. 32 CFR § 1621.2 (1962).

19. 32 CFR § 1617.1 (1962), provides, in relevant part:

'Every person required to present himself for and submit to registration must, after he is registered, have in his personal possession at all times his Registration Certificate (SSS Form No. 2) prepared by his local board which has not been altered and on which no notation duly and validly inscribed thereon has been changed in any manner after its preparation by the local board. The failure of any person to have his Registration Certificate (SSS Form No. 2) in his personal possession shall be prima facie evidence of his failure to register.'

20. 32 CFR § 1623.5 (1962), provides, in relevant part:

'Every person who has been classified by a local board must have in his personal possession at all times, in addition to his Registration Certificate (SSS Form No. 2), a valid Notice of Classification (SSS Form No. 110) issued to him showing his current classification.'

21. See text, infra, at 382.

22. NAACP v. Button, 371 U.S. 415, 438, 83 S.Ct. 328, 340, 9 L.Ed.2d 405 (1963); see also Sherbert v. Verner, 374 U.S. 398, 403, 83 S.Ct. 1790, 1793, 10 L.Ed.2d 965 (1963).

23. NAACP v. Button, 371 U.S. 415, 444, 83 S.Ct. 328, 343, 9 L.Ed.2d 405 (1963); NAACP v. State of Alabama ex rel. Patterson, 357 U.S. 449, 464, 78 S.Ct. 1163, 2 L.Ed.2d 1488 (1958).

24. Bates v. City of Little Rock, 361 U.S. 516, 524, 80 S.Ct. 412, 417, 4 L.Ed.2d 480 (1960).

25. Thomas v. Collins, 323 U.S. 516, 530, 65 S.Ct. 315, 322, 89 L.Ed. 430 (1945); see also Sherbert v. Verner, 374 U.S. 398, 406, 83 S.Ct. 1790, 1795, 10 L.Ed.2d 965 (1963).

26. Bates v. City of Little Rock, 361 U.S. 516, 524, 80 S.Ct. 412, 417, 4 L.Ed.2d 480 (1960).

27. Sherbert v. Verner, 374 U.S. 398, 408, 83 S.Ct. 1790, 1796, 10 L.Ed.2d 965 (1963).

28. Cf. Milanovich v. United States, 365 U.S. 551, 81 S.Ct. 728, 5 L.Ed.2d 773 (1961); Heflin v. United States, 358 U.S. 415, 79 S.Ct. 451, 3 L.Ed.2d 407 (1959); Prince v. United States, 352 U.S. 322, 77 S.Ct. 403, 1 L.Ed.2d 370 (1957).

29. Cf. Milanovich v. United States, 365 U.S. 551, 81 S.Ct. 728, 5 L.Ed.2d 773 (1961); Heflin v. United States, 358 U.S. 415, 79 S.Ct. 451, 3 L.Ed.2d 407 (1959); Prince v. United States, 352 U.S. 322, 77 S.Ct. 403, 1 L.Ed.2d 370 (1957).

30. The Court may make the same assumption in a very limited and well-defined class of cases where the very nature of the constitutional question requires an inquiry into legislative purpose. The principal class of cases is readily apparent—those in which statutes have been challenged as bills of attainder. This Court's decisions have defined a bill of attainder as a legislative Act which inflicts punishment on named individuals or members of an easily ascertainable group without a judicial trial. In determining whether a particular statute is a bill of attainder, the analysis necessarily requires an inquiry into whether the three definitional elements—specificity in identification, punishment, and lack of a judicial trial—are contained in the statute. The inquiry into whether the challenged statute contains the necessary element of punishment has on occasion led the Court to examine the legislative motive in enacting the statute. See, e.g., United States v. Lovett, 328 U.S. 303, 66 S.Ct. 1073, 90 L.Ed. 1252 (1946). Two other decisions not involving a bill of attainder analysis contain an inquiry into legislative purpose or motive of the type that O'Brien suggests we engage in in this case. Kennedy v. Mendoza-Martinez, 372 U.S. 144, 169—184, 83 S.Ct. 554, 568—575, 9 L.Ed.2d 644 (1963); Trop v. Dulles, 356 U.S. 86, 95—97, 78 S.Ct. 590, 595—596, 2 L.Ed.2d 630 (1958). The inquiry into legislative purpose or motive in Kennedy and Trop, however, was for the same limited purpose as in the bill of attainder decisions—i.e., to determine whether the statutes under review were punitive in nature. We face no such inquiry in this case. The 1965 Amendment to § 462(b) was clearly penal in nature, designed to impose criminal punishment for designated acts.

31. The other issues briefed by O'Brien were not raised in the petition for certiorari in No. 232 or in the cross-petition in No. 233. Accordingly, those issues are not before the Court.

1. Neither of the decisions cited by the majority for the proposition that Congress' power to conscript men into the armed services is "beyond question" concerns peacetime conscription. As I have shown in my dissenting opinion in Holmes v. United States, 391 U.S. 936, 88 S.Ct. 1835, 20 L.Ed.2d 856, the Selective Draft Law Cases, 245 U.S. 366, 38 S.Ct. 159, 62 L.Ed. 349, decided in 1918, upheld the constitutionality of a conscription act passed by Congress more than a month after war had been declared on the German Empire and which was then being enforced in time of war. Lichter v. United States, 334 U.S. 742, 68 S.Ct. 1294, 92 L.Ed. 1694, concerned the constitutionality of the Renegotiation Act, another wartime measure, enacted by Congress over the period of 1942—1945 (id., at 745, n. 1, 68 S.Ct. at 1297) and applied in that case to excessive war profits made in 1942—1943 (id., at 753, 68 S.Ct. at 1300). War had been declared, of course, in 1941 (55 Stat. 795). The Court referred to Congress' power to raise armies in discussing the 'background' (334 U.S., at 753, 68 S.Ct., at 1300) of the Renegotiation Act, which it upheld as a valid exercise of the War Power.

2. Today the Court also denies stays in Shiffman v. Selective Service Local Board No. 5, 391 U.S. 930, 88 S.Ct. 1831, 20 L.Ed.2d 849, and Zigmond v. Selective Service Local Board No. 16, 391 U.S. 930, 88 S.Ct. 1831, 20 L.Ed.2d 851, where punitive delinquency regulations are invoked against registrants, decisions that present a related question.