AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
When the Framers of the First Amendment prohibited Congress from making any law âabridging the freedom of speech,â they were not thinking about computers, computer programs, or the Internet. But neither were they thinking about radio, television, or movies. Just as the inventions at the beginning and middle of the 20th century presented new First Amendment issues, so does the cyber revolution at the end of that century. This appeal raises significant First Amendment issues concerning one aspect of computer technology â encryption to protect materials in digital form from unauthorized access. The appeal challenges the constitutionality of the Digital Millennium Copyright Act (âDMCAâ), 17 U.S.C. § 1201 et seq. (Supp. V 1999) and the validity of an injunction entered to enforce the DMCA.
Defendanh-Appellant Eric C. Corley and his company, 2600 Enterprises, Inc., (collectively âCorley,â âthe Defendants,â or âthe Appellantsâ) appeal from the amended final judgment of the United States District Court for the Southern District of New York (Lewis A. Kaplan, District Judge), entered August 23, 2000, enjoining them from various actions concerning a decryption program known as âDeCSS.â Universal City Studios, Inc. v. Reimerdes, 111 F.Supp.2d 346 (S.D.N.Y.2000) (âUniversal IIâ). The injunction primarily bars the Appellants from posting DeCSS on *435 their web site and from knowingly linking their web site to any other web site on which DeCSS is posted. Id. at 346-47. We affirm.
Introduction
Understanding the pending appeal and the issues it raises requires some familiarity with technical aspects of computers and computer software, especially software called âdigital versatile disksâ or âDVDs,â which are optical media storage devices currently designed to contain movies. 1 Those lacking such familiarity will be greatly aided by reading Judge Kaplanâs extremely lucid opinion, Universal City Studios, Inc. v. Reimerdes, 111 F.Supp.2d 294 (S.D.N.Y.2000) (âUniversal Iâ), beginning with his helpful section âThe Vocabulary, of this Case,â id. at 305-09.
This appeal concerns the anti-trafficking provisions of the DMCA, which Congress enacted in 1998 to strengthen copyright protection in the digital age. Fearful that the ease with which pirates could copy and distribute a copyrightable work in digital form was overwhelming the capacity of conventional copyright enforcement to find and enjoin unlawfully copied material, Congress sought to combat copyright piracy in its earlier stages, before the work was even copied. The DMCA therefore backed with legal sanctions the efforts of copyright owners to protect their works from piracy behind digital walls such as encryption codes or password protections. In so doing, Congress targeted not only those pirates who would circumvent these digital walls (the âanti-circumvention provisions,â contained in 17 U.S.C. § 1201(a)(1)), but also anyone who would traffic in a technology primarily designed to circumvent a digital wall (the âanti-trafficking provisions,â contained in 17 U.S.C. § 1201(a)(2), (b)(1)).
Corley publishes a print magazine and maintains an affiliated web site geared towards âhackers,â a digital-era term often applied to those interested in techniques for circumventing protections of computers and computer data from unauthorized access. The so-called hacker community includes serious computer-science scholars conducting research on protection techniques, computer buffs intrigued by the challenge of trying to circumvent access-limiting devices or perhaps hoping to promote security by exposing flaws in protection techniques, mischief-makers interested in disrupting computer operations, and thieves, including copyright infringers who want to acquire copyrighted material (for personal use or resale) without paying for it.
In November 1999, Corley posted a copy of - the decryption computer program âDeCSSâ on his web site, http:// www.2600.com(â2600.comâ). 2 DeCSS is designed to circumvent âCSS,â the en *436 cryption technology that motion picture studios place on DVDs to prevent the unauthorized viewing and copying of motion pictures. Corley also posted on his web site links to other web sites where DeCSS could be found. Plaintiffs-Appellees are eight motion picture studios that brought an action in the Southern District of New York seeking injunctive relief against Corley under the DMCA. Following a full non-jury trial, the District Court entered a permanent injunction barring Corley from posting DeCSS on his web site or from knowingly linking via a hyperlink to any other web site containing DeCSS. Universal II, 111 F.Supp.2d at 346-47. The District Court rejected Corleyâs constitutional attacks on the statute and the injunction. Universal I, 111 F.Supp.2d at 325-45.
Corley renews his constitutional challenges on appeal. Specifically, he argues primarily that: (1) the DMCA oversteps limits in the Copyright Clause on the duration of copyright protection; (2) the DMCA as applied to his dissemination of DeCSS violates the First Amendment because computer code is âspeechâ entitled to full First Amendment protection and the DMCA fails to survive the exacting scrutiny accorded statutes that regulate âspeechâ; and (3) the DMCA violates the First Amendment and the Copyright Clause by unduly obstructing the âfair useâ of copyrighted materials. Corley also argues that the statute is susceptible to, and should therefore be given, a narrow interpretation that avoids alleged constitutional objections.
Background
For decades, motion picture studios have made movies available for viewing at home in what is called âanalogâ format. Movies in this format are placed on videotapes, which can be played on a video cassette recorder (âVCRâ). In the early 1990s, the studios began to consider the possibility of distributing movies in digital form as well. Movies in digital form are placed on disks, known as DVDs, which can be played on a DVD player (either a stand-alone device or a component of a computer). DVDs offer advantages over analog tapes, such as improved visual and audio quality, larger data capacity, and greater durability. However, the improved quality of a movie in a digital format brings with it the risk that a virtually perfect copy, i.e., one that will not lose perceptible quality in the copying process, can be readily made at the click of a computer control and instantly distributed to countless recipients throughout the world over the Internet. This case arises out of the movie industryâs efforts to respond to this risk by invoking the anti-trafficking provisions of the DMCA.
I. CSS
The movie studios were reluctant to release movies in digital form until they were confident they had in place adequate safeguards against piracy of their copyrighted movies. The studios took several steps to minimize the piracy threat. First, they settled on the DVD as the standard digital medium for home distribution of movies. The studios then sought an encryption scheme to protect movies on DVDs. They enlisted the help of members of the consumer electronics and computer industries, who in mid-1996 developed the Content Scramble System (âCSSâ). CSS is an encryption scheme that employs an algorithm configured by a set of âkeysâ to encrypt a DVDâs contents. The algorithm is a type of mathematical formula for transforming the contents of the movie file into gibberish; the âkeysâ are in actuality strings of 0âs and lâs that serve as values for the mathematical formula. *437 Decryption in the case of CSS requires a set of âplayer keysâ contained in compliant DVD players, as well as an understanding of the CSS encryption algorithm. Without the player keys and the algorithm, a DVD player cannot access the contents of a DVD. With the player keys and the algorithm, a DVD player can display the movie on a television or a computer screen, but does not give a viewer the ability to use the copy function of the computer to copy the movie or to manipulate the digital content of the DVD.
The studios developed a licensing scheme for distributing the technology to manufacturers of DVD players. Player keys and other information necessary to the CSS scheme were given to manufacturers of DVD players for an administrative fee. In exchange for the licenses, manufacturers were obliged to keep the player keys confidential. Manufacturers were also required in the licensing agreement to prevent the transmission of âCSS dataâ (a term undefined in the licensing agreement) from a DVD drive to any âinternal recording device,â including, presumably, a computer hard drive.
With encryption technology and licensing agreements in hand, the studios began releasing movies on DVDs in 1997, and DVDs quickly gained in popularity, becoming a significant source of studio revenue. 3 In 1998, the studios secured added protection against DVD piracy when Congress passed the DMCA, which prohibits the development or use of technology designed to circumvent a technological protection measure, such as CSS. The pertinent provisions of the DMCA are examined in greater detail below.
II. DeCSS
In September 1999, Jon Johansen, a Norwegian teenager, collaborating with two unidentified individuals he met on the Internet, reverse-engineered a licensed DVD player designed to operate on the Microsoft operating system, and culled from it the player keys and other information necessary to decrypt CSS. The record suggests that Johansen was trying to develop a DVD player operable on Linux, an alternative operating system that did not support any licensed DVD players at that time. In order to accomplish this task, Johansen wrote a decryption program executable on Microsoftâs operating system. 4 That program was called, appropriately enough, âDeCSS.â
If a user runs the DeCSS program (for example, by clicking on the DeCSS icon on a Microsoft operating system platform) with a DVD in the computerâs disk drive, DeCSS will decrypt the DVDâs CSS protection, allowing the user to copy the DVDâs files and place the copy on the userâs hard drive. The result is a very large computer file that can be played on a non-CSS-compliant player and copied, manipulated, and trans *438 ferred just like any other computer file. 5 DeCSS comes complete with a fairly user-friendly interface that helps the user select from among the DVDâs files and assign the decrypted file a location on the userâs hard drive. The quality of the resulting decrypted movie is âvirtually identicalâ to that of the encrypted movie on the DVD. Universal I, 111 F.Supp.2d at 308, 313. And the file produced by DeCSS, while large, can be compressed to a manageable size by a compression software called âDivX,â available at no cost on the Internet. This compressed file can be copied onto a DVD, or transferred over the Internet (with some patience). 6
Johansen posted the executable object code, but not the source code, for DeCSS on his web site. The distinction between source code and object code is relevant to this case, so a brief explanation is warranted. A computer responds to electrical charges, the presence or *439 absence of which is represented by strings of lâs and 0âs. Strictly speaking, âobject codeâ consists of those lâs and 0âs. Trial Tr. at 759 (Testimony of Professor Edward Felton). While some people can read and program in object code, âit would be inconvenient, inefficient and, for most people, probably impossible to do so.â Universal I, 111 F.Supp.2d at 306. Computer languages have been written to facilitate program writing and reading. A program in such a computer language â BASIC, C, and Java are examples â is said to be written in âsource code.â Source code has the benefit of being much easier to read (by people) than object code, but as a general matter, it must be translated back to object code before it can be read by a computer. This task is usually performed by a program called a compiler. Since computer languages range in complexity, object code can be placed on one end of a spectrum, and different kinds of source code can be arrayed across the spectrum according to the ease with which they are read and understood by humans. See Trial Exhibits BBC (Declaration of David S. Touretzky), BBE (Touretzky Article: Source v. Object Code: A False Dichotomy). Within months of its appearance in executable form on Johansenâs web site, DeCSS was widely available on the Internet, in both object code and various forms of source code. See Trial Exhibit CCN (Touretzky Article: Gallery of CSS De-scramblers).
In November 1999, Corley wrote and placed on his web site, 2600.com, an article about the DeCSS phenomenon. His web site is an auxiliary to the print magazine, 2600: The Hacker Quarterly, which Corley has been publishing since 1984. 7 As the name suggests, the magazine is designed for âhackers,â as is the web site. While the magazine and the web site cover some issues of general interest to computer users â such as threats to online privacy â the focus of the publications is on the vulnerability of computer security systems, and more specifically, how to exploit that vulnerability in order to circumvent the security systems. Representative articles explain how to steal an Internet domain name and how to break into the computer systems at Federal Express. Universal I, 111 F.Supp.2d at 308-09.
Corleyâs article about DeCSS detailed how CSS was cracked, and described the movie industryâs efforts to shut down web sites posting DeCSS. It also explained that DeCSS could be used to copy DVDs. At the end of the article, the Defendants posted copies of the object and source code of DeCSS. In Corleyâs words, he added the code to the story because âin a journalistic world, ... [y]ou have to show your evidence ... and particularly in the magazine that I work for, people want to see specifically what it is that we are referring to,â including âwhat evidence ... we haveâ that there is in fact technology that circumvents CSS. Trial Tr. at 823. Writing about DeCSS without including the DeCSS code would have been, to Corley, âanalogous to printing a story about a picture and not printing the picture.â Id. at 825. Corley also added to the article links that he explained would take the reader to other web sites where DeCSS could be found. Id. at 791, 826, 827, 848.
2600.com was only one of hundreds of web sites that began posting DeCSS near the end of 1999. The movie industry tried to stem the tide by sending cease-and-desist letters to many of these sites. These efforts met with only partial success; a number of sites refused to remove *440 DeCSS. In January 2000, the studios filed this lawsuit. 8
III. The DMCA
The DMCA was enacted in 1998 to implement the World Intellectual Property Organization Copyright Treaty (âWIPO Treatyâ), which requires contracting parties to âprovide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.â WIPO Treaty, Apr. 12, 1997, art. 11, S. Treaty Doc. No. 105-17 (1997), available at 1997 WL 447232. Even before the treaty, Congress had been devoting attention to the problems faced by copyright enforcement in the digital age. Hearings on the topic have spanned several years. See, e.g., WIPO Copyright Treaties Implementation Act and Online Copyright Liability Limitation Act: Hearing on H.R. 2281 and H.R. 2280 Before the Subcomm. on Courts and Intellectual Property of the House Comm, on the Judiciary, 105th Cong. (1997); Nil Copyright Protection Act of 1995: Hearings on H.R. 2441 Before the Subcomm. on Courts and Intellectual Property of the House Comm, on the Judiciary, 104th Cong. (1996); Nil Copyright Protection Act of 1995: Joint Hearing on H.R. 2441 and S. 1284 Before the Sub-comm. on Courts and Intellectual Property of the House Comm, on the Judiciary and the Senate Comm, on the Judiciary, 104th Cong. (1995); H.R.Rep. No. 105-551 (1998); S.Rep. No. 105-190 (1998). This legislative effort resulted in the DMCA.
The Act contains three provisions targeted at the circumvention of technological protections. The first is subsection 1201(a)(1)(A), the anti-circumvention provision. 9 This provision prohibits a person from âcircumventpng] a technological measure that effectively controls access to a work protected under [Title 17, governing copyright].â The Librarian of Congress is required to promulgate regulations every three years exempting from this subsection individuals who would otherwise be âadversely affectedâ in âtheir ability to make noninfringing uses.â 17 U.S.C. § 1201(a)(l)(B)-(E).
The second and third provisions are subsections 1201(a)(2) and 1201(b)(1), the âanti-trafficking provisions.â Subsection 1201(a)(2), the provision at issue in this case, provides:
No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, thatâ
(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;
(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with that person with that personâs knowledge for use in circumventing a technological mea *441 sure that effectively controls access to a work protected under this title.
Id. § 1201(a)(2). To âcircumvent a technological measureâ is defined, in pertinent part, as âto descramble a scrambled work ... or otherwise to ... bypass ... a technological measure, without the authority of the copyright owner.â Id. § 1201(a)(8)(A).
Subsection 1201(b)(1) is similar to subsection 1201(a)(2), except that subsection 1201(a)(2) covers those who traffic in technology that can circumvent âa technological measure that effectively controls access to a work protected underâ Title 17, whereas subsection 1201(b)(1) covers those who traffic in technology that can circumvent âprotection afforded by a technological measure that effectively protects a right of a copyright owner underâ Title 17. Id. § 1201(a)(2), (b)(1) (emphases added). In other words, although both subsections prohibit trafficking in a circumvention technology, the focus of subsection 1201(a)(2) is circumvention of technologies designed to prevent access to a work, and the focus of subsection 1201(b)(1) is circumvention of technologies designed to permit access to a work but prevent copying of the work or some other act that infringes a copyright. See S.Rep. No. 105-190, at 11-12 (1998). Subsection 1201(a)(1) differs from both of these anti-trafficking subsections in that it targets the use of a circumvention technology, not the trafficking in such a technology.
The DMCA contains exceptions for schools and libraries that want to use circumvention technologies to determine whether to purchase a copyrighted product, 17 U.S.C. § 1201(d); individuals using circumvention technology âfor the sole purposeâ of trying to achieve âinteroperabilityâ of computer programs through reverse-engineering, id. § 1201(f); encryption research aimed at identifying flaws in encryption technology, if the research is conducted to advance the state of knowledge in the field, id. § 1201(g); and several other exceptions not relevant here.
The DMCA creates civil remedies, id. § 1203, and criminal sanctions, id. § 1204. It specifically authorizes a court to âgrant temporary and permanent injunctions on such terms as it deems reasonable to prevent or restrain a violation.â Id. § 1203(b)(1).
IV. Procedural History
Invoking subsection 1203(b)(1), the Plaintiffs sought an injunction against the Defendants, alleging that the Defendants violated the anti-trafficking provisions of the statute. On January 20, 2000, after a hearing, the District Court issued a preliminary injunction barring the Defendants from posting DeCSS. Universal City Studios, Inc. v. Reimerdes, 82 F.Supp.2d 211 (S.D.N.Y.2000).
The Defendants complied with the preliminary injunction, but continued to post links to other web sites carrying DeCSS, an action they termed âelectronic civil disobedience.â Universal I, 111 F.Supp.2d at 303, 312. Under the heading âStop the MPAA [(Motion Picture Association of America)],â Corley urged other web sites to post DeCSS lest âwe ... be forced into submission.â Id. at 313.
The Plaintiffs then sought a permanent injunction barring the Defendants from both posting DeCSS and linking to sites containing DeCSS. After a trial on the merits, the Court issued a comprehensive opinion, Universal I, and granted a permanent injunction, Universal II.
The Court explained that the Defendantsâ posting of DeCSS on their web site clearly falls within section 1201(a)(2)(A) of the DMCA, rejecting as spurious their claim that CSS is not a technological measure that âeffectively controls access to a *442 workâ because it was so easily penetrated by Johansen, Universal I, 111 F.SuppĂźd at 318, and as irrelevant their contention that DeCSS was designed to create a Linux-platform DVD player, id. at 319. The Court also held that the Defendants cannot avail themselves of any of the DMCAâs exceptions, id. at 319-22, and that the alleged importance of DeCSS to certain fair uses of encrypted copyrighted material was immaterial to their statutory liability, id. at 322-24. The Court went on to hold that when the Defendants âproclaimed on their own site that DeCSS could be had by clicking on the hyperlinksâ on their site, they were trafficking in DeCSS, and therefore liable for their linking as well as their posting. Id. at 325.
Turning to the Defendantsâ numerous constitutional arguments, the Court first held that computer code like DeCSS is âspeechâ that is âprotectedâ (in the sense of âcoveredâ) by the First Amendment, id. at 327, but that because the DMCA is targeting the âfunctionalâ aspect of that speech, id. at 328-29, it is âcontent neutral,â id. at 329, 10 and the intermediate scrutiny of United States v. OâBrien, 391 U.S. 367, 377, 88 S.Ct. 1673, 20 L.Ed.2d 672 (1968), applies, Universal I, 111 F.Supp.2d at 329-30. The Court concluded that the DMCA survives this scrutiny, id. at 330-33, and also rejected prior restraint, overbreadth, and vagueness challenges, id. at 333-39.
The Court upheld the constitutionality of the DMCAâs application to linking on similar grounds: linking, the Court concluded, is âspeech,â but the DMCA is content-neutral, targeting only the functional components of that speech. Therefore, its application to linking is also evaluated under OâBrien, and, thus evaluated, survives intermediate scrutiny. However, the Court concluded that a blanket proscription on linking would create a risk of chilling legitimate linking on the web. The Court therefore crafted a restrictive test for linking liability (discussed below) that it believed sufficiently mitigated that risk. The Court then found its test satisfied in this case. Id. at 339-41.
Finally, the Court concluded that an injunction was highly appropriate in this case. The Court observed that DeCSS was harming the Plaintiffs, not only because they were now exposed to the possibility of piracy and therefore were obliged to develop costly new safeguards for DVDs, but also because, even if there was only indirect evidence that DeCSS availability actually facilitated DVD piracy, 11 the threat of piracy was very real, particularly as Internet transmission speeds continue to increase. Id. at 314-15, 342. Acknowledging that DeCSS was (and still is) widely available on the Internet, the Court expressed confidence in
the likelihood ... that this decision will serve notice on others that âthe strong right arm of equityâ may be brought to bear against them absent a change in their conduct and thus contribute to a climate of appropriate respect for intellectual property rights in an age in which the excitement of ready access to *443 untold quantities of information has blurred in some minds the fact that taking what is not yours and not freely offered to you is stealing.
Id. at 345.
The Courtâs injunction barred the Defendants from: âposting on any Internet web siteâ DeCSS; âin any other way ... offering to the public, providing, or otherwise trafficking in DeCSSâ; violating the anti-trafficking provisions of the DMCA in any other manner, and finally âknowingly linking any Internet web site operated by them to any other web site containing DeCSS, or knowingly maintaining any such link, for the purpose of disseminating DeCSS.â Universal II, 111 F.Supp.2d at 346-47.
The Appellants have appealed from the permanent injunction. The United States has intervened in support of the constitutionality of the DMCA. We have also had the benefit of a number of amicus curiae briefs, supporting and opposing the District Courtâs judgment. After oral argument, we invited the parties to submit responses to a series of specific questions, and we have received helpful responses.
Discussion
I. Narrow Construction to Avoid Constitutional Doubt
The Appellants first argue that, because their constitutional arguments are at least substantial, we should interpret the statute narrowly so as to avoid constitutional problems. They identify three different instances of alleged ambiguity in the statute that they claim provide an opportunity for such a narrow interpretation.
First, they contend that subsection 1201(c)(1), which provides that â[njothing in this section shall affect rights, remedies, limitations or defenses to copyright infringement, including fair use, under this title,â can be read to allow the circumvention of encryption technology protecting copyrighted material when the material will be put to âfair usesâ exempt from copyright liability. 12 We disagree that subsection 1201(c)(1) permits such a reading. Instead, it simply clarifies that the DMCA targets the circumvention of digital walls guarding copyrighted material (and trafficking in circumvention tools), but does not concern itself with the use of those materials after circumvention has occurred. Subsection 1201(c)(1) ensures that the DMCA is not read to prohibit the âfair useâ of information just because that information was obtained in a manner made illegal by the DMCA. The Appellantsâ much more expansive interpretation of subsection 1201(c)(1) is not only outside the range of plausible readings of the provision, but is also clearly refuted by the statuteâs legislative history. 13 See Commodity Futures Trading Commission v. *444 Schor, 478 U.S. 833, 841, 106 S.Ct. 3245, 92 L.Ed.2d 675 (1986) (constitutional doubt canon âdoes not give a court the prerogative to ignore the legislative willâ).
Second, the Appellants urge a narrow construction of the DMCA because of subsection 1201(c)(4), which provides that â[n]othing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products.â This language is clearly preca-tory: Congress could not âdiminishâ constitutional rights of free speech even if it wished to, and the fact that Congress also expressed a reluctance to âenlargeâ those rights cuts against the Appellantsâ effort to infer a narrowing construction of the Act from this provision.
Third, the Appellants argue that an individual who buys a DVD has the âauthority of the copyright ownerâ to view the DVD, and therefore is exempted from the DMCA pursuant to subsection 1201(a)(3)(A) when the buyer circumvents an encryption technology in order to view the DVD on a competing platform (such as Linux). The basic flaw in this argument is that it misreads subsection 1201(a)(3)(A). That provision exempts from liability those who would âdecryptâ an encrypted DVD with the authority of a copyright owner, not those who would âviewâ a DVD with the authority of a copyright owner. 14 In any event, the Defendants offered no evidence that the Plaintiffs have either explicitly or implicitly authorized DVD buyers to circumvent encryption technology to support use on multiple platforms. 15
We conclude that the anti-trafficking and anti-circumvention provisions of the DMCA are not susceptible to the narrow interpretations urged by the Appellants. We therefore proceed to consider the Appellantsâ constitutional claims.
II. Constitutional Challenge Based on the Copyright Clause
In a footnote to their brief, the Appellants appear to contend that the DMCA, as construed by the District Court, exceeds the constitutional authority *445 of Congress to grant authors copyrights for a âlimited time,â U.S. Const, art. I, § 8, cl. 8, because it âempowers] copyright owners to effectively secure perpetual protection by mixing public domain works with copyrighted materials, then locking both up with technological protection measures.â Brief for Appellants at 42 n.30. This argument is elaborated in the amici curiae brief filed by Prof. Julie E. Cohen on behalf of herself and 45 other intellectual property law professors. See also David Nimmer, A Riff on Fair Use in the Digital Millennium Copyright Act, 148 U. Pa. L. Rev. 673, 712 (2000). For two reasons, the argument provides no basis for disturbing the judgment of the District Court.
First, we have repeatedly ruled that arguments presented to us only in a footnote are not entitled to appellate consideration. Concourse Rehabilitation & Nursing Center Inc. v. DeBuono, 179 F.3d 38, 47 (2d Cir.1999); United States v. Mapp, 170 F.3d 328, 333 n. 8 (2d Cir.1999); United States v. Restrepo, 986 F.2d 1462, 1463 (2d Cir.1993). Although an amicus brief can be helpful in elaborating issues properly presented by the parties, it is normally not a method for injecting new issues into an appeal, at least in cases where the parties are competently represented by counsel. See, e.g., Concourse Center, 179 F.3d at 47.
Second, to whatever extent the argument might have merit at some future time in a case with a properly developed record, the argument is entirely premature and speculative at this time on this record. There is not even a claim, much less evidence, that any Plaintiff has sought to prevent copying of public domain works, or that the injunction prevents the Defendants from copying such works. As Judge Kaplan noted, the possibility that encryption would preclude access to public domain works âdoes not yet appear to be a problem, although it may emerge as one in the future.â Universal I, 111 F.Supp.2d at 338 n. 245.
III. Constitutional Challenges Based on the First Amendment
A. Applicable Principles
Last year, in one of our Courtâs first forays into First Amendment law in the digital age, we took an âevolutionaryâ approach to the task of tailoring familiar constitutional rules to novel technological circumstances, favoring ânarrowâ holdings that would permit the law to mature on a âcase-by-caseâ basis. See Name.Space, Inc. v. Network Solutions, Inc., 202 F.3d 573, 584 n. 11 (2d Cir.2000). In that spirit, we proceed, with appropriate caution, to consider the Appellantsâ First Amendment challenges by analyzing a series of preliminary issues the resolution of which provides a basis for adjudicating the specific objections to the DMCA and its application to DeCSS. These issues, which we consider only to the extent necessary to resolve the pending appeal, are whether computer code is speech, whether computer programs are speech, the scope of First Amendment protection for computer code, and the scope of First Amendment protection for decryption code. Based on our analysis of these issues, we then consider the Appellantsâ challenge to the injunctionâs provisions concerning posting and linking.
1. Code as Speech
Communication does not lose constitutional protection as âspeechâ simply because it is expressed in the language of computer code. Mathematical formulae and musical scores are written in âcode,â i.e., symbolic notations not comprehensible to the uninitiated, and yet both are covered by the First Amendment. If some *446 one chose to write a novel entirely in computer object code by using strings of lâs and 0âs for each letter of each word, the resulting work would be no different for constitutional purposes than if it had been written in English. The âobject codeâ version would be incomprehensible to readers outside the programming community (and tedious to read even for most within the community), but it would be no more incomprehensible than a work written in Sanskrit for those unversed in that language. The undisputed evidence reveals that even pure object code can be, and often is, read and understood by experienced programmers. And source code (in any of its various levels of complexity) can be read by many more. See Universal I, 111 F.Supp.2d at 326. Ultimately, however, the ease with which a work is comprehended is irrelevant to the constitutional inquiry. If computer code is distinguishable from conventional speech for First Amendment purposes, it is not because it is ⢠written in an obscure language. See Junger v. Daley, 209 F.3d 481, 484 (6th Cir.2000).
2. Computer Programs as Speech
Of course, computer code is not likely to be the language in which a work of literature is written. Instead, it is primarily the language for programs executable by a computer. These programs are essentially instructions to a computer. In general, programs may give instructions either to perform a task or series of tasks when initiated by a single (or double) click of a mouse or, once a program is operational (âlaunchedâ), to manipulate data that the user enters into the computer. 16 Whether computer code that gives a computer instructions is âspeechâ within the meaning of the First Amendment requires consideration of the scope of the Constitutionâs protection of speech.
The First Amendment provides that âCongress shall make no law ... abridging the freedom of speech.... â U.S. Const, amend. I. âSpeechâ is an elusive term, and judges and scholars have debated its bounds for two centuries. Some would confine First Amendment protection to political speech. E.g., Robert Bork, Neutral Principles and Some First Amendment Problems, 47 Ind. L.J. 1 (1971). Others would extend it further to artistic expression. E.g., Marci A. Hamilton, Art Speech, 49 Vand. L. Rev. 73 (1996).
Whatever might be the merits of these and other approaches, the law has not been so limited. Even dry information, devoid of advocacy, political relevance, or artistic expression, has been accorded First Amendment protection. See Miller v. California, 413 U.S. 15, 34, 93 S.Ct. 2607, 37 L.Ed.2d 419 (1973) (âThe First Amendment protects works which, taken as a whole, have serious literary, artistic, political, or scientific value .... â (emphasis added)); Roth v. United States, 354 U.S. 476, 484, 77 S.Ct. 1304, 1 L.Ed.2d 1498 (1957) (First Amendment embraces â[a]ll ideas having even the slightest redeeming social importance,â including the â âadvancement of truth, science, morality, and arts in general.â â (quoting 1 Journals of the Continental Congress 108 (1774))); Board of Trustees of Leland Stanford Junior University v. Sullivan, 773 F.Supp. 472, 474 (D.D.C.1991) (âIt is ... settled ... that the First Amendment protects scientific expression and debate just *447 as it protects political and artistic expression.â); see also Kent Greenawalt, Speech, Crime and the Uses of Language 85 (1989) (â[Assertions of fact generally fall within a principle of freedom of speech .... â); cf. Virginia State Board of Pharmacy v. Virginia Citizens Consumer Council, Inc., 425 U.S. 748, 763, 96 S.Ct. 1817, 48 L.Ed.2d 346 (1976) (âprescription drug price informationâ is âspeechâ because a consumerâs interest in âthe free flow of commercial informationâ may be âkeener by farâ than âhis interest in the dayâs most urgent political debateâ).
Thus, for example, courts have subjected to First Amendment scrutiny restrictions on the dissemination of technical scientific information, United States v. Progressive, Inc., 467 F.Supp. 990 (W.D.Wis.1979), and scientific research, Stanford University, 773 F.Supp. at 473, and attempts to regulate the publication of instructions, 17 see, e.g., United States v. Raymond, 228 F.3d 804, 815 (7th Cir.2000) (First Amendment does not protect instructions for violating the tax laws); United States v. Dahlstrom, 713 F.2d 1423, 1428 (9th Cir.1983) (same); Herceg v. Hustler Magazine, Inc., 814 F.2d 1017, 1020-25 (5th Cir.1987) (First Amendment protects instructions for engaging in a dangerous sex act); United States v. Featherston,