Freedom to Tinker — Research and expert commentary on digital technologies in public life

Web Name: Freedom to Tinker — Research and expert commentary on digital technologies in public life

WebSite: http://freedom-to-tinker.com

ID:128248

Keywords:

Research,and,expert,

Description:

Posts Comments Freedom to TinkerResearch and expert commentary on digital technologies in public lifeHow programmers communicate through code, legally November 23, 2020 by Andrew Appel 3 Comments Computer programming, especially in source code, is an expressive form of communication. As such, U.S. law recognizes that communication in the form of source code is protected as freedom of speech by the First Amendment. Recently, Judge G. Murray Snow got this only two-thirds right in a ruling in the U.S. District Court in Arizona. In the case of CDK Global v. Brnovich, his denial of a motion to dismiss reads (in part), It is well-established that computer code, and computer programs constructed from code can merit First Amendment protection. Universal City Studios, Inc. v. Corley,273 F.3d 429, 449 (2d Cir. 2001);see alsoUnited States v. Elcom Ltd.,203 F. Supp. 2d 1111, 1127 (N.D. Cal. 2002)( [c]omputer software is. . . speech that is protected at some level by the First Amendment ). However, not all code rises to the level of protected speech under the First Amendment.Corley,273 F.3d at 449. Rather, there are two ways in which a programmer might be said to communicate through code: to the user of the program (not necessarily protected) and to the computer (never protected). Id.Further, even where code communicates to the user of a program, it still may not constitute protected speech under the First Amendment if it commands `mechanically and `without the intercession of the mind or the will of the recipient,' Id.(describing the holding ofCommodity Futures Trading Comm n v. Vartuli,228 F.3d 94 (2d Cir. 2000)).(emphasis added)But there is a third way that programmers communicate through code, even more important (for First Amendment protection) than those two ways; and if Judge Snow had read two more sentences in the Corley opinion that he cites, he would have found it: the third manner in which a programmer might communicate through code: to another programmer. Id. Specifically, Instructions such as computer code, which are intended to be executable by a computer, will often convey information capable of comprehension and assessment by a human being.A programmer reading a program learns information about instructing a computer, and might use this information to improve personal programming skills and perhaps the craft of programming. Moreover, programmers communicating ideas to one another almost inevitably communicate in code, much as musicians use notes.Limiting First Amendment protection of programmers to descriptions of computer code (but not the code itself) would impede discourse among computer scholars,just as limiting protection for musicians to descriptions of musical scores (but not sequences of notes) would impede their exchange of ideas and expression. Instructions that communicate information comprehensible to a human qualify as speech whether the instructions are designed for execution by a computer or a human (or both).Corley, Id., at 448.Indeed, when I teach software engineering to undergraduates, I make this very important point: your computer programs do not only execute on a computer, they must be readable and understandable to humans. A successful program will endure, and must be maintained by people who, perforce, will need to understand it. Elements of Programming Style are just as essential in coding as the Elements of Style are in other writing.One cannot blame Judge Snow: his ruling is a very brief Order denying a motion to dismiss. And perhaps the Plaintiffs brief missed this point as well. Still the law (the Corley precedent) is clear: There are at least three ways that source code communicates, and one of those ways is that people can read it and learn how it works.Regarding the underlying case, CDK Global v. Mark Brnovich et al. and Arizona Automobile Dealers Association, it is not clear whether the First Amendment claims will outweigh the interests of the state in regulating commerce. The Court s ruling summarizes the case,Plaintiffs CDK Global LLC develop, own, and operate proprietary computer systems known as dealer management systems ( DMSs ) that process vast amounts of data sourced from various parties. Automotive dealerships hold licenses to DMSs to help manage their business operations, including handling confidential consumer and proprietary data, processing transactions, and managing data communications between dealers, customers, car manufacturers, credit bureaus, and other third parties. Plaintiffs employ multiple technological measures—such as secure login credentials, CAPTCHA prompts, and comprehensive cybersecurity infrastructure, hardware, and software—to safeguard their DMS systems from unauthorized access or breach. Plaintiffs also contractually prohibit dealers from granting third parties access to their DMSs without Plaintiffs authorization.In March 2019, the Arizona Legislature passed the Dealer Data Security Law ( the Dealer Law ). The Dealer Law regulates the relationship between DMS licensers like Plaintiffs and the dealerships they serve. Under the Dealer Law, DMS providers may no longer [p]rohibit[] a third party [that has been authorized by the Dealer and] that has satisfied or is compliant with. . . current, applicable security standards published by the standards for technology in automotive retail [(STAR standards)]. . . from integrating into the dealer s [DMS] or plac[e] an unreasonable restriction on integration. . . . The Dealer Law also requires that DMS providers [a]dopt and make available a standardized framework for the exchange, integration and sharing of data from [a DMS] that is compatible with STAR standards and that they [p]rovide access to open application programming interfaces to authorized integrators. Finally, a DMS provider may only use data to the extent permitted in the DMS provider s agreement with the dealer, must permit dealer termination of such agreement, and must work to ensure a secure transition of all protected dealer data to a successor dealer data vendor or authorized integrator upon termination. Ariz. Rev. Stat. Ann. §§ 28-4654(B)(1)-(3).(internal citations omitted)Plaintiffs argue that Arizona s requirement to modify their software to permit interoperability is compelled speech (in the form of computer code that they must write), which is a violation of the First Amendment. I am a bit skeptical of the Plaintiffs argument, because this case is not really about communication, it s about operation. That is, in the CDK Global case, we need not analyze whether prior restraints on distribution of software would violate the First Amendment, because it s not really about distribution of software. It s about the execution of software by car dealers. Arizona is really saying, if a car dealer uses DMS software in the course of selling cars, then the DMS software must interoperate in certain ways. Operation of a computer program is not necessarily protected by the First Amendment, even if communication of a computer program to another person might be.On the other hand, there are parallels between the Corley case (which was about restrictions on the distribution of software that would defeat copy-protection) and restrictions on the distribution of 3-d-printing files that would produce gun parts. Professor Eugene Volokh has analyzed Three ways of thinking about [restrictions on distributing software in a First-Amendment context]: 1. Software is like hardware. 2. Software is like instruction manuals. 3. Alexa, read this book and make me a gun. Again, in this case, if a state regulates the operation of a 3-d printer (forbidding the production of gun parts) this may not conflict with the First Amendment (although it certainly relates to the Second Amendment); but regulating the communication of 3-d-printer files for gun parts may have First-Amendment implications.Caution: I am not a lawyer. No warrantee is implied on these legal opinions.Filed Under: Uncategorized Did Sean Hannity misquote me? November 13, 2020 by Andrew Appel 18 Comments Mostly, I was quoted accurately, although the segment confuses a few different Dominion voting systems with each other. And vulnerabilities are not the same as rigged elections, especially when we have paper ballots in almost all the states.On November 13, 2020, Fox News aired a segment by Sean Hannity, A deep dive into the voting machines at center of controversy , in which he pointed out problems with Dominion voting machines in Michigan and Georgia. He quoted from my 2018 Freedom-to-Tinker article Design flaw in Dominion ImageCast Evolution voting machine and from my 2018 testimony before the House Subcommitee on Information Technology.The quotes are accurate, although slightly out of context. The Dominion systems in Michigan and Georgia are not the ImageCast Evolution that has that design flaw. My Congressional testimony is that all voting machines can be hacked, and that s true. My testimony about replacing the software in 7 minutes with a screwdriver refers to an older Dominion voting machine, used in New Jersey (though not this year because of the pandemic), but not used in Michigan and Georgia. But it s still true that, one way or another, the software in any voting machine can be (fraudulently) replaced in any voting machine used in any of the 50 states.Regarding Antrim County, Michigan: Dominion s election-management software is badly designed: when uploading results from a voting machine to the central server, the software keeps track of votes by ballot position, with no check on candidate name. So if there s a last-minute revision to the ballot design used in the voting machine, but the ballot-design file on the server is not updated, then votes for Trump may be mistakenly uploaded as votes for Biden. Dominion calls that human error. I call it, bad software design that fails to make consistency checks on its input. Fortunately, Antrim County has hand-marked paper ballots (counted by those Dominion optical-scan voting machines) that can be audited by hand, and other forms of paper trail, so Antrim County was able to correct its error and report accurate vote totals.Mr. Hannity proposes a solution: If we want to have as a country, election results with integrity, that the people of this country will have confidence in, we can easily and absolutely have a system forensically checked and by the way, I ll even argue, allowing both Republican and Democratic engineers to do the forensic check together. That s a well-intentioned idea, but it does not really solve the problem. Yes, absolutely the source code and software of voting machines should be made public so that citizens of any party can examine it for design mistakes. But what happens if the voting machine is hacked after that examination?The U.S. mostly uses paper ballots now, and that s how we can trust the election results even though there are some computer vulnerabilities.The best solution is to use paper ballots, marked by hand, counted by computers, and recountable by hand. Those computers might be hacked, but the ballots personally marked by the voters are the same pieces of paper that can be recounted by humans. That s what Michigan does, along with more than 40 other states. That is the state-of-the-art most-secure-known way of conducting elections.Georgia, on the other hand, uses touch-screen ballot-marking devices to mark the ballots, which are then counted by optical scanners and recountable by hand. If the optical scanners are hacked, then a recount will detect and correct the problem. But if the touch-screens are hacked, then (on a small fraction of the ballots) they can print the wrong vote on to the ballot. The recount can t detect and correct that hack, because it can only see what s printed on the ballots. Still, hacks and glitches in the election-management computers, in the optical scanners, and in other parts of the system have been detected and corrected by audits and examination of those paper ballots.New this year is ballot tracking offered on the NJ Division of Elections’ website.  The tracking numbers are not USPS tracking–they can’t tell you where inside the U.S. mail your ballot is–but the tracking system can tell the voter:  when the County Clerk cleared the absentee ballot for mailing to the voter; when it was received back from the voter by the BoE; whether the ballot was accepted or not. (September 12, 2020)This makes a lot of sense. The voter would like to know whether their signature was accepted or whether they forgot to sign it at all so they can cure their ballot, or vote in person with a provisional ballot. The tracking system allows voters to look this up online. (The outer ballot-return envelope is preprinted with a bar code identifying the voter, so even if the voter forgot the inner envelope or improperly removed the DO NOT REMOVE certificate from the inner envelope, the tracking system has this information for the voter.)Unfortunately, the State Division of Elections disabled this important feature of the tracking system. When I log in to track-my-ballot, the following message appears:Due to historically high volume, ballots deposited in Secure Ballot Drop Box locations may take up to one week to show up as “Received” and Ballots sent via US Mail may take up to two weeks to show up as Received in the Track My Ballot tool.Ballot status information (i.e. – received, etc.) is provided by the counties via an automated process. The amount of time it takes until updates post to the Track My Ballot tool may vary from county to county. A voter s ballot status won’t be changed to Accepted or Rejected until after the certification of the Election, on November 20th. Please check back periodically for updates to your ballot status.(viewed November 10, 2020)The first paragraph a delay in processing the signatures at local elections offices is forgivable this year. But the second paragraph intentionally withholding information from the voters until it s too late about whether their ballot was accepted is a deliberate policy decision by New Jersey Division of Elections, and it s the wrong decision. It makes the tracking system practically useless to the voter.Filed Under: Uncategorized Next Page Freedom to Tinker is hosted by Princeton's Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you'll find comment and analysis from the digital frontier, written by the Center's faculty, students, and friends.

TAGS:Research and expert 

<<< Thank you for your visit >>>

Research and expert commentary on digital technologies in public life

Websites to related :
Downey Adventist Church | Church

  We are a multi-ethnic, family-oriented Adventist church located in the Los Angeles area in Downey, California (map here). We would be honored to have

Berkeley Lab Computational Resea

  Looking for Us? You've followed an outdated link for Berkeley Lab's Computational Research Division (CRD) website. Please visit us at crd.lbl.gov. N

Thrive London: Harley Streets le

  Fertility A full range of fertility treatments, whatever stage you are at, and whatever problems you have encountered Stress & Anxiety Helping you bea

Detailed Examples to Help You Un

  Get started with our FREE Pre-Algebra course!Learn all of the basics that will prepare you for success in Algebra and beyond! In this unit you'll lear

Blue Point Crab House

  Current Specials Sign up for our SMS list!! Please text "Crabs" to the number 20673 to receive special deals, coupons and to enter crab giveaways! Ev

Home | Van Dale

  Nieuwe scheidsrechter! Officiële woordenlijst voor scrabble Meer info... Het is altijd weer een beetje spannend. Ik zorg dat ik op tijd voor de comp

Teradata Developer | Teradata

  Build innovative solutions with the most powerful analytical platform on the planet ' + previousCard.title" > ' + previousCard.title" viewbox="0 0 42

QIBR provides more than 6000 kin

  Product Show QIBR focuses on high-quality bearing production. We started from very small orders, step by step now we have become one of the integrated

Ear Plugs, Ear Care Hearing Pro

  Whether you’re a swimming fanatic or a concerned parent, we can provide you with all the information and products you could ever need to maintain hea

Willkommen am Institut für Ange

  Welcome to the Institute of Applied Biosciences (IAB)The Institute of Applied Biosciences was founded in 2005 and consists of seven different departme

ads

Hot Websites