Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

Thanks so much for reading my column, but I have to ask: are you a thief? I need to know because Technology Review reserves the right to sue you if you reproduce this intellectual property without our express, written approval. By the way, this publication uses “smart paper” with patented steganographic technologies explicitly designed to track unauthorized scans or photocopies of my column.

We’ve also placed a radio frequency ID tag inside the cover that can track how much time you’ve spent with the magazine, where you read it, and whether you ultimately save, discard, or share it. Our advertisers love that feature; we’re sure you’ll grow to love it, too. After all, shouldn’t an innovative magazine about innovation create innovative ways to track its readership? Enjoy.

Just kidding, of course. Then again, such humor may be less appealing if you’ve seen those full-page ads in the New York Times in which the record industry threatens legal action against anyone who downloads unauthorized music from the Internet. Or if you’ve been the victim of a copy protection scheme that prevents you from playing a legitimately purchased DVD. In fact, the digital era is giving birth to one of the most remarkable transformations in business history. The Customer is King? No, the Customer as Enemy.

Increasingly, innovators are trying to constrain, curtail, confine, and control their customers as opposed to cost-effectively creating greater choices for them (see “You Bought It. Who Controls It?TR June 2003). For understandable but controversial reasons, innovators invest heavily in techniques and technologies that treat customers as potential thieves and competitors. People procuring innovative products and services are discovering that their ability to pay matters far less than their willingness to behave the way vendors want.

The problem, alas, is that innovators and their customers often have profoundly different notions of appropriate behavior. Your seemingly reasonable desire for a backup copy of your new software program or DVD may be your vendor’s very definition of intellectual-property theft. Shame on you? Or shame on them? Caveat adapter!

Hollywood and the music industry, for example, continue to concoct a growing variety of clever technical schemes to ensure that their intellectual property is not bootlegged, stolen, or inappropriately copied. DVDs, the digital product with the fastest-growing market in consumer electronics history, are encrypted by the Content Scrambling System to ensure they can’t be copied or played outside the region in which they are purchased. Computer-savvy DVD owners can find descrambler software on the Internet, but there have been dark mutterings about secreting software on DVDs that would interfere with the ability of computers to function if they used these programs. In other words, the “crime” would come with a built-in punishment.

0 comments about this story. Start the discussion »

Tagged: Communications

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me