- Using a sophisticated
-hashing algorithm, the RIAA took what is in effect a fingerprint of
-every song in the Napster catalog. Any copy of one of those MP3s will
-have the same "fingerprint."
-</para>
-<para>
-So imagine the following not-implausible scenario: Imagine a
-friend gives a CD to your daughter—a collection of songs just like the
-cassettes you used to make as a kid. You don't know, and neither does
-your daughter, where these songs came from. But she copies these
-songs onto her computer. She then takes her computer to college and
-connects it to a college network, and if the college network is
- "cooperating"
-with the RIAA's espionage, and she hasn't properly protected
-her content from the network (do you know how to do that yourself ?),
-then the RIAA will be able to identify your daughter as a "criminal."
-And under the rules that universities are beginning to deploy,<footnote><para>
-<!-- f22. --> See Jeff Adler, "Cambridge: On Campus, Pirates Are Not Penitent," Boston
-Globe, 18 May 2003, City Weekly, 1; Frank Ahrens, "Four Students Sued
-over Music Sites; Industry Group Targets File Sharing at Colleges,"
- Washington
-Post, 4 April 2003, E1; Elizabeth Armstrong, "Students `Rip, Mix,
-Burn' at Their Own Risk," Christian Science Monitor, 2 September 2003,
-20; Robert Becker and Angela Rozas, "Music Pirate Hunt Turns to
- Loyola;
-Two Students Names Are Handed Over; Lawsuit Possible," Chicago
-Tribune, 16 July 2003, 1C; Beth Cox, "RIAA Trains Antipiracy Guns on
-Universities," Internet News, 30 January 2003, available at
-<ulink url="http://free-culture.cc/notes/">link #48</ulink>; Benny
-Evangelista, "Download Warning 101: Freshman Orientation This Fall to
-Include Record Industry Warnings Against File Sharing," San Francisco
-Chronicle, 11 August 2003, E11; "Raid, Letters Are Weapons at
- Universities,"
-USA Today, 26 September 2000, 3D.
-</para></footnote>
- your
-daughter can lose the right to use the university's computer network.
-She can, in some cases, be expelled.
+Using a sophisticated hashing algorithm, the RIAA took what is in
+effect a fingerprint of every song in the Napster catalog. Any copy of
+one of those MP3s will have the same "fingerprint."
+</para>
+<para>
+So imagine the following not-implausible scenario: Imagine a
+friend gives a CD to your daughter—a collection of songs just
+like the cassettes you used to make as a kid. You don't know, and
+neither does your daughter, where these songs came from. But she
+copies these songs onto her computer. She then takes her computer to
+college and connects it to a college network, and if the college
+network is "cooperating" with the RIAA's espionage, and she hasn't
+properly protected her content from the network (do you know how to do
+that yourself ?), then the RIAA will be able to identify your daughter
+as a "criminal." And under the rules that universities are beginning
+to deploy,<footnote><para>
+<!-- f22. -->
+See Jeff Adler, "Cambridge: On Campus, Pirates Are Not Penitent,"
+Boston Globe, 18 May 2003, City Weekly, 1; Frank Ahrens, "Four
+Students Sued over Music Sites; Industry Group Targets File Sharing at
+Colleges," Washington Post, 4 April 2003, E1; Elizabeth Armstrong,
+"Students `Rip, Mix, Burn' at Their Own Risk," Christian Science
+Monitor, 2 September 2003, 20; Robert Becker and Angela Rozas, "Music
+Pirate Hunt Turns to Loyola; Two Students Names Are Handed Over;
+Lawsuit Possible," Chicago Tribune, 16 July 2003, 1C; Beth Cox, "RIAA
+Trains Antipiracy Guns on Universities," Internet News, 30 January
+2003, available at <ulink url="http://free-culture.cc/notes/">link
+#48</ulink>; Benny Evangelista, "Download Warning 101: Freshman
+Orientation This Fall to Include Record Industry Warnings Against File
+Sharing," San Francisco Chronicle, 11 August 2003, E11; "Raid, Letters
+Are Weapons at Universities," USA Today, 26 September 2000, 3D.
+</para></footnote>
+your daughter can lose the right to use the university's computer
+network. She can, in some cases, be expelled.