Illegal number explained
An illegal number is a number that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some legal jurisdiction. Any piece of digital information is representable as a number; consequently, if communicating a specific set of information is illegal in some way, then the number may be illegal as well.[1] [2] [3]
Background
A number may represent some type of classified information or trade secret, legal to possess only by certain authorized persons. An AACS encryption key (09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0) that came to prominence in May 2007 is an example of a number claimed to be a secret, and whose publication or inappropriate possession is claimed to be illegal in the United States. It allegedly assists in the decryption of any HD DVD or Blu-ray Disc released before this date. The issuers of a series of cease-and-desist letters claim that the key itself is therefore a copyright circumvention device,[4] and that publishing the key violates Title 1 of the US Digital Millennium Copyright Act.
In part of the DeCSS court order[5] and in the AACS legal notices, the claimed protection for these numbers is based on their mere possession and the value or potential use of the numbers. This makes their status and legal issues surrounding their distribution quite distinct from that of copyright infringement.Any image file or an executable program[6] can be regarded as simply a very large binary number. In certain jurisdictions, there are images that are illegal to possess,[7] due to obscenity or secrecy/classified status, so the corresponding numbers could be illegal.[8]
In 2011 Sony sued George Hotz and members of fail0verflow for jailbreaking the PlayStation 3.[9] Part of the lawsuit complaint was that they had published PS3 keys. Sony also threatened to sue anyone who distributed the keys.[10] Sony later accidentally retweeted an older dongle key through its fictional Kevin Butler character.[11]
Flags and steganography
As a protest of the DeCSS case, many people created "steganographic" versions of the illegal information (i.e. hiding them in some form in flags etc.). Dave Touretzky of Carnegie Mellon University created a "Gallery of DeCSS descramblers". In the AACS encryption key controversy, a "free speech flag" was created. Some illegal numbers are so short that a simple flag (shown in the image) could be created by using triples of components as describing red-green-blue colors. The argument is that if short numbers can be made illegal, then any representation of those numbers also becomes illegal, like simple patterns of colors, etc.
In the Sony Computer Entertainment v. Hotz case, many bloggers (including one at Yale Law School) made a "new free speech flag" in homage to the AACS free speech flag. Most of these were based on the "dongle key" rather than the keys Hotz actually released.[12] Several users of other websites posted similar flags.[13]
Illegal primes
An illegal prime is an illegal number which is also prime. One of the earliest illegal prime numbers was generated in March 2001 by Phil Carmody. Its binary representation corresponds to a compressed version of the C source code of a computer program implementing the DeCSS decryption algorithm, which can be used by a computer to circumvent a DVD's copy protection.[14]
Protests against the indictment of DeCSS author Jon Lech Johansen and legislation prohibiting publication of DeCSS code took many forms.[15] One of them was the representation of the illegal code in a form that had an intrinsically archivable quality. Since the bits making up a computer program also represent a number, the plan was for the number to have some special property that would make it archivable and publishable (one method was to print it on a T-shirt). The primality of a number is a fundamental property of number theory and is therefore not dependent on legal definitions of any particular jurisdiction.
The large prime database of the PrimePages website records the top 20 primes of various special forms; one of them is proof of primality using the elliptic curve primality proving (ECPP) algorithm. Thus, if the number were large enough and proved prime using ECPP, it would be published.
Other examples
There are other contexts in which smaller numbers have run afoul of laws or regulations, or drawn the attention of authorities.
- In 2012, it was reported that the numbers 89, 6, and 4 each became banned search terms on search engines in China, because of the date (1989-06-04) of the June Fourth Massacre in Tiananmen Square.[16]
- Due to the association with gangs, in 2012 a school district in Colorado banned the wearing of jerseys that bore the numbers 18, 14, or 13 (or the reverse, 81, 41, or 31).[17]
- In 2017, far-right Slovak politician Marian Kotleba was criminally charged for donating 1,488 euros to a charity. The number is a reference to a white supremacist slogan and the Nazi salute.[18]
See also
External links
- Mediating between law and technology requires vigilance and education, not a technical solution . Matthew . Skala . Brett . Bonfield . Mary Fran . Torpey . Library Journal . February 15, 2008 . dead . https://web.archive.org/web/20130330020536/http://www.libraryjournal.com/article/CA6529387.html . March 30, 2013.
- Andrés . Guadamuz . Trouble with Prime Numbers: Decss, Dvd and the Protection of Proprietary Encryption Tools . Journal of Information, Law & Technology . 3 . 2002. 569103.
- Web site: A Great Debate: Is Computer Code Protected Speech? . December 30, 2018 . November 30, 2001.
- Web site: Digging in . May 9, 2007 . Becky . Hogge . Becky Hogge . . December 30, 2018.
- Web site: Steganography Wing of the Gallery of CSS Descramblers . Carnegie Mellon University . Dave . Touretzky . December 30, 2018.
- Web site: US judge rules that you can't copyright pi . . Stephen . Ornes . March 16, 2012 . December 30, 2018.
- Web site: American Bankers' Association Claims Routing Numbers Are Copyrighted . Mike . Masnick . June 25, 2013 . . December 30, 2018.
- Web site: Orwell Estate Sends Copyright Takedown Over the Number "1984" . Ernesto . October 27, 2015 . . December 30, 2018.
- Web site: We are in Digits of Pi and Live Forever . Clifford A. . Pickover . Clifford A. Pickover . December 30, 2018.
- Web site: Haran . Brady . Brady Haran . Illegal Numbers- feat. James Grime . Numberphile . dead . https://web.archive.org/web/20180724183635/http://www.numberphile.com/videos/illegal_numbers.html . July 24, 2018 . December 30, 2018.
Notes and References
- Web site: Phil . Carmody . An Executable Prime Number? . December 30, 2018 . Maybe I was reading something between the lines that wasn't there, but if arbitrary programs could be expressed as primes, the immediate conclusion is that all programs, including ones some people wished didn't exist, can too. I.e. the so called 'circumvention devices' of which my previous prime exploit was an example. . February 16, 2014 . https://web.archive.org/web/20140216140843/http://fatphil.org/maths/illegal.html . live .
- News: Thomas C. . Greene . DVD descrambler encoded in 'illegal' prime number . . March 19, 2001 . The question, of course, is whether an interesting number is illegal merely because it can be used to encode a contraband program. . December 30, 2018 . November 27, 2010 . https://web.archive.org/web/20101127060515/http://www.theregister.co.uk/2001/03/19/dvd_descrambler_encoded_in_illegal/ . live .
- Web site: The Prime Glossary: illegal prime . The bottom line: If distributing code is illegal, and these numbers contain (or are) the code, doesn't that make these number illegal? . December 30, 2018 . February 28, 2023 . https://web.archive.org/web/20230228083251/https://primes.utm.edu/glossary/page.php?sort=Illegal . live .
- Web site: AACS licensor complains of posted key . April 17, 2007 . . Illegal Offering of Processing Key to Circumvent AACS Copyright Protection [...] are thereby providing and offering to the public a technology, product, service, device, component, or part thereof that is primarily designed, produced, or marketed for the purpose of circumventing the technological protection measures afforded by AACS (hereafter, the "circumvention offering"). Doing so constitutes a violation of the anti-circumvention provisions of the Digital Millennium Copyright Act (the "DMCA") . December 30, 2018 . October 8, 2023 . https://web.archive.org/web/20231008125445/https://www.lumendatabase.org/notices/21725 . live .
- Web site: Memorandum Order, in MPAA v. Reimerdes, Corley and Kazan . February 2, 2000 . December 30, 2018 . June 1, 2023 . https://web.archive.org/web/20230601004038/https://cyber.harvard.edu/openlaw/DVD/filings/NY/0202-mem-order.html . live .
- Web site: Prime Curios: 48565...29443 (1401-digits) . What folks often forget is a program (any file actually) is a string of bits (binary digits)—so every program is a number. . December 30, 2018 . January 4, 2023 . https://web.archive.org/web/20230104230648/https://primes.utm.edu/curios/page.php?number_id=953 . live .
- Web site: Criminal Justice Act 1988 . December 30, 2018 . December 30, 2018 . https://web.archive.org/web/20181230233936/https://www.legislation.gov.uk/ukpga/1988/33/contents#attrib . live .
- Book: Wells, David . Prime Numbers: The Most Mysterious Figures in Math . Wiley . 2011 . 126–127 . Illegal prime . 9781118045718.
- Web site: Sony follows up, officially sues Geohot and fail0verflow over PS3 jailbreak . Nilay . Patel . . January 12, 2011 . December 30, 2018 . October 19, 2017 . https://web.archive.org/web/20171019152043/https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/ . live .
- Web site: Sony lawyers now targeting anyone who posts PlayStation 3 hack . David . Kravets . February 8, 2011 . Ars Technica . December 30, 2018 . June 1, 2023 . https://web.archive.org/web/20230601100005/https://arstechnica.com/gaming/2011/02/sony-lawyers-now-targeting-anyone-who-posts-playstation-3-hack/ . live .
- Web site: PS3 'jailbreak code' retweeted by Sony's Kevin Butler, no punchline needed . Ross . Miller . February 9, 2011 . Engadget . December 30, 2018 . August 16, 2017 . https://web.archive.org/web/20170816191748/https://www.engadget.com/2011/02/09/ps3-jailbreak-code-retweeted-by-sonys-kevin-butler-no-punchl/ . live .
- Web site: 46-dc-ea-d3-17-fe-45-d8-09-23-eb-97-e4-95-64-10-d4-cd-b2-c2 . March 1, 2011 . Ben . S. . Yale Law Tech . December 30, 2018 . March 10, 2011 . https://web.archive.org/web/20110310155037/http://www.yalelawtech.org/trusted-computing-drm/46-dc-ea-d3-17-fe-45-d8-09-23-eb-97-e4-95-64-10-d4-cd-b2-c2/ . live .
- See description.
- Web site: Prime glossary - Illegal prime . Primes.utm.edu . 1999-10-06 . 2013-03-26 . 2021-05-09 . https://web.archive.org/web/20210509214940/http://primes.utm.edu/glossary/page.php?sort=Illegal . live .
- Hamilton, David P. "Banned Code Lives in Poetry and Song"
- News: MacKinnon . Mark . Banned in China on Tiananmen anniversary: 6, 4, 89 and 'today' . The Globe and Mail . December 30, 2018 . June 4, 2012 . April 18, 2023 . https://web.archive.org/web/20230418060519/https://www.theglobeandmail.com/news/world/worldview/banned-in-china-on-tiananmen-anniversary-6-4-89-and-today/article4228252/ . live .
- Web site: Meyer . Jeremy P. . Greeley school ban on gang numbers includes Peyton Manning's 18 . The Denver Post . December 30, 2018 . September 5, 2012 . April 18, 2023 . https://web.archive.org/web/20230418010551/https://www.denverpost.com/2012/09/05/greeley-school-ban-on-gang-numbers-includes-peyton-mannings-18/ . live .
- News: Police charge leader of Slovak far-right party with extremism . Reuters . July 28, 2017 . December 30, 2018 . August 9, 2017 . https://web.archive.org/web/20170809140906/http://www.reuters.com/article/us-slovakia-extremism-idUSKBN1AD223 . live .