: Sony : Napster : Aimster : Grokster : Discussion
 

Aimster

The Rhetoric of Digital Tutorials

Imagine a person preparing a digital tutorial featuring screen captures that instruct users to do some simple act -- say upload a file to a CMS or other webspace. Suppose that the individual constructing the tutorial grabs images or a file from his/her hard drive and uses it in the tutorial as the image of the file being uploaded to the CMS. Suppose that this file happens to be copyrighted, and the person who owns the copyright stumbles upon the digital tutorial. Is this cause for concern? The answer is yes. Even when creating tutorials, composers must be aware that the rhetorical effect of their composition might be analyzed by a court to see whether there was intent to cause others to infringe. When courts make the kinds of determinations that they have in the P2P filesharing cases, they have increasingly looked at the rhetorical effect of "technical" documents such as digital tutorials -- documents that aren't necessarily constructed in order to provide high-level intellectual content meant to change the world. The Aimster ("In re Aimster," 2003) case illustrates this. 

Napster left a space for Aimster. The Aimster case happened because in Napster the court didn't need to decide what would happen if a fact pattern similar to Napster occurred, but without the presence of a centralized server. The Aimster service provided reproduction/distribution dual-use software that users downloaded free of charge. Users were then free to trade files with each other directly. This configuration is more along the lines of a true P2P filesharing system (Androutsellis-Theotokis & Spinellis, 2004). In addition to downloading free software, users could access digital tutorials that instructed them how to use it, and they could also (for a fee) belong to "Club Aimster"; membership allowed them to download additional music files. The court found it important that Aimster's digital tutorials showed not just how to use the software, but that they purposefully used a copyrighted file in their visual illustration via screen captures.

The Aimster court found it very compelling that when Aimster spent dollars, those dollars did not go to detecting copyright infringers, but instead went into providing encryption technologies so that Aimster would be blind to the files that were being exchanged. The court said, "'Encryption' comes from the Greek word for concealment . . . it fosters privacy . . . facilitates unlawful transactions." Making a direct connection between drug traffickers and Aimster's service, the court held Aimster's "ostrich-like refusal" to see infringement by using encryption as just another piece of evidence making Aimster contributorily liable for copyright infringement. Since Aimster (2-3 million users) provided no evidence of noninfringing uses, the court stated that the injunction against it, preventing Aimster from doing business, was justified.

Looking at it another way, this case sends the message that sharing might be OK as long as the authority that could know about the sharing doesn't purposefully do anything not to know about the sharing. In other words, if you want to share, not only must you do it in a decentralized, ad hoc fashion, but you must also hide this sharing without affirmative action on the part of any organizing or possibly central character (in this case, Aimster). Obviously, law influences culture. As technorhetoricians increasingly working in collaborative writing environments, we certainly should reflect on how, as the culture of composition increases its acceptance and reliance on collaboration, the "law" seems to resist collaboration by pushing "sharing" under the rug, so to speak. 

After Aimster, the question remained open: If neither a centralized server nor any special encryption technology of import was used, is sharing OK? This is what the Grokster case addressed.

See "In re Aimster Copyright Litigation (2003)" for more information.