CBK 4 – Physical Security

I am now well versed in fence heights, and chain diameters, fire extinguishers, and IDS systems.  My score was actually higher than this too – as I found at least one bug in the testing software where it said my answer was the correct answer, but then marked it wrong :-0

 

image

Another one down – Security Architecture

This was probably the most extensive learning I had to do so far in the CISSP around the different security Models, like the Bell-LaPidula, the Biba, the Clark-WIlson, the Graham-Dennig and the Harrison-Ruzzo-Ulllman security Models… you have all that right? LoL

Funniest part is, I scored almost 100% on almost all of the concepts except:  I couldn’t seem to make the distinction between multiprocessing, multiprogramming, mutithreading and multitasking – how lame is that!

Oh, and I was exposed to a very cool side-channel attack (or more appropriately called a covert storage attack) having to do with information flow.. with an example of using storage state (like files being locked and unlocked) to steal data one bit at a time… that was pretty neat thinking!

Anyway – after 120 pages of very extensive reading under Security Architecture – I’m off to the next CBK starting tomorrow.

 

image

Access Control CBK

I read over a 100 pages last night, and there was SO much information and acronyms galore!  I have a really good understanding of Access Control, but I still learned a bunch! 

I have to do school reading tonight, so I’m going to unfortunately be behind now in the CISSP review, but I’ll have the weekend to try and catch up!

Oh, and I found out that I can read SO much more a night if I shut down my computer and put it away!  There is too much tempting me on the computer to actually keep me from peaking and playing every couple minutes…  I need better attention skills!  LoL

 

image

Protecting the Constitution against the DMCA and DRM

 

 

 

 

 

Protecting the Constitution against the DMCA and DRM

Jediah Logiodice

IT5160 Ethics in Information Technology

Dr. Joanne White Thunder

Wednesday, August 26, 2009

Abstract

The United States Constitution grants powers to the Congress to create laws which promote the progress of science by allowing authors a time-limited exclusive right to their original works. While Copyright law has been amended in many successive movements overtime, it is important that all newly designed laws are upheld by the original intent and powers granted to the Congress by the U.S. Constitution. The creation of the Digital Millennial Copyright Act and subsequent implementations of Digital Rights Management technologies have encroached on the Constitution and have made allowances for the enforcement of unlawful limitations by copyright owners. It is thus beholden upon the American people to reject as unlawful the power of the DMCA and DRM technologies.

In 1791 the first ten amendments of the Constitution of the United States were ratified, these ten amendments were later to be known as the Bill of Rights. The fifth article of The Bill of Rights states that "[no person shall be] deprived of life, liberty or property, without due process of law (WikiPedia, 2009)." The Bill of Rights expands upon the foundation of law set forth in the Constitution. The Constitution and following amendments are a culmination of the attempt to create an environment built on freedom and justice, balancing the needs of the many against the needs of the individual in a way that seeks to uphold the claims put forth on July 4th, 1776 within the Declaration of Independence stating that all men (sic.) have the right to "life, liberty and the pursuit of happiness (WikiPedia, 2009)."

The pursuit of justice and liberty has been a reoccurring theme throughout the history of the United States, and involves issues teetering precariously on the struggle between the rights of the state and the rights of the people; commercial enterprise against consumer, one man or woman against another. If we were to peel away the details of the individual struggles of justice and liberty over the courses of time, we would find that at the core of this struggle is the question of property ownership (Ely, 2008, p. 26)."

In the past, questions of property, even questions that govern intangible ideas such as intellectual property, revolved around the physical ownership of things such as a typewritten book, a painted image, or a vinyl record, etc. As the American society continues to struggle to refine current laws around property ownership in copyright laws, civilization advances relentlessly forward and we are faced with new and intriguing challenges. Today, property rights extend to things as ephemeral as electrical impulses stored and forwarded across the central nervous system of a publically accessible super-brain referred to as the World Wide Web.

Law makers, as they have in the past, continue to focus on identifying the appropriate balance between justice and freedom; however, laws devised to protect and control the ownership of property must also be built upon and upheld by the foundation of the Constitution.

In 1998 the Congress of the United States passed into law an act referred to as the Digital Millennium Copyright Act. The DMCA put forth certain provisions allowing the rise of technologies that have been used to facilitate constitutional violations, have undermined the intent and use of the original U.S. Copyright laws, and have stifled technological and intellectual innovations. While the DMCA is the formal cause of this malfeasance enacted against the people of the United States, the material cause is a collection of technologies loosely coupled together and used to limit and control who and when digital content can be read and copied. These technologies are referred to as Digital Rights Management technologies or DRM.

It is the intent of this paper to outline examples of ways in which the DMCA and DRM have been used to facilitate constitutional violations, to address some of the ways in which DRM undermines the intent of the original copyright laws, and bring to the attention the controversy over the use of DRM in inhibiting the growth of intellectual innovations and humanity as a whole. To bring weight to these examples we must first examine the operational powers that have been granted to the U.S. Congress to enact laws protecting the property ownership rights of authored works.

Copyright Law in the United States

The term Copyright is used to denote a form of property protection provided to owners and artists for "original works of authorship (U.S. Copyright Office, 2009, p. 1)." While the U.S. Copyright laws consist of a significant number of amendments; to remain constitutional, all copyright laws and subsequent amendments must be built on the constitutional powers granted in Article I, section 8, clause 8, of the U.S. Constitution which allows Congress the power to "promote the progress of science and useful arts, by securing for limited tımes to Authors and Inventors the exclusive right to their respective writings and discoveries (U.S. Constitution)."

The language of the Article I, section 8, clause 8, immediately brings to mind the desire to balance the rights of the individual over against the rights of society as a whole. Within this language, however, it can also be clearly seen that the purpose of securing to authors a time-limited exclusive right to their works was to promote the progress of science and useful arts.

When studying this power afforded by the constitution, it is paramount that we ensure that all enacted copyright laws remain constitutional in limiting the time in which authors are granted exclusive rights to their works, as well as having a primary purpose of promoting the progress of science and useful arts. If amended copyright laws act against either of these two primary constitutional objectives, they must be deemed unconstitutional and rejected by the American people.

Retarding the growth of intellectual pursuits around the world

When weighting the pros and cons of proposed law, it is often easy to reject opposition based on a projected forecast of future negative consequences. However, it is much harder to reject the historical data collected post-ratification that speaks clearly about the unforeseen negative consequences of an enacted law.

In an article entitled Unintended Consequences: Ten Years under the DMCA, the Electronic Frontier Foundation raises a number of concerns regarding the anti-circumvention provisions of the Digital Millennial Copyright Act, referred to as section 1201 (Electronic Frontier Foundation, 2008). These concerns include numerous Mafia like attempts, lawsuits and gag orders against personal, professional and University based technologists and researchers. These documented attacks on the freedom of speech, freedom of information and freedom of intellectual and academic pursuit come from such organizations as Sony-BMG, SunnComm, Microsoft, Hewlett Packard, and even the organization that builds the tools we use in our Capella University Courseroom – BlackBoard. The EFF continues by showing how the DMCA has lead to the violation of rights, threats and disreputable treatment of individuals being accused of violating the "anti-circumvention laws", with the primary purpose showing how DMCA supported actions have "chilled free expression and scientific research. (Electronic Frontier Foundation, 2008)."

This article continues to cite example after example in which the DMCA is the direct cause of inhibiting academic, scientific and artistic research, not only in the United States, but around the world. The capstone quote, calling for DMCA reform, summarizes the problem with the DMCA; in a 2002 statement from White House Cyber Security Chief Richard Clarke, Clarke is quoted as saying: "I think a lot of people didn’t realize that it [DMCA] would have this potential chilling effect on vulnerability research. (Electronic Frontier Foundation, 2008)."

In the end, while future forecasting may have been ignored in 1998 when the DMCA was first instituted, these historical views of the DMCA can clearly show its effect on stifling rather than "promoting the progress of science and useful arts."

If it wasn’t enough to stop there in showing the damage and the unconstitutional results of the applications of the DMCA; Digital Rights Management, one of the technical implementations whose use is being upheld by the laws enacted by the DMCA is found to be even more damaging to the academic and scientific progress of the world.

In their article titled Digital Rights Management: A failure in the developed world, a danger to the developing world the EFF once again takes aim at the problems caused by the DMCA and DRM. Here various aspects of dangerous implications of DRM are discussed in open detail. Among these dangers are concerns such as how renewable DRM can be used to cheat consumers out of products or services they have already paid for by disabling features at the whim of copyright holders.

Other dangers outline how DRM limits the abilities of developing countries that rely on second hand resale markets for dissemination of products and information for growth and maturity, how Libraries are being unable to exercise their lawful rights when moving to digital media, how DRM can allow authors to "unilaterally prevent" disabled people from exercising rights afforded by existing copyright laws, and even how DRM can inhibit the ability for schools and universities to offer distance education (Electronic Frontier Foundation, 2005).

Within this article, the EFF continues by showing detailed examples in which DRM shackled technologies such as DVD have experienced very little innovation over the years since being introduced because of the lack of academic research allowed within the technologies. In summary, railing against the way in which DRM is used to withhold information, the EFF points out: "Access to information is essential in education and research and has a direct impact on literacy levels, economic growth and quality of life (Electronic Frontier Foundation, 2005)."

And thus, there should be no doubt that the DMCA and DRM have been used to inhibit the "progress of science and useful arts" and therefore it should be declared unconstitutional and rejected by the American people.

However, the problems do not end there; the DMCA and use of DRM directly impacts the ability of consumers to exercise the doctrine of Fair Use, and First Sale, both consumer rights protected in the U.S. Copyright law.

The Doctrine of Not-So-Fair Use and One-time-only Sales

In the Copyright Act of 1976, two important doctrines were formed and codified in the United States Code: the doctrine of Fair Use, and the doctrine of First Sale. Fair Use as defined in U.S. Copyright Law is intentionally ambiguous as each specific situation stands to dictate what is ‘fair’ (Lohmann, 2005). Section 107 of Article 17 of the United States Code declares that various situations can be used to determine fairness, including the purpose and character of the use and the nature of the copyrighted work (U.S. Copyright Office, 2007).

When examining the doctrine of Fair Use Fred von Lohmann, a senior Intellectual Property Attorney of the EFF states that the doctrine of Fair Use helps bring sanity into the law of copyright, protecting people in actions as innocent as whistling a tune walking down the road, or cutting out and posting a comic strip on an office wall (Lohmann, 2005). However, current implementations of DRM are incapable of creating allowances for the doctrine of Fair Use, and once combined with the DMCA anti-circumvention laws DRM effectively limits and destroys the capabilities provided in the doctrine of fair use to consumers.

On top of this violation of copyright law, the doctrine of First Sale allows ownership of material that has a copyright to be transferred when the product is purchased. In other words, when a consumer purchases a book that is held in copyright, that book then becomes the property of the consumer, and they have the right to gift or resell the book without being held in violation of U.S. Copyright Laws.

However, despite the protection provided to consumer by use of the doctrine of First Sale, current implementations of DRM restrict the transfer of copy protected works to the purchaser, and allow copyright holders to retain ownership of copy protected works, even after the ownership of said works has been legally transferred through the doctrine of First Sale.

Abuses of this illegal control afforded to copyright owners can be seen in recent cases such as when Amazon on behalf of a book publisher revoked the ownership of the works of George Orwell for users of the Amazon Kindle device (McSherry, 2009). Such actions, while not unprecedented have provoked outrage among many in the digital community causing one blogger to refer to DRM as Dystopian Rights Management, in honor of the irony of Amazon stealing copies of George Orwell’s 1984 from their Kindle users (D’Andrade, 2009).

As the constitutional case against the DMCA and DRM continues to grow, there is, yet another form of constitutional abdication taking place within the confines of the DMCA and DRM.

The unlimited limits of protection

Apart from the DMCA inhibiting scientific progress, and the violation of Copyright Law afforded by DRM technologies; we find another form of Constitutional violation with the use of DRM which provides unlimited copyright terms for authors and artists (or their representatives).

As we have previously discussed, the Constitution allows for time-limited exclusive rights of original works; however, the use of DRM affords a non-expiring monopoly on the copyright owner’s published works. Thus, DRM has once again been found to circumvent the original intent and purpose of the Constitutional foundation of U.S. Copyright laws.

Additionally, the use of DRM has also been used by publishers to take unofficial ownership of works that have passed into the public domain, thereby extending the limitations afforded copyright holders to anyone willing to brand a public work with DRM limitations, thus effectively allowing a time-unlimited extension to authored works.

Despite all of the constitutional and unlawful violations wrapped up into the introduction of the DMCA and DRM, despite how the DMCA and DRM lead to the destruction of the freedom of speech, the freedom of intellectual pursuit, and the freedom of academic and scientific progress; still, one is left wondering, who actually benefits from the use of Digital Rights Management?

Under Control of the Cartels

While outright unethical uses of DRM have been discovered by some security researchers such as when Mark Russinovich discovered Sony installing a DRM rootkit devised to circumvent PC security such as AntiVirus software (Russinovich, 2005), one is really left to wonder how much benefit artists and authors actually gain from the legitimate use of DRM?

It is well known that when protecting copyright works with DRM, unless every version of of a copyright work has been protected with DRM then DRM affords little protection against copyright infringement through unlawful copying. Thus in order to gain the full benefits of protection against unlawful copying, artists and authors and publishers must subscribe to the licensing services of intermediaries that act as gatekeepers of the DRM implementations, often at a high cost (Electronic Frontier Foundation, 2005).

"These licenses", state the EFF, "have the effect of turning publishers and performers and authors into customers for developed-world intermediaries to whom they become beholden (Electronic Frontier Foundation, 2005)."

Conclusion

In the end, while there are many issues left untouched regarding the problems afforded by the DMCA and the use of DRM, it should remain clear that the DMCA and associated DRM technologies are involved in the subterfuge of the rights of the American people. Through blatant violations of Constitutional law, Copyright law, and the United States Code, the Digital Millennial Copyright Act and associated Digital Rights Management technologies must be branded as a defector to the common welfare of the United States, and the world at large.

It is now the responsibility of you, the reader; as writer, or artist and co-consumer to cry out in anger and demand the rights and protections, and balance of liberty and justice afforded to you and your children and your children’s children, remembering if you give up your rights to property ownership, you give up your liberty. Protect the Constitution against the DMCA and DRM.

 

References

D’Andrade, H. (2009, July 07). Orwell in 2009 : Dystopian Rights Management. Retrieved August 08, 2009, from Electronic Frontier Foundation: http://www.eff.org/deeplinks/2009/07/orwell-2009-dystopia

Electronic Frontier Foundation. (2005, March). Digital Rights Management: A failure in the developed world, a danger to the developing world. Retrieved August 08, 2009, from Electronic Frontier Foundation: http://www.eff.org/wp/digital-rights-management-failure-developed-world-danger-developing-world

Electronic Frontier Foundation. (2008, October). Unintended Consequences: Ten Years under the DMCA. Retrieved August 08, 2009, from Eletronic Frontier Foundation: http://www.eff.org/files/DMCAUnintended10.pdf

Ely, J. W. (2008). The guardian of every other right: a constitutional history of property rights. New York: Oxford University Press.

Lohmann, F. V. (2005, March). Fair Use and Digital Rights Management. Retrieved August 08, 2009, from Electronic Frontier Foundation: http://www.eff.org/wp/fair-use-and-digital-rights-management-preliminary-thoughts-irreconcilable-tension-between-them

McSherry, C. (2009, August 5). The Kindle Lawsuit: Protecting Readers from Future Abuses. Retrieved August 08, 2009, from Electronic Frontier Foundation: http://www.eff.org/deeplinks/2009/08/kindle-lawsuit-protecting-readers-future-abuses

Russinovich, M. (2005, October 31). Sony, Rootkits and Digital Rights Management Gone Too Far. Retrieved August 08, 2009, from Mark’s Block: http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx

U.S. Constitution. (n.d.). Art I, S. 8, cl. 8.

U.S. Copyright Office. (2007, October). Complete version of the U.S. Copyright Law. Retrieved August 08, 2009, from Copyright Law of the United States: http://www.copyright.gov/title17/circ92.pdf

U.S. Copyright Office. (2009, August 05). Copyright Basics. Retrieved August 08, 2009, from U.S. Copyright Office: http://www.copyright.gov/circs/circ01.pdf

WikiPedia. (2009, August 21). United States Bill of Rights. Retrieved August 24, 2009, from WikiPedia, the free Encyclopedia: http://en.wikipedia.org/wiki/United_States_Bill_of_Rights

WikiPedia. (2009, August 24). United States Declaration of Independence. Retrieved August 24, 2009, from WikiPedia, the free Encyclopedia: http://en.wikipedia.org/wiki/United_States_Declaration_of_Independence

Who is to blame anyway?

SocNets has been in the news a lot over the last year, especially when detailing how easy it is to violate an individual’s privacy through the use of published profile information. Take for example the 2008 BlackHat presentation provided by Nathan Hamiel and Shawn Moyer called “Satan is on my Friends List (Hamiel & Moyer, 2008).“ In this presentation Hamiel and Moyer, discuss, among other things, how easy it is to mine, either manually or in an automated fashion, individual’s personal information posted to their profile.

Interestingly, in the news yesterday a lawsuit was announced against SocNet giant FaceBook. The lawsuit accuses Facebook of multiple counts of violations of privacy (Stafford, 2009). While I am left wondering about the ethical and legal nature of what SocNet giants like Facebook, Twitter, MySpace and LinkedIn do with people’s personal information; and feel that there needs to be accountability to consumers, there is another side of me altogether that asks if it is not the fault of the users for being so trusting and foolish with their own private information.

As an example: Daily on Facebook I am flooded by hundreds of imbecilic “apps” that want me to guess this or try this or do that. Each and every one of these apps, when run, is granted access to the personal information that you have within your social networking account. And yet, people continue to run these ridiculous foolish apps, over and over, day in and day out, without a single thought as to what these applications are actually doing with their data.

In examining this issue, I would say that I certainly think that SocNets need to be held accountable for using the data provided to them in appropriate ways; however, I think users must become more informed, and aware of what these organizations are doing with their data. I find it ironic that it is often the same users that are bemoaning the loss of privacy that are providing a minute by minute play of what they are doing in the privacy of their own home.

References

Hamiel, N., & Moyer, S. (2008, April). BlackHat-Japan-08-Moyer-Hamiel-Satan-Friends-List.pdf. Retrieved August 19, 2009, from BlackHat: http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Moyer-Hamiel/BlackHat-Japan-08-Moyer-Hamiel-Satan-Friends-List.pdf
Stafford, P. (2009, August 19). Facebook sued over privacy violations. Retrieved August 19, 2009, from SmartCompany: http://www.smartcompany.com.au/web-20/20090819-facebook-sued-over-privacy-violations.html

Why do we really care about Privacy?

Why do we desire privacy? I’ve never really thought of that question honestly. The idea of privacy has always been a rote noun tumbling from my lips as an information security professional. I say: “We must protect people’s privacy” or “We must ensure privacy”, all said in an Orwellian sheepish sort of way.

And to top it off, because I have worked so long in the field of information security, I have almost all but given up on the idea that any of my personal information is private, and take the approach that if I am to tell something to someone other than my spouse and a few close personal friends, that information has now become the sphere of public domain.

And yet, there is still something about my life, and my home, and my family that I want to remain private, and personal… but why? In the article Privacy and the Computer written by Lucas D. Introna, Introna brings up a very interesting reason to the question of “Why Privacy (Introna, 2000)”.

To answer the question of why we need privacy as human beings, Introna states that living without privacy is like living in a world where everything is transparent. He continues by stating that in a transparent world, there can be no such thing as the statement an ownership of ideas, or personal relationships, or even the idea of personhood or intimate relationships.

Introna’s idea is that privacy is the means in which we as humans make distinctions between ourselves and others; the facilitator of levels of relationships from friends to intimacy. As someone once said: “Man is a social creature”, and to Introna’s point, if you take away our ability to relate to people in a social context, you take away what it is that makes us human.

The idea of the importance of retaining individuality in a transparent world, reminds me a lot of a writer that I am very fond of: C.S. Lewis.

In his masterpiece, The Great Divorce, Lewis writes of the divorce between Heaven and Hell; an analogical view of Heaven and Hell where people choose their place of existence.

In Hell, phantoms, at their own will, can hop on a bus and ride it to Heaven. Here, they are confronted with their own nakedness and exposure standing alone in their existence. They find that their ghost like appearance offers very little substance compared to things as mundane as grass and sunlight and rain in the context of a society of “solid people”.

One scene particular reminds me of Introna’s writings. Lewis describes a scene in which a well-dressed woman, suffering from the ghostly visage of those who have recently come from Hell, tries to run and hide among bushes to get out of view of the solid people who have since, or who are in the process of, transitioning into Heaven. Lewis writes the following (Lewis, 2009):

    ‘Go away!’ squealed the Ghost. ‘Go away! Can’t you see I want to be alone?’

    ‘But you need help,’ said the Solid One.

‘If you have the least trace of decent feeling left,’ said the Ghost, ‘you’ll keep away. I don’t want help. I want to be left alone. Do go away. You know I can’t walk fast enough on those horrible spikes [grass] to get away from you. It’s abominable of you to take advantage.’

‘Oh, that!’ said the Spirit, ‘That’ll soon come right. But you’re going in the wrong direction. It’s back there – to the mountains – you need to go. You can lean on me all the way. I can’t absolutely carry you, but you need have almost no weight on your own feet: and it will hurt less at every step.’

    ‘I’m not afraid of being hurt. You know that.’

    ‘Then what is the matter?’

‘Can’t you understand anything? Do you really suppose I’m going out there among all those people, like this?’

    ‘But why not?’

    ‘I’d never have come at all if I’d known you were all going to be dressed like that.’

    ‘Friend, you see I’m not dressed at all.’

    ‘I didn’t mean that. Do go away.’

    ‘But can’t you even tell me?’

‘If you can’t understand, there’d be no good trying to explain it. How can I go out like this among a lot of people with real solid bodies? It’s far worse than going out with nothing on would have been on Earth. Have everyone staring through me.’

‘Oh, I see. But we were all a bit ghostly when we first arrived, you know. That’ll wear off. Just come out and try.’

    ‘But they’ll see me.’

    ‘What does it matter if they do?’

    ‘I’d rather die. (p. 607)’

And I would echo, that to live in a world where I am an open book to be read, with no personal ideas, no personal values, no intimacy between me and others, and no social concept of relationships would, I too, would also rather die.

References

Introna, L. (2000). Privacy and the Computer. In R. Baird, R. Ramsower, & S. Rosenbaum, Cyberethics (pp. 188-199). Amherst: Prometheus.

Lewis, C. (2009). The Great Divorce (Kindle Edition). New York: HarperCollins-eBooks.

 

How to give children a moral compass in Cyberspace

Within cyberspace where people roam with little to no immediate governing restrictions, how does one impress on the youth and young adults that are developing their moral compass what is acceptable from a moral and ethical perspective?

Nancy Willard points out in her article Moral Development in the Information Age that the framework of the Internet has been designed such that it is disconnected and decentralized. As a result; no one agency can effectively police and dictate morality and ethical responsibility, therefore decisions are widely left up to individuals (Willard, 1997).

Because of four key factors that Willard points out in her article, namely: a) Lack of affective feedback; b) reduced fear of risk of detection; c) New environment requires new rules; and d) perceptions of social injustice (Willard, 1997), it seems that it is difficult for individuals to make the transition between the “real world” and the “digital world”. And because morality and ethics in cyberspace are driven mainly off of individual decisions, it becomes even more paramount that these issues be address during the growth and development of today’s youth (Willard, 1997).

As a result; I believe that first and foremost in order to expand morality and ethics into the Information Age, there must be an agreement to the ideals of universal propositions, like those defined by Turiel: concepts of Justice, rights and welfare (Willard, 1997).

Apart from this central foundation, according to further studies by Hoffman and Baumrind, in order to teach internalized moral responsibility, it is imperative that parents, teachers and other influential men and women begin to help children and young adults focus on the consequences of their actions based on these universals, rather than focusing on the responsibility to follow a set of rules (Willard, 1997).

By means of this approach, we prepare the future generation to mature in their own idealizations of what is morally acceptable and unacceptable even in a world where boundaries are largely determined by individualistic principles (Willard, 1997), and where unexplored moral challenges present themselves frequently.

References

Willard, N. (1997). Moral Development in the Information Age. Retrieved July 30, 2009, from http://tigger.uic.edu/~lnucci/MoralEd/articles/willard.html

Digital Rights Management… who should be protected?

I received an email from Amazon this evening saying they were refunding a series of books I had purchased by George Orwell on the Kindle.

I called them to ask them why they were refunding the books; because I had never requested the refund.

They responded in saying that they were very sorry, they had no idea why the books were being refunded, but they needed to remove them off my kindle.

I told the representative that I wasn’t so much concerned about the book & the money; I knew I could buy it again in other formats; but I was definitely concerned about the fact that Amazon at any time could decide to remove books that I had purchased off of my kindle; and they’re only requirement was to refund my money (did they really even have to do that?).

What happens when the government decides to outlaw certain books; or certain publishers decide that they want to pull all books of the book shelf (like Oceania in 1984, many organizations have done this in the recent past to erase and rewrite their own history).

This is why I have no problem circumventing DRM (when possible).  I bought the book; I own the book.  Amazon should have no ability to “steal” my purchased book back from me; even if they wanted to refund my money.

The world is a changing place… prepare yourself!