DeCSS refers most commonly to a computer code capable of decrypting content on a DVD Video disc encrypted using the Content Scrambling System (CSS).

The program was devised by persons unknown and released to the internet by a number of people allegedly including Norwegian teenager Jon Johansen, whose home was raided in 2000 by Norwegian police. He was put on trial in a Norwegian court and faced a possible jail sentence of two years and large fines, but was acquitted of all charges in early 2003. However, on March 5, 2003, a Norwegian appeals court has ruled that Johansen would have to be retried on charges that he violated copyright and anti-hacking laws. The court said that arguments filed by the movie industry and additional evidence merited another trial. On December 22, 2003, the appeals court agreed with the acquittal, and on January 5, 2004 Norway's Okokrim decided not to persue the case further.

DeCSS was used as a guide by programmers around the world to create hundreds of equivalent programs, some merely to demonstrate the trivial ease with which the system could be bypassed, and others to implement an open source DVD player (the licensing restrictions on CSS would have made it impossible for an open source implementation through official channels). Since no commercial DVD drivers have been made available for some open source operating systems, users of those operating systems require an open source implementation simply in order to play a legally purchased DVD using their legally purchased hardware and software. As it is able to provide the unencrypted source video in digital form, it is also possible to use DeCSS to copy DVD videos to another medium with no loss of quality, a facility that bodies such as the MPAA argue encourages mass copyright infringement. It should be pointed out that commercial-scale pirating of CSS encrypted DVDs was widespread in east Asia without the use of DeCSS or by similar techniques. It is believed that these discs were simply bit-for-bit copies of the original DVD, with no need for any decryption of the CSS-encrypted content.

In protest against legislation that prohibits publication of DeCSS code in countries that implement the WIPO Copyright Treaty (such as the United States' Digital Millennium Copyright Act), some have devised clever ways of distributing descriptions of the DeCSS algorithm, such as through steganography, through various Internet protocols, as a series of haiku poems, and even as a so-called illegal prime number.

DeCSS was first released on October 6, 1999 when Johansen posted an announcement of DeCSS 1.1b on the livid-dev mailing list. Initially the source code was not available, but it was leaked before the end of the month. The first release of DeCSS was preceded by a few weeks by a program called DoD DVD Speed Ripper from a group called Drink or Die, which had no release of source code and which apparently did not work with all DVDs. The group that wrote DeCSS, including Johansen came to call themselves Masters of Reverse Engineering and may have obtained information from Drink or Die. The release of the DeCSS source code was the first time the algorithm of CSS was available to public scrutiny, and it was soon found to be susceptible to a brute force attack. The first legal threats against sites hosting DeCSS, and the beginning of the DeCSS mirroring campaign, began in about early November 1999. As a response to these threats a program also called DeCSS but with an unrelated function ( http://www.pigdog.org/decss/ ) was developed. This program can be used for stripping Cascading Style Sheets tags from an HTML page.

External links and references