Not being a lawyer and having only read the summary of the DCMA here it seems that it is not as bad as suggested. Here is the relevant section:
DMCA Exceptions
Finally, the prohibitions contained in section 1201 are subject to a number of
exceptions. One is an exception to the operation of the entire section, for law
enforcement, intelligence and other governmental activities. (Section 1201(e)). The
others relate to section 1201(a), the provision dealing with the category of technological
measures that control access to works.
The broadest of these exceptions, section 1201(a)(1)(B)-(E), establishes an
ongoing administrative rule-making proceeding to evaluate the impact of the
prohibition against the act of circumventing such access-control measures. This
conduct prohibition does not take effect for two years. Once it does, it is subject to
an exception for users of a work which is in a particular class of works if they are or are
likely to be adversely affected by virtue of the prohibition in making noninfringing uses.
The applicability of the exemption is determined through a periodic rulemaking by the
Librarian of Congress, on the recommendation of the Register of Copyrights, who is
to consult with the Assistant Secretary of Commerce for Communications and
Information.
The six additional exceptions are as follows:
1. Nonprofit library, archive and educational institution exception
(section 1201(d)). The prohibition on the act of circumvention of
access control measures is subject to an exception that permits
nonprofit libraries, archives and educational institutions to circumvent
solely for the purpose of making a good faith determination as to
whether they wish to obtain authorized access to the work.
2. Reverse engineering (section 1201(f)). This exception permits
circumvention, and the development of technological means for such
circumvention, by a person who has lawfully obtained a right to use a
copy of a computer program for the sole purpose of identifying and
analyzing elements of the program necessary to achieve interoperability
with other programs, to the extent that such acts are permitted under
copyright law.
3. Encryption research (section 1201(g)). An exception for encryption
research permits circumvention of access control measures, and thedevelopment of the technological means to do so, in order to identify
flaws and vulnerabilities of encryption technologies.
4. Protection of minors (section 1201(h)). This exception allows a court
applying the prohibition to a component or part to consider the
necessity for its incorporation in technology that prevents access of
minors to material on the Internet.
5. Personal privacy (section 1201(i)). This exception permits circumven-tion
when the technological measure, or the work it protects, is capable
of collecting or disseminating personally identifying information about
the online activities of a natural person.
6. Security testing (section 1201(j)). This exception permits circumven-tion
of access control measures, and the development of technological
means for such circumvention, for the purpose of testing the security
of a computer, computer system or computer network, with the
authorization of its owner or operator.
It would seem that what was done is permitted under clauses 2,3 and 6.
cheers
tachyon
s&&rsenoyhcatreve&&&s&n.+t&"$'$`$\"$\&"&ee&&y&srve&&d&&print