Institutionen För Systemteknik 581 83 LINKÖPING

Total Page:16

File Type:pdf, Size:1020Kb

Institutionen För Systemteknik 581 83 LINKÖPING Avdelning, Institution Datum Division, Department Date 2004-06-04 Institutionen för systemteknik 581 83 LINKÖPING Språk ISBN Language Rapporttyp Report category Svenska/Swedish Licentiatavhandling ISRN LITH-ISY-EX-3533-2004 X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer D-uppsats Title of series, numbering ISSN Övrig rapport ____ URL för elektronisk version http://www.ep.liu.se/exjobb/isy/2004/3533/ Titel Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare Title Plastic card frauds, a survey of current relevant card and system properties Författare Natalia Savostyanova and Valeriya Velichko Author Sammanfattning Abstract Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided by paper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use. Nyckelord Keyword plastic card, smart card, magnetic stripe, ATM, attack, crime, counterfeiting, skimming, PIN 2 Information Theory division Department of Electrical engineering Linkoping Institute of Technology Master’s thesis Plastic card fraud, a survey of current relevant card and system properties LiTH – ISY – EX – 3533 – 2004 by Natalia Savostyanova and Valeriya Velichko spring 2004 3 4 ABSTRACT Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided by paper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use. 5 6 ACKNOWLEDGMENTS This work is a result of long-lasting efforts, which led us to the increased feeling of tolerance. Therefore we would like to thank each other for the deep understanding and friendship, silence and talkativeness, sharing the ideas and thoughts. While writing this thesis we have learnt how to hear, how to speak and how to be patient to each other’s opinions. We would like to thank our supervisor, Viiveke Fak, without whom this work would not have appeared. We especially want to express gratitude to our parents and siblings for their love and wholehearted support in difficult times. Also we would like to thank our friends and neighbours for their help. Спасибо вам всем за внимание, терпение и понимание! 7 8 TABLE OF CONTENTS LIST OF FIGURES ................................................................................................................. 13 LIST OF ACRONYMS ........................................................................................................... 15 CHAPTER 1. INTRODUCTION ............................................................................................ 19 CHAPTER 2. BASICS OF PLASTIC CARD CRIME ........................................................... 22 2.1. Types of Plastic card fraud............................................................................................ 22 2.2. Parties of Plastic card fraud........................................................................................... 23 2.2.1. Criminals................................................................................................................ 23 2.2.2. Victims ................................................................................................................... 25 Material and moral losses............................................................................................ 25 Physical impact ............................................................................................................ 26 2.3. Summary ....................................................................................................................... 26 CHAPTER 3. CARDS ............................................................................................................. 27 3.1. Generalities ................................................................................................................... 27 3.2. Magnetic Stripe ............................................................................................................. 31 3.2.1. Magnetic characteristics......................................................................................... 33 Signal amplitude .......................................................................................................... 33 Jitter ............................................................................................................................. 33 Coercivity ..................................................................................................................... 33 3.2.2 Physical encoding.................................................................................................... 34 3.2.3 Logic encoding........................................................................................................ 36 Error detection/correction/recovery ............................................................................ 36 3.2.4. Tracks..................................................................................................................... 37 CVV/CVC ..................................................................................................................... 40 3.2.5. Security techniques ................................................................................................ 41 Watermarking .............................................................................................................. 41 Magneprint .................................................................................................................. 43 XSec.............................................................................................................................. 44 3.2.6. Advances in the magstripe technology .................................................................. 45 3.2.7 How to make a subway ticket ................................................................................. 46 3.3. Smart Cards................................................................................................................... 48 3.3.1. What is a Smart Card?............................................................................................ 48 3.3.2. Travel in time ......................................................................................................... 48 3.3.3. Smart Card Applications........................................................................................ 50 3.3.4. Types of smart cards .............................................................................................. 50 Memory cards .............................................................................................................. 51 Microprocessor cards .................................................................................................. 51 Contact cards ............................................................................................................... 52 Contactless cards ......................................................................................................... 53 Hybrid cards ................................................................................................................ 53 Dual interface cards..................................................................................................... 54 3.3.5. Smart card life cycle..............................................................................................
Recommended publications
  • Biometric Cardholder Authentication Pioneering the Way with Security Why Digital Ids Won't Replace Physical Identity Cards
    The Offi cial Publication of the International Card Manufacturers Association August 2021 Volume 31 • No. 4 Biometric Cardholder Authentication Pioneering the Way with Security Why Digital IDs Won’t Replace Physical Identity Cards Any Time Soon Selecting the Right Ink Technology for ID Card Printing Bringing Security to Contactless Biometric Payment Cards founder /executive director is published by CMA for ICMA. Please Enter the 2021 Élan Awards of Excellence! submit all articles, news releases and advertising to: | By Jeffrey E. Barnhart CARD MANUFACTURING™ C/O: CMA With hundreds of entries from around the globe each year, the Élan 191 Clarksville Road Awards of Excellence celebrate the world’s most impressive cards and Princeton Junction, New Jersey 08550 USA card technologies. The competition, which was designed to drive innovation within the card industry, recognizes Founder/Executive Director winners in three categories—card manufacturing, personalization & fulfillment and card Jeffrey E. Barnhart [email protected] suppliers. Judging is based on a quantifi able scoring system with criteria in nine categories. Winners will be announced during a special ceremony at the 2021 ICMA Card Manufacturing Operations and Member Experience Manager and Personalization EXPO from November 7-10 in Orlando, Florida. Michael Canino [email protected] Open to ICMA members only, entries for the 2021 Élan Awards of Excellence are due by Association Manager September 1. The competition honors world-class achievements in the following categories: Lynn McCullough [email protected] Secure Payments Cards; Loyalty, Promotional and Gift Cards; ID and Access Control Cards; Personalization & Fulfillment Product, Service or Project; Unique Innovation and Best Managing Editor Jennifer Kohlhepp Supplier/Vendor New Product, Service or Innovation.
    [Show full text]
  • Tuesday 13 November 2007
    Tuesday 13 November 2007 RE: Response to the proposed BSkyB digital terrestrial television services consultation I wish to start by personally thanking you for allowing me to respond to the plans that British Sky Broadcastings plans to launch their Picnic platform on Digital Terrestrial Television, including the launch of the following services: z Sky Sports One; z A children's channel/Sky Movies SD One; z A factual channel/Sky News/Sky One; z Sky News (if BSkyB is given permission to launch a fourth service on DTT using MPEG-4 encoding); z Broadband up to 16Mbps and a telephony service. I wish to begin by giving an idea of my thoughts on the proposal by BSkyB before I answer the questions in the consultation document. Introduction 1. Regarding the use of by BSkyB and NDS Group, the VideoGuard conditional access technology for its pay television services. According to the press release that was released by BSkyB on the 8th of February 2007,1 the service will use a highly secure conditional access system similar to the one BSkyB uses for its digital satellite services, Sky Digital and FreesatFromSky. I also understand that Sky has also stated that viewers will require a new set-top-box to access the new service. In the past, since the launch of the Sky satellite television service in February 1989 via the Astra satellite, BSkyB have always used NDS Group technology to encrypt and protect their own branded services, with both the VideoCrypt and VideoGuard conditional access systems for their Sky analogue and digital satellite services respectively.
    [Show full text]
  • 9363235, Operating Manual DVB Cable Receiver UFC 762Si, UFC
    Operating manual - Englisch - DVB cable receiver UFC 762si/sw PREFACE Dear customer, This Operating Manual is intended to help you make the fullest use of the extensive range of functions offered by your new cable receiver. We have tried to make the operating instructions as easy as possible to understand, and to keep them as concise as possible. If you will not be using your receiver for an extended period, you should use the power switch to disconnect it from the power supply to save energy. For shorter breaks, you can use the remote control to switch the receiver to standby, which uses only a minimal amount of energy. We wish you good reception and much pleasure using your new DVB C receiver. Your KATHREIN team RECEIVER FEATURES The receivers UFC 762si and UFC 762sw are suitable for the reception of digital cable TV and radio channels. The decoding systems for Conax and Cryptoworks are already integrated. In addition one Common Interface for a CA module is provided for decoding additional Pay-TV channels. Despite their small size, these receivers have a comprehensive range of features, such as electrical and optical audio output for Dolby Digital (AC 3), Teletext with memory for 800 pages, and a 16-character alphanumeric display for showing the channel names. PRODUCT PACKAGE - UFC 712si (silver) and UFC 712sw (black) - Remote control RC 662 - Scart cable - 2 Batteries AAA 1.5 V - Power supply cable - Operating Manual - Safety Instructions 2 IMPORTANT INFORMATION The channels available are subject to continual change in the cable network. Accordingly it is necessary to update the channel presets when changes are made.
    [Show full text]
  • 3.3 Traitor Tracing Algorithm
    Traitor Tracing through Function Sharing by CemrQelebiler Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Master of Engineering and Bachelor of Science in Computer Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 1996 @ Cem Qelebiler, MCMXCVI. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part, and to grant others the right to do so. ;/// Author .. ................... 7..F. ................................ Departmenrd of Elvctr 1l Engineering and Computer Science ' 'December 15, 1995 C ertified by ....... : .. ........................................ Silvio Micali 'I t Profiorpof Computer Science ,.Thesis Supervisor Accepted by .. \... .. .......................... F.R. Morgenthaler sc•-srrs., ucE64sm •,Department ommittee ofr Graduate Theses OF TECHNOLOGY JUN111996 cng. UBRARIES Traitor Tracing through Function Sharing by Cem Q~elebiler Submitted to the Department of Electrical Engineering and Computer Science on December 15, 1995, in partial fulfillment of the requirements for the degrees of Master of Engineering and Bachelor of Science in Computer Science and Engineering Abstract To broadcast information (for example pay-television) over insecure channels (for ex- ample the public airwaves) to a set of paying subscribers, the broadcaster may employ encryption to prevent non-subscribers from gaining access to the programming. A risk to the broadcaster is that subscribers may sell or give their decryption key to non-subscribers and thus deprive the broadcaster of potential revenue. Traitor trac- ing schemes are key management schemes that allow the broadcaster to trace any subscriber who sells his key.
    [Show full text]
  • 1704 Optaglio Brožura Polygrafie 210X210.Indd
    CREATING ABSOLUTE TRUST TOWARDS DOCUMENTS AND VALUABLES OPTAGLIO WAS FOUNDED BY EXPERTS ABOUT FROM CZECH ACADEMY OF OPTAGLIO SCIENCES. OPTAGLIO is a leading global provider of advanced ABOUT OUR DURING optical security devices and the market leader in e-beam lithography. During 25 years of our ALL OF ITS TECHNOLOGY history, we have delivered hundreds of millions of 20-YEAR holograms to governments, financial institutions e-beam lithography is the most advanced technology HISTORY and other organizations in more than 50 countries for creating optical security elements. Optical around the world. Our unique technology has holographic structures are generated through HAS HEAVILY been broadly recognized as the industry standard sophisticated mathematic algorithms which can be ANTI-COUNTERFEIT PROTECTION BASED ON INVESTED INTO WE DELIVER for optical security. brought together neither through reverse engineering SCIENTIFIC OPTAGLIO, certified to relevant international nor any other method. Therefore no unauthorized FULL PROTECTION SURGICAL PRECISION standards, operates under strict 24/7 security person can produce the same hologram. RESEARCH. AT A PROPORTION Our technologies are often preferred for a protection of most supervision. Our comprehensive security system Thanks to the unrivaled mastering of e-beam OF COSTS valuable assets such as personal identity because we can ensure covers people, processes, data, and facilities. lithography, we produce holograms with visual effects higher security level than anybody else. Therefore we are a partner
    [Show full text]
  • 1. INTRODUCTION 2. EASY INSTALLATION GUIDE 8. Explain How to Download S/W by USB and How to Upload and Download 9. HOW to DOWNLO
    1. INTRODUCTION Overview…………………………………………………………………………..………………...……... 2 Main Features……………………………………………………………………………... ...………... ....4 2. EASY INSTALLATION GUIDE...…………...…………...…………...…………...……….. .. 3 3. SAFETY Instructions.………………………………………………………………………… …6 4. CHECK POINTS BEFORE USE……………………………………………………………… 7 Accessories Satellite Dish 5. CONTROLS/FUNCTIONS……………………………………………………………………….8 Front/Rear panel Remote controller Front Display 6. EQUIPMENT CONNECTION……………………………………………………………....… 11 CONNECTION WITH ANTENNA / TV SET / A/V SYSTEM 7. OPERATION…………………………………………………………………….………………….. 12 Getting Started System Settings Edit Channels EPG CAM(COMMON INTERFACE MODULE) Only CAS(CONDITIONAL ACCESS SYSTEM) USB Menu PVR Menu 8. Explain how to download S/W by USB and how to upload and download channels by USB……………………….……………………………………….…………………31 9. HOW TO DOWNLOAD SOFTWARE FROM PC TO RECEIVER…………….…32 10. Trouble Shooting……………………….……………………………………….………………34 11. Specifications…………………………………………………………………….……………….35 12. Glossary of Terms……………………………………………………………….……………...37 1 INTRODUCTION OVERVIEW This combo receiver is designed for using both free-to-air and encrypted channel reception. Enjoy the rich choice of more than 20,000 different channels, broadcasting a large range of culture, sports, cinema, news, events, etc. This receiver is a technical masterpiece, assembled with the highest qualified electronic parts. MAIN FEATURES • High Definition Tuners : DVB-S/DVB-S2 Satellite & DVB-T Terrestrial Compliant • DVB-S/DVB-S2 Satellite Compliant(MPEG-II/MPEG-IV/H.264)
    [Show full text]
  • 912Digital Sat Equipment 912-Tt
    DIGITAL SAT EQUIPMENT 912-TT 912 DVB-S/S2 to DVB-T/H with Common Interface transmodulators Description Transmodulator of encrypted satellite digital television services to terrestrial digital television. Each module selects the services of a DVB-S/S2 satellite transponder and includes them in a DVB-T channel. Equipped with a Common Interface slot for insertion of the CAM and the subscriber’s card. Programmable using PC software and a wireless programmer. Applications Collective terrestrial digital television installations where the aim is to distribute encrypted satellite television services while avoiding the installation of satellite receivers. Compatible with all collective TV installations since the channels can be distributed throughout the terrestrial band. TT-211 Characteristics Automatic error-detection system which greatly reduces maintenance work on the installation. Generated output channel of outstanding quality. Does not include the CAM or the decoder card. Zamak chassis with metal side panels. F-type connectors. The equipment can be assembled quickly and easily. CODE 9120147 MODEL TT-211 DVB-S / DVB-S2 DVB-T/DVB-H TV system EN 300421 EN 302307 EN 300744 DVB-S/S2 receiver Frequency range MHz 950 - 2.150 Frequency step KHz 1 +12 LNB power supply mA 350 máx Symbol rate Mbaud 1..45 Diplexing through loss dB±TOL 1.0 ±0,2 DVB-S2 receiver dBμV 45..95 Input level dBm -63..-13 F.E.C. QPSK Auto, 1/2, 3/5, 2/3, 3/4, 4/5 5/6, 8/9, 9/10 DVB: EN 302307 F.E.C. 8PSK Auto, 3/5, 2/3, 3/4, 5/6, 8/9, 9/10 DVB: EN 302307 Roll-Off dB 0,35/0,25/0,20 DVB-S receiver dBμV 40..95 Input level dBm -68..-13 F.E.C.
    [Show full text]
  • Scopus Network Technologies LOOPTHROUGH 100-240VAC 1A 50/60Hz ALARM ASI ASI KEYBOARD/ OUT1 OUT2 RS232 COM1 LAN MOUSE VGA CI MODULES - PORT B ASI INPUT
    ® CODICO CID-3100 1RU enclosure DVB Common Interface Decryptor for DVB Common Interface CATV and Digital Turnaround Systems (up to 4 slots) General Dual ASI Transport Stream outputs CODICO® CID-3100 is the ultimate solution for Digital Turnaround systems and CATV operators, for DVB-CI decryption of incoming (off-air or on premises) encrypted digital television channels. The clear Transport Stream can further be re-transmitted or Enhanced DVB Transport Stream re-multiplexed for re-distribution following grooming, VBR (Variable Bit-rate) processing and/or re-encryption. Monitoring software The CODICO® CID-3100 is powerful and innovative. This professional four slot DVB-CI unit decrypts channels encrypted by a number of leading Conditional Access Systems. Decrypts part or all programs It supports DVB SimulCrypt and MultiCrypt, offering multiple channel decryption up to the full incoming transport stream, as well as concurrent support of up to four different in a receiving transport stream CA systems. The CID-3100 offers dual ASI outputs for turnaround and loop-through. Applications Concurrent decryption support • DVB-CI Transport Stream Decryption with up to four different CA systems • Transport Stream re-multiplexing • Digital Turnaround systems • CATV head-end re-distribution Support for leading CA systems • Satellite re-distribution • Telecommunication, SDH or microwave • Distribution network Features and Options • ASI Transport Stream input and loop-through output • QPSK, QAM, G.703 and STM-1 optical front end receiver options • On-board
    [Show full text]
  • RECE\VED Tio~ , 0 \992
    DECTEC INTERNATIONAL INC. P.D. BOX 2275, 1 962 MILLS ROAD, SIDNEY, BRITISH COLUMBIA, CANADA VBL 3SB PHONE: (604) 655-4463 . ._.... FAX: (604) 655-3906 RECE\VED tiO~ , 0 \992 • COMMISSION ftDEkAL coMMUNICATIONS y OFF:"Ir.E OF THE SECRETAR October 8, 1991 RECEIVED OCT 15 IY9, Ms Donna Searcy Secretary, Federal Communications Commission FCC M/' 1919 M Street ,.,IL BRANCH Washington, DC 20515 Dear Ms. Searcy, This letter is presented in support of a filing submitted to the Commission by the Consumer Satellite Coalition on July 1, 1991. The document filed by the CSC requested a public hearing/inquiry on the monopolistic business practices of General Instrument Corporation and the distribution and sale to consumers by the General Instrument division of Forstmann Little Corporation of a defective descrambling product which is used by consumers and cable operators to unscramble programming delivered over satellite. As a research and development firm which has spent the past three years developing a universal scrambling system designed to run multiple encryption and decryption processes through one single decoder, we submit that General Instrument has deceived the pUblic, the governments of the united States and Canada, television programmers, hollywood producers, satellite and consumer electronic retailers, and the manufacturers of Integrated Receiver Descramblers in the sales and upgrade programs associated with its videocipher II scrambling system, (exhibit A). Through our work as a well-respected research and development company who has been
    [Show full text]
  • Holographic Interfermetry for Security and Forensic Applications. in Burgess, D., Owen, G., Bouma, H., Carlysle-Davies, F., Stokes, R.J
    AMBADIYIL, S., SREELEKSHMI, R.C., PILLAI, V.P.M. and PRABHU, R. 2016. Holographic interfermetry for security and forensic applications. In Burgess, D., Owen, G., Bouma, H., Carlysle-Davies, F., Stokes, R.J. and Yitzhaky, Y. (eds.) Proceedings of the 12th Optics and photonics for counterterrorism, crime fighting and defence conference 2016: co- located with Society of Photographic Instrumentation Engineers (SPIE) security and defence conference, 26-27 September 2016, Edinburgh, UK. Proceedings of SPIE, 9995. Bellingham: SPIE [online], article ID 999502. Available from: https://doi.org/10.1117/12.2242153 Holographic interfermetry for security and forensic applications. AMBADIYIL, S., SREELEKSHMI, R.C., PILLAI, V.P.M., PRABHU, R. 2016 © 2016 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. This document was downloaded from https://openair.rgu.ac.uk Holographic interferometry for security and forensic applications Sajan Ambadiyil,a Sreelekshmi R. C,b V. P. Mahadevan Pillai,c* Radhakrishna Prabhud aCenter for Development of Imaging Technology, Thiruvananthapuram-695027, Kerala, India bSarabhai Institute of Science and Technology, Thiruvananthapuram, Kerala, India cDepartment of Optoelectronics, University of Kerala, Thiruvananthapuram-695581, Kerala, India dRobert Gordon University, School of Engineering, Aberdeen, United Kingdom ABSTRACT Security holograms having unique 3D images are one of the tools for enhancing the security for product and personnel authentication and anti-counterfeiting. Apart from the high technology that is required, the uniqueness of a 3D object presents a significant additional threshold for the counterfeiting of such security holograms.
    [Show full text]
  • Brute-Force Angriff Auf DVB-CSA1 Mithilfe Eines Preisgünstigen FPGA-Clusters
    Brute-force Angriff auf DVB-CSA1 mithilfe eines preisgünstigen FPGA-Clusters BACHELORARBEIT zur Erlangung des akademischen Grades Bachelor of Science im Rahmen des Studiums Technische Informatik eingereicht von Ioannis Daktylidis Matrikelnummer 1128193 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Mitwirkung: DI Dr. Markus Kammerstetter Wien, 15. April 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Brute-force Attacks on DVB-CSA1 using a low-cost FPGA-Cluster BACHELOR’S THESIS submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Engineering by Ioannis Daktylidis Registration Number 1128193 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Assistance: DI Dr. Markus Kammerstetter Vienna, 15th April, 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Ioannis Daktylidis [email protected] Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwendeten Quellen und Hilfs- mittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 15. April 2017 Ioannis Daktylidis iii Abstract The DVB Common Scrambling Algorithm (CSA) is widely used to encrypt PayTV MPEG transport streams around the world.
    [Show full text]
  • Copyright and DRM
    CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought over pornography, neo-Nazism, bomb design, blasphemy, or political dissent. Instead, the Armageddon of digital control, the real death match between the Party of the Past and Party of the Future, will be fought over copyright. — John Perry Barlow Be very glad that your PC is insecure — it means that after you buy it, you can break into it and install whatever software you want. What YOU want, not what Sony or Warner or AOL wants. — John Gilmore 22.1 Introduction Copyright, and digital rights management (DRM), have been among the most contentious issues of the digital age. At the political level, there is the conflict alluded to by Barlow in the above quotation. The control of information has been near the centre of government concerns since before William Tyndale (one of the founders of the Cambridge University Press) was burned at the stake for printing the Bible in English. The sensitivity continued through the estab- lishment of modern copyright law starting with the Statute of Anne in 1709, through the eighteenth century battles over press censorship, to the Enlight- enment and the framing of the U.S. Constitution. The link between copyright and censorship is obscured by technology from time to time, but has a habit of reappearing. Copyright mechanisms exist to keep information out of the hands of people who haven’t paid for it, while censors keep information out of the hands of people who satisfy some other criterion.
    [Show full text]