The Motion Picture Association of America's Patrolling of Internet Piracy in America, 1996-2008 by Matthew A

Total Page:16

File Type:pdf, Size:1020Kb

The Motion Picture Association of America's Patrolling of Internet Piracy in America, 1996-2008 by Matthew A Content Control: The Motion Picture Association of America’s Patrolling of Internet Piracy in America, 1996-2008 By Matthew A. Cohen Submitted to the graduate degree program in Film and Media Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Chairperson: Tamara Falicov Catherine Preston Chuck Berg Robert Hurst Nancy Baym Kembrew McLeod Date Defended: August 25, 2011 Copyright 2011 Matthew A. Cohen ACCEPTANCE PAGE The Dissertation Committee for Matthew A. Cohen certifies that this is the approved version of the following dissertation: Content Control: The Motion Picture Association of America’s Patrolling of Internet Piracy in America, 1996-2008 Chairperson: Tamara Falicov Date approved: Abstract This historical and political economic investigation aims to illustrate the ways in which the Motion Picture Association of America radically revised their methods of patrolling and fighting film piracy from 1996-2008. Overall, entertainment companies discovered the World Wide Web to be a powerful distribution outlet for cultural works, but were suspicious that the Internet was a Wild West frontier requiring regulation. The entertainment industry’s guiding belief in regulation and strong protection were prompted by convictions that once the copyright industries lose control, companies quickly submerge like floundering ships. Guided by fears regarding film piracy, the MPAA instituted a sophisticated and seemingly impenetrable “trusted system” to secure its cultural products online by crafting relationships and interlinking the technological, legal, institutional, and rhetorical in order to carefully direct consumer activity according to particular agendas. The system created a scenario in which legislators and courts of law consented to play a supportive role with privately organized arrangements professing to serve the public interest, but the arrangements were not designed for those ends. Additionally, as cultural products became digitized consumers experienced a paradigm shift that challenged the concept of property altogether. In the digital world the Internet gives a consumer access to, rather than ownership of, cultural products in cyberspace. The technology granting consumers, on impulse, access to enormous amounts of music and films has been called, among many things, the “celestial jukebox.” Regardless of what the technology is called, behind the eloquent veneer is the case in point of a systematic corrosion of consumer rights that, in the end, results in an unfair exchange between the content producers and consumers. What is the relationship of the MPAA to current piracy practices in America? How will Hollywood’s enormous economic investment in content control affect future film distribution, exhibition, and consumer reception? Through historical analysis regarding the MPAA’s campaign against film piracy along with interviews from key media industry personnel and the pirate underground, this contemporary illustration depicts how the MPAA secures its content for Internet distribution, and defines and criticizes the legal and technological controls that collide with consumer freedoms. ii Acknowledgements I am thankful for the assistance from many people, including my dissertation chair, Tamara, Falicov, and the other members of my committee including Professor Chuck Berg, Professor Cathy Preston, Professor Nancy Baym, Professor Robert Hurst and an especially big thanks to Professor Kembrew McLeod at the University of Iowa. Other people that I appreciate and am most grateful for their help include Lisa Angelella, whose hard work and dedication is an example to all. Thanks also to Chris Groves and R. A.H. Thank you to the University of Iowa and their libraries. A special thanks to my Mom and family for their support. Lastly, I especially want to acknowledge the patience and support from my wife, Mary through the entire process of writing this document. iii Table of Contents Abstract……………………………………………………………………..………………ii Acknowledgements…………………………………………………………….…………..iii Chapter One: Introduction Introduction…………………………………………………................................. 1 Purpose……………………………………………………………………............ 2 You Can’t Protect What You Don’t Own………………………………………... 4 Research Methods…………………………………………………………........... 8 Co-Existing Trusted Systems…………………………………………………….. 16 Interview Sample…………………………………………………………………. 18 Piracy…………………………………………………………………………….. 19 Legislation……………………………………………………………………….. 24 Nuances of the Debate……………………………………………………............. 25 Literature Review…………………………………………………………............ 28 Overview…………………………………………………………………………. 44 Chapter Two: Overview and Development of the Motion Picture Association of America Introduction……………………………………………………………………… 47 Characterization of the MPAA…………………………………………………… 48 MPAA and South Korea’s Screen Quota…………………………………............ 50 Hollywood’s Ascent Into International Markets…………………………………. 54 Historical Overview of the MPAA……………………………………………… 57 MPAA’s Relationship with U.S. Federal Government……………………………66 MPAA’s Public Stances on Piracy……………………………………………….. 68 Conclusion……………………………………………………………………….. 71 Chapter Three: Putting Names to the Trusted System Introduction……………………………………………………………………… 73 Dean Garfield…………………………………………………………………….. 79 “Who Makes Movies?” Campaign………………………………………………. 86 DVD Copy Control Association (DVD-CCA) and the Content Protection Technical Working Group (CPTWG)…………………………………... 94 iv James Burger, IP Attorney, Charter Member of the CPTWG and Secure Digital Music Initiative (SDMI) Coalitions……………………………………………. 100 Digital Cinema Initiative (DCI), John Hurst, and Cinecert………………............. 107 J.D. Lasica’s “Darknet” and Alexander Galloways’s “Networks”………………. 113 Simon Petersen…………………………………………………………………… 118 Dan Mickell and Movie Land……………………………………….…………… 124 Conclusion………………………………………………………………………...130 Chapter Four: The Significance of the Digital Millennium Copyright Act and its Deliberations, Ramifications, and Exemptions Introduction………………………………………………………..………………134 Linux Protests…………………………………………………………………….. 137 EFF’s Preliminary Lobbying Efforts with DVD Encryption Scheme……………. 139 US vs. Elcomsoft-Skylarov………………………………………………………..142 RIAA vs. Felten……………………………………………………………………146 DVD XCopy vs. Hollywood………………………………………………………152 DVD XCopy’s Inability to Decipher Rental Discs………………………………. 153 Copyright Fraud…………………………………………………………………... 155 MPAA vs. The People……………………………………………………..............161 MGM vs. Grokster………………………………………………………………... 163 Copyright Statutory Damages……………………………………………………. 165 RealNetworks vs. DVD-CCA (aka RealDVD Case)…………………………….. 167 End User License Agreements (EULAs), Terms of Service (TOS), Internet Click- Wrap Agreements………………………………………………………. 170 DMCA 12-Year Retrospective: Exemptions…………………………………….. 173 Conclusion………………………………………………………………………... 177 Chapter Five: Towards a Better Understanding of the Trusted System Framework and Copyright Control Summary………………………………………………………………………….. 181 Interpretation of Findings………………………………………………………… 187 Study Limitations…………………………………………………………............ 194 Suggestions For Future Research………………………………………………… 195 v Conclusion………………………………………………………………………... 199 Bibliography……………………………………………………………………………….. 202 Appendix 1: Transcription of Dean Garfield Phone Interview……………………………. 214 Appendix 2: Transcription of John Hurst Phone Interview……………………………….. 225 vi 1 Content Control: The Motion Picture Association of America’s Patrolling of Internet Piracy in America, 1996-2008 Introduction The number of film piracy cases grew at a breakneck pace in the early 1970s because of an important breakthrough permitting movies to become tangible consumer goods. The appearance of the videocassette recorder (VCR) was significant to consumers in countless ways. While the typical video fan used the technology to collect, archive, share, and learn from an enormous archive of film and video, VCRs also permitted consumers to shift distribution control away from the transnational multimedia conglomerates. Additional technological advances permitted consumers time-shifting recording and content sharing, eventually allowing the rapid and inexpensive reproduction of film products and thereby placing the consumer within the framework of production and distribution.1 Video Cassette Recorders created huge profits for the Hollywood major studios, although initially the studios contested the arrival of the technology in the courts and were slow to respond in creating an ancillary market through the sale of videocassettes.2 On January 17, 1984, the U.S. Supreme Court ruled 5-4 that the taping of a television program, including movies broadcast on television, was legal for home viewing, rejecting the assertion by the entertainment industry that viewers who recorded programs were stealing copyrighted product. 1 Shujen Wang, Framing Piracy: Globalization and Film Distribution in Greater China (Oxford: Rowman & Littlefield, 2003). 2 Kerry Segrave, Piracy in the Motion Picture Industry (Jefferson, N.C.: McFarland & Co., 2003), 222. 2 VCRs also allowed video enthusiasts to share content and duplicate and distribute media on a mass scale.3 By 1985, the Film Security Office (FSO), an office established by MPAA president Jack Valenti to combat piracy on behalf of its member companies, Columbia, Warner Bros., United Artists, Paramount, Fox, Universal, Allied Artists, and Avco Embassy, estimated the worldwide loss of revenue to the majors due to film
Recommended publications
  • The Digital Millennium Copyright Act Implicates the First Amendment in Universal City Studios, Inc. V. Reimerdes
    The Freedom to Link?: The Digital Millennium Copyright Act Implicates the First Amendment in Universal City Studios, Inc. v. Reimerdes David A. Petteys* TABLE OF CONTENTS I. IN TRO D U CTIO N .............................................................. 288 II. THE WEB, FREE EXPRESSION, COPYRIGHT, AND THE D M C A .............................................................................. 290 III. THE CASE: UNIVERSAL CITY STUDIOS, INC. V. R EIMERD ES ...................................................................... 293 A . Factual Background ................................................... 294 B . Findings of F act ......................................................... 297 C. The Court's Statutory and Constitutional Analysis ..... 298 1. Statutory A nalysis ................................................ 299 a. Section 1201(a)(1) ............................................ 299 b. Linking to Other Sites with DeCSS .................. 302 2. First Amendment Challenges ................................ 304 a. DMCA Prohibition Against Posting DeCSS .... 305 b. Prior R estraint ................................................ 307 c. The Prohibition on Linking ............................. 309 3. T he R em edy ........................................................ 312 IV . A N A LYSIS ......................................................................... 314 A. The Prohibition Against Posting DeCSS ..................... 314 1. F air U se ............................................................... 314 2. First Amendment
    [Show full text]
  • Handout 5 Summary of This Handout: Stream Ciphers — RC4 — Linear Feedback Shift Registers — CSS — A5/1
    06-20008 Cryptography The University of Birmingham Autumn Semester 2009 School of Computer Science Volker Sorge 30 October, 2009 Handout 5 Summary of this handout: Stream Ciphers — RC4 — Linear Feedback Shift Registers — CSS — A5/1 II.2 Stream Ciphers A stream cipher is a symmetric cipher that encrypts the plaintext units one at a time and that varies the transformation of successive units during the encryption. In practise, the units are typically single bits or bytes. In contrast to a block cipher, which encrypts one block and then starts over again, a stream cipher encrypts plaintext streams continuously and therefore needs to maintain an internal state in order to avoid obvious duplication of encryptions. The main difference between stream ciphers and block ciphers is that stream ciphers have to maintain an internal state, while block ciphers do not. Recall that we have already seen how block ciphers avoid duplication and can also be transformed into stream ciphers via modes of operation. Basic stream ciphers are similar to the OFB and CTR modes for block ciphers in that they produce a continuous keystream, which is used to encipher the plaintext. However, modern stream ciphers are computationally far more efficient and easier to implement in both hard- and software than block ciphers and are therefore preferred in applications where speed really matters, such as in real-time audio and video encryption. Before we look at the technical details how stream ciphers work, we recall the One Time Pad, which we have briefly discussed in Handout 1. The One Time Pad is essentially an unbreakable cipher that depends on the fact that the key 1.
    [Show full text]
  • Digital Rights Management and the Process of Fair Use Timothy K
    University of Cincinnati College of Law University of Cincinnati College of Law Scholarship and Publications Faculty Articles and Other Publications Faculty Scholarship 1-1-2006 Digital Rights Management and the Process of Fair Use Timothy K. Armstrong University of Cincinnati College of Law Follow this and additional works at: http://scholarship.law.uc.edu/fac_pubs Part of the Intellectual Property Commons Recommended Citation Armstrong, Timothy K., "Digital Rights Management and the Process of Fair Use" (2006). Faculty Articles and Other Publications. Paper 146. http://scholarship.law.uc.edu/fac_pubs/146 This Article is brought to you for free and open access by the Faculty Scholarship at University of Cincinnati College of Law Scholarship and Publications. It has been accepted for inclusion in Faculty Articles and Other Publications by an authorized administrator of University of Cincinnati College of Law Scholarship and Publications. For more information, please contact [email protected]. Harvard Journal ofLaw & Technology Volume 20, Number 1 Fall 2006 DIGITAL RIGHTS MANAGEMENT AND THE PROCESS OF FAIR USE Timothy K. Armstrong* TABLE OF CONTENTS I. INTRODUCTION: LEGAL AND TECHNOLOGICAL PROTECTIONS FOR FAIR USE OF COPYRIGHTED WORKS ........................................ 50 II. COPYRIGHT LAW AND/OR DIGITAL RIGHTS MANAGEMENT .......... 56 A. Traditional Copyright: The Normative Baseline ........................ 56 B. Contemporary Copyright: DRM as a "Speedbump" to Slow Mass Infringement ..........................................................
    [Show full text]
  • Senate Gives Obama Christmas Present and Then He Gets Hawaiian
    E-reader News Edition 24/12/09 - 25/12/09 http://www.LibertyNewsprint.com Senate gives Obama Christmas present and then he gets Hawaiian holiday By Tabassum Zakaria (Front Oahu (even some of the Secret forecast for the entire time we’re Row Washington) Service agents on the ground there … Friday it’s 81 and sunny, Christmas Laser Beam Submitted at 12/24/2009 7:58:48 PM were in Hawaiian shirts) and Saturday it’s 81 and sunny. So I Cats Are the Reason everyone in the first family was think that the weather ought to for the Season [Humor] How much better could it get? greeted with the traditional lei lend itself to some outdoor President Barack Obama won a around their necks. activity,” White House By Adam Frucci (Gizmodo) hard-fought victory on his Then it was off to their Kailua spokesman Bill Burton told Submitted at 12/25/2009 6:33:56 AM signature domestic issue — home, past lush green rolling reporters on Air Force One. healthcare reform — first thing in hills, with gawkers stopping “This is an opportunity for the What happens when a couple of the morning with the Senate vote to take pictures, wave, call president to recharge his engineers decide to make a and then he left the frozen tundra someone, flash the “hang loose” batteries, knowing that as Christmas edition of SNL's of Washington, D.C., (we’re sign and essentially give the president you never really get to Lasercats sketch? Some talking about the weather) for the Obamas a warm welcome.
    [Show full text]
  • United States District Court Southern District of New York Universal City Studios, Inc.; Paramount Pictures Corporation; Metro-G
    UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK UNIVERSAL CITY STUDIOS, INC.; PARAMOUNT ) 00 Civ. _____________ PICTURES CORPORATION; METRO-GOLDWYN- ) MAYER STUDIOS INC.; TRISTAR PICTURES, INC.; ) COLUMBIA PICTURES INDUSTRIES, INC.; TIME ) DECLARATION OF FRITZ ATTAWAY WARNER ENTERTAINMENT CO., L.P.; DISNEY ) IN SUPPORT OF PLAINTIFFS’ ENTERPRISES, INC.; AND TWENTIETH ) APPLICATION FOR A PRELIMINARY CENTURY FOX FILM CORPORATION; ) INJUNCTION ) Plaintiffs, ) ) v. ) ) SHAWN C. REIMERDES, ERIC CORLEY A/K/A ) “EMMANUEL GOLDSTEIN” AND ROMAN KAZAN, ) ) Defendants. ) ) ) ) ) ) ) ) 5169/53185-005 NYLIB1/1143931 v3 01/14/00 12:35 AM (10372) Fritz Attaway declares, under penalty of perjury, as follows: I make this declaration based upon my own personal knowledge and my familiarity with the matters recited herein and could and would testify under oath to same, should I be called as a witness before the Court. 1. I am a Senior Vice President for Government Relations and Washington General Counsel of the Motion Picture Association of America (“MPAA”), a not-for-profit trade association, incorporated in New York, representing the motion picture companies that are plaintiffs in this action. The MPAA, among other functions, combats motion picture piracy, an illegal underground industry that steals billions of dollars annually from the creative talents, tradespeople, producers, and copyright owners in the motion picture industry. The MPAA runs a comprehensive anti-piracy program that includes investigative, educational, legislative, and technical efforts in the United States and over 70 other countries. I was personally involved in the process that led to the passage of the Digital Millennium Copyright Act (“DMCA”) and in the negotiations that let to the adoption of the Contents Scramble System (“CSS”) as an industry- wide standard.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • Dcryptology DVD Copy Protection
    Group 4 dCryptology DVD Copy Protection dCryptology DVD Copy Protection By Kasper Kristensen, 20072316 Asger Eriksen, 20073117 Mads Paulsen, 20072890 Page 1 of 22 Group 4 dCryptology DVD Copy Protection Content Scrambling System.................................................................................................................3 The keys............................................................................................................................................4 How it works....................................................................................................................................4 The decryption..................................................................................................................................4 LFSR.................................................................................................................................................5 How is the output used:....................................................................................................................5 Key decryption.................................................................................................................................7 Mutual Authentication:.....................................................................................................................8 CSS ATTACKS:..................................................................................................................................9 Mangling Process.............................................................................................................................9
    [Show full text]
  • Cydia Downloads Icon Not
    cydia downloads icon not app How To Install Cydia without Jailbreak (3 Ways) Here is the tips to how to install cydia without jailbreak 2015 on iOS 5, iOS 6, iOS 7, iOS 7.1.2, iOS 8. iPhone is the most used phone’s in the world and cydia is a cracked app provided in the jailbreak iPhone. if you want to install cydia you need to jailbreak you iPhone it may cause some harmful effect like no network iphone cant started any thing like this if you do this your self. How To Install Cydia without Jailbreak. But Today i gone show you how to install cydia without jailbreak any iPhone which have any ios version like ios iOS 5, iOS 6, iOS 7, iOS 7.1.2, iOS 8 any one you can install cydia in any iphone like iPhone 4, iPhone 4s, iPhone 5, iPhone 5C, iPhone 5S, iPhone 6, iPhone 6plus any on them easily. No need to connect your iPhone with any computer yes you can install cydia without connected your iPhone to computer. you need to follow these method any one which match you just follow me what i ask you to do you will surely install cydia Download in you iPhone without jail break. follow the steps. i will show you all method to install cydia in you iphone. How to install cydia without jailbreak on iOS 5, iOS 6, iOS 7, iOS 7.1.2, iOS 8. #1 Method. First of all you to download a app from app store provided by apple just open app store and find for app vSSH client .
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Oleksandr Superson PHONE APPS in SOCIETY and BUSINESS
    5. https://www.mindtools.com/pages/article/newTMM_92.htm Oleksandr Superson Research supervisor: Bohach Yuriy Candidate of Economic Sciences Language tutor: Iryna Horenko Candidate of Philological Sciences Ternopil National Economic University PHONE APPS IN SOCIETY AND BUSINESS Today, mobile gadgets have taken a huge part of computer work. Users often use phones to work with documents and mail, and often these functions are used by entrepreneurs. Accordingly, with such a high level of use of smartphones and tablets grows and assortment of mobile applications for them. Currently, most mobile devices are sold with an already installed set of mobile apps. Among them: a web browser, an email client, a calendar, an application for the purchase and listening of music, and others. Some pre-installed applications can be removed from the mobile device by the user, using the normal removal process, freeing up more storage space for other (preferred) applications. So, the mobile app is software designed to work on smartphones, tablets, and other mobile devices. Many mobile apps are installed on the device itself or can be downloaded to it from online mobile app stores such as the App Store, Google Play, Windows Phone Store, and more, for free or for a fee. Initially, mobile applications were used for quick e-mail checking, but their high demand led to the expansion of their appointments in other areas, such as games for mobile phones, GPS, communication, video viewing and Internet use. The mobile app market today is very well developed and steadily growing. Practice shows that mobile apps began to appear in 2008, and they are currently in the hands of mobile-operating system owners: Apple App Store, Google Play, Windows Phone Store, and BlackBerry App World.
    [Show full text]
  • Bva Yearbook 2015 Yearbook Bva The
    BVA YB15Full Cover 19/05/2015 14:10 Page 1 B VA Y E A R B O O K 2 0 1 5 THE BVA YEARBOOK 2015 PRICE: £599 iPad and PDF copies available for £999 from www.bva.org.uk British Video Association BVA YB15 Inside Cover 19/05/2015 14:07 Page 1 BVA YB 15 Inner AW 19/05/2015 14:11 Page 1 Contents FEATURES Chairman’s introduction 3 CEO’s foreword 4 Market overview 6 OWNERSHIP Video ownership 10 Consumer behaviour 11 Digital retail 13 DVDs 14 Blu-ray 15 Seasonality 16 Title of the year 18 New release 20 Catalogue 21 Film 22 Children’s 24 TV 26 Music 27 Sport and fitness 29 Special interest 30 RENTAL Rental overview 32 Rental consumer behaviour 33 Rental market share 34 HARDWARE Devices and screens 36 Directory 38 1 BVA YB 15 Inner AW 19/05/2015 14:11 Page 2 © 2015 Warner Bros. Entertainment Inc. All Rights Reserved. BVA YB 15 Inner AW 19/05/2015 14:11 Page 3 FEATURE Chairman’s introduction by Robert Price Chairman, British Video Association When I stepped into the exciting leadership strongly co-exist will be one of the BVA’s key role of BVA Chairman last year it was evident goals this year. As a trade body, we’re adapting that the home entertainment arena is in one and changing to ensure we collectively lead the of the greatest periods of evolution it has ever industry and maintain our resilience in the long seen. term. It’s more important than ever that we collaborate amongst ourselves and work closely As the mix between ownership and rental shifts, with retail partners to ensure we can empower the gap between physical and digital narrows and each other and create prominence both in and customer demand for greater flexibility and out of the entertainment aisles.
    [Show full text]
  • Defending Mobile Applications
    Presented by Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Overview • Layered Security • iOS vs. Android • An Attacker’s Perspective • Best Practices • Resources Philosophy "A Jedi uses to force for knowledge and defense...never for attack.“ - Master Yoda “It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles.” - Also Master Yoda (or maybe Sun Tzu) Layered Security • Four (4) Key Areas • Application • Sandbox • Operating System • Network • Three (3) Types of Mobile Apps • Web (browser-based) • Native • Wrapper • Document the data flow • Data at rest • Data in motion • Integration points Application Security Models iOS Android • Sandboxing (One Folder per App) • Sandboxing (One ID per Package) • Files • Apps start with no permissions • Preferences • <uses-permission> tags in • Network Resources AndroidManifest.xml (for protected features) • Declare and enforce permissions with <permission> tags Image from Dummies.com App Stores • iTunes • Amazon App Store • Annual developer fee ($99) • Annual developer fee ($99) • Developer must provide Apple with • First year waived your SSN • Developer must provide name, email, mailing address, and phone number • Apps must be approved by Apple • Apps must be approved by Amazon • Google Play • Cydia (also, HackStore) • $25 fee per app you submit • App store installed on jailbroken • Developer must provide email, iPhones / iPads / iPods website, and phone number • Cydia = package manager (installs apps from repos) • No one ever abuses
    [Show full text]