Frontmatter Pages

Total Page:16

File Type:pdf, Size:1020Kb

Frontmatter Pages Lecture Notes in Computer Science 2696 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Joan Feigenbaum (Ed.) Digital Rights Management ACM CCS-9 Workshop, DRM 2002 Washington, DC, USA, November 18, 2002 Revised Papers 13 Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editor Joan Feigenbaum Yale University Department of Computer Science P.O. Box 208285, New Haven, CT 06520-8285, USA E-mail: [email protected] Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http://dnb.ddb.de>. CR Subject Classification (1998): E.3, C.2, D.2.0, D.4.6, K.6.5, F.3.2, H.5, J.1, K.4.1 ISSN 0302-9743 ISBN 3-540-40410-4 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH http://www.springer.de © Springer-Verlag Berlin Heidelberg 2003 Printed in Germany Typesetting: Camera-ready by author, data conversion by Olgun Computergrafik Printed on acid-free paper SPIN: 10927984 06/3142 543210 Preface Increasingly, the Internet is used for the distribution of digital goods, includ- ing digital versions of books, articles, music, and images. This new distribution channel is a potential boon to both producers and consumers of digital goods, because vast amounts of material can be made available conveniently and inex- pensively. However, the ease with which digital goods can be copied and redis- tributed makes the Internet well suited for unauthorized copying, modification, and redistribution. Adoption of new technologies such as high-bandwidth con- nections and peer-to-peer networks is currently accelerating both authorized and unauthorized distribution of digital works. In 2001, the ACM initiated an annual series of workshops to address technical, legal, and economic problems posed by the digital distribution of creative works. The 2002 ACM Workshop on Digital Rights Management (DRM 2002), held in Washington, DC on November 18, 2002, was the second in this annual series. This volume contains the papers presented at that very well attended and stimulating workshop. The success of DRM 2002 was the result of excellent work by many people, to whom I am extremely grateful. They include Sushil Jajodia, Charles Youman, and Mary Jo Olsavsky at George Mason University, the members of the Program Committee, my assistant, Judi Paige, and my student Vijay Ramachandran. April 2003 Joan Feigenbaum New Haven, CT, USA Program Chair, DRM 2002 VI Program Committee Yochai Benkler (New York University, Law School) Dan Boneh (Stanford University, Computer Science Dept.) Willms Buhse (Bertelsmann Digital World Services) Joan Feigenbaum (Yale University, Computer Science Dept.) Neil Gandal (Tel Aviv University, Public Policy Dept.) John Manferdelli (Microsoft, Windows Trusted-Platform Technologies) Moni Naor (Weizmann Institute, Computer Science and Applied Math Dept.) Florian Pestoni (IBM, Almaden Research Center) Tomas Sander (Hewlett-Packard Labs) Michael Waidner (IBM, Zurich Research Center) Moti Yung (Columbia University, Computer Science Dept.) Organization DRM 2002 was held in conjunction with the 9th ACM Conference on Computer and Communication Security (CCS-9) and was sponsored by ACM/SIGSAC. Table of Contents ACM DRM 2002 A White-Box DES Implementation for DRM Applications .............. 1 Stanley Chow, Phil Eisen, Harold Johnson (Cloakware Corporation), and Paul C. van Oorschot (Carleton University) Attacking an Obfuscated Cipher by Injecting Faults .................... 16 Matthias Jacob (Princeton University), Dan Boneh (Stanford University), and Edward Felten (Princeton University) Breaking and Repairing Asymmetric Public-Key Traitor Tracing ......... 32 Aggelos Kiayias (University of Connecticut) and Moti Yung (Columbia University) Key Challenges in DRM: An Industry Perspective ...................... 51 Brian A. LaMacchia (Microsoft Corporation) Public Key Broadcast Encryption for Stateless Receivers ................ 61 Yevgeniy Dodis and Nelly Fazio (New York University) Traitor Tracing for Shortened and Corrupted Fingerprints ............... 81 Reihaneh Safavi-Naini and Yejing Wang (University of Wollongong) Evaluating New Copy-Prevention Techniques for Audio CDs .............101 John A. Halderman (Princeton University) Towards Meeting the Privacy Challenge: Adapting DRM ................118 Larry Korba (National Research Council of Canada) and Steve Kenny (Independent Consultant) Implementing Copyright Limitations in Rights Expression Languages .....137 Deirdre Mulligan and Aaron Burstein (University of California) The Darknet and the Future of Content Protection .....................155 Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman (Microsoft Corporation) Replacement Attack on Arbitrary Watermarking Systems ...............177 Darko Kirovski and Fabien A.P. Petitcolas (Microsoft Research) FAIR: Fair Audience InfeRence ......................................190 Rob Johnson (University of California) and Jessica Staddon (Palo Alto Research Center) X Table of Contents Theft-Protected Proprietary Certificates ..............................208 Alexandra Boldyreva (University of California) and Markus Jakobsson (RSA Laboratories) Author Index .................................................221 A White-Box DES Implementation for DRM Applications Stanley Chow1, Phil Eisen1, Harold Johnson1, and Paul C. van Oorschot2 1 Cloakware Corporation, Ottawa, Canada {stanley.chow,phil.eisen,harold.johnson}@cloakware.com 2 School of Computer Science, Carleton University, Ottawa, Canada [email protected] Abstract. For digital rights management (drm) software implementa- tions incorporating cryptography, white-box cryptography (cryptograph- ic implementation designed to withstand the white-box attack context)is more appropriate than traditional black-box cryptography. In the white- box context, the attacker has total visibility into software implementa- tion and execution. Our objective is to prevent extraction of secret keys from the program. We present methods to make such key extraction diffi- cult, with focus on symmetric block ciphers implemented by substitution boxes and linear transformations. A des implementation (useful also for triple-des) is presented as a concrete example. 1 Introduction In typical software digital rights management (drm) implementations, crypto- graphic algorithms are part of the security solution. However, the traditional cryptographic model – employing a strong known algorithm, and relying on the secrecy of the cryptographic key – is inappropriate surprisingly often, since the platforms on which many drm applications execute are subject to the control of a potentially hostile end-user. This is the challenge we seek to address. A traditional threat model used in black-box symmetric-key cryptography is the adaptive chosen plaintext attack model. It assumes the attacker does not know the encryption key, but knows the algorithm, controls the plaintexts en- crypted (their number and content), and has access to the resulting ciphertexts. However, the dynamic encryption operation is hidden – the attacker has no visibility into its execution. We make steps towards providing software cryptographic solutions suitable in the more realistic (for drm applications) white-box attack context: the attacker is assumed to have all the advantages of an adaptive chosen-text attack, plus full access to the encrypting software and control of the execution environment. This includes arbitrary trace execution, examining sub-results and keys in memory, performing arbitrary static analyses on the software, and altering results of sub- computation (e.g. via breakpoints) for perturbation analysis. This research was carried out at Cloakware. J. Feigenbaum (Ed.): DRM 2002, LNCS 2696, pp. 1–15, 2003. c Springer-Verlag Berlin Heidelberg 2003 2 Stanley Chow et al. Our main goal is to make key extraction difficult. While an attacker con- trolling the execution environment can clearly make use of the software itself (e.g. for decryption) without explicitly extracting the key, forcing an attacker to use the installed instance at hand is often of value to drm systems providers. How strong an implementation can be made against white-box threats is unknown. We presently have no security proofs for our methods. Nonetheless, regardless of the security of our particular proposal, we believe the general approach of- fers useful levels of security in the form of additional protection suitable in the commercial world, forcing an attacker to expend
Recommended publications
  • What's the Download® Music Survival Guide
    WHAT’S THE DOWNLOAD® MUSIC SURVIVAL GUIDE Written by: The WTD Interactive Advisory Board Inspired by: Thousands of perspectives from two years of work Dedicated to: Anyone who loves music and wants it to survive *A special thank you to Honorary Board Members Chris Brown, Sway Calloway, Kelly Clarkson, Common, Earth Wind & Fire, Eric Garland, Shirley Halperin, JD Natasha, Mark McGrath, and Kanye West for sharing your time and your minds. Published Oct. 19, 2006 What’s The Download® Interactive Advisory Board: WHO WE ARE Based on research demonstrating the need for a serious examination of the issues facing the music industry in the wake of the rise of illegal downloading, in 2005 The Recording Academy® formed the What’s The Download Interactive Advisory Board (WTDIAB) as part of What’s The Download, a public education campaign created in 2004 that recognizes the lack of dialogue between the music industry and music fans. We are comprised of 12 young adults who were selected from hundreds of applicants by The Recording Academy through a process which consisted of an essay, video application and telephone interview. We come from all over the country, have diverse tastes in music and are joined by Honorary Board Members that include high-profile music creators and industry veterans. Since the launch of our Board at the 47th Annual GRAMMY® Awards, we have been dedicated to discussing issues and finding solutions to the current challenges in the music industry surrounding the digital delivery of music. We have spent the last two years researching these issues and gathering thousands of opinions on issues such as piracy, access to digital music, and file-sharing.
    [Show full text]
  • The California Supreme Court Holds a Preliminary Injunction Prohibiting
    Volume 11 Issue 2 Article 4 2004 Website Operators and Misappropriators Beware - The California Supreme Court Holds a Preliminary Injunction Prohibiting Internet Posting of DVD Decryption Source Code Does Not Violate the First Amendment in DVD Copy Control Association, Inc. v. Bunner Nick Washburn Follow this and additional works at: https://digitalcommons.law.villanova.edu/mslj Part of the Entertainment, Arts, and Sports Law Commons, and the Internet Law Commons Recommended Citation Nick Washburn, Website Operators and Misappropriators Beware - The California Supreme Court Holds a Preliminary Injunction Prohibiting Internet Posting of DVD Decryption Source Code Does Not Violate the First Amendment in DVD Copy Control Association, Inc. v. Bunner, 11 Jeffrey S. Moorad Sports L.J. 341 (2004). Available at: https://digitalcommons.law.villanova.edu/mslj/vol11/iss2/4 This Casenote is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Jeffrey S. Moorad Sports Law Journal by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Washburn: Website Operators and Misappropriators Beware - The California Su WEBSITE OPERATORS AND MISAPPROPRIATORS BEWARE! THE CALIFORNIA SUPREME COURT HOLDS A PRELIMINARY INJUNCTION PROHIBITING INTERNET POSTING OF DVD DECRYPTION SOURCE CODE DOES NOT VIOLATE THE FIRST AMENDMENT IN DVD COPY CONTROL ASSOCIATION, INC. V BUNNER I. INTRODUCTION A. DVDs, CSS, and the Creation of the DVD CCA Digital versatile discs ("DVDs") are small discs capable of hold- ing enough information to display a full-length motion picture which can be played on a personal DVD player.' DVDs were cre- ated in the early 1990s to provide higher visual and audio quality in displaying motion pictures over then existing analog tapes.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • Where Is the Music? Au Id #: 1640352
    WHERE IS THE MUSIC? AN ANALYSIS OF THE RECORDING INDUSTRY MAJOR LABELS ENDURING DIGITAL MEDIA TRANSFORMATION DANIEL GOODRICH AU ID #: 1640352 DECEMBER 10, 2007 DR. ROBERT EDGELL BUSINESS POLICY AND STRATEGY WHERE IS THE MUSIC? - 2 - GOODRICH HONORS CAPSTONE SUPPLEMENT TABLE OF CONTENTS INTRODUCTION 3 THE MUSIC RECORDING INDUSTRY 4 HISTORY OF RECORDING FORMAT TECHNOLOGY 4 THE “MAJORS” 5 FALL OF CD SALES 9 IMPACT OF DIGITAL MUSIC 12 DIFFERING VIEWS ON DIGITAL RIGHTS MANAGEMENT 14 DRM APPLICATIONS 15 THOUGHTS ON MUSIC 16 OTHER IDEAS 18 TAKING THE MUSIC INTO THEIR OWN HANDS 19 INDUSTRY ANALYSIS 22 VALUE CHAIN ANALYSIS 22 RECOMMENDATIONS 23 CONCLUSION 25 APPENDICES 26 GRAPH 1 26 GRAPH 2 26 GRAPH 3 27 GRAPH 4 27 GRAPH 5 28 GRAPH 6 28 GRAPH 7 29 TABLE 1 30 TABLE 2 31 TABLE 3 32 WORKS CITED 33 WHERE IS THE MUSIC? - 3 - GOODRICH INTRODUCTION Some consider it a universal language that has no limitations. Some are born with a rhythm and grow alongside it. Some hear it in nature. Some devote their lives to studying it, others creating it and delivering it to the world. Some have it embedded within their souls and know that they could not be complete without it. For these individuals, music is the lifeblood of their being. Whether passionate about music, simply a fan, or even incapable of tolerating the sound of a drum, there is something unbelievable about music that seems to spark a change in people; it has the power to evoke every type of emotion. Those within the music recording industry understand this power, and continually search for the best possible and most profitable way to deliver this unique media to the world.
    [Show full text]
  • Digital Rights Management
    Journal of Intellectual Property Rights Vol 9, July 2004, pp 313-331 Digital Rights Management: An Integrated Secure Digital Content Distribution Technology P Ghatak, R C Tripathi, A K Chakravarti Department of Information Technology, Electronics Niketan, 6, CGO Complex, New Delhi-110 003 Received 5 December 2003 The ability to distribute copyrighted works in digital form through high capacity prere- corded disks (CD ROMs, DVDs etc.) and Internet-enabled transmissions have brought new challenges to the protections of such content from unauthorized copying and use. Technological advancements in this regard are reviewed. Despite the ease with which digital content owners can now transfer data, images, music, video and multimedia documents across the Internet, cur- rent technology does not let them protect their rights to the works, which has resulted into wide- spread music and video piracy. In fact, although the Internet permits widespread dissemination of digital content, the easy-to-copy nature of digital data limits content owners’ willingness to distribute their documents electronically. Digital Rights Management (DRM) technology is a key enabler for the distribution of digital content. DRM refers to protecting ownership/copyright of electronic content by restricting the extent of usage an authorized recipient is allowed in re- gard to that content. DRM technology has historically been viewed as the methodology for the protection of digital media copyrights. But DRM technology products can be leveraged to ad- dress much larger issues, including the control of rights and usage permissions of content and digital information. DRM presents the opportunity to package, price, distribute and sell content in many new ways that have never been possible before.
    [Show full text]
  • The Times They Are A-Changin' IP Strategies in the Music Industry
    Research Collection Report The times they are a-changin' IP strategies in the music industry Author(s): Krieger, Michael J. Publication Date: 2008 Permanent Link: https://doi.org/10.3929/ethz-a-006246865 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library MAS-IP Diploma Papers & Research Reports Year 2008 Paper 35 The Times They Are A-Changin': IP Strategies in the Music Industry Michael J. Krieger ETH Z¨urich This working paper site is hosted by The Berkeley Electronic Press (bepress). http://www.bepress.com/ndsip/papers/art35 Copyright c 2008 by the author. The Times They Are A-Changin': IP Strategies in the Music Industry Abstract IP strategies in the music industry is a complex matter. There are four iden- tifiable factors that result in a highly dynamic environment where IP strategies change constantly. The four factors, the recording industry, the consumers, new emerging technology and the law depend and influence each other. Look- ing from a historical viewpoint at IP strategies in the music industry shows us that many issues did not arise only recently but are a phenomenon that traces back to the first sound recording devices. The wide-spread of digital music has revolutionized the music business. The traditional business model based on sales of CDs in retails stores seems to falter. The music industry is blam- ing mainly illegal downloads for the decline in revenues, however independent research points to the changing economy in the digital age and the industries' lack of flexibility to adapt to the new economy in the digital age.
    [Show full text]
  • Content Protection Technologies for Consumer Equipments
    CONTENT PROTECTION TECHNOLOGIES FOR CONSUMER EQUIPMENTS Serkan EMEK [email protected] DigiTurk, Digital Platform İletişim Hizmetleri A.Ş., 34353, Beşiktaş, İstanbul YTÜ FBE Elektronik ve Haberleşme Müh., Haberleşme Doktora Programı , Yıldız, İstanbul ABSTRACT unauthorized reproduction and distribution only in a digital environment. If protected digital content is Digital piracy is most important problem for multimedia converted to analog format these content protection services because of tremendous development of new IT mechanisms are eliminated or reduced. This presents a technologies. There is no one solution to the challenge of problem in that digital devices can capture and digitize digital piracy. There is today a robust and growing unprotected analog signals with complete disregard for market for content protection systems, and a number of current copy protection mechanisms, thus enabling a technologies have been developed and implemented, or major source of unauthorized duplication and/or are available for implementation.. In this work, we give a redistribution. Such analog to digital conversions are easy brief about current copy protection technology and to accomplish with the use of widely available, effects of technology for consumer equipments as well as inexpensive PC technology and other digital recording new STBs, DVRs, PVRs, DVD players and recorders, devices with analog inputs. VCRs, DV Camcoders. 2.1. WATERMARKING 1. INTRODUCTION The primary means to address the analog hole is via The success of the Internet, cost-effective and popular embedded watermarks Watermarking is a type of Copy digital recording, storage a and player devices, and the Control Information (CCI) marking system. These promise of higher bandwidth and quality of services for systems allow usage rules to be conveyed with the both wired and wireless networks have made it possible content.
    [Show full text]
  • The Impossibility of Technology-Based Drm and a Modest Suggestion
    040 BLACK 04 9/18/2006 4:32 PM THE IMPOSSIBILITY OF TECHNOLOGY-BASED DRM AND A MODEST SUGGESTION JOHN BLACK∗ INTRODUCTION When I was a teenager in the late 1970’s, there was no World-Wide Web, no Internet, and no IBM PC. But I, along with a small group of friends, became obsessed with computers: the TRS-80 and the Apple were the targets of our passion. Each time a new computer game was announced, we awaited its release with great anticipation: not because we wanted to kill the dragon or get to level 37, but because we wanted to see how hard it was this time to remove the copy protection from the software. In those early days of personal computing, game manufacturers made perhaps one million dollars per year, and there were only a handful of companies. Few had ever heard of Microsoft, and there were no such things as CD burners or high-speed networks. So trying to control illegal copying (or “pirating” as it was already called back then) was a concern limited to just a few small companies. Today there are software companies with tens of billions of dollars in gross revenues, each with a strong vested interest in overseeing the legal distribution of their products. Additionally, media companies (in particular, music and film producers and distributors) continue their fight to control illegal distribution of their content, especially now in the presence of the $50 CD burner. To address these problems, media companies have turned to technology such as Digital Rights Management (DRM) to prevent copying and enforce protection of copyright.
    [Show full text]
  • Compact Disc Copy Protection
    Compact Disc Copy Protection Matthew Territo December 11, 2003 1 Abstract Sometimes, preventative measures can go so far that rather than protect e®ectively, they inhibit daily life. How e®ective are today's CD copy protection schemes in this context? In my research I analyze their sensibility not only from a technical aspect, but a social one as well. The paper looks at old schemes, compares them to the new schemes, and details how much of a success each scheme is along these terms. Keywords: e®ectiveness, copy protection, usability 1 Introduction Modern societies tend to take many things for granted. On a basic level, we expect that clean, running water flows to every building; that electricity is a given; that food will always be available. We also tend to make assumptions about some creature comforts as well: the climate of our homes will be well isolated from nature; drugstores will be open twenty-four hours, seven days a week; cellular telephones and the Internet are ubiquitously distributed. While some of these demands stretch the boundaries of what should be required in a functioning society of the 21st century, they illustrate the point that people like to be able to count on things. And why shouldn't they be able to do so? After all, the point of society is to structure human life into a way that promotes certainties and guaranties. Forms of government protect the rights to property and life. Cultures create typical lifestyles that individuals can choose to take part in, feeling con¯dent that the culture will maintain the expectations they have of it.
    [Show full text]
  • The “Agreement
    DFAST TECHNOLOGY LICENSE AGREEMENT FOR UNIDIRECTIONAL DIGITAL CABLE PRODUCTS Jan 2014 THIS LICENSE AGREEMENT (the “Agreement”) is made as of (the “Effective Date”), by and between , having a place of business at (“Licensee”), and CABLE TELEVISION LABORATORIES, INC., having a place of business at 858 Coal Creek Circle, Louisville, Colorado, USA 80027-9750 (“CableLabs”). WHEREAS, CableLabs is a research and development company funded by the cable television industry; WHEREAS, CableLabs has acquired the rights to the DFAST scrambling technology, portions of which are embodied in a U.S. patent; WHEREAS, Licensee is in the business of, among other things, designing, developing, manufacturing and distributing products related to digital television; and WHEREAS, this Agreement provides a right to use the DFAST scrambling technology; NOW, THEREFORE, in consideration of the foregoing and of the mutual covenants and agreements set forth herein, the parties hereby agree as follows: 1. DEFINITIONS. In addition to terms defined elsewhere in this Agreement, the following terms shall have the following meanings. All definitions herein shall apply equally to their singular and plural forms, all pronouns shall apply without regard to gender, and all references to Sections and Exhibits shall be deemed to be references to Sections of, and Exhibit to, this Agreement unless the context shall otherwise require. 1.1 “Cable Operator” means any cable operator that CableLabs identifies on its <www.cablelabs.com> website as a member and any other cable operator that provides POD Modules to customers in connection with the provision of cable services in North America. 1.2 “Compliance Rules” mean the rules described in Exhibit B hereto, as such rules may be amended from time to time pursuant to Section 6.2.
    [Show full text]
  • The Internet Meets Obi-Wan Kenobi in the Court of Next Resort
    ARTICLE BEYOND NAPSTER: USING ANTITRUST LAW TO ADVANCE AND ENHANCE ONLINE MUSIC DISTRIBUTION * H I MATTHEW FAGIN, FRANK PASQUALE, & KIM WEATHERALL INTRODUCTION...................................................................................................... I. BACKGROUND................................................................................................ A. The Nature and Significance of the Technology ............................... 1. A Brief Recent History of Unauthorized Online Music Distribution and Its Threat to Copyright Owner’s Interests......... 2. Music Distribution Online: The Authorized Biography ............ 3. Is There Something Wrong with This Picture? Non- Copyright Legal Developments ................................................... B. Copyright Law And Digital Music Distribution: The Institutions ......................................................................................... 1. Who are the Stakeholders?......................................................... 2. Who are the institutions involved in making copyright law and policy? ............................................................................ a. International Institutions ..................................................... b. Executive and Legislature.................................................... c. Administrative Agencies....................................................... d. Courts .................................................................................. e. Private Institutions..............................................................
    [Show full text]
  • Legal Issues Affecting Creation and Implementation of DRM Systems
    Legal Issues Affecting Creation And Implementation Of DRM Systems Gabriel M. Ramsey, Esq. Orrick, Herrington & Sutcliffe LLP I. INTRODUCTION Since the late 1990s, DRM systems have become increasingly prevalent in the videogame industry. With annual losses in the billions due to videogame piracy, DRM is potentially an important component of the solution. However, the place of DRM in the world of digital content has been highly contested. Thus, concomitantly with the increased attention to DRM in recent years, a substantial body of law has developed out of the conflict around these technologies as well. It is important for those tasked with selecting, implementing or managing DRM systems to understand the implications of the law in this area, in order to ensure the strongest protection and the least legal exposure. Here we explore two different legal topics pertinent to assessing DRM technologies. First, we consider how legal developments concerning the Digital Millennium Copyright Act (“DMCA”) affect the level of protection afforded by different types of DRM systems. Second, we address the potential for legal exposure from lawsuits by users claiming damage related to the implementation of DRM technology. II. SELECTING A STRONG DRM SYSTEM UNDER THE DMCA A. Background: The DMCA’s “Anti-circumvention” Provisions In 1998, the DMCA was passed, prohibiting circumvention of “technological protection measures” which control copying and access to copyrighted content.1 In other words, the DMCA acts as a legal mechanism to enforce DRM systems. If a content owner implements DRM technology limiting the use of its content, and someone hacks the system in order to make unauthorized use of the content, that person may be liable under the DMCA.
    [Show full text]