CD/DVD Copy Protection

Total Page:16

File Type:pdf, Size:1020Kb

CD/DVD Copy Protection CD/DVD Copy Protection Tim G¨uneysu 02/12/2004 Advanced Seminar for ITS Ruhr-Universit¨at Bochum Chair for Communication Security Advisor: Andre´ Weimerskirch Contents 1. Introduction 1 2. Specifying the Medium 2 2.1.CharacteristicsofanOpticalDataMedium............. 2 2.2.CDSpecifications........................... 3 2.2.1.RedBook........................... 4 2.2.2.YellowBook.......................... 4 2.3.DVDSpecifications.......................... 5 2.3.1.DVD-ROM.......................... 6 2.3.2.DVD-Video.......................... 6 3. Copy Protection in Theory 8 3.1.TargetApplicationsandBusinessAreas............... 8 3.2.ClassificationofProtections..................... 8 3.2.1.AbusingtheMediumSpecification............. 9 3.2.2.InjectingReadErrorsIntentionally............. 10 3.2.3.VerificationoftheOriginal.................. 10 3.2.4.DigitalSignaturesandCryptography............ 10 4. Protection Implementations 11 4.1.ProtectingDataonCD-ROMs.................... 11 4.1.1.SuitableApproachesforDataProtection.......... 11 4.1.2.ImplementationsprovidingDataProtection........ 11 4.1.3. Efficiency of recent Data Protection Mechanisms . .... 14 4.2.ProtectingAudioContentonCD-DAs............... 14 4.2.1.SuitableApproachesforAudioProtection......... 15 4.2.2.ImplementationsprovidingAudioProtection........ 15 4.2.3. Efficiency of recent Audio Protection Mechanisms . .... 15 4.3.ProtectingDataonDVD-ROMs................... 17 4.3.1.SuitableApproachesforDataProtection.......... 17 4.3.2.ImplementationsprovidingDataProtection........ 17 4.3.3. Efficiency of recent Data Protections ............ 17 4.4.ProtectingVideoContentonDVD-VideoDisks.......... 18 ii Contents 4.4.1.SuitableApproachesforVideoProtection......... 18 4.4.2.ImplementationsprovidingVideoProtection........ 18 4.4.3. Efficiency of recent Video Protection Implementations . 18 5. Legal Aspects 20 5.1.DigitalRightsProtectioninGermany................ 20 5.2.CircumventingCopyProtections................... 20 6. Conclusions 21 A. Appendix 22 A.1.ListingofCDProtections...................... 22 A.2.ListingofCD&DVDProtections.................. 28 1. Introduction This paper was written for the advanced seminar ”CD and DVD Copy protection” accomplished during the author’s ITS master studies at the Ruhr-Universit¨at Bochum. It represents an overview about mechanisms, technologies, and available implementations for protecting optical media discs as a widespread commodity against further and uncontrolled replication. It will further outline options how to circumvent and deactivate copy protections of optical media - but of course without giving details. This report definitely refuses to be considered as some sort of a hacker’s guide to rip contents illegally from Compact Disks (CD) and Digital Versatile Disks (DVD). As a first step in the jungle of protection systems, this paper will commence to classify and assess the operation and performance of several copy protection schemes. But to do so, it is required to start with introducing the reader to the limi- tations and specification of the considered media. This information will barely be necessary for understanding the different variants of hardware based copy pro- tections. The next topic is dedicated to available protections suitable for preventing a CD from being duplicated without authorization. This chapter will also dis- cuss diverse implementation approaches to assess their means and effectiveness. This includes a presentation of ways how to break inefficient CD based protec- tion mechanisms. To accommodate with the different options for CD contents like data and audio, an evaluation will be performed separately of both content types. Accordingly, the DVD as second medium is analyzed using same criteria as al- ready determined for CD evaluation. As a last important fact, the legal aspects of making copies of protected and unprotected media and the employment and development of tools to support this action is highlighted in a separate chapter. The discussion of regulations in pub- lic laws will give a clue if authors and originators of content and software will receive backup support by a country’s legislative. For simplicity, this part will only relate to German laws. Finally, the employment of copy protections for optical media will be discussed as a whole in respect to options what needs to be improved and if it makes sense to ship products with copy protections. 2. Specifying the Medium 2.1. Characteristics of an Optical Data Medium It is evident to have a closer look onto the medium itself. This basic information will help to get a more thorough understanding of protection mechanisms and their technical operation. Both, the Compact Disks (CD) and Digital Versatile Disks (DVD) are disks with normally 12 cm diameter and 1.2 mm thickness. In common, the physical body of such an optical medium is called dye. The disk dye itself comprises a sandwich of a polycarbonate substrate containing pits molded into the upper surface and coated with aluminum. This layer is then protected by a lacquer on which the disk label is printed. The dye for CDs and DVDs measures 15mm diameter centric hole. The audio or computer data is stored between two disk circles of 25 mm (after the lead-in) and 58 mm maximum where the lead-out starts. The basic layout of a CD/DVD/ is depicted in Figure 2.1. Data on an optical disk media is stored using two states Figure 2.1.: CD/DVD Layout which are represented on the surface, the so called pits and lands [Ser02a]. A laser beam is required to focus on the data lane consisting of pits and lands through the clear optical grade polycarbonate plastic. 2.2 CD Specifications 3 The data on the disk is divided into three main areas: • Lead-in (from 23 mm to 25 mm on disk) which contains digital silence in the main channel plus the Table of Contents (TOC) in a subcode Q-channel. It also allows the laser pickup head to follow the pits and to synchronize to the audio or computer data before the start of the program area. The length of the lead-in is determined by the need to store the Table of Contents for up to 99 tracks. A track is a data segment which is placed in one sequence on the disk and represents a logical data group. • Program area (from 25 mm to at most 58 mm) contains up to about 80 minutes or 700 MB of data divided into a maximum of 99 tracks. • Lead-out contains digital silence or zero data. This defines the end of the CD program area. 2.2. CD Specifications On a CD the data is stored in a helix of pits and lands where pits are about 0.12 microns deep and their length varies from 0.8 microns minimum (3 units in length) to 3 microns maximum (11 units in length) depending on the data. The laser which will read out the bits represented by pits and lands operates on a wave length of 780 nm [Ser02a]. The data is arranged in sectors which are the smallest addressable unit for a CD-ROM device operating according to Yellow Book specification. Each sector itself is composed out of 98 frames which build a subunit containing basic data segments like a laser synchronization area, a set of subchannels or control code, 24 bytes of data payload and an error correction code. Frames are intricately interleaved so that damage to the disk will not destroy any single frame, but only small parts of many frames [Sto00]. An important role for copy protection systems is due to the subchannels. They are defined as eight separate one bit channels, each designated by a character from P to W. The subchannels are important for defining the Lead-In, Lead-Out and Track areas of a disk (P-Channel) as well the complete TOC or the remaining time index (Q-Channel). It should be annotated that not all subchannels are in use (R-W are usually empty for most formats). After having shortly discussed the physics of the disk dye, it is evident to highlight the logical disk structure next. Several different formats for arranging data on CDs have been defined. Those ”books” of the Compact Disk family were named for the color of the binder covers in which the specification was issued. Red Book is the specification for CD Audio, Yellow Book is CD-ROM, Orange Book is CD Recordable, Green Book is CD interactive (CD-i), Blue Book is Enhanced CD, and White Book is Video CD. All of these books are based on the Red 4 Specifying the Medium Book physical disk specification, but some also define the types of content the disk may contain, such as 44.1 MHz PCM audio for Red Book, and MPEG 1 video for White Book. Other disk formats, such as Mixed Mode or HFS, do not have books, but are logical variations of one or more of the book formats. For example, the Yellow Book defines CD-ROM as far as the physical characteristics of the disk, addressing schemes, and error correction are concerned, but the file system and type of content can be user defined. A Yellow Book disk could use the HFS file system, the ISO 9660 file system, or a user-defined file system, and could contain text, raw data, or multimedia elements. As copy protections are usually only deployed on Red and Yellow Book CDs, those standards will be subject of investigation in the following. 2.2.1. Red Book The Red Book, which defines CD-Audio, is the compact disk pioneer. The CD was created, after all, to be nothing more or less than a universal delivery medium for one type of content only, namely music digitized at 44,100 samples per second (44.1KHz) in a range of 65,536 possible discrete values (16 bits). The resulting logical format, the Red Book, or Compact Disc-Digital Audio (CD-DA), was defined by Philips N.V. and Sony Corporation in 1980. Data on an audio disk is organized into frames in order to ensure a constant read rate. Each frame consists of 24 bytes of user data, plus synchronization, error correction, and control and display bits. One of the first crucial things to understand about CD-Audio is that its data is not arranged in distinct physical units.
Recommended publications
  • What's the Download® Music Survival Guide
    WHAT’S THE DOWNLOAD® MUSIC SURVIVAL GUIDE Written by: The WTD Interactive Advisory Board Inspired by: Thousands of perspectives from two years of work Dedicated to: Anyone who loves music and wants it to survive *A special thank you to Honorary Board Members Chris Brown, Sway Calloway, Kelly Clarkson, Common, Earth Wind & Fire, Eric Garland, Shirley Halperin, JD Natasha, Mark McGrath, and Kanye West for sharing your time and your minds. Published Oct. 19, 2006 What’s The Download® Interactive Advisory Board: WHO WE ARE Based on research demonstrating the need for a serious examination of the issues facing the music industry in the wake of the rise of illegal downloading, in 2005 The Recording Academy® formed the What’s The Download Interactive Advisory Board (WTDIAB) as part of What’s The Download, a public education campaign created in 2004 that recognizes the lack of dialogue between the music industry and music fans. We are comprised of 12 young adults who were selected from hundreds of applicants by The Recording Academy through a process which consisted of an essay, video application and telephone interview. We come from all over the country, have diverse tastes in music and are joined by Honorary Board Members that include high-profile music creators and industry veterans. Since the launch of our Board at the 47th Annual GRAMMY® Awards, we have been dedicated to discussing issues and finding solutions to the current challenges in the music industry surrounding the digital delivery of music. We have spent the last two years researching these issues and gathering thousands of opinions on issues such as piracy, access to digital music, and file-sharing.
    [Show full text]
  • The California Supreme Court Holds a Preliminary Injunction Prohibiting
    Volume 11 Issue 2 Article 4 2004 Website Operators and Misappropriators Beware - The California Supreme Court Holds a Preliminary Injunction Prohibiting Internet Posting of DVD Decryption Source Code Does Not Violate the First Amendment in DVD Copy Control Association, Inc. v. Bunner Nick Washburn Follow this and additional works at: https://digitalcommons.law.villanova.edu/mslj Part of the Entertainment, Arts, and Sports Law Commons, and the Internet Law Commons Recommended Citation Nick Washburn, Website Operators and Misappropriators Beware - The California Supreme Court Holds a Preliminary Injunction Prohibiting Internet Posting of DVD Decryption Source Code Does Not Violate the First Amendment in DVD Copy Control Association, Inc. v. Bunner, 11 Jeffrey S. Moorad Sports L.J. 341 (2004). Available at: https://digitalcommons.law.villanova.edu/mslj/vol11/iss2/4 This Casenote is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Jeffrey S. Moorad Sports Law Journal by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Washburn: Website Operators and Misappropriators Beware - The California Su WEBSITE OPERATORS AND MISAPPROPRIATORS BEWARE! THE CALIFORNIA SUPREME COURT HOLDS A PRELIMINARY INJUNCTION PROHIBITING INTERNET POSTING OF DVD DECRYPTION SOURCE CODE DOES NOT VIOLATE THE FIRST AMENDMENT IN DVD COPY CONTROL ASSOCIATION, INC. V BUNNER I. INTRODUCTION A. DVDs, CSS, and the Creation of the DVD CCA Digital versatile discs ("DVDs") are small discs capable of hold- ing enough information to display a full-length motion picture which can be played on a personal DVD player.' DVDs were cre- ated in the early 1990s to provide higher visual and audio quality in displaying motion pictures over then existing analog tapes.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • Where Is the Music? Au Id #: 1640352
    WHERE IS THE MUSIC? AN ANALYSIS OF THE RECORDING INDUSTRY MAJOR LABELS ENDURING DIGITAL MEDIA TRANSFORMATION DANIEL GOODRICH AU ID #: 1640352 DECEMBER 10, 2007 DR. ROBERT EDGELL BUSINESS POLICY AND STRATEGY WHERE IS THE MUSIC? - 2 - GOODRICH HONORS CAPSTONE SUPPLEMENT TABLE OF CONTENTS INTRODUCTION 3 THE MUSIC RECORDING INDUSTRY 4 HISTORY OF RECORDING FORMAT TECHNOLOGY 4 THE “MAJORS” 5 FALL OF CD SALES 9 IMPACT OF DIGITAL MUSIC 12 DIFFERING VIEWS ON DIGITAL RIGHTS MANAGEMENT 14 DRM APPLICATIONS 15 THOUGHTS ON MUSIC 16 OTHER IDEAS 18 TAKING THE MUSIC INTO THEIR OWN HANDS 19 INDUSTRY ANALYSIS 22 VALUE CHAIN ANALYSIS 22 RECOMMENDATIONS 23 CONCLUSION 25 APPENDICES 26 GRAPH 1 26 GRAPH 2 26 GRAPH 3 27 GRAPH 4 27 GRAPH 5 28 GRAPH 6 28 GRAPH 7 29 TABLE 1 30 TABLE 2 31 TABLE 3 32 WORKS CITED 33 WHERE IS THE MUSIC? - 3 - GOODRICH INTRODUCTION Some consider it a universal language that has no limitations. Some are born with a rhythm and grow alongside it. Some hear it in nature. Some devote their lives to studying it, others creating it and delivering it to the world. Some have it embedded within their souls and know that they could not be complete without it. For these individuals, music is the lifeblood of their being. Whether passionate about music, simply a fan, or even incapable of tolerating the sound of a drum, there is something unbelievable about music that seems to spark a change in people; it has the power to evoke every type of emotion. Those within the music recording industry understand this power, and continually search for the best possible and most profitable way to deliver this unique media to the world.
    [Show full text]
  • Digital Rights Management
    Journal of Intellectual Property Rights Vol 9, July 2004, pp 313-331 Digital Rights Management: An Integrated Secure Digital Content Distribution Technology P Ghatak, R C Tripathi, A K Chakravarti Department of Information Technology, Electronics Niketan, 6, CGO Complex, New Delhi-110 003 Received 5 December 2003 The ability to distribute copyrighted works in digital form through high capacity prere- corded disks (CD ROMs, DVDs etc.) and Internet-enabled transmissions have brought new challenges to the protections of such content from unauthorized copying and use. Technological advancements in this regard are reviewed. Despite the ease with which digital content owners can now transfer data, images, music, video and multimedia documents across the Internet, cur- rent technology does not let them protect their rights to the works, which has resulted into wide- spread music and video piracy. In fact, although the Internet permits widespread dissemination of digital content, the easy-to-copy nature of digital data limits content owners’ willingness to distribute their documents electronically. Digital Rights Management (DRM) technology is a key enabler for the distribution of digital content. DRM refers to protecting ownership/copyright of electronic content by restricting the extent of usage an authorized recipient is allowed in re- gard to that content. DRM technology has historically been viewed as the methodology for the protection of digital media copyrights. But DRM technology products can be leveraged to ad- dress much larger issues, including the control of rights and usage permissions of content and digital information. DRM presents the opportunity to package, price, distribute and sell content in many new ways that have never been possible before.
    [Show full text]
  • The Times They Are A-Changin' IP Strategies in the Music Industry
    Research Collection Report The times they are a-changin' IP strategies in the music industry Author(s): Krieger, Michael J. Publication Date: 2008 Permanent Link: https://doi.org/10.3929/ethz-a-006246865 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library MAS-IP Diploma Papers & Research Reports Year 2008 Paper 35 The Times They Are A-Changin': IP Strategies in the Music Industry Michael J. Krieger ETH Z¨urich This working paper site is hosted by The Berkeley Electronic Press (bepress). http://www.bepress.com/ndsip/papers/art35 Copyright c 2008 by the author. The Times They Are A-Changin': IP Strategies in the Music Industry Abstract IP strategies in the music industry is a complex matter. There are four iden- tifiable factors that result in a highly dynamic environment where IP strategies change constantly. The four factors, the recording industry, the consumers, new emerging technology and the law depend and influence each other. Look- ing from a historical viewpoint at IP strategies in the music industry shows us that many issues did not arise only recently but are a phenomenon that traces back to the first sound recording devices. The wide-spread of digital music has revolutionized the music business. The traditional business model based on sales of CDs in retails stores seems to falter. The music industry is blam- ing mainly illegal downloads for the decline in revenues, however independent research points to the changing economy in the digital age and the industries' lack of flexibility to adapt to the new economy in the digital age.
    [Show full text]
  • Content Protection Technologies for Consumer Equipments
    CONTENT PROTECTION TECHNOLOGIES FOR CONSUMER EQUIPMENTS Serkan EMEK [email protected] DigiTurk, Digital Platform İletişim Hizmetleri A.Ş., 34353, Beşiktaş, İstanbul YTÜ FBE Elektronik ve Haberleşme Müh., Haberleşme Doktora Programı , Yıldız, İstanbul ABSTRACT unauthorized reproduction and distribution only in a digital environment. If protected digital content is Digital piracy is most important problem for multimedia converted to analog format these content protection services because of tremendous development of new IT mechanisms are eliminated or reduced. This presents a technologies. There is no one solution to the challenge of problem in that digital devices can capture and digitize digital piracy. There is today a robust and growing unprotected analog signals with complete disregard for market for content protection systems, and a number of current copy protection mechanisms, thus enabling a technologies have been developed and implemented, or major source of unauthorized duplication and/or are available for implementation.. In this work, we give a redistribution. Such analog to digital conversions are easy brief about current copy protection technology and to accomplish with the use of widely available, effects of technology for consumer equipments as well as inexpensive PC technology and other digital recording new STBs, DVRs, PVRs, DVD players and recorders, devices with analog inputs. VCRs, DV Camcoders. 2.1. WATERMARKING 1. INTRODUCTION The primary means to address the analog hole is via The success of the Internet, cost-effective and popular embedded watermarks Watermarking is a type of Copy digital recording, storage a and player devices, and the Control Information (CCI) marking system. These promise of higher bandwidth and quality of services for systems allow usage rules to be conveyed with the both wired and wireless networks have made it possible content.
    [Show full text]
  • The Impossibility of Technology-Based Drm and a Modest Suggestion
    040 BLACK 04 9/18/2006 4:32 PM THE IMPOSSIBILITY OF TECHNOLOGY-BASED DRM AND A MODEST SUGGESTION JOHN BLACK∗ INTRODUCTION When I was a teenager in the late 1970’s, there was no World-Wide Web, no Internet, and no IBM PC. But I, along with a small group of friends, became obsessed with computers: the TRS-80 and the Apple were the targets of our passion. Each time a new computer game was announced, we awaited its release with great anticipation: not because we wanted to kill the dragon or get to level 37, but because we wanted to see how hard it was this time to remove the copy protection from the software. In those early days of personal computing, game manufacturers made perhaps one million dollars per year, and there were only a handful of companies. Few had ever heard of Microsoft, and there were no such things as CD burners or high-speed networks. So trying to control illegal copying (or “pirating” as it was already called back then) was a concern limited to just a few small companies. Today there are software companies with tens of billions of dollars in gross revenues, each with a strong vested interest in overseeing the legal distribution of their products. Additionally, media companies (in particular, music and film producers and distributors) continue their fight to control illegal distribution of their content, especially now in the presence of the $50 CD burner. To address these problems, media companies have turned to technology such as Digital Rights Management (DRM) to prevent copying and enforce protection of copyright.
    [Show full text]
  • Compact Disc Copy Protection
    Compact Disc Copy Protection Matthew Territo December 11, 2003 1 Abstract Sometimes, preventative measures can go so far that rather than protect e®ectively, they inhibit daily life. How e®ective are today's CD copy protection schemes in this context? In my research I analyze their sensibility not only from a technical aspect, but a social one as well. The paper looks at old schemes, compares them to the new schemes, and details how much of a success each scheme is along these terms. Keywords: e®ectiveness, copy protection, usability 1 Introduction Modern societies tend to take many things for granted. On a basic level, we expect that clean, running water flows to every building; that electricity is a given; that food will always be available. We also tend to make assumptions about some creature comforts as well: the climate of our homes will be well isolated from nature; drugstores will be open twenty-four hours, seven days a week; cellular telephones and the Internet are ubiquitously distributed. While some of these demands stretch the boundaries of what should be required in a functioning society of the 21st century, they illustrate the point that people like to be able to count on things. And why shouldn't they be able to do so? After all, the point of society is to structure human life into a way that promotes certainties and guaranties. Forms of government protect the rights to property and life. Cultures create typical lifestyles that individuals can choose to take part in, feeling con¯dent that the culture will maintain the expectations they have of it.
    [Show full text]
  • The “Agreement
    DFAST TECHNOLOGY LICENSE AGREEMENT FOR UNIDIRECTIONAL DIGITAL CABLE PRODUCTS Jan 2014 THIS LICENSE AGREEMENT (the “Agreement”) is made as of (the “Effective Date”), by and between , having a place of business at (“Licensee”), and CABLE TELEVISION LABORATORIES, INC., having a place of business at 858 Coal Creek Circle, Louisville, Colorado, USA 80027-9750 (“CableLabs”). WHEREAS, CableLabs is a research and development company funded by the cable television industry; WHEREAS, CableLabs has acquired the rights to the DFAST scrambling technology, portions of which are embodied in a U.S. patent; WHEREAS, Licensee is in the business of, among other things, designing, developing, manufacturing and distributing products related to digital television; and WHEREAS, this Agreement provides a right to use the DFAST scrambling technology; NOW, THEREFORE, in consideration of the foregoing and of the mutual covenants and agreements set forth herein, the parties hereby agree as follows: 1. DEFINITIONS. In addition to terms defined elsewhere in this Agreement, the following terms shall have the following meanings. All definitions herein shall apply equally to their singular and plural forms, all pronouns shall apply without regard to gender, and all references to Sections and Exhibits shall be deemed to be references to Sections of, and Exhibit to, this Agreement unless the context shall otherwise require. 1.1 “Cable Operator” means any cable operator that CableLabs identifies on its <www.cablelabs.com> website as a member and any other cable operator that provides POD Modules to customers in connection with the provision of cable services in North America. 1.2 “Compliance Rules” mean the rules described in Exhibit B hereto, as such rules may be amended from time to time pursuant to Section 6.2.
    [Show full text]
  • The Internet Meets Obi-Wan Kenobi in the Court of Next Resort
    ARTICLE BEYOND NAPSTER: USING ANTITRUST LAW TO ADVANCE AND ENHANCE ONLINE MUSIC DISTRIBUTION * H I MATTHEW FAGIN, FRANK PASQUALE, & KIM WEATHERALL INTRODUCTION...................................................................................................... I. BACKGROUND................................................................................................ A. The Nature and Significance of the Technology ............................... 1. A Brief Recent History of Unauthorized Online Music Distribution and Its Threat to Copyright Owner’s Interests......... 2. Music Distribution Online: The Authorized Biography ............ 3. Is There Something Wrong with This Picture? Non- Copyright Legal Developments ................................................... B. Copyright Law And Digital Music Distribution: The Institutions ......................................................................................... 1. Who are the Stakeholders?......................................................... 2. Who are the institutions involved in making copyright law and policy? ............................................................................ a. International Institutions ..................................................... b. Executive and Legislature.................................................... c. Administrative Agencies....................................................... d. Courts .................................................................................. e. Private Institutions..............................................................
    [Show full text]
  • Legal Issues Affecting Creation and Implementation of DRM Systems
    Legal Issues Affecting Creation And Implementation Of DRM Systems Gabriel M. Ramsey, Esq. Orrick, Herrington & Sutcliffe LLP I. INTRODUCTION Since the late 1990s, DRM systems have become increasingly prevalent in the videogame industry. With annual losses in the billions due to videogame piracy, DRM is potentially an important component of the solution. However, the place of DRM in the world of digital content has been highly contested. Thus, concomitantly with the increased attention to DRM in recent years, a substantial body of law has developed out of the conflict around these technologies as well. It is important for those tasked with selecting, implementing or managing DRM systems to understand the implications of the law in this area, in order to ensure the strongest protection and the least legal exposure. Here we explore two different legal topics pertinent to assessing DRM technologies. First, we consider how legal developments concerning the Digital Millennium Copyright Act (“DMCA”) affect the level of protection afforded by different types of DRM systems. Second, we address the potential for legal exposure from lawsuits by users claiming damage related to the implementation of DRM technology. II. SELECTING A STRONG DRM SYSTEM UNDER THE DMCA A. Background: The DMCA’s “Anti-circumvention” Provisions In 1998, the DMCA was passed, prohibiting circumvention of “technological protection measures” which control copying and access to copyrighted content.1 In other words, the DMCA acts as a legal mechanism to enforce DRM systems. If a content owner implements DRM technology limiting the use of its content, and someone hacks the system in order to make unauthorized use of the content, that person may be liable under the DMCA.
    [Show full text]