INDICARE Monitor About Consumer and User Issues of Digital Rights Management Solutions www.indicare.org ISSN 1614-287X

INDICARE Monitor Vol. 2, No 10, December 2005

Content

Editorial ...... 2 By: Knud Böhle, ITAS, Karlsruhe, Germany Some of the reasons for BEUC's Campaign on Consumers’ Digital Rights ...... 4 By: Cornelia Kutterer, BEUC, Brussels, Belgium Music services are incompatible – A research of what we already know ...... 9 By: Kristóf Kerényi, SEARCH Laboratory, Budapest, Hungary DVB-CPCM - First steps towards an open standard for a content protection and copy management system from the DVB ...... 12 By: Chris Hibbert, Chairman, DVB-Copy Protection Technologies Group, London, United Kingdom DRMTICS 2005 – a truly interdisciplinary forum for DRM research A conference report ...... 17 By: Wanqing Li, Rei Safavi-Naini and Nicholas Sheppard, University of Wollongong, Wollongong, Australia Axmedis plus = technology + users + consumers A report on the 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distribution (Axmedis 2005) ...... 20 By: Gergely Tóth, SEARCH Laboratory, Budapest, Hungary Masthead ...... 24

The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe

Editorial of INDICARE Monitor Vol. 2, No 10, 23 December 2005 By: Knud Böhle, ITAS, Karlsruhe, Germany Abstract: In the editorial we announce the report of the 3rd INDICARE Workshop about "Fair DRM Use", hint to the call for contributions to the 5th INDICARE Workshop about "Human Fac- tors of DRM" (Budapest 19/01/06), and express our wish for more INDICARE Monitor articles from Northern, Southern, and Eastern Europe. The five articles published in the December is- sue cover BEUC's reasons for its Campaign on Consumers’ Digital Rights, a review of a study commissioned by BEUC testing the interoperability between online music stores and portable players, an introduction to DVB-CPCM, the content protection and copy management system proposed by DVB for , and finally a conference report about DRMTICS 2005 and a second about Axmedis 2005. Keywords: editorial – INDICARE

INDICARE news tems from Northern, Eastern and Southern The 3rd INDICARE Workshop about "Fair Europe contribute to the INDICARE Moni- DRM Use" was organized by the Institute for tor! It is meant to be a truly European online Information Law (IViR) and took place in journal covering experiences and opinions Amsterdam, 28 May 2005. Meanwhile Mara from all over Europe. Help us to better Rossini and Natali Helberger, both from achieve this goal! IViR, have produced a concise and well writ- ten workshop report (Rossini and Helberger About this issue 2005), which is available online. It summa- BEUC's criticism of European policy rizes and synthesises presentations and de- BEUC, the European Consumers’ Organisa- bates. While the first part of this 18-pager tion, and other consumer organizations have deals with consumer expectations and con- been denouncing for a long time shrinking sumers' legitimate interests, the second part consumer rights in the digital environment - is about political and regulatory options for the BMG scandal being just the tip of consumer protection. an iceberg. What bothers BEUC most as a European high-level interest group is appar- The 5th INDICARE Workshop about "Human ently the feeling that their arguments remain Factors of DRM", scheduled for the 19th of - so far - unheard by European policy mak- January 2006 in Budapest is organized by ers. Consequently they started a Campaign INDICARE partner SEARCH. The aim of on Consumers' Digital Rights. The article by the workshop is to put the consumer and his Cornelia Kutterer is however much more needs in focus analysing DRM-protected of- than a description of this campaign. It is but a ferings and devices from a human factors serious attempt to investigate cases of ongo- point of view. Special attention will be given ing policy making showing how the interests to the access problems of potential users liv- of consumers are ignored or weakened in ing in less developed countries and groups these processes. An essential weakness of with special needs like disabled persons. European policy is seen in the conflation of Don't hesitate to contact the organisers if you commercial infringement of copyright (pi- would like to present at the workshop or to racy) and non-commercial copyright in- participate. To learn more about the work- fringement, ending up with a notion of piracy shop, please have a look at the "Call for pres- as first of all non commercial infringement. entation" at our website (cf. sources). Intertek's interoperability study Towards the end of the year, when wishes Kristof Kerenyi, SEARCH, contributes a are more likely to come true, I would like to knowledgeable review of an interoperability express our INDICARE Monitor wish for the study performed by Intertek Research and next year: users and consumers of DRM sys- Performance Testing and commissioned by

INDICARE Monitor Vol. 2, No 10, 23 December 2005 2

BEUC. UK-based music services and widely Challenges and Systems, took place in Syd- available digital music players were com- ney from October 31 to November 2. The in- pared and tested with a focus on interopera- terdisciplinary character of the conference is bility of file formats and DRM formats. The worth highlighting. As the full proceedings main results are presented in the review. The of the conference will be available in review highlights the value of the study as Springer’s Lecture Notes in Sci- easy to read "educational material" for the ence later in 2006 this report is a good oppor- public making aware of DRM systems' limi- tunity to get first hand impressions and an tations today - including hints how to achieve overview of the event. interoperability nonetheless. Gergely Tóth, SEARCH, reports about Ax- DVB's Content Protection & Copy medis 2005, the 1st International Conference Management specifications on Automated Production of Cross Media Chris Hibbert, Vice President Media Tech- Content for Multi-channel Distribution tak- nologies & Standards with Walt Disney ing place in Florence, November 30 to De- International, gives an excellent cember 2. Although Axmedis is mainly a introduction to the Content Protection & large European R&D project (FP6 Integrated Copy Management (DVB-CPCM) system Project) addressing cross-media production developed by the Digital Broadcasting and distribution, the conference was interdis- Project and published in November 2005. ciplinary in nature. This was achieved by or- More precisely the first three elements of this ganising additional panels and sessions de- specification have been published. DVB, es- voted to user and consumer aspects of digital tablished in 1993, is today a consortium of c. media and DRM. For instance a panel was 300 companies from more than 35 countries organized on collecting societies, the committed to develop pan-European open EUAIN, the European Accessible Informa- standards for digital broadcasting. tion Network, organized a panel, and in par- ticular the "digital goods workshop" (the The article does not go into technical details, third in a series), which addressed user and but gives a high-level overview of the main consumer aspects in digital goods markets, features of the DVB-CPCM specifications was incorporated in the conference frame- and the work still ahead. Apart from the clear work. As the conferences proceeded in paral- presentation of a rather complicated subject, lel sessions, the present conference report I do appreciate that Hibbert also explains the can of course not cover all. The good quality context of this standardisation effort: the of the conference makes me therefore rec- changing scope of DVB activities, the moti- ommend the two printed volumes of the pro- vations behind DVB-CPCM, and even lines ceedings, which are already available. of conflict. As you will have noticed, this INDICARE Conference reports Monitor is not published last Friday of a Rei Safavi-Naini, Wanqing Li and Nicholas month as usual, but the last but one due to Sheppard all involved in the organisation of Christmas time. We wish you the very best DRMTICS 2005 provide you with a compre- for the holidays to come and the next year hensive conference report. DRMTICS, Digi- tal Rights Management: Technology, Issues, the INDICARE team

Sources ► Rossini, Mara and Helberger, Natali (2005): Fair DRM Use. Report on the 3rd INDICARE Workshop Held on 28 May 2005 in Amsterdam; available at http://www.indicare.org/tiki- download_file.php?fileId=146 ► 5th INDICARE Workshop on the Human Factors of DRM: CALL FOR PRESENTATION: http://www.indicare.org/tiki-page.php?pageName=WorkshopFiveCall About the author: Knud Böhle is researcher at the Institute for Technology Assessment and Systems Analysis (ITAS) at Research Centre Karlsruhe since 1986. Between October 2000 and April 2002 he was visiting scientist at the European Commission's Joint Research Centre in Seville (IPTS). He is specialised in Technology Assessment and Foresight of ICT and has led

INDICARE Monitor Vol. 2, No 10, 23 December 2005 3

various projects. Currently he is the editor of the INDICARE Monitor. Contact: + 49 7247 822989, [email protected] Status: first posted 23/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=164

Some of the reasons for BEUC's Campaign on Consumers’ Digital Rights By: Cornelia Kutterer, BEUC, and Brussels, Belgium Abstract: This article explains the reasoning behind BEUC's "Campaign on Consumers Digital Rights". Current international IPR policy, in particular that of the European Union is perceived as a danger to established rights of consumers. This opinion is put forward supported by a series of arguments and examples. Keywords: opinion - consumer protection, data protection, digital TV, DRMS, EU policy, piracy, private copy - EU

Introduction the results of the INDICARE survey, Dufft et The ease of digital copies has challenged tra- al. 2005), let alone the effects it may have on ditional business models by lowering the cost their private lives. But does that mean that and effort of reproduction and distribution. they shouldn't care about it? Can we watch Different business models for content deliv- the societal shift from young people taping at ery compete in a fast developing technologi- home in a private sphere to a generation sur- cal environment. As a result, values such as veyed and criminalized? the protection of Intellectual Property Rights Facing these threats, it seems astonishing to (IPRs) on the one hand and the protection of the naïve reader that Charlie McCreevy, the private sphere and consumers on the Commissioner for Internal Market and Ser- other seem to be more and more at odds. vices, stated in a recent speech before the Even voices from industry confirm the threat. BSA (European-American Business Coun- In the words of Gary Shapiro, president and cil/Business Software Alliance) that “the chief executive of the Consumer Electronics pure technology issues such as the robustness Association (CEA): “In the rush to crack of the technology, the acceptance by con- down on pirates, we risk eliminating a criti- sumers can be left to the market” (McCreevy cal consumer right – the right to use copy- 2005). Another example of the weak stand- righted material, without the permission of ing of consumer interests in public policy is the copyright owner” (quoted in Taylor and the "EU-US Initiative to Enhance Transatlan- van Duyn 2005). tic Economic Integration and Growth". While the Commission has acknowledged in a draft But generally industry tends to ignore the in- implementation paper of this EU-US Initia- terests of consumers. A notorious example is tive that there is – in respect to DRM and Sony BMG’s director for digital business, technical protection measures - a need of Thomas Hesse, who stated - when debate "taking due account of public policy inter- about the Sony BMG debacle over its intru- ests, such as the promotion of fair competi- sive DRM system heated up: "Most people, I tion and consumer rights, with a view to think, don’t even know what a rootkit is, so identify best practices", in the final version why should they care about it?"(quoted in this sentence was deleted - due to US pres- Orlowski 2005; cf. Bohn 2005 for more de- sure (cf. EU-US 2005). bate on the Sony BMG debacle; cf. also Doc- torow 2005a). It may possibly be true that Consumer organizations have been denounc- many consumers are not aware of DRM (cf. ing for a long time shrinking consumer rights

INDICARE Monitor Vol. 2, No 10, 23 December 2005 4

in the digital environment (cf. e.g. BEUC features which distinguish the practice 2004) but remained so far unheard by Euro- from other forms of unauthorized re- pean policy makers. It is against this back- production or use such as home copy- ground that on 10 November BEUC, the ing. Piracy in this sense includes boot- European Consumers’ Organisation, legging, that is, the unauthorized re- launched a Campaign on Consumers Digital cording of performances and the sub- Rights supported by Zusana Roithova, Mem- sequent marketing of copies of the re- ber of the European Parliament. The Sony cording. It is frequently associated BMG story merely underlined the necessity with counterfeiting, that is, unauthor- for this campaign and revealed that many of ized use of a legitimate product com- the issues addressed are not only "potential mercial presentation, in particular, its but unlikely risks" - instead - these risks have trade mark or some other protected in- materialized. In the following we will point dication” (EC 1988). out some more European and international Today, it appears that the Commission no developments threatening consumers' rights longer distinguishes these two different types by fostering technical protection measures of infringement. But blurring these bounda- and expanding criminal law. They all dem- ries leads to excessive reactions that may onstrate the need for our campaign. have deep, irreversible and adverse effects on our society, technological development and Blurring the boundaries between the private sphere. commercial and non-commercial copyright infringement In a highly controversial and often hostile The entertainment industry has successfully debate about the scope of IP protection, re- watered down specific terms or extended cent developments in the political debate their scope in commonly used language – tend to be excessive, disproportional, lop- such as piracy. What is piracy? It is an im- sided and do not take into account the exis- precise term for copyright infringement – in tence of many discussions on how to im- the first place – because it disregards the ne- prove creativity, access to knowledge and the cessity to differentiate between non- legal use of technology. Instead, the law of commercial and commercial copyright in- unintended consequences is being provoked. fringement. While some "pirated content" is Some examples: simply infringing (you upload a copy- Criminalization of consumers protected music file on a P2P net without In a recent proposal adopted by the Commis- permission), other is commercially infringing sion in July 2005, the Commission aims at (somebody sells an illegal copy). The impact introducing and aligning national criminal of each is different. Conflating them under law provisions against infringements of IPRs. the "piracy" banner is nonsensical. By the Under the proposal, infringements of any in- way, conflating non-commercial infringe- tellectual property rights are treated as crimi- ment of copyright under theft is nonsensical nal offences if undertaken intentionally and as well. on a commercial scale. Similarly, attempting, In the 90s, the Commission was willing to aiding and inciting such infringements are distinguish commercial infringement of considered criminal acts. copyright (=piracy) from non-commercial The problem is that the definition of "com- copyright infringement: mercial scale" is not set out, and does not ex- “Piracy … embraces the unauthorized plicitly require financial benefits, profit or a reproduction of works protected by commercial motive for activities to be identi- copyright or allied rights for commer- fied as taking place on a "commercial scale". cial purposes as well as all subsequent This may straightforwardly lead to private commercial dealing in such reproduc- non-commercial (but infringing) uses being tions. The commercial purpose and criminalised as of potentially commercial frequently the scale on which the ac- scale (the issue – rejected during the 2004 tivity is carried out are characteristic Enforcement Directive debate – is thus back

INDICARE Monitor Vol. 2, No 10, 23 December 2005 5

on the agenda). The inclusion in criminal be- serious offences would hamper the ef- haviour of activities collected together under fectiveness of the Directive and the en- "aiding or abetting and inciting such in- forcement activities for other forms of fringements" is imprecise and far too inclu- criminal offences. Once an illegal ac- sive of activities that are entirely legal. Thus, tivity is considered as a crime in a it is possible that an email noting the exis- Member State, the enforcement au- tence of a piece of peer-to-peer software thorities should have adequate means might be regarded as an incitement to in- to prosecute it” (CBMA position on fringe intellectual property rights. data retention of 22 November 2005). Data retention CMBA would like to use a piece of legisla- At the time of writing, the European Parlia- tion intended to fight terrorism in order to get ment is discussing and adopting a controver- hold of P2P-users that infringe copyright (cf. sial compromise proposal to revise Article 15 Cronin 2005). Obviously, non-commercial of EC Directive 2002/58 that will introduce infringement of copyright must be made a extensive common rules on data retention crime in the first place. (On 14 December, the European Parliament Internet Services Providers’ control of data approved at first reading (by 387 votes to 204 Other initiatives also aim at getting hold of and 30 abstentions) the proposal for a direc- the same data. A group of entertainment in- tive on telecommunications data retention in dustry and Internet Service Providers is dis- the fight against terrorism and organised cussing with the European Commission – in crime) despite the fact that the European a so-called “Sherpa group” – how best to co- Data Protection Supervisor and the Article 29 operate to fight piracy (here it seems, the Working Party of European Privacy Com- term piracy is used only for non commercials missioners have repeatedly stated that the infringements). case for retention has not been made and that the scope of that proposal is not proportion- The group is seeking to develop a charter on ate (ARTICLE 29 Data Protection Working best practices in order to fight unauthorized Party 2005): The European Data Protection file-sharing. The envisioned system would Supervisor has also stated in his opinion, the entail a graduated response system ultimately mere existence of data might lead to in- shutting down Internet connections of cus- creased demands for access and use by in- tomers who engage in unauthorized file- dustry, law enforcement authorities, and in- sharing. The CMBA issued a statement on telligence services. the charter on 2 November: “At its core, it should consist of a couple of escalating no- In the first place, data retention was consid- tices to infringers, culminating in termina- ered necessary to combat terrorism. The tion, or at least suspension, of subscriptions adopted compromise foresees access to this for recidivists” (CMBA position paper on a data to combat all serious crimes (a term to EUropean Charter for on-line content of 2 be specified by the Member States). The November 2005). A similar procedure in CMBA, Creative and Media Business Alli- France involved automatic systems to detect ance, however, lobbied strongly to include all copyright infringement on peer to peer net- crimes: works, and to force internet service providers “The scope of the proposal should in- to translate a given IP-address into an e-mail clude all criminal offences. The Direc- address and forward a 'pedagogical' e-mail tive, as proposed, is limited to the pre- message from the societies to their customer vention, investigation, detection and before commencing civil or criminal actions. prosecution of serious criminal of- But the French Data Protection authority fences such as terrorism and organized CNIL strongly rejected this approach as be- crime (Article 1.1). The position of the ing disproportional (cf CNIL 2005). CMBA is that the scope of the pro- Using ISP's and their contracts as enforce- posal should be extended to all crimi- ment vehicles raises a number of issues not nal offences. Limiting the proposal to least privacy but the CBMA statements on

INDICARE Monitor Vol. 2, No 10, 23 December 2005 6

privacy wipes away these concerns: “It has actions that need to be monitored, in front of become fashionable for some to claim data a 3rd party. This information can only be privacy constraints to plead against effective disclosed to appropriate authorized systems, actions to tackle infringing activities by indi- in specific and clearly announced cases.” viduals. ….. Data protection should not be an Other requirements also treat users as in- impediment to the reasonable retention, pres- fringers. It has never been questioned ervation and access to evidence for legitimate whether DRM should include traceability re- purposes. It is essential to ensure that infring- quirements at all. (for criticism cf. Doctorow ing activities are not protected by anonym- 2005b). ity” (ibid.) The group further tackles liability DVB provisions in the E-commerce directive: Similar attempts to describe DRM specifica- “Such a step could serve as one indicator to tions are made by an industry group called justify benefiting from the safe harbor provi- the Digital Video Broadcasting Project sions of the Electronic Commerce Directive (DVB). This is an industry-led consortium that limit the liability of certain intermediar- (with no consumer participation) of over 260 ies under certain conditions” (ibid). This co- broadcasters, manufacturers, network opera- incides with the Commission initiative to set tors, software developers, regulatory bodies up an expert group (comprising member and others in over 35 countries committed to states) to discuss the development of the e- designing global standards for the global de- commerce directive, in particular regarding livery of and data services. ISP liability provisions (a Commission study Its sub groups, CM-CP and TM-CPT, are on this topic is foreseen, see working to develop the Content Protection http://europa.eu.int/comm/internal_market/e- and Copy Management (DVB-CPCM) sys- commerce/index_en.htm). But take down no- tem for managing distribution, copying and tices have proven to have little effect, easy to redistribution of television content (cf. in this abuse and to come with chilling effects (cf. INDICARE Monitor the article by Hibbert Urban and Quilter 2005). 2005), akin to the US “Broadcast Flag” which has been successfully stopped in a re- Traceability – DRM requirement cent US court of appeal decision. DVB- NAVSHP compliant solutions will effectively hinder or Other initiatives tackle the traceability of prevent consumers from recording free over- data. On September 13, 2005, the "Net- the-air broadcasting for legitimate time- worked Audiovisual Systems and Home Plat- shifting usages (for criticism see Doctorow forms" group (mainly comprising interested 2005c). It will be now submitted to ETSI companies) released a paper called standardization. "NAVSHP (FP6) DRM Requirements Report (NAVSHP 2005). This is a set of technical Bottom line and commercial requirements for developing These recent developments and initiatives DRM. The purpose of the document was to show that the balance between the rights of promote common understanding within the the right holders and the rights of consumers NAVSHP, which in their research work has is neither achieved nor maintained but in- to tackle the DRM issue, to allow discussion stead ever more threatened. Consumers’ or- and mutual help on this very complex issue. ganizations have to be very vigilant in the While the Commission has made explicit that near future. The European Commission has it will not be bound in any way by the output announced a review of a set of directives re- of this activity and that there was no direct lated to copyright, in particular the reform of discussion on policy, possible legal require- copyright levies applied to equipment and ments, etc. – it has also acknowledged the media used for private copying and a review document's deficiencies in these areas. of copyright term, above all, term for sound The DRM specifications require for example: recordings are included in the review. Con- “There is a need to give the DRM system the sumers’ organizations will also need to look ability to later prove consumer selections or at the contractual side and pay high attention

INDICARE Monitor Vol. 2, No 10, 23 December 2005 7

to abusive terms in services. An initiative re- scope, would not be guaranteed anymore if port on consumer protection in the digital the right holder could claim protection to an environment by the European Parliament extent to which he is not entitled…" (BGH could certainly help to address this issue. 2005). The court adds that this objective dis- tinction between the scope of IP protection A good sign came recently from The German and the freedom of competition must also be Federal Supreme Court. It stated that “the balanced in regard to the means of enforce- necessary balance between the constitution- ment. We believe that the statement is fun- ally protected rights of the right holders to damental and should be reflected in all initia- exercise their rights and the constitutionally tives at hand. protected interest in competition, i.e. to be able to evolve freely outside that protected

Sources ► ARTICLE 29 Data Protection Working Party (2005): Opinion 113/2005 on the Proposal for a Directive of the European Parliament and of the Council on the Retention of Data Processed in Connection with the Provision of Public Electronic Communication Services and Amending Directive 2002/58/EC (COM(2005)438 final of 21.09.2005). Adopted on 21st October 2005; http://europa.eu.int/comm/justice_home/fsj/privacy/docs/wpdocs/2005/wp113_en.pdf http://europa.eu.int/comm/justice_home/fsj/privacy/docs/wpdocs/2004/wp99_en.pdf ► BEUC 2004: Digital Rights Management (DRM) - BEUC Position paper, X/025/2004, Brussels, 15.9.2004; http://www.beuc.org/Content/Default.asp?PageID=103 ► BEUC (European Consumers‚ Organisation/Bureau Européen des Unions de Consommateurs), Brus- sels, Belgium http://www.beuc.org – http://www.consumersdigitalrights.org ► BGH (2005): BGH Case GSZ 1/04, July 15 2005. ► Bohn, P. (2005): Intrusive DRM: The cases of Sony BMG, StarForce and . INDICARE Moni- tor, Vol. 2, no 9, November 2005; http://www.indicare.org/tiki-read_article.php?articleId=155CMBA (2005): CMBA statement of 2 November 2005 on ‘A EUROPEAN CHARTER FOR ON-LINE CON- TENT’ (CMBA – A European Charter for on-line Content 2 November 2005) Hibbert, Chris: DVB- CPCM. First steps towards an open standard for a content protection and copy management system from the DVB. INDICARE Monitor, Vol 2, no 10, December 2005; http://www.indicare.org/tiki- read_article.php?articleId=159 ► CNIL: Press release of 24 October 2005; http://www.cnil.fr/index.php?id=1881 ► Cronin, David (2005): Music moguls want EU terror law to hunt pirates. European Voice of 24 Novem- ber 2005, http://www.european-voice.com/archive/issue.asp?id=470 (registration required) ► Doctorow, Cory (2005a): Vaudeville offers a music lesson for Sony BMG. Financial Times (FT.com), December 11 2005 (registration required for download) ► Doctorow, Cory (2005b): Critique of "NAVSHP (FP6) DRM Requirements Report. Electronic Frontier Foundation 2005; http://www.eff.org/IP/DRM/NAVSHP/NAVSHP_critique.pdf ► Doctorow, Cory (2005c): Europe's coming broadcast flag: DVB CPCM is a stealth attack on Europe- ans' digital rights. Electronic Frontier Foundation 2005; http://www.eff.org/IP/DVB/ ► Dufft et al. (2005): Digital Music Usage and DRM – Results from an European Consumer Survey, Ber- lin, May 2005; free download at: http://www.indicare.org/survey ► EC (1988): Commission of the European Communities. COM (88) 172 final . Green Paper on Copy- right and the challenge of technology – Copyright issues requiring immediate action. Communication from the Commission. Brussels, 7 June 1988; http://aei.pitt.edu/archive/00001209/01/copyright_and_tech_gp_COM_88_172.pdf ► EU-US (2005): Implementation of the Economic Initiative of the June 2005 EU-US Summit: Joint EU- US Work Programme. Brussels, Washington, November 2005; http://www.europa.eu.int/comm/external_relations/us/economic_relations/joint_eu-us_work_prog.pdf ► McCreevy, Charlie (2005): European Commissioner for Internal Market and Services: Address to the EABC/BSA (European-American Business Council/Business Software Alliance) Conference on Digital Rights' Management. High level Industry Seminar/Global Industry Roundtable on Levies & DRMs. Brussel, 12 October 2005; http://europa.eu.int/comm/commission_barroso/mccreevy/docs/speeches/2005-10-12/euam_en.pdf ► NAVSHP (2005): DRM Requirements Report. Target release version: V1_.0; http://www.ist-avista.org/cg1_files/NAVSHP-DRM-CG_ADT_20051027.pdf

INDICARE Monitor Vol. 2, No 10, 23 December 2005 8

► Orlowski, Andrew (2005): Sony digital boss – rootkit ignorance is bliss. http://www.theregister.co.uk/2005/11/09/sony_drm_who_cares/ ► Shapiro, Gary (2005, the CEA president and chief executive, in testimony before a US congressional committee. See in Financial Times ‘Music industry asks whether fair use is fair play’ by Paul Taylor and Aline van Duyn, 28 November 2005. http://news.ft.com/cms/s/2594a9f8-603a-11da-a3a6- 0000779e2340,dwp_uuid=fcd3ba1e-2025-11d8-81c6-0820abe49a01.html ► Urban, Jennifer M. and Quilter, Laura (2005): Efficient Process or “Chilling Effects”? Takedown No- tices Under Section 512 of the Digital Millennium Copyright Act; (full research paper version of this study will be published in the March, 2006 edition of the Santa Clara Computer and High Technology Law Journal); http://mylaw.usc.edu/documents/512Rep/ About the author: Cornelia Kutterer holds the position of senior legal advisor at BEUC, the European consumer organisation. She is responsible for the legal department focusing on con- sumer protection law, contract law, passenger rights, intellectual property and information tech- nology laws. She is a qualified German lawyer and holds a master’s degree in information tech- nology and communication laws. Contact: [email protected] Status: first posted 20/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=162

Music services are incompatible – A research of what we already know By: Kristof Kerenyi, SEARCH laboratory, Budapest, Hungary Abstract: An independent institute was “commissioned by BEUC to investigate the limitations that may be present on purchased music downloads from major online suppliers and in particu- lar, how these limitations restrict the consumer’s traditional ability to transfer their music be- tween platforms and players.” INDICARE analysed the resulting Technical Report, and came to the conclusion, that the right findings were provided in the right form for the public, thus good “educational material” was produced for consumers. Keywords: review – consumer expectations, consumer protection, consumer research, inter- operability, music markets, IT industry - UK

Independent consumer research ► an Apple iPod Photo was selected for its The European Consumers’ Organization compatibility with Apple iTunes Music (BEUC) commissioned an independent insti- Store (AAC format files), tute, Intertek Research and Performance ► a Creative Zen Micro was selected for its Testing, to perform an analysis of some of compatibility with MSN Music and Win- the UK-based music services and widely dows Media Player 10 (WMA format available digital music players and find out files), how interoperable they are, in other words ► a Rio Carbon was selected for its WMA the limitations, and “how these limitations support (second player with WMA for- restrict the consumer’s traditional ability to mat files chosen because of WMA popu- transfer their music between platforms and larity, and also in order to test a second players”. This has been an intriguing ques- music store, HMV, using Microsoft’s tion for consumers, most of whom have format) and heard about the issue, but in the end they have had to accept the present situation of ► a Sony Network Walkman for its com- non-interoperable music download services. patibility with CONNECT Music Store (ATRAC3 format) Intertek chose four portable music players:

INDICARE Monitor Vol. 2, No 10, 23 December 2005 9

Each player was tested with the correspond- ► ATRAC, Sony’s file format, also sup- ing service, and players were also cross- ports DRM. This is said to provide the checked to find out what level of interopera- best sound quality for a given bitrate, but bility exists, all of this from the layman’s Sony so far has not licensed it to anyone, point of view. therefore it is a very proprietary format. Technical report ► AAC, the choice of Apple, is employed The result of the analysis was a technical re- in the iTunes Music Store. While AAC is port, which is now available for the public on an open standard free to implement and a new web site titled Consumers Digital use for everyone, Apple coupled it with Rights (cf. sources), created as an informa- its proprietary FairPlay DRM system, tion source for a wide range of readers, from which makes it inaccessible for any of politicians through journalists to consumers the few players that manage the compres- of DRM-protected content. “On this website sion format itself. (At this point the we invite you to discover everything you al- Technical Report is a bit confusing, say- ways wanted to know about your consumer ing that “AAC files can only be pur- rights in the digital environment” – they de- chased through the iTunes web site” and clare. suggesting that AAC is a file type sup- porting DRM. AAC in fact is just the Accordingly, the technical report is concise compression method, unlike Microsoft’s and easy to read, also providing basic infor- and Sony’s compression-protection for- mation to those not really familiar with digi- mats.) tal audio, DRM and related services. The re- port starts by giving a background to com- Actual tests pressed audio, which, as opposed to tradi- The report moves on to the actual testing tional digital audio like CDs, makes new us- done at the research institute. They created ages possible: “individual tracks or whole al- accounts at the mentioned music stores, and bums can easily be downloaded from the bought a couple of songs, trying to play, Internet where they can be purchased at burn, transfer (copy to a different computer) lower cost and where new music can be dis- and transcode (convert to a different format) covered. Also, entire music collections can them. Importing songs to a different media be copied and stored on a home com- player framework from where they were pur- puter/laptop or portable hard disc based au- chased and loading to portable devices were dio file player” (p. 4) also main points of investigation. In the following, different compressed audio To cut the long story short, each music store formats are explained: was quite comparable in terms and offerings. Each needed a special media player frame- ► , as the most widespread format does work (Apple iTunes, Microsoft Media Player not support DRM, and therefore it is not 10, HMV’s own software and Sony Sonic- generally supported by major record Stage) to handle the music. They could be companies used for discovering new music, buying, or- ► WMA, Microsoft’s file format does sup- ganizing and playing songs and for transfer- port DRM. Most music web sites have ring them to portable devices and finally ex- music available to download in this for- porting (burning to CD). Each compression mat, and it is also very popular with the method used about the same compression ra- manufacturers of portable players. The tio (around the same file size for the same reason for the latter is that most modern track). Apple and Sony provided only “per- PCs will already have the Windows Me- manent purchase” models with unlimited dia Player (the player for this format), as plays for a one-time payment and export op- the report says, though I have to disagree tions, while the two Microsoft DRM-based with this: I think that the main reason is systems additionally allowed monthly sub- that this is the only widespread technol- scriptions where an unlimited number of ogy that is free for everyone to license. songs can be played, but only as long as the

INDICARE Monitor Vol. 2, No 10, 23 December 2005 10

subscription is maintained and after this pe- Findings riod the songs become unavailable (the ex- When it comes to the analysis of DRM sys- porting option is in this case disabled). tems, the report becomes rather speculative. The report analyses individual terms: number What is checked carefully is in particular the of PCs where purchased songs are playable, contracting terms. Not surprisingly the report number of portable devices they can be trans- discovers that different music stores have dif- ferred to and also the number of CD burns. ferent conditions in terms of number of CD There were some differences, but to me it burns, portable players, etc.; usage restric- seemed that the offerings were all liberal tions are not clearly labeled, information on enough to not disturb the ordinary user. the web sites is not transparent and inconsis- Terms were mostly correctly displayed be- tent across different music stores and licens- fore purchase, but in two cases the testers re- ing terms are difficult to understand; and by ported unexpected anomalies: in the MSN using proprietary formats download web Music store “tracks were time restricted to sites can control what one can do with the 31/12/2099”, which is a bad thing, but per- music and the devices they will play on (cf. sonally I do not consider this restriction very Summary, p. 2). limiting to myself, the other was in the HMV What is more astounding is that “the terms store where the DRM system allowed a lot and conditions on these music stores allow more than was stated before purchase – a the service provider to unilaterally change nice surprise. the terms”, and “this would not even break the contract”. (cf. Summary, p. 2) On the Compatibility other hand, technically, it is also possible to The authors of the report gave this chapter change “limitations to a consumers existing the title “File Compatibility” (page 11), but collection”, which means that in the future personally I would have preferred “system there is a possibility for music stores to retro- compatibility”. They tried to import music spectively further restrict our purchased mu- bought from one system to another system’s sic – however, this would be technically music library (the collection of music han- challenging and highly unlikely (p. 16). dled by the media player framework). It turned out that the two Microsoft DRM- Yet what made me really wonder was that at based systems were (apart from one glitch) the end of the report, in the Appendix, a de- compatible with each other, but taking these tailed description is given about how to two as one (since the employed technology achieve artificial interoperability between the was the same) protected music could not be incompatible systems. More precisely, I was transferred to other systems. This means surprised to see this information made pub- complete lack of interoperability. Unpro- licly available by a high level interest group. tected WMA files can be imported to iTunes Burning the songs to CDs, and then re- and SonicStage, and thus transferred to an ripping them with the target systems’ media iPod, and a Network Walkaman successfully, player frameworks might be a slightly incon- but AAC and ATRAC files can not be trans- venient, but certainly effective way of lifting ferred between systems. This is due to DRM- the DRM from the protected music (p. 19). incompatibility rather than file-incom- And while the report says that this method is patibility in the case of AAC (since it is an “time consuming”, my opinion is that it is open standard), and due to the incompatibil- possible to tools (and will therefore be ity of both in case of ATRAC (since Sony such tools) which automatically do this. uses a closed proprietary format) (pages 12, 13 and 14). Bottom line The report talks about a media consultant, What I missed here was the analysis of who said “My only confidence is that sooner whether MP3, OGG Vorbis, or other unpro- or later the consumers will prevail by voting tected formats could be imported or exported with credit card against the worst systems” – to and from the respective systems. the same conclusion which INDICARE has drawn in its State-of-the-Art Reports. There-

INDICARE Monitor Vol. 2, No 10, 23 December 2005 11

fore beside the experiments carried out un- comes to the right conclusions, therefore derlying the findings, there is nothing really educating consumers about today’s DRM special in the report that DRM experts were systems limitations – and also on how to ex- not aware of. ercise their wish for interoperability by cir- cumventing content protection. So I consider the main value of the research is that it is easy to read for the public, and

Sources ► BEUC, (2005): Test on interoperability between online music stores and portable players – Summary. BEUC http://www.consumersdigitalrights.org/mdoc/x045cku2005e_13993.pdf ► Consumer Digital Rights web site, (2005): http://www.consumersdigitalrights.org/ ► Intertek, (2005): Technical Report – Online Music Download Services. BEUC http://www.consumersdigitalrights.org/mdoc/OnlineMusicDownloadServices_TechnicalReport_90041. pdf About the author: Kristóf Kerényi is a researcher at Budapest University of Technology and Economics in the SEARCH Laboratory. His interests include mobile and wireless IT security, as well as technological aspects of DRM. He received a MSc in computer science from BUTE. Contact: [email protected] Status: first posted 21/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=163

First steps towards an open standard for a content protection and copy management system from the DVB By: Chris Hibbert; Chairman, DVB-Copy Protection Technologies Group, London, UK Abstract: After five years of work the Digital Video Broadcasting Project has published the first elements of its specification for a Content Protection & Copy Management (DVB-CPCM). This article introduces the background of DVB, explains rationale, scope and concepts of CPMC, and finally outlines next steps. Keywords: review - authorised domain, broadband, , content protection, digital TV, interoperability, stakeholders, standards, usage rights

Introduction CPCM Abbreviations, Definitions and In November 2005 the Digital Video Broad- Terms. casting Project published a Blue Book, A094, Although the full system specification for containing the first three elements of its CPCM is not complete the Blue Book is pub- specification for a Content Protection & lished for informational purposes and liaison Copy Management (DVB-CPCM) system for with other interested standards forums. When use in consumer digital products and home completed the DVB-CPCM specification will networks. be submitted to ETSI for standardisation. The first three elements of the DVB-CPCM This article will not go into a detailed de- specification are: the CPCM Reference scription of the full functionality offered by Model, which provides a technical and archi- DVB CPCM as the reader can obtain the tectural framework for the CPCM System; Blue Book by download from the DVB web the CPCM Usage State Information, which is site (DVB 2005). Rather the following is in- content metadata that signals the authorised tended to give background to the DVB, why usage for a particular Content Item; and it embarked upon the work, and the major concepts embodied within the specification.

INDICARE Monitor Vol. 2, No 10, 23 December 2005 12

About the DVB regard to Intellectual Property Rights, allow- Today, the Digital Video Broadcasting Pro- ing them to be freely adopted and utilised ject (DVB) is an industry-led consortium of worldwide. Open standards guarantee that approximately 300 broadcasters, manufactur- compliant systems will be able to work to- ers, network operators, software developers, gether, independent of which manufacturer regulatory bodies and others committed to provides the equipment enabling consider- designing open standards for the delivery of able economies of scale to the benefit of the digital television and data services. Although industry and also the consuming public. based in Europe DVB has members in over The DVB is market lead. Its technical speci- 35 countries. fications are written to strict commercial re- The genesis of DVB was the debacle follow- quirements established by consensus by its ing the market failure in the early 1990’s of members which represent all the industry the D-Mac satellite system which was man- constituencies of interest and the consumer dated by the EC administration but not sup- through CE and IT vendors and broadcasters ported industry wide in Europe. who have an interest in only producing prod- ucts which are compelling and affordable. Persisting in the belief that pan-European standards for digital broadcasting will bring Why DVB CPCM? major benefits to consumers and manufactur- In the late 1990’s visionaries in the DVB ers, the European Community administration predicted that the future growth of digital turned to the industry and encouraged the distribution of video and audio content; the setting up of a cross industry group to pro- advent of affordable consumer digital re- duce open specifications for standardisation cording and processing equipment and soft- based on industry consensus. This led to the ware; and the potential for easy content formation of the DVB Project in 1993. movement by peer-to-peer transfer via Initially the DVB concentrated on producing broadband connectivity, would turn the exist- specifications for digital transmission sys- ing consumer content usage paradigm on its tems for satellite, cable and terrestrial deliv- head. Whilst convenient for consumers, the ery and an interoperable Conditional Access ease of unrestricted re-distribution of com- system. These specifications have been mercial content and associated loss of reve- adopted on a world wide basis resulting in nue to the content creation industry would the DVB becoming accepted as one of the reduce the income needed for investment in leading specifications bodies. In recent times new content. The inevitable reaction of the DVB has moved into the area of middleware content industry would be the push for DRM and software producing the Multimedia and content protection technologies in con- Home Platform specification for interactive sumer products. On the other hand, a degree content and the Portable Content Format to of content usage control, where applicable, provide common authoring to non- would encourage content providers and dis- interoperable interactive platforms. Recently tributors to introduce compelling new con- completed specifications also include DVB- sumer propositions enhancing digital home H for broadcast delivery to hand held de- networking and storage. vices, DVB S-2 an updated and more effi- It was therefore logical that DVB should em- cient system for satellite delivery than its bark upon an attempt to produce a specifica- first specification which is now ten years old. tion for digital content protection and copy Work is ongoing within DVB on advanced management to complement its other work in encoding technologies and IPTV. emerging new platforms. Interested DVB Since its inception the DVB Project has members determined to attempt to provide an proven the value and viability of pre- open standard CPCM system specification competitive cooperation in the development for use in consumer products which, if of open digital television standards. DVB adopted, will avoid a plethora of non- open standards guarantee fair, reasonable and interoperable proprietary systems resulting in non-discriminatory terms and conditions with higher costs and consumer confusion so

INDICARE Monitor Vol. 2, No 10, 23 December 2005 13

slowing digital take up and hindering moves digital Content in all processes from the towards analogue switch-over. point of acquisition by the consumer In September 1999 the DVB established a through to the point of consumption. new commercial sub-group within its Com- Possible sources of commercial digital Con- mercial Module with a mandate to prepare tent include broadcast (e.g., cable, satellite, Commercial Requirements for a CPCM sys- and terrestrial), Internet-based services, tem to provide a common framework for the packaged media, and mobile services, among protection and management of commercial others. content in consumer digital equipment and It is also intended that DVB-CPCM shall be home networks whilst taking into account applicable to the widest range of equipment consumer interests such as; no requirement encompassing in-home digital networks, per- for system registration or a return path; sim- sonal digital recorders; in the home and port- ple to use with clearly displayed information able, and facilitate remote connectivity to about usage rights. other locations such as a second home or a The group spent three years deriving the vehicle. Commercial Requirements for CPCM which CPCM is intended to be used to manage all indicates the degree of difficulty in reaching types of commercial Content - audio, video consensus across the industry in the emotive and associated applications and data deliv- area of content protection. ered to consumer devices from acquisition Inevitably viewpoints were initially some- until final consumption, or export from the what polarised across the industry sectors. CPCM system. Allowed usage is signalled For example, there was clearly a need to bal- by Usage State Information (USI) in the form ance the concerns of the rights owners to pro- of metadata which is securely bound to the tect their revenues with the concerns of the content. consumer electronics industry to protect the USI has been designed to accommodate a va- investment made by their customers in pur- riety of business models and regulatory re- chasing equipment. Public Service broad- gimes. The existence of any particular field casters were concerned that signalling over of USI in the specification does not imply restrictive use of their broadcast content that it will be asserted in a particular in- would conflict with their public service char- stance, or that it will be allowed to be as- ters. Pay TV broadcasters were looking for a serted. Details regarding how and by whom a means to integrate CPCM with existing Con- USI field can be asserted or changed will be ditional Access systems to support new reflected in the relevant CPCM compliance commercial offers such as VoD (video on regime, which is outside the scope of the demand). However, despite these differences, specification. For instance, European Public consensus was finally achieved by partici- service broadcasters are indicating that they pants recognising and accommodating each are considering setting a profile of CPCM other’s business models. USI signalling such that content scrambling In 2001 the Commercial Requirements for should not be applied and that the only re- CPCM were approved by the Steering Board striction required is to inhibit the re-transfer of the DVB and a sub group of the Technical of the Content by means of the Internet. Module was set to work to produce the speci- CPCM is intended to interface with DVB fication. Conditional Access (CA) systems and, where required, free-to-view broadcast delivery The CPCM system networks. It was recognised that DRM and Although the functionality targeted for copy protection systems already exist in the DVB-CPCM is much less ambitious than marketplace and will continue to be used and that of a full digital rights management developed. Hence to the extent possible, (DRM) system, the scope envisaged is without compromising its integrity and secu- for end-to-end protection of commercial rity, DVB-CPCM must co-exist with and

INDICARE Monitor Vol. 2, No 10, 23 December 2005 14

interoperate with other DRM and copy pro- it is delivered by broadcast, if so signalled by tection systems. the USI, to support local rights assigned to the broadcaster. The local restriction can be The Authorised Domain lifted after a defined period of time or the The DVB recognised that to conform with end of the transmission. the traditional user experience of home re- It should be emphasised again that provision cording, the portability of pre-recorded con- of this mechanism does not mandate content tent, and expectations based on emerging distribution restriction in all cases. The USI digital connectivity, it was necessary to iden- will convey the restriction of movement tify a mechanism to replicate the reasonable within the Authorised Domain when it ap- boundaries of content movement consumers plies. If the restriction is not signalled by USI have come to expect whilst not limiting the then the user will be allowed to send the con- advantages of new digital technology. Based tent “outside” the Authorised Domain. It is on the above, the concept of a user “Author- envisaged that there will be many cases ised Domain” was developed. where the content owner or distributor will The Authorised Domain is defined as a dis- wish this to happen. tinguishable set of DVB CPCM compliant devices, which are owned, rented or other- End-to-end protection & interoperability wise controlled by members of a single A guiding principle in the development of household. A household is considered to be CPCM is that implementation should not be the social unit consisting of all individuals dependant on a single technology. Rather, who live together, as occupants of the same CPCM should provide a framework for in- domicile. This makes no assumptions about teroperability between competing technolo- the physical locations of the devices owned, gies. This enables a range of competing tech- rented or otherwise controlled by the mem- nology providers to collaborate to achieve a bers of the household and no mechanisms to specification for a system which, whilst pro- identify and/or authenticate the user shall be viding interoperable transfer of content be- required. tween devices from a choice of providers, ensures that consumers can purchase equip- A CPCM device may only be a member of ment from different manufacturers in a com- one Authorised Domain at any time. When petitive market and be assured that the equip- signalled by USI, Content is constrained to ment will inter-operate. the Authorised Domain by which it is ac- quired and will not play on a devices belong- DVB-CPCM is intended for deployment in ing to a different Authorised Domain. How- individual devices and in home networks. A ever, to allow flexibility of connection a de- content scrambling algorithm and secure ex- vice can be re-assigned to another Authorised change mechanism will be specified to pre- Domain for the purpose of consumption of serve the security of the CPCM system. Content assigned to that Domain during CPCM Content will only transfer between which time it cannot access Content which devices which are fully DVB-CPCM compli- was bound to its original Authorised Do- ant, can establish mutual trust, and obey the main. There is no limit to the number of USI. Intermediate devices, or entities such as times a device may move between Domains network architecture items and storage on as long as the Content-to-Authorised Domain hard drives or removable recordable media, binding is maintained. should be transparent because the Content and USI is secure. This approach increases The specification provides mechanisms to security and ease of implementation by determine the size and scope of the Author- avoiding the necessity of multiple decrypt ised Domain; such size and scope to be de- and re-encrypt processing as would be the cided by the implementer and possible local case if each entity, device or linkage, com- regulation. prising a home network was to use incom- DVB-CPCM can also be used to constrain patible security mechanisms. It also reduces Content to the local environment into which the need for multiple cross-licensing.

INDICARE Monitor Vol. 2, No 10, 23 December 2005 15

Next steps Inevitably there is likely to be criticism, even The DVB Technical Module sub group is from some DVB members, of the develop- working to produce the specification for the ment of any form of content protection in security elements, to fully technically define consumer products and accusations that DVB the characteristics of the Authorised Domain, CPCM will limit the availability of content to and the means to securely bind content consumers. But the majority of DVB mem- within its boundaries. It is hoped that these bers believe there is a growing market need final elements of the CPCM system specifi- for content protection and copy management cation will be published by mid-2006, along and that the DVB history of an inclusive, with Implementation Guidelines which will open consensus building approach provides give examples of the use of CPCM in a num- the best option for development of a specifi- ber of markets and business models. Guid- cation which will provide tools with wide ance will also be provided on the scope of ranging options. technical testing required to ensure interop- Some critics have accused the DVB of con- erability and compliance. ducting this work “behind closed doors”. Whilst it is true that the DVB is a member Cross industry support organisation, it is open to any organisation or Although CPCM is probably the most con- company which wishes to participate and is tentious work item the DVB has attempted willing to contribute its intellect or technol- the process has received input and support ogy to the benefit of the industry at large. from, typically 25 to 30 member companies Membership requires the signing of the DVB from across the industry constituencies of in- Memorandum of Understanding which re- terest with representation from major tech- quires this commitment. nology providers.

Sources ► DVB (2005): Digital Video Broadcasting (DVB) Content Protection and Copy Management (CPCM) System. CPCM Reference Model. DVB Document A094, November 2005; http://www.dvb.org/index.php?id=294 Acknowledgement: This significant work which started five years ago has been supported by a broad representation of DVB members from all the constituencies of interest; content providers, broadcasters, distribution platform operators, consumer product manufacturers, and technology providers. As can be imagined content protection in consumer products and some free-to-air broadcast markets is a potentially contentious issue. It has therefore taken some time to em- brace the concerns of all the players in the market and for all the parties to reach a level of un- derstanding of each other’s present and future business models. The author therefore acknowledges the work of all colleagues in the DVB commercial and tech- nical sub-groups. About the author: Chris Hibbert is Vice President Media Technologies & Standards with Walt Disney Television International. He was formerly Director of Engineering with ITV Digital in the UK during which time he became chairman of the DVB CPT group. Previously as Director of Engineering for the ITV Network he was responsible for technical strategy for DTT and was a member of the DVB group which wrote the requirements for the DVB-T specification. Hibbert is a member of the DVB Steering Board, has played an active role in the TV-Anytime Forum and is a fellow of the Royal Television Society. Contact: [email protected] Status: first posted 13/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=159

INDICARE Monitor Vol. 2, No 10, 23 December 2005 16

DRMTICS 2005 – a truly interdisciplinary forum for DRM re- search. A conference report By: Wanqing Li, Rei Safavi-Naini and Nicholas Sheppard, University of Wollongong, Wollon- gong, Australia Abstract: The First International Conference on Digital Rights Management: Technology, Is- sues, Challenges and Systems (DRMTICS 2005) took place in Sydney from October 31 to No- vember 2. It was the inaugural conference in an annual series covering research in all theoreti- cal and practical aspects of digital rights management systems. The conference series serves as a broad multi-disciplinary forum for all DRM-related issues, including expression of rights, processes, methods and systems for enforcement of rights, DRM applications, together with the social, legal, usability and business aspects of DRM systems. Keywords: conference report – copyright law, digital TV, DRMS, P2P, rights expression lan- guage, technical protection measures, trusted computing

Introduction tive), Moni Naor (Weizmann Institute of DRMTICS 2005 (pronounced: "dramatics") Technology, Israel) and Karen Gettens was the inaugural conference in a series con- (Blake Dawson and Waldron, Australia). sidering all aspects of DRM systems includ- Renato's talk focused on the evolution of ing issues faced by holders of digital rights rights expression languages (RELs) from the who want to protect their intellectual prop- late 90's with DPRL up to Creative Com- erty rights and consumers who seek to pro- mons and focusing on the ODRL REL. He tect their privacy and to preserve their tradi- looked at the standardisation of RELs and the tional pattern of access to media under exist- impact this has had where successful, such as ing copyright law. the mobile sector with the Open Mobile Alli- The conference attracted submissions from ance DRM specifications and concluded by all of Asia, Australia, Europe and North reviewing the current “DRM Patents Saga” America, from which twenty-seven papers that has plagued the standardisation effort. were selected for presentation at the confer- He raised the issue of the applicability of ence. The programme also included three in- some of the patents to RELs and the serious vited speakers and a panel session. The pa- impact this will have on future research in pers covered a variety of topics, including this area, and the direct impact to systems be- cryptography, digital watermarking, legal is- ing deployed today. sues, rights expression languages, trusted Moni surveyed some proposals for designing computing and complete digital rights man- cryptographic schemes that take into account agement frameworks. both human and computer abilities and DRMTICS 2005 was held in co-operation weaknesses in solving various types of prob- with IACR (International Association for lems. These include schemes for traditional Cryptologic Research; cf. sources) and the cryptographic tasks such as identification, IEEE Computer Society Task Force on In- authentication and encryption, as well as formation Assurance (cf. sources), and spon- more modern ones, such as spam and abuse sors included electronics giant Motorola The prevention, denial of service and voting. full proceedings of the conference will be Karen gave an overview of legal action tak- available in Springer’s Lecture Notes in ing place in the digital rights management Computer Science series (DRMTICS 2006) world. She took us through the subtleties of in 2006. the legal decisions in

Invited talks ► the Sony vs Stevens mod-chipping The three invited talks were given by Renato case in Australia; Ianella (NICTA, Australia and ODRL Initia-

INDICARE Monitor Vol. 2, No 10, 23 December 2005 17

► the MGM vs Grokster file-sharing Yee Fen Lim (Macquarie University, Austra- network case in the United States; and lia) also argued that digital rights manage- ► the Universal Music vs Sharman ment systems and the laws that support them Networks (Kazaa) case in Australia. increase the rights of copyright owners be- yond what they are given in copyright law, to Karen concluded that courts have generally the point of creating an intellectual property sought a balance between copyright owners regime even more powerful in some respects and other parties, to the point of creating than that for tangible property. principles that are not included in the law it- self. She further concluded that the particular Supriya Singh (Royal Melbourne Institute of outcomes in the file-sharing cases are very Technology, Australia) and Jenine Beek- fact-specific and do not represent broad deci- huyzen (Griffith University, Australia) gave sions for or against peer-to-peer technology. an entertaining presentation disputing record companies’ claims that music fans use free Rights Expression Languages downloading as substitute for purchase. Their A new rights expression language is being series of interviews with Australian music developed by the Audio Video Coding Stan- fans demonstrated a continuum in behaviour dard Working Group of China. This was to between free downloading and purchase: be presented by Ying Sha (Chinese Academy most interviewees combined freely-obtained of Sciences, China), but he was unable to and purchased music depending on a variety travel to Australia and was represented by of factors including the availability of their compatriot Bin Zhu (Microsoft Research preferred forms of music, their financial Asia). Kurt Maly (Old Dominion University, means and their level of familiarity with a USA) presented a comparative study of two particular artist. languages not widely considered in the digi- tal rights management literature, the eXtensi- Panel session ble Access Control Markup Language The panel session brought together technical (XACML) and the Policy Core Information and legal minds to discuss the subject Is Re- Model (PCIM). liable and Trusted DRM Realistic or Even Possible? Discussion could no doubt con- Paul Koster (Philips Research, the Nether- tinue almost indefinitely on such a provoca- lands) proposed to introduce “user-attributed tive topic but we had to discuss what we rights” that allow users to control the way could in an hour. content which has been purchased is shared amongst their family, friends, etc. without in- The panel was chaired by Bill Caelli (Queen- terfering with the rights of the original con- sland University of Technology, Australia). tent owner. Ezzy Dabbish (Motorola, USA) and Bin Zhu (Microsoft Research Asia) presented the Legal and social aspects technical side, while the legal view was rep- Brian Fitzgerald (Queensland University of resented by David Vaile (Baker & Mackenzie Technology, Australia) presented further de- Cyberlaw and Policy Centre, Australia), tails of the Sony vs. Stevens case. This case Philip Argy (Mallesons Stephen Jaques, Aus- addresses the question of whether or not re- tralia) and Susanna Leisten (Queensland gion-coding devices -- such as those used in University of Technology, Australia). the Sony PlayStation -- are to be considered It seems fair to say that the general view of “technological protection measures” under the technical community involved is that copyright. Current case law in Australia DRM systems will exist and their reliability holds that they are not, but Fitzgerald warns and trustworthiness will be possible within that amendments guided by the recent Aus- certain parameters – no security system will tralia-US Free Trade Agreement may result ever be perfectly secure in itself, but it can be in unforeseen control over the use of prod- secure enough to serve its purpose given the ucts being handed to multi-national corpora- right legal and other support. tions.

INDICARE Monitor Vol. 2, No 10, 23 December 2005 18

The views of legal side were less unified. security. Hongmei Liu (Sun Yat-Sen Univer- While Leisten outlined the negative effects of sity, China) presented two papers. One is strict regimes for protection of digital rights, about a scheme for reversible semi-fragile Argy viewed DRM systems as a natural evo- image authentication that is able to locate lution of property protection systems. Vaile any tampered areas but is tolerant to JPEG questioned the possibility of DRM systems compression. Another is DC coefficient- that can provide fair use. based video watermarking compliant to MPEG-2 bit stream without any additional Cryptography payload. Yongwha Chung (Korea University, Broadcast encryption has become an impor- Korea) presented a case using robust and tant cryptographic primitive for conditional fragile watermarking (dual watermarking) for access and digital rights management sys- the communication of fingerprints. The ro- tems. Miodrag Mihaljević (Serbian Academy bust watermark may be used to identify of Science and Arts) presented one paper de- source devices. Clark Thomborson (Univer- scribing potential weaknesses in certain sity of Auckland, New Zealand) introduced broadcast encryption schemes, and another software watermarking as a means of pre- describing a new scheme with improved effi- venting software from piracy and unauthor- ciency and greater security than previous ised modification and presented an improved schemes. Ulrich Greveler (Ruhr University version of the QP algorithm through register Bochum, Germany) presented a new scheme allocation. offering unconditional cryptographic security at the cost of allowing a few free-riders. Systems The last day of the conference was mostly Jacques Fournier (GEMPlus S.A., France) given over to proposals for complete digital showed how cryptographic operations can be rights management systems. Bin Zhu (Micro- vectorised for efficient implementation on soft Research Asia, China) presented two embedded systems such as smartcards. systems, one for a privacy- and copyright- Tamper-resistance respecting peer-to-peer network and another for scaling the quality of content according to The security of digital rights management the user’s willingness to pay for it. Another systems depends on the inability of attackers copyright-respecting peer-to-peer service to reverse-engineer and modify sensitive was presented by Kyung-Hyune Rhee (Pu- hardware and software components. Ma- kyong National University, Korea). hadevan Gomathisankaran (University of Iowa, USA) presented an architecture for Ulrich Greveler (Ruhr University Bochum, verifying the correctness of systems without Germany) discussed several methods of en- requiring the verifier itself to be given sensi- forcing regional access to pay-TV broadcasts tive information about the system. Brian Bli- and concluded that, even though deployment etz (University of Iowa, USA) presented a of trusted hardware is considered the stan- software tamper-resistance system based on dard requirement for digital rights manage- extending the power of small, heavily- ment systems, trusted hardware was not nec- obfuscated process to a larger process that essarily the best solution in this scenario. performed the real function of the software. Valery Pryamikov (Harper Security Consult- Bottom line ing AS, Norway) presented a new method of DRMTICS provides a forum where all re- preventing reverse-engineering of software searchers from all disciplines with an interest based on transforming a programme’s func- in digital rights management can come to- tion call tree. gether and share their views and ideas. While technical presentations decidedly out- Watermarking numbered the other presentations at this Watermarking continues to be one of the ac- year’s conference, both technical and non- tive research topics with extended applica- technical disciplines were well-represented tions from multimedia security to software amongst the conference delegates. As noted

INDICARE Monitor Vol. 2, No 10, 23 December 2005 19

in another INDICARE conference review tal rights management. Hopefully DRMTICS (Kerényi 2005), a healthy exchange between 2005 represents a good start to a significant the technical and non-technical communities event on the annual DRM calendar. is essential to successful deployment of digi-

Sources ► DRMTICS Conference Page: http://www.titr.uow.edu.au/DRMTICS2005/ ► DRMTICS (2006): Proceedings will be available in Springer’s Lecture Notes in Computer Science se- ries; http://www.springer.com/lncs ► IACR (International Association for Cryptologic Research): http://www.iacr.org ► IEEE Computer Society Task Force on Information Assurance: http://www.ieeeia.org ► Kerényi, Kristóf (2005): DRM researchers do not disregard consumer acceptability any more: http://www.indicare.org/tiki-read_article.php?articleId=157 About the author: Rei Safavi-Naini is a Professor in computer security at the University of Wol- longong, Australia and is the Programme Chair of DRMTICS 2005 as well as the ACM Work- shop on Digital Rights Management 2005. Contact: +61 2 4221 3800, [email protected]. Wan- qing Li and Nicholas Sheppard are academic staff at the University of Wollongong and are the General Co-Chairs of DRMTICS 2005. Contact: +61 2 4221 5410, [email protected] and +61 2 4221 3788, [email protected]. Status: first posted 15/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=160

Axmedis plus = technology + users + consumers By: Gergely Tóth, SEARCH Laboratory, Budapest, Hungary A report on the 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distribution (Axmedis 2005) Abstract: INDICARE was present at the Axmedis 2005 Conference in Florence from November 30 to December 2. The conference was organised by the Axmedis project, aiming at bringing together representatives of different fields related to cross-media. Besides the traditional scien- tific and industry-inspired talks, presentations focusing more or less on the consumers’ point of view (e.g. interoperability or consumer protection) found their way into the programme. Keywords: conference report - business models, collecting societies, DRMS, EU project, inter- operability, privacy, standards, stakeholders, users

Introduction agement, it is particularly relevant concern- The Axmedis project (cf. sources) aims at re- ing INDICARE. ducing the cost of cross-media production To fulfil its objectives the project organized and distribution, at searching for and inte- the Axmedis 2005 Conference with the title grating objects and components and at man- 1st International Conference on Automated aging and monitoring distribution. Axmedis Production of Cross Media Content for is an integrated project (IP), funded by the Multi-channel Distribution in Florence from European Commission under the 6th Frame- November 30 to December 2, 2005. The work’s Information Society Technologies three-day conference provided a rich pro- (IST) programme, with Paolo Nesi from the gramme. The speakers came from a wide University of Florence as its co-ordinator. range of organisations, thus researchers, Since the project specifically aims at devel- delegates from industry, regulators and also oping and providing methods and tools for consumer representatives were present. Dur- innovative and flexible Digital Rights Man- ing the course of the conference one uncer-

INDICARE Monitor Vol. 2, No 10, 23 December 2005 20

tain trend seemed to visualize for me: besides Security of DRM the regular scientific-, business- and indus- That Axmedis successfully brought together try-oriented issues, consumer-related talks parties with different goals and backgrounds could also be heard. Whether this marks the and that such presentations can form a sym- process of research and industry slowly tak- biotic whole (even following up Chiarig- ing the consumers’ view and requirements lione’s vision of a rational DRM) were into account or this was just the specialty of clearly illustrated by the next two talks given this conference and proof of the skills of the during the Content Security and Digital conference organisers remains to be seen. Rights Management session. On the first day after the welcome speeches Josep Domingo-Ferrer presented a solution an invited talk started the conference. After- on multicast fingerprinting and collusion se- wards the programme continued in three or curity. The main challenge solved was to even four parallel sessions. Besides the core equip multicast content with unique finger- Axmedis subjects including an Axmedis tu- prints, thus copy detection could be used torial track throughout the conference and the complementary to copy prevention. This so- "Axmedis Call for take up action", there was lution, which could find support in the tech- a panel on "The role of collecting societies in nology domain, naturally is objectionable the digital era" (see later), an extensive from the privacy (and thus the consumer’s) MPEG Workshop, a special session of the point of view (cf. presentation by Grimm EUAIN project (see later) and in addition the later). 3rd Virtual Goods Workshop, which was co- located with the conference (see later). By On the other hand Jose Prados explored the this approach it was possible to address the possibilities of interoperability of rights ex- subject matter not only from a technological pression languages (RELs) and protection point of view but from the point of users and mechanisms. In particular he analyzed how consumers too. The whole programme is the REL of OMA DRM 2 (cf. sources), i.e. available at the homepage of the conference ODRL (cf. sources) , and that of MPEG-21 and all papers are available in the conference (cf. sources) could be converted into each proceedings (Nesi et al. 2005). other. While the presentation focused mainly on technical issues, interoperability, i.e. to Due to this huge programme, I was not able rightfully consume protected content on any to attend all presentations, thus the following device was highlighted as one of the main report will just be a subjective glimpse of the consumer requirements for DRM. whole event. Nevertheless it has to be stated that the organisers did their best with the Collecting societies conference and the event progressed The panel session "The role of collecting so- smoothly. cieties in the digital era"’ provided an inter- esting insight into the challenges these or- Invited talk ganisations face with the switch to the digital After the welcome talks the conference content gaining momentum in the 21st cen- started with the invited talk by Leonardo tury. Chiariglione from the DMP project (cf. Jeges and Kerényi 2005). In his talk Chiariglione Maila Sansaini from IMAIE analysed DRM argued that the protection of intellectual from the point of view of a collecting soci- property should be in balance with its use. ety. While DRM can protect against privacy Nowadays, when analogue is shifting to digi- by applying technical measures, helping in tal and thus the challenge of managing scar- identifying works and allowing payment for city is changing to managing abundance he the content it still has deficiencies: current proposed a rational DRM architecture, which solutions are not interoperable; they do not is both scalable and interoperable and com- ensure equal remuneration of copyright and posed of standard technology and equipment. neighbouring rights holders and can also be cracked.

INDICARE Monitor Vol. 2, No 10, 23 December 2005 21

Dominic McGonigal from PPL, UK, did not In his presentation Stephen Saunders evalu- analyze DRM, he rather chose the approach ated the current shift in the music industry of introducing the operation and problems of from distributing music through retail stores a collecting society to the audience. By de- towards the thousand-faceted digital distribu- scribing the internal processes of his organi- tion. His argument was that it was high time sation, how the huge volume of music con- to start to change the way music is regarded: tent is managed, how licences are stored and industry should move from thinking of music usage information is processed in order to as a good to using it as a service with differ- distribute income between producers and ent service levels for different users. performers, DRM architecture designers Prof. Rüdiger Grimm, University of Koblenz could gain insight into the life of a poten- (formerly at TU Ilmenau) introduced the re- tially important DRM system user. sults of an analysis aiming at evaluating pri- vacy issues during DRM usage (Grimm et al. Accessibility 2005). Although DRM systems’ main goal is Another session focusing mainly on the con- to enforce copyright, they are sometimes also sumer was related to the interconnection of used for recognition of bad behaviour, to de- DRM and accessibility. This track was as- liver personalized watermarks and other signed to EUAIN, the European Accessible technological methods interfering with pri- Information Network (cf. sources). vacy. Grimm presented results of data flow In the first talk David Crombie introduced evaluations with concrete DRM architectures the core idea behind EUAIN. He emphasized before completing a deal, at checkout, while that current practice is to apply quick fixes to checking the right during consumption, fill the gaps in order to achieve accessibility, through special services and even through while in the long term accessibility can only hidden interfaces. be achieved if it is managed as a process Another presentation, given by Matthias throughout the life-cycle of a product. This Spielkamp from iRights.info strengthened the change of mind is promoted by EUAIN, and consumer representation at Axmedis. He in- IST-funded project to promote eInclusion as troduced this German organisation which a horizontal building block in the establish- aims at delivering information about legal ment of the information society. aspects of DRM to the consumers. The main Roger Lenoir continued by exploring the goal is to inform the users about the legal possibilities and achievements of open soft- background of typical use cases (e.g. ware and open standards as tools for accessi- downloading content from a peer-to-peer bility. In his presentation he compared the network or ripping a CD) in an independent associations representing visually impaired way. people with the open source communities, where in both cases voluntary work domi- Bottom line nates. Finally, Lenoir introduced some cur- The Axmedis 2005 conference presented a rent projects (DAISY, NIMAS, WCAG) fo- good mix of research- or industry-driven and cusing on accessibility. consumer-oriented talks. Although the pro- ject itself was mainly technology focused, Virtual Goods Workshop the organisers did a great job in inviting a This year the Virtual Goods Workshop was broad spectrum of presenters. As an advocate co-located with the Axmedis 2005 Confer- of the INDICARE project who is always ence. This series of workshops focuses on the looking at the end-users’ point of view when multi-disciplinary assessment of existing it comes to DRM and generally to multime- DRM technologies and business models. Un- dia-relates issues, I am looking forward to fortunately I could not attend the whole the next Axmedis conference in December workshop, only the first part, thus the follow- 2006 to see whether the shift towards a more ing is a partial overview of this year’s event. consumer-centric view will further evolve. Could it be that this conference marked the start of a larger trend? I do hope so.

INDICARE Monitor Vol. 2, No 10, 23 December 2005 22

Sources ► Axmedis project: http://www.axmedis.org ► Axmedis 2005 conference: http://www.axmedis.org/axmedis2005/ ► Digital Media Project (2005): http://www.dmpf.org ► European Accessible Information Network: http://www.euain.org/modules/wfsection/ ► Grimm, Rüdiger et al. (2005): privacy4DRM Datenschutzverträgliches und nutzungsfreundliches Digi- tal Rights Management: http://www.datenschutzzentrum.de/drm/privacy4drm.pdf ► iRights.info – Urheberrecht in der digitalen Welt: http://www.irights.info/ ► ISO/IEC JTC1/SC29/WG11/N5231 MPEG-21 Coding of moving pictures and audio: http://www.chiariglione.org/mpeg/standards/mpeg-21/mpeg-21.htm ► Jeges, Ernő and Kerényi, Kristóf (2005): Digital Media Project – Part II: Chances of an open standard. INDICARE Monitor, Vol. 2, no 6, August 2005; http://www.indicare.org/tiki- read_article.php?articleId=134 ► Nesi, Paolo; Ng, Kia; Delgado, Jaime (eds.) (2005): Proceedings of the 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distribution, IEEE Computer Society, 2005 ► ODRL: http://www.odrl.org/ ► Open Mobile Alliance – Digital Rights Management V2.0 Candidate Enabler: http://www.openmobilealliance.com/release_program/drm_v2_0.html About the author Gergely Tóth is a PhD student at the Budapest University of Technology and Economics in the SEARCH Laboratory. Besides Digital Rights Management his core interests include security and privacy. You can contact him at [email protected] Status: first posted 20/12/05; licensed under Creative Commons URL: http://www.indicare.org/tiki-read_article.php?articleId=161

INDICARE Monitor Vol. 2, No 10, 23 December 2005 23

Masthead

The INDICARE Monitor is an electronic periodical of the EU-funded project INDICARE being published every last Friday of a month. Articles having passed an internal review process are immediately posted at the INDICARE homepage for public debate. Authors are encouraged to revise their articles in the light of previous discussion before publication in the monthly issue. X You can use the RSS-feed to get articles as soon as they are posted. X You can subscribe to the INDICARE Monitor, and receive an e-mail notification containing the con- tents page (title, author, abstract, and URLs) and a link to the pdf-version (this service replaces the bi- weekly INDICARE newsletter). Just type in your e-mail address at the INDICARE Website and Go!, or send an empty e-mail to: [email protected] X The INDICARE Monitor Archive offering all issues in HTM and PDF is available at http://www.indicare.org/tiki-page.php?pageName=IndicareMonitor X The INDICARE Homepage: http://www.indicare.org/ Editorial Team: The Editorial Team currently consists of Knud Böhle, Institute for Technology Assessment and Systems Analysis (ITAS), Karlsruhe, Germany (Editor); Michael Rader, also from ITAS (Copy-Editor); Nicole Dufft, Berlecon Research GmbH, Berlin, Germany (Co-Editor business); Natali Helberger, Institute for Information Law, Amsterdam, The Netherlands (Co- Editor legal), and Kristóf Kerényi, SEARCH Laboratory of Budapest University of Technology and Economics (Co-Editor technology). Editorial policy: The INDICARE Monitor is an English language periodical publishing original works. The editorial policy attempts to be balanced, unbiased, neutral, and non-partisan, not ex- cluding however provocative, pointing and sometimes even lopsiding contributions. Articles are written by INDICARE staff and external experts. The style is intended to be analytical, concise, compact, and written in a language comprehensible for non-experts. The expected length of an article is between 5000 and 10.000 characters. The INDICARE Monitor is available for free. Copyright: All original works of the INDICARE Monitor unless otherwise noted are copyright protected and licensed under a Creative Commons License allowing others to copy, distribute, and display articles of the INDICARE Monitor a) if the author is credited, b) for non-commercial purposes only , and c) not with respect to derivative works based upon the original article. Disclaimer: The views and opinions expressed in the articles of INDICARE Monitor do not nec- essarily reflect those of the European Commission and the INDICARE consortium or partners thereof. All articles are regarded as personal statements of the authors and do not necessarily reflect those of the organisation they work for. Acknowledgment: The INDICARE Monitor is an activity of the INDICARE project, which is fi- nancially supported as an Accompanying Measure under the eContent Programme of Directorate General Information Society of the European Commission (Reference: EDC - 53042 INDICARE /28609). Contact Knud Böhle (Editor) Institute for Technology Assessment and Systems Analysis (ITAS) Phone: +49 (0)7247/82-2989 (-2501) Fax : +49 (0)7247/82-4806 E-Mail: [email protected]

INDICARE Monitor Vol. 2, No 10, 23 December 2005 24