SlideShare a Scribd company logo
Copyright and Technology 2011

        November 30, 2011




                 1
Opening Remarks

          Bill Rosenblatt
GiantSteps Media Technology Strategies
        www.giantstepsmts.com
        www giantstepsmts com
        billr@giantstepsmts.com
       Twitter: @copyrightandtec
             +1 212 956 1045
                    2
www.giantstepsmts.com




           3
www.copyrightandtechnology.com




               4
www.gothammediaventures.com




              5
What Are We Discussing Today?




               8
Interface between Copyright and
              Technology
              T h l
Digital technology used to make and distribute copies
 at virtually no cost
Copyright i d t responses, all i t l t d
C      i ht industry           ll interrelated:
  – Legal
  – Technological
  – Economic
  – Education



                           9
Technologies to Affect Copyright

     Content access control
        – DRM
        – Conditional Access
     Content identification
        – Filtering
        – License/royalty management
     Rights registries


                     10
Legal Concepts that Affect These
         Technologies
         T h l i
    Fair Use
    First Sale
    Secondary infringement liability
    Network service provider liability
                      p               y
    Anticircumvention legislation
    Blanket licensing of content


                     11
Technologies




      12
Digital Rights Management




            13
DRM is a “troubled”* technology…

             Why?



                     *Jaron Lanier, You Are Not a Gadget, 2010

                14
Factors Inhibiting DRM Success*

 Market:                                 Architecture:
   – Economic incentives                       – Technological innovation
     misaligned                                  hampered
   – Commercial content must
     compete with free/illegal
 Norms:                                  Laws:
   – Users don’t see value in                  – Laws not amenable to
     choices of offers                           technological implementation
   – Norms distorted by
     architecture (technology)

                  *Based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90
                                       15
Market:
   Economic Incentives Misaligned
   E     i I     ti    Mi li d
Content owners demand DRM but rarely pay for it
Device makers and network operators use it to suit
 their
 th i own purposes
Consumers have only indirect market influence




                         16
Norms:
Consumers Don’t Yet See Value in N Models
C         D ’t Y t S V l i New M d l
                             Radio
  ulations




                      Record Store
 Legacy




                              VCR
Emu




                         Bookstore
                 Free/Limited VOD
Dig Native




             Paid Subscription VOD
    New,
  gital




             Free/Limited OD Music
                Paid Sub OD Music
                                     0    10      20     30      40      50     60   70

                                               Million U.S. Users (estimated)

                                     17
Norms:
 Users Influenced towards Infringing B h i
 U     I fl     dt     d I f i i Behavior
Definition of DRM commandeered by the press
      – Narrower than original definitions
      – Yet broadened to apply to any technology that restricts user
        behavior in any way1
Notion that DRM  Big Media  Evil/Obsolete
Romanticism & rationalization of hacker/pirate ethic
“Lords f the Cloud” t the “free d
“L d of th Cl d”2 get th “f and open” PR3  ”
1C. Doctorow, M. Masnick, etc.
2J
 Jaron Lanier, Y A Not a Gadget
       L i You Are N t G d t
3Robert Levine, Free Ride
                                     18
Architecture:
Technological I
T h l i l Innovation Hampered
                    ti H    d
  Lack of revenue for DRM vendors
  Venture capital scared off
    – B d press
      Bad
    – Non-sexy topic
  Researchers scared off
  R      h         d ff
    – RIAA actions against Prof. Ed Felten in 1999
    – DRM research “politically incorrect” in U S
                     politically incorrect    U.S.



                         19
The Rights Technologies R&D Imbalance
450                                          70


400
                                             60

350
                                             50
300


250                                          40


200                                          30
                                                  2009 Gross Expen‐
                                                  ditures on R&D 
150                                               ($Billion)
                                             20   RT R&D Output 
                                                  RT R&D Output
100                                               (Research Papers)

                                             10
 50                                               RT R&D Index

  0                                          0




      Device Producers   Content Producers
                                                       Sources: O C IMF
                                                       S        OECD,


                         20
Laws Not Amenable to
      Technological Implementation
      T h l i lI l          t ti
 Fair Use laws not amenable to automation
 Privacy and due process are important but become obstacles
 Anticircumvention laws reduce incentive to develop effective
  technologies
   – Liability solely on the hacker
             y      y
   – Effectiveness of TPM/DRM irrelevant to applicability of law
     (per Universal v Reimerdes, 2000)




                                   21
Yet DRM Is Alive Today…

          Downloads            Real Time Delivery
E-books   Yes                  “Screenshot DRM”
                               (page images)

Music     Mobile device        Usually
          “offline listening   (stream encryption)
          mode”
             d ”
Video     Yes                  In most release
                               windows
                               (stream encryption)
                               (t             ti )




                     22
Will DRM Die?
Not Wh
N t When It Enables N Models
            E bl New M d l
  Digital music downloads: iTunes (originally)
  Premium pay-per-view TV
  E l release window fil
   Early l        i d films
  Music subscription services:*
   Rhapsody, MOG Rdi S tif P i
   Rh      d MOG, Rdio, Spotify Premium
  Subsidized-content ecosystems:
   boinc (music) Amazon Prime (e book a month)
         (music),                (e-book-a-month)
  Library e-book lending: OverDrive, BlueFire
                              *Yes they do – they just don’t call it “DRM”
                         23
Content Identification




           24
Techniques for Identifying Content

           Watermarking
           Fingerprinting




                  25
Watermarking

Inserting/embedding data into “noise” portions of
                                  noise
 image, audio, or video signal
Data capacity: typically a few dozen bytes
Technology appeared in mid-to-late 1990s
  – First for digital images
  – Audio and video later




                               26
Fingerprinting
Examining content to determine its identity
   – Compute a set of numbers (“fingerprints”)
   – Look up in database, see if there’s a match
Based on mathematical concept of hashing
   – But allows for different files that look/sound the same
   – Can compensate for certain transformations:
     excerpting, cropping, audio distortion, etc.
History:
       y
   – 2002: Introduced for music during Napster litigation
   – 2006: Video fingerprinting introduced
   – 2007 “T t fi
     2007: “Text fingerprinting” (Att ib t ) adopted b AP
                         i ti ” (Attributor) d t d by
                              27
Content Identification
        Business B fit
        B i      Benefits
Detecting and deterring unauthorized use
Tracking content usage
Discovery & recommendations
Increasing Internet ad revenue
          g
Managing assets and integrating systems
Monetizing transformational content uses


                    28
Legal Developments
…and their Technical Solutions




               29
Legal Developments

Network operator liability
“Free riding”
Digital First Sale




             30
Network Operator Liability

Secondary liability
   – Contributory: aiding and abetting infringement
   – Vicarious: “looking the other way” and benefiting from it
                 looking           way
   – Inducement: inducing others to infringe as business model
ISP Liability
   – Notice and takedown (DMCA 512)
   – Graduated/Progressive Response a/k/a “three strikes”
                   g            p
     (France, South Korea, Taiwan, New Zealand, UK)
   – Center for Copyright Information, USA

                               31
Technical Solutions

   Fingerprinting
   Watermarking
   Traffic analysis




           32
“Free Riding”

Monetizing links to copyrighted content
Posting links to illegal content (e.g. in cyberlockers)
Monetizing content appearing in search results
“Cloud sync” services(?)
         y              ()




                            33
Technical Solutions

Fingerprinting & search
Tagging content with “beacon” metatags – AP hNews
Tagging content with rules for indexing and search
 results – ACAP




                         34
Digital First Sale

First Sale: Section 109 of U.S. copyright law
                             US
Known as “Exhaustion” in other countries
If you obtain a copyrighted work legally,
 you can do what you want with it
Applicability to digital downloads is unclear
Copyright Office punted on it in 2001 report
Downloads covered under licenses, not copyright

                        35
Technical Solutions

 Forward
“Forward and delete” DRM like functionality
               delete DRM-like
Described in 2001 Copyright Office paper
Implemented by startup ReDigi
Described in IEEE P1817 standard for
 “Consumer Ownable Digital Personal Property”




                      36
Thanks to our Sponsors




           40
Thanks to our Media Sponsors




              41
And finally…




      42
Recommended Reading




   Robert Levine, Free Ride
               43

More Related Content

What's hot

BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...imec.archive
 
Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019
Paperjam_redaction
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
Cat Van Khoi
 
Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Chris Upjohn
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and Directions
Bob Rhubart
 

What's hot (7)

Drm
DrmDrm
Drm
 
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
 
Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
 
Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and Directions
 

Similar to Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt

Policy Challenges Around Digital Copyright
Policy Challenges Around Digital CopyrightPolicy Challenges Around Digital Copyright
Policy Challenges Around Digital Copyright
GiantSteps Media Technology Strategies
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
GiantSteps Media Technology Strategies
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
Aram Sinnreich
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
Chapter14.ppt
Chapter14.pptChapter14.ppt
Chapter14.ppt
TaufikIqbalR1
 
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Gerd Leonhard
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB Tools
Francois Lefebvre
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
Su Little
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updated
Jyrki Kasvi
 
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_sourceCc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
William Kraemer, MIT, MPS
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Paolo Nesi
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
Carlos Serrao
 
CoDe RTD - Presentation Deck
CoDe RTD - Presentation DeckCoDe RTD - Presentation Deck
CoDe RTD - Presentation Deck
Paolo Costanzo
 
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
Api days 2014  from theatrophone to ap is_the 2020 telco challenge_Api days 2014  from theatrophone to ap is_the 2020 telco challenge_
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
Luis Borges Quina
 
Free Software for Radio Broadcasting
Free Software for Radio BroadcastingFree Software for Radio Broadcasting
Free Software for Radio Broadcasting
Francois Lefebvre
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source Panel
Mike Linksvayer
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
GiantSteps Media Technology Strategies
 

Similar to Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt (20)

Policy Challenges Around Digital Copyright
Policy Challenges Around Digital CopyrightPolicy Challenges Around Digital Copyright
Policy Challenges Around Digital Copyright
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Chapter14.ppt
Chapter14.pptChapter14.ppt
Chapter14.ppt
 
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB Tools
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updated
 
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_sourceCc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
CoDe RTD - Presentation Deck
CoDe RTD - Presentation DeckCoDe RTD - Presentation Deck
CoDe RTD - Presentation Deck
 
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
Api days 2014  from theatrophone to ap is_the 2020 telco challenge_Api days 2014  from theatrophone to ap is_the 2020 telco challenge_
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
 
Free Software for Radio Broadcasting
Free Software for Radio BroadcastingFree Software for Radio Broadcasting
Free Software for Radio Broadcasting
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source Panel
 
E commerce
E commerceE commerce
E commerce
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 

More from GiantSteps Media Technology Strategies

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
GiantSteps Media Technology Strategies
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
GiantSteps Media Technology Strategies
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
GiantSteps Media Technology Strategies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
GiantSteps Media Technology Strategies
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
GiantSteps Media Technology Strategies
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
GiantSteps Media Technology Strategies
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
GiantSteps Media Technology Strategies
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
GiantSteps Media Technology Strategies
 
Ben Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & MangesBen Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & Manges
GiantSteps Media Technology Strategies
 

More from GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Ben Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & MangesBen Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & Manges
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt

  • 1. Copyright and Technology 2011 November 30, 2011 1
  • 2. Opening Remarks Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com www giantstepsmts com billr@giantstepsmts.com Twitter: @copyrightandtec +1 212 956 1045 2
  • 6. What Are We Discussing Today? 8
  • 7. Interface between Copyright and Technology T h l Digital technology used to make and distribute copies at virtually no cost Copyright i d t responses, all i t l t d C i ht industry ll interrelated: – Legal – Technological – Economic – Education 9
  • 8. Technologies to Affect Copyright Content access control – DRM – Conditional Access Content identification – Filtering – License/royalty management Rights registries 10
  • 9. Legal Concepts that Affect These Technologies T h l i Fair Use First Sale Secondary infringement liability Network service provider liability p y Anticircumvention legislation Blanket licensing of content 11
  • 12. DRM is a “troubled”* technology… Why? *Jaron Lanier, You Are Not a Gadget, 2010 14
  • 13. Factors Inhibiting DRM Success*  Market:  Architecture: – Economic incentives – Technological innovation misaligned hampered – Commercial content must compete with free/illegal  Norms:  Laws: – Users don’t see value in – Laws not amenable to choices of offers technological implementation – Norms distorted by architecture (technology) *Based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90 15
  • 14. Market: Economic Incentives Misaligned E i I ti Mi li d Content owners demand DRM but rarely pay for it Device makers and network operators use it to suit their th i own purposes Consumers have only indirect market influence 16
  • 15. Norms: Consumers Don’t Yet See Value in N Models C D ’t Y t S V l i New M d l Radio ulations Record Store Legacy VCR Emu Bookstore Free/Limited VOD Dig Native Paid Subscription VOD New, gital Free/Limited OD Music Paid Sub OD Music 0 10 20 30 40 50 60 70 Million U.S. Users (estimated) 17
  • 16. Norms: Users Influenced towards Infringing B h i U I fl dt d I f i i Behavior Definition of DRM commandeered by the press – Narrower than original definitions – Yet broadened to apply to any technology that restricts user behavior in any way1 Notion that DRM  Big Media  Evil/Obsolete Romanticism & rationalization of hacker/pirate ethic “Lords f the Cloud” t the “free d “L d of th Cl d”2 get th “f and open” PR3 ” 1C. Doctorow, M. Masnick, etc. 2J Jaron Lanier, Y A Not a Gadget L i You Are N t G d t 3Robert Levine, Free Ride 18
  • 17. Architecture: Technological I T h l i l Innovation Hampered ti H d Lack of revenue for DRM vendors Venture capital scared off – B d press Bad – Non-sexy topic Researchers scared off R h d ff – RIAA actions against Prof. Ed Felten in 1999 – DRM research “politically incorrect” in U S politically incorrect U.S. 19
  • 18. The Rights Technologies R&D Imbalance 450 70 400 60 350 50 300 250 40 200 30 2009 Gross Expen‐ ditures on R&D  150 ($Billion) 20 RT R&D Output  RT R&D Output 100 (Research Papers) 10 50 RT R&D Index 0 0 Device Producers Content Producers Sources: O C IMF S OECD, 20
  • 19. Laws Not Amenable to Technological Implementation T h l i lI l t ti  Fair Use laws not amenable to automation  Privacy and due process are important but become obstacles  Anticircumvention laws reduce incentive to develop effective technologies – Liability solely on the hacker y y – Effectiveness of TPM/DRM irrelevant to applicability of law (per Universal v Reimerdes, 2000) 21
  • 20. Yet DRM Is Alive Today… Downloads Real Time Delivery E-books Yes “Screenshot DRM” (page images) Music Mobile device Usually “offline listening (stream encryption) mode” d ” Video Yes In most release windows (stream encryption) (t ti ) 22
  • 21. Will DRM Die? Not Wh N t When It Enables N Models E bl New M d l  Digital music downloads: iTunes (originally)  Premium pay-per-view TV  E l release window fil Early l i d films  Music subscription services:* Rhapsody, MOG Rdi S tif P i Rh d MOG, Rdio, Spotify Premium  Subsidized-content ecosystems: boinc (music) Amazon Prime (e book a month) (music), (e-book-a-month)  Library e-book lending: OverDrive, BlueFire *Yes they do – they just don’t call it “DRM” 23
  • 23. Techniques for Identifying Content Watermarking Fingerprinting 25
  • 24. Watermarking Inserting/embedding data into “noise” portions of noise image, audio, or video signal Data capacity: typically a few dozen bytes Technology appeared in mid-to-late 1990s – First for digital images – Audio and video later 26
  • 25. Fingerprinting Examining content to determine its identity – Compute a set of numbers (“fingerprints”) – Look up in database, see if there’s a match Based on mathematical concept of hashing – But allows for different files that look/sound the same – Can compensate for certain transformations: excerpting, cropping, audio distortion, etc. History: y – 2002: Introduced for music during Napster litigation – 2006: Video fingerprinting introduced – 2007 “T t fi 2007: “Text fingerprinting” (Att ib t ) adopted b AP i ti ” (Attributor) d t d by 27
  • 26. Content Identification Business B fit B i Benefits Detecting and deterring unauthorized use Tracking content usage Discovery & recommendations Increasing Internet ad revenue g Managing assets and integrating systems Monetizing transformational content uses 28
  • 27. Legal Developments …and their Technical Solutions 29
  • 28. Legal Developments Network operator liability “Free riding” Digital First Sale 30
  • 29. Network Operator Liability Secondary liability – Contributory: aiding and abetting infringement – Vicarious: “looking the other way” and benefiting from it looking way – Inducement: inducing others to infringe as business model ISP Liability – Notice and takedown (DMCA 512) – Graduated/Progressive Response a/k/a “three strikes” g p (France, South Korea, Taiwan, New Zealand, UK) – Center for Copyright Information, USA 31
  • 30. Technical Solutions Fingerprinting Watermarking Traffic analysis 32
  • 31. “Free Riding” Monetizing links to copyrighted content Posting links to illegal content (e.g. in cyberlockers) Monetizing content appearing in search results “Cloud sync” services(?) y () 33
  • 32. Technical Solutions Fingerprinting & search Tagging content with “beacon” metatags – AP hNews Tagging content with rules for indexing and search results – ACAP 34
  • 33. Digital First Sale First Sale: Section 109 of U.S. copyright law US Known as “Exhaustion” in other countries If you obtain a copyrighted work legally, you can do what you want with it Applicability to digital downloads is unclear Copyright Office punted on it in 2001 report Downloads covered under licenses, not copyright 35
  • 34. Technical Solutions  Forward “Forward and delete” DRM like functionality delete DRM-like Described in 2001 Copyright Office paper Implemented by startup ReDigi Described in IEEE P1817 standard for “Consumer Ownable Digital Personal Property” 36
  • 35. Thanks to our Sponsors 40
  • 36. Thanks to our Media Sponsors 41
  • 38. Recommended Reading Robert Levine, Free Ride 43