Create an Account
username: password:
 
  MemeStreams Logo

Analysis of Security Vulnerabilities in the Movie Production and Distribution Process

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Analysis of Security Vulnerabilities in the Movie Production and Distribution Process
Topic: Intellectual Property 9:25 pm EST, Dec 23, 2003

Our research attempts to determine the source of unauthorized copies by studying the availability and characteristics of recent popular movies in file sharing networks.

77% appear to have been leaked by industry insiders; consumer DVD copying currently represents a relatively minor factor compared with insider leaks.

We analyze the movie production and distribution process, identify potential vulnerabilities, and offer recommendations.

...

We hope you have enjoyed this tour through evidence of successful insider attacks against the movie industry and will be well equipped to watch out for it in future with utmost vigilance. The alert amongst you will already have discovered how to replicate all the observations made on this page in order to verify our results. We believe that analyses such as ours that have important consequences for policy and technology should be verifiable independently and encourage our readers to partake in this activity.

Lorrie Faith Cranor is a co-author of this paper published in the proceedings of the 2003 ACM Workshop on DRM.

Analysis of Security Vulnerabilities in the Movie Production and Distribution Process



 
 
Powered By Industrial Memetics
RSS2.0