JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2001

CYBER-SOCIETY-LIVE 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: Copy This! Can 'Military' Technology Beat Digital Piracy?

From:

John Armitage <[log in to unmask]>

Reply-To:

The Cyber-Society-Live mailing list is a moderated discussion list for those interested <[log in to unmask]>

Date:

Wed, 14 Mar 2001 08:35:32 -0000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (302 lines)

http://www.inside.com/jcs/Story?article_id=25476&pod_id=13

Copy This! Can 'Military' Technology Beat Digital Piracy?
Roger Parloff

3/12/2001 6:6

A small Austin start-up run by intelligence community alums is parachuting
into the burgeoning,
post-Napster, copy-protection market with a remarkably thin, invisible
software product that claims
to offer nearly invincible armor for music, video, film and e-books alike.
But the most remarkable
part is, it fights back at would-be pirates.

''If you try to hack it, it destroys itself,'' explains company CEO George
Friedman. Hasta la vista,
John Perry Barlow!

Friedman's company, Infraworks Corporation, has its roots in the military,
where the operating
motto certainly has never been ''Information Wants to Be Free,'' but
something along the lines of
''Loose Lips Sink Ships.'' Infraworks is chaired by former Secretary of
Defense and National
Security Adviser Frank Carlucci, who also chairs The Carlyle Group merchant
bank and Nortel
Networks, the global communications firm. Friedman's own background is ''in
intelligence and
computer security,'' he says. The author of books on business intelligence
and the use of
technology in warfare, Friedman currently chairs the business intelligence
Web site Stratfor.com
(intelligence-speak for strategic forecasting).

Friedman first began grappling with digital-rights management problems, he
says, during Operation
Desert Storm, when the government feared that troops who received satellite
images on the
battlefield might forward them back home by e-mail as souvenirs. So the
problem was, Friedman
explains: ''Could we make (the image) sticky, so you couldn't do that? I
thought about it, working
on a solution for defense and intelligence purposes. Then I thought, that's
very nice, but Disney
pays more.''

In 1997 Friedman launched Infraworks, which soon began marketing a software
shredder -- a file
overwriter, really -- called Sanitizer. (It comes in two versions: one for
commercial uses and
another ''to meet military standards.'') But Infraworks is now beginning a
foray into copy protection
with an intriguing technology it calls InTether.

Evidently anticipating that his far-reaching claims about InTether might
strain credulity, Friedman
has obtained reports from two outside research groups -- the National
Software Testing
Laboratory in Conshohocken, Penn., and a more unusual body known as SPOCK --
generally
verifying that the software appears to behave as advertised. SPOCK, which
stands for Security
Proof-of-Concept Keystone, is a Department of Defense-sponsored consortium
which tests and
evaluates information-security technologies on behalf of 65 private security
firms and 19
government agencies.

The InTether system consists of a packager, used by the originator of a
file, and a receiver, used
by the recipient. The packager enables a publisher, record label, movie
studio -- or, for that matter,
a law firm, doctor's office, bank or anyone else who wants information
security -- to impose a set
of restrictions on almost any digital file. InTether, Friedman says, works
equally well with, for
instance, Word, Adobe Acrobat, Lotus or Excel documents, e-books, music,
video or
photographic files.

Using the packaging software, the originator can determine how many times
the recipient can view
or play the file; whether the recipient can alter it and send it to others;
the identity of permissible
recipients (determined by ID numbers and passwords); whether the file can be
printed freely, once,
or never; how long the file can be viewed or played (in hours and minutes);
the date on which the
file can first be opened; and the date on which, if the originator wishes,
the file will self-destruct
and vanish from the recipient's hard drive. (Version 2.0, one hopes, will
offer simulated smoke and
sizzling sounds for the full Mission: Impossible experience.)

To open an InTethered file, you need the InTether ''receiver.'' But that
software is so thin -- just 300
kilobytes -- that it can easily be sent along with the file itself.
Alternatively, it can be downloaded
from the Internet and installed in less than 15 minutes, according to
Infraworks and NSTL. (It took
me closer to five.) In contrast, to use Vivendi Universal's current
secure-music offering,
Bluematter -- which, of course, can currently be used for no purpose other
than listening to
Vivendi Universal music files -- the consumer must download about 6.5
megabytes of software
made by both Intertrust Technologies and Magex, a financial clearinghouse.
(It took me more
than a week to install the temperamental Magex software properly, including
three lengthy
customer service calls.)

Once the InTether receiver has been installed, you can open and use any
InTethered document
simply by accessing the application you would ordinarily use with such a
file -- Word, Excel,
RealJukebox, Windows Media Player, etc. From the perspective of the user,
the Infraworks
software is almost invisible, except that when viewing or playing an
InTethered document the
consumer will not be able to use certain commands -- typically, the
''copy,'' ''print,'' ''cut,'' ''paste''
and ''save as'' commands.

The InTether software can achieve these goals because it is ''basically an
add-on to the operating
system,'' Friedman explains. The receiver is anchored to the C drive, where
it cannot be moved or
copied, and it is ''cloaked'' to render it invisible to the Windows
operating system. (InTether
currently only works with Wintel machines, not Macs.) It also contains a
''vault,'' where InTethered
documents are stored. Although the InTether system does involve cryptography
-- InTethered files
are encrypted, and the receiver contains the key to decrypt them -- the
receiver does much more
than that. It places ''system-level controls on what you can do that are
persistent,'' Friedman says,
effectively overriding the operating system. It controls file operations and
manages the computer's
ports and devices in order to ''lock down'' files and disable the clipboard
and screen print functions.

For this reason, Friedman says, InTether can continue to protect files even
when they are open
and playing or being viewed on the computer -- the time when most
conventional encryption
schemes leave files vulnerable to theft. Accordingly, common screen-grabbers
or software
recording devices like Total Recorder -- which divert and copy music while
it is being played -- do
not work with InTether, according to Friedman. ''We're fairly deep in the
operating system,'' he
says, ''so we see what's going on and we either permit or deny it from
happening in relation ... to
the files under our control.''

But InTether's most intriguing features are those intended to rebuff
hackers. To begin with,
Friedman says, the system incorporates 11 layers of security defenses. ''All
have to be
successfully navigated'' in order to hack the system. ''But one piece does
nothing but check
continually the integrity of the other pieces,'' he says. ''If you could
disable a certain piece, within
milliseconds our system would know.''

At that point -- probably before, he says -- InTether begins taking counter
measures. One relatively
mild step, Friedman explains, is to force you to reboot your computer. Since
the fastest reboot is
about six minutes, he says, this defense alone creates a serious obstacle
for most automated,
so-called brute-force hacking tools, which ordinarily bombard a
digital-rights management
technology with 50,000 trial-and-error attacks per second. Forcing a
six-minute pause between
each attack ''shifts the advantage from the offense to the defense,''
Friedman maintains.

But if the hacker persists, and continues making ''aggressive'' attempts to
disable InTether's
defenses or pierce its vault, he'll get what Friedman calls ''the white
screen of death.'' His InTether
receiver, together with all the InTethered files stored inside it, will be
destroyed. Attacks ''would
have to be pretty aggressive and multiple'' in order to trigger the white
screen of death, Friedman
says, not so reassuringly.

In any event, a successful hack would not be irreversible, the way the
cracking of the DVD
scrambling system appears to have been. ''We expect it to be hacked,''
Friedman says, ''but it's
upgradeable. We expect to update the product regularly. We'll give customers
an upgraded
version, and the recipient has to upgrade. If he refuses, he can't open the
new data.''

Why in the world would you willingly install an InTether receiver on your
computer, given the way it
hobbles your control over your own computer? Because without it, you won't
be able to play or
view InTethered music, games, video, books or documents. (On the other hand,
if InTether does
spook you, you can uninstall it in seconds, using the standard Windows
Add/Remove function.)

My own very limited test run of the Infraworks system, using InTethered
Word, PDF, and plain text
documents, indicated that InTether did what it was supposed to do. Hardly a
technical
sophisticate, I attempted no hacks, and incurred no counterattacks. The
system did cause me
some temporary alarm, however. It turns out that when an InTethered file is
open -- say, a Word
document -- the user cannot copy, cut, paste, or print any other Word
document on his computer,
including those that have not been InTethered. That's because, Friedman
later explained, InTether
imposes restrictions at the application level. But once I closed the
InTethered file, the spell was
lifted, and all normal operations resumed.

In response to a detailed e-mail describing how InTether works, encryption
expert Bruce Schneier
responded dismissively, predicting in a sentence that InTether would fail.
Schneier, who is the
chief technology officer for Counterpane Internet Security, which provides
network security services
for businesses, appended a short essay of his, entitled, ''The Futility of
Digital Copy Prevention,''
which he apparently believes is sufficient to outline the inherent flaws of
all digital-rights
management technologies. ''Digital files cannot be made uncopyable, any more
than water can be
made not wet,'' Schneier proclaims in the essay. ''All digital copy
protection schemes can be
broken, and once they are, the breaks will be distributed -- law or no law.
Average users will be
able to download these tools from Web sites that the laws have no
jurisdiction over. Pirated digital
content will be generally available on the Web. Everyone will have access.''

Benighted though they may be, some corporate new-media executives appear to
be intrigued by
InTether. In the publishing arena, Time Inc., McGraw-Hill, R.R. Donnelley &
Sons and an
e-textbook company called ByteSizeBooks.com, are each evaluating it, they
confirm. (Though the
system allegedly works just as well with music, film and video, Friedman
says he is initially
focusing on the publishing industry and conventional commercial enterprises
with a need for
confidentiality -- i.e., banks, law firms and health care providers.)

Officials at ByteSize and McGraw-Hill both say they were especially drawn by
InTether's capacity
to protect every aspect of the multimedia e-books they are developing. ''You
can assign different
use permissions to the different forms of media contained within a book,''
says Mark Broussard,
president of ByteSize. You could, for instance, theoretically specify that
text could be freely
copied, while photos could be copied once, and audio and video could be
copied never. In addition,
InTether can be used to permit what Broussard calls ''molecular''
distribution -- i.e., readers can cut
out individual chapters from a book and lend them to others. The same
restrictions that apply to
the whole book would then transfer with the particular chapter. ''It's
really powerful,'' says
Broussard.

The hacker crowd may not be as thrilled by this whole development, of
course. On the other hand,
if they can put aside their initial horror at InTether's potential for
protecting intellectual property,
and focus instead on its exciting potential as a tool for enhancing private
and confidential
communications, they may reconsider. Using InTether's packaging and
receiving software, for
instance, a hacker gang like global hell, renowned for vandalizing Web
sites, could plot and
coordinate a hack attack -- to deface it with virtual graffiti, say, or
pillage it of passwords and credit
card numbers -- all the while secure in the knowledge that the electronic
correspondence among
gang-members could be rendered uncopyable, unprintable, unforwardable and
guaranteed to
self-destruct on or before the day of the attack.

Every digital cloud has a silver lining.

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager