How Technology Can Help in Fighting Counterfeiting and Piracy

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security, Privacy, and Ethics Online Computer Crimes.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Get More from Your Software The Genuine Windows Vista™ Experience.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 a crime committed on a computer network, esp. the Internet.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
For Innovation. ‘Counterfeiting and Piracy’ What has this to do with the UK Patent Office? We are not enforcers, but we have had a role for sometime Seat.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
How Technology Can Help in Fighting Counterfeiting and Piracy David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting Microsoft.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Charbel Fakhoury General Manager, Microsoft Eastern Mediterranean The Economic Consequences of Software Piracy Beirut, Lebanon May 5, 2003.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Copyright Computer crime and cyber security.
Computer vision and biometric technology in credit risk
Malware and Computer Maintenance
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
3.6 Fundamentals of cyber security
Information Systems: Concepts and Management
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Botnets A collection of compromised machines
Cyber Crimes Chunlian QU 9/18/2018.
Computer Technology Notes 5
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
Chapter 13 Security and Ethical Challenges.
Copyright, Designs and Patents Act 1988
Ethical Use of Computers
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

How Technology Can Help in Fighting Counterfeiting and Piracy David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting Microsoft Corporation Counterfeiting and piracy are increasingly high-tech crimes. Their impact on society spreads even to computer damage and security breaches. It is only logical that high-tech solutions are needed for these high-tech crimes—to catch up with the criminals and to prevent and deter infringements. There is a lot that the private sector and public authorities can do in co-operation with each other to modernise our enforcement tools and find, collect evidence, prosecute and stop infringements in smarter and faster ways. My written paper has more details, but let me summarise and show you some of the ideas and technology tools we have been developing in this area.

Counterfeiting and piracy: A high-tech economic and societal problem Threat to economy, jobs, taxes, innovation, creativity Threat to IT security and systems integrity 25% of websites offering access to pirated software, counterfeit product keys and crack tools attempt to install malicious or unwanted software I hope we are all familiar with the economic and societal problems associated with counterfeiting and piracy. But the increasing use of the internet and technology to carry out infringing activities raises some important new policy considerations that governments should care about in making the fight against counterfeiting and piracy a priority: IT security and systems integrity. A new IDC research study entitled The Risks of Obtaining and Using Pirated Software demonstrates that pirate websites regularly pass along computer viruses, worms, Trojan horses, adware, spyware and other unwanted or harmful material with pirated items. The IDC’s research found that 25% of pirate websites and 59% of peer-to-peer downloads of these items do so. In 2006 Microsoft also announced wide-scale forensic research into a sample of 348 counterfeit Windows XP discs acquired in 17 countries. This study showed that two-thirds of the counterfeits found in these countries either do not work, or have additional code that could expose the user and others to denial-of-service attacks, bypass of password protection, or application memory corruption. So piracy is not only bad for the economy, bad for creativity, and bad for innovation, it is also bad for computer and network security—on which so much of the modern economy and life increasingly depend. 59% of counterfeit product key generators and crack tools downloaded from peer-to-peer networks contain malicious or unwanted software IDC, The Risks of Obtaining and Using Pirated Software, Oct. 2006

Physical piracy: Faster evidence preparation CD/CD-ROM/DVD production: vast and diverse High-tech crime needs high-tech solutions, both for on-line infringements and for traditional types of piracy. Replication of counterfeit discs is still a massive world-wide problem, with about 7 billion of the discs manufactured not accounted for by legitimate orders. Pirate plants not only produce large quantities of counterfeit Microsoft and other software discs, but also fake music CDs, infringing software game CD-ROMs, and counterfeit film DVDs. If you want to know what all of the discs in this photo have in common—they are all counterfeit and were all manufactured at the same replication plant.

Physical piracy: Faster evidence preparation Traditional disc matching: manual and slow Traditional matching of unknown discs must be done by microscope, compared by a trained eye, disc by disc. Sorting through a mass of different discs found in a raid or a customs seizure, tracing them back to their production plant, and preparing this kind of evidence for a prosecution, can be a daunting task. Until now, both government enforcement authorities and the private sector have done this manually. Traditional matching of counterfeit discs of unknown origin has been done on a microscope, and compared by a trained eye, disc by disc. These photographs show the kind of unique microscopic grooves and patterns on an exemplar disc (these are called ‘micro mechanical striations’) from a known plant that must be matched with those on a counterfeit disc to confirm its source. As you can imagine, this process is not terribly fast; a trained expert with access to the right equipment and exemplar database takes at least 10 minutes per disc.

Physical piracy: Faster evidence preparation Opportunity to automate comparison with known exemplars: ‘FRED’ One idea that Microsoft has been working on is a technology tool that would automate this forensic process for disc matching. We are calling this tool FRED, the Forensic Replication Exemplar Database. The really useful thing about such a system is that it could substantially speed up the disc forensics process. In our recent tests, we’re finding that a counterfeit disc can be checked using FRED against upwards of 200 known exemplar discs per minute. The other advantage of course is that the number of investigators who could be doing disc matching, and the number of locations in which disc comparisons could be done, could be greatly expanded. We are still testing FRED, and talking with some stakeholders about how this kind of technology could be made widely available among public authorities and industry for the benefit of all.

Internet piracy: Faster identification, removal, deterrence Internet piracy is a very high-volume business Internet piracy, including peer-to-peer distribution, is of course the latest high-capacity source of pirate copyright material. The music industry estimates that there are about 885 million infringing music files on the internet at any one time. Software, games, films and other copyright material suffer from similar unauthorised mass-distribution on the internet. Earlier this month, we found 4,263 different infringing copies of Microsoft Office 2007, each offered numerous times, as well as cracking tools for the product, on just one peer-to-peer service. This product had not yet even been released for public distribution. We do not have a good answer yet as to the best approach to internet piracy. Notice and takedowns, and private-sector enforcement, have their roles to play, of course. It is in fact the case that there are ‘big fish’ to be caught or prosecuted as a public example. NPD’s analysis showed that 75% of all distribution of illegal music files on the internet was in fact done by 15% of the participating individuals. So taking action against these ‘big fish’, whether via notice and takedowns or by private-sector enforcement, can act as a deterrent.

Internet piracy: Faster identification, removal, deterrence Better use of technological tools Pro-active government enforcement Improved public-private cooperation Sound high-tech tools are also a ‘must’ in conducting internet anti-piracy enforcement. The volume of infringements and the technical sophistication of some infringers are such that internet piracy is unlikely to be detected, traced or analyzed effectively without appropriate technology tools. But today’s tools have inherent limitations, in that they tend to be used only by rights owner associations or their vendors and not by law enforcement itself. And some of the proposals suggested for future technologies—internet-wide filtering for example—have been simply unworkable for technology or cost reasons. Law enforcement officials do need to take a pro-active role in this area. The protection of intellectual property and its benefits for the local economies is an issue of interest for the whole society. Continued and visible actions by law enforcement agencies are one component of educating those engaged in piracy on the proper use of the internet, as well as the effects on society and risks to themselves that piracy brings. Could public/private partnerships help governments build capacity to combat internet piracy, particularly by implementing more effective technology tools? We cannot say for certain, but this is something which we have already been asked for in another area—crimes against children. In January 2003, we received a request for support from the Canadian police to build a tool that would help them cope with the exponential volume of data involved in these types of cases. Internet piracy is an area in which we have much more to do to “build capacity”. But pro-active police and customs programmes for fighting internet counterfeiting piracy, better technology tools used more widely, and better co-operation between the private sector and public authorities, must be the way forward for successfully combatting piracy and other illegal activity on the internet.