TY - JOUR
T1 - An analysis of security vulnerabilities in the movie production and distribution process
AU - Byers, Simon
AU - Cranor, Lorrie Faith
AU - Cronin, Eric
AU - Korman, Dave
AU - McDaniel, Patrick
N1 - Funding Information:
A number of technical approaches to preventing leaks are also being pursued. In 2000, Macrovision received a patent on a method for preventing through-the-air capture of projected movies by superimposing infra red images on the visual image. 7 7 These images are not detectable to the theater audience, but show up on video captured by most camcorders. The Sarnoff Corporation and Cinea are developing a digital movie encoding designed to confuse camcorders without being detectable by human viewers. Work on this project is being partially funded by a 2-year grant from the National Institute of Standards and Technology (NIST) ( Cinea, 2003a ; McCarthy, 2002 ). 8 8 Cinea also has developed a secure digital movie distribution system that includes encryption and auditing schemes ( Cinea, 2002b ). However, digital projection is not expected to come to most cinemas for some time to come due to concerns about equipment cost and projection quality. Furthermore, while digital distribution has cost-saving and anti-piracy benefits for movie studios, theater owners see little benefit from making a substantial investment in digital projection equipment. Studios may need to subsidize the purchase of digital projection equipment if they expect to see it adopted in the near future ( Associated Press, 2000 ; Taub, 2003 ).
PY - 2004/8
Y1 - 2004/8
N2 - Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some cases prior to, theatrical release. It has been argued that the availability of unauthorized copies directly affects theater attendance and DVD sales, and hence represents a major financial threat to the movie industry. This research attempts to determine the source of unauthorized copies by studying the availability and characteristics of recent popular movies in file sharing networks. A data set of 312 popular movies was developed and one or more samples of 183 of these movies was located on file sharing networks, for a total of 285 movie samples. Seventy-seven percent of these samples appear to have been leaked by industry insiders. Most of the samples appeared on file sharing networks prior to their official consumer DVD release date. Indeed, of the movies that had been released on DVD as of the time of this study, only 5% first appeared after their DVD release date on a web site that indexes file sharing networks, indicating that consumer DVD copying currently represents a relatively minor factor compared with insider leaks. A brief analysis of the movie production and distribution process was performed and potential security vulnerabilities were identified that may lead to unauthorized copies becoming available to those who may wish to redistribute them. Finally, recommendations are offered for reducing security vulnerabilities in the movie production and distribution process.
AB - Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some cases prior to, theatrical release. It has been argued that the availability of unauthorized copies directly affects theater attendance and DVD sales, and hence represents a major financial threat to the movie industry. This research attempts to determine the source of unauthorized copies by studying the availability and characteristics of recent popular movies in file sharing networks. A data set of 312 popular movies was developed and one or more samples of 183 of these movies was located on file sharing networks, for a total of 285 movie samples. Seventy-seven percent of these samples appear to have been leaked by industry insiders. Most of the samples appeared on file sharing networks prior to their official consumer DVD release date. Indeed, of the movies that had been released on DVD as of the time of this study, only 5% first appeared after their DVD release date on a web site that indexes file sharing networks, indicating that consumer DVD copying currently represents a relatively minor factor compared with insider leaks. A brief analysis of the movie production and distribution process was performed and potential security vulnerabilities were identified that may lead to unauthorized copies becoming available to those who may wish to redistribute them. Finally, recommendations are offered for reducing security vulnerabilities in the movie production and distribution process.
UR - http://www.scopus.com/inward/record.url?scp=3242679552&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=3242679552&partnerID=8YFLogxK
U2 - 10.1016/j.telpol.2004.05.007
DO - 10.1016/j.telpol.2004.05.007
M3 - Article
AN - SCOPUS:3242679552
SN - 0308-5961
VL - 28
SP - 619
EP - 644
JO - Telecommunications Policy
JF - Telecommunications Policy
IS - 7-8
ER -