Free Essay

The Digital Millennium of Encryption

In:

Submitted By devo232008
Words 3030
Pages 13
Professor: Brian Wright
CMST 301 7985
The Digital Millennium of Decryption Rights

Outline * Introduction * Decryption Case Intro * Digital Millennium Copyright Act * United States copyright laws replaced by DCMA * DeCSS Tool * Tool Properties

* Research/Findings/Context * Motion Picture Association of America * Trafficking of digital media and the right associated * DeCSS * Creation * Intended use of DeCSS * How DVD encryption functions legally * Region Coding * DeCSS court cases * California trade secret laws * New York court case * Eric Corley * Corley’s intentions * Outcome of his legal allegations * David Touretzky * First Amendment relations * Position on source code links * Copyright Act * Fair Use * Outcome of fair use case * Judge Kaplan * Issues with Kaplan’s decision on fair use * Kaplan’s decision for First Amendment rights when using source code * Professor Touretzky response * Final outcome of court case

* Conclusion * Kaplan’s Final Decision * Defendant Deposition * Plaintiff’s View of Trial * Defendants View of Trial * Overall Outcome

Introduction
This research essay discusses the ongoing turmoil between the DeCSS who produced a source code as well as an established program and the Digital Millennium Copyright Act who supported Motion Picture Association of America. DeCSS is a tool that grants the circumvention of encryption built in DVDs. This paper will examine the outcome of the court decision on a range of problems including the source code being utilized as free speech, fair use, and HTML linking. As of 1998 the Digital Millennium Copyright Act (DMCA) was passed by the United States Congress. United States copyright laws were intended to be substituted by the bill for Digital Millennium Copyright Act to deal with digital media issues. Such things as DVDs that are considered to be digital media were going to be pirated in large numbers because the digital copies of these DVDs were going to be just as good as the original. Congress had to make a move to situate this scenario and come up with a plan to intervene. The Digital Millennium Copyright Act was enacted to protect the digital media’s copyright. The remedy was to encrypt this data on the DVD’s. One year after the encryption was implemented a program called DeCSS was developed and capable of decrypting the data that was stored on the DVD disc.
Research/Findings/Context
The first challenge of the DMCA began, as the Motion Picture Association of America (MPAA) brought suit against individuals who were trafficking the software on the Internet. The ongoing court case raised serious issue about the Internet and the digital age, including topics such as HTML linking, source code as protected free speech, and the consumer's right to fair use.
The DeCSS program was created by a group of three European programmers that called itself Masters of Reverse Engineering (MoRE). The media usually attributes its creation to a Norwegian teenager, Jon Johansen, although he has stated that he did not even do the crucial decryption portion (Kelly, 2000). DeCSS was created to provide a method of DVD playback under Linux, which at the time had no program capable of playing DVDs. In order to understand the basis for the case by the MPAA, it is necessary to first understand the encryption scheme employed by DVDs and how DeCSS circumvents this to facilitate playback. Most DVDs employ a method of encryption called Content Scrambling System (CSS). With CSS, each encrypted DVD contains a key that is used along with a key in the player in order to decrypt the contents of the DVD. The DVD Copy Control Association (DVDCCA), the CSS license holder, issues the key in the DVD player to licensed manufacturers of DVD players (Taht, 2000). DeCSS uses a valid but unlicensed key to decrypt the DVD content. It can then be written to a frame buffer to display the movie. It is important to note that aside from serving what the MPAA claims is its primary purpose, CSS also allows the movie studios to insert material at the beginning of DVDs such as FBI warnings that the user cannot bypass. Furthermore CSS allows the MPAA to region code DVDs. Region coding is the practice by which certain world markets are assigned regions; for instance, the US and Canada is Region 1, while China is another. A Region 1 DVD will not play in a player with any other region number. The movie studios do this to support staggered global theater debuts of new movies. For instance, American movies generally open in the US months before they open on European screens. Region encoding ensures higher profits for a studio by ensuring that the DVD for a given movie is not available in a region before the movie itself is. DeCSS allows the user to bypass both of these features, something that licensed players are forbidden from doing. DeCSS takes control from the studios producing the disks and puts it in the hand of the owner of the disk. As an initial move to block DeCSS, the DVDCCA filed a lawsuit under California trade secret laws against individuals who had posted the source to the DeCSS on their web pages. This case was dismissed and there were legal movements that resulted in the dismissal of a large number of the defendants, as they do not live in California and thus the lower courts must provide a reason why they should be tried in a California court (Hansen, 2000).
The second case to stem from the publication of DeCSS source code on web pages throughout the world finished its first round in a New York court. In this case, the MPAA charged that the DeCSS program violates the DMCA and that it must be removed from web pages, in both binary and source form. The MPAA brought its lawsuit against three defendants, two of which were dismissed after removing the offending source code from their websites and settling with the plaintiffs (Kaplan, 2000a). It is this court case, and the DMCA in particular that will form the basis for the remainder of the paper. The remaining defendant in the case is Eric Corley, who publishes "2600: The Hacker Quarterly" (www.2600.com) under the name Emmanuel Goldstein, a reference to a character in George Orwell's novel, 1984. In 1984, Goldstein is described as "the commander of a vast shadowy army, an underground network of conspirators dedicated to the overthrow of the State". Unable to post the source code to DeCSS after the initial injunction in January 2000, Corley encouraged others to post the program and send him the link. His website posted a page containing more than 300 links to sites containing DeCSS. The MPAA saw this as a flagrant attempt to circumvent the terms of the injunction and sought to have the court prevent Corley from even linking to DeCSS sites. An immediate issue this raised is related to journalism; in reporting on this case, many online newspaper articles had linked to Corley's page (Kaplan, 2000b). If the court supported the MPAA and forbid linking to sites containing DeCSS, these articles would be illegal. A ruling of this nature would clearly have a detrimental effect on online reporting. The studios' position was that Corley's mass of links displayed a "continuing intent to traffic" DeCSS and thus differentiated him from news reports (Kaplan, 2000b). The defense's position on this issue is that linking is simply indexing. Just because 2600 is not The New York Times does not mean they should not be afforded the same right to disseminate information to readers (Kaplan, 2000a). Providing a link to a web page is "essentially a citation", indicating a source of more information claims Dan Burk, a law professor at the University of Minnesota (Kaplan, 2000b). Furthermore, the defense makes the point that it is not illegal for a newspaper to report that drugs are being sold at a given location, while the actual trafficking of the drugs is clearly illegal. The defense concludes that linking to a website serves the same function: to provide information to the reader.
The defense also takes the stance that computer code is expressive speech and is thus protected under First Amendment rights. If computer code were to be acknowledged as protected under the First Amendment, it would be permissible for anyone to post source code freely. David Touretzky, a professor of Computer Science at Carnegie Mellon University and expert witness for the defense stated the problem with the MPAA's position that source code was not protected under free speech. "If the court upholds this injunction, what would happen is that certain uses of computer language - my preferred means of expression - would be illegal" (Harmon, 2000).
The third major point raised by the defense is that of fair use. Fair use is codified in Section 107 of the Copyright Act, and gives an individual who legally owns a copyrighted work the right to do with it as they please. Fair use is what allows people to record shows on their VCRs for private use. It allows encoding a CD to MPEG Layer 3 (mp3) format or to tape. However, when the DMCA was created, Congress did not add any mention of fair use. By upholding the DMCA in this case, the court would extinguish fair use for any form of media covered by the DMCA. The defense's position was that this was not the intent of Congress and that if it were, the DMCA should be deemed unconstitutional.
In August 2000, Judge Lewis Kaplan ruled in favor of the MPAA and overruled all the defense's arguments. The case was appealed; the defense stated that it will take the issue to the Supreme Court if necessary. By examining the judge's decision and the reasons given, the implications of this case become visible and demonstrate why this ruling cannot be allowed to stand. With regard to linking, Judge Kaplan found that a link that "automatically commence[s] the process of downloading DeCSS" is not different than posting DeCSS on one's own site. Furthermore, any link that "display[s] nothing more than the DeCSS code" falls into the same category (Kaplan, 2000c). Such links fall under Section 1201(a)(2) of the DMCA which holds that "no person shall...offer to the public, provide, or otherwise traffic" anything that is primarily designed to circumvent copyright protection (DMCA Section 1201, 2000). The impact of this part of the ruling was that the web site changed the HTML links to plain text that could then be copied into the address bar of a browser.
There are two minor issues raised by the judge's opinion on this matter. If one uses Google (www.google.com), or any other search engine, to search for "DeCSS", a list of links to pages providing DeCSS are presented. Is Google illegally trafficking banned software? The second issue returns to the issue of journalism. When CNN reported the results of the case they provided a link to the 2600 web site containing the questionable links (Tate, 2000) (FullPageCNN Screenshot, 2000). Judge Kaplan's decision stated that a link was acceptable if it “offer[s] a good deal of content other than DeCSS" (Kaplan, 2000c). Kaplan would not consider the DeCSS site at 2600 one of these sites, thus rendering CNN's article illegal. Interestingly enough, CNN is a child of Time-Warner and Warner is one of the studios belonging to the MPAA. These issues demonstrate a clear need for the issues of linking to be reexamined during the appeal process.
Judge Kaplan ruled that the DeCSS source code is not protected under the First Amendment. While he ruled that source code did contain expressive value, which made it a potential candidate for First Amendment protection, Kaplan stated that based on an examination of its function, the First Amendment does not protect the code. Kaplan's decision on this portion of the case runs contrary to previous cases, such as the cryptography case in 1999 that upheld source code as protected speech under the First Amendment (Bernstein vs. United States Department of Justice, 1999)
Judge Kaplan's words in his opinion show his focus on piracy as the sole use of DeCSS and a lack of acceptance for other uses of the software. He questions Jon Johansen's testimony, wondering "if, indeed, developing a Linux-based DVD player was among their purposes" (Kaplan, 2000c). Whether it was or not is immaterial. DeCSS source code has value beyond piracy in that the source code could be used to facilitate the creation of a Linux DVD player.
Professor Touretzky pointed out a flaw in Kaplan's reasoning when he stated some cases where the First Amendment does apply: "It's illegal for me to give you LSD, but I can give you the recipe. I can't give you a pipe bomb. But I can give you a book about how to make a pipe bomb” (Zlatos, 2000). The implication here is that the recipients’ ability to convert instructions into a finished product does not matter in the application of the First Amendment. By extension, one's ability to compile source code into the DeCSS executable should also be ignored. To point out the ridiculous nature of Kaplan's ruling, Touretzky hosts a gallery of clever ways to legally express the DeCSS source code (Gallery of CSS Descramblers, 2000).
Conclusion
Judge Kaplan unfortunately took a strict interpretation of the DMCA in his decision. There are no provisions for fair use in the DMCA and previous provisions in the Copyright Act are not applicable under the DMCA. Claiming that this was the intent of Congress, he dismissed the issue. The implication of Kaplan's ruling is that owning a DVD does not give one the right to watch it; owning a licensed DVD player gives one the right to view movies. Once the DVD is paid for, it is the property of the individual and within certain limitations (i.e. the owner cannot sell copies), it should be theirs to do with as they please.
The defendant’s claims of laws and fact were opposed then were unsuccessful after the ruling of Kaplan. During the course of the trial, the defendants requested to take one out of court oral testimony, which was granted. The defendants in this case were not found as trying to hinder the court case in the deposition but were not able to make a discovery to counter the laws and facts.
The defendants did not postpone there next court date. They also have not requested a separate trial. Originally the defendant thought the court case would take weeks to finish but rather ended only after six days of trial. In the Court’s view all testimonies given by professionals in the field were indicated as being reasonable and justified. All the testimonials materials were given to both sides of the Court and were available during the defendant’s deposition. Examination of the trial record show that practically the full case could have been stipulated, even though the legal outcome to be provided from the specified facts of course would have been left for the interpretation of the disagreement.
The Plaintiffs have invested millions of dollars in making their motion pictures and never had a problem with the copyright laws that were in place. The very framework that was placed for these laws were concrete in its entirety. With new technology comes different scenarios that have introduced challenges but the Plaintiff’s believe that this should not constitute a change in the framework’s structure.
The Defendants have contrary beliefs that anyone who has the knowledge and capability to cleverly hack or utilize resources should have access to this data. In spite of the previous outlook they raised a responsible concern with securities in this new digital era and access control measure counters that could be utilized to defend these sites from these sort of “robberies.”
Each side has its own set of beliefs which they are certainly entitled to. Today in our society these types of controversies are typical and these clashes are left for Congress to interpret. Congress in conclusion ruled in the Plaintiffs favor. Declaring the unfamiliar characteristics of computer codes for bypassing encryption and other access control measures, the DMCA in regards to posting and linking here does not breach the First Amendment. Though the Plaintiffs had a successful court case, still in 2014 these issues still reside. Even though illegal, the mass reproduction of DVD’s still exists today.

References
Bernstein vs. United States Department of Justice, et al. (1999). Retrieved on December 5, 2014 from http://www.eff.org/bernstein/Legal/19990506_circuit_decision.html
DMCA Section 1201 (2000) Retrieved on December 5, 2014 from http://www.cs.cmu.edu/~dst/DeCSS/dmca-1200.txt
Full PageCNN Screenshot (2000). Retrieved on December 5, 2014 from http://www.scripting.com/images/fullPageCnnScreenShotDeCss.gif
Gallery of CSS Descramblers (2000), Retrieved on December 5, 2014 from http://www.cs.cmu.edu/~dst/DeCSS/Gallery/index.html
Hansen, E (2000) Hollywood dealt setback in DVD code case. Retrieved on December 2, 2014 from http://news.cnet.com/news/0-1005-200-4159594.html
Harmon, A (2000) Free Speech Rights for Computer Code? Retrieved on December 5, 2014 from http://www.nytimes.com/library/tech/00/07/biztech/articles/31rite.html
Kelly, J. S. (2000) Interview with Jon Johansen. Retrieved on December 2, 2014 from http://www.linuxworld.com/linuxworld/lw-2000-01/lw-01-dvd-interview.html
Kaplan, C. S. (2000a) First Amendment Lawyer Takes on Movie Studios in DVD Case. Retrieved on December 5, 2014 from http://www.nytimes.com/library/tech/00/04/cyber/cyberlaw/28law.html
Kaplan, C. S. (2000b) Is Linking Illegal? Retrieved on December 5, 2014 from http://www.nytimes.com/library/tech/00/06/cyber/cyberlaw/16law.html
Kaplan, C. S. (2000c) United States District Court Opinion. [PDF Document] Retrieved on December 5, 2014 from http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/00-08592.PDF
Tate, R (2000) Time Warner posts a link it had banned. Retrieved on December 5, 2014 from http://www.upside.com/News/39a6fef00.html
Taht, M (2000) Picket Rye. Retrieved on December 3, 2014 from http://www.picketwyre.com/~mtaht/css.html
Zlatos, B (2000) CMU scientist sees both sides to DVD case. Retrieved on December 5, 2014 from http://www.cs.cmu.edu/~dst/DeCSS/Gallery/tribune-review-dvd0821.html

Similar Documents

Premium Essay

Piracy

...file sharing between the entertainment and software industries and the vast, online pirating community has been one of the most debated topics. Gripping public attention for the past decades. Napster, a website created by a college dropout became an empire. Used by hundreds of millions of people, that robs billions in revenue each year. Although these rogue websites claimed to only be hosts for illegal file sharing, the United States government took action to eliminate Internet piracy and protect copyright by implementing digital encryption technologies and strict laws that prohibit tampering with these encryptions. The trafficking of copyrighted goods must be put to an end because it promotes illegal transactions of an owner’s intellectual property, causing sales in the entertainment and software industries to plummet and thereby restricts the growth of the economy. Internet piracy is the unlawful reproduction and/or distribution of any copyrighted digital file without the permission from the owner. It is driven by the consumers demand for a desirable product that would otherwise be unobtainable, either because of financial limitations or cultural factors, such as the Chinese culture’s emphasis that the free sharing of knowledge creates and preserves both civilization and traditional values across generations (Lu 310). Consequently, such a mindset that has caused many people to believe piracy to be the solution to their individual economic problems has resulted in the slow,...

Words: 1422 - Pages: 6

Free Essay

Intro to Comuter Security 3

...relationships and conflicts between organizational entities and people. 3. Criminal, administrative, and constitutional law. 4. National information infrastructure protection act of 1996, modified several sections of the pervious act and increased the penalties for selected crimes. 5. Security and freedom through encryption act of 1997. 6. In this context is not absolute freedom from obeservation, but rather is a more precise "state of being free from us sanctioned intrusion." 7. health insurance portability and accountability act of 1996, requires organizations to use information security mechanisms,a swell as policies and procedures. 8. Gramm-Leach-Bliley Act of 1999; requires due notice to customers, so they can request that their information not be shared with third party organizations. 9. Provides law enforcement agencies with broader latitude in order to combat terrorism-related activities. 10. No electronic theft act 11. IP is the ideas of controls over the tangible or virtual representation of those ideas. It is afforded the same protection in al the countries. The US and Europe contributed The Digital Millennium Copyright Act. 12. Enforces accountability for executives at publicly traded companies. 13. When a organization makes sure that ever employee knows what is acceptable or unacceptable behaviorand knows the consequences of illegal or unethical actions. 14. Due diligence requires that an organization make a valid effort...

Words: 353 - Pages: 2

Free Essay

Digital Rights Management

...Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction • Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media • DRM defends against the illegal altering, sharing, copying, printing, viewing of digital media • Copyright owners claim DRM is needed to prevent revenue lost from illegal distribution of their copyrighted material 12/1/2010 Digital Rights Management 2 DRM Content and Actions • There are many capabilities covered by DRM Digital Rights Management Digital content: • Videos • Music • Audio books • Digital books • Software • Video games Possible Actions and Restrictions: • Play once • Play k times • Play for a set time period • Play an unlimited amount • Copy • Burn to physical media • Lend to a friend • Sell • Transfer to a different device 12/7/2010 Digital Rights Management 3 Early U.S. Copyright History • US Constitution, Article 1, Section 8 – “The Congress shall have the Power … To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries” • Copyright Act of 1790 – "the author and authors of any map, chart, book or books already printed within these United States, being a citizen or citizens thereof....shall have the sole right and liberty of printing, reprinting, publishing and vending such map, chart, book or books...." – Citizens could patent...

Words: 2387 - Pages: 10

Premium Essay

Assignment 1: Computer Memory Hacking

...unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the memory chip is not frozen the chip can lose its contents in a matter of milliseconds. Hackers can use this vulnerability to steal information which is stored in the memory through rebooting of the compromised machine through the use of a simple program or software which is designed to purposely copy the contents in the memory (Gollmann, Dieter1999). The most vulnerable machines are those left...

Words: 901 - Pages: 4

Premium Essay

Computer Memory Hacking

...hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the memory chip is not frozen the chip can lose its contents in a matter of milliseconds. Hackers can use this vulnerability to steal information which is stored in the memory through rebooting of the compromised machine through the use of a simple program or software which is designed to purposely copy the contents in the memory (Gollmann, Dieter1999). The...

Words: 901 - Pages: 4

Premium Essay

Music Copyrights

...Music Copyright & File- Sharing Technology A copyright is a form Intellectual property that grants an author or originator of any tangible literary or artistic work exclusive rights. It is granted by federal statute and includes any literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural works. Also, any motion pictures, sound recording and other audiovisual work. The first U.S. copyright law was the Copyright Act of 1790. It was then modified in 1909 and again 1976. Copyrights still being administrated by the Copyright Act of 1976, which states that the term of protection starts from that date created to the life of the author plus fifty years. The terms automatically got extended for any work created after January 1, 1978, giving statutory copyright protection for the life of the author plus seventy years. In the case of more than one author, it is seventy years after the death of the last living author. A copyright is automatic once the work is made, however it can also be registered with the U.S. Copyright Office in Washington, D.C. A copyright infringement is when the expression of the idea or the work form has been copied without the copyright owner’s approval. It is not limited to the entirety of the work, but if a considerable amount of the original is copied, it is copyright infringement. Only the copyright owner has the right to reproduce, distribute copies, display, or perform the work. Individuals, who commit a copyright...

Words: 1475 - Pages: 6

Free Essay

Devry Sec 280 Final Exam – Latest

...DeVry SEC 280 Final Exam – Latest http://www.spinwoop.com/?download=devry-sec-280-final-exam-latest For Further Information And For A+ Work Contact US At SPINWOOP@GMAIL.COM SEC 280 Final Exam DeVry – 2015 Question : (TCO 2) What are the security risks of installing games on an organization’s system? Student Answer: There are no significant risks. Users can’t always be sure where the software came from and it may have hidden software inside of it. The users may play during work hours instead of during breaks. The games may take up too much memory on the computer and slow down processing, making it difficult to work. Instructor Explanation: page 75 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 2) All of the following are techniques used by a social engineer EXCEPT for which one? Student Answer: An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number. An attacker calls up the IT department posing as an employee and requests a password reset. An attacker runs a brute-force attack on a password. An attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information. Instructor Explanation: page 68 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 2) Attackers need a certain amount of information before launching their attack. One common place to find...

Words: 3985 - Pages: 16

Premium Essay

Security

...Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize liabilities and reduce risks from electronic, physical threats and reduce the losses from legal action, the information security practitioner must understand the current legal environment, stay current as new laws and regulations emerge, and watch for issues that need attention. Law and Ethics in Information Security As individuals we elect to trade some aspects of personal freedom for social order. Laws are rules adopted for determining expected behavior in modern society and are drawn from ethics, which define socially acceptable behaviors. Ethics in turn are based on cultural mores: fixed moral attitudes or customs of a particular group. Some ethics are recognized as universal among cultures. Slides 9 Types of Law Civil law represents a wide variety of laws that are recorded in volumes of legal “code” available for review by the average citizen. Criminal law addresses violations harmful to society and is actively enforced through prosecution by the state. Tort law allows individuals to seek recourse against others in the event of personal, physical, or financial injury. Private law regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law. Public law regulates the structure and administration of government agencies...

Words: 2358 - Pages: 10

Premium Essay

Computer Networking

...Chad Nash Advantages and Disadvantages of Windows XP Windows XP was introduced as a significant upgrade to Windows 98 and Windows Millennium. After Microsoft brought out MS-DOS in the 1980's it developed its futuristic operating system - Windows. Newer versions of this OS were developed over the years, including the out bringing of Windows NT (New Technology) which was aimed at business users and computer servers. After numerous incarnations of the Windows operating system, including Windows 95, 98 and the much criticized Windows Millennium, the XP system was released October 25, 2001.Windows XP has much in common with the singularities and also engineering of Windows 2000. In fundamentals XP was created to"bridge the two architectures (NT and Windows 9x--or DOS) into a single common operating system." Windows 2000 was based on Windows NT technology; as far as Millennium (ME) was created from Windows 9x technology. The NT operating system was much more honorable than the other versions before the o of Windows and accordingly Microsoft decided to choose this technology as the infrastructer for XP. XP was put out in two basic versions - The home and the professional version. The basic inequality between the two versions is that the up to speed version places more significance on security. It also has the efficiency to encrypt files and data and has support for multiprocessor systems. ( Lanyon P.) Windows XP was developed to on the problems and inconsistencies in the ME system...

Words: 1682 - Pages: 7

Premium Essay

History and Development of the Digital Computer

...History and Development of the Digital Computer Prior to the advent of digital computing, human clerks who calculated in accordance with effective methods we referred to as “computers.” Human computing has evolved greatly since that time; giving the need for computing and the advancement of technology an entirely new growth opportunity. A digital computer is “a device that processes numerical information; more generally, any device that manipulates symbolic information according to specified computational processes” (Digital Computer). Each computer is programmed with a basic set of instructions that are the identifiers of what capability that system has to perform functions. Computers are devices used to carry out a myriad of logical operations, and most often consist of at least one processing element. A computer most often contains a memory bank for information storage. Though the idea of computing has been around for a long while, it wasn’t until the mid-1900’s that “computers” came alive. The dinosaurs of the mid-1900 were mammoth machines housed in large buildings and warehouses and consumed more energy for one operating system than hundreds of today’s mini machine’s do. Today’s computers are miniscule in size in comparison to that of their ancestors and have the capability of far more computing power. As technology has evolved, the computer has taken the shape of laptops, music players, gaming systems and automobiles; each of these tangible items relies on some sort...

Words: 1713 - Pages: 7

Free Essay

Digital Cinema Supply Chain Management

...BOM 7094: Operations Management Digital Cinema – Changing the Supply Chain Management of the Movie Industry BOM 7094 Term Paper Dzulhafidz Bin Dzulkifli - 1091200147 10 Table of Contents Introduction ...................................................................................................................................... 2 Literature Reviews ........................................................................................................................... 4 Digital Cinema – The New Challenge for the Movie Industry ..................................................... 4 Security and Rights Management in Digital Cinema................................................................... 4 Digital Cinema Business Model – The Global Outlook ............................................................... 5 Summary of Literature Review ............................................................................................... 6 Operation Management: Supply Chain Management ..................................................................... 7 Motion Picture Supply Chain Management – The Conventional Way ............................................ 8 Ownership Chart: The Big Six ..................................................................................................... 9 The Management of the Chain of Supplies for Digital Cinema. .................................................... 10 Digital Cinema Process .................................

Words: 6784 - Pages: 28

Premium Essay

Networking

...University CIS417 Prof. Curtis Bunch Digital Forensics is an important aspect to computer systems security. I mean we are talking about Identifying, Collecting, Preserving, Analyzing, and Presenting evidence digitally. Therefore, preserving electronic evidence is important. Investigating Data Theft is a malice act towards a company/ organization (Kruse, 2001). Such theft is made by an employee that is either terminated or resigning. Motives for data theft include setting up a competing business, using the information at a new job, sense of ownership of what was created, and revenge against the employer, among other things. Common Theft include, customer information, financial records, software code, email lists, strategic plans, process documents, secret formulas, databases, research and development materials, and employee records. Now, with such theft around, we often wonder how is such theft achieved. Knowing how technology is always advancing each year, the millennium era grows with fascinating knowledge on the know how to working a computer, hard drives, etc. Tools like flash drive, which can hold thousands of documents that can be copied to the flash drive, and taken anywhere. Then you have Dropbox, remote desktop connections, personal email accounts, smart phones, CD’s/DVD’s, and FTP ( File Transfer Protocol ) (Kruse, 2001) There is always this saying, that personnel who steal data often leave a trail of digital evidence that proves invaluable when investigating...

Words: 1774 - Pages: 8

Premium Essay

Plagiarism

...January 2014 Music Piracy Ever wondered how the music that you listen to probably every day of your life becomes the music that you love so much? Well there is a long and tedious process that goes into to making just one song. The artists does his or her best to make a song that he or she likes and also a song that all of the fans would enjoy too. It takes days, maybe even weeks to just make one single song; and there are so many components or people that go into its creation. To start, there are songwriters and audio engineers, computer technicians and also the actually artist or artists in the song, and all of those people profit off of that one song. So when a person goes online and decides to illegally download a song using either a digital storage locker or a peer-to-peer site you a basically stealing money from a people that worked really hard on making that song, and when not just one but thousands and millions of people start to do that, that takes a big toll and has a big impact on those people. This type of stealing is called music piracy and music piracy is a serious problem and affects the music industry in many different ways, from revenue loss, to a decline in jobs. Music piracy is the illegal copying or distributing of music that a company did not give permission to do. Music piracy has been on a rapid increase since the beginning of the 2000s. In 2005, the International Federation of the Phonographic Industry (IFPI) estimated that 20 billion songs were illegally...

Words: 2252 - Pages: 10

Premium Essay

Lp3 Assignment Chapter 3 Review

...1. What is the difference between law and ethics? In general, people elect to trade some aspects of personal freedom for social order. As Jean- Jacques Rousseau explains in The Social Contract, or Principles of Political Right, the rules the members of a society create to balance the individual rights to self-determination against the needs of the society as a whole are called laws. Laws are rules that mandate or prohibit certain behavior; they are drawn from ethics, which define socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal. For example, murder, theft, assault, and arson are actions that deviate from ethical and legal codes throughout the world. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 2. What is civil law, and what does it accomplish? Civil: Governs nation or state; manages relationships/conflicts between organizational entities and people. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 3. What are the primary examples of public...

Words: 2320 - Pages: 10

Premium Essay

It Law and Ethics

...Chapter 11 Law and Ethics Chapter Overview Chapter 11 covers the topics of law and ethics. In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security. Chapter Objectives When you complete this chapter, you will be able to: Differentiate between law and ethics Identify major national and international laws that relate to the practice of information security Understand the role of culture as it applies to ethics in information security Access current information on laws, regulations, and relevant professional organizations Set-up Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize the organization’s liabilities the information security practitioner must understand...

Words: 4470 - Pages: 18