throbber
DIGITAL RIGHTS MANAGEMENT
`
`DRM
`
`— “digital rights” or “digital restrictions” management?
`
`Richard Leeming
`Red Bee Media
`
`If correctly applied, DRM can be likened to a motorway, providing a seamless high-
`speed route to content, enabling people to get the content they want, where they
`want it, quickly and easily. However, if badly applied, heavy handed and overly
`restrictive, DRM is more like a traffic jam – denying people access to the content they
`want and crucially denying rights-holders the revenue they want.
`This article looks at some of the proprietary DRM systems currently available and
`argues that we need to start thinking hard about when and how we apply DRM to our
`precious content.
`
`In 2006, music lovers worldwide have been celebrating the 250th anniversary of Mozart’s birth.
`Although he only lived for 35 years, Mozart composed more than 600 pieces of classical music –
`most of which are still hugely popular today.
`But it’s perhaps something of a surprise to discover that one of the key moments of Mozart’s early
`career would today count as piracy and be prevented by digital-rights technology.
`As a 14-year-old, Mozart travelled to the Vatican and heard Gregorio Allegri’s Miserere. This piece
`of music had long been closely guarded by the Vatican and it was forbidden to transcribe it: if you
`did, you would be excommunicated. Whether Mozart knew this is unknown but, having heard it
`once, he transcribed it from memory and it became published in London, thus breaking the Vatican’s
`ban.
`This is perhaps one of the earliest-known examples of content rights management being overturned.
`The Vatican may not have been too happy, but music lovers worldwide have benefited for more than
`two centuries now.
`There’s little doubt that issues around digital rights management (DRM) present one of the key
`areas of debate in the emerging digital content market.
`On the one hand you have rights creators; the record companies, Hollywood studios, TV production
`companies, broadcasters, and sports organizations who seek to get a financial return on their artistic
`creations. Then, on the other hand, you have the technology companies, be they distribution plat-
`forms or device manufacturers, who want to get the best content onto their platform and recognize
`the need to meet the requirements of content owners.
`And then there are the consumers, the people who actually watch and listen to this stuff, some of
`whom are paying for it, some of whom are getting it for free in ways they probably shouldn’t and
`most of whom are slightly baffled by the term digital rights management.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`1 / 10
`
`EX1052
`Roku V. Media Chain
`U.S. Patent No. 10,489,560
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`All of these parties have differing and conflicting interests, and it’s proving hard to reconcile their
`different needs.
`Even the term DRM itself is open to debate. While the simple definition that it is “any one of several
`technologies used by publishers or copyright holders to control access to or usage of digital data
`such as movies, music files or video clips” is relatively uncontroversial, a growing campaign against
`DRM suggest the term would better be defined as Digital Restrictions Management.
`Aside from the philosophical debate, there are:
`(cid:129) commercial concerns that DRM can be anti-competitive or off-putting to consumers;
`(cid:129) legal concerns that DRM over-rides long-standing legal precedents and consumer rights, and
`(cid:129) artistic concerns that DRM stifles creativity.
`One thing that does seem certain is that the market for DRM software
`is booming. According to market research company Jupiter
`Research, the market will grow to $274 million by 2008 from $36
`million in 2003.
`The driving forces behind DRM have been around for as long as it has
`been possible to copy content. British music fans who bought records in
`the 1980s will be familiar with the phrase “Home
`taping is killing music”. Around that time, the
`introduction of videotapes led to the 1984 US
`lawsuit Sony Corp. vs. Universal City Studios which even-
`tually led to the US Supreme Court setting an important legal precedent
`– that a technology cannot be illegal, but the use of it can.
`Clearly the advent of digital media makes the demand for DRM even
`greater as multiple copying of digital content not only becomes
`easier, quicker and cheaper, but also avoids the quality degradation
`that happened with analogue content.
`
`DRM technologies
`There are many different DRM technologies, so providing an accurate technical description of them
`is outside the scope of this article.
`However, to focus on the needs of the broadcast industry, an early distinction needs to be made
`between Conditional Access and DRM.
`
`Conditional access
`Conditional Access (CA) is the system that has traditionally been used to protect TV channels. The
`standards are tightly-defined and provide a method by which a digital television stream can be
`scrambled. The only people who can descramble, and thus watch, the picture are those with the
`right receiving box and valid keys. Clearly these are the people who have paid to receive the
`service.
`A good example of this in action in the UK is on Sky Sports on a Sunday afternoon. Watch the
`match at home, then go to the nearest pub that is showing the same game and you’ll see a simple
`difference. In the pub, the screen will have an icon depicting a half-empty pint glass in the bottom
`right hand corner of the picture. This denotes to any visiting spies from Sky Sports that the pub has
`paid for the premium rights to show the game to paying customers.
`Conditional Access works by a combination of scrambling and encryption.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`2 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`Alongside the scrambled signal, secret keys are also transmitted. These keys enable the descram-
`bler to work at the receiving end but, to ensure that they are not compromised, they are also
`encrypted. As well as being scrambled, the keys are regularly changed.
`
`DRM
`The main difference between CA and DRM is that DRM is usually applied to a specific piece of
`content.
`The list of actions covered by DRM are growing even longer, but typically they cover such things as:
`(cid:129) when the content is available;
`(cid:129) how many devices it can be viewed on, or indeed if it can be passed between devices at all;
`(cid:129) how many times it can be viewed;
`(cid:129) how long it is available for ... and so on.
`A simple explanation of how DRM systems works is this. It depends on content being secured by an
`encryption key which is split into two halves, one of which is private and one which is public.
`When a person (e.g. Bob) opts to
`buy a piece of content – say a
`music track or a video clip – from
`an online store, it first passes
`over the public half of the content
`encryption key. This is then
`attached to the digital file by the
`DRM gateway. The digital file
`and the public key is then sent to
`Bob where it is unlocked by his
`private key ... and the usage
`rights he has acquired are
`attached to the content.
`This model, which allows people
`to buy content direct from the
`rights holder, can also be modi-
`fied to serve “super-distribution”
`which is where someone, having
`enjoyed a digital file, can forward
`it to a friend (e.g. Frank) who
`cannot access it until he has
`replaced the original public key
`with his own one. This will, of
`course, involve him in paying the
`price of the content to the online
`store.
`
`So far so good, but this is actually where the problems start.
`Currently DRM applications are very basic and only scratch the surface of the possibilities. The
`market for DRM technology is heavily constrained by the lack of an open, scalable and dynamically
`adaptable solution.
`If correctly applied, DRM can be likened to a motorway, providing a seamless high-speed route to
`content, enabling people to get the content they want, where they want it, quickly and easily.
`However, if badly applied, heavy handed and overly restrictive, DRM is more like a traffic jam –
`denying people access to the content they want and crucially denying rights-holders the revenue
`they want.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`3 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`A successful DRM system has to be transparent and flexible with the user unaware that DRM proc-
`esses are going on behind the scenes. However this demands a great deal of co-operation from
`many different partners, that are managing different aspects of the process, if this is to happen. For
`the simple purchase of an mp3 track via a mobile phone, this will involve record companies, mobile
`network operators, billing software providers, handset manufacturers, DRM vendors – all with
`different priorities, needs and agendas.
`An example of how difficult this is, in reality, is provided by the Open Mobile Alliance.
`
`Open Mobile Alliance
`The Open Mobile Alliance (OMA) was set up members from many different industries, including:
`(cid:129) Mobile phone manufacturers (e.g. Nokia, Motorola, Samsung, Sony-Ericsson, BenQ-Siemens);
`(cid:129) Mobile system manufacturers (e.g. Ericsson, Siemens, Openwave);
`(cid:129) Operators (e.g. Vodafone, O2, Cingular, Deutsche Telekom, Orange) and
`(cid:129) IT companies (e.g. Microsoft, IBM, SUN).
`The intention was to set DRM standards for mobile phones.
`
`OMA DRM v1.0
`The first implementation of OMA DRM, version 1.0, was approved in June 2004. It is a basic DRM
`standard which doesn’t offer strong protection to content owners. It has been implemented in 400
`phones, which may sound a lot until you realize that there have been thousands of different devices
`released.
`However it’s the best technology there is for mobile applications at present and many operators use
`OMA DRM for their content services.
`It specifies three main methods:
`
`Forward Lock
`Forward Lock prevents the unauthorized transfer of content from one device to another. The inten-
`tion is to prevent peer-to-peer distribution, or super-distribution, of content using Bluetooth or infra-
`red. The content is packaged inside a DRM message that is delivered to the terminal. The device
`can play, display, or execute the content, but it cannot forward it.
`
`Combined Delivery
`This builds upon the ability to stop super-distribution by allowing the content owners to set rules
`about how a person may use the content. When the content is delivered to the handset, it contains
`two objects: the content and a rights object.
`The rights object defines the usage rules for the content. This can support all kinds of functions,
`such as preview, or time- and usage-based constraints. For example, it allows a complimentary
`preview, such as using the content only for a specific number of days, or an annual subscription with
`non-interfering price models.
`If a content owner applies the Combined Delivery mechanism, this will ensure that neither the
`content nor the rights object can be forwarded from the target device.
`Thus, on Nokia Series 40 phones, an installed file with DRM will have its “Send” option greyed out in
`its options menu. If the user attempts to send this via MMS, a message “The file is copyright
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`4 / 10
`
`

`

`CA
`CEK
`DRM
`DVB
`
`Conditional Access
`(OMA) Content Encryption Key
`Digital Rights Management
`Digital Video Broadcasting
`http://www.dvb.org/
`
`Abbreviations
`OMA
`
`PKI
`XCP
`
`Open Mobile Alliance
`http://www.openmobilealliance.org/
`Public Key Infrastructure
`(Sony) eXtended Copy Protection
`
`DIGITAL RIGHTS MANAGEMENT
`
`protected” will appear. A Bluetooth file transfer will fail if the user tries to extract the file using Blue-
`tooth, yet the file will still appear as present and will still be deletable via Bluetooth.
`
`Separate Delivery
`The most sophisticated level of OMA DRM is called Separate Delivery. It provides better protection
`for high-value content by encrypting the content itself.
`Thus the content is useless without both a rights object and a Content Encryption Key (CEK), which
`are delivered separately from the content.
`The rules set by OMA insist that the CEK is delivered securely, via WAP push, directly to the author-
`ized mobile device. On the handset, the DRM User Agent uses it for content decryption.
`OMA DRM-compliant devices such as the Nokia 3200 or 6230, or the Siemens SX1 and C62, store
`the rights objects in a part of the handset’s memory where the user can’t see it. Only the handset’s
`media player can access both the encrypted content and the rights object, including the CEK, to
`enable the consumption of the content by displaying or playing it.
`Although people can download content and forward it to friends, they won’t be able to see it until
`they obtain their own CEK for content decryption.
`The OMA standards include a “rights refresh” mechanism, allowing people who have had content
`sent to them by their friends to contact the content owner directly to obtain rights to either preview or
`purchase the content they have received.
`OMA describes this super-distribution as a key benefit of Separate Delivery because it maximizes
`the number of potential customers through peer-to-peer recommendations while retaining control for
`the content provider through centralised rights acquisition, potentially triggering enormous revenue
`growth. It also avoids the distribution costs for rights holders.
`
`OMA DRM v2.0
`Having established OMA DRM v1.0, the organization set out to create v2.0 – an open standard for
`technology to handle the application of DRM to music, video, gaming and similar services delivered
`to wireless devices – which was approved in March 2006.
`OMA describe it as an enhancement on the earlier DRM specification as it is based on the concept
`of a “trusted terminal”, requiring that the handsets support Public-Key Infrastructure (PKI) authenti-
`cation, which ensures their identity.
`The standard includes several control mechanisms built into the handset, allowing for what OMA
`describe as “a more robust set of content control options”.
`These benefits include:
`(cid:129) content subscriptions;
`(cid:129) gifting – allowing users to pay for content and forward it to a friend;
`(cid:129) previewing – enabling users to watch a portion of the content before purchasing it, and
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`5 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`(cid:129) sharing – the sale of licences that permit the use of content among a set group of wireless
`devices, and saving the content to memory cards or other compliant devices, among many
`other new benefits.
`
`Patenting issues
`While the first handsets with OMA DRM 2.0 – the Nokia N91 and Sony Ericsson W850i – were put
`on the market in early 2006, the standard was in the middle of a huge financial row.
`The patents necessary to develop the software based on OMA v2.0 are held by MPEG LA. They
`initially proposed to sell licences at $1 per handset and 1% of every transaction. Obviously this was
`unacceptable to content owners as it presented them with potentially open-ended bills for DRM fees.
`MPEG LA eventually now plans to charge $0.65 per handset and $0.25 per mobile phone subscriber
`per year, still a significant amount, but no longer tied to the number of times the DRM is used. The
`price cut came after mobile network operators threatened to develop alternative DRM technology,
`which would have led to a fragmented DRM situation with incompatible files and no clear benefits to
`anyone.
`
`Apple FairPlay
`While the delays and financial arguments over OMA DRM are typical of when several
`players are involved, when just one organization is dominant it allows a more seam-
`less approach, as is the case with Apple’s FairPlay system used on its iTunes
`store and implemented on its iTunes software and iPod digital music players.
`FairPlay allows a track bought from the iTunes store to be used in the following
`ways:
`(cid:129) The protected track may be copied to any number of iPod portable music
`players;
`(cid:129) The protected track may be played on up to five (originally three) authorized computers simulta-
`neously;
`(cid:129) The protected track may be copied to a standard Audio CD any number of times. While the
`resulting CD has no DRM and may be ripped, encoded and distributed like any other CD
`because it has been compressed, to re-rip it will significantly degrade the sound quality;
`(cid:129) A particular playlist within iTunes containing a protected track can be copied to a CD only up to
`seven times (originally ten times) before the playlist must be changed.
`FairPlay does not affect the ability of the file itself to be copied. It only manages the decryption of
`the audio content.
`
`Sony rootkit
`Some unified vendors unfortunately got their approach to DRM expensively and badly wrong:
`
`“Most people, I think, don't even know what a rootkit is, so why should they care
`about it?”
`
`This is a quote that Thomas Hesse, the head of Sony BMG's global digital business, might now
`regret as, thanks to Sony BMG, many millions of people now know what a rootkit is, and have shown
`they care quite deeply about it. Furthermore, this approach to DRM has just cost Sony BMG several
`million dollars to settle class action lawsuits brought by more than 40 US states. The company also
`faces the prospect of paying up to $175 to many thousands of individual customers under the terms
`of the legal settlement.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`6 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`
`Sony BMG’s botched foray into DRM started when they included
`“eXtended Copy Protection” (XCP) software on music CDs.
`When a consumer tried to play a CD with XCP on their computer,
`they were prompted to install a CD player bundled with the music
`tracks.
`The software on the CD not only prevented the computer’s native
`media player from playing the CD, it also restricted the number of
`times the CD could be burned and prevented the CD being ripped
`to the iPod.
`These restrictions may have been onerous enough for consumers to object to, but it didn’t take long
`for software engineer Mark Russinovich to realize that this was the tip of an iceberg.
`He discovered that Sony BMG’s software was fundamentally similar to a rootkit, a programme used
`by hackers to conceal unauthorised activity on computer systems, often described as Spyware or
`Malware. Thus, without the consumers’ explicit knowledge or permission, Sony BMG had installed
`software on their computers that interfered with the normal way in which Microsoft Windows or Mac
`OS X operating systems play CDs and it opened security holes that allowed viruses to break in.
`Furthermore the software caused programmes to freeze up and applications to slow down: a series
`of hidden files that were the source of the problem proved to be nearly impossible to uninstall.
`Russinovich published his findings on his blog and the story was quickly picked up by the main-
`stream media, leading to several class-action lawsuits against Sony BMG, and even criticism from
`some Sony artists that their work had been protected by methods they didn’t approve of.
`Although Sony BMG quickly released an uninstaller, this too was fundamentally compromised. Not
`only did users have to provide their e-mail address, which Sony BMG reserved the right to use in
`future marketing activities, the procedure for obtaining the uninstaller was complicated and time-
`consuming and would only work on one computer each time. If a user had played the CD on several
`computers they had to go through the process several times.
`The uninstaller also used Microsoft’s ActiveX controls which many security experts recommend that
`people de-activate, as it may allow malicious attackers to take over control of people’s computers.
`Sony BMG’s final indignity came when they were criticised by the US Department of Homeland
`Security:
`
`“It's very important to remember that it's your intellectual property — it's not your
`computer’s”, Stewart Baker, the assistant secretary for policy, told the Washington Post.
`“And in the pursuit of protection of intellectual property, it's important not to defeat or under-
`mine the security measures that people need to adopt in these days.”
`Sony BMG eventually recalled all unsold CDs with XCP and offered to exchange CDs that people
`had bought for ones without the software. In December 2006, Sony BMG agreed to pay damages
`and fines to settle lawsuits brought by more than 40 US states. The company will pay Texas and
`California $750,000 in civil penalties and costs, and $4.25m to a consortium of other states as well
`as reimbursing consumers up to $175 each if their computers were damaged while trying to uninstall
`the XCP software.
`
`A growing movement against DRM
`Sony BMG’s sorry tale is perhaps the most extreme, but is by no means the only example of major
`criticisms being levelled at DRM.
`There’s a growing movement against DRM. While Defective by Design’s Day Against DRM on
`3 October 2006 hardly made the mainstream news agenda, perhaps a more significant announce-
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`7 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`ment the same week came from UK nightclub group, The Ministry of Sound (MoS). In an article in
`The Times on 2 October 2006, they announced that they were starting an online music store with
`60,000 tracks which would be DRM-free.
`Lohan Presencer, managing director of the MoS Group, was quoted as saying: “DRM is a nonsense.
`It only succeeds in limiting choice and people still steal music regardless.”
`As The Ministry of Sound is the UK’s largest independent record company, selling about 2 million
`compilation dance CDs a year, and operates an international chain of “super-clubs”, they are one of
`the most significant companies so far to reject DRM.
`eMusic is another music download site which does not feature DRM and has a 13% market share in
`the USA. It recently launched in Europe with a catalogue of 1.7 million tracks from 8,500 inde-
`pendent labels.
`The major advantage touted by both these services is that because they sell mp3s without DRM,
`their tracks can be played on any digital music player, computer or HiFi system.
`iTunes may have the dominant share of paid-for music downloads worldwide, but an intentional limi-
`tation of it’s DRM system, FairPlay, is that it prevents iTunes’ customers from using the purchased
`music on any portable digital music player other than the iPod. This is one of the major criticisms of
`proprietary DRM systems that, instead of protecting intellectual property, they are in fact locking
`consumers into a single technology platform.
`And further problems are becoming evident in the growing VoD. market. Apple users are currently
`locked out of many new services such as the one just launched by Channel 4 in the UK
`That's because Apple has chosen not to licence FairPlay to other companies, hoping that content
`owners will instead use their iTunes platform to distribute their content. However this presents a
`problem for content owners such as C4, whose brand is big enough to justify building their own D2C
`portal. If they see iTunes as a rival and are reluctant to use it to distribute their programmes, their
`only option if they want to protect their content is to use Windows Media DRM which only works on
`PCs. Is the solution here for Microsoft to develop Windows DRM that works on Macs?
`
`Technical innovation and artistic creativity
`The debate is only going to get more intense as the US content industries make a second attempt
`the get the Broadcast Flag technology through Congress. This will insert a digital “watermark” into
`a broadcast stream which will control whether or not it can be recorded, or impose restrictions on
`what can be done with the recording. Ultimately this will restrict viewing of “flagged” content to
`devices which are compliant, forcing consumers to upgrade their technology to compliant devices, or
`miss out.
`A similar debate is happening in Europe where the DVB
`Project is attempting to get its Copy Protection and
`Content Management (CPCM) standard included in the
`next EU Copyright Directive. This is actually regarded as a
`more onerous series of restrictions than the US broadcast
`flag and will finely control which devices can be used to
`view programmes. As it contains a “robustness require-
`ment” that prevents the end user from modifying the
`receiving device, it will be impossible to use open-source
`software such as Linux to create receiving devices.
`This will have a profound effect on the European set-top
`box market as most manufacturers use Linux as their oper-
`ating system.
`This illustrates one of the unintended side-effects of DRM, that it restricts technical innovation.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`8 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`Opponents of DRM argue that the iPod would never have been invented if DRM had been present
`on audio CDs. It’s likely that one of the restrictions that would have been in place would have been
`to only allow audio output to a “trusted” pair of loudspeakers. Thus when CD drives started
`appearing in computers, users would not have been allowed to extract the digital data, i.e. rip them
`to mp3s, unless the content industry had given permission, which seems unlikely. So people would
`not have started storing their music collection as mp3s, there would have been no need to develop
`portable mp3 players and a whole industry would never have arisen.
`
`While some copyright owners might not regard this as a bad thing, acts like the Arctic Monkeys and
`Gnarls Barkley that have grown through file sharing and file downloading would most likely disagree.
`
`It’s not just technical creativity that is compromised, artistic creativity is also hindered. The restric-
`tions imposed by FairPlay mean that a track bought from the iTunes record store cannot be imported
`into any digital editing systems. So if someone editing together their holiday video and wanting to
`run a track bought from iTunes under some of their shots will find they’re unable to.
`
`And while this may be a minor irritation to home video enthusiasts, there are potentially wider
`cultural implications. Throughout history, artists and composers have developed through being
`influenced by or even copying other artists. This article started with the example of Mozart copying
`Allegri’s Miserere, but Bach is also widely credited as an important influence on Mozart, just as
`Mozart himself went on to influence dozens of other composers.
`
`The process continues in the digital age. Over the last few years, artists such as The Kleptones
`have created albums by remixing, or mashing-up, tracks from dozens of artists along with clips from
`films and TV programmes, creating a new art-form in the process.
`
`The restriction on importing tracks bought from iTunes into video-editing software could also contra-
`vene a consumer’s long-held rights. In many countries, copyright includes the principle of fair use.
`While this does not allow wholesale copying of a copyrighted work without the owner’s consent, it
`does allow limited quoting. So inserting a clip from a song into a documentary about music, or into
`an individual’s holiday video would usually be considered as fair use.
`
`Also compromised by DRM is the doctrine of first sale. This means that if you have purchased a
`licence to a copyrighted work, you have the right to sell that licence to someone else. But a digital
`file with DRM applied prevents this, so if I buy an album from iTunes and I don’t like it, I can’t then
`sell it on eBay as I would if I bought a CD I didn’t like.
`
`Battery consumption
`
`A further objection to DRM, especially where handheld devices are concerned, is over the extra
`power consumed by the software.
`
`The website MP3.com tested the battery life of mp3 players, intending to discover how close their
`actual battery life came to the manufacturers’ specs. They were also looking to find out what sort of
`things drained the power more quickly. They weren’t surprised to find that attaching a chunky “DJ-
`look” pair of headphones, or watching videos, quickly drained the batteries but they also discovered
`that restricting songs with DRM can significantly reduce the battery life.
`
`The batteries in a Creative Zen Vision:M lasted for 16 hours when playing mp3s, but when used to
`play WMA subscription tracks, they only lasted just over 12 hours, a drop of 25%. It was the same
`with other PlaysForSure players such as the Archos Gmini 402 Camcorder which lasted 11 hours,
`with mp3s but only 9 hours with DRM tracks.
`
`Considering that one of the biggest complaints about handheld media players is the battery life,
`which is only going to get more acute as new wireless technologies are added and more rich-media
`content is used, something that reduces the effective battery by 25% is a huge issue.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`9 / 10
`
`

`

`DIGITAL RIGHTS MANAGEMENT
`
`Richard Leeming has been working on interactive broadcast content for nearly 10
`years. After being one of the BBC’s first interactive content producers, he joined Red
`Bee Media in 2002 to help set up the Content Factory, running a team which man-
`ages, creates and publishes content for 3, the UK 3G network. In his current position
`as Business Development Manager – Interactive Content, he is responsible for work-
`ing with Red Bee Media’s clients to help them understand how to develop products
`and services for the Mobile Content Market.
`Mr Leeming’s understanding of interactive content draws on his career as a broad-
`cast journalist for the BBC, working for programmes like the Today programme on
`Radio 4, Breakfast and Drivetime on Radio 5 and Newsbeat on Radio 1.
`
`So it would seem sensible then for all players in the digital media market to start moving towards
`some kind of consensus on DRM. Some hard questions need to be asked, and some difficult
`answers arrived at.
`
`Conclusions
`Is it really sound business practice to treat your consumers like thieves? Or to install spyware on
`their computer without them realizing it?
`In an era where, in politics, choice is everything and we go to war over freedom, is it beneficial to the
`bottom-line for the digital media industry to be so actively seeking to restrict people’s choice and
`freedoms over what they watch and listen to?
`We need to start thinking hard about when and how we apply DRM. At IBC’s Multimedia on the
`Move Tutorial in September 2006, Martin Coggin of BT Movio insisted that, because their Virgin
`Lobster DMB receiver had a hard disc, could function as a PVR and could sync to a PC, then DRM
`was absolutely necessary. I found myself wondering – given the quality of the pictures, the size of
`the screen and the inherent usability issues of a mobile phone – how many people were going to go
`to the trouble of pirating content from the BT Movio service? This shouldn’t in any way be regarded
`as a criticism of the BT Movio service, just a recognition that there are some services where DRM
`gets in the way.
`If we regard mobile TV as a promotional service to drive consumers to higher-value broadcast serv-
`ices where the returns are greater, then surely allowing people to distribute the service virally
`increases the uptake and reduces the distribution costs.
`Clearly this doesn’t hold for all content. High-value, short-form content such as music videos or
`sports clips have much greater attraction for pirates and so DRM is vital, but maybe the digital
`content industry could consider the “Economics of Trust”?
`In North London there is a restaurant called “Just Around The Corner”. There are no prices on the
`menu, people pay what they think is fair. In fact, if they pay less than what the owner thinks is fair,
`then he thanks them politely and returns their money. The restaurant has been running for 17 years
`so surely illustrates that if you play to individual people’s better nature, then you will be rewarded.
`
`EBU TECHNICAL REVIEW – January 2007
`R. Leeming
`
`10 / 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket