2 min read

US Intellectual Property Watchdog Suggests Malware-Like DRM to Fend Off Piracy

Bogdan BOTEZATU

May 28, 2013

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
US Intellectual Property Watchdog Suggests Malware-Like DRM to Fend Off Piracy

The latest report of the Commission on the Theft of American Intellectual Property ” an independent association that assesses damage done by piracy in the US ” has published recommendations for tackling consumers of pirated materials.

The 100-page report also mentions the possibility for developers to seize control of computers running their products if there is suspicion the products aren`t properly licensed.

Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user`s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account,“ reads page 89 of the report.

If this sounds familiar, you`re right ” it`s the same approach used by the cyber-criminal team behind the notorious Reveton / IcePol family of malware that held hundreds of thousands of computers at ransom by locking users out of their desktop.

Broken recommendations

While the document does not mention game piracy or other home-user oriented software, the adoption of such a law would likely generate side effects for home users ” a category of consumers that has been actively chased by IP rights organizations such as MPAA and RIAA in the past.

Such measures do not violate existing laws on the use of the Internet, yet they serve to blunt attacks and stabilize a cyber incident to provide both time and evidence for law enforcement to become involved,” the report states.

Newsflash: there is no central Internet governing body, nor are there universally-acceptable laws to determine what constitutes piracy and what does not in a specific region. Most of the times, the infringer and the IP owner are in different jurisdictions with different opinions on what constitutes abusive use.

Secondly, DRM implementations to date are known to misfire: there are plenty of cases where users of legit software have been flagged as pirates – and this is not limited to games only. It`s all fun and games until someone loses access to their PC. This should have been a lesson learned from the Sony rootkit scandal almost a decade ago.

tags


Author



Right now

Top posts

The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Iranian Threat Actor Deployed Malicious PowerShell Script through Phishing, Then Stole Files and Credentials Iranian Threat Actor Deployed Malicious PowerShell Script through Phishing, Then Stole Files and Credentials
Silviu STAHIE

November 26, 2021

1 min read
Ukraine Arrests Five iPhone Hackers of the Phoenix International Hacking Group Ukraine Arrests Five iPhone Hackers of the Phoenix International Hacking Group
Filip TRUȚĂ

November 26, 2021

1 min read
Couple arrested for secretly installing cryptomining software on department store PCs Couple arrested for secretly installing cryptomining software on department store PCs
Graham CLULEY

November 26, 2021

1 min read