Feeds

Homeland security urges DRM rootkit ban

Give it up

Using blade systems to cut costs and sharpen efficiencies

US government officials took Sony BMG to task over its controversial use of rootkit-style copy protection at a security conference this week. If the technology proves harmful to consumers, tougher laws and regulations might be proposed, a senior Department of Homeland Security exec warned.

"Legislation or regulation may not be appropriate in all cases, but it may be warranted in some circumstances," said Jonathan Frenkel, director of law enforcement policy with the DHS's Border and Transportation Security Directorate, PC World reports.

Sony BMG's flawed approach to Digital Rights Management technology was exposed after security researchers discovered XCP anti-piracy software, that shipped with some of Sony BMG's music CDs, masked its presence and introduced a vulnerability that hackers and virus writers began to target. Under pressure, Sony was forced to recall discs loaded with the technology and create an exchange program for consumers.

Sony came in for yet more criticism after it emerged that SunComm's MediaMax anti-piracy software, used as an alternative to First4Internet's XCP program on Sony BMG CDs shipped in the US and Canada, also created a security risk. The first version of the patch released to address the SunnComm MediaMax version 5 software had a flaw of its own. Security researchers are currently reviewing a second patch.

DHS officials had a meeting with Sony BMG shortly after the story broke during which the entertainment reps were read the riot act. "The message was certainly delivered in forceful terms that this was certainly not a useful thing," Frenkel said.

Government officials are concerned that the rootkit tactic, if repeated, could leave consumers' systems open to hacker attack. The DHS lacks the power to push through laws itself, but it does have the ears of legislators, if not all the elements of the entertainment industry.

Despite the adverse publicity provoked by the Sony BMG incident, the entertainment industry is still experimenting with the use of rootkit-style copy protection technology. For example, it emerged earlier this week that the German language DVD release of Mr and Mrs Smith, which stars Brad Pitt and Angelina Jolie as a married couple who hide their jobs as assassins from each other, contained a rootkit. The Settec Alpha-DISC copy protection system used on the DVD incorporates rootkit-like features to hide itself, according to an analysis by anti-virus firm F-Secure.

"The recent Sony experience shows us that we need to be thinking about how to ensure consumers aren't surprised by what their software is programmed to do," Frenkel said during a panel discussion at the RSA 2006 security conference in San Jose this week. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.