SPYWARE
- PRIVACY VIOLATION
last updated 2009 March 09
 
. This page used in the following courses taught by Prof. Richardson
.
BIT 801 MGD 415
..
 
INTRODUCTION , The growth of Spyware is a direct consequence of the intensity of the global Competitive Environment and the sophisticated offerings of the Technological Environment.

Competition among companies means you have to hang on to your customers and this requires knowing more about what the customer does with your product, or service, and how can this knowledge help you sell them more stuff at a good price so they don't leave you for the competition.

The technological environment continues to move at a fast pace and means that it is possible for companies to use certain advanced technology to allow them to do things that customers might not think possible, or might not even consider - so the spying , in a way, becomes easy cause the customers don't even understand how they could be spied on.

WTGR

.
INTRODUCTION , "Spyware has quickly evolved from an online nuisance to one of the most dire threats facing the Internet. As users struggle to maintain control over their computers, many find themselves trapped in a cyclical battle against programs that install themselves without warning, open dangerous security holes and reinstall themselves after they've been deleted. The worst of these programs allow online criminals to hijack users' sensitive personal information at will. Even the most benign variants can slow computers to a crawl by wasting their processing power to provide unwanted "services." Compounding the problem are the sophisticated ploys spyware developers use to install their programs on unsuspecting users' computers. Spyware distributors often rely on security holes, clever cons, opaque "bundling" arrangements and other unsavory practices to spread their unwanted payload."

from  www.antispywarecoalition.org/documents/definitions.htm
of the Anti Spyware Coalition
permission to quote given by Ross Schulman of the CDT, June 16th, 2006.
Copies of emails kept in the permissions binder.

.
 
Spyware ,
Mari-Lem De Guzman,  in COMPUTERWORLD
(www.ITworldcanada.com) June 9, 2006
wrote a good article titled
"Spyware needs global cure"

Guzman reported on a workshop sponsored by the Anti-Spyware Coalition meeting in Ottawa in May 2006..

.
Anti-Spyware Coalition , Anti-Spyware Coalition

From their site  www.antispywarecoalition.org
"The Anti-Spyware Coalition (ASC) is a group dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies."

"The Center for Democracy and Technology coordinates the Anti-Spyware Coalition. Anti-spyware companies or public interest groups interested in joining the Coalition should contact 
Ari Schwartz, CDT Associate Director at asc@cdt.org or at 202-637-9800"

.
Anti-Spyware Coalition

Glossary

, The Anti-Spyware Coalition has posted a Glossary on their site
http://www.antispywarecoalition.org/documents/glossary.htm click on the screen capture here to access the glossary
permission to quote and link given by Ross Schulman of the CDT, June 16th, 2006.
Copies of emails kept in the permissions binder.
.
DRM 
Digital
Rights
Mgmnt
and
Spyware
, DRM Digital Rights Management and Spyware
John's Car Gianmarco (John) R. in MGD415 in March 2009 was very interested in the topic of spyware and did some digging on his own and sent the following email.

John sent the pic to the left of the car he'll buy with the dot.com job he gets when he finishes UTM - everybody has a right to dream ....

John begins After last class I had read an article by Wade Roush titled Inside the Spyware Scandal

John explains This article examines the misuse of Digital Rights Management (DRM) a technology owned by Sony BMG Music Entertainment that initially was intended to prevent listeners from making copies of the CDs they purchased.  But what actually occurred is that aside from not allowing purchasers from copying CDs the software had a hidden purpose that was added on at the purchaser's expense.   When a Sony music CD is played in a computer, mysterious files that resemble a rootkit is installed in the user?s computer. The purpose of a rootkit is to hide something else, tricking an operating system making it unable to detect worms, viruses and other file that a
hacker wants to hide inside someone else's computer. If customers tried to remove this malware software from their computer the CD drive would disable.

.
.
DRM 
Digital
Rights
Mgmnt
and
Spyware
, DRM Digital Rights Management and Spyware

When Spyware cause "extra" problems

John adds  Every computer that hade been used to play a Sony BMG disc was open to
worms, viruses and other spyware. This spyware secretly contacted Sony BMG via internet every time a PC user played a copy-protected disc even though the original purpose was to hide software stopping users for making copies of their music. This spyware would track people's personal information and addresses and let Sony know if the users are ripping digitally protected disks. 

..
DRM 
Digital
Rights
Mgmnt
and
Spyware
Sony's BMG rootkit became the public symbol of mistrust between the public views about DRM and media companies toward their customers. This turned into a full -blown scandal, full of backroom negotiations, denials and vengeful lawsuits. Although Sony insisted that the rootkit was not deliberatively positioned, their unethical actions persuaded  many observers that the music industry is using deception as a component of digital right management.

Once the rootkit is installed on a customer PC it could open passage to other viruses and Trojan horse programs. It was a Troj/Stinx-E designed to hide itself inside the rootkit and allow other programs to take over user?s computers via connections to an instant-messaging system called Relay Chat.

People who experienced rootkits reported a sense of violation of their privacy.  What made things even worse was even if detected, rootkits are almost impossible to remove from an individual's hard drive because Sony did not divulge how to remove it.  The only solution is the reinstalling the whole operating system.  A solution not easily accepted or embraced by the general public.

Although Sony tried to settle the matter with US District Court for southern New York by providing every individual who owed a disc with XCP with a replacement disc of $7.50 cash payment, it did not settle the customers' uneasiness with the fact Sony BMG concealed its presence.  They felt Sony trespassed on fundamental protections - the
right to privacy and private ownership and the freedoms of expression and access to information 

WTGR adds, the scandal that John discusses became so "famous" that it has its own page on Wikipedia - you can read more here at
 http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal

.
SONY rootkit image from http://www.sevensheaven.nl/images/producten/illustration-illustratie_sony-rootkit.jpg
.
.
Permission use articles from ComputerWorld given by Greg Enright, Editor, ComputerWorld Canada, June 14th, 2006.
Copies of emails kept in the permissions binder
.
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I
.
.