Digital Decoys

In an attempt to foil those seeking free music, the recording industry is flooding the Internet with fake song files

3 min read
Illustration: Christoph Niemann
Illustration: Christoph Niemann

It plays like something out of the “Twilight Zone”: consider the story of Joe Music Fan. He logs on to his favorite peer-to-peer network to download the new Eminem song. But when he boots up the track, something spooky occurs. Eminem is repeating the same four words over and over. “Holy Encryption!” Joe Music Fan exclaims, “Spoofed again.”

Scenes like this occur a million times a day among the clients of the burgeoning peer-to-peer (P2P) services that have taken over music file sharing from Napster. Recording companies are now taking the offensive against music piracy, and Napster successors such as Morpheus and LimeWire are facing their onslaught—the flooding of their P2P services with so-called spoofs, that is, falsified MP3 files that appear under a song’s usual track name but, when played, offer only a frustrating mix of looped choruses or noise.

special report copy protection graphic

The idea is to hit pirates where it hurts —boxing their ears with spoiled music to encourage them to buy CDs or obtain music on the Web through legitimate methods rather than download songs illegally for free. “Copyright owners would like to use technology to protect their interests so long as they’re not causing damage,” says Cary Sherman, president of the Recording Industry Association of America (RIAA, Washington, D.C.), the recording industry’s trade group. The question is: what, if any, damage is being done?

The company behind the spoofs is Overpeer Inc. (New York City). Overpeer is run by Marc Morgenstern, former senior vice president for new media for the music publishing company, American Society of Composers, Authors, and Publishers (New York City). Overpeer employs dozens of engineers who create altered MP3 files. According to Morgenstern, they protect more than 30 000 titles—including songs, videos, and games—by producing spoofs of them and putting them on the Internet. He calculates that his group blocks more than 200 million acts of piracy every month when its spoofs are downloaded instead of the real things.

“It’s a real cat-and-mouse game,” Morgenstern says. “We continually upgrade and adapt our solution to keep up with the changes of the peer-to-peer clients.”

P2P company Morpheus says that it will have anti-spoof wares in its next upgrade. And BearShare, used by Gnutella surfers, and KaZaA software already employ forms of user ratings that can blow a spoof’s cover.

Mark Gorton, CEO of LimeWire LLC (New York City) just doesn’t see any long-term impact. “I don’t think spoofs have potential to hurt the peer-to-peer network,” he says. “People who download something other than what they’re looking for just delete it and try something else.”

Surveys tell a different story. Lee Black, a senior analyst for Jupiter Research (New York City), a technology research firm, has found that spoofs do frustrate many users. This could help the music industry get its wish: drive consumers to join its online music subscription clubs, MusicNet Inc. or Pressplay (both in New York City).

Meanwhile, content owners want ever stronger weapons. The Peer-to-Peer Piracy Prevention Act, introduced in Congress by Representative Howard L. Berman (D-Calif.), would grant content owners the right to unleash a barrage of hack attacks against online pirates. An example might be denial of service, an online attack that swamps a server with so many requests for a single file that the computer crashes, or at least cannot fulfill legitimate requests.

But the act’s draconian aspects—such as relieving government hackers of liability for any damage done during the pursuit of pirates—have created opposition. Berman no sooner introduced the bill than the Computer & Communications Industry Association (Washington, D.C.), a trade group whose member companies include Yahoo! and AOL Time Warner, issued a press release, declaring that “the last thing we need is to create a protected group of hackers.”

Unprotected hackers expressed their displeasure by swamping the RIAA’s Web site with their own denial-of-service attack. With spoofing on the rise, the salvos have likely just begun.

The Conversation (0)

Video Friday: TurtleBot 4

Your weekly selection of awesome robot videos

4 min read

Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We'll also be posting a weekly calendar of upcoming robotics events for the next few months; here's what we have so far (send us your events!):

Silicon Valley Robot Block Party – October 23, 2021 – Oakland, CA, USA
SSRR 2021 – October 25-27, 2021 – New York, NY, USA

Let us know if you have suggestions for next week, and enjoy today's videos.

Keep Reading ↓ Show less

Air Taxis Are Safe—According to the Manufacturers

But what keeps an eVTOL aloft when things go wrong?

6 min read

Joby Aviation is planning for a 240-kilometer range with its piloted aircraft, carrying up to four passengers.

Joby Aviation

Electric vertical take-off and landing (eVTOL) aircraft for urban commuting are currently under development by more than a dozen different companies. These concepts and prototypes, representing well over a billion dollars of venture capital investment in 2020 alone, promise that sometime in the near future, point-to-point travel between suburbs and urban centers will happen by air using innovative new flying vehicles that are fast, quiet, clean, and far more affordable than a helicopter. United Airlines has ordered 200 eVTOLs. American Airlines has ordered 250, with an option for 100 more. But none of these eVTOL platforms are yet certified to carry passengers, and as a fundamentally different approach to flight, there are still open questions about safety.

A significant difference in safety that separates many eVTOL designs from traditional aircraft (namely, airplanes and helicopters) is that eVTOLs often don't have a good way of passively generating lift in the event of a power system failure. An airplane can rely on its wings to provide lift even if it has no operational engines, and in several cases large passenger airliners with multiple engine failures have been able to make controlled long-distance glides to land safely. Similarly, helicopters can autorotate, using the unpowered rotor to generate enough lift to make a controlled descent and landing.

Keep Reading ↓ Show less

How to Write Exceptionally Clear Requirements: 21 Tips

Avoid bad requirements with these 21 tips

1 min read

Systems Engineers face a major dilemma: More than 50% of project defects are caused by poorly written requirements. It's important to identify problematic language early on, before it develops into late-stage rework, cost-overruns, and recalls. Learn how to identify risks, errors and ambiguities in requirements before they cripple your project.

Trending Stories

The most-read stories on IEEE Spectrum right now