{"id":1210,"date":"2013-11-21T15:57:38","date_gmt":"2013-11-21T15:57:38","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1210"},"modified":"2019-11-15T23:18:54","modified_gmt":"2019-11-15T12:18:54","slug":"protecting-business-parameters-why-records-of-famous-musicians-leak-before-the-time","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/protecting-business-parameters-why-records-of-famous-musicians-leak-before-the-time\/1210\/","title":{"rendered":"Protecting business parameters: why records of famous musicians leak before the time"},"content":{"rendered":"<p>It\u2019s no wonder that every major figure in show business is not simply an artist, but is an entire business infrastructure. This type of infrastructure is comprised of marketing, sales and everything else that a commercial enterprise involves \u2013 or in marketing terms \u2013 it\u2019s about the <i>creating and selling of intellectual and entertainment products<\/i>. In the music industry the focus certainly appears to be on making music, but since this is information too, music is exposed to the same threats as any other data. In recent years leaks of tracks and whole albums before official releases have become an epidemic on the Web. In fact, it is a common security incident.<\/p>\n<div class=\"pullquote\">A music record is a piece of digital data, which can be stolen and protected from theft just the same way as any other information.<\/div>\n<p>Eminem\u2019s new album, one of the most successful rappers of our time, was widely anticipated long before its release. Preemptive promotion was conducted and the public received information about the album in small doses to maintain interest in its. In the end, all that could have been announced had been announced. The title, tracklist, cover, guest participants, date of release \u2013 all went public. Two singles had already debuted, yet a week before the official release date \u201csomething went wrong\u201d and the album <a href=\"http:\/\/9to5mac.com\/2013\/11\/01\/after-album-leak-eminems-marshall-mathers-lp-2-stream-hits-itunes-radio-first-play-station\/\" target=\"_blank\" rel=\"noopener nofollow\">leaked<\/a> on the web ahead of schedule.<\/p>\n<p>This type of situation has become commonplace. So common in fact, that gossip columnists are always looking to find out if leaks are now actually targeted PR campaigns. There are many reasons for these suspicions. Firstly, every leaked album is another occasion to raise the issue of piracy. Both labels and artists suffer from piracy, with new artists feeling the brunt much more than the \u201crich and famous\u201d well established ones. Secondly, a leak is extra news; it\u2019s an additional reason to draw attention to an artist, and public attention is the highest valued currency.<\/p>\n<p>In some cases the leaks of separate tracks or entire albums were not PR actions, but were actually breaches that required urgent measures to minimize damage. In the above case, the label\u2019s lawyers promptly managed to withdraw the album from Soundcloud.<\/p>\n<p>Eminem is not the only world-renown artist to become a data loss victim in the past two years.<\/p>\n<p>\u00a0<\/p>\n<p><b>My true fans wouldn\u2019t do this<\/b><\/p>\n<p>In 2011 the \u201cthen\u201d new Madonna single \u201cGive Me All Your Luvin'\u201d leaked on the Internet. The single had been thoroughly publicized, featuring Nicki Minaj &amp; M.I.A.. Prior to its release, the forthcoming single surfaced online, and it turned out the track was a poor demo recording by Madonna (alone).<\/p>\n<p>The damage the singer felt may be judged by the fact that her lawyers found the person guilty of copying her track far away in Zaragoza, Spain. <a href=\"http:\/\/www.nme.com\/news\/madonna\/61107\" target=\"_blank\" rel=\"noopener nofollow\">And they passed him over to the police<\/a>. It turned out the song was published on the Web by a crazy fan of Madonna, though it remained a mystery how he got the demo recording. However, the singer said that her true fans wouldn\u2019t have done this to her.<\/p>\n<p>\u00a0<\/p>\n<p><b>The negligible damage<\/b><b>\u00a0<\/b><\/p>\n<p>The schoolgirl idol, Justin Bieber, released his album \u201cBelieve\u201d in June 2012. However, prior to the release, listeners had had the <a href=\"http:\/\/uk.eonline.com\/news\/326330\/justin-bieber-album-sales-did-internet-leak-hurt-or-help\" target=\"_blank\" rel=\"noopener nofollow\">opportunity<\/a> to download his new songs because the tracks had \u201csuccessfully\u201d leaked. However, the sales of the album did not seem to suffer from the incident because the disk immediately topped the charts.<\/p>\n<p>\u00a0<\/p>\n<p><b>Grab some shovels<\/b><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/11\/06015841\/ladygaga.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1212\" alt=\"ladygaga\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/11\/06015841\/ladygaga.png\" width=\"275\" height=\"318\"><\/a><\/p>\n<p>In mid-April 2011, Lady Gaga\u2019s record label was <a href=\"http:\/\/www.nme.com\/news\/lady-gaga\/56236\" target=\"_blank\" rel=\"noopener nofollow\">forced to rush-release<\/a> the single \u201cJudas\u201d. The reason for the haste was that someone had posted the song on the Web. Gaga\u2019s resentment was enormous: she directly stated that the track surfacing on the Internet was like a \u201cslow death\u201d for the song.<\/p>\n<p>In August 2013, the story was repeated when unidentified hackers stole her single \u201cApplause\u201d from the then forthcoming album \u201cARTPOP\u201d. The second incident enraged and <a href=\"http:\/\/www.nme.com\/news\/lady-gaga\/71959\" target=\"_blank\" rel=\"noopener nofollow\">offered<\/a> to help one of her colleagues, Katy Perry, by \u201cgrab[bing] some shovels and fuck[ing] up some hackers\u201d who released the track a week before the planned date.<\/p>\n<p>Shortly before that, Perry had her song \u201cRoar\u201d <a href=\"http:\/\/consequenceofsound.net\/2013\/08\/listen-to-katy-perrys-new-single-roar\/\" target=\"_blank\" rel=\"noopener nofollow\">leaked<\/a> three days before its release. Later in October 2013, her whole album leaked. Perry had to post on her website the official \u201csampler\u201d with ninety second fragments of each track so that potential buyers could get a first impression of the released music.<\/p>\n<p>\u00a0<\/p>\n<p><b>The copious year<\/b><\/p>\n<p>Lady Gaga, Katy Perry and Eminem are just some of the famous musicians who\u2019ve had to deal with leaks, but Lana Del Rey has <a href=\"http:\/\/www.nme.com\/news\/lana-del-rey\/72087\" target=\"_blank\" rel=\"noopener nofollow\">suffered<\/a> the most out of all of them. She had five songs leak in the past two years, some of which were intended for her new album. Del Rey even hinted at quitting music.<\/p>\n<p>She was one of the few artists who honestly reported the most likely reason for the leaks:<\/p>\n<p>\u201c<i>To be honest, what really happened was, three years ago somebody remotely accessed my hard drive, so even songs I\u2019ve never emailed to myself [were accessed]. There are hundreds of them.<\/i>\u201d<\/p>\n<p>\u00a0<\/p>\n<p><b>No leaks in three clicks<\/b><\/p>\n<p>The point is that a musical recording is nothing more than a digital file. When compressed (in MP3, for example) it takes up very little space, so it is easy to send by email.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/11\/06015841\/lanadelrey.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1213\" alt=\"lanadelrey\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/11\/06015841\/lanadelrey.png\" width=\"275\" height=\"334\"><\/a><\/p>\n<p>But an email account can be hacked, and a computer can be accessed without authorization with malware or through a hacker attack. Cases of leaked musical tracks actually illustrate typical problems with sensitive data protection. It\u2019s mainly about careless storage. Do artists consider storing their records in a protected form?<\/p>\n<p>Of course, while one or more songs are being recorded, gigabytes of data are often generated. Uncompressed audio tracks occupy significant disk space. Encrypting and decrypting them all before each session would take up too much time, and studio time is very expensive. Nobody is likely to agree to it.<\/p>\n<p>But it is not very difficult to protect these types of files in the interim and especially the final results, stowing the main product away from other people\u2019s hands and ears. It is sufficient to store a finished record in an <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/Kaspersky-File-Level-Encryption-Technology.pdf\" target=\"_blank\" rel=\"noopener nofollow\">encrypted form<\/a>, in the recording studio and by the record label\u2019s point person.<\/p>\n<p>From a commercial point of view, musical recordings, as mentioned above, are exactly the same data as software or any other intellectual product. Methods for protecting business information were developed a long time ago. Protective software solutions for fixed platforms (PCs) and mobile devices have long proved their maturity and efficiency. The final issue lies in the human factor, in order to solve these data protection problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no wonder that every major figure in show business is not simply an artist, but is an entire business infrastructure. This type of infrastructure is comprised of marketing, sales<\/p>\n","protected":false},"author":209,"featured_media":16349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[961,1168],"class_list":{"0":"post-1210","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-leaks","10":"tag-sensitive-data"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-business-parameters-why-records-of-famous-musicians-leak-before-the-time\/1210\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-business-parameters-why-records-of-famous-musicians-leak-before-the-time\/1210\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-business-parameters-why-records-of-famous-musicians-leak-before-the-time\/1210\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/leaks\/","name":"leaks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1210\/revisions"}],"predecessor-version":[{"id":25367,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1210\/revisions\/25367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/16349"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=1210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=1210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}