- 2022 BEITC Proceedings
- 2021 BEITC Proceedings
- 2020 BEITC Proceedings
- 2023 BEITC Proceedings
- Broadcast Facility Design
- Sustainability and 5G
- Cybersecurity and Trusted Content
- Video Coding Techniques
- Innovaton in Radio
- Media and Cloud 1
- Media and Cloud 2
- Media Workflow
- National Security Applications of ATSC 3.0
- Next Gen TV Adoption
- OTT / Connected TV
- Radio Technology
- AI and Data Analytics in Media
- RF Technology and Spectrum Issues
Cybersecurity and Trusted Content
Cybersecurity “Proof of Performance” for the Broadcast IT System - $15Date: April 14, 2023Topics: 2023 BEITC Proceedings, Cybersecurity and Trusted Content
The broadcast station today relies on an Information Technology (IT) infrastructure based upon the Internet Protocol (IP) whether a small radio station or a state-of-the-art ATSC 3 TV facility. Protecting the infrastructure against cyber threats grows more challenging each year for the broadcast IT engineer. Threats are constantly evolving and the cybersecurity precautions implemented must evolve as well. New Federal Communications Commission (FCC) regulations will likely add EAS focused cybersecurity compliance requirements in 2023.
It is essential to know your vulnerabilities and potential exposure to cyber criminals before implementing the necessary precautions. Penetration testing or pen testing provides a proof-of-performance of the broadcast IT infrastructure through proactive identification of cybersecurity holes and vulnerabilities. Precautions thought to be in place can be verified and any missing protections implemented before exploited by the cybercriminal.
This paper and presentation will explore the concepts of penetration testing, the value of use and tools available to apply to the broadcast IT environment as an approach to validating the cybersecurity readiness of the broadcast IT infrastructure against cyberattacks.
Wayne Pecena | Texas A&M University – KAMU TV & FM | College Station, Texas, United States
Fighting Misinformation with Authenticated C2PA Provenance Metadata - $15Date: April 14, 2023Topics: 2023 BEITC Proceedings, Cybersecurity and Trusted Content
Over the last three years, teams from Microsoft, The New York Times, CBC/Radio-Canada and The BBC have come together as Project Origin. This group has participated as part of a wider community in the standardization of provenance signaling technologies to attach authenticated metadata to media content. The Coalition for Content Provenance and Authenticity (C2PA) specification was the result of these collaborative efforts. This paper will outline the features of the C2PA specification, and the work being undertaken to add this functionality to existing media production workflows to add transparency and counter disinformation and malicious use of synthetic media.
Nigel Earnshaw | The British Broadcasting Corporation | London, United Kingdom
Jonathan Dupras | CBC/Radio-Canada | Montreal, Quebec, Canada
Bruce MacCormack | Neural Transform | Lunenburg, Nova Scotia, Canada
Real Radio Hosts Working Virtually: How Real Humans Work with Containerized Broadcast Systems - $15Date: April 14, 2023Topics: 2023 BEITC Proceedings, Cybersecurity and Trusted Content
Some radio broadcasters are anticipating their deployment of broadcast software as part or most of their virtualized studio and broadcast infrastructure. A few radio stations and radio networks have already moved to a largely virtualized infrastructure while others are beginning the process now. The virtues of virtualization have been the topic of several dozen professional presentations ranging from manufacturers’ revelations to scholarly presentations.
With several systems on-air now, it’s time to ask, “How is working with virtualized broadcast systems either different from or similar to traditional broadcast gear?”
This NAB BEITC presentation asks that question and presents answers from broadcast engineers, broadcast IT professionals, and on-air talent.
Kirk Harnack | Telos Alliance | Nashville, Tennessee, United States