SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Copyright and You
“Warez” the Copyright Violation?
Digital Copyright Infringement:
Legal Loopholes and Decentralization
By Christopher Adamsick




P
       eople are in violation of copy-       as in software] is a generic term used       includes four safe harbors that protect
       right law when they copy or           to refer to copyrighted materials that       OSPs from the potential copyright
       distribute copyrighted material       are shared illegally over the Internet       violating behavior of their customers
without the consent of the copyright         (Goldman, 2004). Taking the form of          (Wright, 2006). As a safeguard against
holder. Enforcement of digital copy-         an executable file (.exe or .app) or other   disenfranchising OSPs, the four safe
right violations are continually thwart-     digitally encoded form (e.g., .mp3, .jpg,    harbors of the DMCA include the: (a)
ed by the large population of users          or .mpg file), warez generally consist of    Transitory Communications Safe Har-
who participate in online file sharing       commercially available computer soft-        bor, (b) Network Storage Safe Harbor,
and the rapid technological innova-          ware, audio and video, video games,          (c) System Caching Safe Harbor, and
tion that usually keeps the file-shar-       still pictures, as well as just about any-   (d) Information Location Tools Safe
ing community one-step ahead of the          thing else that can be packaged and          Harbor (2006).
law (Wright, 2006). As “the courts ex-       delivered over the Internet (e.g., books,       Currently, “tens of millions of Amer-
pound rules to pin liability…technolo-       pornography). When compared to               icans engage in…file sharing” (Gold-
gy developers [subsequently] find and        the price of actually purchasing the         man, 2004, p. 34-35). It has proven to
exploit loopholes” (Choi, 2006, p. 394).     product legally, the fee for download-       be an overwhelming task for “Big Con-
Learning from the court case which           ing such a file usually consists of the      tent” (the DMCA) to make inroads
revealed the mistakes of Napster and         comparatively low price of sharing the       in stopping this phenomenon, due to
other early litigation involving digital     file electronically (Choi, 2006; Ludwig,     the sheer number of people who ac-
copyright material, several technolo-        2006; Schoen, 2006).                         tually participate in illegal file-sharing
gies currently exist in the nexus of            Current copyright laws and pending        (Cheng, 2008). As The Harvard Crim-
these loopholes, including: Usenet           legislation attempt to protect copyright     son staff write: “Litigation may persist,
(e.g., Giganews), decentralized peer-        holders from those who would infringe        but the problem of lost revenues will
to-peer filesharing (e.g., Limewire),        on such rights (Butler, 2004; Goldman,       never be relieved by virtue of litiga-
and extraterritorial one-click file-host-    2004; Schoen, 2006). For example,            tion [on an individual-by-individual
ing (e.g., Rapidshare) (Wright, 2006).       the Digital Millennium Copyright             basis]” (The Crimson Staff, 2007, p. 7).
This short essay will examine copy-          Act (DMCA) adds certain additional           Likewise, U.S. lawmakers have proven
right violations involving each of these     measures to existing copyright law, in-      that they have neither the desire nor
separate technologies, as well as some       cluding the provisions to: (a) restrict      the human/financial resources to make
of the issues that serve to undermine        anti-circumvention technologies, (b)         criminals out of tens of millions of
the enforcement of copyright law on          subpoena online infringers, and (c) no-      generally law-abiding citizens. In ad-
the digital frontier.                        tify and takedown infringing materials       dition to taking legal action against a
                                             (Goldman, 2004; Ludwig, 2006). Since         small fraction of copyright violators
Background                                   online service providers (OSPs) supply       (Lobowitz, 2005; Moen, 2003; Wright,
                                             much of the networking infrastruc-           2006), Big Content increasingly takes
  The word warez [pronounced as a            ture in the United States, the DMCA          action against (a) the developers of file-
single syllable as if the plural of “ware”

10                                      TechTrends • November/December 2008                                    Volume 52, Number 6
sharing software, (b) OSPs, and (c) the       material on its Usenet server, AOL           Usenet file sharing, tracking and con-
search engines that make file sharing a       was cleared of liability that it materi-     trolling digital copyright infringement
feasible enterprise (Ludwig, 2006).           ally contributed to the infringing act.      in a decentralized P2P networking en-
                                              At the time of the infringement, how-        vironment has proven to be an exceed-
Who is the violator?                          ever, AOL had recently changed the           ingly difficult endeavor (2003).
   Usenet is the granddaddy of all file-      email address for reporting copyright           Similar to litigation against Usenet
sharing technologies (Roettgers, 2007;        infringement and had never received          infringers and the technologies that
Wright, 2006). Designed in 1978 by            Ellison’s email concerning copyright         make it possible, the prosecution of
two Duke University graduate stu-             violations of his work (2006). Due to        P2P file sharing technologies has prov-
dents, its original purpose was to act        its technological oversight, AOL’s case      en to be an uphill battle. In the wake of
as an asynchronous discussion board           was deemed triable since it had the po-      Napster, for example, Grokster distrib-
consisting of hierarchically arranged         tential to know of the infringing activi-    uted its free P2P software within the
newsgroups (e.g., alt.binaries). As such,     ties of its customers. The claim resulted    decentralized framework mentioned
persons post messages or binary files         in AOL removing the particular news-         above (Hirning, 2006). In MGM v.
to a newsgroup on their OSP’s Usenet          group from its Usenet server, and El-        Grokster, however, the Grokster tech-
server. Subsequently, the message or          lison and AOL reached an out-of-court        nology itself was targeted (2006). In the
file is copied to Usenet servers around       settlement.                                  Grokster case, the question was raised
the world in a process referred to as            Other Usenet services proved to learn     as to “whether the mere existence or
propagating or peering (Wright, 2006).        from the mistakes of AOL. For example,       prominence of a product’s non-infring-
Today, over 24 million messages are           Giganews is the largest Usenet service       ing uses could be sufficient to protect a
posted each week to one of more than          provider in the world, retaining binary      software distributor from indirect li-
100,000 newsgroups, with the alt.bina-        files (e.g., copyrighted movies, songs or    ability.” (p. 14)
ries category of newsgroups occupying         pictures) for 200 days, as well as provid-      Despite more than 90 percent of its
nearly 99 percent of all the data stored      ing access to over one billion messages      network activity involving illegal file
on Usenet servers (2006). Not surpris-        (Roettgers, 2007a). In order to exist        sharing, Grokster claimed its software
ingly, this is also where most of the ille-   within the loopholes of the DMCA,            was capable of many non-infring-
gally-shared copyrighted materials re-        Giganews offers (a) deliberately vague       ing uses, nor did it have any specific
side on Usenet (Ludwig, 2006; Wright,         advertisements, (b) an accessible lo-        knowledge of infringing activity due
2006).                                        cation for copyright holders to notify       to the network’s decentralized nature
   Prosecuting Usenet copyright in-           Giganews in instances of copyright in-       (2006). Ultimately, the Supreme Court
fringement on an individual-by-indi-          fringement, and (c) a newsgroup archi-       found that Grokster’s advertising and
vidual basis is an insurmountable task        tecture that is “coupled with secure SSL     business actions directly fostered copy-
(Roettgers, 2007a). As such, a recent         transmissions” (Mennecke, 2007, p. 3).       right infringement (2006). For ex-
trend for copyright holders has been          As a result, end-users are granted near      ample, in the help documentation of
to expand their legal strategy beyond         total anonymity, and Giganews is con-        the Grokster client, a screen shot was
individuals to include Usenet service         ceivably protected from liability under      presented of a search query involving
providers as well as Usenet search sites      the DMCA’s Safe Harbor provisions            a copyrighted work (2006). As such,
(2007a). In Ellision v. Robertson, for        (Mennecke, 2007, Roettgers, 2007a).          Grokster was found to induce its end
example, Robertson scanned the popu-                                                       users’ infringement.
lar works of science fiction writer Har-      How does decentralizing                          Again, the file sharing community
lan Ellison and posted them to a Usenet       change the picture?                          proved to learn from even the minimal
newsgroup named alt.binaries.ebook                                                         mistakes of its predecessors. For exam-
                                                Whereas Usenet is the granddaddy           ple, Limewire’s P2P file sharing software
(Ludwig, 2006). After discovering the         of all file sharing technologies, peer-to-
copyright infringement of his work,                                                        client runs on a global networking pro-
                                              peer file sharing (P2P) represents a rel-    tocol named Gnutella (Schoen, 2006).
Ellison filed a liability claim against       atively new and different form of file-
America OnLine (AOL), Robertson’s                                                          Similar to the Grokster P2P network,
                                              swapping technology (Schoen, 2006).          Gnutella consists of a network frame-
OSP (2006). Ellison claimed AOL acted         As such, it allows a large population
as a contributory infringer, as it either                                                  work of open standards as well as the
                                              of users to share public or copyrighted      decentralization of information (2006).
had knowledge of the infringing activ-        materials over the Internet, and oper-
ity, or induced, caused or materially                                                      In other words, Gnutella technology
                                              ates within a decentralized manner.          does not belong to anyone (2006). Al-
contributed to the infringing conduct         While storing copyrighted materials
of [its customers] (Ludwig, 2006).                                                         beit Limewire does contain end-user
                                              in a central location proved to be Nap-      documentation (e.g., help screen) sim-
   Seeking liability immunity under           ster’s downfall, decentralized P2P net-
two of the DMCAs Safe Harbor provi-                                                        ilar to any P2P client, the screen shot of
                                              works (e.g., Gnutella, BitTorrent) oper-     a sample query involves a rather vague,
sions, AOL argued it neither knew of          ate in an environment where files are
the infringing activity nor materially                                                     benign search for speeches. Subsequent
                                              stored on millions of users’ computer        screen shots display works of famous
contributed to it (Ludwig, 2006). De-         hard drives (Moen, 2003). Similar to
spite actually storing the copyrighted                                                     old speeches, which are typically non-

Volume 52, Number 6                               TechTrends • November/December 2008                                               11
copyrighted, public domain works. As         are shared via web forums or blogs, the    Cola on its own website (p. 9). Accord-
a result, Schoen (2006) suggests, “it will   content is readily indexed via Google.     ing to Roettgers (2007b):
be very difficult for a future court to      com (2007b). For example, a proxim-          This must feel like a slap in the face
find express intent to induce infringe-      ity query of the Google search engine      for rights holders organizations that
ment in Limewire’s case.” (p. 59)            using the search terms “mariah carey,”     have spent years to sue P2P operators
                                             “.mp3,” and “rapidshare.com” results       and thousands of their users to make file
What about not sharing                       in 126,000 hits. While not every URL       sharing networks less profitable and at-
                                             contains a link to a shared copy of one    tractive. To some degree, they succeed-
the file?                                    of Mariah Carey’s songs or albums,         ed—and in turn helped to build a whole
   One-click file hosting is a newcomer      many of them do provide direct rapid-      new industry that makes companies like
on the warez scene (Roettgers, 2007b).       share links to her copyrighted music.      Grokster look like small fish (p. 10).
The process of the file hosting business     In addition to music, end users of one-
is simple, as end-users (a) upload a file    click hosting services share copyright-    Conclusion
to a server, (b) are given a web link        ed software, movies, video games, and         With monumental increases of warez
(URL) to the file, and (c) subsequently      pornography.                               available, enforcing digital copyright
share the URL with others via a web             Although one-click hosting is gener-    laws remains rife with formidable ob-
forum or blog (2007b). One-click file        ally protected by the DMCA’s Safe Har-     stacles. Big Content, the DMCA, as well
hosting service plans are not pricey,        bors, both Rapidshare (Switzerland,        as the judiciary are seemingly thwarted
asking minimal or no fees. The two           Germany) and Megaupload (Hong              by (a) the large, decentralized popula-
largest one-click file hosting services      Kong) reside outside of the United         tion of end users, (b) existing loopholes
are Rapidshare.com and Megaupload.           States (2007b). While Germany’s ver-       in the DMCA, as well as (c) a judiciary
com (2007b). Since their inception,          sion of the RIAA has filed suit against    which is unable to keep pace with the
both services have been ranked as high       Rapidshare, “it’s unlikely that Rapid-     rapid development of file sharing tech-
as number 13 and 18 on the Alexa.com         share will be forced to shut down any      nologies. Due to the ubiquity of file
list of the most popular sites on the In-    time soon, [as] there are plenty of ser-   sharing in the United States, the lines
ternet (2007b).                              vices waiting to fill the gap already.”    that separate general law-abiding citi-
   Neither Rapidshare or Megaupload          In a weird twist of fate, Megaupload       zens from criminals are blurred.
index the content of their servers.          recently featured advertising from Mi-
Since the URLs to most one-click files       crosoft, Levi’s, McDonalds and Coca




12                                     TechTrends • November/December 2008                                   Volume 52, Number 6
Warez

Contenu connexe

Tendances

E marketing the essential guide to online marketing
E marketing   the essential guide to online marketingE marketing   the essential guide to online marketing
E marketing the essential guide to online marketingrealtop466
 
Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internetMoneFatima
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 versionJohan Koren
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internetgladyslising
 
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11William Hall
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunitiesmorganjbruce
 
Activity12 timeline history of internet ENCINA_ROGATINA
Activity12 timeline history of internet ENCINA_ROGATINAActivity12 timeline history of internet ENCINA_ROGATINA
Activity12 timeline history of internet ENCINA_ROGATINAENCINA_ROGATINA
 
Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internetjanmarienedilei
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the InternetCharles Soriano
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
The Links that Became a Web: The 45-year Old Internet and the 25-Year Old Web
The Links that Became a Web:  The 45-year Old Internet and the 25-Year Old WebThe Links that Became a Web:  The 45-year Old Internet and the 25-Year Old Web
The Links that Became a Web: The 45-year Old Internet and the 25-Year Old WebJohan Koren
 
Activity12_ History of Internet
Activity12_ History of InternetActivity12_ History of Internet
Activity12_ History of InternetNiza Uy
 

Tendances (19)

E marketing the essential guide to online marketing
E marketing   the essential guide to online marketingE marketing   the essential guide to online marketing
E marketing the essential guide to online marketing
 
Websites
WebsitesWebsites
Websites
 
Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internet
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
 
Sekolah ictl
Sekolah ictlSekolah ictl
Sekolah ictl
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
 
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
 
Activity12 timeline history of internet ENCINA_ROGATINA
Activity12 timeline history of internet ENCINA_ROGATINAActivity12 timeline history of internet ENCINA_ROGATINA
Activity12 timeline history of internet ENCINA_ROGATINA
 
Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internet
 
Sopa pipa.key
Sopa pipa.keySopa pipa.key
Sopa pipa.key
 
Isa12a
Isa12aIsa12a
Isa12a
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the Internet
 
Polinter12
Polinter12Polinter12
Polinter12
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Rkcsi2012
Rkcsi2012Rkcsi2012
Rkcsi2012
 
The Links that Became a Web: The 45-year Old Internet and the 25-Year Old Web
The Links that Became a Web:  The 45-year Old Internet and the 25-Year Old WebThe Links that Became a Web:  The 45-year Old Internet and the 25-Year Old Web
The Links that Became a Web: The 45-year Old Internet and the 25-Year Old Web
 
Polinter12
Polinter12Polinter12
Polinter12
 
Activity12_ History of Internet
Activity12_ History of InternetActivity12_ History of Internet
Activity12_ History of Internet
 

En vedette

Nike Free 3.0 V5 Homme Chaussures LR7
Nike Free 3.0 V5 Homme Chaussures LR7 Nike Free 3.0 V5 Homme Chaussures LR7
Nike Free 3.0 V5 Homme Chaussures LR7 fanaticaltariff30
 
Filing Efficiency Improved by 40% with Moduflex System
Filing Efficiency Improved by 40% with Moduflex SystemFiling Efficiency Improved by 40% with Moduflex System
Filing Efficiency Improved by 40% with Moduflex SystemTracy Spence
 
Apple’s iOS 8 Finally Arrives Beaming with New Features
Apple’s iOS 8 Finally Arrives Beaming with New FeaturesApple’s iOS 8 Finally Arrives Beaming with New Features
Apple’s iOS 8 Finally Arrives Beaming with New Featuresmygovtcellblog
 
INSPIRE - Open Data Manchester - July 2014
INSPIRE - Open Data Manchester - July 2014INSPIRE - Open Data Manchester - July 2014
INSPIRE - Open Data Manchester - July 2014Open Data Manchester
 

En vedette (6)

Nike Free 3.0 V5 Homme Chaussures LR7
Nike Free 3.0 V5 Homme Chaussures LR7 Nike Free 3.0 V5 Homme Chaussures LR7
Nike Free 3.0 V5 Homme Chaussures LR7
 
Filing Efficiency Improved by 40% with Moduflex System
Filing Efficiency Improved by 40% with Moduflex SystemFiling Efficiency Improved by 40% with Moduflex System
Filing Efficiency Improved by 40% with Moduflex System
 
Nuevos ejercicios
Nuevos ejerciciosNuevos ejercicios
Nuevos ejercicios
 
Apple’s iOS 8 Finally Arrives Beaming with New Features
Apple’s iOS 8 Finally Arrives Beaming with New FeaturesApple’s iOS 8 Finally Arrives Beaming with New Features
Apple’s iOS 8 Finally Arrives Beaming with New Features
 
Sekai No Owari De
Sekai No Owari DeSekai No Owari De
Sekai No Owari De
 
INSPIRE - Open Data Manchester - July 2014
INSPIRE - Open Data Manchester - July 2014INSPIRE - Open Data Manchester - July 2014
INSPIRE - Open Data Manchester - July 2014
 

Similaire à Warez

Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The InternetAdjem
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The InternetAdjem
 
File Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalFile Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalSherry Bailey
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distributionmustafa sarac
 
Regulating Cyberspace Should certain forms of speech in .docx
Regulating Cyberspace Should certain forms of speech in .docxRegulating Cyberspace Should certain forms of speech in .docx
Regulating Cyberspace Should certain forms of speech in .docxdebishakespeare
 
After the Revolutions
After the RevolutionsAfter the Revolutions
After the RevolutionsMike Godwin
 
Week 10 Legal Ethical Considerations
Week 10 Legal Ethical ConsiderationsWeek 10 Legal Ethical Considerations
Week 10 Legal Ethical ConsiderationsSarah Stokely
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxalanfhall8953
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesHaggen So
 
Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpoliticsoiwan
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.BarCamp Lithuania
 
The Myth of Free Information
The Myth of Free InformationThe Myth of Free Information
The Myth of Free InformationKamesh Aiyer
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 

Similaire à Warez (20)

Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
File Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalFile Sharing Should Not Be Illegal
File Sharing Should Not Be Illegal
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Darknet5 (1)
Darknet5 (1)Darknet5 (1)
Darknet5 (1)
 
Pptx present
Pptx presentPptx present
Pptx present
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distribution
 
Regulating Cyberspace Should certain forms of speech in .docx
Regulating Cyberspace Should certain forms of speech in .docxRegulating Cyberspace Should certain forms of speech in .docx
Regulating Cyberspace Should certain forms of speech in .docx
 
After the Revolutions
After the RevolutionsAfter the Revolutions
After the Revolutions
 
Week 10 Legal Ethical Considerations
Week 10 Legal Ethical ConsiderationsWeek 10 Legal Ethical Considerations
Week 10 Legal Ethical Considerations
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
 
Free Software Movement and Open Source Communities
Free Software Movement and Open Source CommunitiesFree Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
 
Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
fightingdci
fightingdcifightingdci
fightingdci
 
Polinter10
Polinter10Polinter10
Polinter10
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
 
The Myth of Free Information
The Myth of Free InformationThe Myth of Free Information
The Myth of Free Information
 
Software piracy
Software piracySoftware piracy
Software piracy
 

Dernier

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Dernier (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Warez

  • 1. Copyright and You “Warez” the Copyright Violation? Digital Copyright Infringement: Legal Loopholes and Decentralization By Christopher Adamsick P eople are in violation of copy- as in software] is a generic term used includes four safe harbors that protect right law when they copy or to refer to copyrighted materials that OSPs from the potential copyright distribute copyrighted material are shared illegally over the Internet violating behavior of their customers without the consent of the copyright (Goldman, 2004). Taking the form of (Wright, 2006). As a safeguard against holder. Enforcement of digital copy- an executable file (.exe or .app) or other disenfranchising OSPs, the four safe right violations are continually thwart- digitally encoded form (e.g., .mp3, .jpg, harbors of the DMCA include the: (a) ed by the large population of users or .mpg file), warez generally consist of Transitory Communications Safe Har- who participate in online file sharing commercially available computer soft- bor, (b) Network Storage Safe Harbor, and the rapid technological innova- ware, audio and video, video games, (c) System Caching Safe Harbor, and tion that usually keeps the file-shar- still pictures, as well as just about any- (d) Information Location Tools Safe ing community one-step ahead of the thing else that can be packaged and Harbor (2006). law (Wright, 2006). As “the courts ex- delivered over the Internet (e.g., books, Currently, “tens of millions of Amer- pound rules to pin liability…technolo- pornography). When compared to icans engage in…file sharing” (Gold- gy developers [subsequently] find and the price of actually purchasing the man, 2004, p. 34-35). It has proven to exploit loopholes” (Choi, 2006, p. 394). product legally, the fee for download- be an overwhelming task for “Big Con- Learning from the court case which ing such a file usually consists of the tent” (the DMCA) to make inroads revealed the mistakes of Napster and comparatively low price of sharing the in stopping this phenomenon, due to other early litigation involving digital file electronically (Choi, 2006; Ludwig, the sheer number of people who ac- copyright material, several technolo- 2006; Schoen, 2006). tually participate in illegal file-sharing gies currently exist in the nexus of Current copyright laws and pending (Cheng, 2008). As The Harvard Crim- these loopholes, including: Usenet legislation attempt to protect copyright son staff write: “Litigation may persist, (e.g., Giganews), decentralized peer- holders from those who would infringe but the problem of lost revenues will to-peer filesharing (e.g., Limewire), on such rights (Butler, 2004; Goldman, never be relieved by virtue of litiga- and extraterritorial one-click file-host- 2004; Schoen, 2006). For example, tion [on an individual-by-individual ing (e.g., Rapidshare) (Wright, 2006). the Digital Millennium Copyright basis]” (The Crimson Staff, 2007, p. 7). This short essay will examine copy- Act (DMCA) adds certain additional Likewise, U.S. lawmakers have proven right violations involving each of these measures to existing copyright law, in- that they have neither the desire nor separate technologies, as well as some cluding the provisions to: (a) restrict the human/financial resources to make of the issues that serve to undermine anti-circumvention technologies, (b) criminals out of tens of millions of the enforcement of copyright law on subpoena online infringers, and (c) no- generally law-abiding citizens. In ad- the digital frontier. tify and takedown infringing materials dition to taking legal action against a (Goldman, 2004; Ludwig, 2006). Since small fraction of copyright violators Background online service providers (OSPs) supply (Lobowitz, 2005; Moen, 2003; Wright, much of the networking infrastruc- 2006), Big Content increasingly takes The word warez [pronounced as a ture in the United States, the DMCA action against (a) the developers of file- single syllable as if the plural of “ware” 10 TechTrends • November/December 2008 Volume 52, Number 6
  • 2. sharing software, (b) OSPs, and (c) the material on its Usenet server, AOL Usenet file sharing, tracking and con- search engines that make file sharing a was cleared of liability that it materi- trolling digital copyright infringement feasible enterprise (Ludwig, 2006). ally contributed to the infringing act. in a decentralized P2P networking en- At the time of the infringement, how- vironment has proven to be an exceed- Who is the violator? ever, AOL had recently changed the ingly difficult endeavor (2003). Usenet is the granddaddy of all file- email address for reporting copyright Similar to litigation against Usenet sharing technologies (Roettgers, 2007; infringement and had never received infringers and the technologies that Wright, 2006). Designed in 1978 by Ellison’s email concerning copyright make it possible, the prosecution of two Duke University graduate stu- violations of his work (2006). Due to P2P file sharing technologies has prov- dents, its original purpose was to act its technological oversight, AOL’s case en to be an uphill battle. In the wake of as an asynchronous discussion board was deemed triable since it had the po- Napster, for example, Grokster distrib- consisting of hierarchically arranged tential to know of the infringing activi- uted its free P2P software within the newsgroups (e.g., alt.binaries). As such, ties of its customers. The claim resulted decentralized framework mentioned persons post messages or binary files in AOL removing the particular news- above (Hirning, 2006). In MGM v. to a newsgroup on their OSP’s Usenet group from its Usenet server, and El- Grokster, however, the Grokster tech- server. Subsequently, the message or lison and AOL reached an out-of-court nology itself was targeted (2006). In the file is copied to Usenet servers around settlement. Grokster case, the question was raised the world in a process referred to as Other Usenet services proved to learn as to “whether the mere existence or propagating or peering (Wright, 2006). from the mistakes of AOL. For example, prominence of a product’s non-infring- Today, over 24 million messages are Giganews is the largest Usenet service ing uses could be sufficient to protect a posted each week to one of more than provider in the world, retaining binary software distributor from indirect li- 100,000 newsgroups, with the alt.bina- files (e.g., copyrighted movies, songs or ability.” (p. 14) ries category of newsgroups occupying pictures) for 200 days, as well as provid- Despite more than 90 percent of its nearly 99 percent of all the data stored ing access to over one billion messages network activity involving illegal file on Usenet servers (2006). Not surpris- (Roettgers, 2007a). In order to exist sharing, Grokster claimed its software ingly, this is also where most of the ille- within the loopholes of the DMCA, was capable of many non-infring- gally-shared copyrighted materials re- Giganews offers (a) deliberately vague ing uses, nor did it have any specific side on Usenet (Ludwig, 2006; Wright, advertisements, (b) an accessible lo- knowledge of infringing activity due 2006). cation for copyright holders to notify to the network’s decentralized nature Prosecuting Usenet copyright in- Giganews in instances of copyright in- (2006). Ultimately, the Supreme Court fringement on an individual-by-indi- fringement, and (c) a newsgroup archi- found that Grokster’s advertising and vidual basis is an insurmountable task tecture that is “coupled with secure SSL business actions directly fostered copy- (Roettgers, 2007a). As such, a recent transmissions” (Mennecke, 2007, p. 3). right infringement (2006). For ex- trend for copyright holders has been As a result, end-users are granted near ample, in the help documentation of to expand their legal strategy beyond total anonymity, and Giganews is con- the Grokster client, a screen shot was individuals to include Usenet service ceivably protected from liability under presented of a search query involving providers as well as Usenet search sites the DMCA’s Safe Harbor provisions a copyrighted work (2006). As such, (2007a). In Ellision v. Robertson, for (Mennecke, 2007, Roettgers, 2007a). Grokster was found to induce its end example, Robertson scanned the popu- users’ infringement. lar works of science fiction writer Har- How does decentralizing Again, the file sharing community lan Ellison and posted them to a Usenet change the picture? proved to learn from even the minimal newsgroup named alt.binaries.ebook mistakes of its predecessors. For exam- Whereas Usenet is the granddaddy ple, Limewire’s P2P file sharing software (Ludwig, 2006). After discovering the of all file sharing technologies, peer-to- copyright infringement of his work, client runs on a global networking pro- peer file sharing (P2P) represents a rel- tocol named Gnutella (Schoen, 2006). Ellison filed a liability claim against atively new and different form of file- America OnLine (AOL), Robertson’s Similar to the Grokster P2P network, swapping technology (Schoen, 2006). Gnutella consists of a network frame- OSP (2006). Ellison claimed AOL acted As such, it allows a large population as a contributory infringer, as it either work of open standards as well as the of users to share public or copyrighted decentralization of information (2006). had knowledge of the infringing activ- materials over the Internet, and oper- ity, or induced, caused or materially In other words, Gnutella technology ates within a decentralized manner. does not belong to anyone (2006). Al- contributed to the infringing conduct While storing copyrighted materials of [its customers] (Ludwig, 2006). beit Limewire does contain end-user in a central location proved to be Nap- documentation (e.g., help screen) sim- Seeking liability immunity under ster’s downfall, decentralized P2P net- two of the DMCAs Safe Harbor provi- ilar to any P2P client, the screen shot of works (e.g., Gnutella, BitTorrent) oper- a sample query involves a rather vague, sions, AOL argued it neither knew of ate in an environment where files are the infringing activity nor materially benign search for speeches. Subsequent stored on millions of users’ computer screen shots display works of famous contributed to it (Ludwig, 2006). De- hard drives (Moen, 2003). Similar to spite actually storing the copyrighted old speeches, which are typically non- Volume 52, Number 6 TechTrends • November/December 2008 11
  • 3. copyrighted, public domain works. As are shared via web forums or blogs, the Cola on its own website (p. 9). Accord- a result, Schoen (2006) suggests, “it will content is readily indexed via Google. ing to Roettgers (2007b): be very difficult for a future court to com (2007b). For example, a proxim- This must feel like a slap in the face find express intent to induce infringe- ity query of the Google search engine for rights holders organizations that ment in Limewire’s case.” (p. 59) using the search terms “mariah carey,” have spent years to sue P2P operators “.mp3,” and “rapidshare.com” results and thousands of their users to make file What about not sharing in 126,000 hits. While not every URL sharing networks less profitable and at- contains a link to a shared copy of one tractive. To some degree, they succeed- the file? of Mariah Carey’s songs or albums, ed—and in turn helped to build a whole One-click file hosting is a newcomer many of them do provide direct rapid- new industry that makes companies like on the warez scene (Roettgers, 2007b). share links to her copyrighted music. Grokster look like small fish (p. 10). The process of the file hosting business In addition to music, end users of one- is simple, as end-users (a) upload a file click hosting services share copyright- Conclusion to a server, (b) are given a web link ed software, movies, video games, and With monumental increases of warez (URL) to the file, and (c) subsequently pornography. available, enforcing digital copyright share the URL with others via a web Although one-click hosting is gener- laws remains rife with formidable ob- forum or blog (2007b). One-click file ally protected by the DMCA’s Safe Har- stacles. Big Content, the DMCA, as well hosting service plans are not pricey, bors, both Rapidshare (Switzerland, as the judiciary are seemingly thwarted asking minimal or no fees. The two Germany) and Megaupload (Hong by (a) the large, decentralized popula- largest one-click file hosting services Kong) reside outside of the United tion of end users, (b) existing loopholes are Rapidshare.com and Megaupload. States (2007b). While Germany’s ver- in the DMCA, as well as (c) a judiciary com (2007b). Since their inception, sion of the RIAA has filed suit against which is unable to keep pace with the both services have been ranked as high Rapidshare, “it’s unlikely that Rapid- rapid development of file sharing tech- as number 13 and 18 on the Alexa.com share will be forced to shut down any nologies. Due to the ubiquity of file list of the most popular sites on the In- time soon, [as] there are plenty of ser- sharing in the United States, the lines ternet (2007b). vices waiting to fill the gap already.” that separate general law-abiding citi- Neither Rapidshare or Megaupload In a weird twist of fate, Megaupload zens from criminals are blurred. index the content of their servers. recently featured advertising from Mi- Since the URLs to most one-click files crosoft, Levi’s, McDonalds and Coca 12 TechTrends • November/December 2008 Volume 52, Number 6