backtop


Print 57 comment(s) - last by Macelind.. on May 19 at 2:42 PM

Content industry demands universities pay attention

The content industry is stepping up efforts to root out piracy on college networks, and a new report shows exactly how.

As it turns out, the actual methods used to detect pirates aren’t very sophisticated. The RIAA gives a list of files to watch for to its hired watchdog Media Sentry, who then searches for infringing materials on common peer-to-peer networks, such as Limewire. Media Sentry sometimes runs the same client as most of the networks’ users, using the network client’s built-in facilities to harvest users’ IP addresses and browse their shares.

As reported earlier this month, a number of universities reported a tenfold increase in the quantity of DMCA copyright notices they received. At the time, the only thing that college administrators and observers could do was guess as to the RIAA and MPAA’s motives, as content industry spokespersons remained silent.

Since then, RIAA president Cary Sherman broke the silence last week in an interview with Inside Higher Ed, attributing the increase to a “phenomenal jump” in Media Sentry’s computing efficiency.

“It’s the same procedures, the same standards, the same list of copyrighted works that we’re using,” said Sherman. “The Internet is a huge place, and there are millions of people connected to it … The amount of resources you put into sending out requests for specific files makes a difference; the more requests you make, the more you’re going to find.”

“We don’t think there’s any more infringement going on,” Sherman added. “We just think there’s more detection of infringement.”

Published Tuesday, The Chronicle of Higher Education detailed an invitation it received to personally observe the enforcers at Media Sentry in action: an RIAA representative (who wishes to remain anonymous due to concerns over hate mail) demonstrated the firm’s methods for searching for infringing files over Limewire.  The actual methods are now considerably automated, matching Sherman’s previous statements: Media Sentry searches for songs in its list with a script, which returns a list of results. With results in hand, the script harvests each entry’s IP address and confirms the authenticity of the file in question, then proceeds to search that user’s shared folder for more.

It’s important to note that in most cases, Media Sentry investigators “do not usually download suspect music files.” Instead, they will try to hash the file remotely; if a hash comparison fails, investigators will download the file and attempt to verify its contents using Audible Magic, a program that specializes in recognizing an audio file’s sonic characteristics. Investigator will only hear a file in only two cases: if the fails both the preceding checks, or if he or she is gathering evidence for litigation.

Regarding the letters themselves, the RIAA says that a full-time RIAA employee reviews each pre-litigation letter for legitimacy, as well as to confirm that the targets lives in the United States.

Despite the necessary human review, however, the RIAA’s search-and-identify process is still largely automated, and it can tag hundreds of users a day.

While the RIAA admits that it has shifted its focus to universities in general, it says doesn’t single out particular schools, contrary to the claims of a number of university network administrators. Further, the RIAA only uses the automated process it demonstrated to the Chronicle against universities -- the automated takedown program is “solely university-focused,” said the unnamed RIAA representative. “We're trying to make universities aware that they have an issue with peer-to-peer file sharing on their network, and so we don't send automated notices to commercial ISP's, I think because they are generally aware that there's a problem.

 “We have no capability of targeting any school at all … technically we can't do it. We find what we find with this process, and that's what we send to schools.”

RIAA representative Cara Duckworth acknowledged the process has its shortcomings: investigators have no way of knowing if someone else actually downloaded a song, and its process is only effective against targeting users that offer a particular file for download.

Investigators don’t seem to be phased by recent changes in legal precedent. With Atlantic v. Howell’s determination that making a file available for download does not infringe a copyright owner’s distribution rights, it is unclear if and how the RIAA’s investigation techniques have changed.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: The scum shall go to jail
By SiN on 5/15/2008 10:33:34 AM , Rating: 3
it might put the courts views back into check, at least they'd stop wasting time and money on piracy issues and go back to stopping and preventing real problems.

The bottom line, Piracy is carried out by a small margin of people. It is simple to do for most Daily Tech readers with an understanding of how to do it. But your brother/father/sister/mother who only uses the computer for MySpace and iTunes isn't that clued up on how to do it and will give up at fustration. And usually when they try it they get a virus anyway.


RE: The scum shall go to jail
By JustTom on 5/15/2008 12:35:48 PM , Rating: 2
Oh please, I work at an university every other student knows how to pirate. How hard is installing bittorrent and doing a search?


RE: The scum shall go to jail
By Quiescent on 5/15/2008 1:30:57 PM , Rating: 2
I thought that too. Until I heard that everybody in all the highschools I've been to knew how to use Limewire. That's from about 5 high schools. Pretty small margin, huh? Seems to me you're lost on technology as everyone does pirate. Even one of those schools didn't have legitimate copies of any software.


RE: The scum shall go to jail
By mindless1 on 5/15/2008 10:05:43 PM , Rating: 3
Actually, pirating something can be far easier than writing a mere MS Word document, it is something anyone can do if they had basic computing skills.

What if they google for "browse bittorrent" or a howto, telling them all they have to do is:

1) Install Opera
2) Click on the download link
3) Wait till it's finished.

Pretty likely most can figure it out in a few minutes, but there is a key difference in all cases, CHOICE. It's easy to key a car in a parking lot or litter but whether easy or not is not what keeps it from being more constant, though as with littering we could go so far as to say people might pirate because it's easiest.

You think people get a virus from RIAA related MP3s? Maybe some, but I would suspect if someone hasn't figured out they can't open a new 3rd party file without looking at the file extension first then their system was already infected.


RE: The scum shall go to jail
By Macelind on 5/19/2008 2:42:30 PM , Rating: 2
I hate the term pirate to describe file sharing. Real pirates are thieving murderers and commit violent crimes. File sharing is not a violent crime it is a civil crime.

I like to download songs from time to time and when I find something I like I go buy the album.

If I'm a freaking pirate, I guess I need to get a parrot.
Yo ho ho and a bottle of rum!


"Well, we didn't have anyone in line that got shot waiting for our system." -- Nintendo of America Vice President Perrin Kaplan

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki