Is RIAA's Linares Affidavit Technically Valid? 260
NewYorkCountryLawyer writes "In support of its ex parte, 'John Doe,' discovery applications against college students, the RIAA has been using a declaration by its 'Anti-Piracy' Vice President Carlos Linares (PDF) to show the judge that it has a good copyright infringement case against the 'John Does.' A Boston University student has challenged the validity of Mr. Linares's declaration, and the RIAA is fighting back. Would appreciate the Slashdot community's take on the validity of Mr. Linares's 'science.'"
misleading slashdot headline (Score:2, Insightful)
Re:misleading slashdot headline (Score:5, Interesting)
Of course P2P users can know each other really well and can know exactly with whom they are exchanging content they are fully legally entitled to, also in joining a specific P2P network, they are forming a new association, based upon shared expectations of what they mutually expect from this new relationship, an extension to that is the sharing of a part of their personal and private space i.e. a part of their hard disk drive storage space in their personal computer and their files that they have stored their, and upon a mutual understanding of not exploiting that trust and abusing that relationship by using it in a false, deceitful and fraudulent manner.
The second major lie is of course that 'users' can be identified by their IP address, and hugely misleading fabrication, the only way one user, human being, can be identified by an IP address, is if that IP address was embedded in a device inserted in their body, even then it would be impossible to say that the IP address response was not being generated by another electronic device that had no association with that user at all. An IP address provides a temporary, non fixed, transitory, addressing protocol, so that electronic devices can effectively exchange data across a shared interconnected network. Many devices can exactly the same IP address, they can even connect at the same time, but that will cause network problems for those devices and problems for any other devices attempting to communicate with them. However it terms of routing network traffic, many millions of devices a currently connected to the Internet with exactly the same IP address beyond the default IP address of routers. The lie is again carried over to where Media Sentry, identifies the 'individual' what a crock, this lie is even extended to the ISP, that somehow the ISP can identify who is using the electronic device at the time.
It would also seem that the RIAA claims copyright on file names, if heaven forbid, you have file names that in part, or whole, including misspellings, match with file names that the RIAA or Media Sentry might possibly association with works they are claiming protection for, you are somehow infringing copyright.
That closing bit is most telling, we have no idea who is committing the copyright infringement, finally the truth, but we want to prosecute somebody, anybody and everybody based upon a, we say so basis, and a temporary IP address issued by an ISP that is of sufficient security and legal documentation and verification of identity as is necessary to manage a $25 a month Internet account (seriously how much technical effort and expense do you put in to manage and record and track that cheap an account especially hundreds of thousands of them).
Re:misleading slashdot headline (Score:5, Insightful)
Is he an expert? In what? His credentials?
Before anyone can discuss the content of his Declaration, it seems to me that it would be prudent to evaluate whether or not it should carry any weight at all. After skimming the Declaration, he seems to be making a lot of assertions that I think a Judge would normally expect to come from an expert.
In other words:
What qualifies him to testify as to [the Declaration's] truth and accuracy"?
Re: (Score:2, Interesting)
The companies behind the RIAA... (Score:5, Informative)
I do not feel particularly qualified to validate Mr. Linares's claims. However, over the years I have 'forgotten' that the RIAA is just a trade organization, comprised of many different companies. It was interesting to read through the list of plantiffs and put a face on who the RIAA really is. Here they are if you did not RTFA:
Stupid question time... (Score:2)
Re: (Score:3, Informative)
However so are some of the companies that are also part of the RIAA...
Not a transatlantic evil, then? (Score:2)
Re: (Score:2)
On an unrelated note, does anyone else think that the Preview, Submit, Quote buttons are in the wrong order? They should be in order of use...I keep accidentally clicking on Preview instead of Quote. Some man-machine interface this is!
Re: (Score:3, Informative)
-uso.
Re: (Score:2)
The only way to know which companies deserve your hate is to have a detailed corporate ownership structure for the owning conglomer
Re: (Score:2, Interesting)
Therefore, as it stands, this basically represents a reverse-class-action suit, with many individual plaintiffs collectively suing a single defendent.
Re: (Score:3, Insightful)
How is it that this 'trade' organization isn't illegal? I can understand an industry organization that sets technical standards, but the RIAA goes much further than that and sets prices, colludes on market objectives, and prosecutes customers.
"Individual"?? (Score:5, Insightful)
Re:Provable ID problem (Score:4, Insightful)
That is the blaring hole in the arguement in the PDF on Paragraph 12 where they compare IP addresses to telephone numbers. They claim that phones sharing one line are like a party line. Only one can make a call from one number at a time. They missed entirely using ports on a router so multiple users behind a router can make a call all at once from the same phone number. The number does not identify the individual any more than call from the political campaign center identifies the individual making the call. You may try to call them back and sue the individual for harrassment, but identifying the individual by the phone number is a problem.
His declaration under penalty of purgery under the laws of the United States that the foregoing are true and correct should have had peer review so they would indeed be true and correct. They are not and is easly proven so. The following is easly proven. Not all IP address have a direct connected single user computer just like not all phone numbers are to a single person renting an apartment. Enter routers and trunked/ISDN lines and his example falls apart. He should be careful what he signs as true and correct. It could cost him.
Re:Provable ID problem (Score:4, Insightful)
It been done... (Score:5, Informative)
Inaccurate statements (Score:5, Insightful)
In point 12, it is stated that an ISP or college can identify the user of an IP address. This is untrue as the "user" could be no more than a MAC address, which can change. And even if true, the context seems to imply that this remains true in hindsight, which is false unless logs are kept.
Point 15 states that human review is involved in the case of EACH infringer, which is blatantly untrue given the history of automated (and wrong) cease and desist letters.
Re:Inaccurate statements (Score:5, Insightful)
Item 8 states that the majority of the traffic on P2P is pirated material and also implies that the "vast majority" of content shared via P2P is pirated audio. Is there data to back this up? I suspect that video, photos, and programs (e.g., games) makes up a large amount of illegal P2P traffic. It feels like a rhetorical device used to paint the RIAA as a tragic victim.
Item 9 is incorrect. The ISP can not know who the infringers are. They can only know whose account is attached to that IP number. NAT routers are a possible workaround. Also, some services allow for multiple simultaneous IP addresses. For example, Telus requires that visible MAC addresses be registered.
By registering 2 MAC addresses, Telus will let users have two IPs at once. If Alan has a single NAT router connected, that leaves 1 free registration slot. If Bob, someone completely unknown to Alan, were to get the username and password for Alan's account, it would be possible for Bob to register his NAT router to Alan's account. If Alan only uses 1 device (i.e., 1 IP), there is a good chance that he'll never discover that Bob was piggybacking his account. If Alan needs the second IP, then he'll probably overwrite Bob's MAC without noticing there is a problem. Even if Alan notes that there is a problem, it's unlikely the MAC address could be traced to Bob because Bob could change the MAC address on his device and because of the difficulties of tracking the MAC address of a device from manufacturer to end user.
Item 9 also feels like a rhetorical device used to paint the RIAA as a tragic victim. The scope and value of piracy is hotly debated. http://arstechnica.com/news.ars/post/20070212-8813
Item 11 implies that searching is sufficient to tell if a file is a copyrighted song. This is not always the case; unless the file is downloaded, its contents can not be known. I think that "examines" needs to be rigorously defined. (This ties in with the parent's comments on item 15.)
Item 12 assumes that computers are single user. This is not the case with most modern OSes. It would be possible for someone to log into an unsecured computer and use it for sharing files over P2P. The IP of the computer used to share via P2P may be known but the user can not be. It also assumes that the computer has not been compromised via malware.
Item 14 states that files are downloaded. However, it does not provide any methodology for determining if the files contain copyrighted audio. Metadata can be falsified. How are logs created and handled? Are they screenshots? (This ties in with the parent's comments on item 15 again.)
Item 16 states that "...the infringer's ISP quickly and easily can identify the computer from which the infringement occured...". It may be able to provide an IP address but that's not a sure thing (there have been past incidents where the wrong person was identified). They definitely can't prove that a MAC address belongs to a computer that is owned and controlled by the identified account holder. The MAC address is configurable. It's not possible for an IP address alone to be capable of identifying a computer, even if the IP is static.
Adam decides to open his own business selling socks online and decides to house the server in his home. He upgrades his account to a server account with 1 static IP and sets up his business on that IP. After 3 months with no sales, Adam packs it in and downgrades his account after downloading the complete discography of NKOTB
Re:Inaccurate statements (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
By registering 2 MAC addresses, Telus will let users have two IPs at once. ... If Bob, someone completely unknown to Alan, were to get the username and password for Alan's account, it would be possible for Bob to register his NAT router to Alan's account.
This is a highly fringe case, and Telus isn't even in the US (as far as I know). Most people will be tied to a wire, but in the case of a wireless ISP in the US where multiple devices are allowed and the user let slip his username and password, it certainly would be an issue.
If the ISP receives the subpoena with only an IP and responds with the account info for the current holder, then Bob takes it in the shorts for Adam's actions.
This never happens. We receive notifications from the MPAA and RIAA on a daily basis. They always include a date and timestamp. Regardless, if one happened to omit it, the subpoena would be invalid. This is a strawman argument.
If Mark starts poking around at 21:32, downloads the files and disconnects at 21:45, finishes the paperwork at 21:59 and timestampts it when he finished the paperwork, it's possible that the IP address would have been reassigned to a different user in the intervening 14 mintues.
M
Re:Inaccurate statements - a bunch more (Score:2)
Point 11 claims that
Re: (Score:2)
Re: (Score:3, Insightful)
Pretty much every sentence in that Linares document has problems. As it's late, I'll pick on just one:
6. "... millions of people illegally use online media distribution systems to upload or dowload copyrighted material."
Let's see... "media", means what? Audio and video data? Which can be hard or impossible to tell from any other sort of data. No, none of these "distribution systems" do have or can have an inherent specialization in "media". They just move data. Such specialization that they might
Ok, let's break it down. (Score:5, Insightful)
1) First Linares acknowledges that a route can have an IP address, then he says "Two computers cannot effectivly function if they are connected to the Internet with the same IP address".
This is not true. i.e. routers and NAT. Multiple Computers can have the same effective IP address to the internet. While they can track it down to the NAT device, they cant go further.
2) They assume the network provider maintains a log of IP addresses. This is not a given. A Good guess perhaps, but not a fact.
3) While its good practice that they download files and humanly verify the contents, the list of files can't be verified to be all infringing content. Unless they actually downloaded said file themselves, its an assumption that the file is named/labeled correctly. He says this later when he says that it only "suggests" that there were many copyright files. (Not being a lawyer, don't know the implication).
4) They claim an ISP can identify the computer being used. This is inaccurate. They can identify the customer, but most customers are behind routers (aka NAT) so they have no ability to identify which computer.
5) They claim expedited discovery is "critical" to stopping piracy. I can't believe they believe that expiding discovery will have any dent on piracy.
6) They claim that infringment of non public works greatly harms it when released, I believe there's evidence to the contrary (i.e. widely distributed albums have debuted at number 1 or other times higher then anyone expected).
7) unsure why expidited discovery impacts if they can serve defendants. If it happens quickly or over a long period of time, what difference does it make?
8) They now claim ISPs destroy logs, but if discovery is going on, are they allowed to?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Spoofing? (Score:4, Interesting)
It is also very possible to spoof caller id.
Are these good arguments?
I think there are enough holes in their statements to bring it into question, but this stuff is very technical and may be difficult to explain in court, although the MPAA is trying to do the same, albeit poorly.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Feedback (Score:5, Insightful)
1. The word "piracy" is repeatedly used. I don't believe this is a standard legal term (outside of naval encounters). The word is not defined in the document. I think the intent is to equate the term "piracy" with "copyright infringement", but to spin it imply other things. One could probably attack this term successfully.
2. Point 8 is a logical fallacy. Whether or not record companies authorize P2P distribution of music is completely unrelated to the conclusion that P2P networks are used primarily for copyright infringement. One would first have to show that the vast majority of content falls under the record companies' copyrights.
3. "Distribution" has a specific legal definition in copyright law (or it does in my country, anyway). P2P copying may or may not fall under that definition. This is extremely important. They are trying to imply that P2P copying is a more serious offense than copying in other ways.
4. Points 9 an 10 bother me slightly, but I can't put my finger on why. They are implying that the P2P users are anonymous and thus can escape lawsuits from copyright holders. This is probably an important point in their case. I suspect they are trying to show that P2P users are intentionally hiding because they are doing something they know is wrong. This is why it is OK to remove that anonymity. It is important to stress that whatever the motives of the defendant, it is the plaintif's job to show that an infringement occurred *and* that the defendant was involved before an injunction is granted. The anonymity of the defendant is immaterial to that point.
5. Point 11 states that Media Sentry can identify files being offered. It can not. It can only identify the *names* of the files being offered. The name of a file does not constitute anything more than circumstantial evidence that the file contains what they think it contains.
6. As has been stated numerous times before Point 12 is just false. An IP address identifies a machine, not a user. Any number of users may access that machine. Other machines may route through that machine and masquerade as it. The owner of the machine may not even be aware that someone else is using it for this purpose.
7. Point 13 doesn't make any sense at all. They indicate no mechanism for Media Sentry to identify copyrighted works. Or even if one assumes that all the works available through the P2P network are copyrighted, there is no mechanism for determining who the owner of that copyright is. The document seems to imply that all users of the P2P network can do this and since Media Sentry uses the same mechanisms, it can do it too. But users can not generally do this. They would have to provide some explanation for the mechanism they are using.
8. Point 16 states that the IP address can identify where the infringement occurred. This is incorrect. It merely shows one step of the way. In order to identify where the infringement occurred, they would also have to show that the packets were not then transferred to a third party. This information is not actually stored anywhere on the computer, so it might be impossible in practice to say for sure where the infringement occurred.
9. Point 17: How is Verizon's concession in any way relevant to a judges decision? Does Verizon get to make precedent?
10. In point 18, they use the terms "distribute" and "make available". Again, these have very specific legal meanings. They have not described how the alleged actions of the defendants are equivalent to these legal terms. Even if they have documented copying, this is different than the above terms (at least in my country).
11. Again point 18, they have stated that the Defendant made illegal copies available. They have no way of determining this. They merely suspect that the Defendant's computer was used to *relay* copies (or pa
Re: (Score:2)
"The word "piracy" is repeatedly used. I don't believe this is a standard legal term (outside of naval encounters). The word is not defined in the document. I think the intent is to equate the term "piracy" with "copyright infringement", but to spin it imply other things. One could probably attack this term successfully."
Not hardly. Everybody knows what it means. It's held that meaning for hundreds of years. You're a smart person, and if a buddy tells you that they have a pirated version of a DVD, you'l
Re: (Score:3, Insightful)
Not hardly. Everybody knows what it means. It's held that meaning for hundreds of years. You're a smart person, and if a buddy tells you that they have a pirated version of a DVD, you'll know exactly what they mean. The courts are full of smart people, too.
Yes, "piracy" has its meaning that has been there for hundreds of years and no, "making a copy of a CD" is NOT it. "To pirate" is to be part of organised para-military criminal unit that sails the seas and destroys all other ships in sight killing the crew and passengers, raping female passengers or crew members and plundering or destroying all the goods aboard. Pillaging raids on coastal territories also comes under the term.
The very attempt to equate such horrendous criminal activity with copying a CD is
Re: (Score:2)
"the unauthorized copying, distribution, or use of another's production (as a film) esp. in infringement of a copyright"
I am too lazy to go get my Black's Law a
Re: (Score:3, Insightful)
That is the funniest thing I've ever heard.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If you remove the accusation in (6), you're left with a statement which condemns a
Re: (Score:2)
i was going to make a smart alec remark that on land piracy is called 'brigandage'
then i looked it up on wikipedia.
http://en.wikipedia.org/wiki/Brigandage#Causes_of_ brigandage [wikipedia.org]
what caught my eye was the first line in causes of brigandage.
'Causes of brigandage:The conditions which favour the development of brigandage may be easily summed up. They are first bad administration, and then, in
Read the final sentence in article 14. (Score:3, Informative)
Note that, throughout his statements up to this point, Linares has repeatedly reasserted that MediaSentry doesn't use any techniques not enabled by the software and medium and not available to any other user of the system. It's obvious he wants to preserve for MediaSentry and, by extension the RIAA, that no "illegal" or unethical techniques were employed to gather data.
Right here, with this sentence, he contradicts himself. I think it's rather obvious that this sentence describes an activity that other P2P users cannot do, even if they chose to try. The very ambiguity of it, and his failure to clarify it, is noteworthy.
Dig deeper right there; "X" marks the spot, as Blackbeard might say.
The biggest fault I see.. (Score:2)
Just say "NAT" (Score:2)
IP adresses of computers on the internet is not unique. A home user typically have one IP address, and typically have a network and a wireless network with multiple computers, including, unknowingly, possibly a neighbors PC as well as a laptop in a car parked in the street outside. All behind the NAT router.
All these computers typically share 1 IP address behind the NAT router.
IP addresses are changed on the fly, and it may be hard to document who had which at what time while maintaining evidence standar
Re: (Score:2)
RIAA is also breaking the copyright law! (Score:3, Interesting)
In my opinion just one file illegally downloaded by RIAA invalidates their entire legal process. In civilian law there are no loopholes that allow for breaking some laws in order to enforce others - and that's a very good thing.
Okie (Score:3, Interesting)
#6 claims that "similar online media distribution systems emerged and attempted to capitalize on the growing illegal market Napster fostered," followed by examples. This statement is provably incorrect in two ways. The first is that most, probably all, of these networks are not designed for media sharing, they are designed for file sharing. I only personally have knowledge of Bittorrent, eDonkey and DirectConnect but in all those cases the software is designed to share any and all files a user wishes, with no special exclusivity for media. Some, like the eDonkey variant eMule can restrict searches to various types of files (such as just video or music) but it does so only via the extension of the file. Others, like Bittorrent, have no such capability at all since search isn't an included part of the protocol. Bittorrent is just a distributed HTTP mechanism, searching is added through other means.
The second is that they are designed and/or primarily utilized for illegal purposes. Bittorrent, being highly popular, is the best example. It was designed simply to allow peer-to-peer downloading of files from websites to take the load off of a single server. It is currently extremely widely used for legitimate purposes. One of the largest would be the patch mechanism for Blizzard Entertainment's (a subsidiary of Vivendi Games) MMORPG World of Warcraft. The official patch mechanism form Blizzard uses Bittorrent so as to lessen the load on Blizzard's own servers. Another high profile use would be Linux distribution, nearly every Linux distro's preferred method of distribution is Bittorrent.
#9 claims that the RIAA members lose massive amounts of revenue to P2P copying. However there is no proof of this offered, and indeed I am aware of no proof out there. The only empirically valid, peer reviewed study I am aware of at this point is a 2005 study conducted by UNC Chapel Hill and Harvard (found here [unc.edu]) which found: "Using detailed records of transfers of digital music files, we find that file sharing has no statistically significant effect on purchases of the average album in our sample. In specifications that identify the effect of file sharing on sales relatively precisely, we reject the hypothesis that file sharing is responsible for the majority of lost sales." To the extent the RIAA has offered any figures at all it is based off of the assumption that every copy made is money lost, at full retail value. This is of course false because it fails to take in to account several factors:
1) The music producers do not receive the full retail price for each album.
2) Some people who made a copy of the music, never would have purchased it had it not been available for free. They simply were unwilling or unable to spend the money, and as such nothing has been lost.
3) Some people may have bought some of the music they had downloaded, had they been unable to get it for free, but not all of it. For example a university student with a disposable income of less than $100 per month would clearly not purchase 100 albums costing in excess of $10 each, even if they downloaded that many. Thus while some sales may have been lost, not all of them have.
4) Some people may have bought more as a result of their downloading. They download songs as a sort of "virtual window shopping" and when they find ones they like, they purchase the CD. Thus sales are actually gained.
The RIAA's model for calculation could be mathematically stated as L = D * R where L is the amount of loss in dollars, D is the number of downloads presumed to have taken place and R is the average retail price. This is clearly overly simplistic and thus incorrect. A real formula would look more like L = D * P1 * W - D * P2 * W where L is the amount of loss in dollars, D is the number of downloads presumed to have taken place, P1 is the percentage of the time people did NOT bu
Point 12 is false, without it the rest is moot (Score:4, Informative)
To use their telephone analogy: If you dial a "1-800" there isn't a single telephone and single person answering it, there's a whole network of telephones and many operators to answer them. The Internet works exactly the same way, if anything this "routing" of connections is even more common than in the telephone network.
IP addresses are actually in short supply (there's only a few hundred million of them...) so most people don't even have the option of having single IP address = single computer.
Then there's WiFi.... most home broadband connections are supplied with a wireless router and these routers are unsecured by default. Anybody within a half mile radius can connect and use the internet connection. These people will have the same IP address as the legitimate owner of the router. This practice of using other people's connections is very common in highly populated areas (I personally know two people who do it...)
Even if password access is enabled, the standard "WEP" encryption can be broken in a matter of minutes using freely downloadable software (type "wep cracker" into google and you'll get you a whole list of them).
So...premise 12 is wrong. Without it the rest of the document is moot.
Re: (Score:2)
One more point about WiFi.... (Score:3, Insightful)
This leads to people install WiFi in their house via "home installation kits" but they're really using their neighbor's WiFi without knowing it.
This isn't a contrived example, it really happens. I've personally seen people using P2P software on their neighbor's WiFi connection even though they have their own access point. They're not doing this malici
A way to explain all the technical problems... (Score:2, Funny)
I think there are enough holes in their statements to bring it into question, but this stuff is very technical and may be difficult to explain in court, although the MPAA is trying to do the same, albeit poorly.
One could always explain it in court using the defensive strategy that never fails:
"Ladies and gentlemen, this is Chewbacca. Chewbacca is a Wookiee from the planet Kashyyyk. But Chewbacca lives on the planet Endor. Now think about it; that does not make sense! Why would a Wookiee, an eight-foot tall Wookiee, want to live on Endor, with a bunch of two-foot tall Ewoks? That does not make sense! But more important, you have to ask yourself: What does this have to do with this case? Nothing. Ladies and gen
Comments on the affidavit (Score:3, Interesting)
Here are my thoughts paragraph by paragraph. I hope they're helpful. If not, I hope they're at least not dry. FULL DISCLOSURE: I've never actually used any P2P network software, but then again when I was in college "gopher" was a cool utility.
6. "At any given moment, millions of people illegally use online media distribution systems to upload or download copyrighted material." By who's count? Where did this number come from? How many millions of people are on the Internet? Is he saying that such a huge percentage of the users of the Internet are "at any given time" ALL illegally sharing files?
8. "Thus, the vast majority of the content that is copied and distributed on P2P networks is unauthorized by the copyright owner" This statement is far too broad. Again, what evidence does he have? Is he further stating that the vast majority of the files on P2P networks are music files? Again, by what evidence?
12. "Users of P2P networks...can be identified by using Internet Protocol ("IP") addresses because the unique IP address of the computer offering the files for distribution can be captured..." This is factually incorrect. While the IP address being presented to the Internet can be determined, this IP address may represent any number of distinct computers due to technologies such as Network Address Translation (NAT) and Port Address Translation (PAT). If the "unique IP address" of the actual computer can still be identified by the P2P client (which I can not speak to having never actually used P2P software) that addresses is not necessarily permanent either. The technology of Dynamic Host Control Protocol (DHCP) allows for the temporary assignment of IP addresses to computers. This means that the IP address of the computer in question may have changed between the time of the alleged distribution of copyrighted materials and the time of the investigation of that. Further still, and IP address is assigned to a computer, not to a person. This argument does not, in any way, indicate any correlation between IP address and person. It is more akin to identifying a driver based on a photograph of the license plate of the car. Yes, you may know who owns the car, but you don't know who was driving. For that matter, you don't know if somebody lifted the license plate and put it on a different car.
12. "Two computes cannot effectively function if they are connected to the Internet with the same IP address at the same time." This does not account for methods of hijacking an IP address, nor does it account for the NAT or PAT technologies discussed earlier.
12. "This is analogous to the telephone system where each location has a unique number." In so far as you can identify the "owner" of the telephone number, but you still haven't identified who placed the call.
16. "Once provided with the IP address, plus the date and time of the infringing activity...can identify the computer from which the infringement occurred (and the name and address of the subscriber that controls that computer)." There is an assumption here that there is no NAT or PAT occurring on the network. More correctly, what can be identified is the subscriber to whom the IP has been assigned. That IP may represent a single computer or a network of computers. That network may include publicly accessible connections, and unless the RIAA has done the due-diligence to determine that the subscriber who had the IP address at that time has a secure and locked-down network, they still have not even identified an actual computer yet.
I think we need to say more about NAT (Score:3, Informative)
Late arrival, sorry. I agree with all of the comments about the existence of NAT demonstrating point 12 is not true but none closed the circle for me.
It is a fact that IP addresses do not have to be unique across the entire Internet in order for IP routing to function. Translating routers permit this to be the case and, therefore, the declaration is factually incorrect in its attempt to characterize IP routing in point 12. But I think that you need to say more in order to truly debunk point 12. NAT is a border technology but at some point IP addresses do have to be unique for much of what people use the Internet for and that is why I think you need to say more than just that NAT means IP addresses don't have to be and frequently aren't unique.
Consider a case where my node address is 192.168.1.1 (a RFC 1918 private IP address commonly used on a translated network). Assume I use a NAT router. Assume you also use a NAT router but we are not using the same NAT router. Let your IP address also be 192.168.1.1 then. This configuration will function to your and my satisfaction. But, in this scenario I cannot send IP packets to your computer, there is no IP route to it from my host. Yet, despite this undeniable fact, we can share files with each other using most P2P technologies. Therefore, uniqueness of IP addresses appears irrelevant to the functionality of P2P technologies making much of point 12, as written, irrelevant - in addition to just being wrong. Nevertheless, in order for MediaSentry to even have a list of IP addresses for the RIAA to ask the identity of then they must be observing P2P clients that ultimately have had packets reach the public, routable Internet. Therefore, you still need to say more about point 12 since it is end-user identity that is at issue.
Point 12 is attempting to assert that an IP address is a suitable proxy for end-user identity. Plainly my true identity in the IP arena is 192.168.1.1, as is yours. So, 192.168.1.1 is ambiguous as an identity. There has to be a disambiguation that happens somewhere since we are successfully sharing files even though we have the same ultimate identity. Therefore, even though the existence of NAT demonstrates that much of point 12 simply isn't true and irrelevant, that isn't really the point. Can the IP addresses that you do see on the outside (i.e. the one MediaSentry must see) uniquely identify someone. The IP addresses observed by MediaSentry are undeniably unique IP addresses.
Ironically, point 12 appears to address this by shooting itself in the foot with phone analogy: "in a particular home there may be three or four different telephones, but only one call can be placed at a time to or from that home". Absolutely true, but there may also be three or four people living in that home and knowledge that a call was placed from that number to another number, or vice-versa indicates nothing about which individual placed that call. Further, someone may be visiting and ask to use my phone. I may receive a call for a neighbour and go get them to take the call at my home. There may even be a burglar that makes a call while present in my home. IOW, the number itself is a point where multiplexing takes place and the target of the multiplexing is transparent/invisible to the network. NAT does the same thing for IP networks but can do an additional thing the phone can't. A NAT router can (metaphorically) take multiple calls at the same time (potentially more than sixty thousand) and each one has the same multiplexing potential as the phone example.
The point where multiplexing takes place, the phone number, does not identify a user (it identifies a subscriber). The phone company cannot sell service to a specific user, only to a specific subscriber (for the family, visitors and burglar reasons above). The IP address as seen by MediaSentry does not identify a user, it identifies a subscriber (for the same reasons as for the phone). Therefore, point 12 actually uses the phone analogy to conclusively demonstrate th
screwed up link... (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2, Offtopic)
I'm basically trying to make the point that coming here and asking about the technical merits of a technique RIAA uses to identify its victims is almost as bad as going into a fundamentalist Christian forum and asking them what they think of evolution.
NOT...EVEN....CLOSE (Score:2)
Here's why: Slashdot tends to focus on technical and scientific discussions about various things. Many times, the things in these articles can be quantified and understood as to how they work and operate. That is very different from any discussion on evolution because there is more objectivity available to understand it. In simplest terms: there are right answers when it comes to science and technology, and especially computers. And by "right", I mean -- they can be verif
Re: (Score:3, Funny)
The person is NewYorkCountryLawyer. Therefore, I think he expects people who think the RIAA's tactics are horrible to give him technical arguements he may use.
Now, given the prevaling sttitude on slashdot about the compensation accorded all intellectual property, I don't think I'm alone in saying my technical expertise is for sale only. Please paypal $$ to my account for me to comment on this story.
Re: (Score:3, Funny)
Re: (Score:2)
Instead I'll just say: good job.
Re:Gee, what does this person expect to hear? (Score:5, Insightful)
Don't you think it's a hilariously good idea to come to us when he doesn't understand 100% how P2P networks work? Aren't we exactly the ones who know best why RIAA's claims are stupid? So let's think this through: A lawyer who happens to understand law (gee, what a coincidence...) asks techies whether the technical interpretation of the 'bad guy' holds true or not.
I don't see your problem. Would you rather he pull a Matlock on the judge and try to get the jury to shed a tear for the poor victim? That guy is doing a hell of a job.
Re: (Score:2)
Re:Don't feed the lawyers (Score:5, Informative)
Sheesh, if you won't RTFA, at least click the submitter's name before you go all conspiracy.
Hey, I'll reply anyway. (Score:5, Informative)
It is not.
It may be tied to a specific computer. Or a specific router / firewall. Or even a specific UNSECURED wireless access point.
But it is NOT tied to a specific person.
Their second biggest mistake is claiming (without any evidence) that each file being "pirated" represents a lost sale. So the courts need to work REALLY REALLY FAST to stop the money being lost.
Their third biggest mistake is that the machine with the IP address, that is associated with the "piracy" is 100% under the conscious, knowing control of the person who is being charged. As opposed to your neighbor using your unprotected wireless access point to download files without your knowledge.
Anyone have any others?
Re:Hey, I'll reply anyway. (Score:5, Insightful)
Why does it have to be unsecured wireless? We all know how insecure WEP is and isn't it plausible that someone hacked your WEP? The key thing I'm trying to say is that you have to prove guilt. How can they prove it was my computer it could have been a hacked WEP and the only way they'd have access to my router is for them to hack ME.
Re: (Score:2)
Re: (Score:2)
Re:Hey, I'll reply anyway. (Score:5, Insightful)
They don't have to prove guilt. It's not criminal court."
Re:Hey, I'll reply anyway. (Score:4, Interesting)
But they do need to prove you guilty beyond circumstantial evidence
Re: (Score:3, Interesting)
Re: (Score:2, Insightful)
Re:Hey, I'll reply anyway. (Score:5, Insightful)
I'm all for authenticated wireless but it is nearly impossible to implement on a scale like this unless we use verisign certificates and a public auth server that is free. Most APs can't do it anyway at the moment, and neither can many consumer devices, most can't even do WPA. Linksys has a for-pay auth setup they provide but this is nowhere near being universally compatible.
I would argue it is not the consumers problem anyway and most consumers barely understand how Wi-Fi works, much less an integrated 802.1x wireless authentication system using public servers. Not only will it fail to accomplish its goals, going after individual users does not help the situation in any way.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Yes but you, as a client of some ISP, are responsible of what goes through your internet line. I'm not sure how far that responsibility goes, that's some judge to find out I think. It would be silly if I was doing something illegal using my internet line and then getting away with it just by blaming "maybe someone hacked my wlan."
Re: (Score:2, Insightful)
>of what goes through your internet line.
Why would you be responsible (for the legal point of view) for what someone else do just because you are a client of some ISP? YOu could be responsible towards the ISP, sure, but not towards anyone else.
Re: (Score:2)
Re: (Score:2)
Don't be childish. Of course not. But if someone steals my car, when I'm sitting at the back seat, to commit a crime, I would have hard time to explain why I wouldn't to be considered part of the crime. Of course you are guilty until proven otherwise, but if there's 1000 hacking attemps coming from your computer I think you have to assure at least your ISP that you have nothing to do with it, maybe the police too.
Re:Hey, I'll reply anyway. (Score:5, Insightful)
Agreed.
Furthermore Mr. Linares knows, or should have known this is true. It would have been completely negligent for him not to do so. Wireless routers for home users which allow a single IP address to service 20+ individual computers and ship unsecured by default can be purchased at any electronics dealer, including Walmart, for less than $70.
Furthermore Mr. Linares knows, or should have known, that IP redirector (or "bounce") programs have been a staple of internet anonymity for at least two decades. These packet bouncers were commonly used to anonymise IRC connections and were often illegally installed on other computers without the computer operators knowledge. Therefore these computers which have been identified could have been hijacked using an internet tool that is at least 20 years old. Mr. Linares could not reasonably be ignorant of them.
Mr. Linares must have known that his statements regarding the reliability of IP addresses were false and self-serving, and he intentionally misrepresented this to the court under penalty of perjury.
I'm just sayin' that I think there should be a law against intentional misrepresentation to the court, and maybe some penalties as well.
Re: (Score:3, Interesting)
This is a valid point. If they have not demonstrated that a particular IP address was assigned to a particular student then the subpoena should be quashed in favor of a subpoena asking the university to identify the character of the system associated with the IP address (student, shared server, etc.) Once the university specifies that a particula
Re: (Score:2)
Re: (Score:3, Insightful)
This is true.
Unfortunately the Modus Operandi of the RIAA is to send the assigned user a settlement statement to the effect of "pay us $3,000 or we'll sue you." This is what has the community screaming. They are per
Re: (Score:2)
Well, there was an article last week claiming that RIAA is guilty of RICO (aka Mafia) fraud. As far as I could tell, the article made a good case for secrecy, collusion, and extortion.
So, any analysis of RIAA's documents potentially gives RICO defendants a heads-up on technical matters. Whom you choose to defend is up to you.
Re: (Score:2)
Section 24 is interesting too, about how the expedited discovery is key because ISPs might purge logs before they get a chance to respond. Why is that an issue? I'm no lawyer, but I would assume that destroying documents that are the subject of a discovery motion would be... uh... frowned upon by judges.
But what if the logs were deleted on a regular basis after a set period of time? In that case, if the discovery motion was given to the ISP after said period of time, there are no logs remaining. When they were destroyed they were not yet being requested, so there is no crime (unless that deletion itself was against some other, such as one requiring records to be kept for X time).
... however, the expedited discovery motion needs to be bal
As much as I am loathe to admit it, they do have a point on this one
Re: (Score:2)
Re: (Score:3, Insightful)
Recently there was a bit of a buzz on campus after word got out that some of our grads just starting at the top law firms were breaking the previous earning caps, and making as much as 135K a year in their first year. After hiring bonus, one of our kids will clear 200K by next June.
Er.. that is to say.. it goes to the lawyers.
-GiH
Re: (Score:2)
Thank you sir. I had been hoping for both +5 Funny and someone to point me in the direction of a good PDF reader. I suppose getting 1/2 of what you want is good enough.
Re: (Score:2)
Re: (Score:2)
(In case you're not aware, the creative commons liscence allows his works to be reused, redistributed, modified, whatever, as long as it's for non-commercial use)
So he's somehow managing to compete with 'free', and he's even made the free alternative legal!
Re:Bittorrent "Calitolizes" on piracy? (Score:4, Insightful)
"How exactly does Bittorrent "Capitolize" on anything? Its free software. No Ads, No fees, ect. Is the RIAA objection to pirates DONATING to open scource projects?"
This is the quote to which you refer:
If you're confused, it may be because you're reading it too literally. When you see "BitTorrent" in the above, mentally replace it with "BitTorrent tracker sites" (ie: The Pirate Bay). Many of them are commercial endeavors making thousands upon thousands of dollars in profit each month (just because they provide a free service does not mean that they don't have a profit motive). Facilitating piracy is a big business, and business is good.
HTH.
Re: (Score:2, Insightful)
2) I don't get your point about the ex
Re: (Score:2)
Re: (Score:2)
We probably would accept it, at least in some circumstances, with more evidence of WLAN and WEP breaches than the mere possibility, as constituting reasonable doubt about whether a crime had been committed. We'd require more evidence than the IP evidence - for instance, material on disk.
The difficulty you have with the RIAA is really four things. One, peop
Re: (Score:2)
Re: (Score:2)
It's not all bad--emissions standards have been raised across the country as a result of California law. That's just one of the obvious examples. California does the dirty work and is more than happy to be the bad guy while everyone secretly thanks them for doing something. It's far fro
Re: (Score:2)
Check any guide that lists Modern Language Association (MLA) style for written English, which is the set of guidelines for formal writing that a large percentage of humanities students in the United States (supposedly) are taught in high school and college.
Of course, this is a programmers' website, so YMMV. ;-)
Re: Grammar police (Score:2)
I can understand this poster's frustration. Those of us who read between the lines in such matters (and, as a college English teacher, it's my job) would say that it smacks of laziness to use poor grammar, especially when attempting to come across as a professional in what is supposed to be a forum for professionals (despite the fact that the noobs and grammar police