[iwar] Deception and media industry iwar

From: Charles Preston (cpreston@sinbad.net)
Date: 2002-07-03 14:40:29


Return-Path: <sentto-279987-4940-1025732466-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 03 Jul 2002 14:50:10 -0700 (PDT)
Received: (qmail 30806 invoked by uid 510); 3 Jul 2002 21:45:27 -0000
Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 3 Jul 2002 21:45:27 -0000
X-eGroups-Return: sentto-279987-4940-1025732466-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.95] by n30.grp.scd.yahoo.com with NNFMP; 03 Jul 2002 21:41:06 -0000
X-Sender: cpreston@gci.net
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-8_0_7_4); 3 Jul 2002 21:41:06 -0000
Received: (qmail 74607 invoked from network); 3 Jul 2002 21:41:05 -0000
Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 3 Jul 2002 21:41:05 -0000
Received: from unknown (HELO mta-2.gci.net) (208.138.130.83) by mta2.grp.scd.yahoo.com with SMTP; 3 Jul 2002 21:41:05 -0000
Received: from mmp-2.gci.net ([208.138.130.81]) by mta-2.gci.net (Netscape Messaging Server 4.15) with ESMTP id GYP08F00.TIV for <iwar@yahoogroups.com>; Wed, 3 Jul 2002 13:41:03 -0800 
Received: from graywolf3.gci.net ([24.237.10.246]) by mmp-2.gci.net (Netscape Messaging Server 4.15) with ESMTP id GYP08F00.34B for <iwar@yahoogroups.com>; Wed, 3 Jul 2002 13:41:03 -0800 
Message-Id: <5.1.0.14.2.20020630110633.02b33ec0@127.0.0.1>
X-Sender: cpreston@mail.gci.net@127.0.0.1
X-Mailer: QUALCOMM Windows Eudora Version 5.1
To: iwar@yahoogroups.com
X-eGroups-From: Charles Preston <cpreston@gci.net>
From: Charles Preston <cpreston@sinbad.net>
X-Yahoo-Profile: cpreston_2000
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 03 Jul 2002 13:40:29 -0800
Subject: [iwar] Deception and media industry iwar
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests= version=2.20
X-Spam-Level: 

Reports from the music industry war on copyright violators indicate that 
the RIAA and copyright holders are using deception and denial of service 
techniques.  As described, the deliberate over-consumption of computer 
resources intended only to reduce availability of those resources to others 
might be a violation of the law in some states.

According to the San Jose Mercury News, use of these techniques is becoming 
more widespread.  Earlier, quoted in the November, 2001, excerpt below, 
Cary Sherman says that the RIAA "has not yet used any technologies that 
would affect file-trading on peer-to-peer networks."

But in a recent excerpt "Music industry swamps swap networks with phony 
files", from June, 2002, are claims that spoofing is widespread.

Only the strongest will survive -
Notice from another excerpt, below, "Let studios hack P2P networks" that a 
U.S. congressman is preparing a bill to legalize the use of deception 
tactics via Internet, with the purpose of damaging the ability of peer to 
peer network sharing of mp3 and probably other files.  This might help 
produce a lot of informal research on deception measures and countermeasures.

Real time file identification and transfer interruption is already taking 
place, according to  "New Technologies Target Swapping of Bootlegged 
Files". (See below).  This could lead to disguised or encrypted files, as 
many bbs postings suggest.  If that happens, it would seem the easiest 
solution is to prohibit any file disguise or repackaging.  This could also 
bring up the issue of who can stop which file transfers.  If this 
technology is used to detect common steganographic signatures, is it also 
being used to interrupt transfer of those files, including ones containing 
possible terrorist communications?  This is a method of censorship for any 
files where multiple copies with the same content are requested.  These 
could be a video clip from the BBC or a PowerPoint presentation.  And if 
you are already sitting in the middle, why not hijack connections or use a 
MITM attack and send along altered content?  Properly altered content could 
be much more fun than denial of service.

cmp


    ------------------------------
Billboard November 3, 2001

Govt., Tech Critics Decry RIAA Tactics

BY BILL HOLLAND
A number of critics of the rejected RIAA draft language also objected to 
the fact that, had it been accepted, that language would have granted the 
RIAA full immunity to employ controversial new technologies that slow down 
or clog computers on peer-to-peer networks. The best-known of this 
technology is called Interdiction, produced by Los Angeles-based firm Media 
Defender. It acts as a downloader, repeatedly requesting the same file and 
downloading it very slowly, essentially preventing other peers from 
accessing the the file or sharing any other file. The company also has a 
"spoofing" program that sends out fake music files, often with just 
meaningless data on them.

    Cary Sherman, RIAA general counsel, says the trade group "is 
considering the use of such technologies, but we can provide little detail 
about them [or the companies that offer them] because of confidentiality 
restrictions. In very general terms, these technologies can be used to 
identify sources of infringing content, spoof file-trading systems, and 
stop illegal downloads of copyrighted files - without in any way destroying 
or damaging the files themselves or the user's computer or 
software." 


     Media Defender's president Randy Saaf says "less than 100 but more 
than 30" small and large copyright-holder companies have signed up for his 
company's products, but he is reluctant to name clients because of the 
"sensitivity of the issue" of ongoing RIAA lawsuits against file-sharing 
networks. But, Saaf added, "I can tell you this, we've been in contact with 
the RIAA for a year and a half."

    Sherman says, "We are not presently prepared to describe technical 
measures being used or considered. But it is clear that any such measures 
will be lawful and will constitute a very modest response to a very serious 
problem."

    Sherman also says that the RIAA "has not yet used any technologies that 
would affect file-trading on peer-to-peer networks."
------------------------------
http://www.siliconvalley.com/mld/siliconvalley/3560365.htm

Posted on Thu, Jun. 27, 2002



Music industry swamps swap networks with phony files
By Dawn C. Chmielewski
Mercury News


Major record labels have launched an
aggressive new guerrilla assault on the underground music networks, 
flooding online swapping services with bogus copies of popular songs.

The online music sites know they're under attack. Darrell Smith, chief 
technical officer of StreamCast Networks, parent of the popular 
file-swapping service Morpheus, said he first noticed the practice about a 
year ago, but chalked it up to ``rogue teenage hackers just being obnoxious.

``It's more prevalent in the last three months,'' he said. ``It's gotten 
real, real, real severe.''

Sources at three major labels admit they're deluging popular services like 
Morpheus, Kazaa and Grokster with thousands of decoy music files that look 
identical to a sought-after song, but are filled with long minutes of 
silence -- or 30-second loops of a song's chorus.

By making stealing more of a hassle, they hope to persuade more people to 
shell out for a CD at the local record store.

The practice is called ``spoofing'' and it is widespread. Over the last 
three months, virtually any song destined for the Billboard pop music 
charts has been spoofed, the sources say.
------------------------------

http://news.zdnet.co.uk/story/0,,t287-s2117979,00.html

Let studios hack P2P networks, says US politician

12:00 Wednesday 26th June 2002
John Borland, CNET News.com


Cyberattacks by copyright owners on networks where their goods
are traded illegally would be within the law if a new bill gets through 
Congress in the US

Let studios hack P2P networks, says US politician

12:00 Wednesday 26th June 2002
John Borland, CNET News.com


Cyberattacks by copyright owners on networks where their goods
are traded illegally would be within the law if a new bill gets through 
Congress in the US

A California congressman is preparing a bill that would let copyright 
owners, such as record labels or movie studios, launch high-tech attacks 
against file-swapping networks where their wares are traded.
...

These tactics include:

* interdiction, in which a copyright owner floods a file swapper with false 
requests so that downloads can't get through;

* redirection, in which a file swapper might be pointed to a site that 
doesn't actually have the files they're looking for;

* and spoofing, in which a corrupt or otherwise undesirable file 
masquerades as a song, movie or other file that people are seeking.

Use of some of these tactics might be deemed illegal today under common 
law, state statutes, or the federal Computer Fraud and Abuse Act, Berman said.

File-swapping companies criticized the proposed legislation, saying it 
opened the door for copyright holders to launch "cyber warfare" on consumers.
------------------------------
http://www.audiblemagic.com/News&Press/LATimes_02_20_01.htm

Tuesday, February 20, 2001
Home Edition
Section: Business
Page: C-1 New Technologies Target Swapping of Bootlegged Files By: JON HEALEY
TIMES STAFF WRITER

...
IpArchive and Vidius combine multiple identification tools with widespread 
detection mechanisms that watch files as they enter or exit key points on 
the Internet. For example, their technology could be inside a regional 
aggregation point for an Internet service provider, a campus computer 
network or even the software used by a movie downloading service.
Richard Schmelzer, founder and chief executive of IpArchive, said his 
software has been deployed already by several major Internet pipelines, 
although he would not disclose which ones.
Once IpArchive's technology spots an unauthorized transfer passing through 
its monitoring point, Schmelzer said, it can stop the transfer and send a 
notice directing the would-be downloader to an authorized source of the 
file. The company won't identify the sender or the recipient, he said, 
because, Schmelzer said, "That's a line I don't want to cross right now, 
for obvious reasons."
------------------------------



------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT