SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Burcu S. Bakioğlu [email_address] @PaleFire
Samuel (2001)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Tactical Media Raley (2009)
In lulz we trust!
The  Age  of
Network Society horizontal modes of communication alternative strategies of  resistance circulation (NOT accumulation) Castells (2000), Dyer-Withford (1999), Scott Lash (2002)
Sites of Struggle Piracy Cultures
REGULATION Corruption Criminalization of society Privacy Surveillance Threat to  creativity Lessig (2004), McLeod (2007), Vaidhyananthan (2003)
Operation Payback is a Bitch
 
Operation: Payback is a bitch –  Wikileaks "the future of cyber protests"
 
Outcome : ,[object Object],[object Object],[object Object],[object Object],[object Object]
Significance : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Plan (3 phases set to finish Dec 21 st  2012)
 
Burcu S. Bakioğlu [email_address] @PaleFire

Weitere ähnliche Inhalte

Andere mochten auch

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenJohan Mijs
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieJohan Mijs
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015Johan Mijs
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Johan Mijs
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Johan Mijs
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenJohan Mijs
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside outJohan Mijs
 

Andere mochten auch (7)

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door Bibliotheekportalen
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatie
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialen
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside out
 

Ähnlich wie Hacktivism, Cyberwars, & Copyright Controversies

High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)Rob Jewitt
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065University of Sydney
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summaryeve_psu
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaRob Jewitt
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New MediaTerry Flew
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014iDIALOGHI
 

Ähnlich wie Hacktivism, Cyberwars, & Copyright Controversies (20)

STSP Week3
STSP Week3STSP Week3
STSP Week3
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Sc po some-01
Sc po some-01Sc po some-01
Sc po some-01
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summary
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New Media
 
Polinter11
Polinter11Polinter11
Polinter11
 
Chapter16
Chapter16Chapter16
Chapter16
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New Media
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Polinter11
Polinter11Polinter11
Polinter11
 

Mehr von PaleFire

Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual WorldsPaleFire
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismPaleFire
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingPaleFire
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-stylePaleFire
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifePaleFire
 

Mehr von PaleFire (6)

Test
TestTest
Test
 
Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual Worlds
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivism
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent Storytelling
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-style
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second Life
 

Kürzlich hochgeladen

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Hacktivism, Cyberwars, & Copyright Controversies

Hinweis der Redaktion

  1. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  2. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  3. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  4. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  5. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.