SlideShare a Scribd company logo
1 of 3
Download to read offline
System and Method of Fighting Digital Copyright Infringement
Prepared for the USSS, New York Electronic Crimes Task Force,
RecordingIndustryAssociationofAmerica,andUniversalMusic
April 16, 2002
By: Daniel Von Kohorn
The argument is familiar: theprotection of intellectual property rights is critical to the viability of
intellectualwork,includingthewritingandproductionofmusicandmovies. Thisdocumentis
preparedintheinterestoffightingtheillegaldistributionofcopyrightedmedia,protecting the
value of digitally transferable media, and restoring the economic incentives for artists.
The problem of illegal file sharing is complicated: peer-to-peer (P2P) networks have enabled
individuals to download copies of music files from aggregated file servers without compensation to
the owner of the copyright.
The solutions to this point have been ineffective. The mean number of simultaneous users on
major file-sharing networks is in excess of half a million. Relying on a combination of strategies
includinglegislation,copyprotectionsoftware,digitalrightsmanagement,andlitigationmay
provide some relief to the growing problem, however, there may be a far more effective and, at the
same time, far less expensive technical solution.
Presented below is an outline of the system and method of file-specific systematic attack on file-
sharingnetworks,withtheultimategoalofeliminatingspecificmediafilesfrompublicfile-sharing
systems.
SYSTEM AND METHOD OUTLINE:
1. Install any number of personal computers (“RIAA-PCs”) distributed throughout the world,
possibly in the homes of RIAA employees or allies.
· The IP Addresses of the RIAA-PCs should not follow a pattern (i.e. all residing within
one IP block)
2. Subscribe each RIAA-PC to a high-speed Internet connection, and install as many
concurrent file-sharing systems as possible on each.
· Whereverpossibleusecommondownloadanduploaddirectoriesforthevariousfile-
sharing systems.
3. Search for, and download, copies of any files you wish to protect (“Protected Files”).
· Specify keywords and other search criteria for each Protected File in order to identify
theappropriatefilestodownload. Thesedownloadedfileswillprovideconsistency
with the meta-data of each pirated files and also cover the breadth of variety in pirated
file names and content. Many different versions of each file may exist under different
names, quality levels, file formats, etc. However, if searches are specified in a similar
manner as other users specify them, then results are likely to include the majority of
the pirated files targeted.
4. Uponsuccessfuldownload,overlayadditionalwaveformonMP3file.
· Thiswaveformshouldnoticeablydisruptthemusicperiodicallyandmakethepirated
file unsatisfactory as a proxy for the original. For example, fluctuate the volume from
100% to 10% periodically, add tones, add silence, etc.
· The overlay process can be automated: any file added to a designated download
directory is then modified with a consistent (or randomized) overlay to the waveform
or image.
· Anyincorrectfilesaccidentallyincludedinthesearchresultswillbedownloaded,
manipulated, and shared in unusable form from RIAA-PCs, but so be it--it is an
anonymous file-sharing system and people share all kinds of files.
5. Distribute the manipulated file (“Bait File”) among the RIAA-PCs, and share each on the
most popular file-sharing services.
· Redundant hosting of Bait Files on each file-sharing network (and across different file-
sharing networks) can be facilitated by internally distributing the Bait Files among the
RIAA-PCs.
6. Bait Files will dominate the search results when users attempt to download Protected Files.
· Redundant hosting of Bait Files on large numbers of RIAA-PCs will create consistency
in the searchresults,multiplehostsforhigherdownloadprioritization,andgreater
likelihood of download.
· Users may still be able to find the original pirated files, but the Bait Files will be very
similarandnoteasilydistinguishableasmanipulated. Userswill instead be forced to
download large numbers of the same file and manually test each for quality—a level of
complicationthatwilldiscourageusersfromseekingandsharingprotectedfiles.
Initially, there will be a very large volume of files to download and serve as Bait Files. Other users
of file-sharing systems presently find that the downloading and copying of files is quite easy, and
RIAA-PC administrators are likely to find the same.
Over time, users will find that their attempts to download protected works will increasingly result
in the download of Bait Files. As this occurs, the frustration of both the hosting and downloading
ofprotectedfileswillbecomeprohibitive. Mostusersdownloadmusicfromfile-sharing systems
because the identification of files is easy and the quality of the music is good. The strategy
proposedaboveresultsinthemostcommonkeywordsbecominguseless,andthedownloadquality
unusable. As a result, users will become frustrated with online music from the file-sharing systems
covered by this strategy, and they will migrate to legitimate music sources.
Likely reactions to this strategy on the part of the file-sharing community will be:
1. Closed networks. These are smaller and have less impact on sales. They also grow more
slowly and can be attacked more easily through litigation because they have an
organizational structure.
2. Quality screening tools. There will be a constant evolution of the overlay methodology on
the part of the RIAA-PCs, and the quality checking software that users may begin to create
as a reaction to Bait Files. The inconvenience will make the sharing of protected works a
far less popular activity. The automation of overlays makes the inconvenience for the
RIAA minimal.
3. Fragmentation of file-sharing systems. As RIAA-PCs host a critical mass of files on any
system, it becomes less attractive and so users will migrate to new systems. However, one
of the major attractions of file-sharing systems is the large number of contributors that
provide variety of selection. A larger number of smaller file-sharing systems reduces the
convenience of searching for any particular file, and so reduces the convenience of file-
sharing systems.
4. File-sharing blacklists. As large numbers of Bait files are noticed coming from IP
addresses, these IP Addresses may be noted in public or private “Blacklists”, and
eliminated from the peer network of default installations of file-sharing software. It is not
common or easy for the user to track the IP address of the peer providing each file. Nor is
it likely that users will take the trouble to contribute to a public database of Bait File hosts.
It is very easy for RIAA-PCs to change IP addresses often. RIAA-PCs may number in the
hundreds (thousands?) and be distributed geographically to increase the complexity of any
possible blacklist project.
File-sharing systems take advantage of anonymity and under-regulation. The strategy above uses
those same powerful characteristics to eliminate the effectiveness of sharing certain selected files.
I would be happy to answer any questions.
Daniel A. Von Kohorn
Chief Technical Officer
Technology Partners (Holdings) LLC
570 Lexington Ave
New York, NY 10022
Phone: 212-759-3022
Fax: 212-759-9184
E-mail: dan@vonkohorn.com
http://tphllc.com

More Related Content

What's hot

Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet FundamentalPrithvi Raj M
 
Introduction of Internet Hindi Notes
Introduction of Internet Hindi NotesIntroduction of Internet Hindi Notes
Introduction of Internet Hindi NotesSirajRock
 
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11William Hall
 
Library technology
Library technologyLibrary technology
Library technologyDPerkins123
 
Internet
InternetInternet
Internetmustha3
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamentalVTC_NeilaSofien
 

What's hot (19)

Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
Internet
InternetInternet
Internet
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Internet basic
Internet basicInternet basic
Internet basic
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Common online terminologies
Common online terminologiesCommon online terminologies
Common online terminologies
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet Fundamental
 
Dawn Of Modern Piracy
Dawn Of Modern PiracyDawn Of Modern Piracy
Dawn Of Modern Piracy
 
Internet
InternetInternet
Internet
 
INTERNET
INTERNETINTERNET
INTERNET
 
the internet
the internetthe internet
the internet
 
Introduction of Internet Hindi Notes
Introduction of Internet Hindi NotesIntroduction of Internet Hindi Notes
Introduction of Internet Hindi Notes
 
Internet
Internet Internet
Internet
 
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
Episode 3(3): Birth & explosion of the World Wide Web - Meetup session11
 
Library technology
Library technologyLibrary technology
Library technology
 
InterneT
InterneTInterneT
InterneT
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Internet
InternetInternet
Internet
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 

Viewers also liked

Visual in Instruction
Visual in InstructionVisual in Instruction
Visual in InstructionBong Reyes
 
Visual Principles
Visual PrinciplesVisual Principles
Visual PrinciplesIzaham
 
Safe work environment กฎกระทรวง2549
Safe work environment กฎกระทรวง2549Safe work environment กฎกระทรวง2549
Safe work environment กฎกระทรวง2549Moshimoro Moro
 
J Millward submission NRSET
J Millward submission NRSETJ Millward submission NRSET
J Millward submission NRSETJason Millward
 
assurx-services-brochure
assurx-services-brochureassurx-services-brochure
assurx-services-brochureDave Vadas
 
Recession or Depression: a clear view of the current situation.
Recession or Depression: a clear view of the current situation.Recession or Depression: a clear view of the current situation.
Recession or Depression: a clear view of the current situation.Luc Villeneuve
 
Conyers tiffany 3.3
Conyers tiffany 3.3Conyers tiffany 3.3
Conyers tiffany 3.3Tiffy2117
 
01-10-08 Park Board Minutes
01-10-08 Park Board Minutes01-10-08 Park Board Minutes
01-10-08 Park Board MinutesLaura Bailey
 
J Millward Citizen Involvement In The Policy Process
J Millward Citizen Involvement In The Policy ProcessJ Millward Citizen Involvement In The Policy Process
J Millward Citizen Involvement In The Policy ProcessJason Millward
 
Regional Employment Plan Bundaberg Hervey Bay
Regional Employment Plan Bundaberg Hervey BayRegional Employment Plan Bundaberg Hervey Bay
Regional Employment Plan Bundaberg Hervey BayJason Millward
 
Особенности развития и воспитания детей 5-6 лет
Особенности развития и воспитания детей 5-6 летОсобенности развития и воспитания детей 5-6 лет
Особенности развития и воспитания детей 5-6 летAnastasia Vishnevskaya
 
cedec 2015 techinical artist bootcamp vol.1
cedec 2015 techinical artist bootcamp vol.1cedec 2015 techinical artist bootcamp vol.1
cedec 2015 techinical artist bootcamp vol.1DigitalFrontier
 
EMD - Robert Joyce resume 2015
EMD - Robert Joyce resume 2015EMD - Robert Joyce resume 2015
EMD - Robert Joyce resume 2015Bob Joyce
 
Methods of Data collecton
Methods of Data collectonMethods of Data collecton
Methods of Data collectonsarath43
 
Modern Visual Design
Modern Visual DesignModern Visual Design
Modern Visual DesignBarry Nadler
 
4 principles of design 2
4 principles of design 24 principles of design 2
4 principles of design 2Glenbaker
 

Viewers also liked (20)

Visual in Instruction
Visual in InstructionVisual in Instruction
Visual in Instruction
 
Visual Principles
Visual PrinciplesVisual Principles
Visual Principles
 
Safe work environment กฎกระทรวง2549
Safe work environment กฎกระทรวง2549Safe work environment กฎกระทรวง2549
Safe work environment กฎกระทรวง2549
 
Aghtamar
AghtamarAghtamar
Aghtamar
 
J Millward submission NRSET
J Millward submission NRSETJ Millward submission NRSET
J Millward submission NRSET
 
assurx-services-brochure
assurx-services-brochureassurx-services-brochure
assurx-services-brochure
 
Recession or Depression: a clear view of the current situation.
Recession or Depression: a clear view of the current situation.Recession or Depression: a clear view of the current situation.
Recession or Depression: a clear view of the current situation.
 
Conyers tiffany 3.3
Conyers tiffany 3.3Conyers tiffany 3.3
Conyers tiffany 3.3
 
01-10-08 Park Board Minutes
01-10-08 Park Board Minutes01-10-08 Park Board Minutes
01-10-08 Park Board Minutes
 
J Millward Citizen Involvement In The Policy Process
J Millward Citizen Involvement In The Policy ProcessJ Millward Citizen Involvement In The Policy Process
J Millward Citizen Involvement In The Policy Process
 
Regional Employment Plan Bundaberg Hervey Bay
Regional Employment Plan Bundaberg Hervey BayRegional Employment Plan Bundaberg Hervey Bay
Regional Employment Plan Bundaberg Hervey Bay
 
Дорожные знаки
Дорожные знаки Дорожные знаки
Дорожные знаки
 
Особенности развития и воспитания детей 5-6 лет
Особенности развития и воспитания детей 5-6 летОсобенности развития и воспитания детей 5-6 лет
Особенности развития и воспитания детей 5-6 лет
 
cedec 2015 techinical artist bootcamp vol.1
cedec 2015 techinical artist bootcamp vol.1cedec 2015 techinical artist bootcamp vol.1
cedec 2015 techinical artist bootcamp vol.1
 
EMD - Robert Joyce resume 2015
EMD - Robert Joyce resume 2015EMD - Robert Joyce resume 2015
EMD - Robert Joyce resume 2015
 
Methods of Data collecton
Methods of Data collectonMethods of Data collecton
Methods of Data collecton
 
Mobilitas sosial
Mobilitas sosialMobilitas sosial
Mobilitas sosial
 
Modern Visual Design
Modern Visual DesignModern Visual Design
Modern Visual Design
 
4 principles of design 2
4 principles of design 24 principles of design 2
4 principles of design 2
 
Visual Principles
Visual PrinciplesVisual Principles
Visual Principles
 

Similar to fightingdci

File Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalFile Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalSherry Bailey
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...UOC Universitat Oberta de Catalunya
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin, MSISA,CISSP
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networkssanjoysanyal
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKIJNSA Journal
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeerIJCI JOURNAL
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internetipoque
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharingwilkmjw
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYcsandit
 

Similar to fightingdci (20)

File Sharing Should Not Be Illegal
File Sharing Should Not Be IllegalFile Sharing Should Not Be Illegal
File Sharing Should Not Be Illegal
 
P2PFile
P2PFileP2PFile
P2PFile
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeer
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
FILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEYFILE SYNCHRONIZATION SYSTEMS SURVEY
FILE SYNCHRONIZATION SYSTEMS SURVEY
 

fightingdci

  • 1. System and Method of Fighting Digital Copyright Infringement Prepared for the USSS, New York Electronic Crimes Task Force, RecordingIndustryAssociationofAmerica,andUniversalMusic April 16, 2002 By: Daniel Von Kohorn The argument is familiar: theprotection of intellectual property rights is critical to the viability of intellectualwork,includingthewritingandproductionofmusicandmovies. Thisdocumentis preparedintheinterestoffightingtheillegaldistributionofcopyrightedmedia,protecting the value of digitally transferable media, and restoring the economic incentives for artists. The problem of illegal file sharing is complicated: peer-to-peer (P2P) networks have enabled individuals to download copies of music files from aggregated file servers without compensation to the owner of the copyright. The solutions to this point have been ineffective. The mean number of simultaneous users on major file-sharing networks is in excess of half a million. Relying on a combination of strategies includinglegislation,copyprotectionsoftware,digitalrightsmanagement,andlitigationmay provide some relief to the growing problem, however, there may be a far more effective and, at the same time, far less expensive technical solution. Presented below is an outline of the system and method of file-specific systematic attack on file- sharingnetworks,withtheultimategoalofeliminatingspecificmediafilesfrompublicfile-sharing systems. SYSTEM AND METHOD OUTLINE: 1. Install any number of personal computers (“RIAA-PCs”) distributed throughout the world, possibly in the homes of RIAA employees or allies. · The IP Addresses of the RIAA-PCs should not follow a pattern (i.e. all residing within one IP block) 2. Subscribe each RIAA-PC to a high-speed Internet connection, and install as many concurrent file-sharing systems as possible on each. · Whereverpossibleusecommondownloadanduploaddirectoriesforthevariousfile- sharing systems. 3. Search for, and download, copies of any files you wish to protect (“Protected Files”). · Specify keywords and other search criteria for each Protected File in order to identify theappropriatefilestodownload. Thesedownloadedfileswillprovideconsistency with the meta-data of each pirated files and also cover the breadth of variety in pirated file names and content. Many different versions of each file may exist under different names, quality levels, file formats, etc. However, if searches are specified in a similar manner as other users specify them, then results are likely to include the majority of the pirated files targeted.
  • 2. 4. Uponsuccessfuldownload,overlayadditionalwaveformonMP3file. · Thiswaveformshouldnoticeablydisruptthemusicperiodicallyandmakethepirated file unsatisfactory as a proxy for the original. For example, fluctuate the volume from 100% to 10% periodically, add tones, add silence, etc. · The overlay process can be automated: any file added to a designated download directory is then modified with a consistent (or randomized) overlay to the waveform or image. · Anyincorrectfilesaccidentallyincludedinthesearchresultswillbedownloaded, manipulated, and shared in unusable form from RIAA-PCs, but so be it--it is an anonymous file-sharing system and people share all kinds of files. 5. Distribute the manipulated file (“Bait File”) among the RIAA-PCs, and share each on the most popular file-sharing services. · Redundant hosting of Bait Files on each file-sharing network (and across different file- sharing networks) can be facilitated by internally distributing the Bait Files among the RIAA-PCs. 6. Bait Files will dominate the search results when users attempt to download Protected Files. · Redundant hosting of Bait Files on large numbers of RIAA-PCs will create consistency in the searchresults,multiplehostsforhigherdownloadprioritization,andgreater likelihood of download. · Users may still be able to find the original pirated files, but the Bait Files will be very similarandnoteasilydistinguishableasmanipulated. Userswill instead be forced to download large numbers of the same file and manually test each for quality—a level of complicationthatwilldiscourageusersfromseekingandsharingprotectedfiles. Initially, there will be a very large volume of files to download and serve as Bait Files. Other users of file-sharing systems presently find that the downloading and copying of files is quite easy, and RIAA-PC administrators are likely to find the same. Over time, users will find that their attempts to download protected works will increasingly result in the download of Bait Files. As this occurs, the frustration of both the hosting and downloading ofprotectedfileswillbecomeprohibitive. Mostusersdownloadmusicfromfile-sharing systems because the identification of files is easy and the quality of the music is good. The strategy proposedaboveresultsinthemostcommonkeywordsbecominguseless,andthedownloadquality unusable. As a result, users will become frustrated with online music from the file-sharing systems covered by this strategy, and they will migrate to legitimate music sources. Likely reactions to this strategy on the part of the file-sharing community will be: 1. Closed networks. These are smaller and have less impact on sales. They also grow more slowly and can be attacked more easily through litigation because they have an organizational structure. 2. Quality screening tools. There will be a constant evolution of the overlay methodology on the part of the RIAA-PCs, and the quality checking software that users may begin to create as a reaction to Bait Files. The inconvenience will make the sharing of protected works a
  • 3. far less popular activity. The automation of overlays makes the inconvenience for the RIAA minimal. 3. Fragmentation of file-sharing systems. As RIAA-PCs host a critical mass of files on any system, it becomes less attractive and so users will migrate to new systems. However, one of the major attractions of file-sharing systems is the large number of contributors that provide variety of selection. A larger number of smaller file-sharing systems reduces the convenience of searching for any particular file, and so reduces the convenience of file- sharing systems. 4. File-sharing blacklists. As large numbers of Bait files are noticed coming from IP addresses, these IP Addresses may be noted in public or private “Blacklists”, and eliminated from the peer network of default installations of file-sharing software. It is not common or easy for the user to track the IP address of the peer providing each file. Nor is it likely that users will take the trouble to contribute to a public database of Bait File hosts. It is very easy for RIAA-PCs to change IP addresses often. RIAA-PCs may number in the hundreds (thousands?) and be distributed geographically to increase the complexity of any possible blacklist project. File-sharing systems take advantage of anonymity and under-regulation. The strategy above uses those same powerful characteristics to eliminate the effectiveness of sharing certain selected files. I would be happy to answer any questions. Daniel A. Von Kohorn Chief Technical Officer Technology Partners (Holdings) LLC 570 Lexington Ave New York, NY 10022 Phone: 212-759-3022 Fax: 212-759-9184 E-mail: dan@vonkohorn.com http://tphllc.com