This document provides background information on Megaupload, a file hosting service shut down by the US government in 2012. It describes Megaupload's business model, revenues, expenses, websites, key executives like Kim Dotcom, and legal issues around copyright infringement. The document also discusses perspectives on how file sharing services can enable copyright infringement but also have legitimate uses for distributing large files, and considers the debate around balancing copyright protections and access to information.
BitTorrent and eDonkey expanded their dominance as the most popular file sharing protocols in 2008. Spain, Italy and France topped the list of countries with the most copyright infringements. YouTube continued to be the largest source of infringing content, followed by other user generated sites like MySpace. Newer sites like Mega Video and DailyMotion grew while older protocols and sites declined.
Protecting the Financial Services Industry from (Open Source) Patent TrollsFINOS
Ken Seddon, LOT Network: Protecting the Financial Services Industry from (Open Source) Patent Trolls.
Companies spend over $29B each year on legal costs defending themselves against patent trolls. Over half of companies targeted by trolls make less than $10M in annual revenue — and companies engaging in software — like those involved in open source development — are the most likely to be sued. LOT Network CEO Ken Seddon will bring a panel of speakers from member companies such as SAP, Google, JP Morgan Chase and Dropbox to share strategies on how companies in the open source community can protect themselves from costly and frivolous litigation that drains funds away from innovation.
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
Australian Legal Practice Managers Association keynote presentation by Craig Rispin, CSP Business Futurist & Innovation Expert.
This document is a superseding indictment charging 13 individuals and corporations with criminal copyright infringement, racketeering, money laundering, and fraud for their roles in operating the file hosting and sharing website Megaupload. It alleges that Megaupload willfully reproduced and distributed millions of infringing copies of copyrighted works worth over $500 million, earning over $175 million for the conspiracy through subscription fees and advertising on the site and related sites like Megavideo.
Mobilender is an exclusive mobile app-based micro-lending company operating in Latin America. It provides small, short-term loans ranging from $5 to $500 with approval in 15-30 minutes using a social network-based algorithm. The company has issued over 1,000 loans since launching in mid-2014, with an average loan amount of $100 and term of 12 days. Mobilender is seeking a Series A funding round of $2 million to expand operations and lower its default rate below 10%. Its long term vision is to build the first mobile bank in Latin America offering a range of financial services through its MobilBank ecosystem.
BitTorrent and eDonkey expanded their dominance as the most popular file sharing protocols in 2008. Spain, Italy and France topped the list of countries with the most copyright infringements. YouTube continued to be the largest source of infringing content, followed by other user generated sites like MySpace. Newer sites like Mega Video and DailyMotion grew while older protocols and sites declined.
Protecting the Financial Services Industry from (Open Source) Patent TrollsFINOS
Ken Seddon, LOT Network: Protecting the Financial Services Industry from (Open Source) Patent Trolls.
Companies spend over $29B each year on legal costs defending themselves against patent trolls. Over half of companies targeted by trolls make less than $10M in annual revenue — and companies engaging in software — like those involved in open source development — are the most likely to be sued. LOT Network CEO Ken Seddon will bring a panel of speakers from member companies such as SAP, Google, JP Morgan Chase and Dropbox to share strategies on how companies in the open source community can protect themselves from costly and frivolous litigation that drains funds away from innovation.
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
Australian Legal Practice Managers Association keynote presentation by Craig Rispin, CSP Business Futurist & Innovation Expert.
This document is a superseding indictment charging 13 individuals and corporations with criminal copyright infringement, racketeering, money laundering, and fraud for their roles in operating the file hosting and sharing website Megaupload. It alleges that Megaupload willfully reproduced and distributed millions of infringing copies of copyrighted works worth over $500 million, earning over $175 million for the conspiracy through subscription fees and advertising on the site and related sites like Megavideo.
Mobilender is an exclusive mobile app-based micro-lending company operating in Latin America. It provides small, short-term loans ranging from $5 to $500 with approval in 15-30 minutes using a social network-based algorithm. The company has issued over 1,000 loans since launching in mid-2014, with an average loan amount of $100 and term of 12 days. Mobilender is seeking a Series A funding round of $2 million to expand operations and lower its default rate below 10%. Its long term vision is to build the first mobile bank in Latin America offering a range of financial services through its MobilBank ecosystem.
This document outlines allegations against members of the "Mega Conspiracy", a criminal organization that engaged in massive copyright infringement and money laundering through the website Megaupload.com. It alleges that Megaupload.com willfully distributed infringing copies of copyrighted works like movies, music, and software without authorization. It claims Megaupload earned over $175 million from premium subscriptions and advertising on its site and related sites like Megavideo.com that streamed infringing content. The document alleges Megaupload did not comply with DMCA safe harbor provisions and its abuse tool did not properly remove infringing files identified by copyright holders.
This document outlines allegations against members of the "Mega Conspiracy", a criminal organization that engaged in massive copyright infringement and money laundering through the website Megaupload.com. It alleges that Megaupload.com and related sites willfully distributed infringing copies of copyrighted works like movies and music without authorization, harming copyright holders by over $500 million. The sites generated over $175 million in revenue from advertising and subscription fees. The document provides details on how the sites operated and generated revenue from widespread infringement.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
This document summarizes the history and current state of Active.com, a company that produces data about events, classes, memberships, and other activities. It traces Active.com's growth from the late 1990s to today, including acquisitions of other companies. In 2009, Active.com opened its data through an API to business partners and developers in order to build the world's largest directory of things to do. This led to over 130 registered API users generating additional traffic and partnerships for Active.com. The document promotes further engagement with Active.com's developer community and API.
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
Speedbit 5 Sep07-Travel Tips for your Internet Ride-Ariel YarnitskyJosh (Tzvika) Avnery
The document discusses SpeedBit, a company that pioneered download acceleration and instant messaging technologies. It describes SpeedBit's products like Download Accelerator Plus which optimized downloads using multiple connections. The document also discusses opportunities for SpeedBit's video acceleration technology in areas like mobile, gaming consoles, and set-top boxes to improve streaming and downloading speeds. It provides advice for entrepreneurs on challenges of starting a company and ensuring success through the right team, strategy, and clear value proposition.
This document provides an overview of the LOT Network, a non-profit organization that aims to protect innovation by providing immunity from patent assertion entities (PAEs) for its members. It summarizes Ken Seddon's background and experience in patents. It also discusses the costs imposed by PAEs, how LOT Network works by granting licenses to other members if a patent is transferred to a PAE, LOT members across different industries, and reasons for companies to join LOT Network, including access to free patents donated by larger companies for startups.
Internet governance and the filtering problemsTan Tran
This document provides an overview of internet governance and filtering. It defines internet governance as the development and application of shared principles, norms, rules and procedures that shape the evolution and use of the internet. It discusses various authorities involved in internet governance like ICANN and ISOC. It then defines internet filtering and the different types of content filtered. It discusses the global status of filtering for political, social and security content. It highlights problems with internet filtering like effects on performance and ethics. It concludes there is a need for improved cooperation and standards set by an independent organization.
PiratePay is a technology that gives content owners remote control over BitTorrent to make it beneficial for rights holders and safe for users. It uses aggressive technology to take control of torrents and offers manual traffic management to reduce piracy losses and decrease content distribution costs so content distribution benefits grow. PiratePay has signed its first client, the Association of Multimedia Producers of Russia, and is targeting other content owners. It has received $150,000 in funding so far from Microsoft and others.
Content Watch - Company & Product Overview (Eng)INSPIRIT BRASIL
This document provides an overview of a company that develops content filtering and security solutions. It was founded in 2002 and has experienced 50% annual growth. Its flagship products are Net Nanny for parental controls and ContentProtect Professional for enterprise endpoint security. The company is developing mobile security solutions and seeking to expand into new markets like smartphones, tablets, and routers. It currently has over 750,000 users globally and competes against firms like Symantec and Websense. The document outlines the company's vision, products, leadership team, markets, and secret sauce which is a dynamic content analysis engine.
Describing the computing revolution that is disputing business models. Why the elastic computing capabilities is the ultimate weapon to survive into the digital economy.
Webinar Deck - Protect Your Users' Online Privacy Ensighten
This document discusses protecting user privacy online. It outlines an agenda on why privacy matters, legislation, enhancing trust and data ownership. It then provides an overview of Ensighten, a tag management system company, and how their tools can help companies monitor data collection on their sites and ensure compliance with privacy policies and regulations. Specific examples are given around detecting and blocking malware. The onset of privacy regulation in Europe is also summarized.
Appinions Information Technology Influence Study_August 2013Appinions
This report explores the companies and executives who are shaping influential conversations in enterprise software.
The study is based on 60 days of data taken between June 4 and August 2, 2013. The scope of this report is based on the most compelling issues around IT, exploring the most influential topics as defined by the upcoming Interop New York conference: Cloud Computing, Big Data, SaaS, Network Infrastructure, Information Security and BYOD.
This document discusses challenges and opportunities related to adopting mobile technologies. It provides statistics on technology investments and surveys of project managers that show increasing adoption of smartphones, tablets, and mobile apps. It also outlines CBRE's commitments to mobile technologies like QR coding, telepresence, and near field communication. The document discusses predictions for the next 1-3 years, including moving services to the cloud and using new technologies like augmented reality. It provides tips for securing IT support, file hosting, and managing mobile hardware securely.
The document provides an overview of the online video sector, including investment trends, market details, exit outlook, notable companies, and recent news. It summarizes that over $12 billion has been invested in 3,780+ companies in the sector, with 619 companies receiving funding in the last 5 years. The top markets receiving investment are subscription video on demand, multi-channel networks, and live streaming. Notable companies include Netflix, YouTube, Twitch, Brightcove, and Roku.
Eprivacy issues and standards -- where do we stand?Anna Long
This document discusses privacy issues related to online data collection and three attempts to address them: the EU ePrivacy Directive, the W3C Tracking Protection Working Group, and the W3C Customer Experience Digital Data Community Group. The EU Directive requires opt-in for non-essential cookies which caused disruption. The W3C Tracking group developed a Do Not Track standard but faced challenges. The W3C Customer Group aims to standardize analytics data while addressing privacy through an access control layer and permissions mapping.
Using ATT&CK for purple teaming. We walk through one technique emulation + detection example (easy, medium, hard). Then we asses where we stand after that in terms of defense (detection, protection, informed hunt/IR).
INATSUMMIT 2018 - Belgrade April 14th, 2018
How to comply to General Data Protection Regulation and still run a wealthy organization in post-digital economy
The document discusses the rise of the visual web and key drivers that are contributing to its growth. It notes that the rise of the mobile web, easier content creation and distribution, and the fact that everything is now considered content are fueling more visual content online. It provides statistics on the growth of platforms like Facebook, Pinterest, and Instagram and advises brands to develop a visual content strategy, create content and context, leverage user-generated content, cascade content across platforms, and explore the emerging visual ecosystem.
Mary Meeker & KPCB - Internet Trends 2013Alex Gorski
The document summarizes key internet trends from a 2013 conference on internet trends. Some of the main points covered include:
- Global internet users reached 2.4 billion in 2012 with 8% annual growth driven by emerging markets like China and India.
- Mobile internet access and usage is growing rapidly and surpassing desktop access in some countries like China. Mobile transactions and traffic are also rising significantly.
- Uploading and sharing of photos, videos, sound clips and other data from mobile devices is exploding and growing exponentially each year across many platforms.
- Social media usage continues shifting to mobile platforms with over half of Facebook users now accessing the platform via mobile.
This document contains a personal reflection from the student on their experience working with classmates on the "Digital Enterprise" course. It discusses adapting to working with people from different backgrounds and cultures, learning about New Zealand's working sphere and corporate norms, and completing weekly case studies on time by trying to meet the lecturer's expectations. It also summarizes key lessons learned from analyzing various case studies, including about customer experience, business models, social media, and technology. The student expresses gratitude to God, their family, lecturer, and classmates for supporting their learning.
This document is a report on Topic 7: Enterprise as Play from the course APMG 8119: Digital Enterprise. It discusses three key topics: hedonic motivation which refers to intrinsic rewards people feel when performing an action, how online worlds allow interaction and understanding of customer needs, and some success factors for businesses in online worlds including value for customers, interactive applications, and community management. The document provides an overview and details on each of these topics with references.
This document outlines allegations against members of the "Mega Conspiracy", a criminal organization that engaged in massive copyright infringement and money laundering through the website Megaupload.com. It alleges that Megaupload.com willfully distributed infringing copies of copyrighted works like movies, music, and software without authorization. It claims Megaupload earned over $175 million from premium subscriptions and advertising on its site and related sites like Megavideo.com that streamed infringing content. The document alleges Megaupload did not comply with DMCA safe harbor provisions and its abuse tool did not properly remove infringing files identified by copyright holders.
This document outlines allegations against members of the "Mega Conspiracy", a criminal organization that engaged in massive copyright infringement and money laundering through the website Megaupload.com. It alleges that Megaupload.com and related sites willfully distributed infringing copies of copyrighted works like movies and music without authorization, harming copyright holders by over $500 million. The sites generated over $175 million in revenue from advertising and subscription fees. The document provides details on how the sites operated and generated revenue from widespread infringement.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
This document summarizes the history and current state of Active.com, a company that produces data about events, classes, memberships, and other activities. It traces Active.com's growth from the late 1990s to today, including acquisitions of other companies. In 2009, Active.com opened its data through an API to business partners and developers in order to build the world's largest directory of things to do. This led to over 130 registered API users generating additional traffic and partnerships for Active.com. The document promotes further engagement with Active.com's developer community and API.
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
Speedbit 5 Sep07-Travel Tips for your Internet Ride-Ariel YarnitskyJosh (Tzvika) Avnery
The document discusses SpeedBit, a company that pioneered download acceleration and instant messaging technologies. It describes SpeedBit's products like Download Accelerator Plus which optimized downloads using multiple connections. The document also discusses opportunities for SpeedBit's video acceleration technology in areas like mobile, gaming consoles, and set-top boxes to improve streaming and downloading speeds. It provides advice for entrepreneurs on challenges of starting a company and ensuring success through the right team, strategy, and clear value proposition.
This document provides an overview of the LOT Network, a non-profit organization that aims to protect innovation by providing immunity from patent assertion entities (PAEs) for its members. It summarizes Ken Seddon's background and experience in patents. It also discusses the costs imposed by PAEs, how LOT Network works by granting licenses to other members if a patent is transferred to a PAE, LOT members across different industries, and reasons for companies to join LOT Network, including access to free patents donated by larger companies for startups.
Internet governance and the filtering problemsTan Tran
This document provides an overview of internet governance and filtering. It defines internet governance as the development and application of shared principles, norms, rules and procedures that shape the evolution and use of the internet. It discusses various authorities involved in internet governance like ICANN and ISOC. It then defines internet filtering and the different types of content filtered. It discusses the global status of filtering for political, social and security content. It highlights problems with internet filtering like effects on performance and ethics. It concludes there is a need for improved cooperation and standards set by an independent organization.
PiratePay is a technology that gives content owners remote control over BitTorrent to make it beneficial for rights holders and safe for users. It uses aggressive technology to take control of torrents and offers manual traffic management to reduce piracy losses and decrease content distribution costs so content distribution benefits grow. PiratePay has signed its first client, the Association of Multimedia Producers of Russia, and is targeting other content owners. It has received $150,000 in funding so far from Microsoft and others.
Content Watch - Company & Product Overview (Eng)INSPIRIT BRASIL
This document provides an overview of a company that develops content filtering and security solutions. It was founded in 2002 and has experienced 50% annual growth. Its flagship products are Net Nanny for parental controls and ContentProtect Professional for enterprise endpoint security. The company is developing mobile security solutions and seeking to expand into new markets like smartphones, tablets, and routers. It currently has over 750,000 users globally and competes against firms like Symantec and Websense. The document outlines the company's vision, products, leadership team, markets, and secret sauce which is a dynamic content analysis engine.
Describing the computing revolution that is disputing business models. Why the elastic computing capabilities is the ultimate weapon to survive into the digital economy.
Webinar Deck - Protect Your Users' Online Privacy Ensighten
This document discusses protecting user privacy online. It outlines an agenda on why privacy matters, legislation, enhancing trust and data ownership. It then provides an overview of Ensighten, a tag management system company, and how their tools can help companies monitor data collection on their sites and ensure compliance with privacy policies and regulations. Specific examples are given around detecting and blocking malware. The onset of privacy regulation in Europe is also summarized.
Appinions Information Technology Influence Study_August 2013Appinions
This report explores the companies and executives who are shaping influential conversations in enterprise software.
The study is based on 60 days of data taken between June 4 and August 2, 2013. The scope of this report is based on the most compelling issues around IT, exploring the most influential topics as defined by the upcoming Interop New York conference: Cloud Computing, Big Data, SaaS, Network Infrastructure, Information Security and BYOD.
This document discusses challenges and opportunities related to adopting mobile technologies. It provides statistics on technology investments and surveys of project managers that show increasing adoption of smartphones, tablets, and mobile apps. It also outlines CBRE's commitments to mobile technologies like QR coding, telepresence, and near field communication. The document discusses predictions for the next 1-3 years, including moving services to the cloud and using new technologies like augmented reality. It provides tips for securing IT support, file hosting, and managing mobile hardware securely.
The document provides an overview of the online video sector, including investment trends, market details, exit outlook, notable companies, and recent news. It summarizes that over $12 billion has been invested in 3,780+ companies in the sector, with 619 companies receiving funding in the last 5 years. The top markets receiving investment are subscription video on demand, multi-channel networks, and live streaming. Notable companies include Netflix, YouTube, Twitch, Brightcove, and Roku.
Eprivacy issues and standards -- where do we stand?Anna Long
This document discusses privacy issues related to online data collection and three attempts to address them: the EU ePrivacy Directive, the W3C Tracking Protection Working Group, and the W3C Customer Experience Digital Data Community Group. The EU Directive requires opt-in for non-essential cookies which caused disruption. The W3C Tracking group developed a Do Not Track standard but faced challenges. The W3C Customer Group aims to standardize analytics data while addressing privacy through an access control layer and permissions mapping.
Using ATT&CK for purple teaming. We walk through one technique emulation + detection example (easy, medium, hard). Then we asses where we stand after that in terms of defense (detection, protection, informed hunt/IR).
INATSUMMIT 2018 - Belgrade April 14th, 2018
How to comply to General Data Protection Regulation and still run a wealthy organization in post-digital economy
The document discusses the rise of the visual web and key drivers that are contributing to its growth. It notes that the rise of the mobile web, easier content creation and distribution, and the fact that everything is now considered content are fueling more visual content online. It provides statistics on the growth of platforms like Facebook, Pinterest, and Instagram and advises brands to develop a visual content strategy, create content and context, leverage user-generated content, cascade content across platforms, and explore the emerging visual ecosystem.
Mary Meeker & KPCB - Internet Trends 2013Alex Gorski
The document summarizes key internet trends from a 2013 conference on internet trends. Some of the main points covered include:
- Global internet users reached 2.4 billion in 2012 with 8% annual growth driven by emerging markets like China and India.
- Mobile internet access and usage is growing rapidly and surpassing desktop access in some countries like China. Mobile transactions and traffic are also rising significantly.
- Uploading and sharing of photos, videos, sound clips and other data from mobile devices is exploding and growing exponentially each year across many platforms.
- Social media usage continues shifting to mobile platforms with over half of Facebook users now accessing the platform via mobile.
Similar to Assignment three group presentation (20)
This document contains a personal reflection from the student on their experience working with classmates on the "Digital Enterprise" course. It discusses adapting to working with people from different backgrounds and cultures, learning about New Zealand's working sphere and corporate norms, and completing weekly case studies on time by trying to meet the lecturer's expectations. It also summarizes key lessons learned from analyzing various case studies, including about customer experience, business models, social media, and technology. The student expresses gratitude to God, their family, lecturer, and classmates for supporting their learning.
This document is a report on Topic 7: Enterprise as Play from the course APMG 8119: Digital Enterprise. It discusses three key topics: hedonic motivation which refers to intrinsic rewards people feel when performing an action, how online worlds allow interaction and understanding of customer needs, and some success factors for businesses in online worlds including value for customers, interactive applications, and community management. The document provides an overview and details on each of these topics with references.
This document is a report prepared for Robert Davis on Topic 6 of the Postgraduate Diploma in Business course APMG 8119: Digital Enterprise from 2012. It discusses the CAM model of how iTunes facilitates interaction between customers and allows advertising, the role of fun in building relationships with technology and others, and the four properties of interactivity: two-way communication, synchronous communication, controlled communication, and contingent communication. References are provided on conceptualizing fun in mobile commerce and advertising in ubiquitous markets.
The document is a report analyzing the business model of NZ Bus Services, a major public transport operator in New Zealand. It owns over 1,100 buses and transports over 50 million passengers annually. The report provides an overview of the company, including its ownership, partnerships, financial performance in recent years, and the various costs associated with operating its bus network. It also examines ways NZ Bus has adopted electronic business practices and mobile payment technologies like Snapper cards.
This document is a report analyzing the New Zealand company Trade Me (TME) and its adoption of e-business. It discusses how TME started as an online auction platform in 1999 and has since grown to be one of New Zealand's largest companies with over 2.5 million active users and 250 employees. The report profiles TME's operations and portfolio, and analyzes how it has strategically expanded into new areas like daily deals and travel sites. It concludes that TME is well-positioned for continued growth if it can provide New Zealand consumers with a wide range of goods at competitive prices both domestically and internationally.
This document appears to be a report on the topic of the digital networked society. It was prepared by Phonephet Manichith and Garima Kashap for their Postgraduate Diploma in Business program in 2012. The report discusses three main topics: social change in the digital age, how the internet empowers users, and ideation. It references several academic sources to support its discussion of these topics and how digital technologies have impacted society.
This document is a report prepared for Robert Davis on the topic of customer experience in digital enterprises. It discusses three key areas: the optimal online experience, a model of service branding, and the nature of relationships in electronic commerce environments. The optimal online experience involves flow and affective and technology-relative experiences. The service branding model examines trust, image, the relationship between physical and virtual realities, and brand alliances. Finally, relationships in ECEs are based on information channels and the relationships between retailers and partners/consumers, developing trust when the real experience exceeds the virtual.
4. Business Background
Megaupload Limited is the Hong Kong-based company
Established 17th of July 2005; 150 employees
Business type: File hosting service (including Image, Video, and music hosting )
Visitors per day: 50,000,000 (13th most visited website)
Registered member: 180,000,000
Incomes: Premium subscriptions ($150M)
and online advertising ($ 25M)
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
5. Main income - Service fees
Subscription: Paypal, Inc
$9.99 Monthly
$59.99 Yearly
$199.99 Lifetime
Moneybookers
€9.99 Monthly
€ 59.99 Yearly
€ 199.99 Lifetime
Advertising: AdBirte - $840,000
PartyGaming - $3 Million
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
6. Main Expenses – 4 sources
1. Corporate entities, co-conspirators and employees
2. Developing and promoting websites
3. Uploader Rewards
4. Infrastructure supporting to its businesses
65 million for Internet Hosting Services
Carpathia Hosting-Carpathia.com: 25 petabytes of data storage
Cogent Communications-Cogentco.com: computers, internet
bandwidth, hosting, and support services
Leaseweb-Leaseweb.com: computers, internet hosting, and support
services
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
8. The basic flow how Megaupload works
Megaupload harm to Copyright holders?
Reproduce and distribute copies of popular copyright
content over the internet without authorisation
Account for up to 40% of all file downloads on the internet
Cause more than 500 million USD in lost revenue
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
9. The basic flow how Megaupload works
What Governments Acted
2009 blocked in Hong Kong
2010 blocked in Saudi Arabia
2010 intermittently blocked in the United Arab Emirates
2011 blocked in Malaysia
2011 blocked in India
2012 shut down by U.S Government
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
10. The basic flow - Megaupload works
1 Upload copyrighted
Client A
song/movie
3
2
Song link Megaupload.com Server
Others
5 Abuse Tool
Upload copy of
Client B Copyright holders
4 copyrighted song 6
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
11. The basic flow - Megaupload works (cont.)
Megaupload:
Megaupload is the first and only site on the Internet which pays consumers for
hosting their files (Uploader Rewards):
$1USD cash per 1,000 downloads of consumers’ uploaded files
Basic service is available for free and allows users to upload files of up to
1,024MB (Expiration <21 days)
Free registered users are offered 50 GB of total file storage
(Expiration < 90 days)
Free users cannot download files larger than 1 GB
Premium users are offered 1 TB total file storage (No Expiration)
Megavideo: is a free online video sharing service for a premium subscription
>>APMG 8119: DIGITAL ENTERPRISE Source: CrunchBase (2012)
12. The Company Web Services
Main Websites
No. Website Description of Service
1 Megaupload.com A one-click hosting service
2 Megavideo.com Upload associated and ad-supported video
3 Megapix.com Uploading of images
4 Megalive.com A live video-streaming service
5 Megabox.com Uploading of whole music libraries and playlists
Put the “dinosaur record labels” out of business
6 Megaporn.com File-sharing of pornographic movies and
images
>>APMG 8119: DIGITAL ENTERPRISE Source: Sidenius, Jensen, Jensen, Fiktus, & Tommerup (2012)
13. Mega Networks - Websites
No. Mega Conspiracy No. Mega Conspiracy
1 Megaupload.com 11 Megahelp.com
2 Megavideo.com 12 Megagogo.com
3 Megaclick.com 13 Megamovie.com
4 Megaworld.com 14 Megaporn.com
5 Megalive.com 15 Megabackup.com
6 Megapix.com 16 Megapay.com
7 Megacar.com 17 Megabox.com
8 Megafund.com 18 Megabest.com
9 Megakey.com
10 Megaking.com
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
14. Mega Networks - Companies
No Mega’s supporters No Mega’s supporters No Mega’s supporters
1 Megaupload Limited 11 Kimvestor Limited 21 Mega Services
Europe
2 Vestor Limited 12 Trendex Limited 22 Megateam Limited
3 Megamedia Limited 13 Monkey Limited 23 Megastuff Limited
4 Megavideo Limited 14 Kimpire Limited 24 Megacard Inc
5 Megarotic Limited 15 A Limited 25 Megasite Inc.
6 Megapix Limited 16 N1 Limited 26 Seventures Limited
7 Kingdom Int Venture 17 RNK Media Company 27 SECtravel
8 Netplus Int Limited LLC 18 Megapay Limited 28 Bramos B.V
9 Basemax Int Limited 19 Megamusic Limited
10 Mindpoint Int Limited 20 Finn Batato
Kommunikation
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
15. Kim Dotcom
Kim Dotcom (38 year olds) is the CEO of MUL
A dual citizen of Finland and Germany
A resident of both Hong Kong and New Zealand (PR 29 November 2010)
Director and sole shareholder: Vestor & Kingdom International Venture
64 bank accounts worldwide
Sole shareholder of Megavideo.com, Megaporn.com, and Megapay.com
Hold 68% of total shares of Megaupload.com, Megaclick.com, Megapix.com
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
16. Other Executives
No Name Country Position on Megaupload Limited Benefits from Mega
(Infringing copies of copyright works) Conspiracy
1 Finn Batato Germany Chief Marketing and Sale Officer > $400,000
2 Julius Bencko Slovakia Graphic Directors > $1,000,000
3 Sven Echternach Germany Head of Business Development > $500,000
4 Mathias Ortmann Germany Chief Technical Officer - Founder > $9,000,000
5 Andrus Nomm Estonia Chief Development Software officer > $100,000
6 Bram Van Der Kolk Dutch Programmer-in-charge > $200,000
Source: The United States district court for the eastern district of Virginia (2012)
>>APMG 8119: DIGITAL ENTERPRISE
17. Copyright Act 1994
Copyright Defined:
“Copyright is an intellectual property right that exists in various kinds of
original works listed in the Copyright Act. Copyright is not concerned
with original and new ideas but with expressions of them in various forms
or works”pg.505 - Gerbic, P., & Lawrence, M. (2006).
18. Copyright Act 1994
What does the Copyright Act do/cover - Section 2
Sound
All other
Recordings &
Copyrights
Film
20. Global Law
How do you copyright something?
Global – how does that work?
• WIPO
21. Kim Schmitz
Kim.Com also know as:
• Kim Schmitz
• Kimble
• Kim Tim Jim Vestor
Colourful history:
• Hacker
• Dealing in stolen property
• Computer fraud
• Data espionage
• Insider Trading
• Faking your own death
• Breaching trading laws
22. Kim.Com
Charges:
• Conspiracy to commit racketeering;
• Conspiracy to commit copyright infringement;
• Conspiracy to commit money laundering;
• Criminal copyright infringement by distributing copyrighted work
being prepared for commercial distribution on a computer network
and aiding and abetting criminal copyright infringement;
• Criminal copyright infringement by electronic means and aiding and
abetting criminal copyright infringement.
23. Angry Customers
Carlos Sanchez Alveida – Spanish Anger
• Barcelona Spain belonged
• Complains his legal contents stored
now was inaccessible for
companies customers
• Users gather together to file legal claim
• Spain has already proved to be one
tough cookie for U.S. Law after a similar
file sharing website “Roja Directa”
• As Roja Directa survives but in a different
domain expectedly mega upload will
survive
24. Suzanne Barbieri
• London based musician – Beloved Aunt
• Using Mega upload since 2009
• Sends songs to producers & record label
• YouSendIt could not be used by her
• 2GB free account mega upload offered
• Pre-release tracks in hand of US Govt.
• Digital version of her work - freebie
downloads
“Piracy hurts artists”
But so does this heavy – handed approach of
Penalizing legitimate users for sharing their work
25. Mark Ellul
• Reader by profession
• Used mega upload account for online storage and backups
• Also send personal home videos about her daughters to their
grandparents from Spain to Australia (HD Videos)
• It was a pirated use but personal
• No trust left for any file sharing website any more even drop box
whether any time they will also be shut down by the FBI
26. DJ’s legal creations are also behind the locks now Mark Ellul received
tweets regarding this, who is another victim of this file sharing website
“Mega Upload”
27. Geoff Luk - Vancouver resident
• Used 4GB space of mega upload for storage of files
• Worked voluntary to take photos & Videos at 2010 winter Olympic
games
• Loss – 2 ISO DVD images that were created from PPT slide shows and
photos and video taken while he was volunteering with 2010
Vancouver winter Olympic games
• Was not possible to physically share both DVD copies of the photos
videos, and ISO files with team of 75 Downtown Vancouver, and
another 25 in Whistler/Blackcomb
• Problem – had everything backed up locally, although uploading
files again to another service will be inconvenient
28. Movant Kyle Goodwin
• Deprived of access to his own property wanted the
permission to grab his own file which was a part of his
growing business in Ohio
• Filed Motion for his property pursuant to 18 U.S>C. §
1963 AND/OR FEDERAL RULE, CRIMINAL PROCEDURE
41(g ) in May
• His living is taping high-school sports events
29. The dramatic unexpected shutdown of mega upload
• 180 million registered users
• More than 50 million daily visitors
Had a chilling effect on the growing online storage industry which some
people place in the “cloud computing” business
Sufferers even many who were the sole owners and had proper copyright of
their material
Reason
“Piracy”
30. Copy-rights
vs.
File-sharing
“Due to deep changes in technology […] we are entering a new
age where people participate in economy like never before”
“… new forms of mass collaboration are changing how goods
and services are… distributed on a global basis”
(Tapscott & Williams, 2008)
File sharing is the practice of distributing or providing access to
digitally stored information:
• computer programs,
• multimedia (audio, images and video),
• documents
• electronic books.
31. Copy-rights
vs.
File-sharing
Primary information.
File sharing is not necessarily illegal,
even if the data being shared are covered by copyright.
Primary property.
File sharing is clearly to infringe on copyright laws.
32. Transparency
Report
Copyright Owners – 2,223
URL’s Requested to be Removed – 7,010,047*
Top “Pirate” Domains
in the Past Month:
• fenopy.eu
• filestube.com
• isohuntz.com
• torrentz.eu
• 4shared.com
* 10th of October 2012
33. Mechanisms
Platform based cloud storage:
• Apple iCloud
• Google Drive
Multi-platform based cloud storage:
• DropBox
• SugarSync
Peer-to-peer (P2P) and torrents:
• Napster
• The Pirate Bay
• BitTorrent
Some social networks:
• VK (V Kontakte)
• Odnoclassniki
34. Apple iCloud
for Apple users with Apple ID: Stores:
• Mac-based computers • music, photos, apps
• Apple TV • apps
• iPad, iPhone, iPod • documents & files
Functions:
• access iTunes purchases
• Synchronize data between devices
• share digital images
35. DropBox
Tool for storing and accessing any files from any devices with
Internet connection.
Tool, that integrates into any operation system = “virtual flash-drive”.
Simplified the process of uploading, downloading, and updating
all kind of digital content.
Allows to designate which files and folders will be accessible to
anyone.
36. Piracy Influence
The technology itself is perfectly legal.
Functional limitations:
• Tightening access to shared files
• Content scan (based on file’s control sums)
• Automatic remove of “suspicious” files = censorship
• Privacy reduction
• Prohibition of “direct” links
37. P2P & Torrents
Peer-to-peer file sharing allows users to download media files using a
special software client that searches for other connected computers.
Peer-to-peer file sharing began in 1999 with Napster, a file sharing
program and central servers that linked people who had MP3 files
with those who requested these files.
BitTorrent is a protocol used for distributing large amounts of data over
the Internet.
Peer-to-peer networks have accounted for
approximately 43% to 70% of all Internet traffic.
BitTorrent is utilized by 150 million active users.
38. Two Sides of
File Sharing
Positive:
BitTorrent protocol can be used to reduce the server and network
impact of distributing large files.
• Amazon S3 "Simple Storage Service" equipped with built-in
BitTorrent support.
• The UK government used BitTorrent to distribute details about
how the tax money of UK citizens was spent.
• Florida State University uses BitTorrent to distribute large scientific
data sets to its researchers.
• Facebook uses BitTorrent to distribute updates to Facebook
servers
“We grew up with the Internet and on the Internet. […] The Internet
to us is not something external to reality but a part of it. […]
We do not use the Internet, we live on the Internet and along it. “
Piotr Czerski
39. Two Sides of
File Sharing
Negative:
Pose a threat to distribution of pirated content.
File sharing hurts sales and influences on economic development.
File sharing represents high risk in terms of malware.
The risk to be punished by court decisions.
Example:
Minnesota woman to pay $220,000 fine
for 24 illegally downloaded songs
Ethic of illegal content download:
• 75 percent of young people aged 18-20 supported file
sharing: "I think it is OK to download files from the Net,
even if it is illegal."
• We forget the idea that content creators should be
rewarded for their work.
40. Content Must Be
Legal and Paid
• Movies, books, music, games should be downloaded from the
network only for a fee from the owner’s permission.
• If person pays, he/she becomes a discriminating consumers who
vote for the content by “paying money”.
Psychology:
1. People do not appreciate things that they get for nothing.
2. People feel uncomfortable in excess of choice.
3. Unlimited access to all desired content results in a spoiled
child syndrome.
41. Copy Right
into
Copy Risk
“Music can and should be made to feel free, even when it is not free.”
Jim Griffin
• Monthly payments
• Blanket (collective) license –grant rights to distribute recordings
to ISPs, collect money from them, and distribute the funds to
copyright holders.
42. References:
Go – Kim & Megaupload
BBC News. (2012). Porfile: Megaupload file-sharing site. Retrieved October 6, 2012, from BBC News
http://www.bbc.co.uk/news/world-us-canada-16657800
CrunchBase. (2012). Megaupload Limited. Retrieved October 6, 2012, from CrunchBase
http://www.crunchbase.com/company/megaupload-limited
Sidenius, K. H. R., Jensen, M. S., Jensen, B. H., Fiktus, M. K., & Tommerup, E. (2012). Copyright VS. Megaupload.
Roskilde University Digital Archive. Retrieved from http://rudar.ruc.dk:8080/handle/1800/7515
The United States district court for the eastern district of Virginia. (2012). Indictment. Virginia, VA. Retrieved
from http://www.scribd.com/doc/78786408/Mega-Indictment
Tonya - Copyright
Case 1:12CR3 (United States District Court for the Eastern District of Viginia Alexandria Division 2012).
Gerbic, P., & Lawrence, M. (2006). Understanding commercial law (6th ed.). Wellington: LexisNexis NZ Ltd.
World Intellectual Property Organization. (n.d.). Encouraging creativity and innovation.
from http://www.wipo.int/portal/index.html.en
43. References (cont.):
Garima – Customers
http://www.clipartguide.com/_named_clipart_images/0511-0811-0415-
3734_Cartoon_of_a_Red_Faced_Angry_Man_clipart_image.jpg (Picture 1)
http://comm200fa11.files.wordpress.com/2011/09/music_piracy_cartoon.jpg
http://www.fotosearch.com/CSP193/k1935509/ (Picture 2)
http://knowyourmeme.com/memes/events/operation-megaupload (Picture 4)
http://www.fotosearch.com/clip-art/angry.html#comp.asp?recid=55770885&xtra= (Picture 6)
http://news.cnet.com/8301-1023_3-57441702-93/eff-to-federal-court-return-megaupload-data-now/
(Picture 7)
BRIEF OF KYLE GOODWIN IN SUPPORT OF HIS MOTION FOR THE RETURN OF PROPERTY PURSUANT TO 18 U.S.C. §
1963 AND/OR FEDERAL RULE OF CRIMINAL PROCEDURE 41(g), 1:12-cr-00003-LO (IN THE UNITED STATES DISTRICT
COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION May 25, 2012). Retrieved from
https://www.eff.org/sites/default/files/filenode/BriefMotRetProp.pdf
Brodkin, J. ( 2012, January 21). Megaupload wasn't just for pirates: angry users out of luck for now. Retrieved
from ars technica: http://arstechnica.com/gadgets/2012/01/megaupload-wasnt-just-for-pirates-angry-users-
out-of-luck-for-now/
44. References (cont.):
Garima – Customers (cont.)
Roman, D. (2012, January 20). Spanish Anger at Megaupload Closure. The Wall Street Journal. Retrieved from
http://blogs.wsj.com/tech-europe/2012/01/20/spanish-anger-at-fbi-megaupload-closure/
Dmitriy – iCloud
Carmack, C. (n.d.). How BitTorrent Works. Retrieved from How Stuff Works:
http://computer.howstuffworks.com/bittorrent1.htm
Czerski, P. (2012, Feb 15). We, the Web Kids. Retrieved from Pastebin: http://pastebin.com/0xXV8k7k
Ernesto. (2010, Jun 25). Facebook Uses BitTorrent, and They Love It. Retrieved from Torrent Freak:
http://torrentfreak.com/facebook-uses-bittorrent-and-they-love-it-100625/
Ewing, A. (2006, Jun 8). Young voters back file sharing. Retrieved from The Local Sweden's News in English:
http://www.thelocal.se/article.php?ID=4014&date=20060608
Fisk, N. W. (2009). Understanding Online Piracy: The Truth about Illegal File Sharing. Santa Barbara: ABC-
CLIO, LLC.
Holpuch, A. (2012, September 11). Minnesota woman to pay $220,000 fine for 24 illegally downloaded songs.
Retrieved from The Guardian: http://www.guardian.co.uk/technology/2012/sep/11/minnesota-woman-
songs-illegally-downloaded
Levine, R. (2012). Free Ride: How Digital Parasites Are Destroying the Culture Business, and How the Culture
Business Can Fight Back. New York: Anchor Books.
45. References (cont.):
Dmitriy – iCloud (cont.)
Maxey, R. (2011). The Infinite Dropbox. Salt Lake City: RMWP.
Rich, J. R. (2012). How to Do Everything iCloud. McGraw-Hill Osborne Media.
Tapscott, D., & Williams, A. D. (2010). Wikinomics: How Mass Collaboration Changes Everything. Portfolio
Trade.