SlideShare a Scribd company logo
Burcu S. Bakioğlu [email_address] @PaleFire
Samuel (2001)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Tactical Media Raley (2009)
In lulz we trust!
The  Age  of
Network Society horizontal modes of communication alternative strategies of  resistance circulation (NOT accumulation) Castells (2000), Dyer-Withford (1999), Scott Lash (2002)
Sites of Struggle Piracy Cultures
REGULATION Corruption Criminalization of society Privacy Surveillance Threat to  creativity Lessig (2004), McLeod (2007), Vaidhyananthan (2003)
Operation Payback is a Bitch
 
Operation: Payback is a bitch –  Wikileaks "the future of cyber protests"
 
Outcome : ,[object Object],[object Object],[object Object],[object Object],[object Object]
Significance : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Plan (3 phases set to finish Dec 21 st  2012)
 
Burcu S. Bakioğlu [email_address] @PaleFire

More Related Content

Viewers also liked

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door Bibliotheekportalen
Johan Mijs
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieJohan Mijs
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015
Johan Mijs
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Johan Mijs
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Johan Mijs
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialen
Johan Mijs
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside out
Johan Mijs
 

Viewers also liked (7)

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door Bibliotheekportalen
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatie
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialen
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside out
 

Similar to Hacktivism, Cyberwars, & Copyright Controversies

STSP Week3
STSP Week3STSP Week3
STSP Week3
University of York
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
Rob Jewitt
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
Prof. David E. Alexander (UCL)
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
Elizabeth Hall
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065
University of Sydney
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
Aram Sinnreich
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summaryeve_psu
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New Media
Rob Jewitt
 
Chapter16
Chapter16Chapter16
Chapter16
ankit.rk
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New Media
Terry Flew
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014iDIALOGHI
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Suyash Shanker
 

Similar to Hacktivism, Cyberwars, & Copyright Controversies (20)

STSP Week3
STSP Week3STSP Week3
STSP Week3
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Sc po some-01
Sc po some-01Sc po some-01
Sc po some-01
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summary
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New Media
 
Polinter11
Polinter11Polinter11
Polinter11
 
Chapter16
Chapter16Chapter16
Chapter16
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New Media
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Polinter11
Polinter11Polinter11
Polinter11
 

More from PaleFire

Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual Worlds
PaleFire
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismPaleFire
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingPaleFire
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-stylePaleFire
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifePaleFire
 

More from PaleFire (6)

Test
TestTest
Test
 
Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual Worlds
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivism
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent Storytelling
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-style
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second Life
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

Hacktivism, Cyberwars, & Copyright Controversies

Editor's Notes

  1. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  2. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  3. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  4. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  5. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.