This document provides an overview of cybercrime and discusses copyright infringement by third parties on platforms like YouTube. It begins by defining cybercrime and describing different types that target computers, such as viruses, worms, Trojan horses, and distributed denial of service attacks. It also discusses crimes that use computers to facilitate traditional offenses like copyright infringement and child pornography. The document then focuses on internet service providers and examines YouTube and legal regimes governing copyright issues in the US and EU. It concludes by assessing the effectiveness of copyright policies based on their ability to reduce infringement, maximize the legitimate market, and encourage future content creation.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Dyre: Emerging Threat on Financial Fraud LandscapeSymantec
A significant upsurge in activity over the past year has seen Dyre emerge as one of the most dangerous financial Trojans, capable of defrauding customers of a wide range of financial institutions across multiple countries.
Dyre is a highly developed piece of malware, capable of hijacking all three major web browsers and intercepting internet banking sessions in order to harvest the victim’s credentials and send them to the attackers.
Dyre is a multi-pronged threat and is often used to download additional malware on to the victim’s computer. In many cases, the victim is added to a botnet which is then used to send out thousands of spam emails in order to spread the threat further afield.
Technology development is a necessity. Information and Communication Technology is a large dome of terminology that includes all technical equipment for processing and conveying information. It has also caused the world's relationships to be unconstrained. It's here and now means it's somewhere else and now. In every line of technological life present that contributes its role to the desired coveted will be better. That dream is in fact two blades facing each other. In the body of one knife exactly each other. On the one hand technology contributes to the improvement of welfare, progress, and human civilization. Furthermore, on the other hand, technology can be an instrument in the act against the law. With human information technology then likes getting a vehicle to burst its criminal lust. Criminal crime by taking technology as a medium, then manifested in various forms. These forms include hacking, cracking, and so on. Do not be surprised if for example your balance arrives – suddenly reduced, or the bank hundreds of millions in
This report details various security vulnerabilities facing organisations that are connected to the Internet. It focuses primarily on Denial of Service (DoS) attacks, providing an understanding of how these types of attacks are carried out and outlines the current technological resources available to provide countermeasures to DoS attacks. The recommendations provided at the end of the report allow organisations to gain the ability to minimise the harmful impact that DoS attacks can inflict upon their business.
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
The development of attack toolkits conforms that cybercrime is driven primarily by financial motivations as noted from the significant profits made by both the developers and buyers. In this paper, an enhanced hybrid attack toolkit mitigation model was designed to tackle the economy of the attack toolkits using different techniques to discredit it. The mitigation looked into Zeus, a common and the most frequently used attack toolkit to discover the hidden information used by the attackers to launch attacks. This information helped in creating honey toolkits, honeybot and honeytokens. Honeybots are used to submit honeytoken to botmasters, who sells to the internet black market. Both the botmasters, his mules and buyers attempts to steal huge amount of money using the stolen credentials which includes both real and honeytokens and will be detected by an attack detector which sends an alert on any transaction involving the honeytokens. A reconfirmation process which is secured using enhanced RC6 cryptosystem is enacted. The reconfirmation message in plain text is securely encrypted into cipher text and transmitted from the bank to the legitimate account owner and vise visa. The result of the crypto analysis carried out on the encrypted text using RC6 encryption algorithm showed that the cipher text is not transparent.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Dyre: Emerging Threat on Financial Fraud LandscapeSymantec
A significant upsurge in activity over the past year has seen Dyre emerge as one of the most dangerous financial Trojans, capable of defrauding customers of a wide range of financial institutions across multiple countries.
Dyre is a highly developed piece of malware, capable of hijacking all three major web browsers and intercepting internet banking sessions in order to harvest the victim’s credentials and send them to the attackers.
Dyre is a multi-pronged threat and is often used to download additional malware on to the victim’s computer. In many cases, the victim is added to a botnet which is then used to send out thousands of spam emails in order to spread the threat further afield.
Technology development is a necessity. Information and Communication Technology is a large dome of terminology that includes all technical equipment for processing and conveying information. It has also caused the world's relationships to be unconstrained. It's here and now means it's somewhere else and now. In every line of technological life present that contributes its role to the desired coveted will be better. That dream is in fact two blades facing each other. In the body of one knife exactly each other. On the one hand technology contributes to the improvement of welfare, progress, and human civilization. Furthermore, on the other hand, technology can be an instrument in the act against the law. With human information technology then likes getting a vehicle to burst its criminal lust. Criminal crime by taking technology as a medium, then manifested in various forms. These forms include hacking, cracking, and so on. Do not be surprised if for example your balance arrives – suddenly reduced, or the bank hundreds of millions in
This report details various security vulnerabilities facing organisations that are connected to the Internet. It focuses primarily on Denial of Service (DoS) attacks, providing an understanding of how these types of attacks are carried out and outlines the current technological resources available to provide countermeasures to DoS attacks. The recommendations provided at the end of the report allow organisations to gain the ability to minimise the harmful impact that DoS attacks can inflict upon their business.
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
The development of attack toolkits conforms that cybercrime is driven primarily by financial motivations as noted from the significant profits made by both the developers and buyers. In this paper, an enhanced hybrid attack toolkit mitigation model was designed to tackle the economy of the attack toolkits using different techniques to discredit it. The mitigation looked into Zeus, a common and the most frequently used attack toolkit to discover the hidden information used by the attackers to launch attacks. This information helped in creating honey toolkits, honeybot and honeytokens. Honeybots are used to submit honeytoken to botmasters, who sells to the internet black market. Both the botmasters, his mules and buyers attempts to steal huge amount of money using the stolen credentials which includes both real and honeytokens and will be detected by an attack detector which sends an alert on any transaction involving the honeytokens. A reconfirmation process which is secured using enhanced RC6 cryptosystem is enacted. The reconfirmation message in plain text is securely encrypted into cipher text and transmitted from the bank to the legitimate account owner and vise visa. The result of the crypto analysis carried out on the encrypted text using RC6 encryption algorithm showed that the cipher text is not transparent.
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
Landscaping
A local landscaping company that provides lawn-mowing, trimming and general landscape duties wants to get a jump on its competition by determining which houses in a section of town would best respond to marketing materials. A measure of which homeowners to approach would include their income, size of their yard and compare that against historical data on which homes have had landscaping services.
You were able to dig up a random sample of 30 households, given in the file Landscaping.xls. Using Excel, create a scatter plot of Lot Size vs. Income, color coded by the outcome variable Yes/No. Make sure to obtain a well-formatted plot (remove excessive background and gridlines; create legible labels and a legend, etc.). Hint: First sort the data by the outcome variable, and then plot the data for each category as separate series. Create the same plot, this time using Tableau. Compare the two processes of generating the plot in terms of effort as well as the quality of the resulting plots. What are the advantages of each? Explain.
Management Information Systems for The Information Age
Haag, S., & Cummings, M. (2013). Management information systems for the information age .
New York: McGraw-Hill.
MANAGEMENT INFORMATION I
svsTEMs r FOR THE 1N~ORMAT10N AGE
> > Ninth Edition Stephen HAAG I Maeve CUMMINGS
L_ - - -- ____,
-·
EXTENDED LEARNING MODULE H
Define computer crime and list three types of computer crime that can be
perpetrated from inside and three from outside the organization.
Identify the seven types of hackers and explain what motivates each group.
Define digital forensics and describe the two phases of a forensic investigation.
Describe what is meant by anti-forensics and give an example of each
of the three types.
Describe two ways in which businesses use digital forensics .
...
-f 1ntroductio~
Computers play a big part in crime. They're used to commit crime, unfortunately. But
they are also used to solve crimes. This should come as no surprise since computers
are by now such an integral player in every part of our lives. Computers are involved in
two ways in the commission of crime: as targets and as weapons or tools. A computer
or network is a target when someone wants to bring it down or make it malfunction, as
in a denial-of-service attack or a computer virus infection. Crimes that use a computer
as a weapon or tool would include acts such as changing computer records to com-
mit embezzlement, breaking into a computer system to damage information, and steal-
ing information like customer lists. See Figure H.l for examples of computer-related
offenses in which computers are used as weapons/tools and targets of crime.
Some crimes are clearly what we call computer crimes, like Web defacing, denial-of-
service attacks, e-mail scams, and so on. But as is the case in so many parts of our modern
lives, computers are also so integrated into crime that it's hard to separate them ou ...
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
54 Chapter 1 • The Threat Environment
FIGURE 1-18 Cyberwar and Cyberterror (Study Figure)
Nightmare Threats
Potential for far greater attacks than those caused by criminal attackers
Cyberwar
Computer-based attacks by national governments
Espionage
Cyber-only attacks to damage financial and communication infrastructure
To augment conventional physical attacks
Attack IT infrastructure along with physical attacks (or in place of physical attacks)
Paralyze enemy command and control
Engage in propaganda attacks
Cyberterror
Attacks by terrorists or terrorist groups
May attack IT resources directly
Use the Internet for recruitment and coordination
Use the Internet to augment physical attacks
Disrupt communication among first responders
Use cyberattacks to increase terror in physical attacks
Turn to computer crime to fund their attacks
espionage.87 Cyber espionage from China has been a serious problem since 1999.88
The Chinese government has been involved in, or sponsored, attacks aimed at the State
Department, Commerce Department, Senators, Congressmen, and US military labs.89
Cyberwar attacks can be launched without engaging in physical hostilities and still do
tremendous damage. Countries can use cyberwar attacks to do massive damage to one
another’s financial infrastructures, to disrupt one another’s communication infrastructures,
and to damage the country’s IT infrastructure all as precursors to actual physical hostilities.
Cyberterror
Another nightmare scenario is cyberterror, in which the attacker is a terrorist or group of
terrorists.90 Of course, cyberterrorists can attack information technology resources directly.
They can damage a country’s financial, communication, and utilities infrastructure.91
87 Dawn S. Onley and Patience Wait, “Red Storm Rising,” GCN.com, August 21, 2006. Keith Epstein, “China
Stealing U.S. Computer Data, Says Commission,” Business Week, November 21, 2008. http://www.businessweek.
com/bwdaily/dnflash/content/nov2008/db20081121_440892.htm.
88 Daniel Verton and L. Scott Tillett, “DOD Confirms Cyberattack ‘Something New’,” Cnn.com, March 6, 1999.
89 Josh Rogin, “The Top 10 Chinese Cyber Attacks (that we know of),” ForeignPolicy.com, January 22, 2010.
90 Although organized terrorist groups are very serious threats, a related group of attackers is somewhat dan-
gerous. These are hacktivists, who attack based on political beliefs. During tense periods between the United
States and China, for instance, hacktivists on both sides have attacked the IT resources of the other country.
91 In 2008, the CIA revealed that attacks over the Internet had cut off electrical power in several cities. Robert
McMillan, PC World, January 19, 2008. http://www.pcworld.com/article/id,141564/article.htm?tk=nl_dnxnws.
Chapter 1 • The Threat Environment 55
Most commonly, cyberterrorists use the Internet as a recruitment tool through
websites and to coordinate their activities.92 They can also use cyberterror in conjunc-
tion with .
One of the key methods cybercriminals are using is ransomware, most famously the Cryptolocker malware,
and its numerous variants, which encrypts the files on a user’s computer and demands the user to pay a ransom, usually in Bitcoins, in order to receive the key to decrypt the files. But Cryptolocker is just one approach that criminals are taking to demand ransom, and the techniques are evolving on a daily basis. To guard against ransomware, it is not enough to know the malware that is making the rounds that day. It is vital to have a broader understanding of the topic, so one can take effective countermeasures against this evolving threat.
malware, types of malware, virus, trojans, worm, rootkit, ransomware, malware protection, malware protection laws India, how malware works, history of malware
Similar to How_effective_are_policies_which_increas (20)
1. 1 | P a g e
Ivan Rainovski
BA essay
Cybercrime
Bastiaan Leeuw
Number of Words: 8670
Cybercrime
How effective are policies which increase the liability of ISPs for third party copyright
infringements?
2. 2 | P a g e
Table of Contents:
Introduction ………………………………………………………..………….p. 4
Chapter 1: Cybercrime a new frontier………………………………...………..p. 4
Part 1: Computers as the target of the offence……………………..….p. 6
Viruses ……………………………………………………..…p. 6
Worms………………………………………………………...p. 6
Logic Bombs………………………………………………….p. 7
Trojan horses……………………………………………….....p. 7
Distributed Denial of services (DDoS) attacks……………….p. 7
Part 2: Traditional crimes……………………..…………………….....p. 8
Copyright infringements……………………………………...p. 8
Child Pornography…………/………………………………..p. 9
Part 3: Problems with regulating Cybercrime………………………...p. 10
Chapter 2: Cybercrimes Third parties…………………………………………p. 12
Part 1: Internet Service Providers (ISPs)……………………………...p. 12
YouTube……………………………………………….…......p. 15
Copyright issues……………………………………………...p. 16
YouTube protection…………………………………….…….p. 17
Part 2: Cases and Legal Regimes……………………………………..p. 18
United States…………………………………………………p. 18
The Digital Millennium Copyright Act (DCMA).p. 19
Betamax case……………………………………...…p. 21
Viacom v YouTube………………………………….p. 22
Io Group Inc v Veoh Networks Inc……………….....p. 22
European Union and the E-Commerce Directive…..………..p. 23
France………………………………………..……...p. 24
Italy…………………………………………..….…..p. 25
Germany………………………………………...…..p. 25
Chapter 3: Effectiveness of Copyright policies……………………………….p. 27
Part 1: Reduction of copyright infringement.………………………...p. 29
Part 2: Maximizing the size of the legitimate market………………p. 29
3. 3 | P a g e
Part 3: Encouraging creation and dissemination of cont……………p. 31
Conclusion…………………………………………………………………...p. 32
Bibliography…………………………………………………………………p. 34
4. 4 | P a g e
Introduction:
The internet has become a powerful tool for expression of today’s generations. It
is a place where sharing original works has become easy and accessible for almost
everyone, and at the same time a place where discussion can occur over existing
works.1 It has further opened a new market, and can be seen as a growing sector
of economy.2 Along with new business opportunities, new opportunities have
arisen for the crime sector. Computers provided easier means for offenders to
commit illegal activities much faster and with lower financial investments.3 This
paper will look at one specific infringement, namely copyright infringements. It
will examine the effectiveness of copyright policies which increase the liability of
Internet Service Providers with regards to third party copyright infringements.
This paper will assess the effectiveness of such policies by examining three
specific aspects of copyright rules: (i) reducing copyright infringements, (ii)
increasing the size of the legitimate market, and (iii) encouraging the creation and
dissemination of future content.
Chapter 1 of this paper will give a brief description of the types of cybercrime. As
well as some of the problems that policy makers are faced with when regulating
cyberspace. Following in Chapter 2 Internet Service Providers will be discussed
and YouTube, as the main subject of this paper, will be further introduced. In part
two of the same chapter the legal regimes under which YouTube functions will be
discussed. The final chapter of this paper will attempt to assess the effectiveness
of the policies employed in the different regimes discussed by using the three
characteristics of copyright rules.
Chapter 1: Cybercrime a new frontier
The new millennium brought a lot of changes both in the social and technological
spheres. The ILoveYou worm and the denial of service attacks on services like
Yahoo, eBay and other websites showed the emergence of a new type of crime –
cybercrime.4 From its early emergence cybercrime has grown exponentially. 1988
1 Hunt 2007 p. 4
2 Sternburg and Schreurs 2013
3 Katyal 2001 p. 1029
4 Katyal 2001 p.1005
5. 5 | P a g e
saw somewhere around six security incidents recorded over a computer. This
number grew to 8000 in 1999. Similar in 2000 the Department of Defence of the
United States confirmed more than 22,000 attacks on their computers.5
Cybercrime is used as an umbrella term which covers all sorts of crimes
committed with a computer. It also refers to the use of a computer to facilitate or
carry out a certain criminal offence. This can in turn be subdivided into two
groups.6
Examples of cybercrimes include anything from Trojan horses to torrenting of
files to financial crimes or the distribution of illegal content like child
pornography.7 A description of some of the forms of cybercrime is needed in
order to get a better understanding their specific characteristics.
The first form is when a computer is the subject of the attack, this group we can
further subdivide into: unauthorized access to computer files and/or programs,
distribution of those files and/or programs, and finally theft of an electronic
identity.8 The most popular ways of committing those crimes is by the use of
viruses, worms, Trojan horses, denial-of-service attacks (DDOS) and logic
bombs.9
A second major group is where the computer is used to facilitate or carry out a
traditional offence. Examples include distribution of child pornography, or
distribution of copyrighted material like songs and movies. Further, a high level of
white-collar crime cases use computers to facilitate their offences.10 Already in
the early 1990s reports sprang up describing computer crime as the main tool of
white-collar criminals.11 In this second grouping computers are used as a tool to
speed up the process of carrying out a traditional offence.12
5 Katyal 2001 p.1005
6 Ibid
7 Ibid p. 1005
8 Ibid p. 1014
9 Ibid p. 1024
10 Ibid p. 1015
11 Ibid p. 1017
12 Ibid p. 1015
6. 6 | P a g e
Part 1: Computers as the target of the offence
We will now turn to the first group where the computer is the target of the
offence. Some brief descriptions of the most popular crimes in that group will be
given. Following which we will turn to the second group where the computer is
used as a tool to commit a traditional crime, where a brief explanation of some of
those crimes will be provided.
1.1 Viruses
First we will mention viruses. A virus is a program that modifies the host
computer software in order to replicate exponentially. Once infected the system
can transfer the virus to other computers either vie internet, direct computer
connection, or even a USB stick. All that is required for the virus to replicate on
other systems is some form of transfer of data. How harmful a virus program is
depends on the inner code of the virus itself.13 A famous example of a virus is the
Melissa virus, which in 1999 infected more than one hundred Fortune 1000
companies.14 The most expensive virus up to date and the most devastating was
MyDoom.15 It caused over $38 billion dollars in damages and in addition created
network openings which allowed attacking computers to be able to access the host
system.16
1.2 Worms
Worms are similar to viruses in that they both self-replicate once placed on a host
system. The distinction in this case is that where viruses require human action in
order to replicate, examples would include downloading a file from an e-mail,
worms require only a computer network and no human activity to self-replicate. A
famous example was the worm created by the Philippines students called the
ILoveYou worm.17 Due to the weak lack of laws concerning cybercrime –
namely, viruses or hacking – the case against the creators of the ILoveYou was
13 Katyal 2001 p.1024
14 Ibid p.1025
15 Haury 2012
16 Ibid 2012
17 Katyal 2001 p. 1025
7. 7 | P a g e
dropped.18 Another famous example is the Morris Worm. Created by a student at
Cornell in 1988 its one of the first worms to ever cause monetary damages
ranging from 10 to 100 million dollars.19
1.3 Logic Bombs
A logic bomb contains a set of instructions which will be executed at a certain
time and under certain conditions.20 Those instructions can be of malicious nature
and can lie hidden either in software or hardware. Furthermore, it can be used as a
tool to facilitate real space attacks, like shutting down a security system for
example.21 Logic bombs don’t necessarily have to be malicious. Examples of
those are trial programs where after a certain period of time the program cannot be
accessed by the user.
1.4 Trojan horses
Trojan horses, on the other hand, come masked as a program which performs a
certain useful function. However, they also contain malicious hidden code. This
code can provide unauthorized access to a computer network from an outside
user, or introduce a malware program to the system.22 A famous example of a
Trojan horse is the Vundo Trojan. Known for downloading files from the host
system and also causing pop-up advertisements and other misbehaviours of the
system to occur.23 Finally. Distributed Denial of Services (DDoS) attacks will be
explained.
1.5 Distributed Denial of Services (DDoS) attacks
These sorts of attacks overwhelm websites which causes them to crash and
disables them to communicate with the legitimate users of the website.24 DDoS
attacks require the perpetrator to obtain unauthorized access to a number of
18 Katyal 2001 p. 1026
19 TheFreeDictionary
20 Zetter 03-21-2013
21 Katyal 2001 p. 1026
22 Ibid p. 1027
23 Symantec. Enterprise
24 Katyal 2001 p. 1028
8. 8 | P a g e
computers creating a network of infected machines. This is done via spreading
malicious software such as the ones mentioned earlier. The network created by the
perpetrator can then be commanded to target a website and flood it with a high
volume of traffic (the information or signals transmitted over a communications
system)25 which can cause the website to go offline. These attacks can be
committed in various ways, two examples of which are sending more connection
requests than the server is built to handle or by sending the target huge amount of
random date which overloads the victim’s bandwidth.26 Bandwidth refers to the
amount of data which can be transmitted over a certain amount of time for digital
devices bandwidth and is measured in bits per second.27
Tracking DDoS attacks has proven difficult due to the huge inflow of infected
computers and the amount of IP spoofing – this entails the perpetrator using
software to impersonate a victim’s computer.28 This is one possible explanation
for the raise in numbers of DDoS attacks. According to the report by the ATLAS
Threat group which concluded that approximately 2000 attacks occur daily.29
DDoS attacks have been the main tool of the infamous hacking group
Anonymous, which in the last few years has brought down websites such as
MasterCard, Bank of America, and Library of Congress, even conducted attacks
on the FBI and the Department of Defence.30
Part 2: Traditional crimes
The second major grouping in cybercrime is when the computer is used as a tool
to facilitate traditional crimes. Examples of this include intellectual property theft,
and financial crimes.
2.1. Copyright Infringements
Cyberspace has also influenced and strongly changed the theft of intellectual
property. The development of technology and the internet has created a platform
25 Merriam-Webster
26 Digital Attack Map
27Webopedia
28 Katyal 2001 p. 1028
29 Digital Attack Map
30 Ribeiro 04-11-2013
9. 9 | P a g e
which is used as a substitute of previous techniques employed by offenders.31
Copying for a cybercriminal costs nothing due to the fact that one only needs to
upload a song/album to the internet where millions of people will have access to it
almost immediately. Compared to traditional counterparts in the 1970s or 80s
where the costs were much higher, due to the need to have a legitimate copy, the
need to buy recording equipment and a tape or cassette on which to record and the
costs in redistributing the illegitimate copies.32 Piracy has caused millions, if not
billions, of dollars to the music industry.33 However, for an offender on the
internet, unlike their counterparts in previous decades, the redistribution does not
normally involve a monetary gain.34
2.2 Child Pornography
Another area influenced by cybercrime is child pornography. Before the digital
age, a person intending to distribute content of this kind would have certain
limitations on the amount of people they can give or sell a copy to. The internet
has offered almost instantaneous access to any information put on it by millions of
people.35 Furthermore, new technological developments have brought down
production costs. This can also influence the way child pornography is made, by
escaping the need to use a real child and turn to digitally generated images.36
Due to the accessibility of cyberspace, and in turn the increase of cybercrime,
which is consequently easy to commit and much of the knowledge needed to
commit it is in the hands of private individuals law approaches to cyberspace will
need to be revised.37 In the following sub-sections some of the problems with
regulating cybercrime will be presented.
31 Katyal 2001 p.1033
32 Ibid p.1033
33 Ibid p.1033
34 Ibid p. 1034
35 Ibid p. 1030
36 Ibid p. 1030
37 Ibid p. 1035
10. 10 | P a g e
Part 3: Problems with regulating cybercrime
The lack of high costs for perpetrators is one factor that can explain the rise of
cybercrime.38 Computers facilitate criminals in evading legal sanctions and
monetary costs as well as social norms. Criminals can commit an offence with
less investment and a lower probability of getting caught as well as with a certain
level of anonymity.39 Increasing the costs of hackers’ software programs and
tools, or certain websites charging an admission fee, can be used as a way to deter
criminal activity.40
The emergence of the personal computer (PC) changed the way perpetrators
approached certain crimes, the PC poses a significant threat to the rule of law.
First computers are a good substitute for man power that is required for the
execution of a certain criminal enterprise. Second, the PC as well as the World
Wide Web (WWW) allow anonymity and secure connections, which are either
difficult or impossible to trace. And finally, due to what has previously been
stated cybercriminals are invisible, and in most cases untraceable. The anonymity
of the WWW can be said to facilitate illegal transactions and allow for an easy
way to evade law enforcement and restrict some of the practices of police, like the
use of informants.41 The availability and accessibility of the internet allows them
to operate remotely as well.42
Cyberspace has, furthermore, merged the borders of private and public
enforcement, by enabling citizens to police the internet and become informants for
official enforcement bodies. This can be seen by the emergence of the Cyber
Angels who patrol the internet for stalkers and child pornography and reports its
findings to the police.43
38 Katyal 2001 p. 1011
39 Ibid p. 1012
40 Ibid p. 1012
41 Ibid p. 1038
42 Ibid p. 1043
43 Ibid p. 1031
11. 11 | P a g e
Cyberspace offers offenders a big international arena where illegal activity can be
committed. This creates a multijurisdictional arena making enforcement of certain
laws difficult or at times virtually impossible.44
Further problems with regulating cybercrime emerge when looking at the dual-use
problem. This refers to the practice where a certain act can be used for both legal
and illegal activities, example of this is encryption.45 Making encryption illegal
would result in losing the positive and legitimate uses of it. Another example
which has already been mention is the use of Logic Bombs which are not
damaging when used in trial programs.
Additionally cybercrime adds another level of parties involved in the offence.
Most of cybercrimes are conducted using the WWW which is accessed using the
Internet Service Providers (ISPs). Creating liability for such third parties can lead
them to develop strategies which can make criminal activity in cyberspace more
costly.46 Furthermore, if third parties and victims are forced to take stronger
precautionary measures, this can diminish the value of the internet and result in a
fragmented internet where only certain trusted users can access specific sites.47
Furthermore, certain problems arise with the definition of cybercrime being the
same as traditional crime. One of these problems is the cost of committing
cybercrime, compared to the cost for committing a traditional offence. In the latter
case, preparation before the beginning of the offence is needed, depending on the
offence, for example bank robbery requires a group of people, fire arms,
knowledge of the building, maybe even a contact on the inside, it can further
involve violence and danger to the health of those involved. Compared to the
cyberspace form of this crime where a person would need a computer with
connection to the WWW. With this we can see that the offences committed in
cyberspace can result in less expensive ways to achieve the same goals as those
sought by traditional crimes.48 This can in turn mean that a new way in
44 Katyal 2001 p. 1030
45 Ibid p. 1008
46 Ibid p. 1008
47 Ibid p. 1008
48 Ibid p. 1007
12. 12 | P a g e
approaching and regulating cybercrime might be required, due to the different
circumstances and conditions of both types of crimes.
Although the new millennium brought new technological advances and new types
of crime which developed at a very quick pace, law did not necessarily follow the
same process of quick development.49 Some academics, who see cybercrime and
the cyberspace as a new area, have already pointed out the need to rethink some of
the existing legal rules and forge them into rules that are suitable for the digital
age.50 On the other hand one can find supporters of the opposite view, namely that
cybercrime should be viewed as traditional crime since the computer is only the
tool used for committing a specific offence.51 It’s not only the slow development
of law and law enforcement with regards to cybercrimes that can be noticed, but
also the slowed development of private industries to protect and secure their
data.52
Chapter 2: Cybercrimes Third parties
This paper is concerned with the effectivity and desirability of policies which
increase the liability of third parties in order to protect against copyrights
infringements. For this purpose we will first introduce the ISP on which this essay
will concentrate. This ISP is known as YouTube. YouTube will be used as a
prime example of the paper due to its high flow of users and also the large amount
of copyright infringements on the website. It has been described as the most
popular video sharing website. The following sections will look into first what an
Internet Service Provider is, following which YouTube will be presented and a
brief description of the legal problems and regimes employed by countries like
Germany, US, France and Italy will be given.
Part 1: Internet Service Providers (ISPs)
The internet and new technological developments have made it easier for a
criminal to embark on a criminal enterprise, with an easy access to millions of
49 Penki 2000
50 Katyal 2001 p. 1005
51 Ibid p. 1006
52 Ibid p. 1020
13. 13 | P a g e
potential victims and with the ability to terminate the action instantaneously.
Further invisibility and anonymity are provided by the internet as a criminal can
conduct his crime through several computers in different countries, which
complicates law enforcement.53 It leads to a need for stronger cooperation
between governments in order to battle cybercrime. However, this is not
guaranteed, and third parties may be more efficient in enforcing rules and
controlling cyberspace.54 Unlike traditional crimes, cybercrimes normally involve
the assistance of a third innocent party, who can have no knowledge of the illegal
activity being committed.55 The most common third party is the Internet Service
Provider (ISP). With the ILoveYou worm, a Philippines ISP was required so that
the worm can spread.56
Internet Service Provider or an ISP is a company which provides the infrastructure
that permits data flow on the internet.57 It allows both personal and business
access to the internet. They can however differ in the services they offer.
Nevertheless all activities are performed online.58 Law is faced with the problem
of encouraging third parties to police and protect cyberspace and battle
cybercrime. However, this has to be achieved in a way that does not undermine
the benefits provided by cyberspace.59 Third parties can secure the internet and
prevent future crime from happening, even if not present at the exact time. Prime
examples of this case are software engineers and programmers who unlike their
counterparts, i.e. cybercriminals, pursue positive goals.60 Furthermore, ISPs can
be encouraged to prevent cybercrimes if subject to legal risks, as the main element
of a cybercrime, ISP, will be present even if there is no perpetrator apprehended.61
Furthermore, third parties like ISPs can chaperone subscribers and monitor their
actions online. A second technique that can be employed by the third parties
53 Katyal 2001 p. 1096
54 Ibid p. 1097
55 Ibid p. 1095
56 Ibid p. 1095
57 Webopedia
58 Ibid
59 Katyal 2001 p. 1102
60 Ibid p. 1095
61 Ibid.p. 1096
14. 14 | P a g e
involved is removing risky subscribers from the network, if no identification is
given (ID, driver’s license or a passport). Third, ISPs or any other third party in
this case can act as a whistleblower and report instances of cybercrime to the
relevant authorities or private parties. Third parties can, also build software and
hardware which constrain its subscribers and restrict certain actions.62
However, the use of these techniques might not always be welcomed. For
example virus scanning software is costly, consumes a lot of memory and at times
can considerably slow down one’s PC. It can further threaten the users’ privacy.63
Nevertheless, the benefits of third party liability cannot be overlooked, as this in
turn can lead to more control on part of the third parties and their users.64
However, if liable this can lead to the removal, for example, of every user for
which the ISP has suspicion of wrongdoing.65
When it comes to online service providers generally their liability is secondary.
Unlike direct liability, which concerns the person engaging in the illegal actions,
secondary liability refers to instances where one is held liable for the
infringements of another.66 There are two ways in establishing secondary liability
– vicarious liability or contributory liability. The latter refers to actions where one
is aware of an infringing activity, and has induced, caused or materially
contributed to the infringing conduct of another. Here that entity can be held liable
for contributory liability.67 While the former refers to the ability and right of one
to supervise the actions of another and these actions coincide with a direct
financial benefit from the exploitation of copyrighted materials can be held liable
according to the vicarious liability doctrine.68
A fear that is shared between the music, movie and many other copyrights
owners, is that due to the speed and accessibility of the internet, an ever growing
number of copyrights infringements can be noticed. With this stated, one can
62 Katyal 2001 p.1098
63 Ibid p. 1099
64 Ibid p. 1099
65 Ibid p. 1099
66 Peguera 2011
67 Ibid
68 Ibid
15. 15 | P a g e
conclude that it would be impractical for copyrights holders to sue every single
individual who infringes their rights by posting a video clip, or anything, without
proper authorization.69 Therefore one can see that liability for websites like
YouTube, if companies like those fail to actively police their cyberspace and
check the materials posted by their users, can be useful.70
1.1 YouTube
YouTube is one of the most extraordinary inventions of the internet, called
“revolutionary” and a “phenomenon”.71 It has further been defined as an “illegal
free-for-all”.72 Launched in December 2005 and within months tens of millions of
people visited the website to view television clips and also post their own clips.73
The success of YouTube to a certain level can be attributed to its user-friendly set
up, which does not require visitors of the website to register and log in in order to
view videos.74 Users can access all videos uploaded to YouTube at any point, this
instantaneity is one of its main virtues.75 In 2006 Google bought YouTube for 1.6
billion dollars.
Following its quick raise to the top, YouTube has turned into an alternative media
which is in place to expose political gaffes, police violence or any abuse of
authority and power, as well as the reality of the surrounding world.76 The
accessibility that YouTube provides has caused the development of a sense of
access entitlement which users of sites like YouTube possess. This can be seen
from the complaints when a video with copyrighted material is brought down, and
at times its immediate upload by a different user.77 YouTube has, furthermore,
contributed to the culture of the clip.78
69 Seidenberg 02-02-2009
70 Ibid
71 Hilderbrand 2007 p. 2
72 Hunt 2007 p. 3
73 Hilderbrand 2007 p.2
74 Ibid p. 3
75 Ibid p. 3
76 Ibid p. 4
77 Ibid p. 4
78 Ibid p. 3
16. 16 | P a g e
1.2. Copyright issues
Although not unknown before the digital era, unauthorized use of copyrighted
works gained significance in the digital era due to the quick distributive force of
the internet.79 Copyrights have served their owners in a number of ways but most
important by creating a number or exclusive rights, including making copies,
distribution of those copies, public performances of the work, or making new
derivate works based on the original.80
Since its creation YouTube has faced multiple copyright infringement cases. The
user generated content on the website can be divided in roughly three categories.
The first includes copied videos from recordings, with no alteration to the footage,
or original songs of famous artists, etc. The second involves appropriated clips
which although including copyrighted works which are used for a different
purpose, like an amateur music video or lip-syncing to popular songs in a
bedroom. And the final category includes original content of the users.81 All three
of the categories are strongly rooted in the YouTube website. The most sought
after with regards to copyright claims is of course the first one. However, one has
to acknowledge that the existence of the other two categories emphasizes the non-
infringing uses of the website.82 Millions of videos with indisputable material
which in no way infringe copyrights are present on YouTube and contribute to the
cultural development of an ever growing community.83 It is estimated, however,
that between 30-60% of the materials posted on YouTube is unauthorized
material. This has sparked an intense process on part of the copyrights holders
who have issued thousands of takedown notices and have filed a number of
lawsuits against YouTube.84
Although different, YouTube is also similar to P2P networks like The Piratebay,
in that that it provides a platform for sharing unauthorized content and its
79 Arewa 2010 p. 5
80 Lohmann 2007 p. 129
81 Hilderbrand 2007 p. 10
82 Ibid p. 10
83 Ibid p. 10
84 Hunt 2007 p. 3
17. 17 | P a g e
redistribution.85 Although it does not directly allow users to download the content
uploaded on it, there are an ever growing number of unauthorized utilities and
websites that allow users to download content from YouTube and store it
offline.86 Furthermore, YouTube self-regulates its uses. An example of this is
disabling videos that are subject to take-down requests from the copyrights
owners.87 Problems arise to the sites ex ante regulation and its reluctance in doing
so, and its hosting of infringing content although possibly possessing knowledge
of such infringement.88 Like P2P websites YouTube has also experienced a
number of copy-cat websites with similar infringing content.89
1.3 YouTube’s Filtering System
YouTube possesses a filtering system which, according to the company itself, has
been described as an advanced set of copyright policies and content management
tools. The Content ID fingerprinting system of YouTube provides both YouTube
and rights holders, with the required knowledge of copyright infringements.90 This
and more tools are available to the parties concerned who are willing to license
their content to YouTube. This was held as evidence of intend to foster
infringement on the website in the case of Arista Records LLC v Lime Group
LCC.91
The “Content ID” and “Video ID” filtering tools allow YouTube to automatically
take down videos which are marked as similar to the original works.92 As a result
of filters like those music songs are taken down automatically, examples of this
can be found when we look at one of the major companies.93 This technology
although being placed to protect copyrights owners, is in turn damaging the works
85 Hilderbrand 2007 p. 10
86 Hunt 2007 p. 6
87 Hilderbrand 2007 p. 11
88 Ibid p. 11
89 Ibid p. 11
90 Sims and Figueira 2010 p. 3
91 Ibid p. 3
92 Leister 2011 p. 12
93 Ibid p. 14
18. 18 | P a g e
of new creators, for which UGC websites have proven to be a breeding ground.94
The following sections will point out some of the most relevant case law
regarding YouTube and its liability and outline some of the legal regimes under
which YouTube operates.
Part 2: Cases and Legal Regimes
2.1 United States
The US has faced the challenges posed by cyberspace and cybercrime with The
Computer fraud and abuse act and art. 1030. This article prohibits certain forms of
unauthorized access to all “protected computers”. According to the article a
protected computer is any computer used to connect to the internet.95 The
provision carries a mandatory minimum sentence of six months if one is convicted
under that article. Further distinctions of cybercrime can be found in State laws
were for example theft, or interruption of a computer services is seen as an
independent offence, same applies to acts of disclosing passwords or other
security information.96 Nevertheless, a problem arises in prosecuting criminals
coming from different states, as well as the difficulty in finding the person
responsible. Turning to the Copyright Act and section 106 one can see that certain
exclusive rights are given to copyrights owners, examples include the right to
reproduce and perform in public. By uploading a video to YouTube users infringe
the copyrights of the owners and namely the right to reproduce. In order for the
video to be accessible on the website YouTube converts it and in order to do this
it has to make a copy of the video, so in turn YouTube can also be held in breach
of section 106(1) of the Copyright Act the right to reproduce.97 Once uploaded,
every time a video is viewed by the users of the website it can be seen as an
infringement of the right to public performance and a possible violation of section
106(4) of the same Act.98
94 Leister 2011 p. 19
95 Katyal 2001 p. 1017
96 Ibid p. 1020
97 Hunt 2007 p. 9
98 Ibid p. 9
19. 19 | P a g e
2.1.1 The Digital Millennium Copyright Act (DMCA)
The Digital Millennium Copyright Act (DMCA) was adopted in 1998 in the US in
order to combat digital piracy. It amended Title 17 concerning copyrights in order
to combat copyright infringements in the digital age.99 The Act offers a series of
safe harbor provisions that limit the liability of third parties who play a passive
role in the transmission, reproduction and storage of illegal files online.100
“Cease and desist” notices have become the main practice to combat copyright
infringements. What has been shown is that if provided with the necessary
information ISP and other third parties would take down videos or websites which
are infringing someone’s copyrights.101 According to the DMCA, service
providers are given some safe harbor provisions to keep them protected from
copyrights infringements committed by their users. In order to be able to rely on
the safe harbor provisions a service has to implement the “notice-and-takedown”
procedure. So long as it complies with such notices the service can escape liability
and monetary damages.102 If a notice-and-takedown procedure is followed the
user which uploaded the video under question has to be promptly informed as to
why his video is offline. The user can respond with a counter notice if they
believes that the content of the video is not infringing.103 Under the DMCA and
the rulings of US courts, it has been established that copyright owners have to
consider the practice of fair use before issuing a takedown notice.104
YouTube has so far been complying with the takedown notices and the provisions
of the DMCA, example of this are in 2006 when YouTube deleted nearly 30 000
videos followed by the deletion of 100 000 videos on the request of Viacom.105 It
has further finalized a number of licensing deals with content owners like
99 Douglas 2012 p.3
100 Peets and Young 2009 p. 2
101 Ibid p. 3
102 Lohmann 2007 p. 130
103 Ibid p. 131
104 Peets and Young 2009 p. 3
105 Hunt 2007 p. 7
20. 20 | P a g e
Universal Music and CBS, it has provided the “Claim Your Content” filtering
system which is created to automatically identify copyright material.106
The lawsuit brought against YouTube by Viacom raised important questions with
regards to secondary liability for third parties copyright infringements.107 Liability
of service providers is still a much contested issue. This issue revolves mainly
around the question of how to treat platforms that have potential for both positive
and infringing uses.108 This is particularly the case with providers of platforms
which use user-generated content as their basis where users can upload vast
amounts of information raging from photographs to movies. Examples of these
include YouTube, Flickr, MySpace and Facebook to name just a few. All of these
providers rely on the safe harbor provisions developed in the DMCA act section
512.109
The DMCA provides certain protections for service providers. One of these can
be found in section 512(c) which provides that a service provider, like YouTube,
will be exempt from all monetary damages against them for infringing content
stored on their servers on the command of their users.110 Turning to contributory
infringement section 512 requires the services providers to be unaware of an
infringing material or activity on their servers, as well as no knowledge of the
circumstances in which infringing activity can occur and finally when provided
such knowledge expeditiously act to remove such material.111 Furthermore section
512(c)(1)(B) states that service providers are forbidden from receiving a financial
benefit that is directly attributed to the infringing activity or material, if the they
possess the technology and software needed to control such activity.112
106 Hunt 2007 p. 4
107 Peguera 2011 p. 2
108 Ibid p. 3
109 Ibid p. 2
110 Ibid p. 6
111 Ibid p. 6
112 Ibid p. 6
21. 21 | P a g e
2.1.2 Betamax case
In the Betamax case, which was the first one concerning secondary liability for
copyrights infringements, the US Supreme Court ruled that where a device is
distributed that enables copyright infringements, and the suppliers have the
potential knowledge of such copyright infringements, they will not be liable for
the infringements committed by the end user as long as the device is “capable of
substantial non-infringing uses”.113 YouTube has been haunted by the rulings that
followed the P2P cases of Napster and Groskster. However, a look to the Betamax
case is needed. In this case the Supreme Court of the US ruled that Sony cannot
be held liable for the way their home recorders are used by their customers.114
Although similar to Napster and Groskster as already mentioned, YouTube also
resembles the Betamax case as YouTube can be seen as a tool, similar to a home
recorder, for which the company, in Betamax Sony and here YouTube, cannot be
held liable for the way it is used by its consumers.115 Unlike the infringements
committed by the creators of Grokster, YouTube does not resemble such
intentional action. As seen YouTube has expressed good faith, and before being
bought by Google was known as a “good corporate citizen”. It has been
responding to take down notices and removing more than hundred thousand
videos with claimed copyright infringement. It has furthermore prevented the
unauthorized upload of already removed copyrighted videos, as well as it has
expressed serious efforts in creating filtering tools to automatically combat
copyright infringements.116 With all of this one can state that YouTube, unlike
Grokster, acts in good faith and falls far from being seen as a contributing to
copyright infringements. With this we can safely state that YouTube fails the
Grokster test for establishing contributory liability for service providers. The test
states that where one distributes a device or service with the object of promoting
copyright infringements and this object can be seen by the expression of actions
113 Peguera 2011 p. 4
114 Hilderbrand 2007 p. 10
115 Ibid p. 10
116 Peguera 2011 p. 9
22. 22 | P a g e
of the provider, he will be liable for the infringement acts committed by third
parties.117
2.1.3 Viacom v YouTube
Two cases were brought against Google and YouTube in 2007 stating that both
platforms had deliberately facilitated massive copyright infringements on the
YouTube website. Furthermore, the people concerned possessed the knowledge
that majority of the content on their website was infringing copyrights.118 In 2007
Viacom, an American global mass media company filed a lawsuit against
YouTube accusing it of illegally broadcasting 79,000 copyrighted videos between
the years 2005 and 2008.119 Viacom owns media networks like Comedy Central,
MTV and Paramount movie studios.120 The cases tested the safe harbor provisions
of the Digital Millennium Copyright Act of 1998. The US District Court of New
York ruled that services like YouTube and Google were entitled to immunity
under the DMCA safe harbor provisions and section 521(c). Following this an
appeal to the 2nd Curcuit Court of Appeals in New York was launched. In April
2013 the presiding judge decided that Google and by reference YouTube were
protected by the DMCA and were under no obligation to monitor the content of
videos being uploaded, which by the year the decision was taken was at a rate of
24 hours of viewing time per minute.121
2.1.4 Io Group Inc v Veoh Networks Inc.
Similar to the Viacom International Inc. v YouTube Inc. case, a less known case
which poses similar questions to intermediary liability for copyright infringements
is Io Group Inc v Veoh Networks Inc. One of the arguments posed by Io with
regards to the liability of Veoh and their inability to rely on the safe harbor
provisions of the DMCA concerned the situation in which a service provider
possessed the knowledge and the ability to control an infringing activity occurring
117 Peguera 2011 p. 8
118 Sims and Figueira 2010 p. 2
119 Stempel 2014
120 Ibid
121 Ibid
23. 23 | P a g e
on their websites, but instead relies on such activities to generate revenue.122 The
court in this case reinforced the safe harbor provisions of the DMCA and stated
that as long as the websites takes appropriate steps to deal with copyright
infringements there will be no liability for those companies.123 However, one of
the arguments that Viacom raised against YouTube is that it was not policing its
system adequately enough. Even though YouTube is in possession of the
technology to combat and possibly remove copyrighted material, which
technology is only employed to protect works of companies that have licensed
some of their materials to YouTube, such as MGM movies, HBO or Sony BMG
music entertainment.124
To conclude, what can be seen from previous cases like Viacom v YouTube,
Betamax and Io Group, service providers are protected under the DMCA act when
it comes to third party copyright infringements
2.2 European Union and the E-Commerce Directive
The Electronic Commerce Directive 2000/31/EC was adopted by the Union states
in the year 2000. It sets up the framework for electronic commerce.125 It provides
rules on issues like limitations of liability of intermediary service providers,
commercial communications, transparence and etc.126 The E-Commerce
Directive, adopted two years after the adoption of the DMCA, governs the
liability of ISPs in Europe.127 Unlike the DMCA the E-Commerce Directive has
provisions which are concerned with both copyright infringements but also with
tortious or criminal activity on the internet.128 The Directive covers services such
as online information, online selling of products and services, entertainment
services.129 Articles 12 to 15 of the E-Commerce Directive deal with the liability
of intermediary parties. Article 14 specifically deals with hosting services, where
122 Seidenberg 02-02-2009
123 Ibid
124 Ibid
125 European Commission
126 Ibid
127 Peets and Young 2009 p. 3
128 Ibid p. 3
129 European Commission
24. 24 | P a g e
the information is stored and unlike articles 12 and 13 it’s not for temporary
storage.130 Article 15 provides for a no general obligation to monitor its servers.
However, the obligation to monitor is not fully blocked by this article as sub-
section 2 of the same article provides for specific obligations on part of
providers.131
2.2.1 France
In two separate 2011 decisions of French courts, it was stated that hosting
providers after receiving notice of infringing content or activity had the duty to
implement all possible measures to take down similar content and to avoid its
future dissemination, the same applied to the company giant Google.132 In its most
important case against YouTube the Intellectual Property Chamber of Paris held a
ruling on 29 May 2012 regarding YouTube’s liability for third party
infringements. According to the court YouTube is under no obligation to check
the content uploaded on its servers for copyright infringements and is furthermore
not required to take new precautionary measures due to the sufficiency of the
already established systems which prevent infringement.133 According to the
French court YouTube can be considered a hosting service provider. Unlike
publishers or editors, who will be primarily liable for infringements, YouTube
will only be held contributory liable for copyrights infringements committed by
its users as it gives access to those infringed works, and only in cases where
YouTube had “actual knowledge” of the infringement.134 Finally the court noted
that the five-day long period it took YouTube to take down the video after being
notified of the infringement was too long, unlike the DMCA provisions.135 The
court stated that YouTube is under no general obligation to preemptively police
and control the content of the uploaded videos. Furthermore, unlike the German
court in Gema v YouTube, the French court stated that YouTube’s alert system
and the warnings its users receive with regards to copyrighted materials is
130 Lodder 2007 p. 22
131 Ibid
132 Sternburg and Schreurs 2013 p. 6
133 Casalonga and Gevorkian 09-2012
134 Ibid
135 Ibid
25. 25 | P a g e
sufficient and no further measures are required on part of YouTube.136 The
German court in turn concluded that YouTube has to install new filters in addition
to the content ID system and keyword filters, which would detect copyright
infringements.137
2.2.2 Italy
In 2009 Reti Televisie Italiane brought a case against YouTube. The Italian Court
held that with regards to copyright infringements YouTube can be held under
contributory liability as it was aware of the illegal content stored on its serves and
it went beyond storing the content as it selectively took down illegal works. The
Italian court stated that “awareness” meant either actual knowledge of the illegal
content or the ability to verify the lawfulness of such content on its website, with
similar tools to the ones YouTube already employs.138
2.3.2 Germany
One of the most prominent examples of the problems YouTube faces with regards
to copyrights can be found in Germany. Since 2010 YouTube has been in a
dispute with GEMA collecting society regarding the royalties YouTube has to pay
to GEMA in order to be able to show the videos for which GEMA owns the
rights. Royalties refers to usage based payment made from one party to another, in
most cases from the user to the creator of the work in question.139
GEMA is a German organization dedicated to controlling the usage of music. It
holds the rights to redistribution and public performances of songs, and in turn
collects money on behalf of the artists for every usage of said songs.140 Relations
between GEMA and YouTube started in 2007 when GEMA was the first
collecting society to enter into agreement with YouTube for the use of
copyrighted works. The agreement however expired in 2009 and the follow-up
negotiations didn’t end well. The amount required by GEMA in order for
136 Casalonga and Gevorkian 09-2012
137 Ibid
138 Ibid
139 Law Dictionary
140 Anhut 2011
26. 26 | P a g e
YouTube to be able to stream its videos would come as a heavy burden on the
business model of Google’s video streaming service. In 2010 GEMA broke off
negotiations and started a case against YouTube. The judgment of this case was
delivered in 2012 where the Hamburg court ruled that YouTube is under legal
responsibility for the content uploaded by its users under the principle of interferer
liability (Störerhaftung). This liability arises when the actor contributes to
infringements, and violates its monitoring duties.141 Furthermore, GEMA required
YouTube to be considered as a content provider and not a technical and neutral
hosting platform, which would increase the liability of the USG website with
regards to copyrighted works which were uploaded unlawfully on their servers.
According to the decision in the case of Gema v Youtube, the USG website must
install filters to prevent users from uploading copyrighted works without the
permission of the artists, or their representatives. A fine of up to 250 000 euro per
song can be imposed on YouTube if future upload of such content occurs.142 The
court has rejected the theory that YouTube as a hosting service provider is not
responsible for the content uploaded by its users.143
The dispute between GEMA and YouTube has hit hard the users of the video
platform.144 According to a study made by OpenDataCity, 53,1% of the top 1000
videos on YouTube are blocked due to possible conflict with the rights held by
GEMA, an additionally 8,4% of videos are blocked for indeed infringing GEMAs
rights.145 The dispute between the two organizations has resulted in hundreds of
music videos of international artists not being available in Germany. Following
the Hamburg Courts decision, YouTube was obliged to take down all videos
which had in any form parts of the 7 copyrighted works owned by GEMA, this in
turn included homemade videos with music on the background.146 Similar issues
to those in Germany have faced YouTube in Britain where it blocked certain
141 GEMA
142 Ahad 2012
143 Ibid
144 Muller 2012
145 Ashraf 2013
146 Muller 2012
27. 27 | P a g e
copyrighted music videos until it resolves its conflict with the Performing Rights
Society for Music.147
What can be concluded from all these cases is that USG websites can be held
liable for infringing content on their sites uploaded by their users after they
acquire actual knowledge of such content. Only the Italian court so far has ruled
that YouTube cannot turn a blind eye on the illegal content stored on its site, and
held that YouTube can be held liable even before the notification from the rights
holder. In turn the German court has ruled for stronger security measures in order
to avoid future infringements.148
Chapter 3: Effectiveness of Copyright policies
UGC websites reflect the technological development and availability of tools that
enable users to share, create, comment and criticize a variety of content. An
important observation is that many UGC websites are more popular than they are
profitable.149 Furthermore, they have been a positive influence on creativity.
Studies have shown that by 2013 more than 115 million of new content creators
would have emerged. On the other hand, UGC websites are becoming the most
common platform to view video content.150 The technological innovations, e.g.
MP3 and other digital formats, have facilitated in the creation, copying and
dissemination of works and effectively reduced the control of the entertainment
industry.151 This rise in turn poses new challenges for both the cultural industry
and the law enforcement with regards to copyrights. Recent years have seen
copyrights infringements lawsuits fought on a couple of fronts. The first one being
litigation against P2P software providers, the second concerned the end users and
finally against the ISPs. However, actions against individual end users have
proven costly and this is why industries support the view that the best policing
will be achieved through the actions of ISPs.152 Litigations of such kind have
influenced liability laws of intermediary parties with regards to copyright
147 PhysOrg
148 Casalonga and Gevorkian 09-2012
149 Arewa 2010 p. 3
150 Ibid p. 3
151Ibid p. 5
152 Giblin 2014 p. 1
28. 28 | P a g e
infringements on the internet.153 However one has to ask the question if policies
which increase the liability of intermediary parties for copyright infringements are
effective and desirable.
Judging the successes and effectiveness of copyrights laws is a difficult process. It
poses the question of what are copyrights laws seeking to achieve. This question
has been the cause of significant debate between both supporters of the natural
rights theory and the utilitarians.154 For utilitarians the most important aspect of
copyrights is the maximizing of creation and dissemination of content, the extent
to which those aims can be considered achieved by infringing acts will only be
relevant if those infringing acts deter future creation of works. While on the other
spectrum we have the natural rights supporters who argue that the only reason
copyrights are present is for the protection of the rights of the authors and creators
of such content, no matter if content like that can achieve broader cultural ends.155
Despite this conflict, three main characteristics of copyrights laws are useful when
trying to identify the effectiveness and success of such policies. The first concerns
to what extent such policies reduce copyright infringements.156 The second
concerns the extent to which such policies maximize the size of the legitimate
market and authorized uses.157 The assumption being that fewer copyright
infringements result in higher revenue for creators.158 The third final
characteristic, the extent to which the creation and dissemination of content is
encouraged by such policies.159
The following sections will look at each one of those aims and the successes or
failures of copyright policies in various jurisdictions.
153 Giblin 2014 p. 1
154 Ibid p. 3
155 Ibid p. 5
156 Ibid p. 3
157 Ibid p. 4
158 Ibid p. 4
159 Ibid p. 6
29. 29 | P a g e
Part 1: Reduction of copyright infringements
First copyright policies are put in place to reduce copyright infringements.
Judging the successes of copyright and liability policies is based on the success in
reducing such infringements. Due to the young nature of UGC websites
comprehensive studies in how far liability policies have managed to reduce
copyright infringements are still not available. This paper will not be able to
conduct such a study however a useful tool for examining this requirement of
copyright policies can be the policy of graduated responses which can provide
some insight into understanding the effectiveness in reducing copyright
infringements and also the future applications of restrictive policies with regards
to third parties. Graduated responses are a type of procedure adopted in certain
countries to combat copyright infringements arising from file sharing on the
internet.160 Users who commit such infringements will first receive a notification
informing them of the illegal activity in question, repeat offenders can face
measures such as bandwidth reduction and finally temporary account
suspension.161 Example of such graduated response can be found in France with
its HADOPI-2 law. Although being one of the prominent examples with its
approach to graduated responses, studies have shown that there exists no clear
evidence linking the decrease in copyright infringements and the copyright policy
France employs with regards to the internet.162
Furthermore, as has already been mentioned, YouTube users tend to upload
videos which have been taken down by the filtering systems of YouTube or
because of a takedown notice from the copyrights holder. With this in mind one
can state that policies which increase the liability of third parties have, to a certain
level, been inadequate in decreasing the amount of future infringements.
Part 2: Maximizing the size of the legitimate market
A second aim of copyright policies is the redirection of traffic from illegal means
to the legitimate market. First we will again look at the application of HADOPI in
160 Giblin 2014 p. 6
161 Klosek and Gubins 09-10-2008
162 Giblin 2014 p. 42
30. 30 | P a g e
France then a summary of a study conducted for Germany and it’s restrictions on
YouTube will be provided.
Turning to France and its application of HADOPI-2 the Lescure Report of May
2013 was examined the application of HADOPI in France and its effectiveness in
redirecting traffic from illegitimate sources to the legitimate market. It concluded
that the law in question did not achieve its aims, namely redirecting the illegal
activity to a legal market but in turn saw a redirection of traffic from one
infringing source to another.163 Two years after the introduction of HADOPI in
France the International Federation of Phonographic Industry (IFPI), an
international organization which represents more than 1300 music companies,164
noted that recorded music market dropped by 2,7% and 2,9% in 2011 and 2012
respectively. This in turn was more than 1% higher compared to the previous two
years.165 Following the statements made by the IFPI and the Lescure Report one
can state that HADOPI, although bringing a reduction in P2P infringements,
merely redirected traffic to other infringing sources and failed in increasing the
legitimate market which was its primary aim.166 Furthermore, a separate study of
2012 identified France as the fifth largest file sharing market.167 France Telecom
has noted an increase in streaming and cyber locker traffic following the
introduction of HADOPI.168.
YouTube has had its own influence on the entertainment market, being the most
dominant video sharing platform. However due to the dispute between GEMA
and YouTube, more than 500 of the top 1000 videos on YouTube are blocked,
while these same videos are available in other countries.169 However, it has to be
noted that promotional effect or free sampling that online music videos provide is
enough to offset sales displacement of songs, even when the recording industry
163 Giblin 2014 p. 6
164 IFPI
165 Giblin 2014 p. 51
166 Ibid p. 51
167 Ibid p. 52
168 Ibid p. 53
169 Kretschmer and Peukert 2014 p. 6
31. 31 | P a g e
has no control over the free sampling of consumers.170 It has been shown that the
availability of YouTube videos has no effect on digital sales of songs, while a
positive influence has been seen with regards to album sales. This means that the
promotional effect YouTube provides outweighs the displacement effect, i.e.
consumers stick to free sampling instead of purchase.171 With these two examples
one can conclude that the policies employed by France and Germany have been
inadequate in redirecting traffic to the legitimate market and have possibly
influenced negatively that market.
Part 3: Encouraging creation and dissemination of content
YouTube allowed people to be creative and share with ease. However, it was
faced by a strong opposition campaign based on protecting copyright owners.
Copyright laws are placed to ensure the future creation and distribution. However,
certain copyright policies have proven inadequate in ensuring that such future
creation and distribution will continue. A clear example of this can be seen from
the case of Lenz v Universal Music Corporation.172 This case concerned the
upload of a simple home video, which featured a music track for which Universal
Music held the rights. The video was flagged by YouTube’s detection system and
Universal Music filed for a takedown notice.173 From this case one can see that
excessive protection measures for copyrights holders can stifle and restrict the
creation of new works.174 While YouTube has emerged as a substitute for the
record industry and produced a number of super stars.175 Policies such as the one
applied by GEMA have been shown to limit the availability of content on
YouTube restricting more than 60% of the top 1000 videos.176 According to one
of the CEO’s of Sony Music restrictive regimes of collecting societies and legal
170 Kretschmer and Peukert 2014 p. 4
171 Ibid p. 28
172 Lenz v. Universal Music Corp. 572 F. Supp. 2d 1150
173 Laura 2011 p. 3
174 Ibid p. 5
175 Kretschmer and Peukert 2014 p. 8
176 Ashraf 2013
32. 32 | P a g e
regimes prevent the economic development and restrict the music industry and in
turn also damage artists and music labels who lose both audience and revenue.177
All of this can be seen as proof that the copyright policies, applied in certain
jurisdictions which have led to automated takedown of videos or just a restriction
on viewing for certain countries, can discourage the creation of new content and
have also failed in encouraging the dissemination of content by blocking videos.
Conclusion:
Liability of ISPs for third party copyright infringements has become a highly
debated topic in recent years. Judging the effectiveness of such copyright policies
is a hard process. Nevertheless, the three main characteristics of copyright
policies, (i)reducing copyright infringements, (ii) increasing the size of the
legitimate market, and (iii) encouraging the creation and dissemination of future
content, provide useful tools with which one can review copyright policies. From
what has been provided in previous sections, we can safely conclude that the
restrictive policies and regimes employed by governments and organizations have
failed in at least one of the three characteristics of copyright policies. Actions of
organizations like GEMA or the HADOPI law employed by France have
restricted the growth of the legitimate market. This has also been noted by CEOs
of big recording industries. Furthermore, automated deletion software has
contributed to the limiting of new content and distribution of old content. With all
of this stated owe can conclude that a new approach for copyright policies is
needed in the digital era. This can also be seen in the recent report by the World
Wide Web Foundation which state that online censorship is increasing.178
Websites like YouTube have become increasingly popular and have contributed to
the creation of new works and the development of a new community. YouTube
has proved that it has significant impact on social and cultural life, using and
recycling existing works facilitates intergenerational transmission, it brings
obscure works to the attention of the public, increase the value of existing works,
and allows for new artists and creators to be more easily discovered.179 Policy
177 TorrentFreak
178 BBC News
179 Arewa 2010
33. 33 | P a g e
makers need to balance the benefits of such platforms before increasing their
liability and restricting the legitimate uses available.
34. 34 | P a g e
Bibliography:
Ahad 2012
Abdul Ahad; ‘German court rules against YouTube in copyright test case’, 2012,
available at: http://www.brecorder.com/arts-a-leisure/50-movies/53982-german-
court-rules-against-youtube-in-copyright-test-case-.pdf (last visited: 15.12.2014)
Arewa 2010
Olufunmilayo B. Arewa; ‘Youtube, UGC, and Digital Music: Competing
Business and Cultural models in the internet age’. Northwestern University Law
Review 104(2), 2010 pp. 432-434
Anhut 2011
Anjin Anhut; ‘Gema v Youtube boundaries’, available at:
http://howtonotsuckatgamedesign.com/wp-content/uploads/anonymous-v-gema-
boundaries.pdf (last visited: 15.12.2014)
Ashraf 2013
Ashraf; 60% of top 1000 YouTube videos are blocked in Germany due to
aggressive copyright laws, according to study’, dotTech, 2013 available at:
http://dottech.org/98282/60-percent-of-top-1000-youtube-videos-are-blocked-in-
germany-due-to-aggressive-copyright-laws-according-to-study/ (last visited:
15.12.2014)
BBC News
BBC News Technology; ‘Net is ‘less free and more unequal’, says web founder’.
Available at: http://www.bbc.com/news/technology-30432487 (last visited:
15.12.2014)
Casalonga and Gevorkian 09-2012
Caroline Casalonga and Ani Gevorkian; ‘The Liability battle over online video-
sharing platforms’, in: Intellectual Property Magazine, 09-2012, available at:
35. 35 | P a g e
http://www.casalonga.com/IMG/pdf/IPM_Sept_2012.pdf (last visited:
15.12.2014)
Digital Attack Map
http://www.digitalattackmap.com/understanding-ddos/ (last visited: 15.12.2014)
Douglas 2012
Nathan Douglas; ‘Online piracy combating theft and censorship in the
Information Age’, Ohio Lawyer 26(9), 2012
European Commission
http://ec.europa.eu/internal_market/e-commerce/directive/index_en.htm (last
visited: 15.12.2014)
The Escapist
http://www.escapistmagazine.com/forums/read/7.293056-New-Bill-Makes-
Illegal-Streaming-A-Felony?page=1 (last visited: 15.12.2014)
TheFreeDictionary
TheFreeDictionary; Top 10 Worst Computer Worms of All Time. Available at:
http://encyclopedia2.thefreedictionary.com/Top+10+Worst+Computer+Worms+o
f+All+Time (last visited: 15.12.2014)
Gardner 09-20-2013
Eriq Gardner; ‘Record Companies Allowed to Pursue Vimeo for Copyright
Infringement’, in: The Hollywood Reporter, 09-20-2013 available at:
http://www.hollywoodreporter.com/thr-esq/record-companies-allowed-pursue-
vimeo-633272 (last visited: 15.12.2014)
GEMA
https://www.gema.de/en/press/popular-subjects/youtube.html (last visited:
15.12.2014)
36. 36 | P a g e
Giblin 2014
Rebecca Giblin; ‘Evaluating Graduated Responses’. Colombia Journal of Law
and Arts 37 (2), 2014 pp. 147-200
Haury 2012
Amanda C. Haury; 10 of the Most Costly Computer Viruses of all time.
Ivenstopedia, 2012 Available at: http://www.investopedia.com/financial-
edge/0512/10-of-the-most-costly-computer-viruses-of-all-time.aspx (Last visited:
15.12.2014)
Hilderbrand 2007
Lucas Hilderbrand; ’Youtube: Where Cultural Memory and Copyright Converge’.
Film Quarterly 61(1), 2007, pp. 48-57
Hunt 2007
Kurt Hunk; ‘Copyright and Youtube: Pirate’s playground or fair use forum?’,
Michigan Telecommunications and Technology Law Review 197(14), 2007, pp.
197-220
IFPI
Available at: http://www.ifpi.org/about.php (last visited: 14.12.2014)
Katyal 2001
Neal Kumar Katyal; ‘Criminal Law in Cyberspace’. University of Pennsylvania
Law Review 149 (3), 2001 pp. 1003 – 1004
Klosek and Gubins 09-10-2008
37. 37 | P a g e
Jacqueline Klosek and Tamar Gubins; ‘United States: Combating Piracy and
protecting Privacy: A European Perspective’ in: Mondaq Connecting Knowledge
and People 09-10-2008 Available at:
http://www.mondaq.com/article.asp?articleid=67534 (last visited: 14.12.2014)
Kretschmer and Peukert 2014
Tobias Kretschmer and Christian Peukert; ‘Video Killed the Radio Star? Online
Music Videos and Digital Music Sales’. Discussion Paper, Centre for Economic
Performance, 2014 pp. 1-28 available at:
http://cep.lse.ac.uk/pubs/download/dp1265.pdf (last visited: 14.12.2014)
Laura 2011
Leister Laura; ‘YouTube and the law: a suppression of creative freedom in the
21st century’. Thurgood Marshall Law Review 37 (1), 2011
Law Dictionary
http://dictionary.law.com/Default.aspx?selected=1870&bold= (last visited:
15.12.2014)
Leister 2011
Laura Leister; ‘Youtube and the law: A suppression of creative freedom in the 21st
Century’, Thurgood Marshall Law Review 37(109), 2011, pp. 109-139
Lenz v Universal Music Corp.
Lenz v. Universal Music Corp. 572 F. Supp. 2d 1150
Lohmann 2007
Fred von Lohmann; ‘Fair Use, Film, and the Advantages of Internet Distribution’,
Cinema Journal 46(2), 2007, pp 128-133
Lodder 2007
Arno R. Lodder; ‘European Union E-Commerce Directive – Article by Article
Comments’, Guide to European Union law on E-Commerce (4), 2007
Merriam-Webster
http://www.merriam-webster.com/dictionary/traffic (last visited: 15.12.2014)
Muller 2012
38. 38 | P a g e
Martin Muller; ‘German Court Ruling against YouTube: “We don’t want to sue,
we want a contract’, In Spiegel, available at:
http://www.spiegel.de/international/business/german-copyright-group-succeeds-
in-case-against-youtube-a-829124.html (last visited 15.12.2014)
Peets and Young 2009
Lisa Peets and Mark Young; ‘Internet Piracy 10 years on. Online Enforcement
and the DMCA’, Landslide 1(4), 2009
Penki 2000
Penki; ‘Philippines drops charges in ILOVEYOU virus case’. Penki, 2000,
Available at: http://www.penki.lt/IT-News/Philippines-drops-charges-in-
ILOVEYOU-virus-case.im?id=18752&f=c (last visited: 15.12.2014)
Peguera 2011
Miquel Pequera; ‘Secondary Liability for Copyright Infringement in the Web 2.0
Environment: Some Reflections on Viacom v. YouTube’. Journal of International
Commercial Law and Technology 6(1), 2011, pp. 18- 27
PhysOrg
http://phys.org/news157806003.html (last visited: 15.12.2014)
Ribeiro 04-11-2013
John Ribeiro; ‘US charges 13 Anonymous members for DDoS attack’, in
PCWorld, 04-11-2013. Available at: http://www.pcworld.com/article/2052360/us-
indicts-13-anonymous-members-for-ddos-attacks.html (last visited: 15.12.2014)
Seidenberg 02-02-2009
Steven Seidenberg; ‘Copyright in the age of YouTube’, in: ABA Journal, 02-02-
2009, available at:
http://www.abajournal.com/magazine/article/copyright_in_the_age_of_youtube/
(last visited: 15.12.2014)
39. 39 | P a g e
Sims and Figueira 2010
Charles Sims and Elizabeth Figueira; ‘YouTube, Google Find Safe Harbour in
New York Court’, Communications Lawyer 27(3), 2010
Stempel 2014
Jonathan Stempel; ‘Google, Viacom stetle landmark YouTube lawsuit’, In:
Reuters, 18-03-2014, Available at: http://www.reuters.com/article/2014/03/18/us-
google-viacom-lawsuit-idUSBREA2H11220140318 (last visited: 15.12.2014)
Sternburg and Schreurs 2013
Ali Sternburg and Matt Schruers; ‘Modernizing Liability Rules to Promote
Internet Trade’, Computer and Communications Industry Association, 2007
Symantec. Enterprise
Symantec.; ‘Trojan.Vundo’, available at:
http://www.symantec.com/security_response/writeup.jsp?docid=2004-112111-
3912-99 (last visited: 15.12.2014)
TorrentFreak
http://torrentfreak.com/sony-music-boss-censored-youtube-videos-cost-us-
millions-120224/ (last visited: 14.12.2014)
https://torrentfreak.com/were-no-rogue-site-putlocker-responds-to-hollywood-
120403/ (last visited: 15.12.2014)
United States Trade Representative 2014
United States Trade Representative; ‘2013 Out-of-cycle Review of Notorious
Markets’, available at: http://www.ustr.gov/sites/default/files/FINAL-
PUBLISHED%202013_Notorious_Markets_List-02122014.pdf (last visited:
15.12.2014)
Webopedia
http://www.webopedia.com/TERM/B/bandwidth.html (last visited: 15.12.2014)
40. 40 | P a g e
http://www.webopedia.com/TERM/O/online_service_provider.html (last visited:
15.12.2014)
http://www.webopedia.com/TERM/I/ISP.html (last visited: 15.12.2014)
Zetter 03-21-2013
Kim Zetter; ‘Logic bobm set off South Korea Cyberattack’, in: Wired, 03-21-
2013. Available at: http://www.wired.com/2013/03/logic-bomb-south-korea-
attack/ (last visited: 15.12.2014)