SlideShare una empresa de Scribd logo
1 de 17
Burcu S. Bakioğlu [email_address] @PaleFire
Samuel (2001)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Tactical Media Raley (2009)
In lulz we trust!
The  Age  of
Network Society horizontal modes of communication alternative strategies of  resistance circulation (NOT accumulation) Castells (2000), Dyer-Withford (1999), Scott Lash (2002)
Sites of Struggle Piracy Cultures
REGULATION Corruption Criminalization of society Privacy Surveillance Threat to  creativity Lessig (2004), McLeod (2007), Vaidhyananthan (2003)
Operation Payback is a Bitch
 
Operation: Payback is a bitch –  Wikileaks "the future of cyber protests"
 
Outcome : ,[object Object],[object Object],[object Object],[object Object],[object Object]
Significance : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Plan (3 phases set to finish Dec 21 st  2012)
 
Burcu S. Bakioğlu [email_address] @PaleFire

Más contenido relacionado

Destacado

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenJohan Mijs
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieJohan Mijs
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015Johan Mijs
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Johan Mijs
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Johan Mijs
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenJohan Mijs
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside outJohan Mijs
 

Destacado (7)

Kansen voor en door Bibliotheekportalen
Kansen voor en door BibliotheekportalenKansen voor en door Bibliotheekportalen
Kansen voor en door Bibliotheekportalen
 
Bibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatieBibliotheek 2.0 Dagen van de literatuureducatie
Bibliotheek 2.0 Dagen van de literatuureducatie
 
My Discoveries evaluatie 2015
My Discoveries evaluatie 2015My Discoveries evaluatie 2015
My Discoveries evaluatie 2015
 
Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214Opleiding muziekafdeling in digitale tijden 20110214
Opleiding muziekafdeling in digitale tijden 20110214
 
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)Kennismaking met Bibnet en de digitale bibliotheek (rvb)
Kennismaking met Bibnet en de digitale bibliotheek (rvb)
 
Dematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialenDematerialisering van muziekmaterialen
Dematerialisering van muziekmaterialen
 
TTT09 Inside out
TTT09 Inside outTTT09 Inside out
TTT09 Inside out
 

Similar a Hacktivism, Cyberwars, & Copyright Controversies

High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)Rob Jewitt
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065University of Sydney
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summaryeve_psu
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaRob Jewitt
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New MediaTerry Flew
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014iDIALOGHI
 

Similar a Hacktivism, Cyberwars, & Copyright Controversies (20)

STSP Week3
STSP Week3STSP Week3
STSP Week3
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065Global, Mobile Internets lecture - USYD MECO3065
Global, Mobile Internets lecture - USYD MECO3065
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Sc po some-01
Sc po some-01Sc po some-01
Sc po some-01
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
IST 501 Week 11 Video Summary
IST 501 Week 11 Video SummaryIST 501 Week 11 Video Summary
IST 501 Week 11 Video Summary
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Mac301 Global Media Vs New Media
Mac301 Global Media Vs New MediaMac301 Global Media Vs New Media
Mac301 Global Media Vs New Media
 
Polinter11
Polinter11Polinter11
Polinter11
 
Chapter16
Chapter16Chapter16
Chapter16
 
Assessing Implications Of New Media
Assessing Implications Of New MediaAssessing Implications Of New Media
Assessing Implications Of New Media
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Polinter11
Polinter11Polinter11
Polinter11
 

Más de PaleFire

Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual WorldsPaleFire
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismPaleFire
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingPaleFire
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-stylePaleFire
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifePaleFire
 

Más de PaleFire (6)

Test
TestTest
Test
 
Hacktivism in Virtual Worlds
Hacktivism in Virtual WorldsHacktivism in Virtual Worlds
Hacktivism in Virtual Worlds
 
Spectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivismSpectacular Subcultures: From luz to hacktivism
Spectacular Subcultures: From luz to hacktivism
 
Re-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent StorytellingRe-Negotiating Narrative: Emergent Storytelling
Re-Negotiating Narrative: Emergent Storytelling
 
Poaching LG15: ARG-style
Poaching LG15: ARG-stylePoaching LG15: ARG-style
Poaching LG15: ARG-style
 
SLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second LifeSLCC Spectacular Subcultures of Second Life
SLCC Spectacular Subcultures of Second Life
 

Último

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Hacktivism, Cyberwars, & Copyright Controversies

Notas del editor

  1. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  2. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  3. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  4. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.
  5. As operation Payback is a Bitch finished up its second week, things seem to be winding down. For those of us who are unaware of what went down, here’s a recap: The operation is launched by Anonymous against the entertainment companies, in particular MPAA (Motion Picture Association of America) and RIAA (The Recording Industry Association of America) and their legal watchdogs to support bitTorrent sites like The Pirate Bay. Within days, it developed into a cyberwar in which everyone got its share of the pie. The sit down may not be over yet. Anonymous stated that the attacks will continue until they are no longer "angry." Embracing the manifesto “we manifest anarchy,” the organization believes that the industry organizations’ “long outdated traditional views on copyright infringement enforced solely by rich and powerful corporations need to be modified in light of the modern age on the Internet, the Information Age," The manifesto of the aforementioned operation is quite interesting in that it reveals how anarchic behavior may ensue when policies, in this case those that relate to copyright issues, are inadequate to respond to the needs of the contemporary age. Quite interesting that such criticism would be voiced by a group that was born out of the message boards of 4chan infamous for its crass humor and profanity. But at the same time, you don't have to be a genius to see the obvious. In the absence of functional regulators or laws, related parties are ravaging the loot while waving the banner of "doing good." And the manifesto announced by Anonymous, cited in full in Slyck in its entirety, demonstrates this chaos. The relevant section is as follows: “ There have been a massive lobbyist-provoked surge in unfair infringements of personal freedom online, lately. See the Digital Economy Bill in the UK, and “three strikes” legislation in the EU which both threaten to disconnect internet connections based on accusations supplied by the music and movie industries. In the USA, a new bill has been proposed that could allow the USA to force top level registrars such as ICANN and Nominet to shut down websites, all with NO fair trial. Our tactics are inspired by the very people who provoked us, AiPlex Software. A few weeks back they admitted to attacking file sharing sites with DDoS attacks.” The problem, perhaps, is not just the inadequate copyright laws, but also the inability of the industry to adapt itself to the contemporary needs of our culture. In a recent interview with TorrentFreak, Fritz Attaway and Craig Hoffman, the two of the top suits of MPAA, admits that the large part of the problem "is developing new business models that consumers will access legally and find that experience superior to illegal access.“ While the two are optimistic and believe that the industry is doing an excellent job in attaining that goal, the latest events that transpired prove that we have a long way to go. In the meantime, the groups are seeking justice in any way they can and no one is too sure who is the sheriff in town is or even if there is one. As is the case with most cyber-protests, it is not even clear who the victim is. To fight back against the anti-piracy lobby, Anonymous did what it does best: to initiate one of the largest cyberwars to date and, to maintain momentum, says Tom’s Guide, the group sought out more members by sending out flyers and recruiting people through Facebook, Digg, Reddit and other sites and made sure they had access to the tools they needed. Who is on the menu? The aforementioned associations, MPAA and RIAA, The British Phonographic Industry (BPI), The Australian Federation Against Copyright Theft (AFACT), Stichting Bescherming Rechten Entertainment Industrie Nederland (BREIN), ACS:Law, Aiplex, Websheriff, and Dglegal. Ultimately, what happened on the Internet, did not stay on the Internet. The initiative ended up being far more consequential than it initially was thought to be, exposing scams, personal information of hundreds of people, ACS:Law’s dirty laundry, and… well… the names and information of those who illegally downloaded gay porn... or porn... Come on... admit it... we're all one big happy family here ;-P Well, you get the idea. The stench of the mess is so potent that it may require some radical cleaning up that requires more than fining people and putting them into jail. The story starts like this: The Operation Payback was initiated when RIAA had hired AiPlex Software, an India-based company working on behalf of Bollywood studios, who admitted [http://torrentfreak.com/anti-piracy-outfit-threatens-to-dos-uncooperative-torrent-sites-100905/] to using not-so-kosher techniques to fight piracy including launching DDoS attacks. You see, Aiplex is not the first or only company resorting to strategies like this. Seeing that their very own tactics were being used against their beloved p2p sites, Anonymous decided to take the matter into its own hands. And, as they promised, Anonymous took down the Web sites of RIAA, Aiplex, and ACS:Law, the law company that was hired to hunt down the infringers. So they did. The real damage to ACS:Law, however, came after the DDoS attack when, in their haste to put everything in order, they exposed the backup of their confidential files containing the e-mails of its only lawyer, Andrew Crossley, in addition to thousands of personal records that were handed over by ISPs, including Sky, BT and Plusnet. And this information appeared on the website, unencrypted. Ooops, sorry! This unfortunate faux pas led to the company’s gory tactics being revealed to the hacker world who eagerly downloaded all this good information. Apparently, ACS:Law had been extracting money from the alleged infringers by encouraging out-of-court settlements. The firm's confidential (and now not-so-confidential) business plan shows that, while the amount of money demanded in the letters varied depending on the rights holder, the number of letters sent out by the law firm has turned its business into "a numbers game," so the payments of between £300 and £500 quickly added up into a handsome sum. Crossley, whose clients were mostly in the porn industry, came up with what seemed to be the perfect scam: track down BitTorrent infringers, convert their IP addresses into real names, and blast out warning letters threatening litigation if they didn’t cough up some cash. Except that the scheme had its flaws. Unless you are aggressively following the threats, people don’t take you seriously and if you are too aggressive, they bond together and resist collectively (both of which were the case here). Not to mention, the average file-shares don’t have extra of cash laying around to begin with, otherwise they would buy the movie in the first place. On top of this, according to a the same leaked business plan, only a fifth of money collected from damages paid was given to the rights holders, turning the law firm, which keeps 80% before paying ISPs and IP tracking companies, into cash cows And so last week, the Internet witnessed ACS:Law going down in a spectacular fashion. But not before shaking down other companies. Everything seemed to come down like a house of cards. British Telecom (BT), the owner of PlusNet, admitted to sending to ACS:Law unencrypted personal data of 500 users who had been suspected of illegally downloading porn following a court order. But because they sent the data unencrypted (hoping that the unprotected files would be securely stored by ACS:Law), they breached the Data Protection Act, in addition to violating the very same court order they were following because the order had specifically stated that PlusNet should send this data in an encrypted form. The story doesn’t end here. After the collapse of ACS:Law, Gallant MacMillan (another law firm famous for hunting down infringers) rose up to the occasion to take over where ACS:Law has left off… and declared that it will use whatever method necessary to bring down the file-sharers and went to court to subpoena the IP addresses of additional suspected infringers. Seeing what had happened to BT, the ISPs weren't so hot in delivering this information when presented with flimsy proofs. Guess what happened to Gallant MacMillan and its client, the Ministry of Sound? Yup, you guessed it! Their sites went down, though they had a little bit more dignity than ACS:Law when doing so. If you are interested in the details of the entire operation, you can find them here. Already, the data leak is bringing important questions into the limelight, questions that exceeds copyright issues, but also, as you can suspect, verges upon privacy violations. Privacy International lost no time is expressing outrage by the breach and decried it as a “travesty of data security.” The quality of the standards set forth by The Digital Economy Act of England, while deemed to be satisfactory, is questioned as a result of all the dust that Anonymous brought up following its DDoS war. Even if ACS:Law’s evidence (sending warning letters by turning ISP into customer names) would be sufficient under the current regulations, it would still may not be considered as acceptable evidence in court. Privacy International is already seeking legal advice about the possibility of bringing charges against BT for contempt of court. If found guilty, the firm could face a fine of up to half a million pounds if it is found in breach of the Data Protection Act.