Pages Menu
Categories Menu

Posted by on Jul 27, 2012 in Intellectual Property, Internet |

Are filtered with five key points that the music industry fight against “piracy”

Breaking down, disrupt, investigate and bring lawsuits to press, these are the five key points with which the will try to react in the years before the illegal downloading of copyrighted content. A confidential internal report from shows the effort to end the “piracy” changing the behavior of the network through a global strategy.

The report dates from April 2012 and signed by the head of network operations of the corporation. A letter of 30 pages which presents the “piracy” as a global problem and a threat today and the future. In the same broken down several sections which include how to act against the torrents sites, the cyberlockers or even what the industry “hopes” of Internet providers to block sites.

The first of these threats is spoken of P2P. According to IFPI , illegal content is divided into two groups. The first, called “content obtained from other users’ computers,” refers to the distribution through P2P focusing its strategy on names yesterday and today as BitTorrent, Gnutella, DirectConnect, eDonkey or Ares.

Among the actions that have already started talking about The Pirate Bay, Demonoid LimeWire or without specifying the direct actions already taken.

The second major group is composed of the cyberlockers. Since IFPI make clear the requirements that must be directly downloaded platforms. Explain that they must act proactively with a filter for the infringing content, should not it be “closed” immediately.

Then enter other threat groups where hackers enter. According to the company, hackers and phishing attacks directly to the email accounts of artists, art by obtaining unauthorized access to pre-releases of albums or themes.

Moreover, within this section is talk of new techniques through fake emails claiming to be from social networks which calls reset passwords being compromised account. Once the artist in question access the link, it forwards the mail to other accounts.

The rise of mobile access and applications is no stranger to the industry. According to IFPI, keeps a close eye on the download of content via mobile data and wireless networks. Not content, such surveillance without specifying speaks of the “problem” now to access an IP address for each subscriber.

Among the highlights mobile architectures Apple and Android, both are constantly being warned about applications that are not like the industry.

Strategy: pressure on advertisers and suppliers

And how to stop infringing sites? IFPI develops a strategy that we have seen in other cases. First speech of advertisers, a strategy which interrupts the flow of income in those sites that request it. The company talks about implementing a system of direct contact with advertisers to bring the financial court also currently have agreements with VISA, Mastercard, PayPal, CTIA, Monitise, Paysafecard and PhonePayPlus.

Secondly it comes to dealing with service providers. As in the case of cyberlockers, is to impose certain rules on ISPs. “Rules” in which s and require providers not to provide Internet access to infringing sites or services and unidentified customers. A system where:

ISPs are required to implement a graduated response system for infringement of P2P users, including warnings to a penalty an effective deterrent.

The report concludes by stressing the importance of cooperation, partnerships and exchange of information between all involved. A “network” ending with the direct contact with police, judges and legal bodies:

Provide training on real-world experiences and problems rather than focusing on theories.

As we see, if one day they will be officially each of the requests for the music industry around the Internet and user behavior, little or nothing of what we now know about privacy exist.

Tags: , ,