Digital Piracy: Difference between revisions
Line 510: | Line 510: | ||
[http://www.siia.net/piracy/default.asp (Software & Other Content) SIAA: Anti-Piracy] | [http://www.siia.net/piracy/default.asp (Software & Other Content) SIAA: Anti-Piracy] | ||
[http://torrentfreak.com/anti-piracy-gang-launches-their-own-video-download-site-to-trap-people/ Anti-Piracy Gang Launches their own Video Download Site to Trap People] | |||
== Pro-Piracy == | == Pro-Piracy == |
Revision as of 09:18, 5 July 2007
Narratives
- Trevor is doing a project for school. Since he is very adept at video mashups, he decides to use clips from different TV shows and movies to assist him with the project. After completing the masterpiece, Trevor is very excited about his work and wants not only his class but also the whole world to see his creation. Due to the fact that long segments of copyrighted material were used in the making of this clip, he decides to post the video onto YouTube with an obscure name to avoid detection and uploads it onto five other video sharing services DailyMotion, Revver, GoFish, MySpace Video, and Facebook Video to act as mirrors. He then embeds the clip onto his blog and uses IM, email, text messaging, and Twitter to spread the word about this update.
Involves the use of the following applications: Adobe Premiere, Audacity, Trillian, Thunderbird
And services: YouTube, Daily Motion, Revver, GoFish, MySpace, Facebook, Textem, and Twitter.
- Questions raised from this scenario:
- What constitutes fair use?
- Do copyright laws impede creativity?
- Trevor and friends are hanging out in his basement on a lazy Sunday afternoon. They just watched a trailer of an upcoming blockbuster film and the whole group is very excited -- they canât wait to get in line to see the first midnight showing. Unfortunately, the filmâs release date is one week away. With nothing else to do, Trevor proposes that he could obtain a copy of the film via a private torrent network whose administrator is a member of an infamous release group. A few of his friends brings up the concern about piracy, but since the group is at Trevorâs house, using Trevor's internet connection, nobody objects -- in fact, a few never realized this was possible. After a quick debate about what to do, soon the majority of the group wants the movie downloaded and burned to discs for everyone to have.
Involves the use of the following applications: Quicktime, uTorrent, PeerGuardian 2, DivX Player, XviD Video Codec, AC3 Audio Codec
And services: <Torrent Website>, <Release Group>
- Questions raised from this scenario:
- Who should be more responsible for the piracy? The release group or the end user?
- How does group mentality play affect piracy?
- After seeing Trevor successfully obtain the movie, one of Trevorâs friends decide to get more movies from a P2P program he installed a while back. After firing the application up, his computer freezes. Not knowing what happened, Trevorâs friend does a simple force reboot and after the restart, everything seems fine. In the background processes, however, the P2P program automatically shared his whole media folder to the rest of the P2P community without telling the user.
Involves the use of the following applications: <P2P Application>
- Questions raised from this scenario:
- If a P2P program automatically shares all the media on a user's computer and the user is accused of copyright infringement, who should take the blame? The P2P company or the end user?
- The tech companies hired by the media industries to track down internet pirates is known for only targeting uploaders, rarely downloaders. Is this technique working?
- Trevor's family live in a fairly large condominium complex. Although all the computers in Trevor's house are connected via an encrypted wireless local area connection, Trevor's laptop has the ability to detect and connect to several other neighbor's wireless routers from the comforts of his bedroom. Since his laptop's wireless card is set connect to the closest router, Trevor often surfs the net & downloads copyrighted media using his neighbor's connection.
Involves the use of the following applications: <Wireless Configuration Utility>
- Questions raised from this scenario:
- A large majority of home wireless routers do not ship with WEP and WPA security turned on, causing many personal networks to be exposed to outside threats. If an outsider uses your wireless connection to facilitate illegal file sharing, what rights do you have as the innocently accused?
Introduction to Piracy
In the simplest terms, piracy is obtaining materials without the proper rights of legal ownership. In a broader sense, piracy can represent a whole range of intellectual and physical robbery. Like what the traditional usage of this term suggests, the theft committed by ruthless sea barbarians in the early 1700s is analogous to the present day methods to wrongfully acquire or distribute copyrighted material. Yes, the recent surge in pirated Pirates of the Caribbean films is, least to say, ironic.
The main driving force behind the argument against piracy centers on the degree of copyright infringement. The creator of a new piece of work has exclusive rights or ownership over all individual products of labor. Exclusive rights include, but are not limited to, distribution, reproduction, the ability to perform and make derivatives of the original. Under United States and most foreign law, copyright infringement is the unauthorized use of any works or materials secured by copyright. Piracy impinges on the copyright ownerâs exclusive rights without a license to do so and thus is considered a form of copyright infringement.
Why are copyrights necessary? Copyrights and the consequences of copyright infringement not only help protect intellectual property and ownership but also benefit society as a whole. By prohibiting duplication of new products and ideas for a designated period of time after creation, these laws prevent third party profiteers from stealing intellectual property and making a living from the hard work of others. Copyrights provide sufficient incentives for individuals to embark on revolutionary research, make their discoveries, and present their own creations without having to worry about ownership issues. These laws promote society's scientific and intellectual progress while piracy works as the counterforce.
Currently, the piracy problem spans many corporate sectors. The MPAA, RIAA, ESA, and SIAA, representing the movie, music, gaming, and software industries respectively, have all taken drastic measures to cope with the repercussions from illegal sharing of their clientsâ copyrighted works. Besides publishing annual damage reports that rave about the millions upon billions of lost profit and issuing pre-litigation notices to known violators, industries have begun collaborating with educational companies to bring piracy awareness into schools.
Although some critics of these so-called âprofit seekingâ businesses frown upon the use of educational programs designed by paid business partners, the piracy-ridden industries are targeting the right demographics. [1] [2] As studies conducted by third party researchers show, up and coming generations of digital natives are more prone than any other age group to experiment with and actually commit piracy. In a 2006 study, L.E.K. consulting group found the typical internet pirate is a male between the ages of 16 and 24. They reported, â44 percent of MPA company losses in the U.S. are attributable to college students.â [3] Growing up in an environment immersed with different technological facets, digital natives confront the copyright issue much earlier in childhood. More and more of our youth are desensitized about piracy and intellectual property rights at younger ages. In a recent PEW study, researchers found that around half of the young students interviewed were not concerned with downloading and sharing of copyrighted content for gratis. Teens who download music online agree, âitâs unrealistic to expect people to self-regulate and avoid free downloading and file-sharing altogether.â [4]
Overview
Technological advancements in years saddling the new millennium brought sweeping changes to the way data is transferred across the world. The rapid increase in the availability and acceptance of broadband internet connections has allowed people from the far reaches of the globe to download large multimedia files at much faster speeds than ever before. Sharing files between computers became easier for the general population to understand. The once dominant UseNets and IRC channels slowly gave way to user-friendly graphical user interface (GUI) peer-to-peer (P2P) programs where anyone can make a simple search to produce desirable results. Emerging technologies such as Wikis and BitTorrent coupled with old tools like email and instant messaging provided additional techniques where information can be transferred from one client to the next. Finally, the adoption of standardized media formats improved the sharing experience as a whole. All of these changes, old and new, provided the foundations for the present day's pervasive illegal distribution of copyrighted material.
Classifications
Since the piracy problem is pertinent across many fields, the definition of this term and possible classifications have been extremely controversial over the years. While members of the justice system used piracy and theft almost interchangeably, people on the other side of the aisle view this practice as a grand exaggeration of reality. To them, it is unfair to compare downloading a song with real life thievery, or in this case, the carnage of 17th century sea "pirates." Even the organizations representing the large media and software industries do not have standard, unified definition for what they are fighting. MPAA defines piracy as "a serious federal offense." As for the different kinds of piracy, MPAA only mentions "internet piracy of movies, DVD copying, illegal sales and theatrical camcording." To the ISAA, "making additional copies, or loading the software onto more than one machine, may violate copyright law and be considered piracy." RIAA defines piracy as "the illegal duplication and distribution of sound recordings." Each organization is representing its respective industry, only showing pertinent consumers mere pieces of the puzzle. A definitive, yet agreeable definition for piracy and an universal way to classify the many faces of this issue are needed.
Piracy can be classified into two categories - digital and physical. Digital piracy is the illegal duplication and distribution of copyrighted content via electronic means. While the usage of online (peer-to-peer) P2P networks is the most pervasive outlet of digital piracy, hosting copyrighted files such as MP3s, movies, and software on web servers, uploading copyrighted media on video sharing sites, and even simpler ways of distribution such as via email or instant messaging are also considered illegal digital piracy. Similar to digital piracy, physical piracy involves the illegal duplication and distribution of works, but in physical form. Digital media can be illegally burned onto mediums such as CDs, DVDs and sold for a fraction of the retail price. Books, newspapers, magazines, course packs, journals, research and reports can also be duplicated in physical form and distributed. In fact, the MPAA reports, for 2005 "62 percent of the $6.1 billion loss result from piracy of hard goods such as DVDs, 38 percent from internet piracy." [5] Physical piracy of media and other forms of content are much more pervasive on a global scale. This method of copyright infringement can be further classified into individual license, corporate to end-user, reseller and distributor violations.
Categorizing piracy by methodology only answers the "how" question. "Why" people pirate can be grouped by a measurement of intentionality. Kids and adults alike have different reasons for why they choose to download from P2P networks or buy counterfeit media. Some, however, are quite unaware of their actions while others are completely oblivious between what is right and wrong. In a recent ZDNet report on UK businesses running Windows, "Microsoft would not put a figure on how much it loses from unintentional piracy, but said that while 85 percent of UK small businesses run Microsoft software, only 15 percent pay for it." [6] All of this, of course, hinges on intentionality. Individuals who are completely aware of their actions are considered director facilitators of digital or physical piracy. From the acquirers of prerelease content, to the online intermediaries, from the distributors to the customers, this group includes people anywhere on the piracy chain. Intentional piracy usually involves some sort of monetary gain at the loss of the copyright holder. Individuals somewhat aware of piracy are usually consumers of counterfeit content. They understand to an extent what they are doing is wrong but choose to go ahead with it for various reasons such as personal enjoyment or curiosity. Educating these indirect facilitators the wrongs of piracy is the recording industries' best chance at curbing this problem. Finally, consumers completely unaware of piracy are usually those who are victims of counterfeit scammers or those whose computer or personal network has been hijacked to illegally contribute copyrighted material.
Origins
In the last millennium, there were only a few landmark innovations affecting the dissemination of media content. Gutenbergâs invention of the printing press in 1450 allowed for easy and inexpensive duplication of paper works. With the assistance of moveable type, productivity of scribes (now hired machine workers) increased exponentially. As profit margins shot through the roof, the publishing industry was born. In the late 1970s, early 1980s, the introduction of the Sony Walkman gave humans the capability to record audio while the videocassette system did the same for video. In the 1990s, the popularization of CD/DVD optical disk technology gave birth to the new era of digital recording. The 21st century ushered in the acceptance of new digital mediums. Combined with the enormous success of the internet, computers and newly developed network protocols took information sharing to a new level. Each one of these new "machines" included a "mechanism" for which a certain "media" was affected. Each innovation established or revolutionized an industry. Each provided a faster, even better way to spread information. Each, however, brought with it intellectual property issues, for each forced or is forcing policy makers to amend copyright standards.
Media | Mechanism | Machine |
---|---|---|
Paper | Movable Type Publishing | Printing Press |
Cassette/VHS Tape | Magnetic Recording | Walkman/VHS Machine |
CD/DVD | Optical Disk Recording | CD/DVD Recorder |
Standardized Computer Files | P2P/Torrent Networks | Personal Computer |
On June 1st, 1999, Shawn Fanning, a student from Northeastern University, released what would be called "the godfather of peer to peer programs" â Napster. At that time, although there were other technologies facilitating the sharing of media, "Napster specialized exclusively in music ... and presented a user-friendly interface." [7] Soon after being launched, this easy to use, cost-free program became wildly popular because everyday computer users had enough basic technical knowledge to contribute to the file sharing movement. Napster's sensation, however, was short lived. Its "facilitation of transferring copyrighted material raised the ire of the Recording Industry Association of America (RIAA), which almost immediately â in December 1999 â filed a lawsuit against the popular service." [8] Because Fanning earned profits through advertisements and operated the project via a client-server protocol with a centralized file list, the RIAA push for intentional copyright infringement ultimately succeeded.
Napster's immense success planted the seed for today's P2P debacle. On one hand, this innovation sparked the countermovement by the RIAA and other recording companies to curtail infringement. On the other hand, Fanning's concept of dedicated media distribution GUI programs inspired next generations of P2P coders to create iterations of the Napster design even more insusceptible to the current copyright laws. The 1986 "Betamax case" allowed Sony to manufacture VCRs "because the devices were sold for legitimate purposes and had substantial non-infringing uses" (Betamax). In the cases brought up against these new P2P projects, even though the prosecution was successful in proving the Betamax argument invalid, the victory in the courtroom only fueled the rapid spawning of new P2P projects.
In March 2001, the FastTrack protocol allowed for a more distributed network without a centralized sever. Faster computers in the network now has the ability to become supernodes, or machines with server-like capabilities to help out slower clients. Newer P2P programs like KaZaa, Grokster, and iMesh successfully implemented this protocol and gained millions of users. Two years later, "FastTrack was the most popular file sharing network, being mainly used for the exchange of music mp3 files. Popular features of FastTrack are the ability to resume interrupted downloads and to simultaneously download segments of one file from multiple peers." [9] During the same decade, true distributed network protocols such as the open source Gnutella and eDonkey 2000 also caught on with mainstream P2P file sharers. Likewise spawning other P2P clients, Limewire, Morpheus, and eDonkey. Compared to Napster, these newer networks were able to attain higher maximum speeds because every client also had the capability to share files. Also, since the copyrighted material were stored on individual computers, with the proper disclaimers, the P2P client companies were able to brush off the majority of legal accusations.
The acceptance of the mp3 format in the mid 1990s allowed users to compress songs into several megabyte files, all of which were easily distributable throughout the digital world. In the early 2000s, DivX, a newly developed video compression codec did the same for video. As more households switched over to broadband internet, the ability to transfer large files finally became plausible. However, even with DivXâs help, typical compressed DVD rips still hovered above 600 MB. Since traditional P2P protocols could not handle the new bandwidth demand efficiently, a newer distributive protocol called BitTorrent was quickly adopted.
BitTorrent was developed by Bram Cohen in 2001. By splitting large files into sizable pieces, data can be widely distributed and shared "without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources." [10] For a client to download additional data, one must supply requested chunks of the larger file to newer recipients. Cohen's implementation not only proved to be incredibly efficient, but also managed to exploit a legal loophole. While the initial releases of the BitTorrent system depended on trackers to operate, these servers answered the requests clients only by giving them the location of other computers who are concurrently sharing the same sought after file. Since tracker servers did not host any of the copyrighted content, the prosecution had a harder time shutting down these organizations. BitTorrent soon grew to become the sharing mechanism of choice.
Digital piracy only constitutes a portion of the whole picture. True, today's extensive counterfeit CD/DVD markets are largely fueled by the established presence of piracy in the digital realm. Resellers and distributors usually get the content to copy from online sources. But, the history of physical piracy can be traced back to the days of floppy disks and cassette tapes. In 1964, the Philips company brought compact audio cassette technology to the United States. Although there were other magnetic cartridge technologies available, Philip's decision to license the format for free made compact cassettes the most accepted recording medium during this time. [11] In the 1970s and 1980s, cheaper multi-track recording mechanisms for artists and the consumer compact cassette boom prolonged the popularity of this new medium. The trading of these recordable cassettes among music fans across the U.S. and U.K. via the mail was dubbed "cassette culture." [12] Acceptance of floppy disk technology starting from the early 1980s provided users an easy way to copy computer related files. Copyrighted computer software and games especially could be easily duplicated using these disks. Of course, anti-piracy campaigns also started as a reaction to these new fads. The British Phonographic Industry, a music trade group in the 1980s, launched an anti-piracy campaign with the slogan "Home Taping Is Killing Music." Similar to the RIAA's concerns today, the BPI was afraid that the rise of a new recording medium (in their case, the cassette tapes) would hurt legitimate record sales. In 1992, the Software Publishers Association produced an anti-piracy campaign centered around a video commercial called "Don't Copy That Floppy." [13]
Current Methodologies
Advent of the internet and the rapid increase of personal computers means more people than ever before have the capability to share information online. Though these advancements give users unprecedented access to the world's data, enforcing proper copyright restrictions while allowing justifiable sharing freedoms have not been attained. Thus, many have pointed to these new technologies as the facilitators of so-called "digital piracy." Today, users employ many different applications and services to illegally transfer copyrighted material. Factoring intentionality out of the equation, this section aims to introduce these online trade tools.
Local sources
Highlights: Live Messenger, E-mail, YouSendIt, MyTunes
The easiest and often times fastest way a person obtains copyrighted materials is from local, direct sources. Friends, family members, classmates -- an individual's immediate relations are commonly the people one asks when in need of a song, copy of a TV show, or a recent movie. Popular chat software like Microsoft's Live Messenger, AOL's IM, even Yahoo Messenger all support some form of a file transferring mechanism allowing these exchanges to happen. A few clicks and a potentially copyrighted file is on its way. Thanks to the recent milestones in the email industry, ever increasing account quotas and attachment size restrictions removed the barriers for sending decent sized files via traditional email. As of June 2007, popular services like Google's GMail and Windows Live Hotmail offer 2 GB of free space. Yahoo Mail even went as far as offering unlimited storage. [14] For larger files such as bundled music albums and films that exceed the maximum attachment caps, users turn to dedicated file uploading services like YouSendIt. After the file is uploaded, a notification is sent to the intended recipient with a retrieval URL. Recently, programs like MyTunes managed exploit sharing capabilities of the widely used music player iTunes, allowing users on the same local network to share their music libraries. All in all, in these proposed cases, the user is obtaining material from known, local sources on an personal basis via the internet.
P2P networks
Highlights: Kazaa, eMule, LimeWire, the original Napster
Peer-to-peer (P2P) networks comprise of computers across the internet linked together with special file sharing protocols implemented by different P2P programs. Popular protocols vary by two qualities: centralization and structure. Centralized P2P network protocols, like one used by the first version of Napster, rely on dedicated severs to record client information and store pieces of the shared data. Newer, decentralized P2P networks like FastTrack (used by popular P2P programs like KaZaa and Grokster) depend on individual clients to relay information; each computer on the network can act both as the sender and receiver of traffic. The way in which computers are connected inside of a P2P network determines its structure. When a client joins unstructured network, the computer only has access to files shared by known sources, barring access from the rest of the computers. Trying to locate a rare file is a lot harder because of the connection limitations. Structured P2P networks have streamlined methodologies for unique searches. Using technologies like distributed hash tables (DHT), it is incredibly efficient to find a file on the other side of the web. The beauty of P2P protocols and client/server networks relies on its user base. The combined processing power and bandwidth capabilities of these networked computers provide unprecedented levels of digital resources. With enough contributers, people can easily find and quickly download every piece of digitized work ever made.
The original Napster was the first P2P program to achieve mainstream status. In 2001, the final ruling of the case A&M Records, Inc. v. Napster, Inc. found this file sharing giant liable for illegal "contributory infringement of plaintiff record company's copyrights." [15] Even though Napster was consider a P2P program, it worked in a far more centralized way. The A&M Records' lawyers had incontestable evidence showing the defendant's role in facilitating copyright infringement, for clients depended on servers to talked to other clients. After Napster's demise, other P2P applications using newer, more efficient P2P protocols found their place in this industry. Popular programs like KaZaa (FastTrack protocol), eMule (eMule 2000 protocol), Limewire (Gnutella protocol) employed more decentralized and more structured ways of data exchange. These iterations of the original design, thus in a sense, are considered true peer-to-peer technologies.
Torrent networks: Torrent indexers, trackers & clients
Highlights: ThePirateBay, MiniNova, µTorrent, Azureus
The Torrent network is another file sharing alternative. BitTorrent was developed by programmer Bram Cohen during the summer of 2001. [16] The main quality that sets BitTorrent apart from other P2P technologies is its ability to efficiently transfer huge amounts of data quickly and efficiently. When a user downloads something via traditional P2P means, most of the data usually comes from a couple of individuals who are sharing the same completed file. Unlike KaZaa, eMule, and LimeWire, all data on the torrent network are broken up into small pieces and simultaneously shared by huge pools of users. Each individual's Torrent client has the ability to connect to hundreds of other clients who are sharing pieces of the same sought after file. The relationship between clients are symbiotic. In order for computers to download pieces of a file, they too have to share similar pieces with other computers. This forced reciprocity and piece-wise sharing technique provides noticeable boosts productivity and speed. A 2004 report from CacheLogic claimed "Online movie trading is skyrocketing, but onetime leader Kazaa is tumbling in use" Andrew Parker, CacheLogic's founder and chief technology officer said, "The overall level of file sharing has increased. Users have migrated from Kazaa onto BitTorrent." [17] Because computer users are increasingly downloading larger files like movies and software, in the first few years of this decade, P2P traffic on the internet surpassed all other types of data. [18]
There are three integral components of the Torrent system; each provides a specific function that is uniquely independent of the others. Torrent indexers like ThePiracyBay and Mininova stores databases full of ".torrent" files which contain the locations of torrent trackers. These tracker servers help client computers loaded with compatible torrent programs like µTorrent and Azureus connect with other candidates from all across the web. Clients act as individual nodes on the network; their main job is to communicate with other clients to trade copied pieces of the requested file until all the pieces are downloaded. An user commences a download by loading a small ".torrent" file retrieved from a torrent index site into the torrent client. The client then communicates to the given server(s) and retrieves a list of IP addresses where pieces of the same file are being hosted. In case a server is down or not responding, clients also have the ability to use DHT (Distributed Hash Table) and PE (Peer Exchange) technology to find the locations of other clients without the assistance of trackers.
Warez networks
Highlights: Astalavista.box.sk, Cracks.ms
Warez is a common technical slang that stands for a broad spectrum of online counterfeit content. Underground organizations called "release groups" operate on a minute by minute basis in constant search for pre-released music albums and features film to push on the web. In a 2005 Wired Magazine article, Erik Malinowski describes the five step "trickle-down file-sharing" system - which includes the insider, the packager, the distributor, the couriers, and the public. According to Malinowski, the piracy chain starts with an individual who has early access to a pre-released copy of an album, film, or computer program. Individuals in these release groups usually have multiple insider connections at any given time. After the initial
Besides
FTP and web servers
Web mediums: Media aggregators & sharing websites
Highlights: Tv-Links.co.uk, PeekVid, YouTube, Veoh
The YouTube effect: HTTP traffic now eclipses P2P, 2007
"In the Internet traffic race, P2P used to be way out in front. For years, P2P traffic eclipsed HTTP traffic as broadband users slurped down music and movies, some of which were actually legal. But P2P fell behind this year; for the first time in four years, HTTP traffic is out in front."
"Chalk it up to YouTube and other Internet video sharing sites. The surge in HTTP traffic is largely a surge in the use of streaming media, mostly video."
"Breaking down the HTTP traffic, Ellacoya says that only 45 percent is used to pull down traditional web pages with text and images. The rest is mostly made up of streaming video (36 percent) and streaming audio (five percent). YouTube alone has grown so big that it now accounts for 20 percent of all HTTP traffic, or more than half of all HTTP streaming video."
Before the popularization of digital formats and the increased accessibility of the internet, illegal distribution of physical copyrighted material was the prevalent form of piracy.
Individual license violation
(no profit margin, software & media)
- Installing software on multiple computers, overusing licenses
- Exploiting upgrade options
- Using academic or other non-retail software for commercial purposes
- Copying licensed software or locked media
- Distributing / sharing copied content with immediate relations
- Camcorder recording
Corporate to end-user
(improves profit margin, mainly software)
- Installing software on multiple computers, overusing licenses
- Client-server overuse
- Hard disk loading
Reseller and distributor
(pure profit, software & media)
- Selling copied or counterfeit software for a reduced price
- Street vendors & illegal stores
- Online distribution of software via mail (direct resell, auctions)
- Unlicensed movie theaters & rental facilities
Over a period of 18 months, LEK surveyed 20,600 movie consumers from 22 countries and found "62 percent of the $6.1 billion loss result from piracy of hard goods such as DVDs, 38 percent from internet piracy." [20]
By understanding methodologies and motivations behind these commonly used utilities, we can have a better understanding of piracy as plays out in the lives of digital natives.
Piracy & Law
The chain reaction that instigated copyright regulations dates back to the fifteenth century. Gutenbergâs printing press marked the beginning of a new era of information distribution. True, this device facilitated the mass production and dissemination of human knowledge; however, it also carried repercussions. The formerly tedious task of duplication by hand was sped up to a rate that warranted tighter controls. When this technology arrived in England, the "need for protection of printed works was inevitable." [21] In 1710, the English Parliament passed the first official law concerning copyrights. The Statue of Anne "established the principles of authorsâ ownership of copyright and a fixed term of protection of copyrighted works." [22] Almost three hundred years have elapsed since this passing of this statue. Although some ideological remnants still remain, todayâs US copyright law "has been revised to broaden the scope of copyright, to change the term of copyright protection, and to address new technologies." [23]
Present day US copyright regulations stemmed from the first days of nationhood. When Americaâs founding fathers composed the United States Constitution in 1787, they gave Congress the power "to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries." [24] This line of text in Article I, section 8 bestowed upon the State fundamental rights to a monopoly over the copyright industry. It was the governmentâs job to asset, distribute, and control all copyrights. "The First Congress implemented the copyright provision of the U.S. Constitution in 1790," modeled quite similarly to the Statue of Anne. [25] Since then there had been three major revisions which occurred in the years 1870, 1909, and 1976.
With arrival of the digital age, Congress amended the copyright act to "prohibit commercial lending of computer software" in 1990. [26] This revision did not solve all the problems, for technology was evolving at a rapid pace. Computer savvy individuals were finding ways to bypass government copyright regulations. For example, under copyright laws up to the No Electronic Theft (NET) Act of 1997, people who intentionally distributed copyrighted software without receiving monetary benefits could not be prosecuted. The NET Act amended this loophole. [27] Following NET, 1998 was also a big year for copyright in the technological realm. The â98 Digital Millennium Copyright Act (DMCA) laid the foundations for RIAAâs cases half a decade down the line. Besides making "it a crime to circumvent anti-piracy measures built into most commercial software," the DMCA most importantly "limits internet service providers from copyright infringement liability for simply transmitting information over the internet." [28] Known as the "safe harbor provision," DMCA Title II (OCILLA) creates a "safe harbor" for internet service providers (ISPs) from being liable for content stored or transmitted via their servers as long as they take swift steps to remove the copyrighted content when asked. This Online Copyright Infringement Liability Limitation Act also gave plaintiffs the right to subpoena user information from the ISPs to carry out individual lawsuits.
As of January 2007, there are two portions of the United States code detailing domestic copyright regulations. USC Title 17 provides a comprehensive breakdown of every copyright guideline while section 2319 of Title 18 lists possible consequences for criminal infringement of a copyright. Under these laws, not everything conceived by the mind is eligible for copyright. According to chapter 1 section 102 of Title 18, the United States copyright law protects "original works of authorship fixed in any tangible medium of express." [29] This includes "literary, musical, dramatic works, pantomimes, choreographic, pictorial, graphic, sculptural works, motion pictures and other audiovisual works, sound recordings, and architectural works." [30] Ideas, not yet formulated on such "tangible mediums," thus, do not qualify. When a work is classified as copyrighted, section 106 of chapter 1 gives only the proper owner of the work the rights to reproduce, prepare derivate works, distribute, publicly perform, and publicly display the creation. In addition, these exclusive rights must be granted by the owner in order for third parties to use the copyrighted material.
When one or more exclusive rights such as the ones listed above have been breeched by an individual or a corporation, this respective party is considered to have committed a "copyright infringement." Although there are limitations to the power of these exclusive rights, such as cases where the violation has been deemed legitimate under the four conditions of "fair use" or other exceptions for special educational organizations, in most cases where the copyrighted content has been duplicated and/or distributed without the prior consent from the owner, infringement most likely occurred.
Consequences for infringement vary from case to case. The prosecution may choose to sue for measures at its discretion; however, the US Code does outline maximum and minimum sentences for different scenarios. Section 504 for Title 17 allows for the plaintiff to charge the defendant for actual and statutory monetary damages. Detailed evidence proving losses directly linked with the case is needed to recover actual monetary damages. As for statutory damages, the allowable compensation range from $200 to $150,000 per each infringed copyrighted work. If the prosecution can further prove that the defendant has used the copyrighted material either "for purposes of commercial advantage or private financial gain" or have reproduced or distributed content "which have a total value of more than $1,000," criminal charges found in section 2319 of Title 18 may apply. According to this section of US Code, if the defendant has been found in violation of copyright for personal financial gain, the maximum sentence is 5 years imprisonment for the first offense. Similar subsequent offenses carry 10 years imprisonment per offense. If the defendant has been found in violation of copyright for which the content had a total value more than $1,000, the maximum penalty is 3 years imprisonment for the first offense and 6 years for each additional offense in the future. These criminal charges are additions to monetary damages incurred from section 504 and even possible attorney fees of the plaintiffâs party from section 505 of Title 17.
Fair Use
Frequently Asked Questions (and Answers) about Copyright and Fair Use
Piracy Among Digital Natives
Reasons for Piracy
- Saving time & money
- Digital natives are used to having immediate access to digital media. They aren't familiar with having to go to a record store and buy the latest CD or even having to record on a VCR a favorite show -- they can get the materials almost as quickly as they come out.
- Supply & demand + youth popularity
- Method of self expression
- Curiosity & standing trends
- Weak repercussions
- Online disinhibition effect
- Anonymity
Online Piracy: The Ultimate Generation Gap, 2003
Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Swapping Networks
Piracy & Tech Culture
Newly developed technologies of the last decade are giving users unprecedented freedom and control over media. Since embracing novel technologies and keeping current with the latest trends are crucial to the cultural standard of digital natives, such innovations provided the foundations for today's piracy.
- Software innovations
- Fast, efficient transfer protocols
- User friendly file sharing applications
- Online advertisement system
- Software communications boom
- Hardware innovations
- The personal computer
- MP3 players
- Portable multimedia players
- Storage medium technologies
- "Hardware synergy"
At heart, below the layers of accessories and fancy gadgets, the youth generation of today are not so different from the previous generations. Your typical teenager has a rebellious streak. Such teenage mentality drives counter-mainstream adult ideologies, which incites piracy.
Repercussions
For those who download through peer-to-peer (P2P) networks, the MPAA and RIAA have brought up the many potential risks one faces when accessing these servers. In the parental resources section of the MPAA website, the organization warns about four dangers of P2P programs: âSubject users to pornography, open personal files on your home computer to strangers online, increase the risk of a computer virus, lure kids into illegally downloading movies and music, which can lead to jail time and finesâ [31].
The first three concerns the MPAA notes are typical risks users face when acquiring content through such systems. Many online hackers exploit the P2P search system for monetary gains. By analyzing the trends of high demand movies or music, these profiteers simply manipulate the file names of the viruses and malware they want to spread to match the names of popular song artists and movie titles. Average users who are unaware of these tactics often times are gullible enough to execute these masked programs without realizing the fileâs identity. Even the ever-popular P2P software Limewire admits to the existence of viruses and other harmful material on their networks. In its online FAQ, the programmers warn Limewireâs users, âif you attempt to download a virus-infected file using LimeWire, you will be vulnerable to any viruses contained in that fileâ [32].
In addition to harmful materials one can download, many of these free P2P programs are packaged with third party spyware programs that will slowly but surely retard the speed and reliability of a computer. Like the infamous AOL installation back in the day, a handful of these shareware clients come bundled with various harmful third party applications. By means of a deceptive installation wizard or simply packing other software with the executable, oblivious individuals get much more than what they originally wanted.
Finally, users face the possibility of legal consequences due to copyright infringement. Since most P2P search requests will pull up media across the whole copyright spectrum, the MPAA does not want children to get the impression certain copyrighted content can be acquired without charge. The legal consequences does not discriminate by age. From a warning to a petty fine of $200 to $150,000 and 5 years in jail, the potential cost of piracy is very real [33].
Solutions
Eliminating piracy in the foreseeable future is a next to impossible task. There will always be people seeking ways to circumvent laws for a variety of reasons. There is hope, however. Even though wiping out piracy is not feasible, reducing this theft of digital material can be accomplished.
Raising Awareness
- Getting the message across to the new generations of Digital Natives
It is human nature to want to fit in with the rest of the populace. For example, if the majority of Trevorâs peers does not condone or commit piracy, it is highly unlikely Trevor will spend Friday nights at home downloading the latest blockbuster for he will be at the movie theatre watching the film with his friends. Thus, it is necessary to embed piracyâs immoral ideologies as early as possible in the heads of rising digital natives.
Although the representatives of the entertainment industry are currently pushing massive anti-piracy educational campaigns onto the public sphere, their efforts are not enough. The facts about piracy need to be incorporated into public school curriculums across the country. High school government classes should stress the consequences of copyright infringement. Parents should take part in addressing the dangers of piracy before they teach their children how to use computers. With a solid piracy awareness educational program in place, next generations of internet users will be ready to make rational and informed decisions about electronic theft.
- Programs in place for kids in secondary schools
- Programs in place for college students
- Other information sources
- Opposing viewpoints
Improve Business Strategies
Steps the software, entertainment, and gaming industries can take to adapt to the stubborn mindsets of digital natives.
- Adapting to the new digital environment
- Embrace the inevitable online music movement
- Develop better technologies to aid sales
- Providing legal, more attractive alternatives
- Reduce material costs of current physical albums
- Renew incentives to collect
- Good examples
- Apple iTunes Music Store
- The New Naspter
- BitTorrent and MPAA Join Forces [34]
The main incentive to obtain pirated files instead of purchasing them from a legitimate seller is because of the undesirable high prices of genuine media. In a study conducted by the RIAA, the consumer prices of producing a CD nearly rose 60% between the years of 1983 and 1996. Fortunately, the price of blank CDs fell 40% during this period, otherwise âaverage retail price of a CD in 1996 would have been $33.86 instead of $12.75â [35]. The RIAA notes because âthe amount of music provided on a typical CD has increased substantially, along with higher quality in terms of fidelity, durability, ease of use, and range of choices,â not to mention todayâs insanely over the top marketing strategies, the prices of production has been consistently on the rise.
This price trend also is occurring in the DVD sales industry. With the DVD player penetration rate in American households up from 23.6% in 2001 to 76.2% in 2005, DVDs are definitely on demand [36]. The average price of a DVD title, however, rose from $20.52 to $21.35 from 2001 to 2005 while the price of blank DVDs were falling lower and lower [37]. Consumers who are always hunting for deals turn to free P2P services or cheaper pirated versions of media because the real stuff is simply too expensive.
Adjust Policies & Enforcement Techniques
- Creating new policies that clarifies digital fair use
- Setting the examples (for the prosecution)
The RIAA announced in July 2003 its intent to start gathering evidence in order to sue end users for illegally downloading copyrighted content via file sharing networks. Several months later, the big day finally came. On September 8th, 2003, the RIAA issued the first 261 lawsuits in what was to become an onslaught of charges. By May of 2006, newspapers have reported "the RIAA had sued more than 182,000 individuals for illegal downloading of music." [40] Although there were several cases that were fought extensively by the defendants, on average, each suit was settled for around $3000. The Motion Pictures Association of America, an organization that serves "as the voice and advocate of the American motion picture, home video and television industries," was not far behind in its user litigation endeavor. [41] Around one year after the RIAA's announcement, the newly appointed CEO of MPAA, Dan Glickman, declared at a UCLA press conference that "the studios will begin suing online movie swappers in the next few weeks." [42] Commenting on the recording industry's pursuit of piracy, Glickman told USA Today - "we wanted to watch their progress first and have some time to evaluate options. In the short term, it caused them some problems, but long term they were helped greatly by the campaign."
Problems? Since the day the RIAA initiated its first wave of copyright infringement suits, there have been many complaints voiced by analysts over the practice of suing loyal consumers. Wharton legal studies professor Richard Shell proclaimed that the RIAA "has gone one step too far with its latest legal move. Industries have a completely different strategic relationship with customers than they do with rivals. And this sort of strategy does not play well in the court of public opinion." The questionable effectiveness of this controversial business strategy was hyped to an even higher level when some targets of the RIAA became simply ridiculous. Curious media networks, always hungry for another eye catching story, had a field day when people like Sarah Ward received her lawsuit in the mail. For some odd reason, Ward, a grandmother residing in Massachusetts was charged for downloading "hard-core rap music." [43] It turns out this wasn't the only obscure case, given that little girls and old grandpas were also part of the pool of 261 unlucky individuals hit by RIAA's first round of lawsuits. "Brianna Lahara, a twelve-year-old girl living with her single mother in public housing in New York City" and "Durwood Pickle, a 71-year-old grandfather in Texas" were both charged for downloading copyrighted content through illegal file sharing networks. [44] The profiling of stereotypically awkward individuals did not stop here. In the years following the first lawsuits, the RIAA had inspired many sardonic headlines - "RIAA drops case against mom; sues her kids", "RIAA Sues Deceased Grandmother," and "RIAA Sues Yet Another Person Without A Computer" just to list several examples. Though some of these cases did turn out to be mistakes, the majority of them actually were legitimate accusations. Nevertheless, the large majority of the populace on popular forums, blog sites, and the news media concur with Professor Shell's belief. In their opinion, chastising, ridiculing, and sometimes flat out mocking the RIAA's foolish actions made sense.
- Good examples
- Creative Commons (Policy)
- DRM (Enforcement)
Reflections
Numbers Tell the Story
- Discuss the latest trends among Digital Natives relating to how they perceive piracy
- Gender differences
- Social-economic differences
- Family influences
- Group mentality phenomenon
Other Side of the Debate
Is piracy really causing problems for the programming/entertainment industries?
- Russian teacher fined for MS piracy [45]
- Piracy in developing countries
Piracy is no doubt a huge problem overseas. Although most countries have anti-piracy legislation in place, the enforcement of these laws are not up to par with global standards. Especially in developing countries where local governments have no incentives of protecting foreign intellectual property, whole industries have been built around the concept of illegally duplicating and distributing media for individual gains. The Motion Pictures industry in 2005 claimed that there were "more than 34,000 cases of piracy and assisted law enforcement officials in conducting more than 10,500 raids. These activities resulted in the seizure of more than 34 million illegal optical discs, 55 factory optical disc production lines and 3,362 optical disc burners, as well as the initiation of more than 8,000 legal actions." [46] Despite these proactive measures, MPA still projected a sum total of more than one billion dollars in lost potential revenue for 2005 in the Asia-Pacific region alone.
While the entertainment industry frantically tries to control piracy overseas, software businesses have a lighter view on this issue. Although software piracy is no better compared to media piracy abroad, there is less concern from the corporate side. In these developing countries, the biggest competitors for legitimate software companies are open source organizations. Since, software engineers are vying to attract a larger portion of the new population to use their product, strategists have have concluded piracy may actually help companies defeat the open source movement. Take the software giant Microsoft for example. It "acknowledges that piracy sometimes helps the company establish itself in emerging markets and fend off threats from free open-source programs." [47] In countries like China and India, even though a huge portion of the population operates on counterfeit versions of Windows and unactivated versions of Office, at the end of the day they are still using Microsoft made products. If the strategy to empower both the legitimate and illegitimate user base works out as planned, when a country's economy matures in the long run, the majority of the population will be more willing to buy Microsoft's genuine software. Just look at Vietnam, "which at more than 90% has the highest piracy rate in the world, has improved from 100% in 1994. The No. 1 software firm in Vietnam: Microsoft." [48]
The debate about whether or not severe anti-piracy measures are necessary in developing countries is an hot issue, for there are good supporting arguments for both parties. The value of a piece of software varies directly with the size of its user base. Without a substantial base of users, software products cannot survive. In these developing countries where the majority of the population cannot afford many of life's luxuries, asking them to dump several hundred dollars for a copy of Windows Vista is ridiculous. But, for every pirated of Vista bought Microsoft is loosing potential revenue. So, the final question to be asked is -- constituents a potential sale?
Relevant Research
SIIA Anti-Piracy: What is Piracy?
10 Big Myths about copyright explained
The YouTube effect: HTTP traffic now eclipses P2P
Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Swapping Networks
- Strahilevitz's analysis of P2P networks
"Virtually everyone who participates in one of the file-swapping networks is breaking the law in the process. Ordinarily, people are unlikely to trust lawbreakers, especially anonymous lawbreakers. Yet a remarkable sense of trust permeates these networks. ... [I]t is possible to observe significant levels of cooperative behavior, very little by way of destructive behavior, and substantial trust among the anonymous users of these networks. Furthermore, the networks have survived and thrived largely because of their users' dogged willingness to engage in unlawful activities."
Charismatic code-- "a technology that presents each member of a community with a distorted picture of his fellow community members by magnifying cooperative behavior and masking uncooperative behavior."
- "the applications harness the actual members of the community to become actors for norm enforcement purposes by magnifying the actions of those who cooperate and masking the actions of those who do not"
- "the applications act as a substitute for the community of actors and enforcers, inculcating in their users those norms most likely to lead to the success and expansion of the networks"
- "the applications act as a substitute for the community of actors and enforcers, inculcating in their users those norms most likely to lead to the success and expansion of the networks"
Distorted image-- (Gnutella network) "Charismatic code is the primary tool in that effort. Because of the way the networks are structured, the actions of those who share content are quite visible, while the actions of those who do not share content are virtually invisible. ... The architecture of the networks is such that although many users on the networks do not share, the networks create an appearance that sharing is the norm. This dynamic - the magnified visibility of sharers and the invisibility of non-sharers - exists on every successful file-swapping application I have seen."
"By the same token, these affinities normalize file-swapping: Members of the file-swapping networks stop being identified as 'rogue software pirates' and start being identified as 'people who, like me, have excellent musical taste.'"
Reciprocity-- "Technologies that magnify cooperative behavior and mask uncooperative behavior can succeed by tapping into deeply held social norms. In this instance, the file-swapping networks have been successful in large part because they have managed to tap into internalized norms of reciprocity. ... The networks' creators are drawing upon reciprocal intuitions that their users are likely to possess. Once again, the software is designed to exploit those intuitions."
- MusicCity and KaZaa's upload/download page
- Forced reciprocity implementation in 2001
Youth & Piracy
Majority of Youth Understand âCopyright,â But Many Continue To Download Illegally, 2004
Parents pick up piracy from kids
Online Piracy: The Ultimate Generation Gap
- FOX News report on youth piracy
"The generation before us had to pay for music," said recent college grad Joshua, 24, of New York City. "Now you have no reason to purchase the music or movie in physical form. Everything is digital."
"Kids really don't care," said college freshman Ben, 18, of Upper Nyack, N.Y. "We all copy music and download movies because the chances of them cracking down on us specifically are slim."
"The lawsuits are both futile and counterproductive," said Fred von Lohmann, senior staff attorney at the Electronic Frontier Foundation. "Not only will they not stop file sharing, but they'll alienate customers."
"We're hopeful we haven't lost this generation," said Bob Kruger, enforcement vice president of the Business Software Alliance, which fights software piracy.
"It makes me feel kind of bad â like, 'oh no, I'm doing something illegal,'" said Melissa, the Florida teen. "I'm probably downloading a little less."
The Effects of Piracy in a University Setting
Study: Students Don't Understand Copyright Rules
- Small study conducted by 2 college professors find students don't understand copyright laws
"AU School of Communications Professor Patricia Aufderheide and Washington College of Law's Peter Jaszi polled 51 graduate and undergraduate students who upload videos and held more extensive interviews with 15 of them."
"The majority of students (87%) who upload copyrighted material to user-generated video sites likeYouTube, Facebook or MySpace don't get permission from copyright owners, even though most (74%) believe it is fair to pay people for their use."
"The study concluded that students were, "universally underinformed and misinformed about the law." While 76% of the students said that the Fair Use doctrine allowed them to use copyrighted material, none could accurately define the doctrine."
"While they were generally concerned with staying on the "good side" of the law, they were "making up rules themselves" about what and how to use intellectual property. They also did not understand their own rights as creators of content."
Students' justifications of why they copyright content:
- Sharing a file is like talking with colleagues near a virtual water cooler environment
- Putting "all rights reserved" on a copyrighted clip protects him from the owner
- Gives the owner of the copyright free publicity/advertisement
Illegal Downloading Among Youth Drops, Reports New Study
- BSA's 2007 study on youth piracy, shows piracy down from 2004
"The results of a recent nationwide survey released by the Business Software Alliance (BSA) show that illegal downloading of digital copyrighted works by youth (ages 8 to 18) has dropped by 24 percent in the last three years."
"The survey, first conducted in 2004, indicated that 60 percent of survey participants reported downloading software, music, movies, or games without paying for it; in 2006 the percentage of those who downloaded without paying dropped to 43 percent; and in 2007 the percentage decreased to 36 percent. Youth report that parental oversight is a significant motivator and key influencing factor in their online behavior."
Top factors that kids worry about when downloading digital copyrighted works:
- Fear of accidentally downloading a computer virus (62 percent)
- Getting into legal trouble (52 percent)
- Accidentally downloading spyware (51 percent)
- Fear of getting in trouble with parents (48 percent, increasing from 40 percent in 2006)
âThis study indicates that parents represent a growing and effective influence on the online practices of youth,â said Diane Smiroldo, vice president of public affairs for BSA. âBut, while decreases in downloading are encouraging over recent years, youth are still taking too many risks online. We hope that parents continue to take seriously their role in helping their children make the right choices online. Fortunately, the survey found that more than half of the students have been warned by their parents about dangerous, illegal online behaviors. Imposing rules and ensuring your children abide by them may be an old-fashioned concept for cyberspace, but it works.â
Illegal downloading among kids have dropped in recent years:
- 22% of kids illegally downloaded software in 2004, 14% in 2006, 11% in 2007
- 53% of kids illegally downloaded music in 2004, 32% in 2006, 30% in 2007
- 17% of kids illegally downloaded movies in 2004, 10% in 2006, 8% in 2007
Parental guidance plays a big role in kids' lives:
- 87% surf the web without parental rules, 63% with rules
- 55% buy something without parental rules, 19% with rules
- 52% download software without parental rules, 19% with rules
- 47% illegally download music without parental rules, 16% with rules
Youth & Technology
US youths use internet to create, 2005
PDF: Teen Content Creators and Consumers, 2005 [49]
Anti-Piracy
(Gaming Industry) ESA: Intellectual Property
(Movie Industry) MPAA: Anti-Piracy
(Music Industry) RIAA: Anti-Piracy
(Software & Other Content) SIAA: Anti-Piracy
Anti-Piracy Gang Launches their own Video Download Site to Trap People
Pro-Piracy
Russian teacher fined for MS piracy, 2007
Profits from Piracy: Microsoft in China
Possible Solutions
Suing Your Customers: A Winning Business Strategy?, 2003
Hong Kong enlists youth to fight piracy
Legal News
Viacom the Latest Company to Misunderstand the Internet, Jason Kolb, 2007
YouTube-Viacom Page on TopTenSources, Various Editors, 2007
Viacom Terrorizes YouTube, Cory Doctorow at Boing Boing, 2007
LA Times: Is Copying a Crime? Well ..., 2006
Which Videos Are Protected? Lawmakers Get a Lesson, 2007
MPAA copyright victory is 'website killer', 2005
BitTorrent and MPAA Join Forces
Piracy stats don't add up, 2006
Indiana man jailed for selling counterfeit software on eBay
Movie Swappers Put on Notice, 2004
Poughkeepsie Online: Music Swappers Sued, 2003
Music Theft on 19 Campuses Targeted in Wave of RIAA Pre-Lawsuit Letters
In Court's View, MP3 Player is Just a 'Space Shifter', 1999
Anti-iTunes DRM demonstrations across the USA tomorrow
DRM-free iTunes Songs Have Embedded User Info
Apple, EMI Ink DRM-Free Music Plan
New law cracks down on P2P pirates
Legal Notes & Guides
Cornell Law School Legal Information Institute - US Code: Title 17, Copyrights
Cornell Law School Legal Information Institute - Constitution: LII
NET: The No Electronic Theft Act
DMCA: The Digital Millennium Copyright Act
Family Entertainment and Copyright Act
Cornell Law School Legal Information Institute - US Code: Title 17, Chapter 1, Section 107, Fair Use
Frequently Asked Questions (and Answers) about Copyright and Fair Use
From Gutman
Don't Shoot The Messenger: Copyright Infringement In The Digital Age, 2003
U.S. to step up piracy battle, 2007
France Debates Downloads, With Teenager As Top Expert, 2006
Record industry sues fans for illegally downloading music from the internet, 2004
Discussing Cyber Ethics with Students Is Critical, 2003
Kids: Stealing Digital Data OK, 2004
- Newspaper article reports the 2004 BSA findings (same study was redone in 2006 and once more in 2007)
"Youth admits it's illegal, but download music, movies, games anyway"
"Of the 1,100 eight to 18-year-olds polled, more than 80 percent know that music, movies, games, and software arc protected by law, and more than 60 percent know the same applies to Web sites. Yet 53 percent of kids still download music and more than a third download games. Only 22 percent of kids, however, steal larger files such as software and 17 percent copy movies. A measly 29 percent think illegal copying is wrong. No wonder. Eight percent say their parents approve of the activity."
"Kids cite a number of reasons for illegal downloading, from not having the money to pay for software (51 percent) to the rationale that "lots of people do it" (33 percent). Twenty-six percent also view file stealing as a victimless crime, saying it "doesn't hurt anybody."
"Interestingly, 59 percent of kids say their knowledge of intellectual property comes from television. Other sources include parents and the Internet (44 percent), and friends (30 percent). Teachers ranked dead last at 18 percent."
- Newspaper article concerning Canadian piracy
"Hollywood can help itself by doing business with iTunes Canada and providing a library of legal content to download. That, and some stronger legislation from Ottawa, would go a long way to keeping us honest."
"Based on a survey polling wired Canadians in February, we not only bootleg directly from the screen, but we also like to download pirated booty - a lot. A whopping 93% of those downloading movies in this country are doing so illegally. And it's not just tech-savvy teenagers. Nearly 50% are over age 46."
"And pinning it on in-theater theft seems to fly in the face of a 2003 study done by AT&T, which concluded that Hollywood was prone to insider attacks, which resulted in leaked screener copies of 77% of 312 movies studied."
"It's commonly known that Montreal is a hot spot," says Dewolde. "In Canada there's no law against camcordering, so it's hard to stop these guys. The worst they can get charged with is trespassing. It's a huge issue."
"At first blush, it looks as if Canadians are more liable to piracy than their counterparts in the U.S.," says Phil Dwyer in a release. "In reality, many of these illegal downloads are taking place because of the lack of legal alternatives. The market is more mature in the U.S., and the experience there shows that if you give consumers a legal, convenient and fairly priced alternative to piracy, the majority will use it."
"We're pretty polite pirates. Give us a legal way to download movies and you'll see a sea change. No doubt many people have looked longingly at the growth of content on iTunes before downloading that torrent."
- Transcript of a round table discussion about counterfeiting in general
Roz Groome - "What has been highlighted are the different strains of harm that are going on. Physical harm, financial harm and social harm - the connection between counterfeiting, piracy, organised crime and other antisocial behaviour. Then also, there is economic harm for the industries and to the Treasury, because no tax flows back on counterfeit goods. People need to realise that they are not just lining the pockets of the rich and famous. For every musical hit there are ten failures and most musicians do not earn what Robbie Williams earns. In terms of creativity, and in terms of ensuring that consumers pay for the product, it is important to ensure that the money flows back to the people who are responsible for creating it and many of those people will not be rich and famous."
Michelle Childs - "Jo has done some interesting research about the motivation of consumers to purchase counterfeit goods. It raises some interesting competition questions. When you are talking about motivation to buy fake DVDs, 56 per cent of respondents bought them because they wanted to see a film as quickly as possible. So perhaps consumers are giving market signals. Perhaps they are saying that some of the old ways of doing things, such as having windows for releasing DVDs in different markets or only releasing music in certain formats, are not what they want and are not going to work."
Jo Bryce - "The answer might be to fill that market gap, rather than to get tough with criminal sanctions."
"If anything, they seemed to believe that the rip-off that was taking place was in the price charged for legitimate goods, rather than the counterfeit ones."
Mike Smith - "The counterfeit manufacturing and duplicating of CDs and DVDs and selling them through markets is highly visible. But on the internet, your children, 17 or 18 year olds, are swapping files and it is not so freely visible."
Mike Smith - "These young people are music enthusiasts, so it is ironic that, by swapping and downloading these music files, they are hacking into the profits of the record companies and taking money that should, by rights, be paid to the songwriters and artists."
Mike Smith - "There is an argument that the future may perhaps not consist of record sales, except in a more niche, particularly high-fidelity market. Essentially music may be seen as a commodity, as a utility, as something that you get streamed to your mobile phone and that you can access constantly, wherever you go. Maybe you will pay a monthly subscription and get your music constantly coming into your life, so that it almost seems like a free commodity. What the record companies need to work out is how the people that are still manufacturing and marketing most of that music also manage to get paid for it - how our artists get paid and the people writing the songs get paid."
Mike Smith - "No. So there is a degree of education to be done. There is also, to a degree, an acknowledgement that we are trying to turn back the tide and we cannot; itâs too late. We need to acknowledge that this is possibly the future and we need to adapt our business practices to reflect that."
Roz Groome - "They will not, but I tell you who is concerned: their parents. We have conducted a massive litigation campaign against egregious uploaders. These are not people downloading, they are uploading. They are behaving like mini free retailers. They are making available thousands of files to millions of people, constantly. Everything is available on filesharing software; everything is out there. I have spoken to the parents and they are horrified. They have copied their CD collections on to their computers to enjoy them, to put them on their iPods or whatever. Then their children have come home from school and downloaded some file-sharing software on to the family computer system, which has then made available to the world their entire CD collection. Incidentally, it is not just their CDs but anything that happens to be in their shared drive. This can include the family photographs, the Expedia receipts; I have seen bank account details, it is all there. That is where consumer education needs to come in. The people doing this need to see the harm it is causing."
Jeff Randall - "Once you can access music for free, people assume it is free. They do not think it through and they do not really care. That would be my view. It is a terribly cynical view, but the music industry, clearly, is facing that problem because that is what people are doing."
Mike Smith - "The music industry has to adapt in order to survive. What we are trying to do with BPI is legitimate protection of our copyrights. We have to do that, but the world is changing dramatically, and the way that a record company gets its revenues is not going to be reliant solely upon sales of records. We are going to have to become music companies, not record companies, and we may come to look upon records as being a loss leader."
Mike Smith - "All this could be a positive force. The internet could be the best thing that ever happened to the music industry."