Welcome Guest | Sign In
TechNewsWorld.com

File Sharers Can No Longer Hide

By Jack M. Germain
Feb 5, 2005 1:30 AM PT

Uploaders to eDonkey.com, Bit Torrent and other file-sharing networks beware: The commercial equivalent to Big Brother is watching you.

File Sharers Can No Longer Hide

BayTSP, a leading provider of online intellectual property monitoring and compliance systems, last month began offering a service aimed at software, movie and music pirates. FirstSource is an automated system that identifies the first users to upload copyright- or trademark-protected content to major peer-to-peer (P2P) networks.

The service gives owners of intellectual property a way to identify the first individuals who upload illegal content. It also allows companies to track all subsequent users who download and share a particular file.

Evidence for Court

With this information in hand, intellectual property owners can produce evidence in court to substantiate piracy charges.

"Pirated copies of movies and software typically appear online within hours of release," Mark Ishikawa, CEO of BayTSP, said. "Identifying and taking action against the first uploaders can greatly slow the distribution of illegally obtained intellectual property and might make users think twice before doing it."

The FirstSource concept was tested successfully in BayTSP's computer labs. "We've been working with this system in-house since the summer," Ishikawa told TechNewsWorld.

He said the system is based on a unique search protocol, but declined to provide specifics. He added that the process is similar to conducting an Internet search with Google.

Ishikawa said the concept has proved successful in trials conducted since the last quarter of 2004.

"We don't have to touch the file first. We identify the first person to make it available," Ishikawa said.

Initial tests of the FirstSource service indicate that several thousand copies of a movie available for download on the eDonkey.com and Bit Torrent networks can be traced back to the initial uploaded file.

Ishikawa said the FirstSource service is already in use for some of BayTSP's clients for gathering evidence to be used in pending litigation.

How It Works

"Just watch for the news when the first major case breaks," he told TechNewsWorld.

EDonkey and Bit Torrent are two of the most popular file sharing networks and use a technique called swarming that allows users to download slices of a file, according to BayTSP. These slices could come from a pirated movie or software application.

The swarming technique lets multiple users access the files for download simultaneously. As users download a file, they also share the portions they've already received.

FirstSource monitors for the first uploads of a client's intellectual property to the eDonkey and Bit Torrent networks. When the system spots a file name matching the client's content, it initiates a download to confirm that the file is what it appears to be.

Once the content is validated, the FirstSource system captures the Internet Protocol address and identifying information of other users downloading and sharing the pirated material.

The system also logs which portions of the file that each user shares. This data is stored in an infringement database as evidence in the event the client decides to pursue litigation against the file sharers.

Offenders Put on Notice

The FirstSource system permits BayTSP's clients to monitor the tracking via a Web-based interface. When computer users are identified as being a tracked downloader or supplying copyrighted material, they receive a notice of violation.

Clients have the option of automatically or manually issuing these take-down notices under the Digital Millennium Copyright Act. The process is so efficient that sometimes the notices can be served while the downloads are still in progress.

The take-down notice is directed at both the ISP operators and the individual file-sharers.

U.S.-based ISP operators are directed to comply with the Digital Millennium Copyright Act by blocking access to infringing files. The notice directs the ISP owner to reply to the infringement notice and verify that the infringing material is blocked. According to the notice, International ISPs are bound by the Bilateral Treaty and/or the Berne Convention to similarly block access to the copyrighted material.

The notice sent to identified users announces that copyrighted material belonging to a client of BayTSP is publicly available on the users' computers without the proper authorization and/or license.

Effective Deterrent

The notice states: "Under the DMCA (USA) and the Bilateral Treaty and Berne Convention (International), this constitutes a copyright violation. You must promptly remove the infringing works. We also strongly recommend you reply to the infringement notice verifying removal of the infringing files. Please note that blocking access/removal of infringing material does not relinquish our client's right for further action against you."

Ishikawa said the FirstSource scans find between 3.5 million and 5 million copyright violations per day.

BayTSP officials are counting on word of their success rate spreading quickly to file-sharers who exchange illegal files. The penalties, noted Ishikawa, are too severe not to take notice. He hopes to discourage people from taking the risk.

"I could be the best Internet op around. I still could never stop the piracy completely," Ishikawa said.

"Theft of intellectual property is so prevalent on the Internet that I will never put myself out of business," he said.


Read More Reviews...


Facebook Twitter LinkedIn Google+ RSS
Assuming that your profession doesn't require it, how do you feel about viewing controversial online content?
It's wrong to view a murder or suicide.
It's wrong to view a rape or child porn.
Both No. 1 and No. 2.
It's wrong to view anything that violates someone's privacy.
It's OK to view anything if you have a good reason.
It's wrong to post certain things but never wrong to view them.