Aug 052012
 

A federal appeals court has decisively rejected a legal theory that would have placed anyone who embeds a third-party video on her website in legal jeopardy. In a Thursday decision, Judge Richard Posner of the Seventh Circuit Court of Appeals ruled that the “video bookmarking” site myVidster was not liable to the gay porn producer Flava Works if users embedded copies of Flava videos on myVidster.

Judge Posner’s reasoning is interesting. He argues that when you view an infringing video on a site such as YouTube, no one—not you, not YouTube, and not the guy who uploaded the infringing video—is violating copyright’s reproduction or distribution rights. And since simply viewing an infringing copy of a video isn’t copyright infringement, he says, myVidster can’t be secondarily liable for that infringement.

Viewing an infringing video online may lead to a violation of copyright’s public performance right, Posner goes on, but here the law is murky. The judge called on Congress to help clarify exactly how copyright law should apply in the age of Internet video.

And if even one of copyright’s most respected jurists is confused, it’s a clear sign that copyright law needs work.

Embedding is not infringement

Flava Works sued myVidster because users kept adding links to Flava videos to the myVidster site. myVidster is a “video bookmarking” site that automatically embeds bookmarked videos on its site and surrounds them with ads. To the untrained eye, it looks like myVidster itself serves up the infringing copies of the videos. Based on that perception, the trial court judge ruled that myVister was directly infringing Flava’s copyrights and granted a preliminary injunction.

Of course, if embedding is direct infringement, then anyone who embeds a video without first researching its copyright status is at risk of being a direct infringer. That would put a damper on the practice of embedding, which has made the Web a more convenient and interactive place.

The Motion Picture Association of America, of course, was thrilled with this initial result. But as Google and Facebook pointed out in an amicus brief late last year, the lower court’s decision was inconsistent with the relevant precedents.

MORE:  MPAA “embedding is infringement” theory rejected by court | Ars Technica.

 


Jul 252012
 

Verizon has numerous reasons for wanting its DSL services to die off, including the fact that newer LTE technology is cheaper to deploy in rural areas and easier to keep upgraded. But one of the driving forces is that Verizon is eager to eliminate unions from the equation, given that Verizon Wireless is non-union. None of this is theory; in fact, it has been made very clear by Verizon executives.

“Every place we have FiOS, we are going to kill the copper,” Verizon CEO Lowell McAdam recently told attendees of an investor conference. “We are going to just take it out of service. Areas that are more rural and more sparsely populated, we have got LTE built that will handle all of those services and so we are going to cut the copper off there.”

In other words, Verizon will cut off copper in FiOS markets first (which makes sense given the lower maintenance costs of fiber). They’ll then leave users in DSL-only markets un-upgraded, forcing them to buy a costly landline so that remaining on Verizon DSL becomes less attractive. Those customers will flee to the same cable companies with which Verizon just signed a massive new partnership, with Verizon planning to sell those users more expensive LTE connections later. Verizon will continue to “compete” in FiOS areas for now, if you call winking and nodding when it’s time to raise prices competition.

Rural areas could see the biggest impact from the shift, as Verizon pulls DSL and instead sells those users LTE services at a high price point ($15 per gigabyte overages). Verizon then hopes to sell those users cap-gobbling video services via its upcoming Redbox streaming video joint venture. Expect there to be plenty of gaps where rural users suddenly lose landline and DSL connectivity but can’t get LTE. With Verizon and AT&T having killed off regulatory oversight in most states, you can expect nothing to be done about it—despite both companies having been given billions in subsidies over the years to get those users online.

via Op-ed: Verizon willfully driving DSL users into the arms of cable | Ars Technica.

 


Jul 162012
 

Facebook has added sleuthing to its array of data-mining capabilities, scanning your posts and chats for criminal activity. If the social-networking giant detects suspicious behavior, it flags the content and determines if further steps, such as informing the police, are required.

The new tidbit about the company’s monitoring system comes from a Reuters interview with Facebook Chief Security Officer Joe Sullivan. Here’s the lead-in to the Reuters story:

A man in his early 30s was chatting about sex with a 13-year-old South Florida girl and planned to meet her after middle-school classes the next day. Facebook’s extensive but little-discussed technology for scanning postings and chats for criminal activity automatically flagged the conversation for employees, who read it and quickly called police. Officers took control of the teenager’s computer and arrested the man the next day.

Facebook’s software focuses on conversations between members who have a loose relationship on the social network. For example, if two users aren’t friends, only recently became friends, have no mutual friends, interact with each other very little, have a significant age difference, and/or are located far from each other, the tool pays particular attention.

via Facebook scans chats and posts for criminal activity

 


May 302012
 

Amazon has received intense and well-deserved criticism for working conditions in its warehouses, where temperatures can reportedly rise above 100 degrees Fahrenheit. The people working inside them are underpaid, overworked, subject to firing without cause and deprived of employee benefits. Amazon gets away with this because it uses a variety of legal tricks, like demanding that its employees call themselves “independent contractors.”

Amazon has also taken heat for its membership in ALEC—the American Legislative Executive Council—a corporate-funded group that backs right-wing politicians. ALEC also drafts and promotes laws like those that effectively disenfranchised large numbers of minority voters, the “Stand Your Ground” legislation that has resulted in the death of Trayvon Martin and a number of other people, and the anti-union laws brought to national attention by Wisconsin Governor Scott Walker.

If nothing else, Bezos offered symbolic gestures of conciliation today. He announced that Amazon would spend $52 million to install air conditioning in its warehouses and that it was leaving ALEC “because of positions they’ve taken not related to our business.”

In an even more telling sign of the impact of the protests, the normally loquacious Bezos left without taking questions from reporters.

Bezos did not announce that employees in Amazon’s warehouses would receive the benefits they’re due under state and national law, or that Amazon would stop forcing them to declare themselves independent contractors.

And Amazon was behind the curve in withdrawing from ALEC, lagging well behind companies such as KFC, Taco Bell, Coca-Cola, Proctor & Gamble, Blue Cross/Blue Shield, Intuit, McDonald’s, PepsiCo and Kraft Foods. Most of these companies left ALEC more than a month ago, when revelations about its role in “Stand Your Ground” gave renewed momentum to demands that corporations leave it.

SOURCE Protesters Confront Amazon Founder Jeff Bezos | The Nation.

 


May 022012
 

Police in Biloxi, Mississippi received a disturbing report in the summer of 2011: someone using the e-mail address dalton.powers1@yahoo.com had been contacting young girls in the area through Facebook. “Dalton” said he was new to Biloxi and was looking for friends. When girls aged 9-16 responded, he struck up conversations. These led quickly to a question game in which he asked the girls about their bra sizes, sexual experiences, and bodily imperfections.

When girls responded, Dalton then demanded that they go further and send him topless images. If they did not, he would take the information provided by the girls themselves and send it to their parents, friends, and school officials. Numerous girls complied, though some could only bring themselves to pose in their underwear. Nearly every shot came from the cameras on the cell phones each girl owned.

Of course, a single picture wasn’t enough. Dalton demanded that those in their underwear send him topless shots, that those already topless send him fully nude shots, and that those who had posed nude send him live webcam footage of sexual activity. Some girls, even very young ones, did so in order to avoid further embarrassment.

Parents complained to police after several girls revealed what had been happening. “They didn’t want to play his game anymore,” Biloxi police Detective Donnie Dobbs told a local paper recently.

Connecting Facebook accounts and e-mail addresses to an IP address is trivial; connecting those IP addresses to real-world Internet subscribers is no harder. So the Biloxi police had little difficulty tracing Dalton to a house on Melbourne Circle in Montgomery, Alabama.

The only problem: while IP address lookups may be accurate, they never identify people. And the family living in the house on Melbourne Circle certainly hadn’t been conducting criminal extortion on Facebook. So what was going on?

SOURCE: How a fake Justin Bieber “sextorted” hundreds of girls through Facebook.

 


Apr 252012
 

Within hours of Google launching its new online storage service, the terms and service have come under heavy fire by the wider community for being able to potentially stifle innovation and harm the users Google seeks to serve.

After Dropbox and Microsofts SkyDrive — the two largest online storage services on the Web — Google was late to the party by a number of years. While Google needed no advertising to drum up support, what may hold back uptake is that as per the terms and conditions of using the product, the files you upload to the Google Drive product undergoes a rights transition.

A quick analysis of Googles terms of service shows how the search company owns the files you upload the minute they are submitted, and can in effect do anything it wants to your files — and thats final. But there is a small catch.Heres what the terms say:

SOURCE: Who owns your files on Google Drive? | Internet & Media – CNET News.

 


Mar 222012
 

The group plans to move its front-end proxy servers into the sky, creating a network of small mobile computers that are tethered to GPS-enabled aerial drones. The airborne computers, called Low Orbit Server Stations (LOSS), will supposedly be harder for law enforcement agencies to terminate. TPB contends that any attempt to ground its vessels will be viewed as an act of war.

The MPAA declined to comment on whether it intends to bring its anti-air capabilities to bear against the pirate fleet. We imagine that the industry trade group will respond by developing a surface-to-air missile system capable of delivering high-speed ballistic takedown notices. The MPAA could also potentially retake the skies by weaponizing carrier pigeons. Alongside such takedown efforts, the content industry’s lobbyists will likely pursue a legislative strategy, such as encouraging sympathetic legislators to ban GPS.

TPB said that it plans to use low-cost Linux computers, such as the $35 Raspberry Pi ARM board, to build its fleet. Although the idea is somewhat preposterous and the whole thing is probably a bad joke, a group of technologists apparently already have a real proof-of-concept ready to soar.

READ MORE:

via Pirate Bay plans to build aerial server drones with $35 Linux computer.

 


Mar 222012
 

The pushback Amazon received from states on the Internet sales tax issue is gaining momentum with e-tailers of all sizes finding themselves the target of new legal and regulatory initiatives. The latest example is Missouri-based Scholastic Book Club, which the Connecticut Supreme Court found owes $3.2 million in sales tax, plus interest and penalties to the state, reports the Hartford Courant.

The court found that the club has enough of presence in the state for it to collect sales tax on the company’s book sales.

Growing Number of States

In February, the Americans for Tax Reform noted that more states are moving in this direction.

READ MORE:

via Internet Sales Tax Issue Gaining Momentum – MarketingVOX.

 


Jan 032012
 

TorrentFreak’s top 10 most pirated games of 2011 list is out and taking the top prize was Crytek’s Crysis 2. What were the other top nine games that pirates stole last year? Find out after the jump.

With nearly 4 million illegal downloads Crysis 2 easily took first place. Coming in a close behind were Call of Duty: Modern Warfare 3, Battlefield 3, FIFA 12 and Portal 2 for PC.

Rounding out the top 10 most pirated games were Super Mario Galaxy 2 (Wii), Mario Sports Mix (Wii), Xenoblade Chronicles (Wii) and Gears of War 3 (Xbox 360).

via Crysis 2 was the most pirated game of 2011 | DVICE.

Oct 122011
 

 

 

In a request made yesterday to the Internet Corporation for Assigned Names and Numbers, Verisign outlined a new “anti-abuse” policy that would allow the company to terminate, lock, or transfer any domain under its registration jurisdiction under a number of circumstances. And one of those circumstances listed was “requests of law enforcement.”

The request, submitted through ICANN’s Registry Services Evaluation Process on October 10, proposes a new malware scanning service for domains as well as a new Verisign Anti-Abuse Domain Use Policy. In the request letter, Verisign stated that its policy would help the registrar align with requirements ICANN is placing on new generic top level domains. “All parts of the internet community are feeling the pressure to be more proactive in dealing with malicious activity,” Verisign explained. “ICANN has recognized this and the new gTLD Applicant Guidebook requires new gTLDs to adopt a clear definition of rapid takedown or suspension systems that will be implemented.”

In part, the policy is aimed at empowering Verisign to act quickly to take down sites that are harboring malware, launching phishing attacks, or otherwise being used to launch attacks across the Internet. The scanning service, which registrars can opt into voluntarily, would scan sites on all .com, .net and .name sites for “known malware,” and inform the registrar and the site owner when malware is detected. Verisign has been soliciting domain registrars to participate in a pilot of the program, derived from the company’s Verisign Trust Seal program, since March.

via Verisign wants power to shut sites down upon law enforcement request.