267:
responded that many businesses with open Wi-Fi had business accounts, which were not subject to the CAS. Lesser also said that businesses offering open Wi-Fi through residential accounts would be subject to the CAS, but those accounts, like others subject to the CAS, would not be subject to termination. The defense of publication before 1923 was the only allowable challenge to the copyright status of a work, even though a work may have been out of copyright protection for other reasons. LaFrance criticized the presence of the "work published before 1923" defense but not other factual challenges to the copyright status of the work that she said could just as easily be resolved through the appeal process.
294:, placing the burden of proof on consumers to show that allegations of copyright infringement are unfounded. The organization recommended that, in the absence of copyright infringement detection systems which have been demonstrated to be entirely accurate, the burden of proof be placed on the content providers to show copyright infringement prior to the mitigation measures. Bridy wrote that IP address collection and content identification methods should be held to a much higher standard (including review by an independent expert with no contractual obligations to the CCI nor non-disclosure obligations), especially since an alert itself could trigger a sanction.
409:, a global digital risk management and investigations firm, to conduct an analysis of MarkMonitor's system for monitoring, verifying, and enforcing online copyright infringement on P2P file sharing networks. Stroz Friedberg assessed the efficacy of MarkMonitor's methodologies to monitor, identify, collect evidence, and generate notices to P2P infringers The contractor published the findings in a confidential report to the CCI in November 2012 (i.e., before the system launched), concluding that the methodologies were "well developed and robust", though not without room for improvement.
466:'s high-tech litigation consulting firm Harbor Labs to conduct a follow-up review. In March 2014, Harbor Labs completed a limited review of MarkMonitor's system, concluding that the technical design was generally sound, but that the company needs to improve its safeguards against human error and internal malfeasance. The existence of the report was publicly disclosed when the CCI posted the report's executive summary eight months later. The report itself will not be released because it contains confidential information.
141:
would-be infringers to legal online content providers. The CCI hoped that unwitting infringers, such as those whose home networks have been hijacked by unauthorized users or the parents of children who are infringing, would use the knowledge that their account is being used for copyright infringement to force users of the account to curtail these activities. The CCI also hoped to increase parents' involvement in what their children are doing online by alerting misconduct and abuse of their accounts.
514:
stated "educational" purposes. In the first draft of the CCI's memorandum of understanding, it was stated that upon that ISPs would be responsible for providing information collected under the CAS program to
Content Owners "if it elects to initiate a legal action against the subscriber". The final agreed memorandum of understanding replaced the term "legal action" with "copyright infringement action". Two months after the CAS's implementation,
552:
77:), in which participating ISPs would send warnings notifying subscribers of alleged copyright infringement, as reported by a monitoring service working on behalf of participating copyright owners. The system specified a six-step progression, from advice messages, to warnings that must be acknowledged by the user. After a fifth warning, ISPs were allowed to implement "mitigation measures", which could include penalties such as
203:
such as electricity. Annemarie Bridy wrote that although temporary suspension was a possible mitigation measure, market pressure would discourage ISPs from using it, instead relying on more educational measures. Mueller, Kuehn, and
Santoso attributed the ISPs' adoption of the Copyright Alert System to its voluntary nature and the fact the ISPs were not required to terminate accounts under the Copyright Alert System.
287:
legal standards in an independent review would call into question the fairness of the independent review proceeding, citing what she said were inaccurate statements from the RIAA on copyright. Bridy also said that the lack of written decisions in the independent review process would make it difficult to determine what the rules are for independent review or whether they are being followed.
543:
to, very small businesses like a home-office or a local real estate office may have an
Internet connection that is similar from a network perspective to a residential connection... The practical result is that if an employee of the small business, or someone using an open Wi-Fi connection at the business, engages in infringing activity the primary account owner would receive alerts".
573:, the nation's largest ISP, sent out 625,000 warnings to its users. Largely seen as another supplement to the CAS, in September 2013, AT&T applied for a patent for technology that would allow the company to "prevent bandwidth abuse" by tracking the content its users are sharing via BitTorrent and other P2P networks in order to charge its users for excessive bandwidth use.
519:
occurring could be used to show a pattern of infringing behaviour". The
Northern District Court of Texas agreed and compelled Verizon to give Malibu Media this information. With this information, Malibu Media was able to successfully litigate the first BitTorrent copyright infringement case in American legal history which concluded with a verdict.
560:
copyrighted media, such as software. In the first year of the CAS's existence, US traffic to The Pirate Bay increased by 31 percent. In June 2013 Warner
Brothers Studios began sending warning to users whose internet service was provided by an entity other than one of the five ISP partners of the CCI. In August, Variety revealed that engineers at
542:
The EFF said that the CAS will hinder the Open
Wireless Movement's goals. Jill Lesser, executive director of the Center for Copyright Information, said that the CAS will affect small businesses that use a residential connection for open Wi-Fi: "Depending on the type of Internet service they subscribe
397:
these companies' products. Further, the CCI only allowed for a three-person advisory board from consumer interest groups, while the executive board is composed of six representatives from the media companies and ISPs, an arrangement which the EFF believed to be inadequate for consumer representation.
396:
The EFF cited a number of problems with the memorandum of understanding. Firstly, the EFF criticized the lack of subscriber representation in the CCI, noting that the establishment of the CCI involved only large media corporations and ISPs, but left out representatives of the subscribers who purchase
140:
The Center for
Copyright Information believed that the Copyright Alert System would be effective in reducing both intentional and unintentional copyright infringement. By providing willing infringers with information regarding the serious consequences of copyright infringement, the CCI hoped to steer
302:
to jeopardize the neutrality of the arbitrators was present. However, Bridy wrote that the independent review process was optional, and users were free to go to court to remove alerts or challenge mitigation measures, unlike in other consumer contracts where arbitration was mandatory. Although Bridy
286:
Bridy wrote that the copyright law applied in independent reviews would be determined by an expert commissioned by the
American Arbitration Association and approved by CCI, who was required to hear "prevailing legal principles" of copyright law as viewed by copyright owners. Bridy suggested that the
114:
A review of MarkMonitor's system for the CAS stated that only uploads were monitored, with infringement being suspected when MarkMonitor's BitTorrent client successfully obtains pieces of known-infringing content from a peer in the swarm. The pieces were compared to pieces from an already-downloaded
306:
According to a May 2014 report by the Center for
Copyright Information, from the implementation of the Copyright Alert System through the end of 2013, there were 265 appeals, representing 0.27% of the alerts triggering a mitigation measure for which the appeal process was available. Of the appeals,
282:
that the subscriber did not infringe. Mary LaFrance wrote that the system prevented any party from introducing a decision from the appeal process into any judicial proceeding. According to the CCI, the failure of a subscriber to appeal a copyright alert under the
Copyright Alert System "will not be
270:
The subscriber's personal information was not shared with the copyright holder in the appeal process unless the subscriber asserted the defense of authorization and the arbitrator deemed disclosure necessary for the copyright holder to respond to the defense. Bridy favorably compared the privacy of
223:
The appeal had to be requested within 14 days of the alert triggering the mitigation measure. The subscriber had to pay a $ 35 filing fee, unless the fee was waived by the AAA. According to CCI Executive Director Jill Lesser, the $ 35 fee "defray a small part of the cost of the appeal and intended
568:
were developing technology designed to recognize the illegal downloading of copyrighted material by its users and launch a pop-up window with links to legal access to such content. This was not a CCI-backed initiative, but rather was viewed as a potential supplement to the CAS as Comcast had begun
513:
have not invited small, independent ISPs to participate. Similarly a representative of Cox Communications told TorrentFreak that they "have decided not to participate for internal reasons". Before the CAS' launch, concern existed that data collected for the CAS would be used for more than just the
493:
request related to the White House's role in the policy was denied by a Washington D.C. federal court. Chris Soghoian, a policy analyst at the American Civil Liberties Union (ACLU), submitted the request to obtain information about the interaction in creating the policy. It was denied in a summary
381:
is credited with helping the parties negotiate and create the Copyright Alert System. In April 2013, IFPI CEO Frances Moore indicated that the role of the United States government was greater than previously acknowledged in bringing content owners and ISPs together to fight copyright infringement.
179:
was the first to reveal their mitigation policy. Their policy specified that violators with more than three alerts would be directed to an online copyright law information. Upon a fifth or sixth alert, the user would experience a temporary speed reduction down to 256 kbit/s (approximately the
174:
Mitigation measures included: "temporary reductions of Internet speeds, redirection to a landing page until the subscriber contacts the ISP to discuss the matter or reviews and responds to some educational information about copyright, or other measures (as specified in published policies) that the
518:
was subpoenaed to provide a third party plaintiff with information on its users which it recorded for CAS purposes. The plaintiff, Malibu Media argued that "DMCA notices and six strike alerts are relevant because these notices may prove a pattern of infringement and/or notice that infringement is
202:
The EFF also argued that the mitigation measures to be undertaken by ISPs in response to alleged copyright infringement were overly harsh, as they could be used to deny consumers access to the Internet, which EFF maintained is as fundamental a right in the digital era as access to other utilities
188:
later explained that it would not cut the user off the internet even though such measure appeared in the copyright warning letter. It gave a reason that the six strikes warnings are only allegations; therefore, if the alleged user was still suspected of illegal downloading after completion of the
135:
a consumer-focused process for identifying and notifying residential wired Internet access service customers of the participating ISPs (other than dial-up subscribers) who receive multiple notifications of allegations of online infringement made via P2P networks and applications, in an effort to
559:
According to Jill Lesser, the executive director of the CCI, the CAS's first year was successful as the CAS is "intended to be education based". Lesser indicated that changes for 2014 might include expanding the program to more Internet service providers and also start including other forms of
261:
The choice of defenses allowed in an appeal was criticized. The defense of unauthorized use of account was not allowed if the user was a member of the subscriber's household or an invitee, and after the first assertion of this defense, the subscriber had to demonstrate by "clear and convincing
266:
article, Cyrus Farivar said that the responsibility placed on the subscriber by the CAS for copyright infringement that occurred using the subscriber's connection would harm the availability of open Wi-Fi that small businesses make available to their customers. In a CCI blog post, Jill Lesser
262:
evidence" that the subscriber "took reasonable steps to secure the account following the first occurrence of unauthorized use". Bridy wrote that this creates an obligation for subscribers to secure their Internet connection even when they had no legal or contractual obligation to do so. In an
122:
associated with the suspicious activity was notified. The ISP, in turn, notified the subscriber to whom the IP address was assigned at the time of the alleged infringement, informing the subscriber that their account was suspected of being used to infringe copyright, and warning of potential
474:
The White House supported the memorandum of understanding, calling it "a positive step and consistent with our strategy of encouraging voluntary efforts to strengthen online intellectual property enforcement and with our broader Internet policy principles, emphasizing privacy, free speech,
453:
we are, however, sensitive to any appearance that Stroz lacks independence, and so CCI has decided to have another expert review Stroz's initial evaluation of the content community's processes. We will be selecting the additional expert promptly and will make that information
494:
judgement by Judge Royce C. Lamberth. Lamberth's judgement rests on an exemption for drafts and "...reducing the possibility of misleading the public by disclosing documents that suggest certain reasons for a future decision that do not ultimately bear upon that decision".
297:
The EFF argued that the procedure for objecting to an alert was unfairly burdensome to the consumer and biased towards the media companies. Bridy said that because the Copyright Alert System arose from a mass consumer contract, the potential for the
389:
in July 2011 and amended it in August 2011 and October 2012. The agreement establishes the framework for the Copyright Alert System, establishing the roles and expectations of the ISPs, the copyright owners, and the monitoring services.
1470:
635:
160:
The first and second alerts notified ISP subscribers that their Internet account has allegedly been used for copyright infringement, provided an explanation of how to avoid future offenses, and directed users to lawful content
224:
to discourage frivolous appeals". In order to prevail, the subscriber had to successfully challenge a specified number of alerts (possibly more than one) to block the mitigation measure and receive a refund of the filing fee.
458:
The CCI also hired Stroz Friedberg to review the accuracy of the system by which ISPs match the IP addresses of suspected infringers to the ISPs' subscribers. The results of that review have not yet been publicly released.
1617:
438:, the company's executive vice president, executive managing director, and general counsel. Howell was previously involved in crafting numerous pieces of legislation for the investigation and prosecution of
211:
The CAS process did not allow alerts to be challenged until a mitigation measure was about to be imposed. At that time, the subscriber could request, through a special link provided by their ISP, a special
307:
47 (17.7%) were successful, the "vast majority" of which involved the "unauthorized use of account" defense. In none of the appeals was it determined that an account or copyrighted work was misidentified.
655:
426:
Although both the CCI and Stroz Friedberg claimed the review was independent, the CCI didn't release the Stroz Friedberg report until after media reports surfaced that Stroz Friedberg was an RIAA
632:
237:
Authorization – The subscriber's use of the work identified in the alert was specifically authorized in writing by the work's copyright owner or someone with a license to reproduce the work.
220:(AAA), and the arbitrator would be selected by the AAA. The process was "automated to the maximum extent practicable", with the intent of resolving the dispute within thirty days of filing.
1618:"Statement Of Senator Patrick Leahy (D-Vt.), Chairman, Senate Judiciary Committee, On The Nomination Of Beryl Howell To Be A United States District Court Judge For The District Of Columbia"
449:
In response to the "questions" raised, the CCI issued a statement reaffirming confidence in Stroz Friedberg's propriety and announcing the public release of the report, but also conceding,
1642:
1467:
184:
decided that after a 6th alert, a user's "access to many of the most frequently visited websites restricted" until they completed an "online educational tutorial on copyright". However,
2693:
535:
that the Copyright Alert System "is fundamentally flawed". Bambauer says that injustice could result in the case where a user legally downloaded an entire work under the doctrine of
234:
Unauthorized Use of Account – The alleged infringement was the result of unauthorized, unpreventable use of the subscriber's account by others, without the subscriber's knowledge.
123:
consequences. Users who continue to receive warnings could be issued up to six alerts in the form of pop-up messages and e-mails before stronger measures were taken by the ISP.
1893:
99:(often doing business as DtecNet) to detect and monitor suspected copyright infringement activity. Although MarkMonitor monitored many infringement venues, in early 2013 the
1621:
199:
The EFF said that because the system "will not identify those who take steps to anonymize their Internet traffic using a VPN or Tor" it would not stop dedicated infringers.
932:
971:
382:
Specifically she claimed Vice President Joe Biden and "Copyright Czar" Victoria Espinel, were critical players in "pushing the parties to come to some type of agreement".
2899:
954:
278:
The CCI said that subscribers may also challenge alerts or mitigation measures in court; Bridy presumed that such a challenge could be made in the form of a request for
943:
419:"MarkMonitor's evidence collection in connection with P2P infringement is robust, defensible, and will withstand adverse party scrutiny or evidentiary challenges".
164:
If the suspicious behavior persisted, additional alerts were sent. These alerts ask the subscriber to acknowledge receipt of the messages by clicking a notice.
2686:
247:
Misidentification of File – The file "did not consist primarily of the alleged copyrighted work at issue but rather contained other non-infringing material".
84:
The CAS framework was established on July 7, 2011, after three years in the making. After multiple delays, ISPs began implementing it in late February 2013.
2114:
1796:
505:
that his ISP will not be participating in the Copyright Alert System, saying that ISPs are not equipped to police the actions of individuals, and that the
412:
The publicly released version of the report contained a number of redactions of various details. Among the report's conclusions were the following claims:
1763:
1312:
652:
605:
490:
303:
said that few subscribers would go to court owing to the possibility of a large damages award, this alternative allowed for full due process safeguards.
2029:
904:
1442:
346:
36:
1263:
1062:
196:
The CCI said that at no point in the process would the ISPs reveal customer information to the CCI, the monitoring service, or the copyright owners.
2864:
1668:
193:
stated that it would not discontinue customers' service, but instead redirect users to educational pages on copyright law upon multiple violations.
2679:
1908:
1646:
695:
555:
Distribution of the number of copyright alerts received by accounts during the first ten months of implementation of the Copyright Alert System.
2149:
1516:
332:
3053:
2408:
189:"online educational tutorial on copyright" and the six strikes warnings, unless the copyright owner took legal action; nothing would happen.
40:
2052:
1289:
1118:
673:
258:
In an appeal, the burden of proof was on the subscriber to demonstrate the elements of one of the above grounds for challenging an alert.
2941:
1957:
1592:
1552:
320:
144:
The EFF claimed the materials used to "educate consumers" were "more like propaganda", and that the framework violated the principle of
2006:
3220:
3215:
2075:
1720:
23:) was a voluntary industry effort to educate and penalize internet users who engage in the unauthorized and unlawful distribution of
1703:
2874:
2550:
2403:
929:
217:
32:
2757:
1488:
984:
817:
951:
3038:
2630:
2413:
1739:
940:
821:
100:
1689:
271:
an appeal proceeding to the previous system of "mass John Doe litigation". The appeals process involved no hearings and no
3225:
2879:
2747:
2533:
1417:
340:
735:
231:
Misidentification of Account – The subscriber's account was incorrectly identified as a source of copyright infringement.
136:
educate consumers, deter online infringement, and direct consumers to lawful online legitimate sources of content online.
2974:
1588:
1067:
1845:
1171:
1003:
170:
If the ISP did not institute a mitigation measure following the fifth alert, it had to enact one after the sixth alert.
2107:
788:
761:
386:
328:
1021:
713:
1334:
103:(EFF) said it appeared that for purposes of the CAS, the company will only monitor peer-to-peer traffic from public
2523:
2398:
2262:
2142:
1931:
1983:
1776:
250:
Work Published Before 1923 – The work identified in the alert was published prior to 1923 and therefore is in the
3188:
3088:
2984:
2806:
2737:
2186:
2158:
1140:
44:
28:
1777:"The Content Industry and ISPs Announce a "Common Framework for Copyright Alerts": What Does it Mean for Users?"
3043:
2946:
2660:
2515:
840:
360:
145:
87:
Due to the program not substantially decreasing piracy, the CAS discontinued the program on January 30, 2017.
1385:
1090:
422:"The methodologies include appropriate checks and balances at key points in the workflow to ensure accuracy".
3174:
2884:
2779:
2722:
1039:
2100:
2994:
2979:
2854:
2821:
2727:
2610:
2171:
443:
108:
1221:
Bridy, Annemarie (2012). "Graduated Response American Style: "Six Strikes" Measured Against Five Norms".
115:
copy of the content, which had already been matched to content samples supplied by the copyright owners.
3210:
2989:
2894:
2859:
2702:
2485:
2135:
2121:
582:
528:
483:
431:
352:
1540:
240:
Fair Use – The subscriber's use of the work identified in the alert meets the U.S. legal definition of
2076:"DISPATCH FROM THE DEATH STAR 1 AT&T Patents System That Could Charge File-Sharers Extra For Data"
1894:"The Bellwether Trial (Malibu Media v. Does) – What Have We Learned? My Five Takeaways From the Trial"
1063:"AT&T Could Block Facebook, The Pirate Bay And Others When 'Six Strike' Program Begins Next Month"
985:"U.S. Copyright Surveillance Machine About To Be Switched On, Promises of Transparency Already Broken"
818:"U.S. Copyright Surveillance Machine About To Be Switched On, Promises of Transparency Already Broken"
2934:
2929:
2909:
1818:
1360:
569:
approaching other content owners and ISPs to explore the concept with them. In the CAS's first year,
406:
299:
279:
78:
1091:"AT&T Promises (Again) Not To Disconnect Your Account If It Suspects You Of Illegal Downloading"
167:
After a fifth alert, ISPs were allowed to take "mitigation measures" to prevent future infringement.
2849:
2717:
2358:
3167:
3113:
3017:
2650:
2390:
2287:
479:
356:
324:
104:
70:
315:
The Copyright Alert System framework was devised by the following companies and organizations:
3048:
2811:
2655:
2449:
1867:
1560:
1234:
1230:
336:
190:
59:
1564:
227:
Subscribers could only challenge alerts on one or more of the following pre-defined grounds:
3128:
3073:
3033:
2914:
2752:
2578:
2573:
2166:
1095:
872:
175:
ISP may deem necessary to help resolve the matter". Mitigation measures varied by company.
3160:
3123:
2958:
2816:
2732:
2480:
2444:
2222:
1474:
1025:
1007:
958:
947:
936:
905:"Independent Expert Assessment of MarkMonitor AntiPiracy Methodologies [Redacted]"
659:
639:
435:
272:
789:"'Six strikes' anti-piracy initiative ends after failing to scare off 'hardcore' pirates"
3118:
3083:
3058:
2799:
2772:
2762:
2495:
2217:
1744:
551:
439:
1477:, Recording Industry Association of America, July 7, 2011. Retrieved November 6, 2011.
3204:
3108:
3063:
2833:
2645:
2625:
2620:
2588:
2558:
2490:
2475:
2053:"COMCASTIC 3 Report: Comcast Sends Out Around 1,800 Copyright Alert Notices Each Day"
565:
430:
organization from 2004 to 2009. The firm's sole lobbyist for the RIAA (and, briefly,
251:
3143:
3068:
2904:
2889:
2826:
2784:
2767:
1724:
1520:
532:
502:
416:"MarkMonitor's methodologies effectively identify P2P online copyright infringers".
378:
2671:
1797:"Federal court: Obama admin doesn't need to release more "six strikes" documents"
1539:
Stroz Frieberg lobbying data (public record) as published by OpenSecrets.org for
606:""Six strikes" program could affect businesses too, even if infringer is unknown"
275:, although the arbitrator could demand additional information from either party.
3138:
3133:
2953:
2924:
2789:
2615:
2583:
2500:
2338:
2297:
2267:
482:
between media corporations and ISPs, harsh mitigation measures, and reversal of
291:
213:
96:
51:
2919:
2742:
2428:
2368:
2307:
2292:
2282:
2212:
119:
81:
or preventing web access until customers "discuss the matter" with their ISP.
1596:
2794:
2423:
2252:
2227:
2127:
1174:, Electronic Frontier Foundation, July 18, 2011. Retrieved November 6, 2011.
1000:
498:
463:
364:
180:
speed of dial-up internet access). According to a leaked internal document,
24:
1779:, Electronic Frontier Foundation, July 7, 2011. Retrieved November 6, 2011.
1909:"The anti-piracy Copyright Alert System: Is the Napster era finally dead?"
1468:"Music, Movie, TV and Broadband Leaders Team to Curb Online Content Theft"
1018:
877:
860:
2869:
2454:
2418:
2353:
2247:
2237:
2196:
2191:
2030:"Comcast Developing Anti-Piracy Alternative to 'Six Strikes' (Exclusive)"
1443:"ISPs sent 1.3M copyright infringement notices to US customers last year"
1040:"LEAKED: Verizon's New Anti-Piracy Measure Will Give Offenders 6 Chances"
536:
427:
241:
373:
The ISPs AT&T, Cablevision, Comcast, Time Warner Cable, and Verizon.
3181:
3078:
2568:
2563:
2527:
2519:
2510:
2505:
2363:
2322:
2302:
972:"Entertainment giants and broadband providers team up on piracy effort"
633:
Music, Film, TV, and Broadband Collaborate to Curb Online Content Theft
570:
561:
515:
290:
The EFF said that the mitigation measures could be imposed without any
185:
181:
176:
63:
55:
47:
859:
Mueller, Milton; Andreas Kuehn and Stephanie Michelle Santoso (2012).
478:
However, the CAS was criticized for a perceived lack of public input,
2470:
2343:
2242:
2115:"Copyright Cops Team with ISPs to Crack Down on Music, Movie Pirates"
1172:"The "Graduated Response" Deal: What if Users Had Been At the Table?"
696:"AT&T Joins Verizon in Fight Against Web Piracy of Movies, Music"
1932:"Don't Be Fooled: "Six Strikes" Will Undoubtedly Harm Open Wireless"
1721:"US Copyright Alert System security could be improved, report finds"
1223:
Fordham Intellectual Property, Media & Entertainment Law Journal
1411:
1409:
1407:
2640:
2635:
2373:
2348:
2317:
2312:
2232:
1517:"RIAA lobbyist becomes federal judge, rules on file-sharing cases"
2277:
2272:
1749:
1669:"CCI Recommits to Independent Evaluation of Content Methodology"
1489:"Joe Biden Pushed For "Six Strikes" Anti-Piracy Plan, IFPI Says"
1361:"Graduated Response by Industry Compact: Piercing the Black Box"
510:
506:
2675:
2131:
2257:
1819:"Has Your ISP Joined the US "Six Strikes" Anti-Piracy Scheme?"
1553:"Practicing at the Intersection of Law, Policy and Technology"
974:, Los Angeles Times, July 6, 2011. Retrieved November 6, 2011.
674:"Major ISPs agree to "six strikes" copyright enforcement plan"
283:
construed as an admission or waiver in any other proceeding".
95:
The Center for Copyright Information employed the services of
1764:"Major US ISPs Agree To Five Strikes Plan, Rather Than Three"
2007:"Warner Bros. fines file-sharers, even without six strikes"
1291:
Congressional Internet Caucus Meets on Copyright and Piracy
1119:"Cable companies say they won't disconnect accused pirates"
861:"Policing the Network: Using DPI for Copyright Enforcement"
393:
The Copyright Alert System launched in late February 2013.
2110:, The 1709 Blog, July 8, 2011. Retrieved November 6, 2011.
486:
standards. The EFF made particularly detailed criticisms.
118:
When suspected infringement was detected, the ISP for the
1766:, Techdirt.com, July 7, 2011. Retrieved November 6, 2011.
1690:"Six Strikes Anti-Piracy System Gets New Evidence Review"
2122:"ISPs to Disrupt Internet Access of Copyright Scofflaws"
2117:, PCWorld.com, July 7, 2011. Retrieved November 6, 2011.
1846:"MPAA / RIAA PONDER SUING PERSISTENT BITTORRENT PIRATES"
1643:"Stroz Friedberg LLC - Professionals - Howell, Beryl A."
854:
852:
850:
216:
proceeding. The proceeding would be administered by the
707:
705:
539:, but the CAS still treated the user as an infringer.
1258:
1256:
1254:
1252:
1250:
1248:
1246:
1244:
2103:, Reuters, July 7, 2011. Retrieved November 6, 2011.
1264:"What Do I Do if I Think the Alert Was Wrongly Sent"
987:. Electronic Frontier Foundation. November 15, 2012.
3152:
3101:
3026:
3010:
3003:
2967:
2842:
2710:
2601:
2549:
2542:
2463:
2437:
2386:
2331:
2205:
2179:
2165:
627:
625:
2124:, Wired, July 7, 2011. Retrieved November 6, 2011.
2108:"US content industry and ISPs to inform and alert"
2101:"Internet providers to act against online pirates"
1984:"SIX-STRIKES FAILS TO HALT U.S. PIRATE BAY GROWTH"
1418:"The Copyright Alert System: Phase One and Beyond"
1704:"Evaluation of the MarkMonitor AntiPiracy System"
653:Labels Reach Deal With ISPs on Antipiracy Effort
1416:Center for Copyright Information (2014-05-28).
1313:"What are the Grounds for Requesting a Review?"
462:In August 2013, the CCI announced it had hired
451:
133:
1166:
1164:
1162:
131:The Copyright Alert System was intended to be
2687:
2143:
1958:"'Six strikes' thwarting piracy, leader says"
1874:. Northern District of Texas. 2013. p. 7
8:
1368:Cardozo Arts & Entertainment Law Journal
1294:. C-SPAN. 2013-03-08. Event occurs at 19:52
812:
810:
808:
1354:
1352:
762:"RIP, "Six Strikes" Copyright Alert System"
3007:
2694:
2680:
2672:
2546:
2176:
2150:
2136:
2128:
1740:"Working Together to Stop Internet Piracy"
1583:
1581:
1001:About the Center for Copyright Information
835:
833:
831:
107:. The Copyright Alert System does not use
31:services. The program was operated by the
1510:
1508:
1506:
1216:
1214:
1212:
1210:
1208:
1206:
1204:
1202:
1200:
903:Stroz Friedberg, LLC (November 1, 2012).
876:
714:""Six strikes" enforcement policy debuts"
599:
597:
527:Tech law professor Derek Bambauer of the
37:Recording Industry Association of America
2865:Business models for open-source software
1868:"Malibu Media LLC v. Verizon Online LLC"
1198:
1196:
1194:
1192:
1190:
1188:
1186:
1184:
1182:
1180:
996:
994:
898:
896:
894:
892:
890:
888:
550:
1791:
1789:
1787:
1785:
593:
1956:Tummarello, Kate (February 24, 2013).
925:
923:
333:Twentieth Century Fox Film Corporation
3054:Organization for Transformative Works
2028:Wallenstein, Andrew (5 August 2013).
1170:McSherry, Corynne and Goldman, Eric,
1019:Center for Copyright Information FAQs
736:"Copyright Alert System Set to Begin"
156:The system of alerts was as follows:
41:Motion Picture Association of America
7:
1645:Stroz Friedberg, LLC. Archived from
385:The negotiating parties completed a
1593:Center for Democracy and Technology
321:Walt Disney Studios Motion Pictures
1738:Espinel, Victoria (July 7, 2011).
1671:. Center for Copyright Information
1392:. Center for Copyright Information
1337:. Center for Copyright Information
1315:. Center for Copyright Information
1270:. Center for Copyright Information
1147:. Center for Copyright Information
742:. Center For Copyright Information
14:
2074:Morran, Chris (31 January 2014).
2051:Morran, Chris (7 February 2014).
1557:Science and Technology newsletter
787:Kastrenakes, Jacob (2017-01-30).
35:, a consortium consisting of the
2875:Commercial use of copyleft works
1930:Kamdar, Adi (14 February 2013).
1896:. Philly Law Blog. 11 June 2013.
1335:"CAS Will Not Harm Public Wi-Fi"
841:"The Copyright Alert System FAQ"
740:Center For Copyright Information
218:American Arbitration Association
33:Center for Copyright Information
2855:Alternative compensation system
1620:. July 28, 2010. Archived from
1515:Anderson, Nate (Mar 28, 2011).
1061:Stone, Jeff (12 October 2012).
712:Farivar, Cyrus (Feb 25, 2013).
694:Engleman, Eric (July 7, 2011).
672:Anderson, Nate (July 7, 2011).
3039:Electronic Frontier Foundation
2631:BitTorrent protocol encryption
1936:Electronic Frontier Foundation
1563:. October 2003. Archived from
822:Electronic Frontier Foundation
662:, billboard.biz, July 7, 2011.
475:competition and due process".
101:Electronic Frontier Foundation
1:
2880:Commons-based peer production
2748:Legal aspects of file sharing
1982:Ernesto (September 3, 2013).
1799:. Ars Technica. 28 March 2013
1441:Kravets, David (2014-05-28).
1141:"Copyright Alert System FAQs"
604:Farivar, Cyrus (2013-01-14).
341:Warner Brothers Entertainment
2975:Access to Knowledge movement
1068:International Business Times
547:Effects since implementation
497:In 2012, the California ISP
1333:Lesser, Jill (2013-01-31).
930:Memorandum of Understanding
387:memorandum of understanding
329:Sony Pictures Entertainment
3242:
1390:The Copyright Alert System
1268:The Copyright Alert System
1145:The Copyright Alert System
865:Surveillance & Society
491:Freedom of Information Act
73:system (also known as the
45:internet service providers
3221:Peer-to-peer file sharing
3216:Intellectual property law
3089:Students for Free Culture
2985:Cultural environmentalism
2942:Prizes instead of patents
2738:Digital rights management
2159:Peer-to-peer file sharing
1386:"Independent Review FAQs"
1006:January 13, 2013, at the
470:Reception and controversy
29:peer-to-peer file sharing
3044:Free Software Foundation
2661:Micro Transport Protocol
405:The CCI contracted with
361:Sony Music Entertainment
146:presumption of innocence
3175:RiP!: A Remix Manifesto
2885:Electronic sell-through
2780:Monopolies of knowledge
2723:Censorship by copyright
2399:Advanced Direct Connect
1911:. The Week Publications
1359:LaFrance, Mary (2012).
3189:The Internet's Own Boy
2995:Free software movement
2822:software patent debate
2728:Copyright infringement
2611:Distributed hash table
2486:Game and video sharing
1844:Van der Sar, Ernesto.
1487:Van der Sar, Ernesto.
556:
523:Open wireless networks
456:
444:copyright infringement
138:
109:deep packet inspection
17:Copyright Alert System
2990:Free-culture movement
2900:Libertarian positions
2895:Free-software license
2860:Anti-copyright notice
2703:Intellectual property
878:10.24908/ss.v9i4.4340
631:Brimmeier, Khristyn.
583:Chilling effect (law)
554:
529:University of Arizona
432:Universal Music Group
353:Universal Music Group
254:in the United States.
75:"six strikes program"
3226:Internet terminology
2910:Open-design movement
1727:. November 21, 2014.
1624:on December 16, 2012
300:repeat-player effect
280:declaratory judgment
79:bandwidth throttling
2850:All rights reversed
2718:Artificial scarcity
1872:Case 6:13-mc-0005-C
1775:Phillips, Abigail,
1117:McCullagh, Declan.
952:Oct. 2012 amendment
941:Aug. 2011 amendment
843:. 28 February 2013.
480:perverse incentives
105:BitTorrent trackers
3168:Good Copy Bad Copy
3114:Alexandra Elbakyan
3018:Copyright Alliance
2651:BitTorrent tracker
1692:. August 17, 2013.
1473:2013-03-05 at the
1042:. Business Insider
1024:2013-01-13 at the
957:2016-03-04 at the
946:2016-03-04 at the
935:2016-04-29 at the
658:2012-06-20 at the
642:, RIAA, July 2011.
638:2013-03-05 at the
557:
377:New York Governor
357:Warner Music Group
325:Paramount Pictures
71:graduated response
3198:
3197:
3097:
3096:
3049:Open Rights Group
2669:
2668:
2656:UDP hole punching
2597:
2596:
2382:
2381:
1750:National Archives
1561:Bryn Mawr College
768:. 30 January 2017
489:In March 2013, a
401:Technology review
337:Universal Studios
191:Time Warner Cable
60:Time Warner Cable
3233:
3129:Richard Stallman
3074:Public Knowledge
3034:Creative Commons
3008:
2915:Open music model
2696:
2689:
2682:
2673:
2579:Open music model
2574:Friend-to-friend
2547:
2511:Sharing software
2177:
2152:
2145:
2138:
2129:
2120:Kravets, David,
2099:Richwine, Lisa,
2088:
2087:
2085:
2083:
2071:
2065:
2064:
2062:
2060:
2048:
2042:
2041:
2039:
2037:
2025:
2019:
2018:
2016:
2014:
2002:
1996:
1995:
1993:
1991:
1979:
1973:
1972:
1970:
1968:
1953:
1947:
1946:
1944:
1942:
1927:
1921:
1920:
1918:
1916:
1904:
1898:
1897:
1890:
1884:
1883:
1881:
1879:
1864:
1858:
1857:
1855:
1853:
1841:
1835:
1834:
1832:
1830:
1815:
1809:
1808:
1806:
1804:
1793:
1780:
1773:
1767:
1760:
1754:
1753:
1735:
1729:
1728:
1717:
1711:
1710:
1709:. March 3, 2014.
1708:
1700:
1694:
1693:
1686:
1680:
1679:
1677:
1676:
1664:
1658:
1657:
1655:
1654:
1639:
1633:
1632:
1630:
1629:
1614:
1608:
1607:
1605:
1604:
1595:. Archived from
1585:
1576:
1575:
1573:
1572:
1549:
1543:
1537:
1531:
1530:
1528:
1527:
1512:
1501:
1500:
1498:
1496:
1484:
1478:
1465:
1459:
1458:
1456:
1454:
1438:
1432:
1431:
1429:
1427:
1422:
1413:
1402:
1401:
1399:
1397:
1382:
1376:
1375:
1365:
1356:
1347:
1346:
1344:
1342:
1330:
1324:
1323:
1321:
1320:
1309:
1303:
1302:
1300:
1299:
1286:
1280:
1279:
1277:
1275:
1260:
1239:
1238:
1218:
1175:
1168:
1157:
1156:
1154:
1152:
1137:
1131:
1130:
1128:
1126:
1114:
1108:
1107:
1105:
1103:
1096:Business Insider
1086:
1080:
1079:
1077:
1075:
1058:
1052:
1051:
1049:
1047:
1035:
1029:
1016:
1010:
998:
989:
988:
981:
975:
968:
962:
927:
918:
917:
915:
914:
909:
900:
883:
882:
880:
856:
845:
844:
837:
826:
825:
814:
803:
802:
800:
799:
784:
778:
777:
775:
773:
758:
752:
751:
749:
747:
731:
725:
724:
722:
721:
709:
700:
699:
691:
685:
684:
682:
681:
669:
663:
649:
643:
629:
620:
619:
617:
616:
601:
43:(MPAA), and the
3241:
3240:
3236:
3235:
3234:
3232:
3231:
3230:
3201:
3200:
3199:
3194:
3161:Steal This Film
3148:
3124:Lawrence Lessig
3093:
3022:
2999:
2963:
2959:Video on demand
2838:
2733:Copyright troll
2706:
2700:
2670:
2665:
2603:
2593:
2538:
2459:
2433:
2388:
2378:
2327:
2201:
2170:
2161:
2156:
2096:
2091:
2081:
2079:
2073:
2072:
2068:
2058:
2056:
2050:
2049:
2045:
2035:
2033:
2027:
2026:
2022:
2012:
2010:
2005:Newman, Jared.
2004:
2003:
1999:
1989:
1987:
1986:. Torrent Freak
1981:
1980:
1976:
1966:
1964:
1955:
1954:
1950:
1940:
1938:
1929:
1928:
1924:
1914:
1912:
1906:
1905:
1901:
1892:
1891:
1887:
1877:
1875:
1866:
1865:
1861:
1851:
1849:
1843:
1842:
1838:
1828:
1826:
1825:. 3 August 2012
1817:
1816:
1812:
1802:
1800:
1795:
1794:
1783:
1774:
1770:
1762:Masnick, Mike,
1761:
1757:
1737:
1736:
1732:
1719:
1718:
1714:
1706:
1702:
1701:
1697:
1688:
1687:
1683:
1674:
1672:
1666:
1665:
1661:
1652:
1650:
1641:
1640:
1636:
1627:
1625:
1616:
1615:
1611:
1602:
1600:
1587:
1586:
1579:
1570:
1568:
1551:
1550:
1546:
1538:
1534:
1525:
1523:
1514:
1513:
1504:
1494:
1492:
1486:
1485:
1481:
1475:Wayback Machine
1466:
1462:
1452:
1450:
1440:
1439:
1435:
1425:
1423:
1420:
1415:
1414:
1405:
1395:
1393:
1384:
1383:
1379:
1363:
1358:
1357:
1350:
1340:
1338:
1332:
1331:
1327:
1318:
1316:
1311:
1310:
1306:
1297:
1295:
1288:
1287:
1283:
1273:
1271:
1262:
1261:
1242:
1220:
1219:
1178:
1169:
1160:
1150:
1148:
1139:
1138:
1134:
1124:
1122:
1116:
1115:
1111:
1101:
1099:
1088:
1087:
1083:
1073:
1071:
1060:
1059:
1055:
1045:
1043:
1037:
1036:
1032:
1026:Wayback Machine
1017:
1013:
1008:Wayback Machine
999:
992:
983:
982:
978:
969:
965:
959:Wayback Machine
948:Wayback Machine
937:Wayback Machine
928:
921:
912:
910:
907:
902:
901:
886:
858:
857:
848:
839:
838:
829:
816:
815:
806:
797:
795:
786:
785:
781:
771:
769:
760:
759:
755:
745:
743:
733:
732:
728:
719:
717:
711:
710:
703:
693:
692:
688:
679:
677:
671:
670:
666:
660:Wayback Machine
651:Bruno, Antony.
650:
646:
640:Wayback Machine
630:
623:
614:
612:
603:
602:
595:
591:
579:
549:
525:
484:burden of proof
472:
436:Beryl A. Howell
407:Stroz Friedberg
403:
313:
209:
154:
129:
93:
69:The CAS used a
12:
11:
5:
3239:
3237:
3229:
3228:
3223:
3218:
3213:
3203:
3202:
3196:
3195:
3193:
3192:
3185:
3178:
3171:
3164:
3156:
3154:
3150:
3149:
3147:
3146:
3141:
3136:
3131:
3126:
3121:
3119:Rick Falkvinge
3116:
3111:
3105:
3103:
3099:
3098:
3095:
3094:
3092:
3091:
3086:
3084:Shadow library
3081:
3076:
3071:
3066:
3061:
3059:The Pirate Bay
3056:
3051:
3046:
3041:
3036:
3030:
3028:
3024:
3023:
3021:
3020:
3014:
3012:
3005:
3001:
3000:
2998:
2997:
2992:
2987:
2982:
2980:Anti-copyright
2977:
2971:
2969:
2965:
2964:
2962:
2961:
2956:
2951:
2950:
2949:
2939:
2938:
2937:
2932:
2922:
2917:
2912:
2907:
2902:
2897:
2892:
2887:
2882:
2877:
2872:
2867:
2862:
2857:
2852:
2846:
2844:
2840:
2839:
2837:
2836:
2831:
2830:
2829:
2824:
2819:
2814:
2804:
2803:
2802:
2800:Bioprospecting
2792:
2787:
2782:
2777:
2776:
2775:
2770:
2765:
2760:
2750:
2745:
2740:
2735:
2730:
2725:
2720:
2714:
2712:
2708:
2707:
2701:
2699:
2698:
2691:
2684:
2676:
2667:
2666:
2664:
2663:
2658:
2653:
2648:
2643:
2638:
2633:
2628:
2623:
2618:
2613:
2607:
2605:
2599:
2598:
2595:
2594:
2592:
2591:
2586:
2581:
2576:
2571:
2566:
2561:
2555:
2553:
2544:
2540:
2539:
2537:
2536:
2531:
2513:
2508:
2503:
2498:
2493:
2488:
2483:
2478:
2473:
2467:
2465:
2461:
2460:
2458:
2457:
2452:
2447:
2441:
2439:
2435:
2434:
2432:
2431:
2426:
2421:
2416:
2411:
2409:Direct Connect
2406:
2401:
2395:
2393:
2384:
2383:
2380:
2379:
2377:
2376:
2371:
2366:
2361:
2356:
2351:
2346:
2341:
2335:
2333:
2329:
2328:
2326:
2325:
2320:
2315:
2310:
2305:
2300:
2295:
2290:
2285:
2280:
2275:
2270:
2265:
2260:
2255:
2250:
2245:
2240:
2235:
2230:
2225:
2220:
2215:
2209:
2207:
2203:
2202:
2200:
2199:
2194:
2189:
2187:Direct Connect
2183:
2181:
2174:
2163:
2162:
2157:
2155:
2154:
2147:
2140:
2132:
2126:
2125:
2118:
2113:Suarez, Paul,
2111:
2106:Challis, Ben,
2104:
2095:
2094:External links
2092:
2090:
2089:
2078:. Consumerisst
2066:
2043:
2020:
1997:
1974:
1948:
1922:
1907:Weber, Peter.
1899:
1885:
1859:
1848:. TorrentFreak
1836:
1810:
1781:
1768:
1755:
1745:whitehouse.gov
1730:
1712:
1695:
1681:
1667:Lesser, Jill.
1659:
1634:
1609:
1589:"Beryl Howell"
1577:
1544:
1532:
1502:
1491:. TorrentFreak
1479:
1460:
1433:
1403:
1377:
1348:
1325:
1304:
1281:
1240:
1176:
1158:
1132:
1109:
1081:
1053:
1038:Smith, Kevin.
1030:
1011:
990:
976:
963:
919:
884:
871:(4): 348–364.
846:
827:
824:. 15 Nov 2012.
804:
779:
753:
734:Lesser, Jill.
726:
716:. Ars Technica
701:
686:
676:. Ars Technica
664:
644:
621:
592:
590:
587:
586:
585:
578:
575:
548:
545:
524:
521:
471:
468:
440:computer crime
424:
423:
420:
417:
402:
399:
375:
374:
371:
368:
349:
344:
312:
309:
256:
255:
248:
245:
238:
235:
232:
208:
207:Appeal process
205:
172:
171:
168:
165:
162:
153:
150:
128:
125:
92:
89:
13:
10:
9:
6:
4:
3:
2:
3238:
3227:
3224:
3222:
3219:
3217:
3214:
3212:
3209:
3208:
3206:
3191:
3190:
3186:
3184:
3183:
3179:
3177:
3176:
3172:
3170:
3169:
3165:
3163:
3162:
3158:
3157:
3155:
3153:Documentaries
3151:
3145:
3142:
3140:
3137:
3135:
3132:
3130:
3127:
3125:
3122:
3120:
3117:
3115:
3112:
3110:
3109:Cory Doctorow
3107:
3106:
3104:
3100:
3090:
3087:
3085:
3082:
3080:
3077:
3075:
3072:
3070:
3067:
3065:
3062:
3060:
3057:
3055:
3052:
3050:
3047:
3045:
3042:
3040:
3037:
3035:
3032:
3031:
3029:
3025:
3019:
3016:
3015:
3013:
3011:Pro-copyright
3009:
3006:
3004:Organizations
3002:
2996:
2993:
2991:
2988:
2986:
2983:
2981:
2978:
2976:
2973:
2972:
2970:
2966:
2960:
2957:
2955:
2952:
2948:
2945:
2944:
2943:
2940:
2936:
2933:
2931:
2928:
2927:
2926:
2923:
2921:
2918:
2916:
2913:
2911:
2908:
2906:
2903:
2901:
2898:
2896:
2893:
2891:
2888:
2886:
2883:
2881:
2878:
2876:
2873:
2871:
2868:
2866:
2863:
2861:
2858:
2856:
2853:
2851:
2848:
2847:
2845:
2841:
2835:
2834:Public domain
2832:
2828:
2825:
2823:
2820:
2818:
2815:
2813:
2810:
2809:
2808:
2805:
2801:
2798:
2797:
2796:
2793:
2791:
2788:
2786:
2783:
2781:
2778:
2774:
2771:
2769:
2766:
2764:
2761:
2759:
2756:
2755:
2754:
2751:
2749:
2746:
2744:
2741:
2739:
2736:
2734:
2731:
2729:
2726:
2724:
2721:
2719:
2716:
2715:
2713:
2709:
2704:
2697:
2692:
2690:
2685:
2683:
2678:
2677:
2674:
2662:
2659:
2657:
2654:
2652:
2649:
2647:
2646:Super-seeding
2644:
2642:
2639:
2637:
2634:
2632:
2629:
2627:
2626:Peer exchange
2624:
2622:
2621:NAT traversal
2619:
2617:
2614:
2612:
2609:
2608:
2606:
2600:
2590:
2587:
2585:
2582:
2580:
2577:
2575:
2572:
2570:
2567:
2565:
2562:
2560:
2559:Anonymous P2P
2557:
2556:
2554:
2552:
2548:
2545:
2541:
2535:
2534:Legal aspects
2532:
2529:
2525:
2521:
2517:
2514:
2512:
2509:
2507:
2504:
2502:
2499:
2497:
2496:Music sharing
2494:
2492:
2491:Image sharing
2489:
2487:
2484:
2482:
2479:
2477:
2476:Broadcatching
2474:
2472:
2469:
2468:
2466:
2462:
2456:
2453:
2451:
2448:
2446:
2443:
2442:
2440:
2436:
2430:
2427:
2425:
2422:
2420:
2417:
2415:
2412:
2410:
2407:
2405:
2402:
2400:
2397:
2396:
2394:
2392:
2385:
2375:
2372:
2370:
2367:
2365:
2362:
2360:
2357:
2355:
2352:
2350:
2347:
2345:
2342:
2340:
2337:
2336:
2334:
2330:
2324:
2321:
2319:
2316:
2314:
2311:
2309:
2306:
2304:
2301:
2299:
2296:
2294:
2291:
2289:
2286:
2284:
2281:
2279:
2276:
2274:
2271:
2269:
2266:
2264:
2261:
2259:
2256:
2254:
2251:
2249:
2246:
2244:
2241:
2239:
2236:
2234:
2231:
2229:
2226:
2224:
2221:
2219:
2216:
2214:
2211:
2210:
2208:
2206:Decentralized
2204:
2198:
2195:
2193:
2190:
2188:
2185:
2184:
2182:
2178:
2175:
2173:
2168:
2164:
2160:
2153:
2148:
2146:
2141:
2139:
2134:
2133:
2130:
2123:
2119:
2116:
2112:
2109:
2105:
2102:
2098:
2097:
2093:
2077:
2070:
2067:
2055:. Consumerist
2054:
2047:
2044:
2031:
2024:
2021:
2008:
2001:
1998:
1985:
1978:
1975:
1963:
1959:
1952:
1949:
1937:
1933:
1926:
1923:
1910:
1903:
1900:
1895:
1889:
1886:
1873:
1869:
1863:
1860:
1847:
1840:
1837:
1824:
1820:
1814:
1811:
1798:
1792:
1790:
1788:
1786:
1782:
1778:
1772:
1769:
1765:
1759:
1756:
1751:
1747:
1746:
1741:
1734:
1731:
1726:
1722:
1716:
1713:
1705:
1699:
1696:
1691:
1685:
1682:
1670:
1663:
1660:
1649:on 2007-10-12
1648:
1644:
1638:
1635:
1623:
1619:
1613:
1610:
1599:on 2013-03-12
1598:
1594:
1590:
1584:
1582:
1578:
1567:on 2013-01-05
1566:
1562:
1558:
1554:
1548:
1545:
1542:
1536:
1533:
1522:
1518:
1511:
1509:
1507:
1503:
1490:
1483:
1480:
1476:
1472:
1469:
1464:
1461:
1448:
1444:
1437:
1434:
1419:
1412:
1410:
1408:
1404:
1391:
1387:
1381:
1378:
1373:
1369:
1362:
1355:
1353:
1349:
1336:
1329:
1326:
1314:
1308:
1305:
1293:
1292:
1285:
1282:
1269:
1265:
1259:
1257:
1255:
1253:
1251:
1249:
1247:
1245:
1241:
1236:
1232:
1228:
1224:
1217:
1215:
1213:
1211:
1209:
1207:
1205:
1203:
1201:
1199:
1197:
1195:
1193:
1191:
1189:
1187:
1185:
1183:
1181:
1177:
1173:
1167:
1165:
1163:
1159:
1146:
1142:
1136:
1133:
1120:
1113:
1110:
1098:
1097:
1092:
1089:Bort, Julie.
1085:
1082:
1070:
1069:
1064:
1057:
1054:
1041:
1034:
1031:
1027:
1023:
1020:
1015:
1012:
1009:
1005:
1002:
997:
995:
991:
986:
980:
977:
973:
967:
964:
960:
956:
953:
949:
945:
942:
938:
934:
931:
926:
924:
920:
906:
899:
897:
895:
893:
891:
889:
885:
879:
874:
870:
866:
862:
855:
853:
851:
847:
842:
836:
834:
832:
828:
823:
819:
813:
811:
809:
805:
794:
790:
783:
780:
767:
763:
757:
754:
741:
737:
730:
727:
715:
708:
706:
702:
697:
690:
687:
675:
668:
665:
661:
657:
654:
648:
645:
641:
637:
634:
628:
626:
622:
611:
607:
600:
598:
594:
588:
584:
581:
580:
576:
574:
572:
567:
566:NBC Universal
563:
553:
546:
544:
540:
538:
534:
530:
522:
520:
517:
512:
508:
504:
500:
495:
492:
487:
485:
481:
476:
469:
467:
465:
460:
455:
450:
447:
445:
441:
437:
433:
429:
421:
418:
415:
414:
413:
410:
408:
400:
398:
394:
391:
388:
383:
380:
372:
369:
366:
362:
358:
354:
351:RIAA members
350:
348:
345:
342:
338:
334:
330:
326:
322:
319:MPAA members
318:
317:
316:
310:
308:
304:
301:
295:
293:
288:
284:
281:
276:
274:
268:
265:
259:
253:
252:public domain
249:
246:
243:
239:
236:
233:
230:
229:
228:
225:
221:
219:
215:
206:
204:
200:
197:
194:
192:
187:
183:
178:
169:
166:
163:
159:
158:
157:
151:
149:
147:
142:
137:
132:
126:
124:
121:
116:
112:
110:
106:
102:
98:
90:
88:
85:
82:
80:
76:
72:
67:
65:
61:
57:
53:
49:
46:
42:
38:
34:
30:
26:
22:
18:
3211:Computer law
3187:
3180:
3173:
3166:
3159:
3144:Aaron Swartz
3069:Pirate Party
3027:Pro-copyleft
2905:Open content
2890:Free content
2790:Orphan works
2785:Music piracy
2604:technologies
2481:Disk sharing
2288:Perfect Dark
2080:. Retrieved
2069:
2057:. Retrieved
2046:
2034:. Retrieved
2023:
2011:. Retrieved
2000:
1988:. Retrieved
1977:
1965:. Retrieved
1961:
1951:
1939:. Retrieved
1935:
1925:
1913:. Retrieved
1902:
1888:
1876:. Retrieved
1871:
1862:
1850:. Retrieved
1839:
1827:. Retrieved
1823:TorrentFreak
1822:
1813:
1801:. Retrieved
1771:
1758:
1748:– via
1743:
1733:
1725:TorrentFreak
1715:
1698:
1684:
1673:. Retrieved
1662:
1651:. Retrieved
1647:the original
1637:
1626:. Retrieved
1622:the original
1612:
1601:. Retrieved
1597:the original
1569:. Retrieved
1565:the original
1556:
1547:
1535:
1524:. Retrieved
1521:Ars Technica
1493:. Retrieved
1482:
1463:
1451:. Retrieved
1449:. Condé Nast
1447:Ars Technica
1446:
1436:
1424:. Retrieved
1394:. Retrieved
1389:
1380:
1371:
1367:
1339:. Retrieved
1328:
1317:. Retrieved
1307:
1296:. Retrieved
1290:
1284:
1272:. Retrieved
1267:
1226:
1222:
1149:. Retrieved
1144:
1135:
1123:. Retrieved
1112:
1100:. Retrieved
1094:
1084:
1072:. Retrieved
1066:
1056:
1044:. Retrieved
1033:
1014:
979:
966:
911:. Retrieved
868:
864:
796:. Retrieved
792:
782:
770:. Retrieved
766:Ars Technica
765:
756:
744:. Retrieved
739:
729:
718:. Retrieved
698:. Bloomberg.
689:
678:. Retrieved
667:
647:
613:. Retrieved
610:Ars Technica
609:
558:
541:
533:Ars Technica
526:
503:TorrentFreak
496:
488:
477:
473:
461:
457:
452:
448:
425:
411:
404:
395:
392:
384:
379:Andrew Cuomo
376:
314:
305:
296:
289:
285:
277:
269:
264:Ars Technica
263:
260:
257:
226:
222:
210:
201:
198:
195:
173:
155:
143:
139:
134:
130:
117:
113:
94:
86:
83:
74:
68:
39:(RIAA), the
20:
16:
15:
3139:Peter Sunde
3134:Peter Suber
2954:Share-alike
2925:Open source
2920:Open patent
2616:Merkle tree
2584:Private P2P
2516:Web hosting
2501:Peercasting
2387:Comparisons
2339:Audiogalaxy
2180:Centralized
2009:. TechHives
970:Joe Flint,
292:due process
214:arbitration
97:MarkMonitor
52:Cablevision
25:copyrighted
3205:Categories
3064:Piratbyrån
2812:biological
2743:Gripe site
2438:Hyperlinks
2429:WebTorrent
2404:BitTorrent
2308:WebTorrent
2293:Retroshare
2283:OnionShare
2213:BitTorrent
1675:2013-03-04
1653:2013-03-06
1628:2013-03-04
1603:2013-03-04
1571:2013-03-04
1526:2013-03-04
1374:: 165–186.
1319:2013-03-08
1298:2013-05-12
913:2013-03-03
798:2021-01-21
772:30 January
720:2013-02-26
680:2013-02-26
615:2013-01-24
589:References
454:available.
120:IP address
27:works via
2968:Movements
2795:Biopiracy
2506:Seedboxes
2424:Gnutella2
2253:Gnutella2
2228:FastTrack
2172:protocols
2032:. Variety
793:The Verge
501:CEO told
499:Sonic.net
464:Avi Rubin
365:EMI Music
273:discovery
2947:contests
2935:software
2930:hardware
2870:Copyleft
2843:Concepts
2827:trolling
2817:software
2705:activism
2602:Internal
2543:Concepts
2520:Freesite
2455:Metalink
2419:Gnutella
2359:Morpheus
2354:LimeWire
2332:Historic
2248:Gnutella
2238:Hyphanet
2197:Soulseek
2192:Soribada
2167:Networks
1962:The Hill
1941:30 April
1915:30 April
1829:7 August
1803:April 1,
1471:Archived
1341:25 April
1229:: 1–66.
1022:Archived
1004:Archived
955:Archived
944:Archived
933:Archived
746:30 April
656:Archived
636:Archived
577:See also
537:fair use
428:lobbying
242:fair use
186:AT&T
182:AT&T
91:Overview
48:AT&T
3182:TPB AFK
3079:Sci-Hub
2807:Patents
2758:digital
2569:Darkweb
2564:Darknet
2551:Privacy
2528:ZeroNet
2414:eDonkey
2391:clients
2364:Napster
2323:ZeroNet
2303:Tribler
2223:eDonkey
2082:6 March
2059:6 March
2036:6 March
2013:6 March
1990:6 March
1967:6 March
1878:6 March
1852:6 March
1495:6 March
1396:9 March
1274:5 March
1235:2145059
1151:4 March
1125:6 March
1102:3 April
1074:6 March
1046:6 March
571:Comcast
562:Comcast
531:, told
516:Verizon
311:History
177:Verizon
64:Verizon
56:Comcast
3102:People
2773:videos
2753:Mashup
2711:Issues
2471:Backup
2450:Magnet
2344:CuteMX
2278:OpenFT
2243:GNUnet
1453:29 May
1426:29 May
1233:
1121:. CNET
434:) was
363:, and
339:, and
161:sites.
152:Alerts
127:Intent
62:, and
2768:novel
2763:music
2641:SHA-2
2636:SHA-1
2374:WASTE
2369:Scour
2349:Kazaa
2318:Winny
2313:WinMX
2298:Share
2233:Fopnu
1707:(PDF)
1421:(PDF)
1364:(PDF)
908:(PDF)
2524:IPFS
2464:Uses
2445:eD2k
2273:LBRY
2263:IPFS
2084:2014
2061:2014
2038:2014
2015:2014
1992:2014
1969:2014
1943:2013
1917:2013
1880:2014
1854:2014
1831:2012
1805:2013
1541:2005
1497:2014
1455:2014
1428:2014
1398:2013
1343:2013
1276:2013
1231:SSRN
1153:2013
1127:2014
1104:2014
1076:2014
1048:2014
774:2017
748:2013
564:and
511:RIAA
509:and
507:MPAA
442:and
370:A2IM
347:IFTA
2589:Tor
2389:of
2268:Kad
2258:I2P
2218:DAT
873:doi
21:CAS
3207::
2526:,
2522:,
1960:.
1934:.
1870:.
1821:.
1784:^
1742:.
1723:.
1591:.
1580:^
1559:.
1555:.
1519:.
1505:^
1445:.
1406:^
1388:.
1372:30
1370:.
1366:.
1351:^
1266:.
1243:^
1227:23
1225:.
1179:^
1161:^
1143:.
1093:.
1065:.
993:^
950:;
939:;
922:^
887:^
867:.
863:.
849:^
830:^
820:.
807:^
791:.
764:.
738:.
704:^
624:^
608:.
596:^
446:.
359:,
355:,
335:,
331:,
327:,
323:,
148:.
111:.
66:.
58:,
54:,
50:,
2695:e
2688:t
2681:v
2530:)
2518:(
2169:,
2151:e
2144:t
2137:v
2086:.
2063:.
2040:.
2017:.
1994:.
1971:.
1945:.
1919:.
1882:.
1856:.
1833:.
1807:.
1752:.
1678:.
1656:.
1631:.
1606:.
1574:.
1529:.
1499:.
1457:.
1430:.
1400:.
1345:.
1322:.
1301:.
1278:.
1237:.
1155:.
1129:.
1106:.
1078:.
1050:.
1028:.
961:.
916:.
881:.
875::
869:9
801:.
776:.
750:.
723:.
683:.
618:.
367:.
343:.
244:.
19:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.