Unclogging the Legitimate P2P

Total Page:16

File Type:pdf, Size:1020Kb

Unclogging the Legitimate P2P Unclogging the Legitimate P2P. Abstract: concept is that there are many PCs in homes and offices that lie idle for large chunks of time. Why not leverage these idle resources to do Peer-to-peer systems have recently gained a lot something useful, like share computation or of attention in social, academic, and commercial share content? communities. Peer-to-peer systems have become synonymous with file-sharing as Peer-to-peer systems, beginning with Napster, systems like Napster, Gnutella, Kazaa and Gnutella, and several other related systems, BitTorrent have enjoyed explosive popularity became immensely popular in the past few over the last few years. The awareness of P2P years, primarily because they offered a way for networking grew from the illicit ‘sharing’ of music people to get music without paying for it. files, much to the chagrin of content holders. However, under the hood, these systems represent a paradigm shift from the usual web It has been long believed that the sole purpose client/server model, where there are no of P2P is to facilitate users in indulging in non “servers;” every system acts as a peer, and by legitimate content piracy. P2P service providers virtue of the huge number of peers, objects can have had to deal with numerous law suits with be widely replicated, providing the opportunity accusations of Copyright Infringement against for high availability and scalability, despite the them. In this paper We take the position that lack of centralized infrastructure. P2P has more on offer than just an easy way of ‘pirating’ digital content on the Web. We provide Peer-to-Peer offers an easy hassle free form of an argument that despite the prevailing communication between two hosts without the perceptions of P2P as synonymous with content need of a centralized server.P2P data currently piracy, P2P is emerging as viable means of contributes to 44% of all consumer traffic moved distributing legitimate content. across the Internet, and a total of 33.6% in North America alone. With content owners continually 1. Introduction: looking to P2P as a cost effective tool to distribute their content, that figure is only going A peer-to-peer (P2P) distributed system is one to grow, the market researchers believe. Of the in which participants rely on one another for P2P material distributed, over 70% consists of service, rather than solely relying on dedicated audio and video files, with the number of audio and often centralized infrastructure. Instead of files transferred far outweighing the amount of strictly decomposing the system into clients video and other files. (which consume services) and servers (which provide them), peers in the system can elect to Napster was the pioneer in introducing the P2P provide services as well as consume them. The networks to share music files on the internet in membership of a P2P system is relatively 1999. Napster's winning idea was in giving P2P, unpredictable: service is provided by the peers for free, to the masses. At the same time as that happen to be participating at any given time. Napster was released three factors greatly In some cases, peer-to-peer communications is increased its mass popularity - higher implemented by giving each communication bandwidth, more powerful desktop processors node both server and client capabilities. In and cheaper storage. Add to this the fact that for recent usage, peer-to-peer has come to many American homes, Internet access is flat describe applications in which users can use the rate, which led to people leaving their computers Internet to exchange files with each other on 24/7 downloading music. directly or through a mediating server. One of the early driving forces behind the peer-to-peer However the huge growth of Napster was a Section 3 we will identify the primary arguments great concern for record companies around the identifying P2P as content provider’s folly by world, and on April 13th 2000, nearly one year providing illegal content and in the following after its release, Rock Band Metallica sued sections describe the legitimate uses of P2P Napster for copyright infringement following which are on an ascent. which Napster had to pay 26 million to songwriters and publishers. This was just the 3. Counterclaims: beginning of a long series of lawsuits against P2P service providers for copyright infringement It is claimed that P2P have little to zero which included the lawsuit against Grokster by legitimate use and hence came the inferences MGM Inc in which Grokster was held liable for that P2P equals piracy. The concepts of P2P copyright violation by the Supreme Court. and Copyrights have been closely related with content providers expressing their concern over illegal distribution of their content on the Web. 2. Argument: The lawsuits filed against some major P2P service providers stand a testimony to this fact. The nature of digital file-sharing technology inevitably implicates copyright law. First, since The infamous A&M Records Inc v Napster Inc every digital file is “fixed” for purposes of lawsuit exposed the primary short comings of a copyright law (whether on a hard drive, CD, or P2P service in failing to provide legal content merely in RAM), the files being shared generally much to the annoyance of content providers. qualify as copyrighted works. Second, the Napster provided a platform for users to upload transmission of a file from one person to another and download music files in a compressed results in a reproduction, a distribution, and digital format. The plaintiffs were major record possibly a public performance (in the world of companies who saw the potential for this copyright law, “public performance” includes the technology to impact their sales, and quickly act of transmitting a copyrighted work to the filed suit against Napster as a "contributory and public). To a copyright lawyer, every vicarious copyright infringer." The United States unauthorized reproduction, distribution, and District Court found that Napster had contributed public performance requires an explanation, and to the infringement of copyrights owned by the thus file-sharing systems seem suspicious from plaintiffs. Napster tried to invoke the betamax the outset defense which had helped Sony Corp prove its innocence against Universal Studios but this did The Widespread notion of P2P is that it does not not help as Napster was held responsible for the serve any purpose more than just providing violation. illegal digital content on the web. P2P have been often referred to as the ‘Bad Boys of Content’. The fundamental reason for this notion is the The Second landmark case was that of MGM number of copyright infringement cases against Studios, Inc. v. Grokster, Ltd. in which the P2P service providers. The effects of this were Supreme Court unanimously held that defendant that P2P have been synonymous with piracy of P2P file sharing companies Grokster and digital content leading to the widely held Streamcast (maker of Morpheus) could be sued for inducing copyright infringement for acts taken perceptions that P2P has little legitimate use. in the course of marketing file sharing software. The plaintiffs were a consortium of 28 of the We, though agree that much of the earlier use of largest entertainment companies (led by Metro- P2P was taken in providing this type of content Goldwyn-Mayer studios). The case has been on the Web, it has moved on from that state in called the most important copyright infringement which numerous legitimate P2P uses have been case in decades. Following this, Grokster announced that it would no longer be providing identified and efforts are going to exploit the peer-to-peer service to its users. decentralized, fault tolerant architecture of P2P to provide more legal services in P2P. In For a long time now, P2P service providers have rise. This forms the basis for us not to support been on the edge treading a fine line between the view that Peer-to-Peer has no legitimate legitimacy and piracy. A study conducted by the use. Multimedia Intelligence group state that among all of the internet traffic 44% is P2P and almost 4. Legitimate P2P, Current all of it is illegal. Even in North America P2P traffic, which is mostly illegal constitutes 33% of Scenario: the total internet traffic. These are astounding figures which indicate that P2P technology has The purpose and drive towards building legal been flourishing despite the numerous copyright P2P has been on a rise. With more content infringement cases that P2P have had to deal providers realizing the importance of P2P in with. providing content at a low price, an increasing number of legitimate uses of P2P have come A new study conducted by MCPS-PRS Alliance forward. P2P is "starting to see a lot more and Big Champagne, an online media legitimate uses," says Frank Dickson of measurement company, claims that MultiMedia Intelligence. The Company’s new downloading through P2P is ‘entrenched’. report on P2P growth projects an astounding Researchers analyzed the downloading of 400 percent increase in such Internet traffic over Radiohead's new album InRainbows – which the next five years. But more surprising than the was made freely available through an official growth rate, which has been in decline now for website. Some 2.3 million people downloaded some time, is the fact that it's P2P's lawful uses Radiohead’s latest album from BitTorrent that are seeing the biggest growth. sources - during the two months it was legally available for free. Not only did many more fans For small content providers, especially illegally download the album than those who companies involved in video, paying for a bought it in shops, they downloaded it from content delivery network can eat up a significant illegal P2P and torrent sites like Pirate Bay than chunk of revenue.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Free C Ulture Forum
    Free C ulture Free C ulture Forum March 23, 2006 11:30 am - 2:30 pm 450 Dodge Hall, Northeastern University PROGRAM Welcome Dani Capalbo NU Student, Class of 2010 Edward A. Warro Dean of Libraries Introduction of Panelists Marcus Breen Communication Studies Panelists Lawrence Lessig Derek Slater Nelson Pavlosky Will Wakeling Bios Additional Resources Lawrence Lawrence Lessig is a Professor of Law at Stanford Law School and founder of the school's The World Wide Web holds many examples of projects whose intent is to facilitate Center for Internet and Society. Prior to joining the Stanford faculty, he was the Berkman the sharing of ideas, scholarly research and creative works. Professor of Law at Harvard Law School and a Professor at the University of Chicago. He clerked for Judge Richard Posner on the 7th Circuit Court of Appeals and Justice Antonin Scalia on the United States Supreme Court. Professor Lessig represented web site operator Creative Commons (http://creativecommons.org/) is a nonprofit organization that Eric Eldred in the ground-breaking case Eldred v. Ashcroft, a challenge to the 1998 Sonny offers flexible copyright licenses for original works; creators may choose from a range Bono Copyright Term Extension Act. He has won numerous awards, including the Free of protections and freedoms. Software Foundation's Freedom Award, and was named one of Scientific American's Top 50 Visionaries, for arguing "against interpretations of copyright that could stifle innovation and Creative Commons Education (http://creativecommons.org/education/) helps with online discourse online." Professor Lessig is the author of Free Culture (2004), The Future of Ideas publishing of educational materials.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • Testimony of Authors Guild President Scott Turow Before the Senate
    My name is Scott Turow. I’m the president of the Authors Guild, the largest society of published authors in the U.S., representing more than 8,500 book authors and freelance writers. Our members represent the broad sweep of American authorship, including literary and genre fiction, nonfiction, trade, academic, and children’s book authors, textbook authors, freelance journalists and poets.1 Guild members have won countless honors and all major literary awards, including the Nobel Prize for Literature.2 The Authors Guild promotes the professional interests of authors: we’re advocates for effective copyright protection, fair contracts, and free expression. It’s a pleasure and an honor to be here this morning. I’d like especially to thank this committee for recognizing the severity of the problem we all face and getting the ball rolling with COICA in the fall, which recognized this central and unavoidable truth: any serious attempt to address online piracy must address the third-party enablers of infringement. Anything that doesn’t address those enablers is, frankly, a pretend solution to a real problem. Our Copyright Policy Inadvertently Encourages Investments in Technologies and Services That Promote Trafficking in Stolen Books, Music, and Movies After 300 years as one of history's greatest public policy successes, copyright is coming undone. As we meet here this morning, our well-intended policy toward copyright online is 1 The Guild had its beginnings as the Authors League of America, which was founded in 1912 by a group of book authors (including Theodore Roosevelt, who served as the League’s founding vice president), short story writers, freelance journalists and a smattering of dramatists.
    [Show full text]
  • Confidential Data-Outsourcing And
    Konrad Jünemann Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self-Optimizing P2P-Networks Konrad Jünemann Konrad Jünemann Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self- Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems by Konrad Jünemann Dissertation, Karlsruher Institut für Technologie (KIT) Fakultät für Informatik, 2014 Tag der mündlichen Prüfung: 01. Dezember 2014 Referenten: Prof. Dr. rer. nat. Hannes Hartenstein Prof. Dr. rer. nat. Ralf Reussner Impressum Karlsruher Institut für Technologie (KIT) KIT Scientific Publishing Straße am Forum 2 D-76131 Karlsruhe KIT Scientific Publishing is a registered trademark of Karlsruhe Institute of Technology. Reprint using the book cover is not allowed. www.ksp.kit.edu This document – excluding the cover – is licensed under the Creative Commons Attribution-Share Alike 3.0 DE License (CC BY-SA 3.0 DE): http://creativecommons.org/licenses/by-sa/3.0/de/ The cover page is licensed under the Creative Commons Attribution-No Derivatives 3.0 DE License (CC BY-ND 3.0 DE): http://creativecommons.org/licenses/by-nd/3.0/de/ Print on Demand 2015 ISBN 978-3-7315-0328-6 DOI 10.5445/KSP/1000045068 Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften von der Fakultat¨ fur¨ Informatik des Karlsruher Instituts fur¨ Technologie (KIT) genehmigte Dissertation von Konrad Junemann¨ aus Wilhelmshaven Tag der mundlichen¨ Prufung:¨ 01.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Causes, Effects and Solutions of Piracy in the Computer Software Market
    Review of Economic Research on Copyright Issues, 2006, vol. 4(1), pp. 63-86 CAUSES,EFFECTSANDSOLUTIONSOFPIRACYINTHE COMPUTER SOFTWARE MARKET AMY MARSHALL Abstract. Much literature has been devoted to exploring the protection of computer programs. The decreasing effectiveness of copyright and patents has been extensively examined and alternative forms of protection, both phys- ical and market-based, have been laid out. A large proportion of writings is dedicated to describing the significant network externalities that exist in thesoftwaremarket,andtheeffect that these have on the optimal level of protection. A large number of surveys have been undertaken to analyse the characteristics of software pirates and their incentives to pirate. This paper attempts to provide an overview of this literature. 1. Introduction The widespread incidence of unauthorised use and copying of computer software has had a devastating impact on the software industry in recent years. Significantly costly time and effort is invested by software programmers in developing a program and with software piracy preventing these developers from recouping remuneration from users, the incentives existing to produce new software may not be sufficient enough for any further development, causing the industry to stagnate. This would be costly to not only computer programmers but also to the government who would miss out on a significant amount of taxation revenue and society as a whole, whose software choices would be diminished. The traditional protector of intellectual property is copyright, defining the rights of ownership of creators and allowing for the enforcement of these rights. The basis behind copyright law is to provide the means for a creator to receive sufficient remuneration for development to occur.
    [Show full text]
  • Groundbreaking Ceremony Held for New ECE Building by TOM MOONE
    NEWS FOR ECE ILLINOIS ALUMNI AND FRIENDS WINTER 2011 Also in this issue: New Assured Cloud Computing Center to be established at Illinois Groundbreaking Solar Decathlon: Helping students and the world ceremony held Alumnus Michael McCorquodale is the first ECE Engineer for new ECE building in Residence Department of Electrical and Computer Engineering Breaking ground on the future Dear alumni and friends, I have good news! The dream of a new building for our department, after many years of planning and anticipation, is now becoming a reality. Last month’s groundbreaking of the new ECE building marks the beginning of a new era for our department, a department of global influence and impact, thanks to the excellence of its faculty and alumni. And it is this global impact that makes this groundbreaking special not only for our department, our college, our campus, and our university, but also for the state of Illinois, our nation, and the world. Our faculty and our alumni have been among the pioneers of the major technological innovations that are the bedrock of today’s computing and communication technologies. The marvel of the computing technology and the communications infrastructure we enjoy today, and its catalytic role in improving living standards around the globe, would not have been possible without John Bardeen’s invention of the transistor or Jack Kilby’s brilliant idea of the integrated circuit. These Nobel Prize-winning innovations by two giants of the ECE ILLINOIS community have been followed by many more groundbreaking advances by ECE faculty and alumni, advances that inspire and drive our quest for a sustainable future for all.
    [Show full text]
  • Online Piracy and Consumer Affect to Pay Or Not to Pay
    Online Piracy and Consumer Affect To pay or not to pay Master Thesis Psychology: Consumer Behavior Matthias W. Kampmann Online Piracy and Consumer Affect 1 Running head: ONLINE PIRACY AND CONSUMER AFFECT Online Piracy and Consumer Affect: To pay or not to pay Matthias W. Kampmann University of Twente Master Thesis Psychology: Consumer Behavior Instructors: Dr. M. Galetzka & Dr. P.W. de Vries June 2010 Online Piracy and Consumer Affect 2 Abstract Online music piracy is a growing problem for the economy. Yet research on the underlying processes that govern online music piracy behavior is limited. This study addresses this shortcoming by combining insights from research on appraisal theory and consumer reactance into a conceptual framework. The results of an online survey study with N = 160 participants indicate that a price increase that leads to more profits for the music industry instead of more profits for young artists is seen as less fair and music files are perceived to have less value. Price affect could however not be confirmed as a significant predictor of consumer behavior. Ethical beliefs did not moderate the appraisal process but they have a strong negative influence on online piracy behavior. An adjusted model explains 35% of variance in the online piracy intention measure. Theoretical and managerial implications and possibilities for future research are discussed. Online Piracy and Consumer Affect 3 Online Piracy and Consumer Affect: To pay or not to pay Digital piracy has been a byproduct of the digitalized world since the early days of personal computers (Gopal, Sanders, Bhattacharjee, Agrawal, & Wagner, 2004). With the rise of the internet digital piracy has shifted from illegal copies of physical goods like floppy disks, CDs or DVDs towards the theft of intangible goods like music files, video files and computer software (Wall, 2005).
    [Show full text]
  • Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow
    Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow To cite this version: Ricci Ieong, Kam-Pui Chow. Validation Rules for Enhanced Foxy P2P Network Investigations. 10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73- 83, 10.1007/978-3-662-44952-3_6. hal-01393761 HAL Id: hal-01393761 https://hal.inria.fr/hal-01393761 Submitted on 8 Nov 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 6 VALIDATION RULES FOR ENHANCED FOXY P2P NETWORK INVESTIGATIONS Ricci Ieong and Kam-Pui Chow Abstract Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are sub- mitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Piracy Landscape Study
    Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy Prepared for the U.S. Patent and Trademark Office Solicitation Number: 1333BJ19Q00142004 Brett Danaher Michael D. Smith Rahul Telang Chapman University Carnegie Mellon University Carnegie Mellon University This Version: March 20, 2020 Table of Contents Executive Summary ...................................................................................................................... 3 1. The Piracy Ecosystem........................................................................................................... 4 1.1 Piracy of Physical Goods................................................................................................ 6 1.1.1 Manufacturing......................................................................................................... 7 1.1.2 Discovery ................................................................................................................ 7 1.1.3 Distribution ............................................................................................................. 8 1.1.4 Communication, Payment Processing and Fulfillment ......................................... 11 1.2 Piracy of Digital Goods ................................................................................................ 11 1.2.1 Sources.................................................................................................................. 12 1.2.2
    [Show full text]