Anatomia Do Bittorrent: a Ciência Da Computaç˜Ao Por Trás Do Protocolo

Total Page:16

File Type:pdf, Size:1020Kb

Anatomia Do Bittorrent: a Ciência Da Computaç˜Ao Por Trás Do Protocolo Anatomia do BitTorrent: a Ci^enciada Computa¸c~aopor tr´asdo protocolo Paulo Cheadi Haddad Filho | ∼paulochf Orientador: Jos´eCoelho de Pina | ∼coelho Objetivo BitTorrent: vis~aoda Internet Funcionamento do BitTorrent I estudar o protocolo do BitTorrent 1. busca de conte´udoem sites buscadores de torrent I identificar seu car´aterinterdisciplinar na Computa¸c~aopelo estudo 2. obten¸c~ao do arquivo .torrent, que ´eum dicion´ariode dados de seus componentes internos sobre os arquivos desejados, onde est~aocontidas informa¸c~oescomo announces (endere¸cosde trackers), n´umerode partes e lista dos I ilustrar a implementa¸c~aodesses componentes utilizando o c´odigo- fonte do cliente Transmission arquivos 3. cliente BitTorrent usa o announce para fazer um pedido de Introdu¸c~ao peers, usando uma requisi¸c~aoHTTP GET e passando dois iden- tificadores: um seu e o do torrent I redes peer-to-peer (P2P): redes de arquitetura descentralizada (sem um servidor central) e distribu´ıdaentre v´ariosn´osda rede Ex: http://tracker.publicbt.com:80/announce?info_ (peers) hash=<hash-do-torrent>&peer_id=<hash-do-cliente> Napster foi a primeira rede P2P, em 1999 4. o tracker adiciona o peer requisitante `asua lista e devolve I para ele um dicion´ariocontendo: uma lista aleat´oriade outros peers para aquele identificador de torrent, quantidades de seeders Hist´oriado BitTorrent e leechers, entre outros dados I lan¸cadopor Bram Cohen em 2001 Ex: f`complete': 1, `downloaded': 11, `incomplete': 6, `interval': 1732, `min interval': 866, `peers': flista-de-hash-ids-de-peersgg I protocolo P2P mais usado no mundo, que gera ≈ 23% do tr´afego de upload, ≈17% de download e ≈10% de todo o tr´afegona Am´erica 5. o cliente, para entrar no swarm, envia mensagens para cada Latina [1] um dos peers recebidos, at´eobter uma resposta I usado por Twitter [2] e Facebook [3] para distribuir os c´odigosdos 5.1 quando obt´emresposta, adiciona o endere¸co desta `asua seus sites para seus servidores \lista de contatos", que ´eacess´ıvel por outros peers, e imple- I baseado em trocas justas de arquivos e comunica¸c~aoeficiente mentada como uma tabela hash especial, do algoritmo Kademlia. entre peers Esse algoritmo faz com que uma busca por novos peers seja dis- tribu´ıda entre os que j´as~aoconhecidos, formando assim uma I peers sugadores (leechers) e semeadores (seeders), pertencentes a um enxame (swarm), trocam partes de um torrent entre si grande \lista telef^onica". Essa estrutura de dados ´echamada de tabela hash distribu´ıda(DHT) listas de peers mantidas por rastreadores (trackers) e, geralmente, I 5.2 ap´oso primeiro contato, o cliente entra no swarm e recebe pelos pr´oprios peers uma parte aleat´oriado torrent, se tornando um leecher 5.3 como leecher, o cliente entra no \jogo de trocas" do swarm, Transmission onde s´orecebe uma parte do torrent se fornecer outra 5.4 ao t´ermino do download, o usu´ario se torna um seeder, I programa cliente de c´odigoaberto para o proto- colo BitTorrent Trocas das partes de um arquivo torrent em um swarm passando a unicamente fornecer partes do torrent I escrito nas linguagens C e C++ ABC no BCC: disciplinas relacionadas I v´ariasplataformas: daemon (servi¸code segundo plano), roteadores, linha de comando e aplica¸c~aoem I Desenv. de Algoritmos, Estrutura de Dados, An´alise de janela Algoritmos: tabela hash (DHT), listas ligadas, ´arvores e estruturas compostas BitTorrent: vis~aodo usu´arioe ´areasda Computa¸c~ao I Prog. para Redes: protocolos de rede HTTP e UDP, seguran¸ca SSL, conex~oesde rede IPv4 e IPv6, roteamento (NAT PMP), troca de mensagens entre peers, descoberta de peers locais (Multicast) I Intro. `aCriptografia: integridade e privacidade de dados (SHA-1, RC4) I Sistemas Operacionais, Prog. Concorrente, Intro. `aComp. Paralela e Distribu´ıda: threads, DHT, leitura e escrita de partes de arquivo, retomada de download (download resume) I Lab. de Programa¸c~ao1{2: organiza¸c~aodo c´odigo,Automake, Autoconf, testes de c´odigo Refer^encias [1] Sandvine Inc. Global Internet Phenomena Report | 1H 2013, 2013. http://macaubas.com/wp-content/uploads/2013/05/Sandvine_ Global_Internet_Phenomena_Report_1H_2013.pdf [2] Ernesto. BitTorrent Makes Twitter's Server Deployment 75x Faster, 16 de julho de 2013. TorrentFreak http://torrentfreak.com/ bittorrent-makes-twitters-server-deployment-75-faster-100716/ [3] Ernesto. Facebook Uses BitTorrent, and They Love It, 25 de junho de 1. busca de conte´udoem sites buscadores de torrent 2013. TorrentFreak http://torrentfreak.com/ 2. obten¸c~aodo arquivo .torrent desejado facebook-uses-bittorrent-and-they-love-it-100625/ 3. computador do usu´ariose comunica com rastreadores (trackers), [4] Wikipedia. Timeline of file sharing | Wikipedia, The Free Encyclopedia, que mant^emlistas dos peers que est~aocompartilhando os arquivos 2013. http://en.wikipedia.org/wiki/Timeline_of_file_sharing do torrent obtido [5] Matheus B. Lehmann, Rodrigo B. Mansilha, Marinho P. Barcellos e Fl´avio 4. o tracker devolve uma lista de peers aleat´oria Roberto Santos. \Swarming: como BitTorrent revolucionou a Internet". 5. computador do usu´arioinicia comunica¸c~aocom os peers da lista, Em Atualiza¸c~oesem Inform´atica. PUC-Rio. Vol. 1. Rio de Janeiro, 2011. Cap. 6, pp. 209{258 e come¸caa receber deles os arquivos pertencentes `aqueletorrent Fonte: Wikipedia | http://en.wikipedia.org/wiki/File:Torrentcomp_small.gif IME-USP Rede Linux IME: ∼paulochf E-mail: [email protected] Created with LATEXbeamerposter http://www-i6.informatik.rwth-aachen.de/~dreuw/latexbeamerposter.php.
Recommended publications
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • (Camara)\Thomas-Rasset PFC.Wpd
    NO. In the Supreme Court of the United States JAMMIE THOMAS–RASSET, Petitioner, v. CAPITOL RECORDS INC. et al., Respondents. On Petition for a Writ of Certiorari to the United States Court of Appeals for the Eighth Circuit PETITION FOR A WRIT OF CERTIORARI K.A.D. CAMARA Counsel of Record CHARLES R. NESSON CAMARA & SIBLEY LLP 2800 Post Oak Blvd., Suite 5220 Houston, Texas 77056 (713) 966-6789 [email protected] Attorneys for Petitioner December 10, 2012 Becker Gallagher · Cincinnati, OH · Washington, D.C. · 800.890.5001 i QUESTION PRESENTED Is there any constitutional limit to the statutory damages that can be imposed for downloading music online? ii PARTIES TO THE PROCEEDING The parties to the proceeding are Jammie Thomas–Rasset, Petitioner; Capitol Records Inc., Sony BMG Music Entertainment, Arista Records LLC, Interscope Records, Warner Bros. Records Inc., and UMG Recordings Inc., Respondents; United States of America, Intervenor; Electronic Frontier Foundation, Internet Archive, American Library Association, Association of Research Libraries, Association of College and Research Libraries, and Public Knowledge, amici on behalf of Petitioner; and Motion Picture Association of America Inc., amicus on behalf of Respondents. iii TABLE OF CONTENTS QUESTION PRESENTED.................... i PARTIES TO THE PROCEEDING ............. ii TABLE OF AUTHORITIES................... v PETITION FOR A WRIT OF CERTIORARI ...... 1 OPINIONS BELOW ......................... 1 JURISDICTION ............................ 1 CONSTITUTIONAL AND STATUTORY PROVISIONS INVOLVED................. 1 STATEMENT .............................. 3 REASONS FOR GRANTING THE PETITION . 21 CONCLUSION ............................ 25 APPENDIX Appendix A Opinion of the United States Court of Appeals for the Eighth Circuit (September 11, 2012) ..........App. 1 Appendix BMemorandum of Law & Order in the United States District Court District of Minnesota (July 22, 2011) ..............App.
    [Show full text]
  • Internet-Operaattoreihin Kohdistetut Tekijänoikeudelliset Estomääräykset Erityisesti Vertaisverkkopalvelun Osalta
    Pekka Savola INTERNET-OPERAATTOREIHIN KOHDISTETUT TEKIJÄNOIKEUDELLISET ESTOMÄÄRÄYKSET ERITYISESTI VERTAISVERKKOPALVELUN OSALTA Lisensiaatintutkimus, joka on jätetty opinnäytteenä tarkastettavaksi tekniikan lisensiaatin tutkintoa varten Espoossa, 21. marraskuuta 2012. Vastuuprofessori Raimo Kantola Ohjaaja FT, OTK Ville Oksanen AALTO-YLIOPISTO LISENSIAATINTUTKIMUKSEN TIIVISTELMÄ TEKNIIKAN KORKEAKOULUT PL 11000, 00076 AALTO http://www.aalto.fi Tekijä: Pekka Savola Työn nimi: Internet-operaattoreihin kohdistetut tekijänoikeudelliset estomääräykset erityisesti vertaisverkkopalvelun osalta Korkeakoulu: Sähkötekniikan korkeakoulu Laitos: Tietoliikenne- ja tietoverkkotekniikka Tutkimusala: Tietoverkkotekniikka Koodi: S041Z Työn ohjaaja(t): FT, OTK Ville Oksanen Työn vastuuprofessori: Raimo Kantola Työn ulkopuolinen tarkastaja(t): Professori, OTT Niklas Bruun Tiivistelmä: Tarkastelen työssäni Internet-yhteydentarjoajiin (operaattoreihin) kohdistettuja tekijänoikeudellisia estomääräyksiä erityisesti vertaisverkkopalvelun osalta sekä tekniseltä että oikeudelliselta kannalta. Tarkastelen erityisesti The Pirate Bay -palvelusta herääviä kysymyksiä. Esitän aluksi yleiskatsauksen muistakin kuin tekijänoikeudellisista säännöksistä ja tarkastelen laajaa ennakollisen ja jälkikäteisen puuttumisen keinojen kirjoa. Tarkastelen teknisiä estomenetelmiä ja estojen kierrettävyyttä ja tehokkuutta. Keskeisimpiä estotapoina esittelen IP-, DNS- ja URL-estot. URL-eston toteuttaminen kaksivaiheisena menetelmänä olisi järjestelmistä joustavin, mutta siihen liittyvät
    [Show full text]
  • Piratebrowser Artifacts
    PirateBrowser Artifacts Written by Chris Antonovich Researched by Olivia Hatalsky 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Published Date Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................. 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................
    [Show full text]
  • Licensing in the Shadow of Copyright
    LICENSING IN THE SHADOW OF COPYRIGHT Peter DiCola* David Touve** CITE AS: 17 STAN. TECH. L. REV. 397 (2014) http://stlr.stanford.edu/pdf/licensinginshadow.pdf ABSTRACT Copyright offers protection to creative works, but new technologies put pressure on that protection. Copyright owners and technology firms negotiate over new ways of distributing and transmitting creative works. Understanding the shadow that copyright casts on private negotiations will allow policy makers to better design the statute in a way that encourages more competition, diversity, and transactional efficiency in markets for digital goods. Prime examples of copyright licensing negotiations are the attempts to license digital music services over the past decade. In this Article we present the first qualitative and quantitative data about the licensing process for on-demand music streaming services, gleaned from confidential interviews with executives and attorneys. We report our findings about the time it takes to license a nascent service, if negotiations succeed; the number of record labels and publishers with which new music services typically deal; the general processes through which these licenses evolve; and how changes in the law over the period may have affected the dynamics of these negotiations. We find that copyright law, alongside business practices and professional attitudes, sets complex background rules for these private licensing negotiations. Copyright shapes, constrains, and also presents opportunities for innovation. TABLE OF CONTENTS INTRODUCTION ....................................................................................................... 398 I. THE LEGAL ENVIRONMENT FOR DIGITAL MUSIC .............................................. 404 * Associate Professor, Northwestern University School of Law. ** Assistant Professor and Director of the Galant Center for Entrepreneurship, McIntire School of Commerce, University of Virginia. We thank Nathan Brenner and Abigail Bunce for research assistance.
    [Show full text]
  • How Does Torrenting Affect the Media Industry in The
    University of Manchester Management, Technology and Innovation Report How does torrenting affect the media industry in the UK? Should the UK continue to block torrenting websites? Author: Supervisor: Pez Cuckow Mohammad Hajhashem Student ID: Word Count: 7565025 1644 Abstract Torrenting is used to download copyrighted works from the Internet. This report gives an overview of the technology behind it, investigating its effect on the media industry. The consequences of introducing blocking measures is reviewed from support- ing and opposing evidence. In conclusion there are four suggestions for more specific research and legislation related specifically to the UK media industry. Keywords: BitTorrent, Torrenting, Copyright Law, CDPA June 15, 2014 CONTENTS CONTENTS Contents Glossary 2 1 Introduction 3 2 Torrenting 3 2.1 Popularity . .3 2.2 Technology . .3 3 Intellectual Property Rights 4 3.1 Legal Options . .4 3.2 In the UK . .5 3.3 Keeping IP Laws Up to Date . .5 4 Effect of Torrenting 6 4.1 Negative Effects . .6 4.2 Opposition . .8 5 Blocks in the UK 9 5.1 Supporting Evidence . .9 5.2 Opposing Evidence . .9 6 Conclusions 10 Appendix A BitTorrent 17 A.1 Popularity . 17 A.2 Overview . 17 Appendix B Prosecuting a User 17 B.1 Downloading . 18 B.2 Sharing . 18 Appendix C Prosecuting a Tracker 18 Appendix D BPI vs UK ISP's 18 D.1 Charges . 19 Appendix E HADOPI 19 Appendix F Avoiding the Blocks 19 Appendix G Tables 20 7565025 1 of 20 LIST OF FIGURES Glossary List of Figures 1 Client/Server VS Peer2Peer Network (Sheehan, 2009) .
    [Show full text]
  • IFPI and Economists on File-Sharing and the Music Industry a Literature Review
    IFPI and Economists on File-Sharing and the Music Industry A Literature Review Volker Grassmuck Draft, 14. May 2010 (Please do not circulate) for Acesso a bens educacionais e culturais no Brasil Projeto de Pesquisa de Grupo de Pesquisa em Política Pública para o Acesso à Informação Escola de Artes, Ciências e Humanidades Universidade de São Paulo Table of Contents Introduction..........................................................................................................................................2 The IFPI Claims...................................................................................................................................6 The studies..........................................................................................................................................10 Data and methodology...................................................................................................................13 A brief evolution of P2P research..................................................................................................17 Overview of the studies.................................................................................................................26 Summary........................................................................................................................................30 Alternative explanations for the decline in CD sales.....................................................................31 Preliminary findings on trends in the music industry....................................................................34
    [Show full text]
  • 1 NO. 12-2146 Plaintiffs-Appellants/Cross
    NO. 12-2146 IN THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT SONY BMG MUSIC ENTERTAINMENT, ET AL., Plaintiffs-Appellants/Cross-Appellees, v. JOEL TENENBAUM, Defendant-Appellee/Cross-Appellant. On Appeal From The United States District Court For The District Of Massachusetts OPENING BRIEF FOR THE DEFENDANT-APPELLEE/CROSS-APPELLANT CHARLES R. NESSON Counsel of Record KIWI CAMARA 1575 Massachusetts Avenue Cambridge, Massachusetts 02138 (617) 495-4609 Attorneys for Defendant-Appellants 1 TABLE OF CONTENTS 2 TABLE OF AUTHORITIES 3 STATEMENT OF JURISDICTION The district court had jurisdiction over this copyright case under 28 U.S.C. 1331 and 1338(a). Following an initial appeal, this Court re- manded to the district court with instructions to consider remittitur and, in the absence of remittitur, the constitutionality of the statutory damages awarded by the jury. The district court entered a final order rejecting remittitur, finding the statutory-damages award constitu- tional, and disposing of all other claims on August 23, 2012. Defendant– Appellant Joel Tenenbaum timely filed his notice of appeal on Septem- ber 17. This Court therefore has jurisdiction under 28 U.S.C. 1291. STATEMENT OF THE ISSUE Is it a denial of due process to award statutory damages of $22,500 per song, for a total of $675,000 in this case, against an individual for willful but noncommercial copyright infringement that did not, taken alone, measurably harm the plaintiffs? STATEMENT OF THE CASE On August 7, 2007, the plaintiff recording companies sued Tenen- baum for infringing their copyrights in 30 songs by downloading the songs and making them available to others through online file-sharing 4 software.
    [Show full text]
  • The RIAA's Troubling Solution to File- Sharing
    Fordham Intellectual Property, Media and Entertainment Law Journal Volume 20 Volume XX Number 2 Volume XX Book 2 Article 4 2009 The RIAA’s Troubling Solution to File- Sharing Genan Zilkha J.D. Candidate, Fordham University School of Law, 2010 Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Genan Zilkha, The RIAA’s Troubling Solution to File- Sharing , 20 Fordham Intell. Prop. Media & Ent. L.J. 667 (2009). Available at: https://ir.lawnet.fordham.edu/iplj/vol20/iss2/4 This Note is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. The RIAA’s Troubling Solution to File- Sharing Cover Page Footnote I would like to thank my advisor, Professor Willajean McLean, for her patience, guidance and support, and Professor Sonia Katyal for her insight. I would also like to thank my family for their constant encouragement. This note is available in Fordham Intellectual Property, Media and Entertainment Law Journal: https://ir.lawnet.fordham.edu/iplj/vol20/iss2/4 C05_ZILKHA_3-8-10_FINAL (DO NOT DELETE) 3/31/2010 1:09 PM The RIAA’s Troubling Solution to File- Sharing Genan Zilkha INTRODUCTION ............................................................................. 668 I. A HISTORY OF FILE-SHARING ................................................. 669 A. The Internet as a Peer-to-Peer File-Sharing Network ........................................................................
    [Show full text]
  • The Impact of File Sharing on Movies Koleman Strumpf University Of
    The Impact of File Sharing on Movies Koleman Strumpf University of Kansas [email protected] Felix Oberholzer‐Gee Harvard University [email protected] December 31, 2010 1. Introduction The advent of file‐sharing technology makes it possible for consumers to copy music, books, video games and other protected works on an unprecedented scale at minimal cost. By some estimates, file sharing now accounts for up to sixty percent of all bandwidth usage (Sandvine, 2002‐2007 and 2008ab). Music consumption was first affected by the new technology, mostly because the small size of music files allowed for fairly rapid transfers even in the early days of file‐sharing when the technology was often slow and unreliable. By contrast, consumers gained the ability to share the much larger files associated with movies only with the emergence of BitTorrent‐based file‐sharing services. With the help of the BitTorrent technology, consumers can now download a feature film in less than two hours. BitTorrent is also significant because the technology forces users to share the parts of files that they already own while they download the remaining bits. This procedure limits the opportunity to free‐ride that plagued older file‐sharing systems. In view of these advances, it is no surprise that movies are now among the most heavily traded works on file‐sharing sites. Academic research on the impact of file sharing on commerce and consumption mirrors the overall technological development. We know most about the effect of file sharing on music – while estimates vary, a good number of studies seem to indicate that file sharing is perhaps responsible for no more than a fifth of the decline in music sales in recent years (Oberholzer‐ Gee and Strumpf 2009) – but we have comparatively little knowledge about the influence of file sharing on movie consumption.
    [Show full text]
  • Improving Peer-To-Peer Video Streaming
    Improving Peer-to-Peer Video Streaming . Improving Peer-to-Peer Video Streaming Proefschrift ter verkrijging van de graad van doctor aan de Technische Universiteit Delft, op gezag van de Rector Magnificus prof. ir. K. C. A. M. Luyben, voorzitter van het College voor Promoties, in het openbaar te verdedigen op vrijdag 8 april 2016 om 15:00 uur door Riccardo Petrocco ingenieur in de technische informatica geboren te Rome, Italy. Dit proefschrift is goedgekeurd door de promotor: Prof. dr. ir. D. H. J. Epema Copromotor: Dr. ir. J. A. Pouwelse Samenstelling promotiecommissie: Rector Magnificus, voorzitter Prof. dr. ir. D. H. J. Epema Delft University of Technology, promotor Dr. ir. J. A. Pouwelse Delft University of Technology, copromotor Prof. dr. ir. R. L. Lagendijk Delft University of Technology Prof. dr. K. G. Langendoen Delft University of Technology Prof. dr. J. J. Lukkien Eindhoven University of Technology Dr. P. S. César Garcia CWI Amsterdam Dr. A. Legout INRIA, Sophia Antipolis The work described in this thesis was supported by the Future and Emerging Tech- nologies program FP7-COSI-ICT of the European Commission through the P2P- Next project (grant no.:216217) Printed by: CPI-Koninklijke Wöhrmann – Zutphen Front & Back: Alessandro Petrocco © 2016 Riccardo Petrocco ISBN 978-94-6328-031-0 An electronic version of this dissertation is available at http://repository.tudelft.nl/. To my mother, for her love and encouragement. To my father, and his everlasting support. Riccardo . Acknowledgements The work presented in this thesis would not be possible without the help, sup- port,collaboration, and friendship of all the people that have been part of my PhD track.
    [Show full text]
  • Appellant's Brief
    NO. 12-2146 IN THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT SONY BMG MUSIC ENTERTAINMENT, ET AL., Plaintiffs-Appellees, v. JOEL TENENBAUM, Defendant-Appellant. On Appeal From The United States District Court For The District Of Massachusetts OPENING BRIEF FOR THE DEFENDANT–APPELLANT PAUL J. PAPE CHARLES R. NESSON NICOLAS M. ROULEAU Counsel of Record PAPE BARRISTERS PC 1575 Massachusetts Avenue 1 Queen St. East, Suite 1910 Cambridge, Massachusetts 02138 Toronto, Ontario M5C 2W5 (617) 495-4609 Of Counsel K.A.D. CAMARA CAMARA & SIBLEY LLP 2800 Post Oak Boulevard, Suite 5220 Houston, Texas 77056 Attorneys for Defendant-Appellant TABLE OF CONTENTS TABLE OF AUTHORITIES.................................................................. iii STATEMENT OF JURISDICTION....................................................... 1 STATEMENT OF THE ISSUE............................................................... 1 STATEMENT OF THE CASE ................................................................ 1 STATEMENT OF THE FACTS.............................................................. 5 SUMMARY OF THE ARGUMENT........................................................ 7 ARGUMENT.............................................................................................. 9 I. Judicial review of the award of statutory damages in this case is both appropriate and constitutionally required. ..... 9 A. The Constitution requires judicial review. ............................. 9 B. Congress invited judicial review. .........................................
    [Show full text]