Digital Piracy on P2P Networks How to Protect your Copyrighted Content
Olesia Klevchuk and Sam Bahun MarkMonitor
© 2014 MarkMonitor Inc. All rights reserved. Agenda
. P2P landscape: history and recent developments . Detection and verification of unauthorized content on P2P sites . Enforcement strategies . Alternatives to enforcements
2 | Confidential
P2P Landscape History and Recent Developments
3 | Confidential
History of Digital Piracy Streaming Download to Streaming 1B+ Users . Music piracy enters mainstream with Napster . P2P brought software and video piracy . Shift to consumption of streaming content – TV and sports most impacted
P2P Live 300 MM Streaming Users 50 MM Users Napster UseNet 25 MM Users 16 MM Users
< 5 MM Today
1995 2000 2005 2010 2015
4 | Confidential
First Generation of P2P From Napster to eDonkey2000
. Napster brought P2P to masses
. Centralized server model made it possible to shutdown the network
5 | Confidential
Second Generation of P2P Kazaa, Gnutella and Torrent Sites
. Ability to operate without central server, connecting users remotely to each other
. Difficult to shutdown
. Attracted millions of users worldwide
. Requires some technical ability, plagued with pop-up ads and malware
6 | Confidenti al
New P2P piracy
. No to little technical ability is required
. Attractive, user-friendly interface
. BitTorrent powered making enforcements challenging Popcorn Time BitTorrent powered streaming app
. Allows you to watch thousands of movies instantaneously
. In the U.S., software was downloaded onto millions of devices
. Interface resembles that of popular legitimate streaming platforms
8 | Confidential
P2P Adoption and Usage BitTorrent is among the most popular platforms online
Twitter 307 million users
Facebook 1.44 billion users
Netflix 69 million subscribers
BitTorrent 300 million users
9 | Confidential
P2P Piracy Steady trend of a number of P2P infringements
. P2P piracy presents a real threat to content owners as the number of infringements consistently hit billions of cases
10 | Confidential
P2P Piracy around the Globe
13% 46%
18% 6%
11% 5%
Source: MarkMonitor Q4 2014
11 | Confidential
Piracy Profits From Downloads Decrease Monetizing on piracy content
Profits generated P2P piracy
2013 2014
. BitTorrent portals continue to generate more ad revenue overall than any other segment
. Profits generated by Torrent sites shrank by 30% mainly at the expense of growing popularity of streaming platforms
12 | Confidential
Detection and Verification P2P Networks
Bittorrent eDonkey Gnutella Ares uTorrent eMule Bareshare Filecroc Azureus Shareaza K-Lite Nitro Kceasy Wyzo K-Lite Pro Limewire Warez P2P
. Monitors millions of users worldwide Monitoring . Fully compliant with the high standards of the EU Directive and applicable U.S. laws regarding evidence collection procedures
Enforcement . Vendor of choice for the world’s largest anti-piracy programs . Compliant with local regulations
. Notices are delivered to the correct ISP Compliance . Call centers to handle consumer inquiries regarding notices
. Geographic information Reporting . Content breakdown: title, type, etc. . Report on notice quotas
Fighting Piracy Worldwide
14 | Confidential
P2P Verification
. File (Hash) Verification: The method used to verify that a file on a P2P network matches a copyrighted asset. • Human – Download a full copy and apply human review of the file. • Fingerprinting – download and process against a database of reference fingerprints. . Peer (Case) Verification: The method used to verify that each peer discovered in a swarm for an infringing file is in fact sharing the file. Peer Verification Levels
Verification Level Step Verification Process 1 2 3 4 5 6 7
1 IP address sharing file with asset name is detected
2 IP address is verified as active (pinged, etc) GDPI, P2P BI
3 IP address is detected as having a P2P Client
Hash is collected as reported by peer for 4 comparison against a database of hashes for Notice confirmed infringements Sending, File is partially downloaded and hash is collected P2P BI 5 for comparison against a database of hashes for confirmed infringements File is partially downloaded for playback and 6 potential analysis against a content ID database Litigation File is fully downloaded for playback and 7 verification
Recommended for business intelligence scanning
Recommended for notice sending based on good faith
Recommended for court level evidence standards
16 | Confidential
Enforcement Top Markets with Clear Legal Procedures or Business Practices for P2P Notice Sending
18 | Confidential
Things to Consider before sending notices
. Geography: Notices can be sent worldwide, but are not likely to reach the end users without supporting legislation or business practices. . Program Goals: Education, Legal, Conversion, etc… . Notice Language: Does the notice template clearly match with the goals while meeting all legal requirements in a given country? . Graduated Response type programs can be based on legislation, but also on voluntary private agreements between trade associations/individual content owners and ISPs. Alternative use for P2P data
DETECT VERIFY ENFORCE
ANALYZE
Use piracy data to drive insights to convert pirates and direct them to legal content.
20 | Confidential
Business Intelligence Data Monitor Global Piracy Trends to Make Intelligent Business Decisions
Learn where and how copyrighted Combined with traditional sources material is being used of media consumption
P2P Sales Data
Cyberlockers Distribution Data
Search Audience Data
. What: quality, language, content type . Where: networks, ISP, geo-locations . How: streaming vs. downloading, ways to find content . Why: benchmark data
21 | Confidential
Piracy Data to Create New Revenue Streams Software Company CHALLENGE
. Lack of visibility into piracy market . Pirated copies of proprietary software . Cracked and hacked copies
STRATEGY
. Use piracy data to measure demand for software . No enforcement – but use data to drive sales
RESULTS
. Piracy conversion strategy . Piracy data as a source of sales leads . Recovering revenue from cracked software as part of sales strategy
22 | Confidential
Benefits Of Using Piracy Data Use Data to Enhance Your Business Strategy
. Adapt to shifting piracy landscape . Convert pirates to pay and discourage casual pirates . Making smarter business decisions • Distribution • Marketing • New releases . Recover lost revenues and create additional streams of revenue
23 | Confidential
Q&A
Please be sure to submit all your questions via the Q&A tab on your screen.
24 | Confidential
Thank You!
. For information on MarkMonitor solutions, services and complimentary educational events
• Contact us via email: [email protected]
• Visit our website at: www.markmonitor.com
• Contact us via phone: US: 1 (800) 745 9229 Europe: +44 (0) 203 206 2220
25 | Confidential