Game of Streams

Total Page:16

File Type:pdf, Size:1020Kb

Game of Streams Game of Streams A Comprehensive Study of Streaming Cyberlockers Benjamin Braun Rizwan Ahmad Department of Computer Science and Department of Computer Science and Engineering Engineering University of California, San Diego University of California, San Diego [email protected] [email protected] ABSTRACT this website by authorities showed a complex, intricate re- Streaming cyberlockers, third-party video streaming plat- lationship between the streaming portal, indexing sites, and forms which primarily consist of pirated content, have seen even advertising networks. However, since this raid, there incredible growth in recent years, but seem to avoid much have been very few studies into streaming cyberlockers, and scrutiny and thus have stayed outside the scope of most consequently very little new information about their opera- cyberlocker-centric studies. This project attempts to close tions. this gap in the literature by identifying central characteris- As such, given the growing popularity of these websites tics of streaming cyberlockers such as their traffic and rev- and the absence of studies that look into them, we sought to enue generation models, the physical location of the web- characterize and identify a few key parts of their infrastruc- sites, relationships between websites, and whether there are ture. Specifically, we wanted to understand the following: any feasible forms of external intervention capable of ex- • How they attract and maintain viewers and uploaders. ploiting faults in their operational model. We found that sites did tend to locate themselves in similar locations, and • What their main source of revenue is. that their revenue is generated primarily through advertis- ing, while an affiliate model drives traffic to the website by • Whether there are any prominent similarities or rela- attracting content uploaders, who in turn attract viewers. tionships between websites We were unable, however, to identify any feasible methods of interfering with this model, and determined that current • If there are any readily identifiable means of interven- anti-piracy efforts such as DMCA takedowns are largely un- ing and halting the explosive growth they are currently successful although further studies which take into account experiencing. indexing sites and advertising networks could potentially de- termine some form of intervention. This was accomplished by performing a study on 131 dif- ferent streaming cyberlockers, in which advertising networks Keywords and video content hosters were identified, and other perti- nent information was collected and analyzed. Additionally, Abuse, streaming cyberlockers, copyright infringement we were able to gain some insight regarding the ecosystem of streaming cyberlockers, which is discussed in the next 1. INTRODUCTION section. Streaming cyberlockers are third-party, web-based plat- forms which allow viewers to stream videos hosted on their 1.1 How Streaming Cyberlockers Operate platform. While some video streaming platforms are legiti- There are a number of actors involved in the successful mate sites, such as youtube.com, many of them are used pri- operation of a streaming cyberlocker. A general overview of marily to host and stream copyright protected or otherwise the ecosystem is shown in Figure 1. The three most impor- illegal content. In recent years, such streaming cyberlockers tant actors that can be seen in the diagram are the streaming have become particularly popular, with one such website, sites, indexing sites, and content uploaders. streamcloud.eu cracking the top 25 most visited sites in Streaming Sites: The streaming site itself usually has Germany by Alexa ranking, and maintaining a global rank- a relatively simple interface. We found that most sites us a ing of 611. This popularity has caused an uproar amongst third party video player such as the JWPlayer. Most sites organizations such as the MPAA and other content creators, do not provide a browsable or searchable index on the site who have notoriously worked to shut down these websites. itself. Instead the viewer needs to have a URL to a video Despite their increasing prominence in contemporary so- when coming to the site. While some streaming sites ac- ciopolitical issues, most studies overlook streaming cyber- tually employ web developers to create the sites, there are lockers in particular, and focus instead on a larger class of also a number of website templates available for purchase. A cyberlockers - one-click hosters. As such, streaming cyber- popular example is the XFileSharing template [4], which is lockers have, for the most part, avoided widespread public used by realvid.net and www.thevideo.me as well as oth- scrutiny, to the point that a great deal of the insight we have ers, and can be purchased for $99. Commonly, the streaming about streaming cyberlockers comes from a singular point of sites are hosted on either standard public hosting providers data - a raid on the streaming site kino.to. The analysis of or hosting providers that provide further privacy guarantees, 1 Premium/Affiliate Models $$ Uploaders Streaming Sites Indexing Site Viewers Advertising Networks Website Templates Video Players Video Server Hosts Figure 1: The Ecosystem of Streaming Cyberlockers in order to increase resilience against DMCA takedown re- of this revenue to be translated directly to profit. The report quests. To generate revenue, all observed streaming cyber- is also cited in a letter from the MPAA to the United States lockers serve aggressive ads on their sites. Some sites also Trade Representative [10], which led to a number of stream- offer premium membership for benefits, such as being able ing sites being mentioned on the USTR Notorious Markets to download the videos, faster streaming, or longer file avail- Report. ability. Others offered a more intriguing affiliate member- The other cyberlocker-based studies we identified focused ship, which allowed uploaders to receive money in response primarily on one-click hosters, such as a study performed by to views generated by their videos. Lauinger et al. [6], who conducted a large scale measurement Indexing Sites: Because the streaming sites do not pro- study on the effectiveness and impact of current anti-piracy vide an index themselves, there are a number of indexing efforts against one-click hosters. In their study, they crawled sites available to help viewers locate the videos they want two indexing sites to collect links to pirated files hosted on to watch. The indexing sites aggregate and organize links cyberlockers and observed how their availability. From this, to videos hosted on streaming sites, while not hosting any they investigated the impact of DMCA takedown Notices illegal content on their own site. Indexing sites come in var- and court mandated actions by the OCHs against piracy ious shapes and forms, with some indexing sites focusing and hardware seizures. They concluded that current anti- exclusively on TV shows, while others focus on other types piracy measures are mostly ineffective. of media. In a related study [7], Lauinger et al. also investigated Uploaders: Uploaders collect content distributed through prevalence of copyrighted material on one-click hosters us- other channels, such as torrents and one-click hosters, and ing the available file metadata to heuristically infer whether upload it to the streaming sites. Their main incentive are content is legitimate or infringing, concluding that the vast the affiliate rewards systems of the streaming sites, which majority of content hosted on these sites was indeed infring- pay the uploader anywhere between $10 and $40 per 10,000 ing material. unique video views. To attract more people to view the Liu et al. [9] studied the structure of URL-sharing sites uploaded videos, the uploader will typically distribute the linking to one-click hosters. They collected pages containing unique links to a number of indexing sites and numerous cyberlocker URLs for movies via the use of general search other places, including the information field on YouTube engines and proceeded to analyze characteristics of those videos. indexing sites. In this study, we strive to perform an analysis similar to that of the spam value chain in [8]. Specifically, we aim 2. RELATED WORK to take a closer look a the ecosystem of streaming cyber- The only study we are aware of that looked into stream- lockers to uncover the inner workings of these sites and to ing cyberlockers was one performed by NetNames, a brand identify parts of the ecosystem that are more susceptible to protection agency. This report [11] investigated the cost intervention. and revenue structure of direct download and streaming cy- berlockers. According to their notion, cyberlockers distin- guish themselves from legitimate cloud storage services by 3. DATA COLLECTION METHODOLOGY not limiting access to files, using affiliate programs that re- Given the previously mentioned goals of this project, we ward uploaders when content is accessed, and by dealing chose to collect data regarding the most commonly used ad- with repeat offenders in different manners. Based on their vertising networks found on the websites, the hosting providers estimates, popular streaming cyberlockers make millions of used to serve video content, and the websites' reactions to dollars in revenue annually from ads and, to a lesser extent, DMCA takedown notices. In order to collect this data, sev- premium models. They also maintain an operating cost that eral different streaming websites were identified, and each is a small fraction of their total revenue, leading the majority site was crawled individually while pulling information re- 2 garding advertising networks and video hosters. Videos sub- the page by injecting it into the DOM, and then sending sequently found in Google DMCA notices were identified, the data back to a web server running locally on the same and the status of the video - whether it was live or taken machine, which would store it in a SQL database. down - was noted. After aggregating this information, we The injected code initially attempted to play the video, proceeded to identify trends between different cyberlockers.
Recommended publications
  • 10 Years of Copyright Enforcement by Private Third Parties IDP
    IDP. Revista de Internet, Derecho y Política E-ISSN: 1699-8154 [email protected] Universitat Oberta de Catalunya España Wesselingh, Ellen Marja Website Blocking: Evolution or Revolution? 10 Years of Copyright Enforcement by Private Third Parties IDP. Revista de Internet, Derecho y Política, núm. 19, octubre, 2014, pp. 35-47 Universitat Oberta de Catalunya Barcelona, España Available in: http://www.redalyc.org/articulo.oa?id=78835370004 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Universitat Oberta de Catalunya www.uoc.edu/idp ARTICLE Website Blocking: Evolution or Revolution? 10 Years of Copyright Enforcement by Private Third Parties* Ellen Marja Wesselingh The Hague University of Applied Sciences Published: October, 2014 Abstract Copyright enforcement by private third parties – does it work uniformly across the EU? Since the inception of Napster, home copying of digital files has taken flight. The first providers of software or infrastructure for the illegal exchange of files were held contributory or vicariously liable for copyright infringement. In response, they quickly diluted the chain of liability to such an extent that neither the software producers, nor the service providers could be held liable. Moving further down the communication chain, the rights holders are now requiring Internet Service Providers (ISPs) that provide access to end customers to help them with the enforcement of their rights. This article discusses case law regarding the enforcement of copyright by Internet Access Providers throughout Europe.
    [Show full text]
  • Sizing the Piracy Universe
    rFlS Sizing the piracy universe David Price Director of Piracy Analysis, NetNames September 2013 NetNames Piracy Analysis: Sizing the piracy universe Page 2 1 Executive Summary 1.1 Introduction This report draws data from a wide range of reliable sources to provide an estimate of the shape and size of the piracy universe. It is based upon an in-depth study of a range of ecosystems commonly used for the distribution of infringing content. Analysis demonstrates the number of unique internet users who employ each infringement method to obtain material as well as the overall proportion of internet bandwidth used by each ecosystem. In addition to original data collection by NetNames, the report draws on supplemental data from leading companies including Sandvine and Cisco. The report, which has been commissioned by NBCUniversal, was prepared by the Piracy Analysis team at NetNames, formerly known as Envisional. In January 2011, Envisional published the report An Estimate of Infringing Use of the Internet, an analysis focused on the use of internet bandwidth for the distribution of infringing content such as pirated films, television, music, and software.1 This new report includes an extended examination of bandwidth data that updates some of the findings from the 2011 publication. However, it takes a look at a broader range of considerations, including: a detailed examination of the number of users involved in a range of major internet ecosystems an evaluation of the level of infringement within each ecosystem an analysis of trends over time a look at business models and revenue generation used by sites that facilitate infringement a discussion of the rise of mobile and an analysis of the impact of enforcement efforts on infringement.
    [Show full text]
  • I Nternational I Ntellectual P Roperty a Lliance ®
    I NTERNATIONAL I NTELLECTUAL P R O P E R T Y A LLIANCE ® 1818 N STREET, NW, 8TH FLOOR ∙ WASHINGTON, DC 20036 ∙ TEL (202) 355-7900 ∙ FAX (202) 355-7899 ∙ WWW.IIPA.COM ∙ EMAIL: [email protected] February 6, 2015 Submitted via regulations.gov Docket No. USTR–2014–0025 Susan F. Wilson Director for Intellectual Property and Innovation Office of the U.S. Trade Representative 600 17th Street, N.W. Washington, D.C. 20508 Re: IIPA Written Submission Regarding 2015 Special 301 Review: Identification of Countries Under Section 182 of the Trade Act of 1974: Request for Public Comment and Announcement of Public Hearing, 79 Fed. Reg. 78133 (Dec. 24, 2014) Dear Ms. Wilson: The International Intellectual Property Alliance (IIPA) provides this response to the above-captioned Federal Register Notice requesting written submissions from the public concerning intellectual property protection and market access regimes in U.S. trading partners, in the “Special 301” review.1 The ultimate goal of Special 301 is not to catalogue trade barriers as such, but rather to enhance the ability of U.S. creators to reach foreign markets through legitimate channels in competitive and growing marketplaces, physical and online. Many of the changes needed in foreign markets in order to advance this goal – higher standards of copyright protection, efficient copyright enforcement, sound legal structures for licensing, and elimination of market access barriers – also help our trading partners to develop, nurture, and enjoy the benefits of their own local cultural and creative output. The real beneficiary is the consumer, who will have greater access, through more avenues than ever before, to increasingly diverse creative output – the literary works, music, movies and TV programming, video games, software, and other products and services that depend on or are protected by copyright.
    [Show full text]
  • Site Blocking Global Best Practices サイト・ブロッキングの法制度 グローバル・ベスト・プラクティス :シンガポールを例に Michael Schlesinger
    Site Blocking Global Best Practices サイト・ブロッキングの法制度 グローバル・ベスト・プラクティス :シンガポールを例に Michael Schlesinger "Our country's content industry could be denied a future if manga artists and other creators are robbed of proceeds that should go to them.” Prime Minister Shinzo Abe, April 2018 I. INTRODUCTION Recently, Japan has been inundated with a proliferation of overseas or domestic websites and services engaging in or facilitating online copyright infringement.1 In May 2018, the top 100 piracy sites (for motion pictures, not including anime (アニメ) or manga (漫画)) garnered over 2 Billion (with a “B”) monthly visits worldwide, while in Japan alone, such sites attracted over 50 million monthly visits and over 200 million monthly page views in May 2018 (SimilarWeb). These mainly foreign-based sites profit off valuable creative content – motion pictures, television programming, anime (アニメ), manga (漫画), music, games, software, and other copyright materials – stifling the legitimate creative marketplace for Japanese and foreign creators alike. Such sites are part of a larger trend of legitimate digital platforms being overrun by bad actors, and a recent study finds consumers want government leaders to take a more hands-on approach to combatting them.2 Governments recognize that the use of the Internet for illegal activities represents an increasing drain on the legitimate digital economy. For example, use of copyright infringing websites represents a shockingly large percentage of all Internet traffic – 23.8% of all Internet bandwidth in North America, Europe,
    [Show full text]
  • IIPA Files Written Submission Regarding 2013 Special 301 Out-Of
    I NTERNATIONAL I NTELLECTUAL P ROPERTY A LLIANCE® 1818 N STREET, NW, 8TH FLOOR · WASHINGTON, DC 20036 · TEL (202) 355-7924 · FAX (202) 355-7899 · WWW.IIPA.COM · EMAIL: [email protected] October 25, 2013 Filed via www.regulations.gov, Docket No. USTR–2013–0030 Stanford K. McCoy, Esq. Assistant U.S. Trade Representative for Intellectual Property and Innovation Office of the U.S. Trade Representative Washington, DC 20508 Re: IIPA Written Submission Re: 2013 Special 301 Out-of-Cycle Review of Notorious Markets: Request for Public Comments, 78 Fed. Reg. 57924 (September 20, 2013), 78 Fed. Reg. 60367 (October 1, 2013) (Extending Deadline) Dear Mr. McCoy: In response to the September 20, 2013 Federal Register notice referenced above, the International Intellectual Property Alliance (IIPA)1 provides the Special 301 Subcommittee with the following written comments to provide examples of Internet and physical “notorious markets” – those “where counterfeit trademark or pirated copyright products are prevalent to such a degree that the market exemplifies the problem of marketplaces that deal in infringing goods and help sustain global piracy and counterfeiting.” We hope our filing will assist the Office of the United States Trade Representative (USTR) in “identifying potential Internet and physical notorious markets that exist outside the United States and that may be included in the 2013 Notorious Markets List.” We commend USTR for publishing a notorious markets list as an “Out of Cycle Review” separately from the annual Special 301 Report. This list has successfully identified key online and physical marketplaces that are involved in intellectual property rights infringements, and has led to positive developments, including closures of some Internet websites whose businesses were built on illegal conduct; greater cooperation from some previously identified “notorious” and other suspect sites; and the facilitation of licensing agreements for legitimate distribution of creative materials.
    [Show full text]
  • Notorious Markets
    Table of Contents Overview of the Results of the 2017 Out-of-Cycle Review of Notorious Markets ....................... 2 Positive Developments since the 2016 Out-of-Cycle Review of Notorious Markets .................... 4 Issue Focus: Illicit Streaming Devices ........................................................................................... 8 Results of the 2017 Out-of-Cycle Review of Notorious Markets Online Markets ............................................................................................................................. 11 Physical Markets ........................................................................................................................... 26 Public Information ........................................................................................................................ 34 2 Overview of the Results of the 2017 Out-of-Cycle Review of Notorious Markets Commercial-scale copyright piracy and trademark counterfeiting1 cause significant financial losses for U.S. right holders and legitimate businesses, undermine critical U.S. comparative advantages in innovation and creativity to the detriment of American workers, and can pose significant risks to consumer health and safety. The Notorious Markets List (List) highlights prominent and illustrative examples of online and physical marketplaces that reportedly engage in, facilitate, turn a blind eye to, or benefit from substantial piracy and counterfeiting. A goal of the List is to motivate appropriate action by owners, operators, and
    [Show full text]
  • OCI Report 2020
    Online Copyright Infringement Tracker Latest wave of research (March 2020) Overview and Key findings Intellectual Property Office is an operating name of the Patent Office Founded in July 2011, AudienceNet’s reputation for innovative, “real-time” ISBN: 978-1-910790-87-8 research grew steadily from its start-point in the music, entertainment and Online Copyright Infringement Tracker technology industries, through a wide range of both public and private sector Latest wave of research (March 2020) Overview and organisations, governments, NGOs and philanthropic organisations. Key findings. AudienceNet has built a reputation as one of the primary sources of Published by The Intellectual Property Office intelligence on music and entertainment. We conduct ad-hoc and (global) January 2021 tracking projects for industry bodies such as the IFPI, Entertainment Retail Association (ERA) and the BPI, as well as major record labels (Universal, 1 2 3 4 5 6 7 8 9 10 Warner and Sony) and platforms such as SoundCloud and Spotify. © Crown Copyright 2020 Report by: You may re-use this information (excluding logos) Sania Haq - Head of Research free of charge in any format or medium, under the Isaac Schling - Research Manager terms of the Open Government Licence. To view Laura-Jane Taylor - Senior Research Executive this licence, visit http://www.nationalarchives.gov. uk/doc/open-government-licence/ or email: [email protected] Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to: The Intellectual Property Office Concept House Cardiff Road Newport NP10 8QQ Tel: 0300 300 2000 Email: [email protected] This publication is available from our website at www.gov.uk/ipo Contents Executive Summary ......................................................................................................
    [Show full text]
  • Challenges Facing Sports Event Organisers in the Digital Environment
    Challenges facing sports event organisers in the digital environment European added value assessment STUDY EPRS | European Parliamentary Research Service European Added Value Unit PE 654.205 – December 2020 EN Challenges facing sports event organisers in the digital environment European added value assessment This European added value assessment (EAVA) investigates whether the current EU legal regime provides sports events organisers and their licensees with an adequate level of protection against the risk of online sports events piracy. It also attempts to measure the scale of the EU added value that could be achieved through a coordinated EU response. The failure of the EU to take action could result in additional burdens on economic operators. Moreover, not addressing these barriers and the associated legal uncertainties hamper the completion of the digital single market. The study underpinning this EAVA identifies gaps and barriers in the current legal framework and presents policy options – and their associated legislative tools – that could potentially tackle them. EPRS | European Parliamentary Research Service AUTHORS Lauro Panella, European Added Value Unit, DG EPRS with Matteo Firrito, trainee in the European Added Value Unit. The European Added Value Unit would like to thank its trainee Matteo Firrito for his work in providing the first draft of this report, later revised by Aleksandra Heflich and Lauro Panella. This paper has been drawn up by the European Added Value Unit of the Directorate for Impact Assessment and European Added Value, within the Directorate-General for Parliamentary Research Services (EPRS) of the Secretariat of the European Parliament. The legal analysis that is annexed to this European added value assessment was written by Prof.
    [Show full text]