Communications Network Traffic Data : Technical and Legal Aspects

Total Page:16

File Type:pdf, Size:1020Kb

Communications Network Traffic Data : Technical and Legal Aspects Communications network traffic data : technical and legal aspects Citation for published version (APA): Fischer, J. C. (2010). Communications network traffic data : technical and legal aspects. Technische Universiteit Eindhoven. https://doi.org/10.6100/IR689860 DOI: 10.6100/IR689860 Document status and date: Published: 01/01/2010 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim. Download date: 02. Oct. 2021 Communications Network Traffic Data Communications Network Traffic Data Technical and Legal Aspects PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de rector magnificus, prof.dr.ir. C.J. van Duijn, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op donderdag 30 september 2010 om 16.00 uur door Johan Conrad Fischer geboren te Delft Dit proefschrift is goedgekeurd door de promotor: prof.mr.dr. J.M. Smits Copromotor: prof.dr. N.A.N.M. van Eijk A catalogue record is available from the Eindhoven University of Technology Library ISBN: 978-90-386-2339-9 Printed by PrintService TU/e Cover design by Paul Verspaget Table of contents Preface 1 INTRODUCTION...................................................................................................................1 1.1 Digital data cloud............................................................................................................1 1.2 Traffic data and fundamental rights.................................................................................5 1.2.1 Traffic data and the right to privacy.........................................................................5 1.2.2 Traffic data and the right to freedom of expression.................................................7 1.2.3 Conclusions.............................................................................................................8 1.3 Previous studies...............................................................................................................9 1.3.1 Asscher and Ekker (eds.) 2003: Traffic data............................................................9 1.3.2 Smits 2006: Criminal investigations of telecommunications................................11 1.4 Research design.............................................................................................................11 2 A TECHNICALLY NEUTRAL FRAMEWORK..................................................................15 2.1 Current definitions of traffic data..................................................................................15 2.1.1 Definitions in EU Directives.................................................................................15 2.1.2 Definition in the Netherlands Telecommunications Act........................................18 2.1.3 Problem cases arising from current definitions.....................................................18 2.2 Raising the definition’s abstraction level – widening the scope....................................20 2.2.1 Data Protection Directive 1995 on the processing of personal data......................20 Intrinsic motives for data processing..........................................................................22 2.2.2 Essential functions of the provider........................................................................23 Activities of direct marketing among the essential functions?...................................23 2.2.3 Intermediary service providers...............................................................................27 Safe harbor provisions – liability exemptions in Directive on electronic commerce. 27 2.2.4 3x3 Test for traffic data..........................................................................................30 2.3 Typification of traffic data.............................................................................................32 2.3.1 Type I and II traffic data.........................................................................................35 2.4 Conclusions...................................................................................................................36 3 TELEPHONY TRAFFIC DATA...........................................................................................37 3.1 PSTN / ISDN fixed telephony services.........................................................................38 3.1.1 Technical backgrounds...........................................................................................38 Telephony services in the Netherlands........................................................................38 Technical characteristics of PSTN / ISDN..................................................................40 Market for fixed telephony..........................................................................................41 Technical standardization............................................................................................43 3.1.2 Technical explorations of the telephone network..................................................45 Main blocks of the telephone network........................................................................45 ISDN...........................................................................................................................49 Signaling.....................................................................................................................50 Intelligent Network.....................................................................................................50 3.1.3 Technical outline of PSTN / ISDN traffic data......................................................51 Traffic data to perform the service agreement............................................................51 Traffic data for billing and verification of the service................................................51 Traffic data for traffic management and network maintenance..................................52 3.1.4 Technical typification of PSTN / ISDN traffic data...............................................52 3.2 GSM mobile telecommunications.................................................................................52 3.2.1 Technical background............................................................................................52 Technical characteristics of GSM...............................................................................54 Mobile telecommunications market............................................................................54 Technical standardization............................................................................................55 3.2.2 Technical explorations of GSM.............................................................................55 Cellular structure.........................................................................................................56 GSM sub-systems.......................................................................................................56 Registers and numbers................................................................................................59 Administrative procedures in GSM............................................................................61 Billing and accounting................................................................................................66 SMS and MMS...........................................................................................................68 Location data and location-based services..................................................................68 E112 and eCall............................................................................................................70 Post-GSM developments............................................................................................71 3.2.3 Technical outline of GSM
Recommended publications
  • Searching for Malware in Bittorrent∗
    Searching for Malware in BitTorrent∗ Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, in- cluding recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTor- rent. This project explored BitTorrent for the presence of malware, and discovered a significant portion of malware in the downloaded file set. Statistics on torrents infected with malware were gathered and analyzed to find patterns that are helpful in creating basic filtering heuristics. While these heuristics may work in simple cases, several easy ways they can be defeated were found. 1 Introduction Recently, peer-to-peer networks have emerged as a popular paradigm for Internet applications. In fact, a study in 2005 estimated that P2P traffic accounted for around 70% of all traffic on the Internet [2]. P2P technology is finding new applications as it grows, including voice-over-IP systems and streaming video delivery. While P2P has found several different uses, perhaps the most widely-known use is for file sharing. One concern with P2P file sharing is that it can be used to distribute malware (malicious software, such as worms, viruses, and rootkits). On the one hand, users have access to huge amounts of data, while on the other hand, this data can easily be tainted with viruses, worms, and other forms of malware. An important consideration, then, is if the concern about malware in P2P networks is warranted, and if it is, are there ways to protect a computer and minimize the risk of malware infection from P2P networks.
    [Show full text]
  • Is Content Publishing in Bittorrent Altruistic Or Profit-Driven
    Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Michal Kryczka Angel Cuevas Univ. Carlos III de Madrid Institute IMDEA Networks and Univ. Carlos III de Madrid [email protected] Univ. Carlos III de Madrid [email protected] [email protected] Sebastian Kaune Carmen Guerrero Reza Rejaie TU Darmstadt Univ. Carlos III de Madrid University of Oregon [email protected] [email protected] [email protected] ABSTRACT ity [9, 15, 12] and improving its performance [18, 14]. BitTorrent is the most popular P2P content delivery appli- Moreover, some few papers have analyzed the demo- cation where individual users share various type of content graphics of BitTorrent [21, 11, 19] and also the secu- with tens of thousands of other users. The growing popular- rity [20] and privacy issues [6, 7]. However, the socio- ity of BitTorrent is primarily due to the availability of valu- economic aspects associated to BitTorrent in particular, able content without any cost for the consumers. However, and to other P2P file sharing systems in general, have apart from required resources, publishing (sharing) valuable received little attention despite of the importance that (and often copyrighted) content has serious legal implica- they have to the complete understanding of such kind of tions for user who publish the material (or publishers). This applications. This paper is a first step in this direction. raises a question that whether (at least major) content pub- The availability of free popular (often copyrighted) lishers behave in an altruistic fashion or have other incen- content that is of interest to millions of people (e.g.
    [Show full text]
  • Detecting Pedophile Activity in Bittorrent Networks
    Detecting Pedophile Activity in BitTorrent Networks Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, and Noa Zilberman School of Electrical Engineering, Tel-Aviv University, Israel Abstract. The wide spread of Peer-to-Peer networks makes multime- dia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through the Mininova web portal. We detect and characterize pedophilic material in the network, and also analyze differ- ent aspects of the abusers activity. We hope our results will help law enforcement teams detecting child molesters and tracking them down earlier. 1 Introduction Peer-to-peer networks are being widely used around the world by millions of users for sharing content. The anonymity provided by these networks makes them prone to sharing illegal contents, from simple copyright protected material to highly dangerous material, as will be discussed next. The BitTorrent file sharing network was responsible for 27% to 55% of in- ternet traffic (depending on geographic location) in 2009 [13]. The BitTorrent protocol allows to download large files without loading a single source computer, rather the downloading users join a group of hosts that download and upload from each other, simultaneously. Every BitTorrent file is uniquely defined by a descriptor file called a torrent, which is distributed via email or http websites. This torrent file allows the downloading and uploading users, called leechers and seeders, to share the content file.
    [Show full text]
  • A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law
    A Torrent of Copyright Infringement? Liability for BitTorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law Allen Mendelsohn Faculty of Law McGill University Montreal August 2010 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Laws (LL.M.) © Allen Mendelsohn 2010 ABSTRACT [Le résumé français suit l'anglais.] BitTorrent has become the primary means to share large files (movies, television shows, and music) over the internet. Canadian copyright law and jurisprudence have not kept pace with technology, and as a result there is no definitive pronouncement on the liability for copyright infringement of BitTorrent file- sharers, i.e. users, and file-sharing facilitators, i.e. Internet Service Providers (ISPs) and torrent search engines. Extrapolating from existing law and Canadian and foreign jurisprudence, I conclude that: (i) BitTorrent file-sharers are liable although there may be situations where fair dealing could apply; (ii) it may be possible to show ISPs are liable based on certain findings of fact; and (iii) torrent search engines should not be liable for infringement. There have been three successive attempts to reform copyright law that have addressed internet issues generally and file-sharing in particular. Under the most recent attempt, Bill C-32, file-sharers would be liable under the new ―making available‖ right, and file- sharing facilitators could be liable under the new ―enabling‖ concept of secondary infringement introduced with the bill. RÉSUMÉ BitTorrent est devenu le principal moyen de partager des fichiers volumineux (films, émissions de télévision et musique) sur Internet.
    [Show full text]
  • Bittorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W
    BitTorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W. Ross Woonhak Kang 2010. 11. 04 VLDB Lab. [email protected] Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 2 SKKU VLDB Lab. Introduction • Darknet § 비공개 토런트 사이트(private torrent sites) § 가입자에게만 공개 § 초대(inviatation), 사이트 임시 가입기간에 가입 § 사용자의 upload, download 크기를 기록 - up/down 비율을 통해 사용자의 이용제한 - up/down 비율이 높은 유저에게 혜택 • Motivation § 연구분야에서 큰 주목을 받지 못했다. § 독특한 정책 때문에 공개 토런트와 특성이 다르다. § 토런트 전체 시스템의 이해를 위해서는 공개/비공개 모두를 고려할 필요 가 있다 3 SKKU VLDB Lab. Introduction • Analysis § Macroscopic - 800개 이상의 비공개 토런트 분석 - Sharky list 와 Alexa rank 이용 - 전체 토런트 파일, 유저, 피어(peer) 정보 분석 § Medium-scopic - 4개의 인기 비공개 토런트 분석 - 트랙커(trackers), 피어(peer), 유저, 실제 공유파일 분석 - 공개 사이트와 비공개 사이트간의 상관관계 § Microscopic - HDChina 분석 - 유저의 up/down 기록, 활동시간 조사 4 SKKU VLDB Lab. Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 5 SKKU VLDB Lab. BitTorrent (Background) • Bittorrent is a system for efficient and scalable replication of large amounts of static data § Scalable - the throughput increases with the number of downloaders § Efficient - it utilises a large amount of available network bandwidth • The file to be distributed is split up in pieces and an SHA-1 hash is calculated for each piece 6 SKKU VLDB Lab. BitTorrent (Background) • A metadata file (.torrent) is distributed to all peers § Usually via HTTP • The metadata contains: § The SHA-1 hashes of all pieces § A mapping of the pieces to files § trackers reference 7 SKKU VLDB Lab.
    [Show full text]
  • Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies
    Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies Zhuang Liu∗ University of Western Ontario February 10, 2019 Latest Version: http://publish.uwo.ca/~zliu328/jobmarketpaper.pdf Abstract The debate on digital piracy has attracted significant public attention. An accurate estimate of the loss due to piracy relies crucially on correctly identi- fying the substitution between pirated and paid consumption. Using a novel dataset of weekly piracy downloads collected from the BitTorrent network, I estimate a random-coefficient logit demand model of movies to quantify the effect of movie piracy on movie revenue from two distribution channels: box office and DVD sales. Counterfactual results reveal that digital piracy has het- erogeneous effects on different channels of sales. When all piracy is removed, US box office revenue will only increase by 2.71% ($ 231 million) while US DVD sales will increase by 36% ($ 527 million) over 40 weeks in 2015. In addition, the effects on sales differ substantially by quality of pirated videos. I find strong evidence that one movie's piracy have negative indirect effects on other movie's revenue. Decomposition exercises show that the magnitude of piracy's indirect effects is much larger than the direct effects on its own rev- enue. Lastly, I allow piracy to have potentially positive effects on sales through word of mouth (WOM). The positive WOM effects from all pirated consump- tion have relatively moderate contributions to the industry revenue amounted to $ 68.7 million over 40 weeks in 2015. ∗This paper was previously titled \A Structural Model of Movie Piracy with Word-of-mouth", \Estimating the Effects of fil-sharing on Movie Box office".
    [Show full text]
  • Free Riding in Bittorrent Is Cheap
    Free Riding in BitTorrent is Cheap Thomas Locher1, Patrick Moor2, Stefan Schmid1, Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch 2 Google Inc., Mountain View, CA 94043, USA [email protected] ABSTRACT while seeders (“altruistic peers”) clearly offer the oppor- tunity to freeload, we are even able to download content While it is well-known that BitTorrent is vulnerable to self- quickly if we ignore seeders and download solely from ish behavior, this paper demonstrates that even entire files other peers that do not possess all pieces of the desired can be downloaded without reciprocating at all in BitTor- content (leechers). This implies that the basic piece ex- rent. To this end, we present BitThief, a free riding client change mechanism does not effectively restrain peers from that never contributes any real data. First, we show that freeloading. simple tricks suffice in order to achieve high download Sharing communities are also investigated in this paper. rates, even in the absence of seeders. We also illustrate By banning users with constantly low sharing ratios or by how peers in a swarm react to various sophisticated at- denying them access to the newest torrents available, such tacks. Moreover, our analysis reveals that sharing com- communities encourage users to upload more than they munities—communities originally intended to offer down- download, i.e., to keep their sharing ratio above 1. We will loads of good quality and to promote cooperation among show that sharing communities are particularly appealing peers—provide many incentives to cheat.
    [Show full text]
  • Ran Category Site Clic S -- ALL Blitz Torrentup 99999 -- ALL Torrent Galoreup
    Ran Category Site Clic s -- ALL BlitzTorrentUP http://www.blitztorrents.com 99999 -- ALL TorrentGaloreUP http://www.torrentgalore.com 99999 -- ALL ToorgleTorrentUP http://www.toorgle.com 99999 -- ALL XpressTorrentsUP http://www.xpresstorrents.com 99999 1 ALL IsoHuntUP http://isohunt.com 31345 2 ALL ThePirateBayUP http://www.thepiratebay.org 27341 3 ALL ExtraTorrentUP http://extratorrent.com 25777 4 ADULT NuTorrentUP http://www.nutorrent.com 19937 5 ADULT SexyBitsUP http://www.sexybits.net 15115 6 ALL TorrentReactorUP http://www.torrentreactor.net 13230 7 ADULT PussyTorrentsUP http://www.pussytorrents.org 12898 8 ALL DemonoidUP http://www.demonoid.com 11522 9 ALL Kic AssTorrentsUP http://www. at.ph 10018 10 ADULT PureTnAUP http://www.puretna.com 9600 11 ADULT PornEVOUP http://www.pornevo.com 9378 12 ADULT EmporniumUP http://empornium.us 7751 13 ALL TorrentDownloads.NetUP http://www.torrentdownloads.net 7656 14 ADULT BootyTapeUP http://www.bootytape.com 6083 15 ALL XpressTorrentsUP http://xpresstorrents.com 5887 16 ADULT NavyTorrentUP http://www.navytorrent.com 5580 17 ALL Torrent.BitUP http://www.torrentbit.net 5339 18 ADULT DeviloidUP http://www.deviloid.net 5100 19 ADULT GirlOnGirlUP http://girlongirltorrents.com 4967 20 ADULT CheggitUP http://cheggit.net 4505 21 ALL Bittorrent.amUP http://www.bittorrent.am 4279 22 ALL BitWi iUP http://www.bitwi i.org 4221 23 ALL iTorrentUP http://itorrent.tv 4200 24 ALL mininovaUP http://www.mininova.org 3638 25 EBOOKS Eboo TorrentLibraryUP http://eboo torrentlibrary.info/index.php 3017 26 ALL TorrentSupremeUP
    [Show full text]
  • Torrentfreak
    TorrentFreak Home Contact About Archives Forum Documentary Filmmaker Supports BitTorrent Uploader Written by enigmax on May 14, 2009 When a filmmaker first discovered that his new movie had leaked to the Internet, he was pretty upset. However, this creator has some hacker friends who persuaded him to feel more relaxed about reaching a whole new audience. Right now, he is embracing file-sharing and even the uploader who released his work via BitTorrent sites. Help a Childrens Cause Join Trident in Being Part of the Solution. Make a Difference Today! TridentGum.com Online Films Watch & Share your passion 4 Movies Press Play on Babelgum: 100% Free! www.Babelgum.com/Films HD Video Productions Superior digital video productions Professional and high quality. www.sparkplughd.com Last week, ‘godcanjudgeme‘, a prolific uploader to Demonoid, The Pirate Bay, Mininova and OneBigTorrent, made another upload to add to his long list of releases, but this one turned out a little differently to all the others. Blue Gold : World Water Wars from director Sam Bozzo is a movie about one of planet earth’s most precious resources – water. It examines the ‘future’ for water and how various corporations are plotting to control its supply, how governments use water for political gain and how the control of this essential liquid could be the source of future military conflicts. Of course, when anyone uploads a movie to the Internet in breach of copyright, there is always the chance of a different type of conflict – one with the entertainment companies and their anti-piracy allies. However, this particular movie is independent and less likely to attract that type of attention.
    [Show full text]
  • Peer-To-Peer Applications: from Bittorrent to Privacy
    Peer-to-Peer Applications : From BitTorrent to Privacy Arnaud Legout To cite this version: Arnaud Legout. Peer-to-Peer Applications : From BitTorrent to Privacy. 3rd cycle. 2010. cel- 00544132v1 HAL Id: cel-00544132 https://cel.archives-ouvertes.fr/cel-00544132v1 Submitted on 7 Dec 2010 (v1), last revised 6 Jan 2012 (v2) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Peer-to-Peer Applications Arnaud Legout INRIA, Sophia Antipolis, France Projet Planète Email: [email protected] This work is licensed under the Creative Commons version 1 BY-NC-SA License. To view a copy of this license, visit December 2010 http://creativecommons.org/licenses/by-nc-sa/3.0/ Outline Overview . What is a P2P application? . Popularity of P2P applications? Content Replication BitTorrent Security Localization 2 Arnaud Legout © 2010 Definition: Overlay Overlay Network . Network at the application layer (layer 7) 3 Arnaud Legout © 2010 Definition: Overlay Formed by communicating among themselves . Dedicated machines . End-users Types of overlay . General purpose overlay (application-layer multicast) . Application specific overlay (CDN) Overlay construction . Network topology . Network metrics (delay, bandwidth, etc.) 4 Arnaud Legout © 2010 Definition: Overlay Why do we need overlays? .
    [Show full text]
  • Mininova Software Editor Download
    1 / 2 Mininova Software Editor Download Novation presents MiniNova, a powerful and compact synthesizer that ... allows a simple management of the patch library through a special free software plug-in. ... Arpeggiator with the possibility of real-time editing of rhythmic performances ... of the parent company's website from which you can download all the complete .... Looptv.net/ ‪bring you ‬this tutorial and review on Novations new Hardware Synth and Software Editor UltraNova from ProducerTech.com s Rob Jones. Novation .... Tim from the Novation Tech Support team shows you an overview of the UltraNova Software Editor plug-in .... The software works as a plug-in within your DAW and allows full editing of your MiniNova ... MiniNova has a powerful sound engine for a micro synth. ... Download free soundpacks which have been created by artists and sound designers.. Jan 28, 2021 — The Novation MoroderNova, above, is a new version of the MiniNova that is ... You can log into your Novation account here and download the patches ... EQ and our very own gater 'stutter' effect, Editing Software and Patch .... That's why we've created the MiniNova Editor: software that gives you visual access ... Download regular free sound packs created by eminent artists and sound .... Audio Workstation or DAW). Included with the Editor download package, the UltraNova. Librarian is a separate dedicated software application, which provides a .... Dec 12, 2011 · UltraNova firmware update is available to download now. ... The software editor enables detailed visual editing of UltraNova on your Mac or PC. ... Novation MiniNova 37-mini-key Synthesizer/Vocoder Novation MiniNova .... This software package includes the latest Novation USB driver, MiniNova editor and MiniNova librarian.
    [Show full text]
  • Economic Insight 10
    Economic Insight Issue 10 29.07.08 In Rainbows, on Torrents Prepared by Will Page, Radiohead's 'In Rainbows', their seventh Rainbows entered the UK Album Chart, United Chief Economist MCPS-PRS Alliance World Chart and the U.S. Billboard 200 at and Eric Garland, album and first in over four years, CEO Big Champagne marked a paradigm shift for the music number one. industry. Here was an established rock Surprisingly, all the media hysteria surrounded band, free from its recording contract the speculation of the 'average price paid' for In with EMI, delivering content directly to Rainbows, yet this could be viewed as missing the consumer. Commencing on the 10th some of the wider objectives of the project. One of October 2007 with a 'pay what you example can be analysed here: namely, that want' downloadable album, this was InRainbows.com set out to redirect the inevitable followed by a 'made to order' deluxe box torrent traffic that would (have) taken place with set and then concluded with a any high profile album release (back) towards the conventional CD and iTunes release. bands official website. From a management perspective, this could be paraphrased as 'if About Eric Garland Whilst the project has gathered Eric Garland is co-founder and Chief Executive you're not going to pay for the record, then at Officer of BigChampagne Media Measurement, a unprecedented worldwide media privately-held technology and metrics company least give us your email addresses - as this specialising in online media. At present, coverage, with much speculation on provides a 'currency' of its own when planning BigChampagne's available metrics include online what the 'average price paid' might have retailers (iTunes), social networks (MySpace, tours, and other promotional activities'.
    [Show full text]