Ministry of Culture Training in Cooperation with IP Key

Total Page:16

File Type:pdf, Size:1020Kb

Ministry of Culture Training in Cooperation with IP Key 26‐Aug‐15 Ministry of Culture Training In cooperation with IP Key Monday 31 August 2015, Zhengzhou, Henan COPYRIGHT ENFORCEMENT TRENDS IN THE EU & INTERNATIONALLY Overview • Part 1 – Threats to the creative industries in the digital era • Part 2 – How to tackle the threats: approach to enforcement ***Break*** • Part 3 – Countermeasures: different ways to tackle the problem • Part 4 – Sample cases: • Part 5 – Cyber Trust • Questions 1 26‐Aug‐15 PART 1 – THREATS TO THE CREATIVE INDUSTRIES IN THE DIGITAL ERA Overview • 1 – Music Industry • 2 – Games Industry • 3 – Publishing Industry THREATS TO THE MUSIC INDUSTRY • Music industry was the first of the creative industries to come under threat • As early as 1999, music piracy exploded with the Napster peer‐to‐peer (P2P) service • Key cases in the 2000s around the world established key principles as to when the parties involved would be liable • Example cases: – P2P cases: Napster, Grokster, Kazaa – Search/links cases: Yahoo! China, Baidu, Cooper/mp3s4free – P2P/BitTorrent cases: The Pirate Bay, IsoHunt – Cyberlocker cases: RapidShare, Hotfile, MegaUpload 2 26‐Aug‐15 THREATS TO THE MUSIC INDUSTRY • Today, music industry today still faces many threats • From a technology point of view, many threats remain the same as ten years ago • Key threats today include: – unlicensed websites/download sites these services simply offer illegal music content for download by the consumer the music is downloaded directly from the service operator – music search/deep‐linking services these services collect links to unlicensed music being hosted around the Internet on third party servers users search the services database of links for music they want the music is then downloaded directly from the third party host THREATS TO THE MUSIC INDUSTRY • Key threats continued: – peer‐to‐peer (P2P) services various different P2P technologies exist; most popular today is BitTorrent in a P2P system, files are not on central servers, but held by individual users the P2P service allows users or ‘peers’ that want a file to find other users that hold the file the file (or at least part of it) is then transferred directly from the peer holding the file to the peer requesting the file in a BitTorrent service, the coordination of the peers requesting the file (known as ‘leechers’) and peers holding the file (known as ‘seeders’) is done by a ‘tracker’ – pirate apps these services can be accessed by downloading apps from smartphone app stores various different versions exist typically, services allow users to download music from their own servers or third party sites technically similar to search/deeplinking services 3 26‐Aug‐15 THREATS TO THE MUSIC INDUSTRY • Key threats continued: cyberlockers – at their most simple, cyberlockers are simply file hosting and storage services – users upload e.g. music files to the cyberlocker, which is like an online warehouse – the cyberlocker stores the file and sends the user a link to the hosted file – the user can then very easily distribute the link to the file to other users, for instance by posting on BBS and blog services; no need to distribute the file itself – the cyberlockers themselves have limited interfaces and it is not possible to search within a cyberlocker for particular content – by using the link, other users download a copy of the file from the cyberlocker – cyberlockers are not necessarily liable for infringement – but where cyberlocker services induce or encourage users to store commercial, copyright‐protected content then they can be indirectly liable THREATS TO THE GAMES INDUSTRY • Games industry suffers from similar threats to other industries, in particular music and film. • Differences in the games industry mean threats impact the games industry differently from, e.g. music and film industries – game files can be huge >30GB; a lack of bandwidth means these files simply cannot be distributed as easily as smaller music or film files – historically the distribution model for many games has been quite different, with games being played on proprietary games consoles – games consoles include technical protection measures (TPMs) that prevent pirate copies of games being played on genuine consoles – commercial models may be different, e.g. subscription‐based games • Some threats are particular to the games industry, e.g. TPM circumvention 4 26‐Aug‐15 THREATS TO THE GAMES INDUSTRY • Key threats today include: – P2P services technically these services work in an identical manner as they do for other content, e.g. music and film – cyberlockers and unlicensed sites again similar to the music industry, cyberlockers are a major problem for the games industry links to pirate games that have been uploaded to the cyberlocker are distributed on the internet, e.g. on BBS and blogs users can download the pirate games by following the links some websites aggregate and offer many links to pirate games and may be acting with the cyberlocker, sharing revenues THREATS TO THE GAMES INDUSTRY • Key threats today continued: – TPM circumvention technical protection measures (TPMs) are technical measures that prevent users from copying copyright content, including playing pirate copies of games major games publishers and console manufacturers use TPMs to allow only genuine games to be played on their consoles major console manufacturers include: – Nintendo, who produce the WiiU and 3DS – Sony, who produce the PlayStation PS4 – Microsoft, who produce the X‐Box the most common form of TPM circumvention device allows pirate copies of games to be played on the consoles (these devices are sometimes known as ‘modchips’) the manufacture, distribution and sale of physical devices and software that circumvent TPMs is a huge industry once a user has purchased a console, a TPM circumvention device allows the user to play pirate games that it has downloaded for free 5 26‐Aug‐15 THREATS TO THE PUBLISHING INDUSTRY • The publishing industry faces similar threats to other creative industries, but the most serious threats are quite particular to publishing • Differences in the industry mean threats impact the industry differently from other industries, e.g. music – physical products, in particular books and magazines are still very popular – e‐books are becoming very popular, but e‐books typically come with technical protection measures (TPMs) and/or digital rights management systems (DRM) – those TPM and DRM systems tend to be attacked (‘cracked’ or ‘hacked’) less that in other industries, e.g. games • Some threats are particular to the publishing industry, e.g. the collaboration with licensees in cases of journal piracy THREATS TO THE PUBLISHING INDUSTRY • Key threats today include: journal piracy services – academic, scientific, technical and medical journal publishers publish thousands of different journals – these are typically licensed to institutions, such as universities and libraries, on a subscription basis; a licence gives access to a huge database of current journals and past issues – pirate journal service providers collaborate with one or more licensed institutions – this allows the service to offer a huge volume of current and past issues of journals – the involvement of the institutions is outside the terms of their licence from the publisher – articles requested from the service provider are either emailed directly to the user or uploaded to the user’s account, from where they can be downloaded directly – services are often commercial, charging users, but no money goes back to the publishers 6 26‐Aug‐15 THREATS TO THE PUBLISHING INDUSTRY • Key threats continued: document sharing platforms – users upload documents to the platform operator – uploaded documents are then made available to other users, who search for what they want – users can then download the documents they are looking for – document sharing platforms operate in various ways commercially – document sharing platforms are not necessarily liable for infringement – but where the platforms induce or encourage users to upload commercially available, copyright‐protected content then they can be indirectly liable – document sharing platforms are either stand‐alone or may be one of the services offered by, for instance, larger search providers • Key threats continued: e‐book piracy – e‐books normally contain DRM content and/or TPMs – hackers often try to ‘crack’ the DRM or TPM to allow the hackers easier access to the content and to allow them to distribute the content freely PART 2 – HOW TO TACKLE THE THREATS: THE APPROACH TO ENFORCEMENT • A structured approach can be taken to analysing infringing services • Online infringement generally involves two acts of copyright infringement: – infringement of the right of communication to the public – infringement of the right of reproduction • Need to understand in detail who is responsible for each act • Need to understand who benefits from the infringement occurring • Often the ‘mastermind’ is not the primary infringer 7 26‐Aug‐15 PART 2 – HOW TO TACKLE THE THREATS: THE APPROACH TO ENFORCEMENT Relevant legal provisions are same internationally, in Europe and in China: 1. the unlicensed making available to the public of their works – WIPO Copyright Treaty 1996, Article 8: Right of communication to the public – EU Copyright Directive 2001, Article 3: Right of communication to the public – Chinese Copyright Law 1990, Article 10.1(12): Right of communication through an information network 2. the unlicensed reproduction of the work – Berne Convention 1886 (1971 edition),
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Testimony of Authors Guild President Scott Turow Before the Senate
    My name is Scott Turow. I’m the president of the Authors Guild, the largest society of published authors in the U.S., representing more than 8,500 book authors and freelance writers. Our members represent the broad sweep of American authorship, including literary and genre fiction, nonfiction, trade, academic, and children’s book authors, textbook authors, freelance journalists and poets.1 Guild members have won countless honors and all major literary awards, including the Nobel Prize for Literature.2 The Authors Guild promotes the professional interests of authors: we’re advocates for effective copyright protection, fair contracts, and free expression. It’s a pleasure and an honor to be here this morning. I’d like especially to thank this committee for recognizing the severity of the problem we all face and getting the ball rolling with COICA in the fall, which recognized this central and unavoidable truth: any serious attempt to address online piracy must address the third-party enablers of infringement. Anything that doesn’t address those enablers is, frankly, a pretend solution to a real problem. Our Copyright Policy Inadvertently Encourages Investments in Technologies and Services That Promote Trafficking in Stolen Books, Music, and Movies After 300 years as one of history's greatest public policy successes, copyright is coming undone. As we meet here this morning, our well-intended policy toward copyright online is 1 The Guild had its beginnings as the Authors League of America, which was founded in 1912 by a group of book authors (including Theodore Roosevelt, who served as the League’s founding vice president), short story writers, freelance journalists and a smattering of dramatists.
    [Show full text]
  • NOTICE by Hotfile Corp., Anton Titov Defendants' Notice of Filing The
    Disney Enterprises, Inc. et al v. Hotfile Corp. et al Doc. 391 Att. 1 EXHIBIT A Dockets.Justia.com PUBLIC VERSION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO.: 11-CIV-20427-WILLIAMS/TURNOFF DISNEY ENTERPRISES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS PRODUCTIONS LLLP, COLUMBIA PICTURES INDUSTRIES, INC., and WARNER BROS. ENTERTAINMENT INC., Plaintiffs, v. HOTFILE CORP., ANTON TITOV, and DOES 1-10. Defendants. / HOTFILE CORP., Counterclaimant, v. WARNER BROS. ENTERTAINMENT INC., Counter-Defendant. / [REDACTED] DECLARATION OF PROFESSOR JAMES BOYLE IN SUPPORT OF DEFENDANTS’ OPPOSITION TO PLAINTIFFS’ MOTION FOR SUMMARY JUDGMENT AND EXHIBITS THERETO FILED UNDER SEAL CASE NO.: 11-CIV-20427-WILLIAMS/TURNOFF I, JAMES BOYLE, declare as follows: 1. I am currently the William Neal Reynolds Professor of Law at Duke University, and have been retained by Farella, Braun + Martel LLP on behalf of the Defendants in this action as an expert witness. 2. I received an LL.B. (Hons) from Glasgow University (1980), and an LL.M. (1981) and S.J.D. (1986) from Harvard Law School. I have been a law professor since 1982, teaching at American University, and at the Universities of Pennsylvania, Harvard and Yale as a Visiting Professor. In 2000 I joined the law faculty at Duke. 3. My academic research is mainly in the areas of intellectual property and communication policy, with a focus on the Internet. I have written and edited numerous articles and books on these subjects. In general, my research and scholarship has focused on: i) Copyright law, particularly in the digital arena. I have published extensively on copyright in law journals, monographs, and edited collections of essays; a full list is available in the attached curriculum vitae.
    [Show full text]
  • Volition and Copyright Infringement
    DENICOLA.37.4.3 (Do Not Delete) 4/3/2016 1:45 PM VOLITION AND COPYRIGHT INFRINGEMENT Robert C. Denicola† TABLE OF CONTENTS INTRODUCTION .............................................................................................................. 1259 I. VOLITION AND CAUSATION IN TORT LAW .......................................................... 1262 A. It Isn’t Actually an Issue of “Volition” ..................................................... 1262 B. It Isn’t Actually an Issue of “Causation” Either ...................................... 1268 II. VOLITION IN COPYRIGHT LAW ............................................................................. 1270 A. Volition and the Defendant’s Relationship to the Infringed Work....... 1270 B. A Duty to Police ......................................................................................... 1276 C. Secondary Liability .................................................................................... 1283 III. VOLITION APPLIED ................................................................................................. 1284 A. Cloud Storage ............................................................................................. 1284 B. Search Engines ............................................................................................ 1287 C. Cartoon Network and the Remote Storage DVR ................................... 1290 D. Aereo and Its Tiny Antennae ................................................................... 1293 CONCLUSION..................................................................................................................
    [Show full text]
  • Spanish Language Learning Pack Free Download Zip
    Spanish Language Learning Pack Free Download Zip Spanish Language Learning Pack Free Download Zip 1 / 3 2 / 3 You can download the LibreOffice Portable zip file and then simply unzip it so that ... and Spanish The All Languages download includes all 5'! languages supported ... UPGRADES AND UPDATES I What are updates,patches.and service packs? ... materially affect tlie overall learning experience Cengage Learning reserves .... Spanish Language Learning Pack Free Download Zip -> http://urllio.com/u36mo 9b18ee624d spanish language learning pack spanish .... Free Downloads. Below you can download free language materials for courses in Spanish, English, French, Italian, German and many other languages!. Learn Spanish with this comprehensive and effective audio course. ... You can listen to the audio lessons below or download the full course to learn Spanish at .... Language learning resources (~900 GB) and much more. ... learning Spanish, Polish ... I know some people who download do sense the difference between big publishers and small teams or ... We get maybe $5 or $10 every few months as donations for our free course content. ... [/r/learnwelsh] Language Learning Packs.. ESL Galaxy offers over 2368 free printable worksheets for ESL lesson plans and ESL ... Download packs · Here you will find zip files that contain a variety of lesson plan materials for ESL. ... Chinese is an easy language to learn to speak. ... you can quickly learn Chinese through free mp3 audio lessons, video slides and .... Download TinyMCE for free, the most advanced WYSIWYG HTML editor designed ... Download the TinyMCE 4 language packs (.zip) or read more in the docs.. Tags: Spanish Language Learning Pack , tutorials, pdf, ebook, torrent, downloads, rapidshare, filesonic, hotfile, megaupload, fileserve ...
    [Show full text]
  • A Comparative Law Perspective on Intermediaries' Direct Liability in Cloud Computing Context -- a Proposal for China
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Theses and Dissertations Student Scholarship 10-2016 A Comparative Law Perspective on Intermediaries' Direct Liability in Cloud Computing Context -- A Proposal for China Shi Xu Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/etd Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Xu, Shi, "A Comparative Law Perspective on Intermediaries' Direct Liability in Cloud Computing Context -- A Proposal for China" (2016). Theses and Dissertations. 32. https://www.repository.law.indiana.edu/etd/32 This Dissertation is brought to you for free and open access by the Student Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. A COMPARATIVE LAW PERSPECTIVE ON INTERMEDIARIES’ DIRECT LIABILITY IN CLOUD COMPUTING CONTEXT—A PROPOSAL FOR CHINA SHI XU Submitted to the faculty of Indiana University Maurer School of Law in partial fulfillment of the requirements for the degree Doctor of Juridical Science OCTOBER 2016 ii DEDICATION To my beloved Dad and Mom, Mr. Xu Wenguang and Mrs. Liu Li. I love you deeply in my heart. iii ACKNOWLEDGEMENT I want to express my sincere gratitude to my advisor, Prof. Leaffer. I want to thank him for his valuable guidance, consultation, supports and patience. I also want to thank my dissertation committee members, Prof. Mark Janis and Prof. Michael Mattioli, for their valuable guidance and comments on my dissertation.
    [Show full text]
  • The Cyberlocker Gold Rush: Tracking the Rise of File-Hosting Sites As Media Distribution Platforms
    Swinburne Research Bank http://researchbank.swinburne.edu.au Author: Lobato, Ramon and Tang, Leah Title: The cyberlocker gold rush: tracking the rise of file- hosting sites as media distribution platforms Year: 2014 Journal: International Journal of Cultural Studies Volume: 17 Issue: 5 Pages: 423-425 URL: http://hdl.handle.net/1959.3/316176 Copyright: Copyright © 2013 The Authors. This article has been accepted for publication in a future volume of the International Journal of Cultural Studies, however the version reproduced here with the permission of the publisher is the author's original draft and has not yet undergone peer review. It may vary substantially from the definitive version to appear in the journal. For more information please refer to the journal's website, or contact the author. This is the author’s version of the work, posted here with the permission of the publisher for your personal use. No further distribution is permitted. You may also be able to access the published version from your library. The definitive version is available at: http://doi.org/10.1177/1367877913505169 Swinburne University of Technology | CRICOS Provider 00111D | swinburne.edu.au Powered by TCPDF (www.tcpdf.org) The cyberlocker gold rush: tracking the rise of file-hosting sites as media distribution platforms Ramon Lobato1 Swinburne University of Technology Leah Tang Monash University Forthcoming in International Journal of Cultural Studies Pre-press version; not for citation Abstract This article examines the content distribution practices and regulatory anxieties generated by a particular cloud computing technology: the cyberlocker, or one-click file hosting site. Cyberlockers, which offer an easy and free way to share media files, are widely used for content piracy.
    [Show full text]
  • Case: 19-56452, 06/29/2020, ID: 11737254, Dktentry: 14, Page 1 of 39
    Case: 19-56452, 06/29/2020, ID: 11737254, DktEntry: 14, Page 1 of 39 No. 19-56452 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT LANG VAN, INC. Plaintiff-Appellant, V. VNG CORPORATION. Defendant-Appellee. APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA CASE NO. 14-CV-0100 AG (JDEX) BRIEF OF THE MOTION PICTURE ASSOCIATION, INC. AS AMICUS CURIAE IN SUPPORT OF PLAINTIFF-APPELLANT AND REVERSAL MITCHELL SILBERBERG & KNUPP LLP ROBERT H. ROTSTEIN J. MATTHEW WILLIAMS 2049 Century Park East, 18th Floor 1818 N Street, N.W., 7th Floor Los Angeles, California 90067 Washington, D.C. 20036 Telephone: (310) 312-2000 Telephone: (202) 355-7900 Email: [email protected] Email: [email protected] Attorneys for Amicus Curiae Date: June 29, 2020 Case: 19-56452, 06/29/2020, ID: 11737254, DktEntry: 14, Page 2 of 39 CIRCUIT RULE 26.1 DISCLOSURE STATEMENT Pursuant to Federal Rule of Appellate Procedure 26.1, The Motion Picture Association, Inc. has no parent corporation, and no publicly held company owns 10% or more of its stock. The only law firm appearing for The Motion Picture Association Inc. is Mitchell Silberberg & Knupp LLP. Respectfully submitted, Dated: June 29, 2020 MITCHELL SILBERBERG & KNUPP LLP By: /s/ Robert H. Rotstein Robert H. Rotstein J. Matthew Williams Attorneys for Amicus Curiae The Motion Picture Association, Inc. i Case: 19-56452, 06/29/2020, ID: 11737254, DktEntry: 14, Page 3 of 39 TABLE OF CONTENTS Page CIRCUIT RULE 26.1 DISCLOSURE STATEMENT ............................................. i STATEMENT OF INTEREST ................................................................................. 1 SUMMARY OF ARGUMENT ................................................................................ 4 ARGUMENT .........................................................................................................
    [Show full text]
  • Megaupload and Criminal Charges
    Revista Española de Relaciones Internacionales. Núm. 4. ISSN 1989-6565 MEGAUPLOAD AND CRIMINAL CHARGES Daniel Levin* Samuel Doran** Leslie A. Maria*** ABSTRACT The January 2012 arrest in New Zealand of Kim Dotcom following his indictment in an American federal court raises a number of questions about the ability of American law to reach across the internet and into other nations. Dotcom, a citizen of Germany and Finland and a permanent resident of New Zealand, was the founder of Megaupload, which ran websites that allowed users to share files such as movies and music, much of which was under American copyright. Although Dotcom and his fellow Megaupload executives had almost no personal connections to America, the United States government has alleged that Megaupload’s use of servers in America to host data is sufficient to subject Dotcom and his colleagues to the jurisdiction of American criminal law through the doctrine of extraterritorial jurisdiction. This article examines the concept and use of extraterritorial jurisdiction, looks at the process of extradition of Dotcom and his co-defendants, and discusses the impact of the Megaupload prosecution on other Internet sites. Key words: Megaupload, Kim Dotcom, Extradition, Extraterritorial jurisidiction. SUMMARY.- 1. United States Jurisdiction over Megaupload; 1. 1. General Jurisdiction; 1. 2. Extra-territorial Jurisdiction. 2. Extradition; 2. 1. Availability of Extradition; 2. 2. Process for Extradition. 3. Effects on other Sites. 4. Conclusion. * Partner at White & Case LLP. ** Samuel Doran is an Associate in the Washington, DC office of White & Case LLP. Before joining the firm, Samuel clerked for the Honorable Curtis Gómez, United States District Court Judge for the District of the Virgin Islands.
    [Show full text]
  • NOTICE by Columbia Pictures Industries, Inc., Disney Enterprises, Inc., Twentieth Century Fox Film Corporation, Universal City S
    Disney Enterprises, Inc. et al v. Hotfile Corp. et al Doc. 324 Att. 2 Yeh Exhibit 1 Dockets.Justia.com Highly Confidential Page 1 1 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA 2 CASE NO. 11-20427-WILLIAMS/TURNOFF 3 - - - - - - - - - - - - - - - - - - - - - - - - - - DISNEY ENTERPRISES, 4 INC., TWENTIETH CENTURY FOX FILM CORPORATION, 5 UNIVERSAL CITY STUDIOS PRODUCTIONS LLLP, 6 COLUMBIA PICTURES INDUSTRIES, INC., and 7 WARNER BROS. ENTERTAINMENT, INC., 8 9 Plaintiff, 10 v. 11 HOTFILE CORP., ANTON TITOV, and DOES 1-10, 12 13 Defendants. 14 15 HOTFILE CORP., 16 Counterclaimant, 17 v. 18 WARNER BROS ENTERTAINMENT INC., 19 Counterdefendant. 20 - - - - - - - - - - - - - - - - - - - - - - - - - VOLUME I 21 H I G H L Y C O N F I D E N T I A L (Pursuant to protective order, the following 22 transcript has been designated highly confidential) 23 30(b)(6) DEPOSITION OF ANTON TITOV Radisson Blu Hotel 24 Sofia, Bulgaria Monday, December 5, 2011 25 Job Number: 44174 TSG Reporting - Worldwide 800-702-9580 Highly Confidential Page 2 1 A P P E A R A N C E S 2 ATTORNEY FOR THE PLAINTIFFS: 3 JENNER & BLOCK BY: STEVEN B. FABRIZIO, ESQ. 4 1099 New York Avenue, NW Washington, DC 20001 5 6 7 8 ATTORNEY FOR THE DEFENDANTS HOTFILE CORP., 9 AND ANTON TITOV: FARELLA, BRAUN & MARTEL 10 BY: RODERICK M. THOMPSON, ESQ. 235 Montgomery Street 11 San Francisco, California 94104 12 13 BOSTON LAW GROUP 14 VALENTIN GURVITS 825 Beacon Street 15 Newton Center, MA 02459 16 17 18 19 20 21 22 23 24 25 TSG Reporting - Worldwide 800-702-9580 Highly Confidential Page 3 1 Also present: 2 Court reporter: 3 Fiona Farson TSG Reporting 4 5 Videographer: 6 Simon Rutson TSG Reporting 7 8 Interpreter: 9 Assist.
    [Show full text]
  • Characterizing the File Hosting Ecosystem: a View from the Edge ∗
    Characterizing the File Hosting Ecosystem: A View from the Edge ∗ Aniket Mahanti1, Carey Williamson1, Niklas Carlsson2, Martin Arlitt1,3, Anirban Mahanti4 1University of Calgary, Calgary, Alberta, Canada 2Link¨oping University, Link¨oping, Sweden 3HP Labs, Palo Alto, California, U.S.A. 4NICTA, Locked Bag 9013, Alexandria, New South Wales, Australia Abstract We present a comprehensive, longitudinal characterization study of the file hosting ecosystem using HTTP traces collected from a large campus network over a one-year period. We performed detailed multi-level analysis of the usage behaviour, infrastructure properties, content characteristics, and user-perceived performance of the top five services in terms of traffic volume, namely RapidShare, Megaupload, zSHARE, MediaFire, and Hotfile. We carefully devised methods to identify user clickstreams in the HTTP traces, including the identification of free and premium user instances, as well as the identification of content that is split into multiple pieces and downloaded using multiple transactions. Throughout this characterization, we compare and contrast these services with each other as well as with peer-to-peer file sharing and other media sharing services. 1 Introduction The Web has recently witnessed the emergence of file hosting services. These services provide users with a Web interface to upload, manage, and share files in the cloud. When a file is uploaded to a file hosting service, a unique URL is generated that can be used for downloading the file. The user may then make the link public for sharing content. Well-known file hosting services include RapidShare, Megaupload, and Hotfile, which are among the top 100 most visited Web sites in the world (according to Alexa.com).
    [Show full text]
  • Linguistic and Cultural Diversity in Cyberspace
    Ministry of Culture of the Russian Federation Federal Agency for Press and Mass Communications of the Russian Federation Government of the Republic of Sakha (Yakutia) Commission of the Russian Federation for UNESCO Russian Committee of the UNESCO Information for All Programme Ammosov North-Eastern Federal University Interregional Library Cooperation Centre Linguistic and Cultural Diversity in Cyberspace Proceedings of the 3nd International Conference (Yakutsk, Russian Federation, 30 June – 3 July 2014) Moscow 2015 Financial support for this publication is provided by the Government of the Republic of Sakha (Yakutia) and the Government of Khanty-Mansiysk Autonomous Okrug-Ugra Compilers: Evgeny Kuzmin, Anastasia Parshakova, Daria Ignatova Translators: Tatiana Butkova and Elena Malyavskaya English text edited by Anastasia Parshakova Editorial board: Evgeny Kuzmin, Sergey Bakeykin, Tatiana Murovana, Anastasia Parshakova, Nadezhda Zaikova Linguistic and Cultural Diversity in Cyberspace. Proceedings of the 3rd International Conference (Yakutsk, Russian Federation, 30 June – 3 July, 2014). – Moscow: Interregional Library Cooperation Centre, 2015. – 408 p. The book includes communications by the participants of the 3rd International Conference on Linguistic and Cultural Diversity in Cyberspace (Yakutsk, Russian Federation, 30 June – 3 July, 2014), where various aspects of topical political, philosophical and technological challenges of preserving multilingualism in the world and developing it in cyberspace were discussed. The authors share national vision and experience of supporting and promoting linguistic and cultural diversity, express their views on the role of education and ICTs in these processes. The authors are responsible for the choice and presentation of facts and for the opinions expressed, which are not necessarily those of the compilers. ISBN 978-5-91515-063-0 © Interregional Library Cooperation Centre, 2015 2 Contents Preface ...............................................................................................................................
    [Show full text]